Parthood is a relation of fundamental importance in a number of disciplines including cognitive science, linguistics and conceptual modeling. However, one classical problem for conceptual modeling theories of parthood...
详细信息
ISBN:
(纸本)9783642021435
Parthood is a relation of fundamental importance in a number of disciplines including cognitive science, linguistics and conceptual modeling. However, one classical problem for conceptual modeling theories of parthood is deciding on the transitivity of these relations. This issue is of great importance since transitivity plays a fundamental role both conceptually (e.g., to afford inferences in problem-solving) and computationally (e.g., to afford propagations of properties and events in a transitive chain). In this article we address this problem by presenting a solution to the case of part-whole relations between functional complexes, which are the most common types of entities represented in conceptual models. This solution comes in two parts. Firstly, we present a formal theory founded on results from formal ontology and linguistics. Secondly, we use this theory to provide a number of visual patterns that can be used to isolate scopes of transitivity in part-whole relations represented in diagrams.
Machine understanding is an essential and desirable cognitive ability for advanced software agents. In this article, we elaborate on: (1) yet another advanced feature, i.e., multi-understanding that is more than one u...
详细信息
We review two key mechanisms of the biological immune system (BIS): costimulation and priming. Then we explain the relevance of these two mechanisms for misbehavior detection in ad hoc wireless networks. We argue that...
详细信息
We review two key mechanisms of the biological immune system (BIS): costimulation and priming. Then we explain the relevance of these two mechanisms for misbehavior detection in ad hoc wireless networks. We argue that costimulation and priming can not only increase the reliability and robustness of misbehavior detection but also help increase the energy efficiency. We conclude by giving an outlook on future research related to the design of security protocols inspired by the efficiency of the BIS.
We report the addition of two visualisation algorithms, termed PaperChain and Twister, to the freely available Visual Molecular Dynamics (VMD) package. These algorithms produce visualisations of complex cyclic molecul...
详细信息
An integrated modeling and simulation tool called Componentbased System Modeler and Simulator (CoSMoS) is developed. It supports visual development of families of models that have well-defined logical specifications. ...
详细信息
ISBN:
(纸本)9789639799455
An integrated modeling and simulation tool called Componentbased System Modeler and Simulator (CoSMoS) is developed. It supports visual development of families of models that have well-defined logical specifications. The logical componentbased models persist in relational databases and may be automatically translated into specific target simulation and markup programming languages. The underlying systemtheoretic modeling framework of CoSMoS lends itself for the well-known discrete-time, continuous, and discrete-event modeling approaches. Currently, CoSMoS supports developing parallel DEVS-compliant models which can be executed using the DEVS-Suite simulator. The underlying process lifecycle of the CoSMoS enables systematic transitioning from visual model development and design of experiments to simulation execution and experimentation. simulation data can be used for run-time animation and viewing of time-based trajectories or exported for post processing. This tool helps to simplify simulation-based system design, verification, and validation. The core capabilities of the CoSMoS are exemplified with a conceptual model of an anti-virus network software system.
Domain-specific tools for modeling and simulation (M&S) of computer network systems are aimed at simplifying the tasks of model developers and simulationists. In determining the extent to which a particular domain...
详细信息
Domain-specific tools for modeling and simulation (M&S) of computer network systems are aimed at simplifying the tasks of model developers and simulationists. In determining the extent to which a particular domain-specific M&S tool fits their needs, the developers must consider both how the tool can assist in the model development process, and how the tool may prevent or hinder them from achieving their objectives. We have considered two M&S tools in the domain of computer networks, IT Guru and the INET framework, and some of the ways in which they affect various aspects of simulation model development, with emphasis on the verification and validation (V&V) process as applied to net-centric enterprise systems. We have developed a metric for evaluating a domain-specific M&S tool based on certain qualitative characteristics. We will demonstrate how this metric can be applied to evaluate IT Guru and INET, and also offer some observations on how the metric can be applied to other domains besides computer networking.
This study preliminarily investigates the numerical application of both Extended Kalman Filter (EKF) (which has traditionally been used for non linear estimation) and a relatively new filter, Unscented Kalman Filter (...
详细信息
This paper presents a robust simulation environment targeted for teaching and learning the complex dynamics of computer networks. The general-purpose DEVS-suite simulator supports animation with I/O and state trajecto...
详细信息
This paper presents a robust simulation environment targeted for teaching and learning the complex dynamics of computer networks. The general-purpose DEVS-suite simulator supports animation with I/O and state trajectories of computer network models developed using parallel DEVS modeling approach. The simulator offers high-level model abstraction as compared with simulators such as NS-2. The combined capabilities afforded by the robust DEVS-suite simulator assists in understanding the fundamentals of computer network topologies and the logics of communication protocols. This newly developed DEVS-Suite offers an expressive, yet relatively simple to use, simulation environment for students and educators to develop and experiment with computer network models.
Multicore brings tremendous amount of processing speed. On the contrary, it offers challenges for embedded systems as embedded systems suffer from limited resources. Various cache memory hierarchies are proposed to sa...
详细信息
ISBN:
(纸本)1934272701
Multicore brings tremendous amount of processing speed. On the contrary, it offers challenges for embedded systems as embedded systems suffer from limited resources. Various cache memory hierarchies are proposed to satisfy the requirements of different systems. Traditionally, level-1 cache memory is dedicated to each core. However, level-2 cache can be shared (like Intel Xenon) or dedicated (like AMD Athlon). Level-2 shared cache enables each core to dynamically use up to 100% of available CL2. Level-2 dedicated caches help each core to reduce latency when there is data /code sharing between the cores. However, it is not clear how level-2 shared and dedicated cache hierarchies should impact on the performance and total energy consumption for a set of applications. In this paper, we evaluate the impact of level-2 cache hierarchies (shared versus dedicated) on the performance and total energy consumption for homogeneous multicore embedded systems. We use VisualSim simulation tool to model the target architectures (one with shared CL2 and the other one with dedicated CL2). We use FFT, Ml, and DFT workload (generated using Heptane package) to run the simulation program. Experimental results show that for negligible interconnection delay, level-2 shared cache hierarchy outperforms level-2 dedicated cache hierarchy.
We propose and evaluate an approach for network intrusion detection in high dimensional space. This approach is based on an approximate solution to the nearest neighbor problem. Our evaluation is based on the KDD'...
详细信息
We propose and evaluate an approach for network intrusion detection in high dimensional space. This approach is based on an approximate solution to the nearest neighbor problem. Our evaluation is based on the KDD'99 data set, a Yahoo Web spam data set and another set used in the NIPS'03 feature selection challenge. The approximate approach shows that good performance in terms of detection rate and false positives rate can be achieved.
暂无评论