首页 > 最新文献

2014 IIAI 3rd International Conference on Advanced Applied Informatics最新文献

英文 中文
A Lazy-Updating Snoop Cache Protocol for Transactional Memory 事务性内存的延迟更新窥探缓存协议
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.134
Sekai Ichii, Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama
In this paper, we propose a new Hardware Transactional Memory (HTM) system for a shared-memory multiprocessor in which elementary processors are connected by a single common bus. One of the key features of our system is a modified snoop cache protocol to reduce overheads on the transactional memory consistency control. By publishing all of modified data in a transaction at once when the transaction commits, our system avoids the overhead on the commit, which would arise from a sequential publication (or write-back to main memory) of each data item in the transaction otherwise. Another feature is a virtualization of a cache layer in the memory hierarchy. When a cache must replace a line which contains speculatively modified data, our system dynamically reallocates the address of the line to another location in main memory, and back up the evicted data to a lower layer cache or main memory. The backed-up data is still under the control of the transactional memory consistency through our snoop cache protocol. By enlarging a cache capacity virtually in this manner, our system can support unbounded transactions which are not limited by the hardware resources in the size and the duration.
在本文中,我们提出了一种新的硬件事务性内存(HTM)系统,用于共享内存多处理器,其中基本处理器通过单个公共总线连接。我们系统的关键特性之一是修改的窥探缓存协议,以减少事务性内存一致性控制的开销。通过在事务提交时立即发布事务中所有修改过的数据,我们的系统避免了提交时的开销,否则,事务中每个数据项的顺序发布(或回写到主存)会产生开销。另一个特性是内存层次结构中缓存层的虚拟化。当缓存必须替换包含推测性修改数据的线路时,我们的系统动态地将线路的地址重新分配到主存中的另一个位置,并将被驱逐的数据备份到较低层缓存或主存中。通过我们的窥探缓存协议,备份的数据仍然处于事务性内存一致性的控制之下。通过以这种方式虚拟地扩大缓存容量,我们的系统可以支持不受硬件资源大小和持续时间限制的无限事务。
{"title":"A Lazy-Updating Snoop Cache Protocol for Transactional Memory","authors":"Sekai Ichii, Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama","doi":"10.1109/IIAI-AAI.2014.134","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.134","url":null,"abstract":"In this paper, we propose a new Hardware Transactional Memory (HTM) system for a shared-memory multiprocessor in which elementary processors are connected by a single common bus. One of the key features of our system is a modified snoop cache protocol to reduce overheads on the transactional memory consistency control. By publishing all of modified data in a transaction at once when the transaction commits, our system avoids the overhead on the commit, which would arise from a sequential publication (or write-back to main memory) of each data item in the transaction otherwise. Another feature is a virtualization of a cache layer in the memory hierarchy. When a cache must replace a line which contains speculatively modified data, our system dynamically reallocates the address of the line to another location in main memory, and back up the evicted data to a lower layer cache or main memory. The backed-up data is still under the control of the transactional memory consistency through our snoop cache protocol. By enlarging a cache capacity virtually in this manner, our system can support unbounded transactions which are not limited by the hardware resources in the size and the duration.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Analysis of the Relationship between a Write Access Reduction Method for NVM/DRAM Hybrid Memory with Programming Language Runtime Support and Execution Policies of Garbage Collection 具有编程语言运行时支持的NVM/DRAM混合内存写访问减少方法与垃圾回收执行策略的关系分析
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.128
Gaku Nakagawa, S. Oikawa
There are several research projects about new generation non-volatile memory (NVM), such as STT-MRAM, PCM and ReRAM. Non-volatile main memory makes it possible to integrate secondary storages in main memory. The integration enables to reduce I/O to slow block devices. It is, however, impossible to construct large capacity main memory with a single NVM in this point. It is required to combine DRAM and NVM or combine NVM and another NVM to construct unified non-volatile main memory. The previous researches discussed NVM/DRAM hybrid main memory architecture, which combine PCM and DRAM. In our previous work, we proposed a method to manage NVM/DRAM hybrid main memory with programming language runtimes supports. Language runtimes, such as Java runtimes, have more detailed informaion about write acceess to data than operating system has. The language runtime supports are useful to manage NVM/DRAM hybrid memory therefore. In the proposed method, the runtime migrates objects between NVM and DRAM based on the characteristics of write access. The language runtime executes the migration processes during garbage collection processes. The performance of the proposed method rely on the frequency of garbage collection. In this paper, we will discuss and do an experiment about how the frequency of garbage collection effects the performance of the proposed method. The results of the experiment shows that the improved method cut 91 percent of write access. The results also show that the improved method cut 50 percent of the usage of DRAM.
