126 results on '"Technical presentations"'
Search Results
2. Design of pedagogic tools for teaching materials in product design engineering
- Author
-
Patiño Santa, L.F. and Patiño Santa, L.F.
- Abstract
The education in materials constitutes a vital part of the education of an engineer, since its comprehension determines the design and construction of products with appropriate materials that satisfy the current and future needs of the 21st century society [1]. In the Product Design Engineering degree, teaching and learning the attributes and applications of materials shouldn't be limited to lectures. This paper shows how through the design of pedagogic tools it is possible to go from a knowledge-transfer method to a student-centred method where motivation, teaching and learning strategies and problem-based learning, support meaningful learning [2] through the implementation of these tools in the classroom. © 2015, The Design Society. All rights reserved.
- Published
- 2021
3. Physical model studies of innovative oil containment boom designs
- Author
-
Baker, S., Cornett, A., Potter, S., McKinney, K., Babaei, H., and Pilechi, V.
- Subjects
contamination ,speed ,oil spills ,technical presentations - Abstract
The objective of this research was to develop, assess and validate alternative boom designs that would allow containment and collection of oil spills in water at higher speeds than currently possible using conventional boom technologies. A comprehensive series of two- and three-dimensional CFD simulations and large-scale physical model experiments were conducted investigating the oil containment performance characteristics of several innovative boom concepts (and multiple variations thereof) at high speeds. Both the simulations and experiments considered varying quantities of low, medium, and high-viscosity oils. This paper discusses the physical scale model experiments in detail. The boom concepts investigated in this research included conventional designs with a single skirt and innovative designs incorporating ramps or permeable screen barriers to manage the oil slick at higher speeds. The extensive laboratory testing and computational modelling revealed that innovative boom designs are able to safely and effectively contain oil at speeds up to 3 knots or more. Effective high-speed booms will make it possible to contain and recover oil spilled into fast-flowing rivers, estuaries and coastal waters, and accelerate oil recovery operations in open water environments., 43rd AMOP Technical Seminar on Environmental Contamination and Response 2021, June 8-10, 2021, Virtual, Online, Canada
- Published
- 2021
4. Primjena elektroničkog učenja u nastavi ronjenja autonomnom ronilačkom opremom.
- Author
-
Drašinac, Gordan and Ružić, Ivica
- Abstract
Copyright of Conference Proceedings International Scientific & Professional Conference Contemporary Issues in Economy & Technology, CIET is the property of University of Split, Department of Professional Studies and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2014
5. On the Relevance of Cross-project Learning with Nearest Neighbours for Commit Message Generation
- Author
-
Etemadi, Khashayar, Monperrus, Martin, Etemadi, Khashayar, and Monperrus, Martin
- Abstract
Commit messages play an important role in software maintenance and evolution. Nonetheless, developers often do not produce high-quality messages. A number of commit message generation methods have been proposed in recent years to address this problem. Some of these methods are based on neural machine translation (NMT) techniques. Studies show that the nearest neighbor algorithm (NNGen) outperforms existing NMT-based methods, although NNGen is simpler and faster than NMT. In this paper, we show that NNGen does not take advantage of cross-project learning in the majority of the cases. We also show that there is an even simpler and faster variation of the existing NNGen method which outperforms it in terms of the BLEU_4 score without using cross-project learning., QC 20210216
- Published
- 2020
- Full Text
- View/download PDF
6. Illuminating a Blind Spot in Digitalization - Software Development in Sweden's Private and Public Sector
- Author
-
Borg, Marcus, Wernberg, Joakim, Olsson, Thomas, Franke, Ulrik, Andersson, Martin, Borg, Marcus, Wernberg, Joakim, Olsson, Thomas, Franke, Ulrik, and Andersson, Martin
- Abstract
As Netscape co-founder Marc Andreessen famously remarked in 2011, software is eating the world - becoming a pervasive invisible critical infrastructure. Data on the distribution of software use and development in society is scarce, but we compile results from two novel surveys to provide a fuller picture of the role software plays in the public and private sectors in Sweden, respectively. Three out of ten Swedish firms, across industry sectors, develop software in-house. The corresponding figure for Sweden's government agencies is four out of ten, i.e., the public sector should not be underestimated. The digitalization of society will continue, thus the demand for software developers will further increase. Many private firms report that the limited supply of software developers in Sweden is directly affecting their expansion plans. Based on our findings, we outline directions that need additional research to allow evidence-informed policy-making. We argue that such work should ideally be conducted by academic researchers and national statistics agencies in collaboration. © 2020 ACM., Open access
- Published
- 2020
- Full Text
- View/download PDF
7. Society-Level Software Governance : A Challenging Scenario
- Author
-
Musil, Juergen, Musil, Angelika, Weyns, Danny, Biffl, Stefan, Musil, Juergen, Musil, Angelika, Weyns, Danny, and Biffl, Stefan
- Abstract
The technology-driven transformation process continues to spawn novel, growth-oriented digital application domains and platforms. The user base of these society-level software systems consists of a larger proportion of the community and that involve a large set of stakeholder groups. In case of an incident there is a public demand from a variety of stakeholders for multilateral intervention in order to correct the behavior of the software system. For software engineering as a technical discipline that has been fostered and matured in corporate and organizational context, this is a major challenge because it has to deal with a multitude of multidisciplinary stakeholders and their concerns. In order to stimulate further discussions, we discuss software governance on societal level and identify future research challenges of this increasingly relevant topic. © 2020 ACM.
