首页 > 最新文献

2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)最新文献

英文 中文
An Investigation into Small World Phenomenon in Engineering Informatics 工程信息学中的小世界现象研究
Zhengxu Zhao, Jinsheng Fan
Product information is complex and discrete in terms of design methods and manufacturing processes, its long term retention has for time been a great challenge. This paper presents an initial investigation into the small world phenomenon within product information with an emphasis on computer-aided design (CAD) data and its generating systems. The objective is to construct a networking model in the notion of six degrees separation and thereafter to produce useful findings for future reference in information organization. It is expected that this model will be an essence for effective CAD data translation, exchange, index and migration and for helping to deal with the key problems in long term retention of product data.
产品信息在设计方法和制造过程方面是复杂和离散的,其长期保存一直是一个巨大的挑战。本文对产品信息中的小世界现象进行了初步研究,重点是计算机辅助设计(CAD)数据及其生成系统。目的是在六度分离的概念中构建一个网络模型,然后产生有用的发现,供将来信息组织参考。预计该模型将成为有效的CAD数据转换、交换、索引和迁移的核心,并有助于解决产品数据长期保存的关键问题。
{"title":"An Investigation into Small World Phenomenon in Engineering Informatics","authors":"Zhengxu Zhao, Jinsheng Fan","doi":"10.1109/ICCGI.2008.9","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.9","url":null,"abstract":"Product information is complex and discrete in terms of design methods and manufacturing processes, its long term retention has for time been a great challenge. This paper presents an initial investigation into the small world phenomenon within product information with an emphasis on computer-aided design (CAD) data and its generating systems. The objective is to construct a networking model in the notion of six degrees separation and thereafter to produce useful findings for future reference in information organization. It is expected that this model will be an essence for effective CAD data translation, exchange, index and migration and for helping to deal with the key problems in long term retention of product data.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129997938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Research towards Efficient Social Peer-to-Peer Networks 高效社会点对点网络研究的调查
Lu Liu, N. Antonopoulos, J. Xu, D. Russell
Peer-to-peer (P2P) networks attract attentions worldwide with their great success in file sharing networks (e.g. Napster, Gnutella, BitTorrent, and Kazaa). In the last decade, numerous studies have been devoted to the problem of resource discovery in P2P networks. However, efficient resource discovery remains a key challenge for large-scale P2P networks. An investigation of existing research on resource discovery towards efficient social P2P networks will be given in this paper.
点对点(P2P)网络以其在文件共享网络(如Napster, Gnutella, BitTorrent和Kazaa)方面的巨大成功吸引了全世界的关注。在过去的十年中,人们对P2P网络中的资源发现问题进行了大量的研究。然而,高效的资源发现仍然是大规模P2P网络面临的一个关键挑战。本文将对现有的针对高效社交P2P网络的资源发现研究进行综述。
{"title":"Investigation of Research towards Efficient Social Peer-to-Peer Networks","authors":"Lu Liu, N. Antonopoulos, J. Xu, D. Russell","doi":"10.1109/ICCGI.2008.15","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.15","url":null,"abstract":"Peer-to-peer (P2P) networks attract attentions worldwide with their great success in file sharing networks (e.g. Napster, Gnutella, BitTorrent, and Kazaa). In the last decade, numerous studies have been devoted to the problem of resource discovery in P2P networks. However, efficient resource discovery remains a key challenge for large-scale P2P networks. An investigation of existing research on resource discovery towards efficient social P2P networks will be given in this paper.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Extension of the D-S Evidence Theory to Fuzzy Sets D-S证据理论在模糊集上的改进推广
Y. Miao, X.P. Ma, H.X. Zhang, J.W. Zhang, Z. Zhao
To analyze fuzzy data in uncertain evidential reasoning, some researchers have recently extended the D-S evidence theory to fuzzy sets. But there are some insufficiencies in the definition of the fuzzy belief function and the combination rule on fuzzy sets of the D-S evidence theory. This paper describes a new definition of the similarity degree between two fuzzy sets and the improved extension combination rule of the evidence theory on fuzzy sets. It also presents the corresponding mathematical proof to validate the improved combination rule. Compared with other generalizing combination rules, the results of the numerical experiments show that the new combination rule in this paper can acquire more changing information to the change of fuzzy focal elements more effectively, and it overcomes the insufficiencies of other existing combination rules and enhances the robustness of fusion decision systems effectively.