新一代非易失性存储器(NVM)有几个研究项目,如STT-MRAM、PCM和ReRAM。非易失性主存储器使得在主存储器中集成辅助存储器成为可能。这种集成可以减少I/O以减慢块设备的速度。然而,在这一点上,不可能用单个NVM构建大容量主内存。需要将DRAM与NVM组合或将NVM与另一个NVM组合以构建统一的非易失性主存。以往的研究讨论了将PCM和DRAM相结合的NVM/DRAM混合主存架构。在我们之前的工作中,我们提出了一种具有编程语言运行时支持的管理NVM/DRAM混合主存的方法。语言运行时(如Java运行时)比操作系统拥有更详细的数据写访问信息。因此,语言运行时支持对管理NVM/DRAM混合内存非常有用。在该方法中,运行时基于写访问特性在NVM和DRAM之间迁移对象。语言运行库在垃圾收集过程中执行迁移过程。该方法的性能依赖于垃圾收集的频率。在本文中,我们将讨论并做一个关于垃圾收集频率如何影响所提出方法的性能的实验。实验结果表明,改进后的方法减少了91%的写访问。结果还表明,改进的方法减少了50%的DRAM的使用。
{"title":"An Analysis of the Relationship between a Write Access Reduction Method for NVM/DRAM Hybrid Memory with Programming Language Runtime Support and Execution Policies of Garbage Collection","authors":"Gaku Nakagawa, S. Oikawa","doi":"10.1109/IIAI-AAI.2014.128","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.128","url":null,"abstract":"There are several research projects about new generation non-volatile memory (NVM), such as STT-MRAM, PCM and ReRAM. Non-volatile main memory makes it possible to integrate secondary storages in main memory. The integration enables to reduce I/O to slow block devices. It is, however, impossible to construct large capacity main memory with a single NVM in this point. It is required to combine DRAM and NVM or combine NVM and another NVM to construct unified non-volatile main memory. The previous researches discussed NVM/DRAM hybrid main memory architecture, which combine PCM and DRAM. In our previous work, we proposed a method to manage NVM/DRAM hybrid main memory with programming language runtimes supports. Language runtimes, such as Java runtimes, have more detailed informaion about write acceess to data than operating system has. The language runtime supports are useful to manage NVM/DRAM hybrid memory therefore. In the proposed method, the runtime migrates objects between NVM and DRAM based on the characteristics of write access. The language runtime executes the migration processes during garbage collection processes. The performance of the proposed method rely on the frequency of garbage collection. In this paper, we will discuss and do an experiment about how the frequency of garbage collection effects the performance of the proposed method. The results of the experiment shows that the improved method cut 91 percent of write access. The results also show that the improved method cut 50 percent of the usage of DRAM.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133241029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compromising Strategy Using Weighted Counting in Multi-times Negotiations 基于加权计数的多次协商妥协策略
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.97
Masanori Ikrashi, K. Fujita
Bilateral multi-issue closed negotiation is an important class of real-life negotiations. Usually, negotiation problems have constraints, such as a complex and unknown opponent's utility in real time or time discounting. In the class of negotiation with constraints, effective automated negotiation agents can estimate their opponent's model depending on the proposals of their opponents and the negotiation scenarios. Recently, the attention of this study has focused on interleaving learning with negotiation strategies from past negotiation sessions. By analyzing such previous sessions, agents can estimate their opponent's utility function based on exchanging bids. In this paper, we propose an automated agent that estimates its opponent's strategies based on past negotiation sessions. Our agent decides the estimated values of its opponent using effective weighted functions based on the negotiation time. By using the estimated values of each issue, our agent can calculate its opponent's utility. In addition, we employ the estimated method proposed in this paper to the compromise strategy, which is the agent of the basic strategy of our proposed agent. In our experiments, we compared seven different weighted functions to determine the most effective one. In addition, we demonstrated that our proposed agent has better outcomes and a greater search technique for the Pareto frontier than existing ANAC2013 agents. We also compared our proposed agent and the basic compromising strategy.
