The application of pattern recognition techniques, expert systems, artificial neural networks, fuzzy systems and nowadays hybrid artificial intelligence techniques in manufacturing can be regarded as consecutive eleme...
详细信息
ISBN:
(纸本)9781622766468
The application of pattern recognition techniques, expert systems, artificial neural networks, fuzzy systems and nowadays hybrid artificial intelligence techniques in manufacturing can be regarded as consecutive elements of a process started two decades ago. The paper outlines the most important steps of this process. Agent-based systems are highlighted as promising tools for managing complexity, changes and disturbances in production. Further integration of approaches is predicted.
This paper deals with a distributed bandwidth broker that we try to extend in order to perform inter-domain operation. The basic issues for inter-domain operation are discussed and we try to approach the most demandin...
详细信息
ISBN:
(纸本)1841021571
This paper deals with a distributed bandwidth broker that we try to extend in order to perform inter-domain operation. The basic issues for inter-domain operation are discussed and we try to approach the most demanding issues as the selection of the best inter domain routing path. Generally, we discuss three models for inter domain routing through bandwidth broker, analyzing their advantages. Also, a very important point that affects the interdomain operation is the SLAs between adjacent domains and the capability that a bandwidth broker should have to ask and perform dynamic negotiation. Finally, we analyze the best model and present how it should be incorporated in the existing distributed implementation.
The paper presents key aspects connected with modern access control based on behavioral patterns of human being. Two biometric techniques based on eye movement and keystroke dynamics were presented. Quantitative resul...
详细信息
We propose a simple and intuitive cost mechanism which assigns costs for the competitive usage of m resources by n selfish agents. Each agent has an individual demand;demands are drawn according to some probability di...
详细信息
We propose a simple and intuitive cost mechanism which assigns costs for the competitive usage of m resources by n selfish agents. Each agent has an individual demand;demands are drawn according to some probability di...
详细信息
Software refactorization is a process of changing program's source code structure without changing its functionality. The purpose of the refactorization is to make program's source code easier to understand an...
详细信息
The paper introduces an algorithm for personalized clustering based on a range tree structure, used for identifying all web documents satisfying a set of predefined personal user preferences. The returned documents go...
详细信息
ISBN:
(纸本)1595934537
The paper introduces an algorithm for personalized clustering based on a range tree structure, used for identifying all web documents satisfying a set of predefined personal user preferences. The returned documents go through a clustering phase before reaching the end user, thus allowing more effective manipulation and supporting the decision making process. The proposed algorithm demonstrates increased applicability in semantic web settings, since they offer the infrastructure for the explicit declaration of web document attributes and their respective values, thus allowing for more automated retrieval. The proposed algorithm improves the k-means range algorithm, as it uses the already constructed range tree (i.e. during the personalized filtering phase) as the basic structure on which the clustering step is based, applying instead of the k-means, the k-windows algorithm. The total number of parameters used for modeling the web documents dictates the number of dimensions of the Euclidean space representation. The time complexity of the algorithm is O(log d-2n+v), where d is the number of dimensions, n is the total number of web documents and v is the size of the answer. Copyright 2006 ACM.
In addition of the four main R&D directions, i.e., adaptive manufacturing, digital manufacturing, knowledge-based manufacturing, and networked manufacturing, emphasised by the European initiative Manufuture, two a...
详细信息
In this work we propose and develop a comprehensive infrastructure, coined PastryStrings, for supporting rich queries on both numerical (with range, and comparison predicates) and string attributes, (accommodating equ...
详细信息
In this work we propose and develop a comprehensive infrastructure, coined PastryStrings, for supporting rich queries on both numerical (with range, and comparison predicates) and string attributes, (accommodating equality, prefix, suffix, and containment predicates) over DHT networks utilising prefix-based routing. As event-based, publish/ subscribe information systems are a champion application class, we formulate our solution in terms of this environment.
In this paper the authors present an overview of techniques and tools that enable the effective evaluation and refactoring of a Web application's conceptual schema. Moreover, based on the introduction of the notio...
详细信息
ISBN:
(纸本)0889865744
In this paper the authors present an overview of techniques and tools that enable the effective evaluation and refactoring of a Web application's conceptual schema. Moreover, based on the introduction of the notion of model clones (in a previous work), as partial conceptual schemas that are repeated within a broader application model and the notion of model smells, as certain blocks in the Web applications model that imply the possibility of refactoring, this paper illustrates a methodology and a tool for detecting and evaluating the existence of potential model clones, in order to identify problems in an application's conceptual schema by means of efficiency, consistency, usability and overall quality. The methodology can be deployed either in the process of designing an application or in the process of reengineering it. Evaluation is performed according to a number of inspection steps. At first level the compositions used in the hypertext design are evaluated, followed by a second level evaluation concerning data manipulation and presentation to the user.
暂无评论