The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper considers the task of improving the efficiency of voice control of robots on the basis of adaptive procedures. This problem is considered in the context of noise resistance processing of speech signals for voice recognition subsystems. A solution to this problem is found in classes of adaptive algorithms for filtering voice signals based on sequential filtering. This model allows to improve...
Most of the existing population behavior studies are about the analysis of the population dynamic behavior of genetic algorithm, while there is little analysis of the population dynamic behavior of particle swarm optimization (PSO). Therefore, there is an urgent need for a new method to characterize the population dynamic behavior of PSO in the search process. In this paper, we propose some metrics...
In recent years the field studies on collective behaviors have revealed that topological interaction of k nearest neighbors plays a the key role in flocking. In this work, we show a model of flocking through adaptation to k nearest topological neighbors, and examine the influence of the number of topological neighbors on flocking dynamics with different group size. The model is validated by simulations.
The evolution of the harmonized set of ISO/IEC/IEEE 15288-12207 related standards and technical reports that are discussed in this International Standardprovides detailed requirements and guidance on the application of system life cycle processes. This International Standard unifies technical and managementrequirements and guidance from several of these sources to specify the requirements for the...
Web Service is always subject to change. As more enterprises choose to migrate to Service-oriented Architecture (SOA), the Web services and their stakeholders are facing a more distributed and dynamic environment. The evolution ofWeb services consumer requirements and the competitive pressures encourage web service providers to always make efforts to improve and update services by publishing continuously...
Real-time systems for wireless communication, digital signal processing and control experience a wide gamut of operating conditions (signal/channel noise, workload demand, perturbed process conditions). As device bandwidths expand, it becomes increasingly expensive, from a power consumption and reliability perspective, to operate such real-time systems for worst-case (static) performance requirements...
The work presented in this paper explores the issues of recognizing children's speech using acoustic models trained on adults' speech data. In such conditions, on account of large acoustic mismatch between training and test data, a high degradation in the recognition performance is noted. In our earlier work, a binary weighting of cepstral features as well as of acoustic model parameters was explored...
Today's infrastructure clouds provide resource elasticity (i.e. Auto-scaling) mechanisms enabling self-adaptive resource provisioning to reflect variations in the load intensity over time. These mechanisms impact on the application performance, however, their effect in specific situations is hard to quantify and compare. To evaluate the quality of elasticity mechanisms provided by different platforms...
The functionality and the performance of smart environment applications can be hampered by faults. Fault tolerance solutions aim to achieve graceful performance degradation in the presence of faults, ideally without leading to application failures. This is a reactive approach and, by itself, gives little flexibility and time for preventing potential failures. We propose a proactive fault-prevention...
The ability to run and manage multi-clouds applications (i.e., Applications that run on multiple clouds) allows exploiting the peculiarities of each cloud solution and hence improves non-functional aspects such as availability, cost, and scalability. Monitoring such multi-clouds applications is fundamental to track the health of the applications themselves and of their underlying infrastructures as...
We present self-organisation processes within a decentralised P2P open Desktop Grid System. Every agent aimsto maximise the speedup of his jobs by joining the system. Therefore he needs to cooperate with other agents. We use a trust metric to assess the willingness of cooperation for other agents. To further optimise their speedup agents can form explicit Trusted Communities with trusted peers. Thus...
In this paper we analyse and evaluate, in which ways learning techniques can be applied to agents in an open system, which have to map continuous situations into a continuous action space. The agents are part of an open desktop grid, where agents can offer and use computational power of other volunteer agents in order to improve their speedup for bag of-task applications. Moreover, the agents use...
Many web services represent their artifacts in the semi-structural format. Such artifacts may or may not be structurally complex. Many existing test case prioritization techniques however treat test cases of different complexity generically. In this paper, we exploit the insights on the structural similarity of XML-based artifacts between test cases, and propose a family of test case prioritization...
Many contemporary applications in distributed systems and networks demand that the components adapt the system functionality at run-time. We are particularly concerned with intentional change involving choice, coordination and collective action: this we call organised adaptation. There are many proposed formalisms for engineering such adaptation, primarily stemming from the fields of multi-agent systems...
In this paper we present an open multi-agent based Desktop Grid System that improves the performance of cooperative clients while decreasing the performance of non-cooperative clients as an incentive for good conduct. This is achieved by trust-based job client and worker algorithms that take into account the local and global history of the credibility and reliability experiences between agents, as...
Configuration management is a complex task, even for experienced system administrators, which makes self-managing systems a desirable solution. Self-management implies the need for a model based on which configuration changes may be decided. In previous work, we described a method for constructing a state-transition model of application behavior, by observing the application in simulation. This method...
Named entity (NE) extraction is traditionally applied to written text. Some recent works extend the extraction to broadcast speech but most of these approaches simply cascade a speech-to-text (STT) engine and a named entity tagger without any information sharing between the two. In this paper, we extract named entities from conversational speech and explore approaches to couple the STT and NE extraction...
A promising way to guarantee dependability of service-based systems (SBSs) is replanning service bindings dynamically with the environment changing. As embedded into system execution, such replanning process will directly affect the overall performance of SBSs. While various replanning techniques have been proposed up to now, it is still challenging that how to provide cost-effective replanning methods...
Self-management of tree overlay networks for distributed applications is the challenge this paper addresses. Eight local adaptation strategies are introduced based on which autonomous self-organized agents establish connections that build and maintain a tree topology. Quantitative and qualitative experimental evaluation illustrates and compares the effects of adaptation strategies in the resulting...
Increasing requirements for the resilience, security, adaptation, intelligence and scalability of complex business critical systems have set new challenges for system developers and application designers. Messaging infrastructures are often used to implement systems of this type. We provide an overview of the main advances in the adaptive security, security metrics, vulnerability discovery, anomaly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.