In a publish/subscribe (pub/sub) system, information (referred to as events) published by publishers and interests submitted by subscribers are sent to the network, which conducts matching between events and interests...
详细信息
In a publish/subscribe (pub/sub) system, information (referred to as events) published by publishers and interests submitted by subscribers are sent to the network, which conducts matching between events and interests, and only delivers those events satisfying the interests. When the pub/sub infrastructure is untrusted, it is often desirable to keep both events and interests secret from the pub/sub network. In this paper, we formulate this goal as the private subscription problem. We then describe cryptographic schemes to solve this problem in some types of publish/subscribe systems. The algorithms we present are efficient in that they are based on symmetric encryptions requiring O(n) cipher operations for a message of length n.
Negotiation activities are carried out among stakeholders in a supply chain for resolving the differences in their objectives and preferences. The objective of this work is to find near-optimal negotiation strategies ...
详细信息
Negotiation activities are carried out among stakeholders in a supply chain for resolving the differences in their objectives and preferences. The objective of this work is to find near-optimal negotiation strategies for bilateral negotiation with incomplete information, in which each agent has a competitive objective and incomplete information about its opponent, by coevolving both agents' strategies using an estimation of distribution algorithm (EDA). However, an EDA often cannot find optimum solutions for both the agents for the reason that one of the two agents' populations has a very rapid convergence rate than the other population in the process of coevolution. Hence, the resulting solutions of both the agents will be biased and converge to suboptimal ones. To solve this problem, this paper proposes an EDA which has a novel diversity controlling capability. The proposed method utilizes the accumulated frequency information of the occurrence of individuals in each band of a population for generations. The information is used in the diversification and refinement procedure of the proposed diversity controlling EDA. Results from a series of experiments indicate that the proposed diversity controlling EDA achieves a better performance than the EDA without a diversity controlling method for the problem task in finding near-optimal solutions.
The key issues that the LD used in the field of sensing and monitoring as light source is to ensure its safety and stable output power. This paper presents a new method to ensure the stable output power and design...
详细信息
ISBN:
(纸本)9781424479573
The key issues that the LD used in the field of sensing and monitoring as light source is to ensure its safety and stable output power. This paper presents a new method to ensure the stable output power and designs a circuit, including the automatic power control (APC) circuit and automatic temperature control (ATC) circuit. Through its application in the oil contamination sensor, its reliability and validity is proved.
In this paper, we implement a hybrid combustion model which incorporates the fire simulation and solid burning together. To achieve real-time performance, GPU is used to solve the Navier-Stokes equations with CUDA pro...
详细信息
In this paper, we implement a hybrid combustion model which incorporates the fire simulation and solid burning together. To achieve real-time performance, GPU is used to solve the Navier-Stokes equations with CUDA programming, also used to visualize the turbulent fire. Experiment results prove our method's efficiency.
Transfer of gained experience, skills and know-how in aircraft maintenance from experts to trainees assures the organizational learning in providing quality of service. Taking survey method, this paper presents an ear...
详细信息
Transfer of gained experience, skills and know-how in aircraft maintenance from experts to trainees assures the organizational learning in providing quality of service. Taking survey method, this paper presents an early investigation on effective mechanism of knowledge transfer among aircraft engineers in Malaysia and a proposal on its implementation within the aviation domain.
The Association for the Advancement of Artificial Intelligence was pleased to present the 2009 Fall Symposium Series, held Thursday through Saturday, November 5-7, at the Westin Arlington Gateway in Arlington, Virgini...
详细信息
In this paper, we propose a computational approach for adaptation in mission planning, an important process in the chain of command and control. In this area, it has been highly regarded that military missions are oft...
详细信息
In this paper, we propose a computational approach for adaptation in mission planning, an important process in the chain of command and control. In this area, it has been highly regarded that military missions are often dynamic and uncertain. This characteristic comes from the nature of battlefields where the factors of enemies and terrains are not easy to be determined. Hence, it is necessary to generate plans that can adapt quickly to the changes during the missions, while avoiding paying a high cost. In addressing such an adaptation process, the issue of multi-objectivity can not be avoided. Our approach first mathematically models the dynamic planning problem with two criteria: the mission execution time and the cost of operations. Based on this quantification, we introduce an evolutionary multi-objective mechanism to adapt the current solution to new situations resulted from changes. We carried out a case study on this newly proposed approach. A modified military scenario of a mission was used for testing. The obtained results strongly support our proposal in finding adaptive solution dealing with the changes.
Business Processing Execution Language (BPEL) and BPEL for People (BPEL4People) are two web services orchestration languages for composing web services. To describe formally their semantics, we introduce the π it -ca...
详细信息
Business Processing Execution Language (BPEL) and BPEL for People (BPEL4People) are two web services orchestration languages for composing web services. To describe formally their semantics, we introduce the π it -calculus, a new variant of the π-calculus, in this paper. The good feature of the π it -calculus is that its execution can be interrupted and can handle timing events as well. We provide both syntax and semantics of the π it -calculus and define a strong bisimulation relation that specifies when two processes can be considered as the same. With the new calculus, we then model the activities of BPEL and BPEL4People, and give their precise semantics. Our formal framework may facilitate the reliability and consistency analysis in a BPEL or BPEL4People design process.
Intervention analysis is the common method to reveal relationships between objects in human as well as biological society. Data mining research community is just starting to pay attention to intervention analysis. As ...
详细信息
Intervention analysis is the common method to reveal relationships between objects in human as well as biological society. Data mining research community is just starting to pay attention to intervention analysis. As the traditional association rules are not successful at measuring intervention, this paper tries to mining intervention rules from time series data of sub-complex system. The main contributions of this study include: (1) introduces a new concept of intervention rules. It can quantitatively detect at what scale, how intensive and how long the intervention does make sense; (2) conduct wavelet transform on time series. The decomposition scale can denotes the intervention scale; (3) proposes a new concept named directional correlation to measure intervention intensity; (4) calculates the intervention intensity between time series data with different time delays. The time delay can uncover after how long the intervention takes place; (5) conducts experiments on real datasets. The results show that intervention rules do exist at different decomposition scale of the original data. Moreover, the number of rules discovered by multi-scale analyzing methods is always 4 or 5 times more than those found by single scale methods. And the stability of rules discovered by the improved multi-scale mining algorithm MMIR* is always 100%, while the stability of rules discovered by the basic multi-scale mining algorithm MMIR fluctuate around 70%.
暂无评论