首页 > 最新文献

Third International Conference on Information Technology and Applications (ICITA'05)最新文献

英文 中文
Using Look-Ahead Protocol for Mobile Data Broadcast 在移动数据广播中使用前瞻协议
K. Lam, C. Wong, William Leung
In this paper, we propose an efficient approach to maintaining data consistency of broadcast data in mobile computing environments. At the server a special read-only transaction, the broadcast transaction, is scheduled to read data entities from the database for broadcasting data. Obviously, traditional concurrency control algorithms are inadequate and inefficient as the broadcast transaction creates numerous data conflicts with other update transactions, which are concurrently accessing the same set of data entities. Some algorithms for global-reading of databases, Shade Test and Color Test could be a solution. However, we observe that they have also some deficiencies. Therefore, we devise a new and efficient algorithm called Look-Ahead Protocol (LAP) to address this problem. The simulation results show that our algorithm outperforms all existing algorithms
在本文中,我们提出了一种在移动计算环境中保持广播数据一致性的有效方法。在服务器上,安排一个特殊的只读事务,即广播事务,从数据库中读取数据实体以广播数据。显然,传统的并发控制算法是不充分和低效的,因为广播事务与其他更新事务产生了大量的数据冲突,这些事务并发地访问同一组数据实体。一些算法全局读取数据库,色度测试和颜色测试可能是一个解决方案。然而,我们观察到它们也有一些不足。因此,我们设计了一种新的高效算法,称为前瞻性协议(LAP)来解决这个问题。仿真结果表明,该算法优于现有的所有算法
{"title":"Using Look-Ahead Protocol for Mobile Data Broadcast","authors":"K. Lam, C. Wong, William Leung","doi":"10.1109/ICITA.2005.299","DOIUrl":"https://doi.org/10.1109/ICITA.2005.299","url":null,"abstract":"In this paper, we propose an efficient approach to maintaining data consistency of broadcast data in mobile computing environments. At the server a special read-only transaction, the broadcast transaction, is scheduled to read data entities from the database for broadcasting data. Obviously, traditional concurrency control algorithms are inadequate and inefficient as the broadcast transaction creates numerous data conflicts with other update transactions, which are concurrently accessing the same set of data entities. Some algorithms for global-reading of databases, Shade Test and Color Test could be a solution. However, we observe that they have also some deficiencies. Therefore, we devise a new and efficient algorithm called Look-Ahead Protocol (LAP) to address this problem. The simulation results show that our algorithm outperforms all existing algorithms","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114681302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval 基于实时流量模式检测的信息检索动态缓存大小调整
Richard S. L. Wu, Allan K. Y. Wong, T. Dillon
The novel RTPD/MACSC model proposed in this paper tunes the cache size adoptively on the fly. It combines the extant MACSC (model for adaptive cache size control) and the novel RTPD (real-time traffic pattern detection) capability. Similar to its MACSC predecessor, the new RTPD/MACSC tuner maintains the given cache hit ratio consistently and persistently. It, however, differs from its predecessor because it adapts itself to compensate for the ill effects on the cache hit ratio by the Internet traffic, which embeds various patterns over time. The automatic adaptation (self-tuning) capability in response to traffic pattern changes detected by the RTPD is called self-reconfiguration in the RTPD/MACSC context
本文提出的RTPD/MACSC模型可以动态自适应地调整缓存大小。它结合了现有的MACSC(自适应缓存大小控制模型)和新的RTPD(实时流量模式检测)功能。与MACSC的前身类似,新的RTPD/MACSC调优器始终如一地保持给定的缓存命中率。但是,它与它的前身不同,因为它可以自我调整以补偿Internet流量对缓存命中率的不良影响,随着时间的推移,Internet流量会嵌入各种模式。在RTPD/MACSC上下文中,RTPD检测到的流量模式变化后的自动适应(自调优)能力称为自重构
{"title":"Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval","authors":"Richard S. L. Wu, Allan K. Y. Wong, T. Dillon","doi":"10.1109/ICITA.2005.301","DOIUrl":"https://doi.org/10.1109/ICITA.2005.301","url":null,"abstract":"The novel RTPD/MACSC model proposed in this paper tunes the cache size adoptively on the fly. It combines the extant MACSC (model for adaptive cache size control) and the novel RTPD (real-time traffic pattern detection) capability. Similar to its MACSC predecessor, the new RTPD/MACSC tuner maintains the given cache hit ratio consistently and persistently. It, however, differs from its predecessor because it adapts itself to compensate for the ill effects on the cache hit ratio by the Internet traffic, which embeds various patterns over time. The automatic adaptation (self-tuning) capability in response to traffic pattern changes detected by the RTPD is called self-reconfiguration in the RTPD/MACSC context","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of sinusoidally-distributed dithering for signed-error constant modulus algorithm 带符号误差常模算法的正弦分布抖动性能
J. Jusak, Z. M. Hussain
The complexity of the ubiquitous constant modulus algorithm (CMA) can be reduced by applying a sign operation to the CMA error function, while a sign operator generally can be seen as a 1-bit (two-level) mid-riser quantization. However, in order to preserve the information lost as a result of quantization processes, dithering is commonly used. In this paper, we evaluate the performance of dithered signed-error CMA utilizing a dithering signal that has sinusoidal probability density function. The algorithm has also been applied for equalization in wireless communication channel, which is distorted by multi-path propagation. Simulation results show that dithering using sinusoidal distribution outperforms the dithering using uniform distribution in terms of convergence speed.