为了分析不确定证据推理中的模糊数据,最近一些研究者将D-S证据理论扩展到模糊集。但D-S证据理论在模糊信念函数的定义和模糊集的组合规则方面存在不足。本文给出了两个模糊集相似度的新定义和改进的模糊集证据理论的可拓组合规则。并给出了相应的数学证明来验证改进的组合规则。数值实验结果表明,与其他泛化组合规则相比,本文提出的组合规则能更有效地获取模糊焦点元变化时的更多变化信息,克服了现有组合规则的不足,有效地增强了融合决策系统的鲁棒性。
{"title":"An Improved Extension of the D-S Evidence Theory to Fuzzy Sets","authors":"Y. Miao, X.P. Ma, H.X. Zhang, J.W. Zhang, Z. Zhao","doi":"10.1109/ICCGI.2008.44","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.44","url":null,"abstract":"To analyze fuzzy data in uncertain evidential reasoning, some researchers have recently extended the D-S evidence theory to fuzzy sets. But there are some insufficiencies in the definition of the fuzzy belief function and the combination rule on fuzzy sets of the D-S evidence theory. This paper describes a new definition of the similarity degree between two fuzzy sets and the improved extension combination rule of the evidence theory on fuzzy sets. It also presents the corresponding mathematical proof to validate the improved combination rule. Compared with other generalizing combination rules, the results of the numerical experiments show that the new combination rule in this paper can acquire more changing information to the change of fuzzy focal elements more effectively, and it overcomes the insufficiencies of other existing combination rules and enhances the robustness of fusion decision systems effectively.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Range Free Localization Algorithm Based on Restricted-Area for Wireless Sensor Networks 基于受限区域的无线传感器网络无距离定位算法
Chao Wang, Kai Liu, Nan Xiao
This paper presents a restricted-area-based localization algorithm (RAL) for wireless sensor networks (WSN), in which radio connectivity and principle of perpendicular bisectors are used to provide a lower estimation error than some of restricted-area-based localization algorithms. In the RAL algorithm, anchor nodes can transmit beacon signals at different power levels, which divide the possible transmission ranges of an anchor into a circle and multiple rings. The intersection of circle or rings of all the anchors heard by unknown node forms restricted-area I. In addition, we utilize all the perpendicular bisectors of the line which connects each pair of anchor nodes to obtain restricted-area II. Based on the restricted-area I and restricted-area II, we can calculate valid intersection points, and take average value of all these points as the estimated location of the unknown nodes. The proposed algorithm is range-free and energy efficient. Neighboring sensor nodes do not need to exchange information. Each sensor node only relies on information of anchors it heard to compute two kinds of restricted-areas and estimates its location. Simulation results show that the proposed algorithm has less estimation error than Centroid, Convex and CAB localization algorithms.
本文提出了一种基于限制区域的无线传感器网络定位算法(RAL),该算法利用无线连通性和垂直平分线原理,比一些基于限制区域的定位算法提供更低的估计误差。在RAL算法中,锚节点可以发送不同功率水平的信标信号,从而将一个锚节点可能的传输范围划分为一个圈和多个环。未知节点所听到的所有锚点的圆或环相交形成限制区域i。另外,我们利用连接每一对锚点的直线的所有垂直平分线得到限制区域II。基于限制区域I和限制区域II,我们可以计算出有效的交点,并将所有这些点的平均值作为未知节点的估计位置。该算法是无距离和节能的。相邻传感器节点之间不需要交换信息。每个传感器节点仅依靠它听到的锚点信息来计算两种限制区域并估计其位置。仿真结果表明,该算法比质心定位、凸定位和CAB定位算法具有更小的估计误差。
{"title":"A Range Free Localization Algorithm Based on Restricted-Area for Wireless Sensor Networks","authors":"Chao Wang, Kai Liu, Nan Xiao","doi":"10.1109/ICCGI.2008.47","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.47","url":null,"abstract":"This paper presents a restricted-area-based localization algorithm (RAL) for wireless sensor networks (WSN), in which radio connectivity and principle of perpendicular bisectors are used to provide a lower estimation error than some of restricted-area-based localization algorithms. In the RAL algorithm, anchor nodes can transmit beacon signals at different power levels, which divide the possible transmission ranges of an anchor into a circle and multiple rings. The intersection of circle or rings of all the anchors heard by unknown node forms restricted-area I. In addition, we utilize all the perpendicular bisectors of the line which connects each pair of anchor nodes to obtain restricted-area II. Based on the restricted-area I and restricted-area II, we can calculate valid intersection points, and take average value of all these points as the estimated location of the unknown nodes. The proposed algorithm is range-free and energy efficient. Neighboring sensor nodes do not need to exchange information. Each sensor node only relies on information of anchors it heard to compute two kinds of restricted-areas and estimates its location. Simulation results show that the proposed algorithm has less estimation error than Centroid, Convex and CAB localization algorithms.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115640993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Getting More from Reputation Systems: A Context–Aware Reputation Framework Based on Trust Centers and Agent Lists 从信誉系统中获得更多:基于信任中心和代理列表的上下文感知信誉框架
R. Alnemr, C. Meinel
Reputation is a crucial factor in trust and thus in Web communities. Trust strategies may involve investigating user reputation or directly using transitive reputation to form the Web of Trust. We suggest an approach that takes advantage of both strategies without increasing the cost of investigation. Several systems nowadays form what we call ldquouser Web communitiesrdquo. In these communities, reputation related to different contexts needs to be exchanged. The perception, calculation and interpretation of this reputation differ from one community to another. We propose the development of reference models to diminish the distance between these multi-perceptions. We also propose the use of reputation centers to facilitate reputation transfer and highlight the importance of their role in analyzing attacks on reputation.
