首页 > 最新文献

BCS International Academic Conference最新文献

英文 中文
Brain-Like Approximate Reasoning 类脑近似推理
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.2
A. Przybyszewski
Humans can easily recognize objects as complex as faces even if they have not seen them in such conditions before. We would like to find out computational basis of this ability. As an example of our approach we use the neurophysiological data from the visual system. In the retina and thalamus simple light spots are classified, in V1 - oriented lines and in V4 - simple shapes. The feedforward (FF) pathways by extracting above attributes from the object form hypotheses. The feedback (FB) pathways play different roles - they form predictions. In each area structure related predictions are tested against hypotheses. We formulate a theory in which different visual stimuli are described through their condition attributes. Responses in LGN, V1, and V4 neurons to different stimuli are divided into several ranges and are treated as decision attributes. Applying rough set theory (Pawlak, 1991 -[1]) we have divided our stimuli into equivalent classes in different brain areas. We propose that relationships between decision rules in each area are determined in two ways: by different logic of FF and FB pathways: FF pathways gather a huge number of possible objects attributes together using logical "AND" (drivers), and FB pathways choose the right one mainly by logical "OR" (modulators).
人类可以很容易地识别像面孔这样复杂的物体,即使他们以前没有在这种情况下见过它们。我们想找出这种能力的计算基础。作为我们方法的一个例子,我们使用来自视觉系统的神经生理学数据。在视网膜和丘脑中,简单的光点分为V1方向的线和V4简单的形状。前馈(FF)路径通过从对象中提取上述属性形成假设。反馈(FB)通路扮演着不同的角色——它们形成预测。在每个领域中,与结构相关的预测都会根据假设进行检验。我们制定了一个理论,其中不同的视觉刺激是通过他们的条件属性来描述的。LGN、V1和V4神经元对不同刺激的反应被划分为几个范围,并作为决策属性。运用粗糙集理论(Pawlak, 1991 - b[1]),我们将我们的刺激在不同的大脑区域划分为相等的类别。我们提出每个区域的决策规则之间的关系通过两种方式确定:通过FF路径和FB路径的不同逻辑:FF路径使用逻辑“与”(驱动器)收集大量可能的对象属性,而FB路径主要通过逻辑“或”(调节器)选择正确的对象属性。
{"title":"Brain-Like Approximate Reasoning","authors":"A. Przybyszewski","doi":"10.14236/EWIC/VOCS2008.2","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.2","url":null,"abstract":"Humans can easily recognize objects as complex as faces even if they have not seen them in such conditions before. We would like to find out computational basis of this ability. As an example of our approach we use the neurophysiological data from the visual system. In the retina and thalamus simple light spots are classified, in V1 - oriented lines and in V4 - simple shapes. \u0000 \u0000The feedforward (FF) pathways by extracting above attributes from the object form hypotheses. The feedback (FB) pathways play different roles - they form predictions. In each area structure related predictions are tested against hypotheses. We formulate a theory in which different visual stimuli are described through their condition attributes. Responses in LGN, V1, and V4 neurons to different stimuli are divided into several ranges and are treated as decision attributes. Applying rough set theory (Pawlak, 1991 -[1]) we have divided our stimuli into equivalent classes in different brain areas. We propose that relationships between decision rules in each area are determined in two ways: by different logic of FF and FB pathways: FF pathways gather a huge number of possible objects attributes together using logical \"AND\" (drivers), and FB pathways choose the right one mainly by logical \"OR\" (modulators).","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of the Complete Sample Management in a Biotech Laboratory 生物技术实验室完整样本管理的自动化
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.9
Martin Wojtczyk, Michael Marszalek, A. Knoll, R. Heidemann, K. Joeris, Chun Zhang, M. Burnett, T. Monica
Both Robots and Personal Computers established new markets about 30 years ago and were enabling factors in Automation and Information Technology. However, while you can see Personal Computers in almost every home nowadays, the domain of Robots in general still is mostly restricted to industrial automation. Due to the physical impact of robots, a safe design is essential, which most robots still lack of and therefore prevent their application for personal use, although a slow change can be noticed by the introduction of dedicated robots for specific tasks, which can be classified as service robots. Our approach to service robots was driven by the idea for supporting lab personnel in a biotechnology laboratory. That resulted in the combination of a manipulator with a mobile platform, extended with the necessary sensors to carry out a complete sample management process in a mammalian cell culture plant. After the initial development in Germany, the mobile manipulator was shipped to Bayer HealthCare in Berkeley, CA, USA, a global player in the sector of biopharmaceutical products, located in the San Francisco bay area. The platform was installed and successfully tested there in a pilot plant. This project demonstrates the successful combination of both key technologies: Information Technology and Robotics - and its application in a Life Science pilot plant.