双边多议题封闭式谈判是现实谈判的重要类别。通常,谈判问题具有约束条件,如对手的实时效用或时间贴现的复杂性和未知性。在有约束的谈判中,有效的自动谈判代理可以根据对手的提议和谈判场景来估计对手的模型。近年来,本研究的焦点集中在谈判策略的交叉学习上。通过分析这些先前的会话,代理可以根据交换出价来估计对手的效用函数。在本文中,我们提出了一个基于过去谈判会话来估计对手策略的自动代理。我们的智能体使用基于协商时间的有效加权函数来决定对手的估计值。通过使用每个问题的估计值,我们的智能体可以计算对手的效用。此外,我们将本文提出的估计方法应用于妥协策略,妥协策略是我们所提出的代理的基本策略的代理。在我们的实验中,我们比较了七个不同的加权函数,以确定最有效的一个。此外,我们证明了我们提出的代理比现有的ANAC2013代理具有更好的结果和更大的帕累托边界搜索技术。我们还比较了我们提出的代理和基本妥协策略。
{"title":"Compromising Strategy Using Weighted Counting in Multi-times Negotiations","authors":"Masanori Ikrashi, K. Fujita","doi":"10.1109/IIAI-AAI.2014.97","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.97","url":null,"abstract":"Bilateral multi-issue closed negotiation is an important class of real-life negotiations. Usually, negotiation problems have constraints, such as a complex and unknown opponent's utility in real time or time discounting. In the class of negotiation with constraints, effective automated negotiation agents can estimate their opponent's model depending on the proposals of their opponents and the negotiation scenarios. Recently, the attention of this study has focused on interleaving learning with negotiation strategies from past negotiation sessions. By analyzing such previous sessions, agents can estimate their opponent's utility function based on exchanging bids. In this paper, we propose an automated agent that estimates its opponent's strategies based on past negotiation sessions. Our agent decides the estimated values of its opponent using effective weighted functions based on the negotiation time. By using the estimated values of each issue, our agent can calculate its opponent's utility. In addition, we employ the estimated method proposed in this paper to the compromise strategy, which is the agent of the basic strategy of our proposed agent. In our experiments, we compared seven different weighted functions to determine the most effective one. In addition, we demonstrated that our proposed agent has better outcomes and a greater search technique for the Pareto frontier than existing ANAC2013 agents. We also compared our proposed agent and the basic compromising strategy.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study of Continuous Usage Behavior for Online Stock Trading - Domestic Brokers of Securities Industry as Examples 网上股票交易持续使用行为研究——以国内证券业经纪人为例
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.62
Chung-Hung Tsai, Dauw-Song Zhu, S. Wang, Lixia Jian
Under the considerations of trading costs and efficiency, more and more investors choose the way of online stock trading which is fast, convenient, and has preferential fee. The cost of establishing a new customer is five times more than maintaining an old one. As a result, to explore the investors choose continuous usage behavior of online security trading system as reference for security industry to promote and improve relevant business in the future. The model of this study is developed by combining DeLone and McLean's Information System Success Model (D&M IS Success Model) and Technology Acceptance Model (TAM). The variable of "Habit" was collected from "Focus Group" to develop research model. This research consists of 340 valid samples who using domestic opened and operative ones of security e-trade accounts. Then we apply "Structural Equation Modeling" to analyze the data and test hypothesis. Depending on the analysis of real evidences, this study have four conclusions: 1. In overall model, according to exogenous variables, "Habit" is the most effective to "Continuous Usage Behavior" of online stock trading, and followed by "System Quality". It reveals that "Habit" have greatly influence on "Continuous Usage Behavior". 2. In three quality contents, "System Quality" is the most important factor affecting "Continuous Usage Behavior", it is also the only significant factor affecting "Perceived usefulness" and "User Satisfaction", it shows "System Quality" is the major requirement of continued users. 4. We demonstrate that not only "User Satisfaction" positively affects "Using Intention" and further affects "Continuous Usage Behavior" in this study, but also the most important discovery is "Habit" positive affects "Using Intention" and further affects "Continuous Usage Behavior".
