As the increasing users and services over the Internet, people demand faster data fetching and more reliable network services. However, the increasing network services and equipment causes the network management much ...
详细信息
There is a growing interest in the use of ontologies for multi-agent system app- cations. On the one hand, the agent paradigm is successfully employed in those applications where autonomous, loosely-coupled, heterogen...
详细信息
ISBN:
(数字)9783764373610
ISBN:
(纸本)9783764372378
There is a growing interest in the use of ontologies for multi-agent system app- cations. On the one hand, the agent paradigm is successfully employed in those applications where autonomous, loosely-coupled, heterogeneous, and distributed systems need to interoperate in order to achieve a common goal. On the other hand, ontologies have established themselves as a powerful tool to enable kno- edge sharing, and a growing number of applications have bene?ted from the use of ontologies as a means to achieve semantic interoperability among heterogeneous, distributed systems. In principle ontologies and agents are a match made in heaven, that has failed to happen. What makes a simple piece of software an agent is its ability to communicate in a ”social” environment, to make autonomous decisions, and to be proactive on behalf of its user. Communication ultimately depends on und- standing the goals, preferences, and constraints posed by the user. Autonomy is theabilitytoperformataskwithlittleornouserintervention,whileproactiveness involves acting autonomously with no need for user prompting. Communication, but also autonomy and proactiveness, depend on knowledge. The ability to c- municate depends on understanding the syntax (terms and structure) and the semantics of a language. Ontologies provide the terms used to describe a domain and the semantics associated with them. In addition, ontologies are often comp- mented by some logical rules that constrain the meaning assigned to the terms. These constraints are represented by inference rules that can be used by agents to perform the reasoning on which autonomy and proactiveness are based.
XP/Agile education and training remains a challenge from the perspective of determining relevant content;identifying effective methods for delivery;and maintaining the focus and motivation of students. This panel brin...
详细信息
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including cryptographic techniques or by safeguarding ...
详细信息
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including cryptographic techniques or by safeguarding sensitive information from unauthorized access/manipulation and by implementing efficient intrusion detection mechanisms. This paper proposes a novel ant colony based intrusion detection mechanism which could also keep track of the intruder trials. The IDEAS technique could work in conjunction with the conventional machine learning based intrusion detection techniques to secure the sensor networks. The algorithm is presented and illustrated by simulating a sensor network.
Traditional loop-scheduling schemes are designed for homogeneous computing environments, and are probably not suitable for emerging heterogeneous PC clusters. This paper applies a two-phased method, named HPLS (Hybrid...
详细信息
Traditional loop-scheduling schemes are designed for homogeneous computing environments, and are probably not suitable for emerging heterogeneous PC clusters. This paper applies a two-phased method, named HPLS (Hybrid Parallel Loop Scheduling), to heterogeneous PC-cluster environments. The key idea is to distribute most of the workload to each node according to its performance, which is modeled and estimated in advance. Experiments on our testbed PCcluster showed that, in most cases, our method could reduce the execution time of application programs more than previous schemes could.
The aim of traffic engineering is to optimise network resource utilization. Although several works on minimizing network resource utilization have been published, few works have focused on LSR label space. This paper ...
详细信息
The aim of traffic engineering is to optimise network resource utilization. Although several works on minimizing network resource utilization have been published, few works have focused on LSR label space. This paper proposes an algorithm that uses MPLS label stack features in order to reduce the number of labels used in LSPs forwarding. Some tunnelling methods and their MPLS implementation drawbacks are also discussed. The algorithm described sets up the NHLFE tables in each LSR, creating asymmetric tunnels when possible. Experimental results show that the algorithm achieves a large reduction factor in the label space. The work presented here applies for both types of connections: P2MP and P2P.
It is known that one of the most disastrous forms of collective human behavior is the kind of crowd stampede induced by panic. This situation often leads to fatalities as people are crushed or trampled. This problem h...
详细信息
It is known that one of the most disastrous forms of collective human behavior is the kind of crowd stampede induced by panic. This situation often leads to fatalities as people are crushed or trampled. This problem has been well researched from a socio-psychological point of view. In this paper we attempt to study and analyze the crowd behavior by using an ant colony optimization (ACO) based computational framework. The initial simulations refer to a panic situation generated in a few connected cities of a war affected country.
The tutorial presents state-of-the-art visualization techniques inspired by traditional technical and medical illustrations. Such techniques exploit the perception of the human visual system and provide effective visu...
详细信息
ISBN:
(纸本)0780394623
The tutorial presents state-of-the-art visualization techniques inspired by traditional technical and medical illustrations. Such techniques exploit the perception of the human visual system and provide effective visual abstractions to make the visualization clearly understandable. Visual emphasis and abstraction has been used for expressive presentation from prehistoric paintings to nowadays scientific and medical illustrations. Many of the expressive techniques used in art are adopted in computer graphics, and are denoted as illustrative or non-photorealistic rendering. Different stroke techniques, or brush properties express a particular level of abstraction. Feature emphasis or feature suppression is achieved by combining different abstraction levels in illustrative rendering. Challenges in visualization research are very large data visualization as well as multi-dimensional data visualization. To effectively convey the most important visual information there is a significant need for visual abstraction. For less relevant information the dedicated image space is reduced to enhance more prominent features. The discussed techniques in the context of scientific visualization are based on iso-surfaces and volume rendering. Apart from visual abstraction, i.e., illustrative representation, the visibility of prominent features can be achieved by illustrative visualization techniques such as cut-away views or ghosted views. The structures that occlude the most prominent information are suppressed in order to clearly see more interesting parts. A different smart way to provide information on the data is using exploded views or other types of deformation. Furthermore intuitive feature classification via 3D painting and manipulation with the classified data including label placement is presented. Discussed non-photorealistic and illustrative techniques from visualization and graphics are shown from the perspective as tools for illustrators from medicine, botany, archeology
This paper addresses the issue of reliable satisfaction of customer demand by unreliable production systems. Using a simple Production-Storage-Customer model, we show that this can be accomplished by filtering out pro...
详细信息
暂无评论