A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficulty of computation. From the sociology a...
详细信息
A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficulty of computation. From the sociology aspect of topology, structure and organization, this paper studies the multiple mobile robot organization formation and running mechanism in the dynamic, complicated and unknown environment. It presents and describes in detail a Hierarchical-Web Recursive Organization Model (HWROM) and forming algorithm. It defines the robot society leader;robotic team leader and individual robot as the same structure by the united framework and describes the organization model by the recursive structure. The model uses task-oriented and top-down method to dynamically build and maintain structures and organization. It uses market-based techniques to assign task, form teams and allocate resources in dynamic environment. The model holds several characteristics of self-organization, dynamic, conciseness, commonness and robustness.
CBR is one of the most important artificial intelligence methods. In this paper, it is introduced to detect the variation of known attacks and to reduce the false negative rate in rule based IDS. After briefly describ...
详细信息
Clustering provides an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms usually utilize two techniques, selecting cluster heads with more residual energy and rotati...
详细信息
A hybrid workflow system could be treated as a domain-across infrastructure by incorporating different workflow systems and WfMSs engaged in the complex business processing. For enacting a hybrid workflow system, the ...
详细信息
This paper proposes LCSE, a learning classifier system ensemble, which is an extension of the classical learning classifier system(LCS). The classical LCS includes two major modules, a genetic algorithm module used to...
详细信息
One of the challenges that come from the development of Grid Computing applications is to predigest complicated process of compiling, deploying on the infrastructures and toolkits such as Globus Toolkit. As we explain...
详细信息
One of the challenges that come from the development of Grid Computing applications is to predigest complicated process of compiling, deploying on the infrastructures and toolkits such as Globus Toolkit. As we explain in this article, we think it is essential to find the solution for rapid Grid Computing applications development. GBuilder is just such a tool we worked out for rapid develop on extant Grid Computing infrastructure platforms. By using GBuilder, applications should be able to react dynamically to different infrastructures and toolkits. Since WS-Resource Framework (WSRF) specifications provide technique standard to developers to declare and implement the association between Web service and one or more stateful resources, we aim at making infrastructures provide WS-Resource according these specifications automatically by adding a middleuaare. This paper focuses on the adapting mechanisms that are provided as the lowermost component of GBuilder. First we study the adapting model for Globus Toolkit in patterns of combination dynamic and static. Then it describes how to apply the dynam-static adaptation flexibly to adjust different infrastructures to provide WS-Resource based on WSRF. At last, it comes along the conclusion and we give out our future works.
In order to enhance flexibility, intelligence and efficiency of Fault Management and overcome disadvantages in traditional centralized Network Fault Management, this paper describes the network fault management framew...
详细信息
In order to enhance flexibility, intelligence and efficiency of Fault Management and overcome disadvantages in traditional centralized Network Fault Management, this paper describes the network fault management frameworks based on SNMP (Simple Network Management Protocol) and Mobile Agent respectively. Then, detailed comparison between both schemes has been made in terms of theory and practice. The result indicates that Mobile Agent based Network Fault Management System can provide an efficient, real-time and accurate management on the managed network taking advantage of the characteristics of mobility, intelligence and flexibility of mobile agent in contrast to the former. Especially, it shows great advantages in managing complex networks.
We report our work on evaluating performance of several MPI Allgather algorithms on Fast Ethernet. These algorithms are ring, recursive doubling, Bruck, and neighbor exchange. The first three algorithms are widely use...
详细信息
ISBN:
(纸本)0769524869
We report our work on evaluating performance of several MPI Allgather algorithms on Fast Ethernet. These algorithms are ring, recursive doubling, Bruck, and neighbor exchange. The first three algorithms are widely used today. The neighbor exchange algorithm which was recently proposed by the authors incorporates pair-wise exchange, and is expected to perform better with certain configurations, mainly when using TCP/IP over Ethernet. We tested the four algorithms on terascale Linux clusters DeepComp 6800 and DAWNING 4000A using TCP/IP over Fast Ethernet. Results show that our neighbor exchange algorithm performs the best for long messages, the ring algorithm performs the best for medium-size messages and the recursive doubling algorithm performs the best for short messages.
A platform-independent grid security model and several model-based security policies such as authentication and authorization are presented in this paper. The security policies include the public key infrastructure (P...
详细信息
A platform-independent grid security model and several model-based security policies such as authentication and authorization are presented in this paper. The security policies include the public key infrastructure (PKI) management model based on bridge certificate authority (CA), the authentication policy based on virtual organization and the access control policy such as delegation in grid environment. These policies can facilitate authentication among virtual organizations based on different PKI management policies, simplify security authentication in grid environment, and manage grid resources dynamically and effectively.
暂无评论