Grid and peer-to-peer (P2P) network technologies enable aggregation of distributed resources for solving large-scale and computationally-intensive applications. These technologies are well-suited for bag-of-tasks (BoT...
详细信息
Grid and peer-to-peer (P2P) network technologies enable aggregation of distributed resources for solving large-scale and computationally-intensive applications. These technologies are well-suited for bag-of-tasks (BoT) applications, because each application consists of many parallel and independent tasks. With multiple users competing for the same resources, the key challenge is to finish a user application within a specified deadline. In this paper, we propose a time optimization algorithm that schedules a user application on auction-based resource allocation systems. These allocation systems, which are based on proportional share, allow users to bid higher in order to gain more resource shares. Therefore, this algorithm adjusts a user bid periodically on these systems in order to finish the application on time.
Autonomic computersystems react to changes in the system, including failures, load changes, and changed user behaviour. Autonomic control may be based on a performance model of the system and the software, which impl...
详细信息
Autonomic computersystems react to changes in the system, including failures, load changes, and changed user behaviour. Autonomic control may be based on a performance model of the system and the software, which implies that the model should track changes in the system. A substantial theory of optimal tracking filters has a successful history of application to track parameters while integrating data from a variety of sources, an issue which is also relevant in performance modeling. This work applies extended Kalman filtering to track the parameters of a simple queueing network model, in response to a step change in the parameters. The response of the filter is affected by the way performance measurements are taken, and by the observability of the parameters.
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledge into already deployed applications, t...
详细信息
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledge into already deployed applications, though, is highly impractical, since it requires reconfigurable software architectures, as well as human expert consulting. In an attempt to overcome this deficiency, we have developed agent academy, an integrated development framework that supports both design and control of multiagent systems (MAS), as well as agent training. We define agent training as the automated incorporation of logic structures generated through data mining into the agents of the system. The increased flexibility and cooperation primitives of MAS, augmented with the training and retraining capabilities of agent academy, provide a powerful means for the dynamic exploitation of data mining extracted knowledge. In this paper, we present the methodology and tools for agent retraining. Through experimental results with the agent academy platform, we demonstrate how the extracted knowledge can be formulated and how retraining can lead to the improvement - in the long run - of agent intelligence.
This article addresses the generation of traces to monitor the execution of distributed Java systems, and investigates the use of aspect-oriented programming (AOP) as the instrumentation strategy to get the necessary ...
详细信息
This article addresses the generation of traces to monitor the execution of distributed Java systems, and investigates the use of aspect-oriented programming (AOP) as the instrumentation strategy to get the necessary information at runtime. The overall objective is to gather enough information to help people understand program executions by abstracting out design details related to thread and distributed communications, for instance under the form of UML sequence diagrams. We show how AspectJ, the main Java implementation of AOP, can be used to solve such issues, assuming RMI is the distribution middleware and thread communications employ specific data structures. The most important aspects are discussed and experiments on a case study are reported.
Security critical systems must perform at the required security level, make effective use of available resources, and meet end-users expectations. Balancing these needs, and at the same time fulfilling budget and time...
详细信息
A numerical study of a thin-wire probe inside a slotted rectangular cavity is presented in this work. The results obtained with the 3-D full-wave method of moments based code FEKO is compared to the computations in Ra...
详细信息
A numerical study of a thin-wire probe inside a slotted rectangular cavity is presented in this work. The results obtained with the 3-D full-wave method of moments based code FEKO is compared to the computations in Ramani, V (2004). The motivation for this study stems from the wide usage of high power RF excitations in electronic systems. Electromagnetic coupling and interference [Christopoulos C. et al., 2001] in electronic devices (computers, sensors, control and communication devices, etc.) is of increasing concern due to the presence of both intentional and un-intentional internal/external electromagnetic sources. After the preliminary comparison of results we introduce a finite conductivity into the walls of the cavity to resemble more practical problems for simulations with FEKO.
In this paper we report on how aspect-oriented programming (AOP), using AspectJ, can be employed to automatically and efficiently instrument contracts and invariants in Java. The paper focuses on the templates to inst...
详细信息
In this paper we report on how aspect-oriented programming (AOP), using AspectJ, can be employed to automatically and efficiently instrument contracts and invariants in Java. The paper focuses on the templates to instrument preconditions, postconditions, and class invariants, and the necessary instrumentation for compliance-checking to the Liskov substitution principle.
A mobile multi-agent system is proposed to create solutions for the university course timetabling problem. It is composed of four kinds of agents: (mobile) Course Agents, and (stationary) Signboard, Publisher and Inte...
详细信息
The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two thr...
详细信息
The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two threads: pattern mining and pattern reasoning. Pattern mining means the automatic discovery of interesting user topic models. A novel topic structure is presented for this thread. Pattern reasoning means the utilization and maintenance of the interesting user topic models to determine if an input data is relevant to the specified topic. The innovation for this thread is the use of meta-knowledge for the discovered knowledge. In this way the system can trace errors to update inadequate subtopics in the user topic model. The experimental results show that all objectives we expect for the topic-oriented model are achievable.
Evolutionary computation (EC) has been successfully applied to a wide range of design problems. There has also been an abundant amount of work in applying interactive ECs in the design of displays, robot behavior, bit...
详细信息
Evolutionary computation (EC) has been successfully applied to a wide range of design problems. There has also been an abundant amount of work in applying interactive ECs in the design of displays, robot behavior, bitmaps, etc. In the EC literature, one can also see a number of successful design applications of distributed ECs. However, to date, there has been no research in the area of interactive distributed ECs. In this paper, we present an interactive distributed evolutionary algorithm (IDEA) for the design of simple emoticons. We will discuss two ways that our IDEA is currently being used including the areas of EC education and Human Factors.
暂无评论