声誉是信任的关键因素,因此在网络社区中也是如此。信任策略可能包括调查用户声誉或直接使用传递声誉来形成信任网络。我们建议一种方法,利用这两种策略的优势,而不增加调查的成本。现在有几个系统形成了我们所说的“问题Web社区”。在这些社区中,需要交换与不同背景相关的声誉。对这种声誉的感知、计算和解释因社区而异。我们建议开发参考模型来缩小这些多重感知之间的距离。我们还建议使用声誉中心来促进声誉转移,并强调它们在分析声誉攻击中的重要性。
{"title":"Getting More from Reputation Systems: A Context–Aware Reputation Framework Based on Trust Centers and Agent Lists","authors":"R. Alnemr, C. Meinel","doi":"10.1109/ICCGI.2008.45","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.45","url":null,"abstract":"Reputation is a crucial factor in trust and thus in Web communities. Trust strategies may involve investigating user reputation or directly using transitive reputation to form the Web of Trust. We suggest an approach that takes advantage of both strategies without increasing the cost of investigation. Several systems nowadays form what we call ldquouser Web communitiesrdquo. In these communities, reputation related to different contexts needs to be exchanged. The perception, calculation and interpretation of this reputation differ from one community to another. We propose the development of reference models to diminish the distance between these multi-perceptions. We also propose the use of reputation centers to facilitate reputation transfer and highlight the importance of their role in analyzing attacks on reputation.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124365879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Case-Based Decision Support for Bridge Monitoring 基于案例的桥梁监测决策支持
B. Freudenthaler, G. Gutenbrunner, R. Stumptner, J. King
This paper deals with the support of human experts in making decisions in the field of bridge monitoring. Thereby, the methodology case-based reasoning is described to develop a decision support system for the interpretation of measurement results of bridges. Case-based reasoning is a cyclic problem solving method whereby already known knowledge about bridges is stored in form of cases. The system uses these cases to help the engineers in interpreting measurement results. Each bridge has different dynamic parameters. Therefore, analysis and interpretation of the raw datais very time-consuming and cost-intensive. Furthermore, the interpretation by human experts is done in a subjective way because each engineer has different concepts and experience in the interpretation of bridge measurement data. On this account, there is a need for an intelligent decision support system to support engineers in interpreting measurement results and making decisions.
本文讨论了在桥梁监测领域中人类专家的决策支持问题。因此,基于案例的推理方法被描述为开发一个决策支持系统来解释桥梁的测量结果。基于案例的推理是一种循环求解问题的方法,即已知的桥梁知识以案例的形式存储。该系统使用这些案例来帮助工程师解释测量结果。每座桥都有不同的动力参数。因此,分析和解释原始数据非常耗时且成本很高。此外,由于每个工程师对桥梁测量数据的解释有不同的概念和经验,因此由人类专家进行的解释是主观的。因此,需要一个智能决策支持系统来支持工程师解释测量结果并做出决策。
{"title":"Case-Based Decision Support for Bridge Monitoring","authors":"B. Freudenthaler, G. Gutenbrunner, R. Stumptner, J. King","doi":"10.1109/ICCGI.2008.33","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.33","url":null,"abstract":"This paper deals with the support of human experts in making decisions in the field of bridge monitoring. Thereby, the methodology case-based reasoning is described to develop a decision support system for the interpretation of measurement results of bridges. Case-based reasoning is a cyclic problem solving method whereby already known knowledge about bridges is stored in form of cases. The system uses these cases to help the engineers in interpreting measurement results. Each bridge has different dynamic parameters. Therefore, analysis and interpretation of the raw datais very time-consuming and cost-intensive. Furthermore, the interpretation by human experts is done in a subjective way because each engineer has different concepts and experience in the interpretation of bridge measurement data. On this account, there is a need for an intelligent decision support system to support engineers in interpreting measurement results and making decisions.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124412409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bearing-Only Target Tracking Based on Big Bang – Big Crunch Algorithm 基于大爆炸-大压缩算法的全方位目标跟踪
H. Genç, A. K. Hocaoglu
Target tracking based on passive sensor data is of great importance in practical applications. In bearing only target tracking, the basic parameters defining the target motion is estimated through noise corrupted measurement data. Depending on the noise characteristics, the search space has many local minima. Obtaining the global minimum -that is the optimal solution - is an active area of research over the past few decades. In this work, a new optimization algorithm, namely Big Bang - Big Crunch algorithm is shown to fit this problem. The results are superior relative to classical genetic algorithm approach both in terms of speed and accuracy.