机器人和个人电脑都在大约30年前建立了新的市场,并成为自动化和信息技术的推动因素。然而,虽然你现在几乎可以在每个家庭看到个人电脑,但机器人的领域总体上仍然主要局限于工业自动化。由于机器人的物理影响,安全的设计是必不可少的,这是大多数机器人仍然缺乏的,因此阻碍了它们的个人使用,尽管可以通过引入用于特定任务的专用机器人来注意到缓慢的变化,这可以归类为服务机器人。我们的服务机器人的方法是由支持生物技术实验室的实验室人员的想法驱动的。这导致了机械手与移动平台的结合,扩展了必要的传感器,以在哺乳动物细胞培养工厂中执行完整的样品管理过程。在德国进行初步开发后,移动机械手被运往位于美国加州伯克利的拜耳医疗保健公司,拜耳医疗保健公司是生物制药产品领域的全球参与者,位于旧金山湾区。该平台已安装到位,并在一家中试工厂成功进行了测试。这个项目展示了信息技术和机器人这两项关键技术的成功结合,以及它在生命科学试点工厂的应用。
{"title":"Automation of the Complete Sample Management in a Biotech Laboratory","authors":"Martin Wojtczyk, Michael Marszalek, A. Knoll, R. Heidemann, K. Joeris, Chun Zhang, M. Burnett, T. Monica","doi":"10.14236/EWIC/VOCS2008.9","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.9","url":null,"abstract":"Both Robots and Personal Computers established new markets about 30 years ago and were enabling factors in Automation and Information Technology. However, while you can see Personal Computers in almost every home nowadays, the domain of Robots in general still is mostly restricted to industrial automation. Due to the physical impact of robots, a safe design is essential, which most robots still lack of and therefore prevent their application for personal use, although a slow change can be noticed by the introduction of dedicated robots for specific tasks, which can be classified as service robots. \u0000 \u0000Our approach to service robots was driven by the idea for supporting lab personnel in a biotechnology laboratory. That resulted in the combination of a manipulator with a mobile platform, extended with the necessary sensors to carry out a complete sample management process in a mammalian cell culture plant. After the initial development in Germany, the mobile manipulator was shipped to Bayer HealthCare in Berkeley, CA, USA, a global player in the sector of biopharmaceutical products, located in the San Francisco bay area. The platform was installed and successfully tested there in a pilot plant. This project demonstrates the successful combination of both key technologies: Information Technology and Robotics - and its application in a Life Science pilot plant.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133335210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developing Knowledge-Based Systems using the Semantic Web 使用语义网开发基于知识的系统
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.3
D. Corsar, D. Sleeman
The benefits of reuse have long been recognized in the knowledge engineering community where the dream of creating knowledge-based systems on-the-fly from libraries of reusable components is still to be fully realised. In this paper we present a two stage methodology for creating knowledge-based systems: first reusing domain knowledge by mapping it, where appropriate, to the requirements of a generic problem solver; and secondly using this mapped knowledge and the requirements of the problem solver to "drive" the acquisition of the additional knowledge it needs. For example, suppose we have available a knowledge-based systems which is composed of a propose-and-revise problem solver linked with an appropriate knowledge base/ontology from the elevator domain. Then to create a diagnostic knowledge-based systems in the same domain, we require to map relevant information from the elevator knowledge base/ontology, such as component information, to a diagnostic problem solver, and then to extend it with diagnostic information such as malfunctions, symptoms and repairs for each component. We have developed MAKTab, a Protege plug-in which supports both these steps and results in a composite knowledgebased systems which is executable. In the final section of this paper we discuss the issues involved in extending MAKTab so that it would be able to operate in the context of the (Semantic) Web. Here we use the idea of centralised mapping repositories and mapping composition. This work contributes to the vision of the Web, which contains components (both problem solvers and instantiated ontologies (knowledge bases)) that tools (like MAKTab) can use to create knowledge-based systems which subsequently can enhance the richness of the Web by providing yet further knowledge-based Web-services.
