The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In many-valued logic theories, the decision and construction for Sheffer functions is an important problem. The decision for Sheffer functions is interrelated to the decision for completeness of functions set, and the solution can be reduced to determining the minimal coverings of precomplete. It's well known that each precomplete set is a function set, T(Gm), preserving the relation Gm, therefore,...
In this paper, we propose a track analysis process about the activity in learning systems that helps teachers to benefit of the experience and the knowledge of the community in the usage analysis.We also propose a language for calculation of teachers' observation needs. This language will be implemented in tracks' analysis tools, which support teachers to establish their tracking needs in order to...
A similarity algorithm based on weighted hierarchical structure of XML document is brought forward. The algorithm can calculate the similarity among XML documents efficiently according to hierarchical structure. It can be powerful enough to distinguish the similar structural documents. Experimental results prove that the algorithm reduces the complexity and has fairly high performance. The approach...
Most current reputation models fail to calculate peerspsila reputation accurately when there is little transaction history between the peers. To this end, this paper presents a trust model combing reputation and credential which accepts inputs of both feedback and credential. The model is based on reputation-based trust model, and according to the correlation of credential and reputation, the model...
This paper describes Web personalization, the essence of personalization is the adaptability of information systems to the needs of the adaptability of information system to the needs of their users. This issue is becoming increasing important on the Web, as non-expert users are overwhelmed by the quantity of information available online. The proposed approach aims to mine a reduced set of effective...
While analyzing mobile systems we often approximate the actual coverage surface and assume an ideal cell shape. In a multi-cellular network, because of its tessellating nature, a hexagon is more preferred than a circular geometry. Despite this reality, perhaps due to the inherent simplicity, only a model for circular based random spreading is available. However, if used, this results an unfair terminal...
As the performance gap between disks and processors continues to increase, dozens of cache replacement policies come up to handle the problem. Unfortunately, most of the policies are static. Nimrod Megiddo etc put forward a low overhead adaptive policy called ARC. It outperforms most of the static policies in most situations. But, ARC adapts itself to the workloads by the feedback of the missed pages...
In the first part of the paper, we prove a generalization of the classical Poincare-Miranda theorem to the case of a denumerable set of continuous functions of denumerable number of variables. The second part of the paper concerns the controllability of nonlinear repetitive processes. First, we formulate a theorem on the existence of a unique solution to such process and theorem on the continuous...
This paper sets forth the stage for one of the most important issues in SoS: the control problem. The challenge for any control engineer and designer is to stabilize the SoS based on not only its own sensors on board, but just as critically important based on data transmissions from other sensors and actuators. For that reason the control design needs to be flexible to account for lack or shortfall...
This paper deals with the stabilization for a broad class of nonlinear systems. First, we construct smooth Lyapunov functions from a known weak control Lyapunov function of the system. It is proved that a weak control Lyapunov function satisfying a less conservative condition can be used to design a globally stabilizing control law. The simulation shows the effectiveness of the method.
Data (or information) provenance has many important applications. However, prior work on data provenance management almost exclusively focused on the collection, representation, query, and storage of provenance data. In contrast, the security aspect of provenance management has not been understood nor adequately addressed. A natural question then is: What would a secure provenance management system...
In a peer-to-peer (P2P) overlay network, a peer process (peer) communicates with other peers and manipulates objects in local and remote peers. In a fully distributed, unstructured P2P network, there is no centralized coordinator like index and super peer. Each peer has to communicate with its acquaintance peers and obtain service information of other peers. It is critical for a peer to identify which...
Recently, mobile terminals with wireless communication mechanism such as cell phones, PDAs or laptops are widely used and ad hoc networks have become popular. In mobile ad hoc networks, since nodes move around the network, the network topology and the number of neighboring nodes in each node frequently change. Although the number of neighboring nodes in each node and the distance between each node...
Cyber-physical systems denote a new modeling paradigm that promotes a holistic view on complex systems. These systems have been studied before from various particular perspectives using paradigms like ubiquitous and distributed computing or embedded and hybrid systems. In modeling cyber-physical systems one has to consider the interaction between physics, computation and communication (networking),...
Designing massive, parallel applications, for the Grid,poses a totally different and unique set of challenges for the grid application developers. This paper describes Gridhra, , a dasiagrid-awarepsila parallel debugger designed to cater to the grid specific challenges in debugging. The remote parallel debugger is Web based and is deployed using the Web Launch architecture. Gridhra supports debugging...
Peer-to-peer (P2P) systems achieve scalability, fault tolerance, and load balancing, while effectively reducing infrastructure cost compared to client/server systems. For large wiki-based collaboration systems these characteristics can be beneficial as well. However, a fully decentralized P2P-based collaboration system requires appropriate incentives for users to (a) contribute resources for storing...
Emerging virtualization technologies are making ubiquitous access to on-demand computing, network and storage resources to deliver various applications over public Internet. In this paper we present how the telecom operation support systems (OSS) that provide enterprise to enterprise (E2E) transactions, switching management, on-demand service management and scalability have evolved to provide next...
Rather than concentrating on general ad hoc networks and systems (GAHNS) that have to provide one-size-fits-all basis for all kinds of applications, this workshop proposes to focus on a variety of specialized ad hoc networks and systems (SAHNS), each suitable as a foundation for a restricted class of applications or even for an individual application. It is expected that SAHNS, thanks to exploiting...
A transaction is assigned with a purpose which is a collection of roles. Suppose a transaction T1 with a purpose R1 writes an object o2 after reading an object o1 and then another transaction T2 with R2 reads o2 and writes an object o3. Unless T2 is granted a read right of o1, illegal information flow occur from o1 to o2. In the purpose-marking(PM) protocol, T1 marks o2 with the purpose R1. T2 cannot...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.