在交易成本和效率的考虑下,越来越多的投资者选择了快捷、方便、费用优惠的网上股票交易方式。建立一个新客户的成本是维持一个老客户的五倍。因此,探讨投资者选择持续使用网上证券交易系统的行为,为证券行业未来推动和完善相关业务提供参考。本研究的模型是结合DeLone和McLean的信息系统成功模型(D&M is成功模型)和技术接受模型(TAM)而开发的。从“焦点小组”中收集“习惯”变量,建立研究模型。本研究采用340个有效样本,分别使用国内开立和运营的安全电子交易账户。然后运用结构方程模型对数据进行分析和假设检验。通过对真实证据的分析,本研究得出了四个结论:1。在整个模型中,根据外生变量,“习惯”对在线股票交易的“持续使用行为”最有效,其次是“系统质量”。由此可见,“习惯”对“持续使用行为”有很大的影响。2. 在三个质量内容中,“系统质量”是影响“持续使用行为”的最重要因素,也是影响“感知有用性”和“用户满意度”的唯一显著因素,说明“系统质量”是持续用户的主要需求。4. 在本研究中,我们不仅证明了“用户满意度”正向影响“使用意图”并进一步影响“持续使用行为”,而且最重要的发现是“习惯”正向影响“使用意图”并进一步影响“持续使用行为”。
{"title":"A Study of Continuous Usage Behavior for Online Stock Trading - Domestic Brokers of Securities Industry as Examples","authors":"Chung-Hung Tsai, Dauw-Song Zhu, S. Wang, Lixia Jian","doi":"10.1109/IIAI-AAI.2014.62","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.62","url":null,"abstract":"Under the considerations of trading costs and efficiency, more and more investors choose the way of online stock trading which is fast, convenient, and has preferential fee. The cost of establishing a new customer is five times more than maintaining an old one. As a result, to explore the investors choose continuous usage behavior of online security trading system as reference for security industry to promote and improve relevant business in the future. The model of this study is developed by combining DeLone and McLean's Information System Success Model (D&M IS Success Model) and Technology Acceptance Model (TAM). The variable of \"Habit\" was collected from \"Focus Group\" to develop research model. This research consists of 340 valid samples who using domestic opened and operative ones of security e-trade accounts. Then we apply \"Structural Equation Modeling\" to analyze the data and test hypothesis. Depending on the analysis of real evidences, this study have four conclusions: 1. In overall model, according to exogenous variables, \"Habit\" is the most effective to \"Continuous Usage Behavior\" of online stock trading, and followed by \"System Quality\". It reveals that \"Habit\" have greatly influence on \"Continuous Usage Behavior\". 2. In three quality contents, \"System Quality\" is the most important factor affecting \"Continuous Usage Behavior\", it is also the only significant factor affecting \"Perceived usefulness\" and \"User Satisfaction\", it shows \"System Quality\" is the major requirement of continued users. 4. We demonstrate that not only \"User Satisfaction\" positively affects \"Using Intention\" and further affects \"Continuous Usage Behavior\" in this study, but also the most important discovery is \"Habit\" positive affects \"Using Intention\" and further affects \"Continuous Usage Behavior\".","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Activity Recognition of Learners by Kinect 基于Kinect的学习者活动识别研究
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.45
T. Kamizono, H. Abe, K. Baba, S. Takano, K. Murakami
Understanding the states of learners at a lecture is useful for improving the quality of the lecture. A video camera with an infrared sensor Kinect has been widely studied and proved to be useful for some kinds of activity recognition. However, learners in a lecture usually do not act with large moving. This paper evaluates Kinect for use of activity recognition of learners. The authors considered four activities for detecting states of a learner, and collected the data with the activities by a Kinect. They applied K-nearest neighbor algorithm to the collected data and obtained the accuracy 0.936 of the activity recognition. The result shows that Kinect is applicable also to the activity recognition of learners in a lecture.
