Object-oriented database management systems (OODBMSs) have generated significant excitement in the database community in the last decade. This interest stems from a real need for data management support for what are c...
详细信息
ISBN:
(数字)9783642579394
ISBN:
(纸本)9783540578253;9783642634109
Object-oriented database management systems (OODBMSs) have generated significant excitement in the database community in the last decade. This interest stems from a real need for data management support for what are called "advanced application areas" that are not well-served by relational technology. The case for object-oriented technology has been made on three fronts. First is the data modeling requirements of the new applications. Some of the more important shortcomings of the relational systems in meeting the requirements of these applications include: 1. Relational systems deal with a single object type: a relation. A relation is used to model different real-world objects, but the semantics of this association is not part of the database. Furthermore, the attributes of a relation may come only from simple and fixed data type domains (numeric, character, and, sometimes, date types). Advanced applications require explicit storage and manipulation of more abstract types (e.g., images, design documents) and the ability for the users to define their own application-specific types. Therefore, a rich type system supporting user defined abstract types is required. 2. The relational model structures data in a relatively simple and flat manner. Non traditional applications require more complex object structures with nested objects (e.g., a vehicle object containing an engine object).
This book constitutes the joint refereed proceedings of the 11th International Conference on Artificial Intelligence and Symbolic Computation, AISC 2012, 19th Symposium on the Integration of Symbolic Computation and M...
详细信息
ISBN:
(数字)9783642313745
ISBN:
(纸本)9783642313738
This book constitutes the joint refereed proceedings of the 11th International Conference on Artificial Intelligence and Symbolic Computation, AISC 2012, 19th Symposium on the Integration of Symbolic Computation and Mechanized Reasoning, Calculemus 2012, 5th International Workshop on Digital Mathematics Libraries, DML 2012, 11th International Conference on Mathematical Knowledge Management, MKM 2012, Systems and Projects, held in Bremen, Germany as CICM 2012, the Conferences on Intelligent Computer Mathematics. The 13 revised full papers out of 19 submissions for MKM 2012, 6 revised full papers out of 9 submissions for Calculemus 2012, 6 revised full papers out of 8 submissions for AISC 2012, 2 revised full papers out of 3 submissions for DML 2012, and 11 revised full papers out of 12 submissions for Systems and Project track presented were carefully reviewed and selected, resulting in 38 papers from a total of 52 submissions.
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile,...
详细信息
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile, machine learning (ML) has been applied to enhance analysis and plan functions of MAPE so that self-adaptive systems have optimal adaption to changing conditions. However, most of ML-based approaches don’t utilize CAVs’ connectivity to collaboratively generate an optimal learner for MAPE, because of sensor data threatened by gradient leakage attack (GLA). In this article, we first design an intelligent architecture for MAPE-based self-adaptive systems on Web 3.0-based CAVs, in which a collaborative machine learner supports the capabilities of managing systems. Then, we observe by practical experiments that importance sampling of sparse vector technique (SVT) approaches cannot defend GLA well. Next, we propose a fine-grained SVT approach to secure the learner in MAPE-based self-adaptive systems, that uses layer and gradient sampling to select uniform and important gradients. At last, extensive experiments show that our private learner spends a slight utility cost for MAPE (e.g., \(0.77\%\) decrease in accuracy) defending GLA and outperforms the typical SVT approaches in terms of defense (increased by \(10\%\sim 14\%\) attack success rate) and utility (decreased by \(1.29\%\) accuracy loss).
We are rapidly heading towards a world in which the computing infrastructure will contain billions of devices, which will interact with other computing/communications devices that are carried or worn by users as they ...