泛在常模算法(CMA)的复杂性可以通过对CMA误差函数应用符号运算来降低,而符号运算符通常可以被视为1位(两级)中间提升量化。然而,为了保留由于量化过程而丢失的信息,通常使用抖动。在本文中,我们利用具有正弦概率密度函数的抖动信号来评估抖动带符号误差CMA的性能。该算法还应用于无线通信信道的多径失真均衡。仿真结果表明,正弦分布抖动在收敛速度上优于均匀分布抖动。
{"title":"Performance of sinusoidally-distributed dithering for signed-error constant modulus algorithm","authors":"J. Jusak, Z. M. Hussain","doi":"10.1109/ICITA.2005.214","DOIUrl":"https://doi.org/10.1109/ICITA.2005.214","url":null,"abstract":"The complexity of the ubiquitous constant modulus algorithm (CMA) can be reduced by applying a sign operation to the CMA error function, while a sign operator generally can be seen as a 1-bit (two-level) mid-riser quantization. However, in order to preserve the information lost as a result of quantization processes, dithering is commonly used. In this paper, we evaluate the performance of dithered signed-error CMA utilizing a dithering signal that has sinusoidal probability density function. The algorithm has also been applied for equalization in wireless communication channel, which is distorted by multi-path propagation. Simulation results show that dithering using sinusoidal distribution outperforms the dithering using uniform distribution in terms of convergence speed.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy Protection in Mobile Agent Based Service Domain 基于移动代理的服务域隐私保护
M. N. Huda, S. Yamada, E. Kamioka
In a mobile agent based environment personal data can be stolen, leaked or sent out to unauthorized persons by malicious mobile agents. In this paper we describe a new architecture and mechanism for user privacy protection in mobile agent based service domain. Agents meet at a protected and encapsulated agent computing environment from where they are not allowed to communicate with the outside world and also are not allowed to leave the platform. All the agents are killed at the host and the computation result is sent to respective parties by the trusted agent meeting and executing platform
在基于移动代理的环境中,个人数据可能被恶意移动代理窃取、泄露或发送给未经授权的人员。本文提出了一种新的基于移动代理的服务领域用户隐私保护体系结构和机制。代理在一个受保护和封装的代理计算环境中会面,在这个环境中,它们不允许与外部世界通信,也不允许离开平台。所有代理在主机上被终止,计算结果由可信代理会议和执行平台发送给各方
{"title":"Privacy Protection in Mobile Agent Based Service Domain","authors":"M. N. Huda, S. Yamada, E. Kamioka","doi":"10.1109/ICITA.2005.218","DOIUrl":"https://doi.org/10.1109/ICITA.2005.218","url":null,"abstract":"In a mobile agent based environment personal data can be stolen, leaked or sent out to unauthorized persons by malicious mobile agents. In this paper we describe a new architecture and mechanism for user privacy protection in mobile agent based service domain. Agents meet at a protected and encapsulated agent computing environment from where they are not allowed to communicate with the outside world and also are not allowed to leave the platform. All the agents are killed at the host and the computation result is sent to respective parties by the trusted agent meeting and executing platform","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SAFE Model Approach to Construction of Intelligent Security Systems 构建智能安防系统的SAFE模型方法
Z. Chaczko, S. Sinha
Dynamic environments such as that of any public and private infrastructure, workplace and even home consist of multiple entities that continuously interact with each other. Integrating an intelligent security system in such an environment necessitates the need for a soft systems approach that gives perspective to such interactions through identifying associated holons. The holonic analysis allows characterisation of ill-defined and often problematic situations that are resultant of the human activity system. This paper discusses some techniques that can be adopted to resolve scenarios that are plagued with uncertainty in reasoning and the continuously varying nature of interrelationship between native entities. The technical aspect of this system encompasses the mode of query processing and surveillance through a structured sensor network set up with the aid of distributed services and network protocols
动态环境,如任何公共和私人基础设施、工作场所甚至家庭,都是由多个实体组成的,这些实体不断地相互作用。在这样的环境中集成智能安全系统需要一种软系统方法,通过识别相关的全息来提供这种交互的视角。整体分析允许对人类活动系统导致的不明确和经常有问题的情况进行表征。本文讨论了一些可以用来解决推理不确定性和本地实体之间相互关系不断变化的问题的技术。该系统的技术方面包括通过借助于分布式服务和网络协议建立的结构化传感器网络进行查询处理和监控的模式