在讲座中了解学习者的状态对提高讲座质量很有帮助。带有红外传感器的摄像头Kinect已经被广泛研究,并被证明对某些类型的活动识别很有用。然而,学习者在课堂上通常不会有大的动作。本文评估了Kinect在学习者活动识别方面的应用。作者考虑了检测学习者状态的四种活动,并通过Kinect收集了这些活动的数据。他们对收集到的数据应用k -最近邻算法,得到了活动识别的准确率0.936。实验结果表明,Kinect同样适用于课堂学习者的活动识别。
{"title":"Towards Activity Recognition of Learners by Kinect","authors":"T. Kamizono, H. Abe, K. Baba, S. Takano, K. Murakami","doi":"10.1109/IIAI-AAI.2014.45","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.45","url":null,"abstract":"Understanding the states of learners at a lecture is useful for improving the quality of the lecture. A video camera with an infrared sensor Kinect has been widely studied and proved to be useful for some kinds of activity recognition. However, learners in a lecture usually do not act with large moving. This paper evaluates Kinect for use of activity recognition of learners. The authors considered four activities for detecting states of a learner, and collected the data with the activities by a Kinect. They applied K-nearest neighbor algorithm to the collected data and obtained the accuracy 0.936 of the activity recognition. The result shows that Kinect is applicable also to the activity recognition of learners in a lecture.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115251515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Instructional Design of a Workshop "How a Computer Works" Aimed at Improving Intuitive Comprehension and Motivation 以提高直觉理解和动机为目的的“计算机如何工作”工作坊的教学设计
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.76
Susumu Yamazaki, Takashi Satoh, T. Jiromaru, Nobuyuki Tachi, M. Iwano
After teaching and observing students for several years, we hypothesize that learning programming is difficult for students who cannot imagine concretely how a computer works, or the process by which the CPU accesses memory and I/O via the bus according to coded programs. In this paper, we discuss why we believe it is important for programing education to help students understand how a computer works. We have developed a workshop to help students understand this more intuitively. We surveyed the students to assess their perceptions of the workshop, and we discuss its further development and progress toward use in a future full-scale course.
经过几年的教学和观察,我们假设对于那些不能具体想象计算机如何工作的学生来说,学习编程是困难的,或者CPU根据编码程序通过总线访问内存和I/O的过程。在本文中,我们讨论了为什么我们认为帮助学生理解计算机如何工作对编程教育很重要。我们已经开发了一个研讨会来帮助学生更直观地理解这一点。我们调查了学生,以评估他们对研讨会的看法,并讨论了它的进一步发展和在未来全面课程中使用的进展。
{"title":"Instructional Design of a Workshop \"How a Computer Works\" Aimed at Improving Intuitive Comprehension and Motivation","authors":"Susumu Yamazaki, Takashi Satoh, T. Jiromaru, Nobuyuki Tachi, M. Iwano","doi":"10.1109/IIAI-AAI.2014.76","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.76","url":null,"abstract":"After teaching and observing students for several years, we hypothesize that learning programming is difficult for students who cannot imagine concretely how a computer works, or the process by which the CPU accesses memory and I/O via the bus according to coded programs. In this paper, we discuss why we believe it is important for programing education to help students understand how a computer works. We have developed a workshop to help students understand this more intuitively. We surveyed the students to assess their perceptions of the workshop, and we discuss its further development and progress toward use in a future full-scale course.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated Usage of Heterogeneous Databases for Novice Users 面向新手的异构数据库综合使用
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.145
Ayano Terakawa, T. Hochin, Hiroki Nomiya
This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user's computer. It also joins and/or projects them as required. The syntax identifying a kind of database or file is introduced. The system maintains data by using Array Lists in Java. It is experimentally shown that there is no practical problem in the equijoin of three tables having 100,000 rows in heterogeneous databases.
