The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: database and expert systems applications; network-based information systems; self-adaptable and autonomic computing systems; knowledge management; biological data management; biological data management; grid and peer-to-peer computing impacts on large scale heterogeneous distributed database systems; Web based collaboration; Web semantics; high availability of...
In the past, multi-agent systems were used in proprietary environments. Nowadays, these systems have been used broadly in open distributed networks, such as e-commerce applications for Internet. An environment such as the Internet cannot be considered a safe place. Thus, multi-agent systems should have security mechanisms, e.g. confidentiality and integrity. The XML security specifications are standards...
A transactional agent is a mobile agent to manipulate objects with some type of commitment condition. We assume computers may stop by fault while networks are reliable. In the client-server model, servers are fault-tolerant according to the replication and checkpointing technologies. However, an application program cannot be performed if a client is faulty. A program can be performed on another operational...
Nowadays an ever increasing number of companies rely on application service providers for hosting some or almost all software applications. In this domain, an effective way for customizing user interfaces would be highly desirable. We propose a profiling system interacting with the applications in order to capture users' behavior. The system is based on Bayesian networks and we show a strategy for...
In this paper, we explain an implementation of an accrual failure detector, that we call the phi failure detector. The particularity of the phi failure detector is that it dynamically adjusts to current network conditions the scale on which the suspicion level is expressed. We have done the experiment in a LAN in a whole day and evaluated the behavior of our phi failure detector. Then we discuss on...
Open distributed computer systems are some of the most successful structures ever designed for the computer community together with their undisputed benefits for users. However, their complexity has also introduced a few side-effects, most notably the unpredictable nature of the underlying environments and reconfiguration burdens imposed by environmental changes. Thus, to gain high level of system...
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, such as anti-counterfeiting, pedigree, and genealogy, which analyze the trace history of products to detect patterns or anomalies in the supply chain. While these applications have gained considerable interest recently, further...
In this paper, a robust and large scale resident-oriented safety information system on the occurrence of the various disasters constructed over a nationwide high-speed network is introduced. The resident evacuated can registered his/her safety information in the local safety information servers in the evacuation area whether he/she can safely evaluated or not using mobile PCs or terminals at the evacuation...
Recent years, especially in Japan, camouflaging geographical origin of agricultural products is a big problem. Therefore, we introduced a distributed system to identify their geographical origin using their differences of trace elements, or very small quantities of elements. Vegetables grown in farms absorb metals form the soil. Since compositions of trace metal elements differ from geographical places,...
In this paper, we provide an evaluation model for marketable quality and profitability of corporations. We apply the real values of some leading manufacturing corporations in Japan to our proposed model to analyze its accuracy. From the analysis, we concluded that the theoretical and real standard values of the marketable quality indicator were both 0.6 (that is 60%). From our further analysis, we...
The radio model usually used in most of studies on wireless sensor networks is spherical. This means that the received power at a certain distance is the same in all directions. Every radio engineer knows that this is not the case encountered in real hardware. Here, we show that the analysis of such a network by simulation is not trivial when one uses more realistic radio models. We emphasis this...
The ever-changing nature of the mobile Internet contributes to the difficulties encountered in user behavior research. Regularity is an important aspect of the mobile Internet in research and marketing, because it end users easily lose their interest and leave the mobile Web sites due to the limited visibility of the Web. Maintaining user loyalty is a vital challenge for mobile Webs. Therefore, the...
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a customized way, based on their immediate desires and context. At the same time, to construct such applications in a cost-effective and reusable way, there is also a growing pressure on mobile application developers to structure...
In this paper, in order to reduce communication overhead in mobile ad hoc networks, we present a zone-based hierarchical link state routing protocol with gateway flooding (ZHLS-GF) in which a new flooding scheme, called gateway flooding is proposed. ZHLS-GF is based on ZHLS, a zone-based hierarchical link state routing protocol. ZHLS is a hierarchical routing protocol for mobile ad hoc networks in...
Network-based information systems use well-defined standards to ensure interoperability and also have a tightly coupled relationship between their internal data representation and the external network representation. Virtual organisations (VOs), where members share a problem-solving purpose rather than a location-based or formal organisation, constitute an environment where user requirements may not...
To develop an embedded system, in which processors are used, a skilled assembler is necessary. An ISA (instruction set architecture) simulator is essential for training assembly programming, and the preparation of a SWDE (software development environment) such as simulator, assembler, disassembler, and compiler for a new processor can put a great strain on processor developers. We have been developing...
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is talking to whom over a public network. This work develops a novel approach to hide the senders and the receivers of messages. Routes are chosen and frames traverse these routes. Each frame consists of a token and a node can...
The notion of a self-organising system as used within this paper, is of a system that optimises and adapts its architectural composition based on evidence accrued from both internal and external influences. In this way, a self-organising system is defined to be a fluid, unbounded set of components that are organised and configured on demand and at runtime in reaction to the current configuration of...
Imitation is a powerful mechanism in human society, and has proven its usefulness in machine learning. This paper describes the notion of goal-directed imitation and its possible role in realizing self-adaptive systems. The conditions for its application are analyzed. We illustrate the working of imitation in self-adaptation by means of a small example
This paper investigates the architecture and design of agent-based sensor networks for petroleum offshore monitoring. A few challenges to monitor the reservoir, wellbore and wellhead are identified. Moreover, the necessary components for a reliable, precise, and accurate monitoring are suggested. The paper describes the architecture of the routing agent and discusses the cross layer optimization issues...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.