{"title":"SAFE Model Approach to Construction of Intelligent Security Systems","authors":"Z. Chaczko, S. Sinha","doi":"10.1109/ICITA.2005.243","DOIUrl":"https://doi.org/10.1109/ICITA.2005.243","url":null,"abstract":"Dynamic environments such as that of any public and private infrastructure, workplace and even home consist of multiple entities that continuously interact with each other. Integrating an intelligent security system in such an environment necessitates the need for a soft systems approach that gives perspective to such interactions through identifying associated holons. The holonic analysis allows characterisation of ill-defined and often problematic situations that are resultant of the human activity system. This paper discusses some techniques that can be adopted to resolve scenarios that are plagued with uncertainty in reasoning and the continuously varying nature of interrelationship between native entities. The technical aspect of this system encompasses the mode of query processing and surveillance through a structured sensor network set up with the aid of distributed services and network protocols","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123272382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rights Sensitive Information Sharing Space Based on Multi-Agent System 基于多agent系统的权限敏感信息共享空间
S. Amamiya, M. Amamiya
In the near future, people will be able to access information and resources on the public open network environment. However, few current network environments seem to have unified method for protection of information and resource. This paper proposes a unified resource protection scheme on the basis of fusion of two multi-agent systems called Kodama and VPC. Kodama has the power of constructing flexible hierarchical logical spaces, and VPC has the ability to dynamically change its behavior according to the circumstance of user. As a protection scheme, two kinds of policies called public policy and private policy are introduced into the fused multi-agent system. Combination of these policies makes it possible to realize an open and secure information sharing system. We show practical sample applications using the scheme
在不久的将来,人们将能够在公共开放的网络环境中获取信息和资源。然而,目前的网络环境似乎很少有统一的方法来保护信息和资源。在融合Kodama和VPC两个多智能体系统的基础上,提出了一种统一的资源保护方案。Kodama具有构建灵活的分层逻辑空间的能力,VPC具有根据用户的情况动态改变其行为的能力。作为一种保护方案,在融合多智能体系统中引入公共策略和私有策略两种策略。这些策略的结合可以实现一个开放、安全的信息共享系统。我们展示了使用该方案的实际示例应用程序
{"title":"Rights Sensitive Information Sharing Space Based on Multi-Agent System","authors":"S. Amamiya, M. Amamiya","doi":"10.1109/ICITA.2005.239","DOIUrl":"https://doi.org/10.1109/ICITA.2005.239","url":null,"abstract":"In the near future, people will be able to access information and resources on the public open network environment. However, few current network environments seem to have unified method for protection of information and resource. This paper proposes a unified resource protection scheme on the basis of fusion of two multi-agent systems called Kodama and VPC. Kodama has the power of constructing flexible hierarchical logical spaces, and VPC has the ability to dynamically change its behavior according to the circumstance of user. As a protection scheme, two kinds of policies called public policy and private policy are introduced into the fused multi-agent system. Combination of these policies makes it possible to realize an open and secure information sharing system. We show practical sample applications using the scheme","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123306019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic address assignment for IPv6 end-to-end multihoming sites IPv6端到端多主站点的自动地址分配
K. Ohira, Youichi Koyama, K. Fujikawa, Y. Okabe
IPv6 site multihoming discussed at the Multi6 working group is one of the hottest topics among many IPv6 related issues in the IETF. We have already proposed a variant of end-to-end multihoming (E2E-MH), where an outgoing packet from a site is routed to a site-exit router by source address dependent (SAD) routing so that it goes out to the transit provider that gives the address prefix of the source address of it. In this paper, we first show that such SAD routing can be implemented with acceptable cost when we apply SAD routing only to default route entries on each router. Next we propose a hierarchical subdivision method for automatic address prefix assignment to links in a site. Connecting the SAD routing setting up on each router with the hierarchical address assignment, all needed configuration of routers can automatically be done, without any pre-configurations about IP address or routing information.