本文提出了一种能够使用户在不需要任何转换和服务器的情况下集成使用异构数据库的系统。为了统一处理各种数据源,本系统采用Java JDBC (Database Connectivity)对用户计算机上的数据库进行访问。它还根据需要连接和/或投影它们。介绍了识别数据库或文件的语法。系统使用Java中的Array Lists来维护数据。实验表明,在异构数据库中,有10万行的三个表的等量连接没有实际问题。
{"title":"Integrated Usage of Heterogeneous Databases for Novice Users","authors":"Ayano Terakawa, T. Hochin, Hiroki Nomiya","doi":"10.1109/IIAI-AAI.2014.145","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.145","url":null,"abstract":"This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user's computer. It also joins and/or projects them as required. The syntax identifying a kind of database or file is introduced. The system maintains data by using Array Lists in Java. It is experimentally shown that there is no practical problem in the equijoin of three tables having 100,000 rows in heterogeneous databases.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130874563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Dynamic Query Optimization on a Sparql Endpoint by Approximate Inference Processing 基于近似推理处理的Sparql端点动态查询优化
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.42
Yuji Yamagata, Naoki Fukuta
On a retrieval of Linked Open Data using SPARQL, it is important to construct an efficient query that considers its execution cost, especially when the query utilizes inference capability on the endpoint. A query often causes enormous consumption of endpoints' computing resources since it is sometimes difficult to understand and predict what computations will occur on the endpoints. Preventing such an execution of time-consuming queries, approximating the original query could reduce loads of endpoints. In this paper, we present a preliminary idea and its concept on building endpoints having a mechanism to automatically avoid unwanted amount of inference computation by predicting its computational costs and allowing it to transform such a query into speed optimized query. Our preliminary experiment shows a potential benefit on speed optimizations of query executions by applying query rewriting approach. We also present a preliminary prototype system that classifies whether a query execution is time-consuming or not by using machine learning techniques at the endpoint-side.
在使用SPARQL检索Linked Open Data时,构造一个考虑其执行成本的高效查询是很重要的,特别是当查询利用端点上的推理能力时。查询通常会大量消耗端点的计算资源,因为有时很难理解和预测端点上将发生什么计算。防止这种耗时查询的执行,近似原始查询可以减少端点的负载。在本文中,我们提出了一个初步的想法和概念,即构建具有一种机制的端点,通过预测其计算成本并允许其将此类查询转换为速度优化查询来自动避免不必要的推理计算量。我们的初步实验显示了应用查询重写方法对查询执行速度优化的潜在好处。我们还提出了一个初步的原型系统,该系统通过在端点端使用机器学习技术来分类查询执行是否耗时。
{"title":"A Dynamic Query Optimization on a Sparql Endpoint by Approximate Inference Processing","authors":"Yuji Yamagata, Naoki Fukuta","doi":"10.1109/IIAI-AAI.2014.42","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.42","url":null,"abstract":"On a retrieval of Linked Open Data using SPARQL, it is important to construct an efficient query that considers its execution cost, especially when the query utilizes inference capability on the endpoint. A query often causes enormous consumption of endpoints' computing resources since it is sometimes difficult to understand and predict what computations will occur on the endpoints. Preventing such an execution of time-consuming queries, approximating the original query could reduce loads of endpoints. In this paper, we present a preliminary idea and its concept on building endpoints having a mechanism to automatically avoid unwanted amount of inference computation by predicting its computational costs and allowing it to transform such a query into speed optimized query. Our preliminary experiment shows a potential benefit on speed optimizations of query executions by applying query rewriting approach. We also present a preliminary prototype system that classifies whether a query execution is time-consuming or not by using machine learning techniques at the endpoint-side.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125847495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Attractiveness of Facebook in Secondary Students in the Kingdom of Tonga and its Potential Facebook对汤加王国中学生的吸引力及其潜力
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.107
Hans Tobias Sopu, Y. Chisaki, T. Usagawa
Facebook® is a popular social network. There are approximately 1 billion registered users as of 2013. On the other hand, developing countries are starting to take advan- tage of the free platform and capabilities provided through facebook. The Island Kingdom of Tonga located in the South Pacific is also taking advantage of this social network. The secondary students of the Kingdom of Tonga are also curiously and interestingly socializing through facebook. In this paper, we observed through an online survey how much facebook is attracted in high school students and teachers. We also explained a facebook module for Moodle platform version 2.4.3 that was developed to enhance online collaboration in Moodle for students in the Kingdom of Tonga as part of the future works which is also mentioned.
