A new field in distributed computing, called Ambient In-telligence, has emerged as a consequence of the increasing availability of wireless devices and the mobile networks they induce. Developing software for such mob...
详细信息
We propose a flexible frame-structured representation and agenda-based control mechanism for the construction of production-type systems. Advantages of this architecture include uniformity, control freedom, and extens...
详细信息
The purpose of my HCI research is to use the Design Patterns approach to establish a framework to support designing WIMP User Interfaces. In this paper I will introduce the WIMP+ User Interfaces and the idea to use th...
详细信息
ISBN:
(纸本)1581132484
The purpose of my HCI research is to use the Design Patterns approach to establish a framework to support designing WIMP User Interfaces. In this paper I will introduce the WIMP+ User Interfaces and the idea to use the Acquisition-Computation-Expression-Execution [6] (ACEE) Design Pattern to build the framework.
computers have been employed within the field of education for many years, often with disappointing results. However, recent and current research within the field of artificial intelligence (AI) is having a positive i...
详细信息
computers have been employed within the field of education for many years, often with disappointing results. However, recent and current research within the field of artificial intelligence (AI) is having a positive impact on educational applications. For example, there now exist ICAI (intelligent computer-assisted instruction) systems to teach or tutor many different subjects; several such systems are discussed herein. In addition to CAI (computer-assisted instruction) systems, we discuss the development of learning environments that are designed to facilitate student-initiated learning. A third major application is the use of expert systems to assist with educational diagnosis and assessment. During the course of our discussion of these three major application areas, we indicate where AI has already played a major role in the development of such systems and where further research is required in order to overcome current limitations.
Pervasive computing in mobile ad hoc networks requires that applications query their network environment for services and react to a plethora of events fired by other devices in that network responding to such queries...
详细信息
ISBN:
(纸本)9781605583648
Pervasive computing in mobile ad hoc networks requires that applications query their network environment for services and react to a plethora of events fired by other devices in that network responding to such queries. Current context-aware and event-driven architectures require the programmer to react to these events via a carefully crafted network of observers and event handlers, while inherently introducing complex concurrency issues. This paper proposes the integration of two techniques to solve these problems: ambient references and reactive programming. Ambient references are object-oriented communication abstractions that represent nearby remote objects in the mobile network and that make it possible to generate the events mentioned above. The reactive programming paradigm provides an abstraction over events such that the application can be written in a conventional programming style with explicit control flow. Copyright 2008 ACM.
In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are...
详细信息
While using a single GPU is fairly easy, using multiple CPUs and GPUs potentially distributed over multiple machines is hard because data needs to be kept consistent using message exchange and the load needs to be bal...
详细信息
We describe the design, implementation, and performance of a new system for access control on the web. To achieve greater flexibility in forming access-control policies – in particular, to allow better interoperabili...
详细信息
Extensions to the actor model have been proposed to ease the development of mobile ad hoc applications. However, programming in the actor model is still difficult as it does not provide abstractions to synchronously c...
详细信息
ISBN:
(纸本)9781605583648
Extensions to the actor model have been proposed to ease the development of mobile ad hoc applications. However, programming in the actor model is still difficult as it does not provide abstractions to synchronously coordinate multiple actors. Thus, when programmers want to coordinate two or more actors they have to do it by hand. Additionally, programmers need to write failure recovery code for failures caused by the concurrent access to the actors they are using. Coding this manually is error prone and might even be not feasible. We propose a language abstraction based on software transactional memory to coordinate actors. We show that the integration of software transactional memory with the actor model makes writing failure recovery code superuous. Moreover, we show that our system even handles those cases where manually writing the failure recovery code is not feasible. Copyright 2008 ACM.
Theoretical results for identifying unnecessary inferences are discussed in the context of the use of a completion-procedure-based approach toward automated reasoning. The notion of a general superposition is introduc...
详细信息
Theoretical results for identifying unnecessary inferences are discussed in the context of the use of a completion-procedure-based approach toward automated reasoning. The notion of a general superposition is introduced and it is proved that in a completion procedure, once a general superposition is considered, all its instances are unnecessary inferences and, thus, do not have to be considered. It is also shown that this result can be combined with another criterion, called the prime superposition criterion, proposed by Kapur, Musser, and Narendran, thus implying that prime and general superpositions are sufficient. These results should be applicable to other approaches toward automated reasoning, too. These criteria can be effectively implemented, and their implementation has resulted in automatically proving instances of Jacobson's theorem (also known as the ring commutativity problems) usingRRL (Rewrite Rule Laboratory), a theorem prover based on rewriting techniques and completion.
暂无评论