重用的好处在知识工程社区中早已被认识到,在这个社区中,从可重用组件库动态创建基于知识的系统的梦想仍有待完全实现。在本文中,我们提出了一种创建基于知识的系统的两阶段方法:首先通过将其映射到通用问题解决器的需求来重用领域知识;其次,使用这些映射的知识和问题解决者的需求来“驱动”获取它所需要的额外知识。例如,假设我们有一个基于知识的系统,它由一个提议和修改问题解决器组成,该系统与来自电梯领域的适当知识库/本体相关联。然后,为了在同一领域中创建基于诊断知识的系统,我们需要将电梯知识库/本体中的相关信息(如组件信息)映射到诊断问题解决器,然后使用诊断信息(如每个组件的故障、症状和维修)对其进行扩展。我们已经开发了MAKTab,这是一个Protege插件,它支持这两个步骤,并在一个可执行的基于知识的复合系统中产生结果。在本文的最后一部分中,我们讨论了扩展MAKTab所涉及的问题,以便它能够在(语义)Web的上下文中运行。这里我们使用集中映射存储库和映射组合的思想。这项工作有助于实现Web的愿景,其中包含工具(如MAKTab)可以用来创建基于知识的系统的组件(包括问题解决程序和实例化的本体(知识库)),这些系统随后可以通过提供进一步的基于知识的Web服务来增强Web的丰富性。
{"title":"Developing Knowledge-Based Systems using the Semantic Web","authors":"D. Corsar, D. Sleeman","doi":"10.14236/EWIC/VOCS2008.3","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.3","url":null,"abstract":"The benefits of reuse have long been recognized in the knowledge engineering community where the dream of creating knowledge-based systems on-the-fly from libraries of reusable components is still to be fully realised. In this paper we present a two stage methodology for creating knowledge-based systems: first reusing domain knowledge by mapping it, where appropriate, to the requirements of a generic problem solver; and secondly using this mapped knowledge and the requirements of the problem solver to \"drive\" the acquisition of the additional knowledge it needs. For example, suppose we have available a knowledge-based systems which is composed of a propose-and-revise problem solver linked with an appropriate knowledge base/ontology from the elevator domain. Then to create a diagnostic knowledge-based systems in the same domain, we require to map relevant information from the elevator knowledge base/ontology, such as component information, to a diagnostic problem solver, and then to extend it with diagnostic information such as malfunctions, symptoms and repairs for each component. We have developed MAKTab, a Protege plug-in which supports both these steps and results in a composite knowledgebased systems which is executable. In the final section of this paper we discuss the issues involved in extending MAKTab so that it would be able to operate in the context of the (Semantic) Web. Here we use the idea of centralised mapping repositories and mapping composition. This work contributes to the vision of the Web, which contains components (both problem solvers and instantiated ontologies (knowledge bases)) that tools (like MAKTab) can use to create knowledge-based systems which subsequently can enhance the richness of the Web by providing yet further knowledge-based Web-services.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Tools for Traceable Security Verification 可追踪的安全验证工具
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.31
J. Jürjens, Y. Yu, A. Bauer
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work towards addressing this challenge which focusses on one facet of dependability, namely data security: We give an overview on an approach for modelbased security verification which provides a traceability link to the implementation. The approach uses a design model in the UML security extension UMLsec which can be formally verified against high-level security requirements such as secrecy and authenticity. An implementation of the specification can then be verified against the model by making use of run-time verification through the traceability link. The approach supports software evolution in so far as the traceability mapping is updated when refactoring operations are regressively performed using our tool-supported refactoring technique. The proposed method has been applied to an implementation of the Internet security protocol SSL.