Facebook®是一个流行的社交网络。截至2013年,约有10亿注册用户。另一方面,发展中国家开始利用facebook提供的免费平台和功能。位于南太平洋的汤加王国也在利用这个社交网络。汤加王国的中学生也通过facebook进行有趣的社交活动。在本文中,我们通过一项在线调查来观察高中学生和教师对facebook的吸引力。我们还解释了一个用于Moodle平台2.4.3版本的facebook模块,该模块的开发是为了增强汤加王国学生在Moodle中的在线协作,这也是未来工作的一部分。
{"title":"The Attractiveness of Facebook in Secondary Students in the Kingdom of Tonga and its Potential","authors":"Hans Tobias Sopu, Y. Chisaki, T. Usagawa","doi":"10.1109/IIAI-AAI.2014.107","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.107","url":null,"abstract":"Facebook® is a popular social network. There are approximately 1 billion registered users as of 2013. On the other hand, developing countries are starting to take advan- tage of the free platform and capabilities provided through facebook. The Island Kingdom of Tonga located in the South Pacific is also taking advantage of this social network. The secondary students of the Kingdom of Tonga are also curiously and interestingly socializing through facebook. In this paper, we observed through an online survey how much facebook is attracted in high school students and teachers. We also explained a facebook module for Moodle platform version 2.4.3 that was developed to enhance online collaboration in Moodle for students in the Kingdom of Tonga as part of the future works which is also mentioned.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fundamental Study for Verbalization of Embodied Expertise based on Pattern Recognition 基于模式识别的具身专业知识语化基础研究
Pub Date : 2014-12-01 DOI: 10.1109/IIAI-AAI.2014.182
H. Hojo, Nozomi Nomachi, Yutaro Tomoto, Tsuyoshi Nakamura, M. Kanoh, Koji Yamada
Embodied expertise, which expresses skills of experts, is a kind of tacit knowledge that is difficult to transfer from one person to another by writing it down or verbalizing it. The aim of our study is to translate embodied expertise into explicit knowledge, i.e. onomatopoeias. We call the onomatopoeias "embodied expertise onomatopoeias", which can enable people to understand the skills intuitively and easily. Acquiring embodied expertise onomatopoeias is considered as a problem of pattern recognition. Our study focused on the skills of Japanese penmanship, Pen Shodo, which is Japanese calligraphy using a pen, to translate tacit knowledge into onomatopoeias and investigated the possibility of constructing a training system for these skills.
体现专家技能的专业知识是一种隐性知识,很难通过文字或语言的方式从一个人转移到另一个人。我们研究的目的是将具体的专业知识转化为显性知识,即拟声词。我们称这些拟声词为“具身专业拟声词”,它可以让人们直观、容易地理解这些技能。拟声词的具身经验获取被认为是一个模式识别问题。我们的研究集中在日本书法的技能,Pen Shodo,这是一种用笔书写的日本书法,将隐性知识转化为拟声词,并探讨了构建这些技能培训系统的可能性。
{"title":"Fundamental Study for Verbalization of Embodied Expertise based on Pattern Recognition","authors":"H. Hojo, Nozomi Nomachi, Yutaro Tomoto, Tsuyoshi Nakamura, M. Kanoh, Koji Yamada","doi":"10.1109/IIAI-AAI.2014.182","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.182","url":null,"abstract":"Embodied expertise, which expresses skills of experts, is a kind of tacit knowledge that is difficult to transfer from one person to another by writing it down or verbalizing it. The aim of our study is to translate embodied expertise into explicit knowledge, i.e. onomatopoeias. We call the onomatopoeias \"embodied expertise onomatopoeias\", which can enable people to understand the skills intuitively and easily. Acquiring embodied expertise onomatopoeias is considered as a problem of pattern recognition. Our study focused on the skills of Japanese penmanship, Pen Shodo, which is Japanese calligraphy using a pen, to translate tacit knowledge into onomatopoeias and investigated the possibility of constructing a training system for these skills.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125324175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 IIAI 3rd International Conference on Advanced Applied Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1