The article deals with the problem of agent identification and authentication in distributed systems. It claims that solutions known and employed today violate the principle of limited knowledge and limited control; a...
详细信息
ISBN:
(纸本)0780364902
The article deals with the problem of agent identification and authentication in distributed systems. It claims that solutions known and employed today violate the principle of limited knowledge and limited control; and therefore impose undue limits to system evolution. To propose a solution, the article first examines the concept of object, agent, model and model space. These are later used to explore and justify the phenomena of agent identification and authentication.
program slicing has many applications in software engineering activities. However, until recently, no slicing algorithm has been presented that can compute executable slices for concurrent logic programs. We present a...
详细信息
ISBN:
(纸本)0769512879
program slicing has many applications in software engineering activities. However, until recently, no slicing algorithm has been presented that can compute executable slices for concurrent logic programs. We present a dependence-graph based approach to computing executable slices for concurrent logic programs. The dependence-based representation used in the paper is called the Argument Dependence Net which can be used to explicitly represent various types of program dependences in a concurrent logic program. Based on the ADN, we can compute static executable slices for concurrent logic programs at argument level.
Concepts and principles of TINA (Telecommunications information Networking Architecture) are introduced with the objective of correcting problems of centralized service control and service data model existent in INs (...
详细信息
ISBN:
(纸本)0780367197
Concepts and principles of TINA (Telecommunications information Networking Architecture) are introduced with the objective of correcting problems of centralized service control and service data model existent in INs (intelligent networks). Now, it is becoming clear that future sophisticated services breaking away from the simple telephony call model, e.g., multimedia, multi-party conferencing, etc., will need to be rapidly and efficiently introduced, deployed, operated and managed. In this context, TINA developed a comprehensive architecture for multi-service networks that will support multimedia services. On the other hand, the provisioning of all the service management functionality for TINA services (i.e. FCAPS) is still an open research question. In this paper, we discuss accounting features and requirements, security of accounting management, and issues for their integration in a TINA-based service environment. A prototype has been implemented to validate the concepts and results are also presented.
The authors propose a program dependence model for concurrent logic programs. They present three types of primary program dependences named the sharing dependence, communication dependence, and unification dependence ...
详细信息
The authors propose a program dependence model for concurrent logic programs. They present three types of primary program dependences named the sharing dependence, communication dependence, and unification dependence between arguments in a concurrent logic program. We formally define these primary program dependences based on mode information. We further present a dependence-based representation named the argument dependence net (ADN), which explicitly represents all primary program dependences between arguments in a concurrent logic program. We also discuss some applications of the ADN for developing software engineering tools of concurrent logic programs. Finally, we briefly introduce a program analysis system called CLPKIDS for concurrent logic programs, which is a prototype implementation of the techniques introduced.
The paper presents a new mobile agent framework, f-Desktop, which is designed for describing follow-me applications in a ubiquitous computing environment. It provides the migration mechanisms for agent software which ...
详细信息
ISBN:
(纸本)0769510809
The paper presents a new mobile agent framework, f-Desktop, which is designed for describing follow-me applications in a ubiquitous computing environment. It provides the migration mechanisms for agent software which are secure against illegal call-up transaction requests from computers which masquerade as the owner of the agent software. Moreover, a follow-me application built with the f-Desktop framework possesses a high adaptability to computing environment and a high connection continuity against changes of location. In the f-Deskrop framework, a user can define his desktop computing environment, desktop or desktop environment in short, as a set of follow-me applications. Then, the user can take the desktop computing environment along to other computers.
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically gene...
详细信息
ISBN:
(纸本)0769509819
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically generated from digest video scenes selected by user preference. (2) Directions can be added using a happiness or sadness level based on the user preferences. (3) Personalized TV programs for an individual viewer can be made. The procedures taken by the system are as follows: (1) Conjunctive expressions between scenes are automatically generated; (2) Emotional expressions are automatically generated by user preference; (3) TV program metaphors are defined; (4) Direction templates corresponding to the metaphors are defined; (5) These expressions and definitions are coded using a markup language, and (6) Contents such as virtual characters and movies are synchronized. The resultant program can be shown on a TV set.
PID controllers have been widely used in many chemical processes. Because they have only three control parameters and their physical meanings can be easily grasped. However, it is difficult to tune those parameters pr...
详细信息
PID controllers have been widely used in many chemical processes. Because they have only three control parameters and their physical meanings can be easily grasped. However, it is difficult to tune those parameters practically, since the process dynamics often change due to operating conditions or various disturbances. For this problem, a design method of robust PID controllers has been already proposed by the authors in order to guarantee the stability of the control system. However, as that control method is conservative, the desirable setpoint response can not be always obtained. In this paper, a design scheme of a self-tuning pre-filter is proposed to supplement the robust PID controller based on the two-degree-of-freedom control scheme. According to the proposed scheme, the transient property for the setpoint response can be improved keeping the robust stability. Finally, the proposed scheme is experimentally evaluated on an air pressure control system.
Features of male/female facial images are examined by analyzing the distribution of connection weights of the hidden-layer unit and the input-layer unit of a neural network that responds to their distinction. Twenty-f...
详细信息
Features of male/female facial images are examined by analyzing the distribution of connection weights of the hidden-layer unit and the input-layer unit of a neural network that responds to their distinction. Twenty-five gray-level (black-and-white) facial images were used for each of the male and female samples. Several different numbers of mosaic blocks were used for the whole face region and each facial component region. The training parameters of the neural network and the minimum number of hidden layers that can discriminate male/female were obtained by a genetic algorithm. The neural network consisting of these parameters has a stable convergence in any region so that this can discriminate male/female with 100% accuracy. In the feature extraction experiments, hidden layers were obtained, which significantly respond to male/female facial regions. The facial features of male/female can be extracted by analyzing the connection weights between the hidden-layer unit and the input-layer unit. The facial features extracted by using the proposed method were similar to those obtained by other psychological experiments and facial measurements.
In this paper, we extend the language we proposed in [11] to make it possible to program are-consistency algorithms. We also propose a hybrid algorithm that integrates the interval-consistency (IC) and arc-consistency...
详细信息
We present a method of test generation for acyclic sequential circuits with hold registers. A complete (100% fault efficiency) test sequence for an acyclic sequential circuit can be obtained by applying a combinationa...
详细信息
We present a method of test generation for acyclic sequential circuits with hold registers. A complete (100% fault efficiency) test sequence for an acyclic sequential circuit can be obtained by applying a combinational test generator to all the maximal time-expansion models (TEMs) of the circuit. We propose a class of acyclic sequential circuits for which the number of maximal TEMs is one, i.e, the maximum TEM exists. For a circuit in the class, test generation can be performed by using only the maximum TEM. The proposed class of sequential circuits with the maximum TEM properly includes several known classes of acyclic sequential circuits such as balanced structures and acyclic sequential circuits without hold registers for which test generation can be also performed by using a combinational test generator. Therefore, in general, the hardware overhead for partial scan based on the proposed structure is smaller than that based on balanced or acyclic sequential structure without hold registers.
暂无评论