Modeling and managing business processes that span multiple organizations involves new challenges, mainly regarding the ability to cope with change, decentralization, and the required support for interoperability. In ...
详细信息
software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper d...
software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are allowed to be anonymous under the relevant legal regimes and whether an adequate interaction and balance between law and anonymity can be realised from both the perspective of Computer systems and the perspective of Law.
software agents extend the current, information-based Internet to include autonomous mobile processing. In most countries such processes, i.e., software agents are, however, without an explicit legal status. Many of t...
software agents extend the current, information-based Internet to include autonomous mobile processing. In most countries such processes, i.e., software agents are, however, without an explicit legal status. Many of the legal implications of their actions (e.g., gathering information, negotiating terms, performing transactions) are not well understood. One important characteristic of mobile software agents is that they roam the Internet: they often run on agent platforms of others. There often is no pre-existing relation between the “owner” of a running agent’s process and the owner of the agent platform on which an agent process runs. When conflicts arise, the position of the agent platform administrator is not clear: is he or she allowed to slow down the process or possibly remove it from the system? Can the interests of the user of the agent be protected? This article explores legal and technical perspectives in protecting the integrity and availability of software agents and agent platforms.
This paper gives contribution to the construction of an image mosaic by pasting together a sequence of photographs taken by a regular digital camera from the same position but in different directions. In order to find...
详细信息
This paper gives contribution to the construction of an image mosaic by pasting together a sequence of photographs taken by a regular digital camera from the same position but in different directions. In order to find the best match between two overlapping images, a fuzzy-genetic based algorithm is presented. A translation vector with a minimal difference between the common picture parts has to be found. The difference is defined using the fuzzyfied contours of each images. The search of the optimal translation is considered as a minimization process. This paper proposes a method that uses genetic algorithms to find the minimum point corresponding to the optimal translation. Using the fuzzy based comparison of the two images yields a fast fitness function, while the implementation of the proposed method in a genetic hardware has a low and variable computational cost. The precision of the method is inverse-proportional with the computational time, which makes it ideal to be used in real time systems.
This paper surveys and investigates the strengths and weaknesses of a number of recent approaches to advanced workflow modelling. Rather than inventing just another workflow language, we briefly describe recent workfl...
详细信息
The final objective of the described project is to develop and implement techniques for a reliable cooperation of autonomous mobile systems that can be used for future traffic management systems. The approach relies o...
详细信息
The final objective of the described project is to develop and implement techniques for a reliable cooperation of autonomous mobile systems that can be used for future traffic management systems. The approach relies on the ability of the systems to communicate among themselves in order to make efficient use of available shared resources (e.g. road space). In the context of automotives this means that computer-based driving assistants not only support humans in handling their own vehicles but also in interacting with the individual vehicles in the neighborhood The vision is an embedded, distributed traffic control system that is provided by the cooperation of the participating units, and thus is more robust and scalable than centralized approaches. Besides the 'obvious' requirements on high assurance computing in traffic control systems, the design and implementation of such systems require the ability of coordination while obeying the necessary real-time and safety constraints. This paper motivates the approach, presents an envisaged system architecture and sketches the design of the basic communication layers of this architecture that can fulfill the realtime and safety requirements. Finally, it introduces a lab-scale evaluation and demonstration scenario that proves the feasibility of the concepts.
Object-oriented frameworks have become a key element in the design of distribution systems. They make the existence of the physical and operating system level resources transparent to the designer and provide the abst...
详细信息
Object-oriented frameworks have become a key element in the design of distribution systems. They make the existence of the physical and operating system level resources transparent to the designer and provide the abstract view of the distributedsystems as a set of objects that interact by invoking well-defined interfaces of each other. Easy reuse of existing components, location transparency and implementation hiding are the main ingredients of such frameworks that simplify the task of designing distributedsystems drastically. It is desirable to take advantage of these benefits when designing distributed real-time systems, too. However, this goal conflicts with the essential need to consider the allocation of system resources when real-time requirements must be met. Here, system level resource issues such as execution times on CPUs, thread switches, occurrence of interrupts, and message delays are of primary interest. Our approach to solve this dilemma is to allow and support the designer of distributed real-time object-oriented applications to become aware of system level resources. We present a monitoring tool JewelDC that allows monitoring of distribution activities (i.e. nested sequences of object invocations) in a distributed object-oriented framework. distributed activities are visualized at the abstract object level while simultaneously revealing their use of system level resources. The tool has been implemented for DCOM on Microsoft Windows NT 4.0.
There is a general trend in designing distributed control systems to give an increasing amount of autonomy to the individual nodes of such systems. Two interrelated system layers must be considered when autonomous sys...
详细信息
There is a general trend in designing distributed control systems to give an increasing amount of autonomy to the individual nodes of such systems. Two interrelated system layers must be considered when autonomous systems have to be coordinated under real-time constraints: the distributed programming paradigm and the communication layer. We analyze current trends and options, and give an approach for an integrated architecture.
暂无评论