Undo operation is indispensable to a interactive software system. The former undo algorithms are mainly operational order-oriented and could not effectively deal with some operations which are close to operation objec...
详细信息
Undo operation is indispensable to a interactive software system. The former undo algorithms are mainly operational order-oriented and could not effectively deal with some operations which are close to operation objects. While operation object is a very important basic unit in many system. In view of existing situation, this paper presents an undo algorithm of operational object-oriented programming using binary tree. By employing the characters of binary tree into the undo algorithm, it can effectively accomp.ish some especial tasks that are very difficult to finish by the former undo algorithms. The undo algorithm has been implemented in our 2D garment CAD system. Experimental results show it is more convenient and efficient than conventional ones.
Wireless devices usually keep data consistency with data sources through synchronization. SyncML is a common data synchronization protocol and has become the de facto synchronization standard. SyncML protocol is getti...
详细信息
Wireless devices usually keep data consistency with data sources through synchronization. SyncML is a common data synchronization protocol and has become the de facto synchronization standard. SyncML protocol is getting more and more attention, however there are few effective models to solve the three-sided synchronization problem. This paper presents a model to solve the three-sided synchronization problem. Through analyzing SyncML protocol disadvantage, the model of SyncML interacting with proprietary protocol has been deduced. This model describes the comp.ex situation of three-sided synchronization and has great application value. The example code to demonstrate the model is given in this paper as well.
Highly realistic virtual human models are often represented by comp.ex shapes. This paper proposed a method to get a new ideal human shape from the reference model only by modifying a number of feature measurements. W...
详细信息
Highly realistic virtual human models are often represented by comp.ex shapes. This paper proposed a method to get a new ideal human shape from the reference model only by modifying a number of feature measurements. We approached the problem by forming deformation functions to establish the correlation between feature measurements and human shape. Starting from a number of 3D scanned human models as examples, we derived these functions with statistical method. The correspondence among examples was obtained by fitting a generic model onto 3D scanned data of each human model and the generic model was defined according to the features on a human model. The deformation functions were in two parts: one expressed the girth of contour varies with feature measurements and the other reflected the vertexes are affected by the girth of its corresponding contour. The method discussed here is simple and effective to generate various realistic human shapes by applying different parameters.
Recently China software industry have entered rapid increasing phase, but many software project are often delay and over budget. Software comp.ny consider that need to improving product quality by formal and effective...
详细信息
Recently China software industry have entered rapid increasing phase, but many software project are often delay and over budget. Software comp.ny consider that need to improving product quality by formal and effective technology method and management. With the developing of software development, many foreign quality models and process frameworks has been made. The paper analysis the actuality of china software comp.ny and discuss a model of quality assurance system based on main ideas of ISO9000 and CMM.
In multi-agent systems, joint-action must be employed to achieve cooperation because the evaluation of the behavior of an agent often depends on the other agents' behaviors. However, joint-action reinforcement lea...
详细信息
In multi-agent systems, joint-action must be employed to achieve cooperation because the evaluation of the behavior of an agent often depends on the other agents' behaviors. However, joint-action reinforcement learning algorithms suffer the slow convergence rate because of the enormous learning space produced by joint-action. A prediction-based reinforcement learning algorithm is presented for multi-agent cooperation tasks, which demands all agents to learn predicting the probabilities of actions that other agents may execute. A multi-robot cooperation experiment is run to test the efficacy of the new algorithm, and the experiment results show that the new algorithm can achieve the cooperation policy much faster than the primitive reinforcement learning algorithm.
A grid service is a Web service that provides a set of well-defined interfaces and follows specific conventions. A grid service exception may occur in a process of behaviors related to requesting, responding, or runni...
详细信息
A grid service is a Web service that provides a set of well-defined interfaces and follows specific conventions. A grid service exception may occur in a process of behaviors related to requesting, responding, or running a grid service. Grid service exceptions deal with the run-time status and contextual information of grid services. A handler of exceptions mainly holds the configuration of a group of checkpoints, trace and rollback of services. The common approach to handling an exception is using a function to check out an error and sending the error code to the caller, which may need a multi-level and consecutive behaviors, till the error is sent to the function that responds it. If the linkage of these functions is weak, the whole process would fail. In a grid comp.ting environment, an exception handler should not only reduce the internal propagation of error codes, but also make a transferable function to send the exception to an external unit or a grid service. In terms of the grid architecture, the exception handler of a grid service is discussed and then an A/B-Back algorithm is proposed, which is used to handle exceptions in a grid service. Finally, the test result based on the simulated experiment in Globus Toolkit 3.0 is given.
Although only more than one year since session initiation protocol (SIP) had been delivered, SIP has already become the research hotspot in telecommunication and network fields. More than 30 RFCs and drafts were deliv...
详细信息
Although only more than one year since session initiation protocol (SIP) had been delivered, SIP has already become the research hotspot in telecommunication and network fields. More than 30 RFCs and drafts were delivered by SIP WG, including core protocol, QoS, security, message header and method extension, interconnection with PSTN, firewall and NAT traversal, application, multi-message body, inst.nt messenger, etc. This paper introduces the SIP standard and the newest research trends in its related fields, and points out the future research direction and the promising foreground application.
This paper provides a method to do Chinese event IE from a multiple sentences event narration with the support of hownet. The main idea behind this method is like this: firstly, learning the featuring sememe set for e...
详细信息
This paper provides a method to do Chinese event IE from a multiple sentences event narration with the support of hownet. The main idea behind this method is like this: firstly, learning the featuring sememe set for each event role and the semantic class set that each event role belongs to from a labeled event case set in which every event case belongs to a same event class. Then, to a new event case of this event class, using each event roles featuring sememe set to locate the single sentence that may contains the role and using its semantic class set to identify and extract this role from the located single sentence. The experiment done indicates that this method can fulfill various event IE tasks from different domains and get a high recall and precision.
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents p...
详细信息
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between them based on updates of the agents' beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol.
暂无评论