可靠的系统进化已经被英国计算研究委员会(UKCRC)确定为当前计算机科学的重大挑战之一。我们提出了解决这一挑战的工作,重点关注可靠性的一个方面,即数据安全性:我们概述了基于模型的安全验证方法,该方法提供了到实现的可追溯性链接。该方法使用UML安全扩展UMLsec中的设计模型,该模型可以根据高级安全需求(如保密性和真实性)进行正式验证。然后,规范的实现可以通过可追溯性链接利用运行时验证来针对模型进行验证。当使用我们的工具支持的重构技术回归地执行重构操作时,跟踪映射被更新,因此该方法支持软件演进。该方法已应用于Internet安全协议SSL的实现中。
{"title":"Tools for Traceable Security Verification","authors":"J. Jürjens, Y. Yu, A. Bauer","doi":"10.14236/EWIC/VOCS2008.31","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.31","url":null,"abstract":"Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work towards addressing this challenge which focusses on one facet of dependability, namely data security: We give an overview on an approach for modelbased security verification which provides a traceability link to the implementation. The approach uses a design model in the UML security extension UMLsec which can be formally verified against high-level security requirements such as secrecy and authenticity. An implementation of the specification can then be verified against the model by making use of run-time verification through the traceability link. The approach supports software evolution in so far as the traceability mapping is updated when refactoring operations are regressively performed using our tool-supported refactoring technique. The proposed method has been applied to an implementation of the Internet security protocol SSL.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122460042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improved SIFT-Features Matching for Object Recognition 改进sift特征匹配的目标识别
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.16
Faraj Alhwarin, Chao Wang, Danijela Ristić-Durrant, A. Gräser
The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully applied to a variety of computer vision problems based on feature matching including object recognition, pose estimation, image retrieval and many others. However, in real-world applications there is still a need for improvement of the algorithm's robustness with respect to the correct matching of SIFT features. In this paper, an improvement of the original SIFT algorithm providing more reliable feature matching for the purpose of object recognition is proposed. The main idea is to divide the features extracted from both the test and the model object image into several sub-collections before they are matched. The features are divided into several sub-collections considering the features arising from different octaves, that is from different frequency domains. To evaluate the performance of the proposed approach, it was applied to real images acquired with the stereo camera system of the rehabilitation robotic system FRIEND II. The experimental results show an increase in the number of correct features matched and, at the same time, a decrease in the number of outliers in comparison with the original SIFT algorithm. Compared with the original SIFT algorithm, a 40% reduction in processing time was achieved for the matching of the stereo images.
Lowe[1]提出的SIFT算法(Scale Invariant Feature Transform)是一种从图像中提取显著不变特征的方法。它已经成功地应用于各种基于特征匹配的计算机视觉问题,包括物体识别、姿态估计、图像检索等。然而,在实际应用中,该算法在SIFT特征正确匹配方面的鲁棒性还有待提高。本文提出了对原有SIFT算法的改进,为目标识别提供了更可靠的特征匹配。其主要思想是将从测试和模型对象图像中提取的特征划分为几个子集合,然后再进行匹配。考虑到不同的八度,即不同的频域产生的特征,将特征分为几个子集合。为了评估该方法的性能,将其应用于康复机器人系统FRIEND II的立体摄像系统获取的真实图像。实验结果表明,与原SIFT算法相比,该算法匹配的正确特征数量有所增加,同时异常值数量有所减少。与原有SIFT算法相比,该算法对立体图像的匹配处理时间缩短了40%。
{"title":"Improved SIFT-Features Matching for Object Recognition","authors":"Faraj Alhwarin, Chao Wang, Danijela Ristić-Durrant, A. Gräser","doi":"10.14236/EWIC/VOCS2008.16","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.16","url":null,"abstract":"The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully applied to a variety of computer vision problems based on feature matching including object recognition, pose estimation, image retrieval and many others. However, in real-world applications there is still a need for improvement of the algorithm's robustness with respect to the correct matching of SIFT features. In this paper, an improvement of the original SIFT algorithm providing more reliable feature matching for the purpose of object recognition is proposed. The main idea is to divide the features extracted from both the test and the model object image into several sub-collections before they are matched. The features are divided into several sub-collections considering the features arising from different octaves, that is from different frequency domains. \u0000 \u0000To evaluate the performance of the proposed approach, it was applied to real images acquired with the stereo camera system of the rehabilitation robotic system FRIEND II. The experimental results show an increase in the number of correct features matched and, at the same time, a decrease in the number of outliers in comparison with the original SIFT algorithm. Compared with the original SIFT algorithm, a 40% reduction in processing time was achieved for the matching of the stereo images.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128560380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Component-Based Description of Programming Languages 基于组件的编程语言描述
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.23
P. Mosses
Research in formal description of programming languages over the past four decades has led to some significant achievements. These include formal syntax and semantics for complete major programming languages, and theoretical foundations for novel features that might be included in future languages. Nevertheless, to give a completely formal, validated description of any significant programming language using the conventional frameworks remains an immense effort, disproportionate to its perceived benefits. Our diagnosis of the causes of this disappointing situation highlights two major deficiencies in the pragmatic aspects of formal language descriptions in conventional frameworks: lack of reusable components, and poor tool support. Part of the proposed remedy is a radical shift to a novel component-based paradigm for the development of complete language descriptions, based on simple interfaces between descriptions of syntactic and semantic aspects, and employing frameworks that allow independent description of individual programming constructs. The introduction of a language-independent notation for common programming constructs maximises the reusability of components. Tool support for component-based language description is being developed using the ASF+SDF Meta-Environment; the aim is to provide an efficient component-based workbench for use in design and implementation of future programming languages, accompanied by an online repository for validated formal descriptions of programming constructs and languages.
