We envisage a scenario where a system of network computer initially with random loads, exchange jobs to balance load among themselves to enhance their individual performance and to provide augmented quality of service...
详细信息
We envisage a scenario where a system of network computer initially with random loads, exchange jobs to balance load among themselves to enhance their individual performance and to provide augmented quality of service (QoS) to the user community. We model the individual machines as agents interacting with one another. The agents have beliefs and aspirations. The aspiration of an agent is seek load from other, when it did not have enough to begin with, and sheds the same of it finds itself excessively loaded. This paper develops the concept with a design of a utility function to reflect the agent aspiration. We also propose a measure of load imbalance between networked machines. Negotiation mechanism is developed for exchange of jobs between agents. We report our result of the simulation with two machines and extend the same for three machines. The extension of the idea to a large number of machines entail coming to term with complexity in form of administrative overloads. We discuss the "small word" concept in the content of a simulation massively large number of machines interconnected.
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependenci...
详细信息
ISBN:
(纸本)9781595930453
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependencies between document nodes, but at the same time presenting the risk of undesirable data disclosure. In this paper we introduce the notion of relevancy-based access control, which realizes protection of versioned XML documents by various types of relevancy, such as version dependencies, schema similarities and temporal proximity. We define a new path query language XVerPath over XML document versions, which can be utilized for specifying relevancy-based access control policies. We also introduce the notion of relevancy class, for collectively and compactly specifying relevancy-based policies. Copyright 2005 ACM.
This paper describes COMET, a collaborative intelligent tutoring system for medical problem-based learning. The system uses Bayesian networks to model individual student knowledge and activity, as well as that of the ...
详细信息
This paper describes COMET, a collaborative intelligent tutoring system for medical problem-based learning. The system uses Bayesian networks to model individual student knowledge and activity, as well as that of the group. It incorporates a multi-modal interface that integrates text and graphics so as to provide a rich communication channel between the students and the system, as well as among students in the group. Students can sketch directly on medical images, search for medical concepts, and sketch hypotheses on a shared workspace. The prototype system incorporates substantial domain knowledge in the area of head injury diagnosis. A major challenge in building COMET has been to develop algorithms for generating tutoring hints. Tutoring in PBL is particularly challenging since the tutor should provide as little guidance as possible while at the same time not allowing the students to get lost. From studies of PBL sessions at a local medical school, we have identified and implemented eight commonly used hinting strategies. We compared the tutoring hints generated by COMET with those of experienced human tutors. Our results show that COMET's hints agree with the hints of the majority of the human tutors with a high degree of statistical agreement (McNemar test, p = 0.652, Kappa = 0.773). Copyright 2004 ACM.
A data model supporting the unification of the management of temporal XML document databases and version control, i.e., a Temporal Version Data Model (TVDM), is proposed. TVDM is temporally change-centric and represen...
详细信息
We propose a novel multi-layers paradigm for the design of key exchange protocols. In the top layer, protocols are specified in a high-level, declarative, formal language using speech acts as the basic building blocks...
详细信息
ISBN:
(纸本)1581139713
We propose a novel multi-layers paradigm for the design of key exchange protocols. In the top layer, protocols are specified in a high-level, declarative, formal language using speech acts as the basic building blocks. The declarative semantics of speech acts are specified by their preconditions and effects like in Hoare logics. A protocol logic, called ProtoLog, is developed for reasoning about speech act oriented protocols. Using the language of speech acts, protocol designers could develop their protocols in an modular and compositional way that are correct from the outset. High-level speech act-oriented protocols are automatically translated into lower-level message exchanging protocols by a "protocol compiler" that implements speech acts by sending and receiving appropriate encrypted messages. To demonstrate the applicability of our idea, we apply it on the class of well-designed key exchange protocols where a protocol is well-designed if a speech act is executed only if its preconditions are satisfied. We develop a "protocol compiler" for the class of well-designed protocols and prove the soundness and a limited form of completeness of the protocol logic ProtoLog wrt the translation, implemented by the compiler, under the Dolev-Yao assumption of perfect cryptography. An immediate corollary from the soundness result is the guarantee of the secrecy of exchanged keys (an essential security requirement of key exchange protocols) in well-designed protocols. Copyright 2004 ACM.
One of the important issues in image feature is the area of objects in the image. In this paper we propose an area finding algorithm to measure the area of an image object. This method finds the area by polygonal appr...
详细信息
One of the important issues in image feature is the area of objects in the image. In this paper we propose an area finding algorithm to measure the area of an image object. This method finds the area by polygonal approximation of image objects. A sequential fine-tuning of this polygon is used to estimate the actual area from polygon area. This area modification sequence is used as a topological description of an image object and used as feature in image matching.
Cellular automata are discrete dynamic systems whose behavior is specified in terms of local interactions. Even simple local interactions may eventually manifest themselves in terms of complex and unexpected global pa...
详细信息
Cellular automata are discrete dynamic systems whose behavior is specified in terms of local interactions. Even simple local interactions may eventually manifest themselves in terms of complex and unexpected global patterns. A number of investigations have been reported on two-dimensional lattices demonstrating exciting outcomes starting with simple initial configurations and simple rules of interactions, giving rise to the speculative possibilities of artificial life. There is a growing interest in a variety of automata including three dimensional automata and variations of transition rules, but common to all their formations are certain hard questions relating to the global determinism of the behavior of the cellular automata manifest in the local interactions. There are a number of other theoretical issues remain unresolved. A considerable theoretical work and simulation have been reported around the one-dimensional lattices, primarily because of possible visualization of the processes. In this paper we investigate the issue of density of an automata configuration and its determinism.
Due to a widely use of XML language in various application domains, a well-established mechanism for the definition and enforcement of security controls on specific accesses to XML documents is demanded, in order to e...
详细信息
A new non-Delaunay-based approach is presented to reconstruct a curve, lying in 2- or 3-space, from a sampling of points. The underlying theory is based on bounding curvature to determine monotone pieces of the curve....
详细信息
We present a new approach to reasoning with specificity which subsumes inheritance reasoning. The new approach differs from other approaches in the literature in the way priority between defaults is handled. Here, it ...
详细信息
暂无评论