详细信息
ISBN:
(数字)9783540363897
ISBN:
(纸本)9783540003939
We are rapidly heading towards a world in which the computing infrastructure will contain billions of devices, which will interact with other computing/communications devices that are carried or worn by users as they go through their daily routines. Such devices will provide data access to mobile users as they move within buildings, cities, or across the globe. This new infrastructure presents tremendous challenges for data management technology, including: huge scale; variable and intermittent connectivity; location and context-aware applications; bandwidth, power, and devi- size limitations; and multimedia data delivery across hybrid networks and systems. Traditional data management technologies such as query processing, transaction management, workflow, business process management, and metadata management must all be reevaluated in this emerging environment. Furthermore, nontraditional issues such as the semantics of mobile data, location-dependent querying, broadcast and multicast delivery, and caching/prefetching techniques must all be addressed. The ability to track people as they move about their daily tasks raises serious issues of security and privacy. This conference is the fourth in the Mobile Data Management series, focusing on the challenges and opportunities for the management of data in mobile, pervasive, and wearable computing. MDM 2000 and 2001 were in Hong Kong and MDM 2002 was in Singapore. Eighty-seven papers were submitted to the conference from 23 countries and were subject to a rigorous review procedure. Every paper had three or four independent reviews. Twenty-one full papers and 15 short papers from both academia and industry were selected for publication in this volume of proceedings.
This book offers a practical introduction to the use of artificial intelligence (AI) techniques to improve and optimise the various phases of the software development process, from the initial project planning to the ...
详细信息
ISBN:
(数字)9789811999482
ISBN:
(纸本)9789811999475;9789811999505
This book offers a practical introduction to the use of artificial intelligence (AI) techniques to improve and optimise the various phases of the software development process, from the initial project planning to the latest deployment. All chapters were written by leading experts in the field and include practical and reproducible examples.
Trajectory prediction is a crucial challenge in autonomous vehicle motion planning and decision-making techniques. However, existing methods face limitations in accurately capturing vehicle dynamics and interactions. ...
详细信息
Trajectory prediction is a crucial challenge in autonomous vehicle motion planning and decision-making techniques. However, existing methods face limitations in accurately capturing vehicle dynamics and interactions. To address this issue, this paper proposes a novel approach to extracting vehicle velocity and acceleration, enabling the learning of vehicle dynamics and encoding them as auxiliary information. The VDI-LSTM model is designed, incorporating graph convolution and attention mechanisms to capture vehicle interactions using trajectory data and dynamic information. Specifically, a dynamics encoder is designed to capture the dynamic information, a dynamic graph is employed to represent vehicle interactions, and an attention mechanism is introduced to enhance the performance of LSTM and graph convolution. To demonstrate the effectiveness of our model, extensive experiments are conducted, including comparisons with several baselines and ablation studies on real-world highway datasets. Experimental results show that VDI-LSTM outperforms other baselines compared, which obtains a 3% improvement on the average RMSE indicator over the five prediction steps.
GECON - Grid Economics and Business Models Cloud computing is seen by many people as the natural evolution of Grid computing concepts. Both, for instance, rely on the use of service-based approaches for pro- sioning ...
详细信息
ISBN:
(数字)9783642038648
ISBN:
(纸本)9783642038631
GECON - Grid Economics and Business Models Cloud computing is seen by many people as the natural evolution of Grid computing concepts. Both, for instance, rely on the use of service-based approaches for pro- sioning compute and data resources. The importance of understanding business m- els and the economics of distributed computing systems and services has generally remained unchanged in the move to Cloud computing. This understanding is nec- sary in order to build sustainable e-infrastructure and businesses around this paradigm of sharing Cloud services. Currently, only a handful of companies have created s- cessful businesses around Cloud services. Among these, Amazon and Salesforce (with their offerings of Elastic Compute Cloud and force. com among other offerings) are the most prominent. Both companies understand how to charge for their services and how to enable commercial transactions on them. However, whether a wide-spread adoption of Cloud services will occur has to seen. One key enabler remains the ability to support suitable business models and charging schemes that appeal to users o- sourcing (part of) their internal business functions. The topics that have been addressed by the authors of accepted papers reflect the above-described situation and the need for a better understanding of Grid economics. The topics range from market mechanisms for trading computing resources, capacity planning, tools for modeling economic aspects of service-oriented systems, archit- tures for handling service level agreements, to models for economically efficient resource allocation.
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted computing, ATC 2011, held in Banff, Canada, September 2011.;The 17 revised full papers presented together wit...
详细信息
ISBN:
(数字)9783642234965
ISBN:
(纸本)9783642234958
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted computing, ATC 2011, held in Banff, Canada, September 2011.;The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
暂无评论