在过去的四十年中,对编程语言的形式化描述的研究已经取得了一些重要的成就。这些包括完整的主要编程语言的形式语法和语义,以及可能包含在未来语言中的新特性的理论基础。然而,要使用传统框架对任何重要的编程语言给出一个完全正式的、经过验证的描述,仍然是一项巨大的努力,与它所带来的好处不成比例。我们对导致这种令人失望的情况的原因的诊断突出了传统框架中形式语言描述在实用方面的两个主要缺陷:缺乏可重用组件和糟糕的工具支持。建议的补救措施之一是彻底转变为一种新的基于组件的范式,用于开发完整的语言描述,这种范式基于语法和语义方面的描述之间的简单接口,并采用允许独立描述单个编程结构的框架。为通用编程构造引入独立于语言的符号,最大限度地提高了组件的可重用性。对基于组件的语言描述的工具支持正在使用ASF+SDF元环境进行开发;其目的是提供一个有效的基于组件的工作台,用于未来编程语言的设计和实现,并附带一个在线存储库,用于验证编程结构和语言的正式描述。
{"title":"Component-Based Description of Programming Languages","authors":"P. Mosses","doi":"10.14236/EWIC/VOCS2008.23","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.23","url":null,"abstract":"Research in formal description of programming languages over the past four decades has led to some significant achievements. These include formal syntax and semantics for complete major programming languages, and theoretical foundations for novel features that might be included in future languages. Nevertheless, to give a completely formal, validated description of any significant programming language using the conventional frameworks remains an immense effort, disproportionate to its perceived benefits. Our diagnosis of the causes of this disappointing situation highlights two major deficiencies in the pragmatic aspects of formal language descriptions in conventional frameworks: lack of reusable components, and poor tool support. \u0000 \u0000Part of the proposed remedy is a radical shift to a novel component-based paradigm for the development of complete language descriptions, based on simple interfaces between descriptions of syntactic and semantic aspects, and employing frameworks that allow independent description of individual programming constructs. The introduction of a language-independent notation for common programming constructs maximises the reusability of components. Tool support for component-based language description is being developed using the ASF+SDF Meta-Environment; the aim is to provide an efficient component-based workbench for use in design and implementation of future programming languages, accompanied by an online repository for validated formal descriptions of programming constructs and languages.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Overcoming Software Fragility with Interacting Feedback Loops and Reversible Phase Transitions 用交互反馈回路和可逆相变克服软件脆弱性
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.24
P. V. Roy
Programs are fragile for many reasons, including software errors, partial failures, and network problems. One way to make software more robust is to design it from the start as a set of interacting feedback loops. Studying and using feedback loops is an old idea that dates back at least to Norbert Wiener's work on Cybernetics. Up to now almost all work in this area has focused on how to optimize single feedback loops. We show that it is important to design software with multiple interacting feedback loops. We present examples taken from both biology and software to substantiate this. We are realizing these ideas in the SELFMAN project: extending structured overlay networks (a generalization of peer-to-peer networks) for large-scale distributed applications. Structured overlay networks are a good example of systems designed with interacting feedback loops. Using ideas from physics, we postulate that these systems can potentially handle extremely hostile environments. If the system is properly designed, it will perform a reversible phase transition when the node failure rate increases beyond a critical point. The structured overlay network will make a transition from a single connected ring to a set of disjoint rings and back again when the failure rate decreases. We are exploring how to expose this phase transition to the application so that it can continue to provide a service. For validation we are building three realistic applications taken from industrial case studies, using a distributed transaction layer built on top of the overlay. Finally, we propose a research agenda to create a practical design methodology for building systems based on the use of interacting feedback loops and reversible phase transitions.