基于无源传感器数据的目标跟踪在实际应用中具有重要意义。在纯方位目标跟踪中,定义目标运动的基本参数是通过噪声干扰的测量数据估计出来的。根据噪声特性的不同,搜索空间存在多个局部极小值。在过去的几十年里,获得全局最小值(即最优解)是一个活跃的研究领域。本文提出了一种新的优化算法,即大爆炸-大紧缩算法。结果表明,该方法在速度和精度上都优于经典遗传算法。
{"title":"Bearing-Only Target Tracking Based on Big Bang – Big Crunch Algorithm","authors":"H. Genç, A. K. Hocaoglu","doi":"10.1109/ICCGI.2008.53","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.53","url":null,"abstract":"Target tracking based on passive sensor data is of great importance in practical applications. In bearing only target tracking, the basic parameters defining the target motion is estimated through noise corrupted measurement data. Depending on the noise characteristics, the search space has many local minima. Obtaining the global minimum -that is the optimal solution - is an active area of research over the past few decades. In this work, a new optimization algorithm, namely Big Bang - Big Crunch algorithm is shown to fit this problem. The results are superior relative to classical genetic algorithm approach both in terms of speed and accuracy.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Improving the Accuracy of Peer-to-Peer Sampling Services 提高点对点抽样服务的准确性
E. Ogston, S. Jarvis
Node sampling services provide peers in a peer-to-peer system with a source of randomly chosen addresses of other nodes. Ideally, samples should be independent and uniform. The restrictions of a distributed environment, however, introduce various dependancies between samples. We review gossip-based sampling protocols proposed in previous work, and identify sources of inaccuracy. These include replicating the items from which samples are drawn, and imprecise management of the process of refreshing items. Based on this analysis, we propose a new protocol, Eddy, which seeks to minimize temporal and spatial dependancies between samples. We demonstrate that these changes lead to a better sampling service by showing, through simulations, that using Eddy improves the accuracy of a network-size estimation algorithm that uses the random samples from the protocol.
节点采样服务为点对点系统中的对等节点提供随机选择的其他节点地址的来源。理想情况下,样本应该是独立和均匀的。然而,分布式环境的限制会在样本之间引入各种依赖关系。我们回顾了在以前的工作中提出的基于八卦的采样协议,并确定了不准确的来源。这些问题包括复制从中提取样本的项,以及对刷新项过程的不精确管理。基于这一分析,我们提出了一个新的协议,Eddy,它旨在最大限度地减少样本之间的时间和空间依赖性。我们通过模拟表明,使用Eddy提高了使用协议随机样本的网络大小估计算法的准确性,从而证明了这些变化会带来更好的采样服务。
{"title":"Improving the Accuracy of Peer-to-Peer Sampling Services","authors":"E. Ogston, S. Jarvis","doi":"10.1109/ICCGI.2008.39","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.39","url":null,"abstract":"Node sampling services provide peers in a peer-to-peer system with a source of randomly chosen addresses of other nodes. Ideally, samples should be independent and uniform. The restrictions of a distributed environment, however, introduce various dependancies between samples. We review gossip-based sampling protocols proposed in previous work, and identify sources of inaccuracy. These include replicating the items from which samples are drawn, and imprecise management of the process of refreshing items. Based on this analysis, we propose a new protocol, Eddy, which seeks to minimize temporal and spatial dependancies between samples. We demonstrate that these changes lead to a better sampling service by showing, through simulations, that using Eddy improves the accuracy of a network-size estimation algorithm that uses the random samples from the protocol.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and Controlling Dynamic Service Compositions 建模和控制动态服务组合
H. Pfeffer, D. Linner, S. Steglich
Service-oriented computing paradigms have considerably enhanced support for dynamic in modern computing environments by providing loosely coupled interactions between components. The key attainment is the ability to perform a late binding of service compositions, i.e., an allocation of actual services to service place holders during run-time. However, this attainment is limited to the binding of services and cannot operate on the service composition plans itself. Moreover, many service composition representations do not consider the realtime behavior of single services, failing to address a key need of service compositions within dynamic environments that are characterized by a high node mobility. Within this paper, we introduce a service composition model based on a bipartite graph representation that enables the rapid modification of already existing service composition plans. Here, the workflow within a service composition is modeled with a timed automaton while a labeled digraph ensures the correct flow of data between the single services.
