The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel event-condition-state pattern framework which is an event-based finite state machine is proposed. The framework improves GoF state pattern by re-segments GoF Context into a class which is responsible for management and a class which is responsible for operation interface. Complicated relations among event, condition and state are analyzed. Essential components for implementation, such as management,...
Service Oriented Architecture (SOA) and Service Oriented Computing (SOC) are prevailing technologies for sharing and reusing resources. Service composition is an envisioned methodology used in SOA and SOC to build value-added services. The existed service clustering and selection models are mostly designed for service discovery and there is few considering the requirement of service composition from...
In the two strategy majority/minority game on a network, at time t, an individual observes some subset of its neighbors strategies, and then adopts at time t+1 that strategy which was more/less frequently played by its neighbors at time t. We shall examine in this paper a variety of distinct models which vary the subsets observed, the synchrony of actions, the regularity, or otherwise, of the networks,...
In this paper we analyze a class of n-person supermodular games that arise in the context of interdependent security analysis. More specifically, we quantify the number and the distribution of Nash equilibria in pure strategies and their impact on the tipping set.
QoS is essential for selecting an appropriate service from a set of services that match userpsilas functionality requirements. To enable this, a QoS ontology for semantic service discovery, which provide the uniform model for QoS, is proposed in this article. With this ontology, the algorithms for QoS matchmaking and service ranking are presented.
Identification of design patterns can deliver important information to designers. Therefore, automated design pattern detection (DPD) is highly desirable when it comes to understanding unknown code. In this paper, we present the results of evaluating five existing DPD tools on various Java projects. These results motivate our proposal of a novel DPD approach based on data fusion. It combines design...
One of the privacy threats recognized in the use of LBS is represented by an adversary having information about the presence of individuals in certain locations, and using this information together with an (anonymous) LBS request to re-identify the issuer of the request associating her to the requested service. Several papers have proposed techniques to prevent this, assuming that the use of the service...
In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third authorities to mediate the interactions. A peer will need reputation mechanisms by self-experiencing and incorporating the knowledge of other peers to decide whether to trust another peer in P2P systems. On the basis of introduction on the trust properties and common problems...
Recent research has shown that including context in a recommender system may improve its performance. The context-based recommendation approaches are classified as pre-filtering, post-filtering and contextual modeling. Moreover, in real e-commerce applications, collecting ratings may be quite difficult. It is possible to use purchasing frequencies instead of ratings, but little research has been done...
In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finite...
Awareness systems are a class of computer mediated communication systems that help individuals or groups build and maintain a peripheral awareness of each other. In this paper a service-oriented platform is presented, that supports awareness and informal social communication between community members, distributed over multiple smart home environments. The ASTRA platform, developed in the context of...
Appearance of smartspaces where a number of devices can use a shared view of resources and services characterize modern usage of devices. The paper presents a reference model enabling communication between the devices of a SmartSpace and efficient information usage. The model is based on the application of such technologies as profiling and context management.
We propose a formal framework based on finite state process algebra for modeling service coordination in agent systems. The model is inspired by WS-coordination specification. Several participant agents can coordinate their actions towards reaching a semantically consistent outcome in a distributed activity. The model defines coordinator and participant agents and their generic interaction protocols...
The verifiability principle of meaning holds that information is meaningful only if there is a procedure that can verify whether it is true or false. In this paper, we explore this principle of philosophy in the realm of program comprehension. We introduce the notion of concept programs, which are independent, executable, and thus verifiable units of program knowledge. Concept programs are well-suited...
Comprehending an unfamiliar code fragment requires an awareness of explicit usage directives that may be present in the documentation of some invoked functions. Since it is not practical for developers to thoroughly investigate every call, directives may be missed and errors may occur. We previously reported on a tool called eMoose, which highlights calls to methods with associated directives, and...
Reliable contextual information of remotely monitored patients should be generated to prevent hazardous situations and to provide pervasive services in home-based care. This is difficult for several reasons. First, low level data obtained from heterogeneous sensors have different degrees of uncertainty. Second, generated contexts can be corrupted or conflicted even if they are acquired by simultaneous...
This paper describes a study which aim is to evaluate the effectiveness of podcasting technology in teaching online courses. A sample group of 104 students, with an optional access to audio recordings (podcasts) of the course, completed an online questionnaire. Some ANOVA tests were done to compare the group of students who listened to the online recordings (33) with those who did not (71). The results...
For the realization of language-independent, effective, and user-friendly model versioning systems, generic and efficient conflict detection is essential for correct and complete identification of conflicts caused by parallel modifications on one artifact. Usually, the genericity of the conflict detection costs a high price: language-specific operations and refactorings often remain undetected. Consequently,...
The paper reports on the application of Problem Oriented Engineering (POE) to the design of a highly innovative post-graduate research programme for the Open University, UK, a world leader in supported distance higher education. The new programme, to be launched in October 2009, is a part-time Master of Philosophy (MPhil) to be delivered entirely at a distance, supported by a blend of synchronous,...
Automatic differentiation is the primary means of obtaining analytic derivatives from a numerical model given as a computer program. Therefore, it is an essential productivity tool in numerous computational science and engineering domains. Computing gradients with the adjoint (also called reverse) mode via source transformation is a particularly beneficial but also challenging use of automatic differentiation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.