Supply chain management (SCM) environments are often dynamic markets providing a plethora of information, either complete or incomplete. It is, therefore, evident that such environments demand intelligent solutions, w...
详细信息
Supply chain management (SCM) environments are often dynamic markets providing a plethora of information, either complete or incomplete. It is, therefore, evident that such environments demand intelligent solutions, which can perceive variations and act in order to achieve maximum revenue. To do so, they must also provide some sophisticated mechanism for exploiting the full potential of the environments they inhabit. Advancing on the way autonomous solutions usually deal with the SCM process, we have built a robust and highly-adaptable mechanism for efficiently dealing with all SCM facets, while at the same time incorporating a module that exploits data mining technology in order to forecast the price of the winning bid in a given order and, thus, adjust its bidding strategy. The paper presents our agent, Mertacor, and focuses on the forecasting mechanism it incorporates, aiming to optimal agent efficiency
Connectors are used to realize component interactions in component systems. Apart from their primary function, which is mediating the communication, their implementation can also support additional features that, whil...
详细信息
This study explores the relationship between program slices and faults. The aim is to investigate whether the characteristics of program slices can be used to identify faultprone software components. Slicing metrics a...
In this paper, we present a formal process model to support the comprehension and maintenance of softwaresystems. The model provides a formal ontological representation that supports the use of reasoning services acr...
详细信息
ISBN:
(纸本)9783540694885
In this paper, we present a formal process model to support the comprehension and maintenance of softwaresystems. The model provides a formal ontological representation that supports the use of reasoning services across different knowledge resources. In the presented approach, we employ our Description Logic knowledge base to support the maintenance process management, as well as detailed analyses among resources, e.g., the traceability between various software artifacts. The resulting unified process model provides users with active guidance in selecting and utilizing these resources that are context-sensitive to a particular comprehension task. We illustrate both, the technical foundation based on our existing SOUND environment, as well as the general objectives and goals of our process model.
Comprehension is an essential part of software evolution. Only software that is well understood can evolve in a controlled manner. In this paper, we present a formal process model to support the comprehension of softw...
详细信息
ISBN:
(纸本)9780769526980;0769526980
Comprehension is an essential part of software evolution. Only software that is well understood can evolve in a controlled manner. In this paper, we present a formal process model to support the comprehension of softwaresystems by using ontology and description logic. This formal representation supports the use of reasoning services across different knowledge resources and therefore, enables us to provide users with guidance during the comprehension process that is context sensitive to their particular comprehension task. As part of the process model, we also adopt a new interactive story metaphor, to represent the interactions between users and the comprehension process
In recent years, traditional computing systems face the problems of scalability as the need for information processing services is ever increasing. Grid, as a pool of computing resources, solves the problem in some de...
详细信息
In recent years, traditional computing systems face the problems of scalability as the need for information processing services is ever increasing. Grid, as a pool of computing resources, solves the problem in some degree by providing an integrated computing and resources environment. Thus, there emerge many strategies related to grid resource allocation management (GRAM). However, almost all of these strategies focus on how to allocate the existing computing resources but overlook the possibility of controlling these resources. Therefore, services and computing nodes are always tightly coupled. In this paper, we describe a new framework called GSAF (a grid-based services transfer framework) to solve the problem. GSAF binds services and computing nodes dynamically through services migration and service cache to break the tight coupling. The migration of service components to more efficient computing nodes helps balance the processing burden and extends the computing abilities. In our experiment, we provide a prototype application of GSAF in the data mining system to demonstrate it.
With the development of Internet computing techniques, continuous data streams from remote sites are commonly used in scientific and commercial applications. Correspondingly, there is increasing demand of assuring the...
详细信息
With the development of Internet computing techniques, continuous data streams from remote sites are commonly used in scientific and commercial applications. Correspondingly, there is increasing demand of assuring the integrity and authenticity of received data streams. Existing strategies of assuring data integrity and authenticity mainly use message authentication codes (MAC) generated on data blocks and transfer the MAC to the receiver for authentication through either out of band communication or in band communication. Transferring the MAC via out of band communication inevitably introduces communication overhead and additional complexity to synchronize the out of band communication with the data communication. Transferring the MAC via in band channel can be achieved by either appending the MAC to the original data or embedding the MAC into the original data, which would either incur communication overhead or change the original data. It would be desirable to be able to authenticate the stream data without any communication overhead and changing the original data at the same time. To deal with data packet or block loss, many of existing stream data authentication schemes rely on hash chaining, the current usage of which results in uncertainty in authenticating the subsequent data blocks once the first data packet or block loss is detected. In this paper, we propose a novel application layer authentication strategy called DaTA. This authentication scheme requires no change to the original data and causes no additional communication overhead. In addition, it can continue authenticating the rest of data stream even if some data loss has been detected. Our analysis shows that our authentication scheme is robust against packet loss and network jitter. We have implemented a prototype system to evaluate its performance. Our empirical results show that our proposed scheme is efficient and practical under various network conditions
This paper proposes an adaptive routing protocol called ARFA for an integrated cellular and ad hoc heterogeneous network with flexible access (iCAR-FA). An iCAR-FA system offers a flexible traffic diversion mechanism ...
详细信息
This paper proposes an adaptive routing protocol called ARFA for an integrated cellular and ad hoc heterogeneous network with flexible access (iCAR-FA). An iCAR-FA system offers a flexible traffic diversion mechanism that allows a mobile host to utilize the bandwidth in another cell, as such easing the congestion problem and increasing the throughput in a cellular network. Based on the presentation of the iCAR-FA physical characteristics, the paper details the design issues and operation of ARFA. Detailed numerical analysis on routing overhead, which is along with some general evaluations, has indicated the effectiveness and efficiency of the ARFA protocol
According to the Life Safety Code reg , the geometry of a building, the location of exits, and the number of exits dictate the means of egress for all people occupying a building. In this paper we show how evolutionar...
详细信息
According to the Life Safety Code reg , the geometry of a building, the location of exits, and the number of exits dictate the means of egress for all people occupying a building. In this paper we show how evolutionary computations in the form of Genetic Algorithms and Estimation of Distribution Algorithms are used to evolve the placement of exits in order to optimize overall evacuation time. In particular, a generational GA, a steady-state GA, and an elitist EDA are used to evolve the placement of exits for two practical design problems. The algorithms are evaluated in terms of success rate, number of function evaluations, and best fitness. For both problems, the steady-state GA outperformed the other algorithms in all evaluation categories.
暂无评论