The transportation of compressed video data without loss of picture quality requires the network to support large fluctuations in bandwidth requirements. These fluctuations can be smoothed, but straightforward approac...
详细信息
The transportation of compressed video data without loss of picture quality requires the network to support large fluctuations in bandwidth requirements. These fluctuations can be smoothed, but straightforward approaches to smoothing can still suffer from excessive buffering requirements, poor buffer utilization and an excessive number of bandwidth changes. This paper introduces critical bandwidth allocation, which reduces the number of bandwidth changes to a very small number, and achieves the maximum effectiveness from client-side buffers. A comparison between critical bandwidth allocation algorithms and other smoothing algorithms is presented, the sensitivity of the algorithm to jitter is examined, and, implications for the design of network services are discussed.
Examines »program adjustment», a formal and practical approach to developing correct concurrent programs, by automatically adjusting an imperfect program to satisfy given constraints. A concurrent program is...
详细信息
Our research goal is to construct an environment that mechanically supports human intellectual activities through software development with reuse. We propose a model of software development with systematic reuse in wh...
详细信息
Our research goal is to construct an environment that mechanically supports human intellectual activities through software development with reuse. We propose a model of software development with systematic reuse in which the existing program can be altered to meet the given specification change using the program derivation process from the specification. We consider what kinds of knowledge must be acquired when a specification is changed and how they have to be integrated so well as to implement our method on a computer system. In particular, we focus on the following points in terms of program synthesis. First, a wide spectrum language, Extended IML, defines a framework in which specifications, program and the elaborate derivation process can be expressed formally on a computer system. This forms a basic unit of reusable knowledge for specification change. Second, a reuse process is formulated in which a new requirement changes the efficient specification and its program is altered to meet this requirement correctly. Third, we consider some conditions and a mechanism by which the knowledge can be integrated so as to obtain an objective program automatically, implying that we will yet profit from reusing the knowledge.
We propose an extension to Prolog called the count term for controlling Prolog *** purpose is to allow the programmers as well as the users to have greater flexibility in controlling the execution behavior of Prolog p...
详细信息
We propose an extension to Prolog called the count term for controlling Prolog *** purpose is to allow the programmers as well as the users to have greater flexibility in controlling the execution behavior of Prolog programs and for limiting the number of answers retrieved when Prolog is used as a database query language. Both syntax and operational semantics of the count term are *** analyze the possible meanings one might associate with the count *** possible replacement of cut and fail by the count term is *** ease of analysis of programs with count terms is discussed.
This paper proposes fuzzy inference neural network (FiNN) as a framework for an incorporated system involving fuzzy theory and neural network theory. The FiNN is structured on a skeleton of specified fuzzy rules so th...
详细信息
ISBN:
(纸本)0819408751
This paper proposes fuzzy inference neural network (FiNN) as a framework for an incorporated system involving fuzzy theory and neural network theory. The FiNN is structured on a skeleton of specified fuzzy rules so that the FiNN can store the fuzzy rules smoothly. A FiNN system implements approximate inference from the fuzzy rules. There are three types for the structured parts, which are called `antecedent network,' or `conclusion network,' or `logic network.' Each structured part is a neural network component. Each neural network component executes an elementary function which is a part of an approximate inference procedure. The FiNN categorizes practical data by itself to generate learning samples for the conclusion networks. Membership functions in the antecedent networks are initialized by a priori knowledge, and modified by solving inverse problems of the logic network. A numerical example clarifies the applicability to the system identification.
An ordinary expert system controls a plant according to heuristics. So, it fails to control the plant for lack of heuristics if unforeseen events occur as a result of abnormal situations. We propose a new framework of...
ISBN:
(纸本)9780897913720
An ordinary expert system controls a plant according to heuristics. So, it fails to control the plant for lack of heuristics if unforeseen events occur as a result of abnormal situations. We propose a new framework of model-based reasoning that can dynamically generate the knowledge for plant control against unforeseen events. This proposed framework consists of three functions: (a) generation of the goal state after recovery from the unforeseen events; (b) generation of knowledge for plant control; (c) prediction of process trend curves and estimation of the generated knowledge. In the proposed framework, various kinds of models which correspond to the fundamental knowledge about plant control are used. We have implemented a thermal power plant control expert system on the basis of this proposed framework. This paper describes the model-based reasoning mechanism of the experimental plant control expert system to realize each of three functions. Especially as for (c), this paper explains qualitative reasoning mechanism using fuzzy logic.
A concurrent program synthesis system called MENDELS is proposed. A concurrent programming language MENDEL/87, that is a target language for program synthesis, is also provided. MENDELS consists of two parts: (1) retr...
详细信息
This book constitutes the proceedings of the 14th International Conference on Principles and Practice in Multi-Agent systems, PRIMA 2011, held in Wollongong, Australia, in November 2011.;The 39 papers presented t...
详细信息
ISBN:
(数字)9783642250446
ISBN:
(纸本)9783642250439
This book constitutes the proceedings of the 14th International Conference on Principles and Practice in Multi-Agent systems, PRIMA 2011, held in Wollongong, Australia, in November 2011.;The 39 papers presented together with 3 invited talks were carefully reviewed and selected from numerous submissions. They focus on practical aspects of multiagent systems and are organised in topical sections on coalitions and teamwork, learning, mechanisms and voting, modeling and simulation, negotiation and coalitions, optimization, sustainability, agent societies and frameworks, argumentation, and applications.
Microservice architectures are increasingly used to modularize IoT applications and deploy them in distributed and heterogeneous edge computing environments. Over time, these microservice-based IoT applications are su...
详细信息
Microservice architectures are increasingly used to modularize IoT applications and deploy them in distributed and heterogeneous edge computing environments. Over time, these microservice-based IoT applications are susceptible to performance anomalies caused by resource hogging (e.g., CPU or memory), resource contention, etc., which can negatively impact their Quality of Service and violate their Service Level Agreements. Existing research on performance anomaly detection for edge computing environments focuses on model training approaches that either achieve high accuracy at the expense of a time-consuming and resource-intensive training process or prioritize training efficiency at the cost of lower accuracy. To address this gap, while considering the resource constraints and the large number of devices in modern edge platforms, we propose two clustering-based model training approaches: (1) intra-cluster parameter transfer learning-based model training (ICPTL) and (2) cluster-level model training (CM). These approaches aim to find a trade-off between the training efficiency of anomaly detection models and their accuracy. We compared the models trained under ICPTL and CM to models trained for specific devices (most accurate, least efficient) and a single general model trained for all devices (least accurate, most efficient). Our findings show that ICPTL’s model accuracy is comparable to that of the model per device approach while requiring only 40% of the training time. In addition, CM further improves training efficiency by requiring 23% less training time and reducing the number of trained models by approximately 66% compared to ICPTL, yet achieving a higher accuracy than a single general model.
This book constitutes the refereed proceedings of the 5th International Conference on Data Management in Grid and Peer-to-Peer systems, Globe 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2...
详细信息
ISBN:
(数字)9783642323447
ISBN:
(纸本)9783642323430
This book constitutes the refereed proceedings of the 5th International Conference on Data Management in Grid and Peer-to-Peer systems, Globe 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012.;The 9 revised full papers presented were carefully reviewed and selected from 15 submissions. The papers are organized in topical sections on data management in the cloud, cloud MapReduce and performance evaluation, and data stream systems and distributed data mining.
暂无评论