Multi6工作组讨论的IPv6站点多宿主是IETF众多IPv6相关问题中最热门的话题之一。我们已经提出了端到端多宿主(E2E-MH)的一种变体,其中来自站点的传出数据包通过源地址依赖(SAD)路由路由到站点出口路由器,以便它发送到提供其源地址前缀的传输提供者。在本文中,我们首先证明了当我们只对每个路由器上的默认路由项应用SAD路由时,这种SAD路由可以以可接受的成本实现。接下来,我们提出了一种自动地址前缀分配到站点链接的分层细分方法。将每台路由器上的SAD路由设置与分层地址分配连接起来,无需预先配置IP地址或路由信息,即可自动完成路由器所需的所有配置。
{"title":"Automatic address assignment for IPv6 end-to-end multihoming sites","authors":"K. Ohira, Youichi Koyama, K. Fujikawa, Y. Okabe","doi":"10.1109/ICITA.2005.79","DOIUrl":"https://doi.org/10.1109/ICITA.2005.79","url":null,"abstract":"IPv6 site multihoming discussed at the Multi6 working group is one of the hottest topics among many IPv6 related issues in the IETF. We have already proposed a variant of end-to-end multihoming (E2E-MH), where an outgoing packet from a site is routed to a site-exit router by source address dependent (SAD) routing so that it goes out to the transit provider that gives the address prefix of the source address of it. In this paper, we first show that such SAD routing can be implemented with acceptable cost when we apply SAD routing only to default route entries on each router. Next we propose a hierarchical subdivision method for automatic address prefix assignment to links in a site. Connecting the SAD routing setting up on each router with the hierarchical address assignment, all needed configuration of routers can automatically be done, without any pre-configurations about IP address or routing information.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123688721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Web search results with profile comparisons 个性化的Web搜索结果与个人资料比较
J. Lai, B. Soh
The information explosion on the Internet makes it hard for users to obtain required information from the Web searched results in a more personalized way. For the same input word, most search engines return the same result to each user without taking into consideration user preference. For many users, it is no longer sufficient to get non-customized results. It is crucial to analyze users' search and browsing behaviors based on searching keywords entered by users, the clicking rate of each link in the result and the time they spend on each site. To this end, we have proposed a method to derive user searching profiles. We have also proposed a mechanism to derive document profiles, based on similarity score of documents. In this paper, we discuss how to use our model to combine the user searching profiles and the document profile, with a view to presenting customized search results to the users.