程序脆弱的原因有很多,包括软件错误、局部故障和网络问题。使软件更健壮的一种方法是从一开始就把它设计成一组相互作用的反馈循环。研究和使用反馈循环是一个古老的想法,至少可以追溯到Norbert Wiener在控制论方面的工作。到目前为止,该领域几乎所有的工作都集中在如何优化单反馈回路上。我们表明,设计具有多个交互反馈回路的软件是很重要的。我们从生物学和软件两方面举出例子来证实这一点。我们正在SELFMAN项目中实现这些想法:为大规模分布式应用程序扩展结构化覆盖网络(点对点网络的一种概括)。结构化覆盖网络是设计具有交互反馈回路的系统的一个很好的例子。利用物理学的思想,我们假设这些系统可以潜在地处理极端恶劣的环境。如果系统设计合理,当节点故障率超过临界点时,系统将发生可逆相变。当故障率降低时,结构覆盖网络将从单个连接环过渡到一组不连接环。我们正在探索如何向应用程序公开此阶段转换,以便它能够继续提供服务。为了验证,我们正在构建三个来自工业案例研究的实际应用程序,使用构建在覆盖层之上的分布式事务层。最后,我们提出了一个研究议程,以创建一个基于使用交互反馈回路和可逆相变的实用设计方法来构建系统。
{"title":"Overcoming Software Fragility with Interacting Feedback Loops and Reversible Phase Transitions","authors":"P. V. Roy","doi":"10.14236/EWIC/VOCS2008.24","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.24","url":null,"abstract":"Programs are fragile for many reasons, including software errors, partial failures, and network problems. One way to make software more robust is to design it from the start as a set of interacting feedback loops. Studying and using feedback loops is an old idea that dates back at least to Norbert Wiener's work on Cybernetics. Up to now almost all work in this area has focused on how to optimize single feedback loops. We show that it is important to design software with multiple interacting feedback loops. We present examples taken from both biology and software to substantiate this. We are realizing these ideas in the SELFMAN project: extending structured overlay networks (a generalization of peer-to-peer networks) for large-scale distributed applications. Structured overlay networks are a good example of systems designed with interacting feedback loops. Using ideas from physics, we postulate that these systems can potentially handle extremely hostile environments. If the system is properly designed, it will perform a reversible phase transition when the node failure rate increases beyond a critical point. The structured overlay network will make a transition from a single connected ring to a set of disjoint rings and back again when the failure rate decreases. We are exploring how to expose this phase transition to the application so that it can continue to provide a service. For validation we are building three realistic applications taken from industrial case studies, using a distributed transaction layer built on top of the overlay. Finally, we propose a research agenda to create a practical design methodology for building systems based on the use of interacting feedback loops and reversible phase transitions.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129023905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Object representatives: a uniform abstraction for pointer information 对象表示:指针信息的统一抽象
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.32
E. Bodden, Patrick Lam, L. Hendren
Pointer analyses enable many subsequent program analyses and transformations by statically disambiguating references to the heap. However, different client analyses may have different sets of pointer analysis needs, and each must pick some pointer analysis along the cost/precision spectrum to meet those needs. Some analysis clients employ combinations of pointer analyses to obtain better precision with reduced analysis times. Our goal is to ease the task of developing client analyses by enabling composition and substitutability for pointer analyses. We therefore propose object representatives, which statically represent runtime objects. A representative encapsulates the notion of object identity, as observed through the representative's aliasing relations with other representatives. Object representatives enable pointer analysis clients to disambiguate references to the heap in a uniform yet flexible way. Representatives can be generated from many combinations of pointer analyses, and pointer analyses can be freely exchanged and combined without changing client code. We believe that the use of object representatives brings many software engineering benefits to compiler implementations because, at compile time, object representatives are Java objects. We discuss our motivating case for object representatives, namely, the development of an abstract interpreter for tracematches, a language feature for runtime monitoring. We explain one particular algorithm for computing object representatives which combines flow-sensitive intraprocedural must-alias and must-not-alias analyses with a flow-insensitive, context-sensitive whole-program points-to analysis. In our experience, client analysis implementations can almost directly substitute object representatives for runtime objects, simplifying the design and implementation of such analyses.