面向服务的计算范式通过在组件之间提供松散耦合的交互,大大增强了对现代计算环境中动态的支持。关键的成就是执行服务组合的后期绑定的能力,即,在运行时将实际服务分配给服务位置持有者。但是,这种实现仅限于服务的绑定,不能对服务组合计划本身进行操作。此外,许多服务组合表示没有考虑单个服务的实时行为,无法解决以节点高移动性为特征的动态环境中服务组合的关键需求。在本文中,我们引入了一个基于二部图表示的服务组合模型,该模型能够快速修改现有的服务组合计划。在这里,服务组合中的工作流使用定时自动机建模,而标记有向图确保单个服务之间的正确数据流。
{"title":"Modeling and Controlling Dynamic Service Compositions","authors":"H. Pfeffer, D. Linner, S. Steglich","doi":"10.1109/ICCGI.2008.40","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.40","url":null,"abstract":"Service-oriented computing paradigms have considerably enhanced support for dynamic in modern computing environments by providing loosely coupled interactions between components. The key attainment is the ability to perform a late binding of service compositions, i.e., an allocation of actual services to service place holders during run-time. However, this attainment is limited to the binding of services and cannot operate on the service composition plans itself. Moreover, many service composition representations do not consider the realtime behavior of single services, failing to address a key need of service compositions within dynamic environments that are characterized by a high node mobility. Within this paper, we introduce a service composition model based on a bipartite graph representation that enables the rapid modification of already existing service composition plans. Here, the workflow within a service composition is modeled with a timed automaton while a labeled digraph ensures the correct flow of data between the single services.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122129053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Thermal Diffusion-Based Access Load Balancing for P2P File Sharing Networks 基于热扩散的P2P文件共享网络接入负载均衡
M. Takaoka, K. Ohnishi, M. Uchida, Y. Oie
In the present paper, we propose a file replication method to dynamically balance loads of peers in unstructured peer-to-peer (P2P) file-sharing networks. Load balancing is considered to require uniform storage access by file replication. We then define the load index as the storage access ratio. In the proposed method, each peer autonomously regulates the file replication probability to uniform storage accesses as thermal diffusion phenomena. Simulation results reveal that the proposed method can control the file sharing network to balance loads while dynamically adapting to change of storage accesses that is caused by change of popularity trends, and therefore keep load balancing performance stable. In addition, the proposed method achieves greater adaptability to sudden changes in storage accesses than our previous method.
在本文中,我们提出了一种在非结构化点对点(P2P)文件共享网络中动态平衡对等节点负载的文件复制方法。负载均衡被认为需要通过文件复制实现统一的存储访问。然后我们将加载指数定义为存储访问比率。在该方法中,每个对等体自主调节文件复制概率,使其成为热扩散现象。仿真结果表明,该方法既能控制文件共享网络实现负载均衡,又能动态适应由于流行趋势变化而引起的存储访问变化,保持负载均衡性能稳定。此外,与之前的方法相比,该方法对存储访问的突然变化具有更好的适应性。
{"title":"Thermal Diffusion-Based Access Load Balancing for P2P File Sharing Networks","authors":"M. Takaoka, K. Ohnishi, M. Uchida, Y. Oie","doi":"10.1109/ICCGI.2008.36","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.36","url":null,"abstract":"In the present paper, we propose a file replication method to dynamically balance loads of peers in unstructured peer-to-peer (P2P) file-sharing networks. Load balancing is considered to require uniform storage access by file replication. We then define the load index as the storage access ratio. In the proposed method, each peer autonomously regulates the file replication probability to uniform storage accesses as thermal diffusion phenomena. Simulation results reveal that the proposed method can control the file sharing network to balance loads while dynamically adapting to change of storage accesses that is caused by change of popularity trends, and therefore keep load balancing performance stable. In addition, the proposed method achieves greater adaptability to sudden changes in storage accesses than our previous method.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1