互联网上的信息爆炸使得用户很难以更加个性化的方式从网络搜索结果中获取所需的信息。对于相同的输入词,大多数搜索引擎返回相同的结果给每个用户,而不考虑用户的偏好。对于许多用户来说,获得非定制的结果已经不够了。根据用户输入的搜索关键词、结果中每个链接的点击率以及用户在每个网站上花费的时间来分析用户的搜索和浏览行为是至关重要的。为此,我们提出了一种导出用户搜索配置文件的方法。我们还提出了一种基于文档相似度评分的导出文档概要的机制。在本文中,我们讨论了如何使用我们的模型将用户搜索概要和文档概要结合起来,从而向用户呈现自定义的搜索结果。
{"title":"Personalized Web search results with profile comparisons","authors":"J. Lai, B. Soh","doi":"10.1109/ICITA.2005.217","DOIUrl":"https://doi.org/10.1109/ICITA.2005.217","url":null,"abstract":"The information explosion on the Internet makes it hard for users to obtain required information from the Web searched results in a more personalized way. For the same input word, most search engines return the same result to each user without taking into consideration user preference. For many users, it is no longer sufficient to get non-customized results. It is crucial to analyze users' search and browsing behaviors based on searching keywords entered by users, the clicking rate of each link in the result and the time they spend on each site. To this end, we have proposed a method to derive user searching profiles. We have also proposed a mechanism to derive document profiles, based on similarity score of documents. In this paper, we discuss how to use our model to combine the user searching profiles and the document profile, with a view to presenting customized search results to the users.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using fuzzy functions to aggregate usability study data: a novel approach 利用模糊函数聚合可用性研究数据:一种新方法
S. Ramalingam, D. Iourinski
This paper describes an attempt to develop a fuzzy data aggregation technique for analyzing data collected during a groupware usability study. We show the formal parallelism between the decision making problem and that of ranking alternatives in a usability study. This equivalence allows using a combination of decision under uncertainty and multi-criteria decision making (MCDM) techniques for ranking alternatives for developing an approach for ranking alternatives within a usability study. The effectiveness of such approach is then illustrated with experimental data gathered during a usability study conducted by the Ambient Technology Group in Middlesex University.
本文描述了开发一种模糊数据聚合技术的尝试,用于分析在群件可用性研究中收集的数据。在可用性研究中,我们展示了决策问题和备选方案排序问题之间的形式化并行性。这种等价性允许使用不确定性下的决策和多标准决策(MCDM)技术的组合来对备选方案进行排序,从而开发一种在可用性研究中对备选方案进行排序的方法。这种方法的有效性随后由米德尔塞克斯大学环境技术小组进行的可用性研究中收集的实验数据来说明。
{"title":"Using fuzzy functions to aggregate usability study data: a novel approach","authors":"S. Ramalingam, D. Iourinski","doi":"10.1109/ICITA.2005.296","DOIUrl":"https://doi.org/10.1109/ICITA.2005.296","url":null,"abstract":"This paper describes an attempt to develop a fuzzy data aggregation technique for analyzing data collected during a groupware usability study. We show the formal parallelism between the decision making problem and that of ranking alternatives in a usability study. This equivalence allows using a combination of decision under uncertainty and multi-criteria decision making (MCDM) techniques for ranking alternatives for developing an approach for ranking alternatives within a usability study. The effectiveness of such approach is then illustrated with experimental data gathered during a usability study conducted by the Ambient Technology Group in Middlesex University.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service-Cloud Model of Composed Web Services 组合Web服务的服务-云模型
Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang
Dynamic composing Web services provides an efficient mechanism to offer complex large systems. Substantial progress has already been made towards composing Web services. Unfortunately, these approaches cannot build a model of the whole life cycle of composed Web services. In order to solve this problem, we designed a model named Service-Cloud model based on the forming picture of clouds in nature. Service-Cloud model can describe the whole life cycle of the composed Web services: discovery, compose, publish, and terminate. Based on Service-Cloud model, we also designed and implemented a prototype
动态组合Web服务为提供复杂的大型系统提供了一种有效的机制。在组合Web服务方面已经取得了实质性的进展。不幸的是,这些方法不能构建组合Web服务的整个生命周期的模型。为了解决这一问题,我们基于自然界中云的形成图景,设计了一个名为Service-Cloud的模型。服务-云模型可以描述组合Web服务的整个生命周期:发现、组合、发布和终止。基于Service-Cloud模型,我们还设计并实现了一个原型
{"title":"Service-Cloud Model of Composed Web Services","authors":"Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang","doi":"10.1109/ICITA.2005.251","DOIUrl":"https://doi.org/10.1109/ICITA.2005.251","url":null,"abstract":"Dynamic composing Web services provides an efficient mechanism to offer complex large systems. Substantial progress has already been made towards composing Web services. Unfortunately, these approaches cannot build a model of the whole life cycle of composed Web services. In order to solve this problem, we designed a model named Service-Cloud model based on the forming picture of clouds in nature. Service-Cloud model can describe the whole life cycle of the composed Web services: discovery, compose, publish, and terminate. Based on Service-Cloud model, we also designed and implemented a prototype","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126344339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Third International Conference on Information Technology and Applications (ICITA'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1