指针分析通过静态消除对堆的引用的歧义,支持许多后续的程序分析和转换。然而,不同的客户端分析可能有不同的指针分析需求集,每个客户端分析都必须根据成本/精度范围选择一些指针分析来满足这些需求。一些分析客户端使用指针分析的组合,以在减少分析时间的同时获得更高的精度。我们的目标是通过支持指针分析的组合和可替换性来简化开发客户端分析的任务。因此,我们提出对象表示,它静态地表示运行时对象。从代表与其他代表的混叠关系中可以看出,代表封装了对象身份的概念。对象表示使指针分析客户端能够以统一而灵活的方式消除对堆的引用的歧义。可以从指针分析的许多组合中生成代表,并且可以自由地交换和组合指针分析,而无需更改客户机代码。我们相信,对象表示的使用给编译器实现带来了许多软件工程上的好处,因为在编译时,对象表示是Java对象。我们将讨论对象表示的激励案例,即开发用于跟踪匹配的抽象解释器,这是一种用于运行时监视的语言特性。我们解释了一种用于计算对象表示的特定算法,该算法将流敏感的过程内必须别名和必须不别名分析与流不敏感的、上下文敏感的整个程序点分析相结合。根据我们的经验,客户端分析实现几乎可以直接用对象代表代替运行时对象,从而简化了这种分析的设计和实现。
{"title":"Object representatives: a uniform abstraction for pointer information","authors":"E. Bodden, Patrick Lam, L. Hendren","doi":"10.14236/EWIC/VOCS2008.32","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.32","url":null,"abstract":"Pointer analyses enable many subsequent program analyses and transformations by statically disambiguating references to the heap. However, different client analyses may have different sets of pointer analysis needs, and each must pick some pointer analysis along the cost/precision spectrum to meet those needs. Some analysis clients employ combinations of pointer analyses to obtain better precision with reduced analysis times. Our goal is to ease the task of developing client analyses by enabling composition and substitutability for pointer analyses. We therefore propose object representatives, which statically represent runtime objects. A representative encapsulates the notion of object identity, as observed through the representative's aliasing relations with other representatives. Object representatives enable pointer analysis clients to disambiguate references to the heap in a uniform yet flexible way. Representatives can be generated from many combinations of pointer analyses, and pointer analyses can be freely exchanged and combined without changing client code. We believe that the use of object representatives brings many software engineering benefits to compiler implementations because, at compile time, object representatives are Java objects. We discuss our motivating case for object representatives, namely, the development of an abstract interpreter for tracematches, a language feature for runtime monitoring. We explain one particular algorithm for computing object representatives which combines flow-sensitive intraprocedural must-alias and must-not-alias analyses with a flow-insensitive, context-sensitive whole-program points-to analysis. In our experience, client analysis implementations can almost directly substitute object representatives for runtime objects, simplifying the design and implementation of such analyses.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129271974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On the Complexity of Parity Games 论奇偶性游戏的复杂性
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.20
A. Beckmann, F. Moller
Parity games underlie the model checking problem for the modal µ-calculus, the complexity of which remains unresolved after more than two decades of intensive research. The community is split into those who believe this problem - which is known to be both in NP and coNP - has a polynomial-time solution (without the assumption that P = NP) and those who believe that it does not. (A third, pessimistic, faction believes that the answer to this question will remain unknown in their lifetime.) In this paper we explore the possibility of employing Bounded Arithmetic to resolve this question, motivated by the fact that problems which are both NP and coNP, and where the equivalence between their NP and coNP description can be formulated and proved within a certain fragment of Bounded Arithmetic, necessarily admit a polynomial-time solution. While the problem remains unresolved by this paper, we do proposed another approach, and at the very least provide a modest refinement to the complexity of parity games (and in turn the µ-calculus model checking problem): that they lie in the class PLS of Polynomial Local Search problems. This result is based on a new proof of memoryless determinacy which can be formalised in Bounded Arithmetic. The approach we propose may offer a route to a polynomial-time solution. Alternatively, there may be scope in devising a reduction between the problem and some other problem which is hard with respect to PLS, thus making the discovery of a polynomial-time solution unlikely according to current wisdom.
奇偶博弈是模态微演算的模型检验问题的基础,经过二十多年的深入研究,其复杂性仍未得到解决。社区分为两派,一派认为这个问题——已知在NP和coNP中都有——具有多项式时间解(不假设P = NP),另一派则认为不是。(第三个悲观派认为,在他们有生之年,这个问题的答案将是未知的。)在本文中,我们探讨了用有界算术来解决这个问题的可能性,其动机是这样一个事实,即NP和coNP问题,并且它们的NP和coNP描述之间的等价可以在有界算术的某个片段内表述和证明,必然承认多项式时间解。虽然本文仍未解决这个问题,但我们确实提出了另一种方法,并且至少提供了对奇偶对策复杂性的适度改进(反过来是微微积分模型检查问题):它们位于多项式局部搜索问题的PLS类中。这一结果是基于一种新的无记忆确定性证明,该证明可以在有界算术中形式化。我们提出的方法可能为多项式时间解提供一条途径。或者,在这个问题和其他一些关于PLS的困难问题之间设计一个简化可能是有余地的,因此根据当前的智慧,发现一个多项式时间的解决方案是不太可能的。
{"title":"On the Complexity of Parity Games","authors":"A. Beckmann, F. Moller","doi":"10.14236/EWIC/VOCS2008.20","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.20","url":null,"abstract":"Parity games underlie the model checking problem for the modal µ-calculus, the complexity of which remains unresolved after more than two decades of intensive research. The community is split into those who believe this problem - which is known to be both in NP and coNP - has a polynomial-time solution (without the assumption that P = NP) and those who believe that it does not. (A third, pessimistic, faction believes that the answer to this question will remain unknown in their lifetime.) \u0000 \u0000In this paper we explore the possibility of employing Bounded Arithmetic to resolve this question, motivated by the fact that problems which are both NP and coNP, and where the equivalence between their NP and coNP description can be formulated and proved within a certain fragment of Bounded Arithmetic, necessarily admit a polynomial-time solution. While the problem remains unresolved by this paper, we do proposed another approach, and at the very least provide a modest refinement to the complexity of parity games (and in turn the µ-calculus model checking problem): that they lie in the class PLS of Polynomial Local Search problems. This result is based on a new proof of memoryless determinacy which can be formalised in Bounded Arithmetic. \u0000 \u0000The approach we propose may offer a route to a polynomial-time solution. Alternatively, there may be scope in devising a reduction between the problem and some other problem which is hard with respect to PLS, thus making the discovery of a polynomial-time solution unlikely according to current wisdom.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116719193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computing a Longest Increasing Subsequence of Length k in Time O(n log log k) 在时间O(n log log k)内计算长度为k的最长递增子序列
Pub Date : 2008-09-22 DOI: 10.14236/EWIC/VOCS2008.7
M. Crochemore, E. Porat
We consider the complexity of computing a longest increasing subsequence parameterised by the length of the output. Namely, we show that the maximal length k of an increasing subsequence of a permutation of the set of integers -1, 2,..., n} can be computed in time O(n log log k) in the RAM model, improving the previous 30-year bound of O(n log log k). The optimality of the new bound is an open question.
我们考虑计算由输出长度参数化的最长递增子序列的复杂性。也就是说,我们证明了整数集- 1,2,…的置换的递增子序列的最大长度k,在RAM模型中,n}可以在O(n log log k)时间内计算,改进了之前的O(n log log k)的30年边界,新边界的最优性是一个悬而未决的问题。
{"title":"Computing a Longest Increasing Subsequence of Length k in Time O(n log log k)","authors":"M. Crochemore, E. Porat","doi":"10.14236/EWIC/VOCS2008.7","DOIUrl":"https://doi.org/10.14236/EWIC/VOCS2008.7","url":null,"abstract":"We consider the complexity of computing a longest increasing subsequence parameterised by the length of the output. Namely, we show that the maximal length k of an increasing subsequence of a permutation of the set of integers -1, 2,..., n} can be computed in time O(n log log k) in the RAM model, improving the previous 30-year bound of O(n log log k). The optimality of the new bound is an open question.","PeriodicalId":247606,"journal":{"name":"BCS International Academic Conference","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
BCS International Academic Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1