- Published
- 2020
- Full Text
- View/download PDF
8. Effective Communication: Excellence in a Technical Presentation [DSP Education].
- Author
-
Padgett, W.T. and Yoder, M.A.
- Abstract
"DSP Education" introduces a cycle on "effective communication." This cycle includes articles on technical presentations, technical writing, technical management, and preparation for entrepreneurship. [ABSTRACT FROM PUBLISHER]
- Published
- 2008
- Full Text
- View/download PDF
9. Dialogic Negotiations: A Reflective Tale of Collaboration Across the Academic-Practitioner Divide.
- Author
-
Palmeri, Jason and Tuten, Paul M.
- Subjects
- *
BUSINESS negotiation , *COLLECTIVE bargaining , *INTERCOMPANY transactions , *BUSINESS presentations , *SALES presentations , *INFORMATION services - Abstract
This article explores the dialogic negotiation processes that can enable professional communication academics and practitioners to collaborate in designing, implementing, and writing up research. Drawing on our experiences conducting a collaborative academic-practitioner case study of technical sales presentations in an executive briefing centen we outline the ways in which we dialogically negotiated research questions, data collection and analysis, theoretical frameworks, organizational contexts, identifications, and interpersonal connections. We then discuss potential limitations of academic-practitioner collaborations and conclude by offering a tentative, contextual list of "best practices" for facilitating successful collaboration across the academic-practitioner divide. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
10. Towards auto-scaling existing transactional databases with strong consistency
- Author
-
Michael A. Georgiou, Michael Sirivianos, Herodotos Herodotou, and Aristodemos Paphitis
- Subjects
Database ,Computer science ,Elasticity (data store) ,Strong consistency ,Scalability ,02 engineering and technology ,Electrical Engineering - Electronic Engineering - Information Engineering ,computer.software_genre ,Replication (computing) ,Elasticity ,Consistency (database systems) ,Relational database management system ,020204 information systems ,Middleware ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Engineering and Technology ,020201 artificial intelligence & image processing ,Technical presentations ,Relational database systems ,computer ,Database replication - Abstract
Existing relational database systems often suffer from rapid increases or significant variability of transactional workloads but lack support for scalability or elasticity. Database replication has been employed to scale workload performance but past approaches make various performance versus consistency tradeoffs and typically lack the mechanisms and policies for dynamically adding and removing replicas. This paper presents Hihooi, a replication-based middleware system that is able to achieve scalability, strong consistency, and elasticity for existing transactional databases. These features are enabled by (i) a novel replication algorithm for propagating database modifications asynchronously and consistently to all replicas at high speeds, and (ii) a new routing algorithm for directing incoming transactions to consistent replicas. Our experimental evaluation validates the high scalability and elasticity benefits offered by Hihooi, which form the key ingredients towards a truly auto-scaling system.
- Published
- 2019
11. Concurrency defect localization in embedded systems using static code analysis : An evaluation
- Author
-
Johansson, Bjarne, Papadopoulos, Alessandro, Nolte, Thomas, Johansson, Bjarne, Papadopoulos, Alessandro, and Nolte, Thomas
- Abstract
Defects with low manifestation probability, such as concurrency defects, are difficult to find during testing. When such a defect manifests into an error, the low likelihood can make it time-consuming to reproduce the error and find the root cause. Static Code Analysis (SCA) tools have been used in the industry for decades, mostly for compliance checking towards guidelines such as MISRA. Today, these tools are capable of sophisticated data and execution flow analysis. Our work, presented in this paper, evaluates the feasibility of using SCA tools for concurrency defect detection and localization. Earlier research has categorized concurrency defects. We use this categorization and develop an object-oriented C++ based test suite containing defects from each category. Secondly, we use known and real defects in existing products' source code. With these two approaches, we perform the evaluation, using tools from some of the largest commercial actors in the field. Based on our results, we provide a discussion about how to use static code analysis tools for concurrency defect detection in complex embedded real-Time systems.
- Published
- 2019
- Full Text
- View/download PDF
12. Renewable energy awareness in vocational and technical education
- Author
-
Erkan Kaçan
- Subjects
Engineering ,student ,Restructuring process ,Alternative Energy Sources Technology Programme ,Alternative energy source ,Renewable energy source ,Awareness level ,Developing country ,Surveys ,Vocational and technical educations ,Renewable energy sources ,Engineering education ,One-way ANNOVA test ,Vocational education ,Developing countries ,alternative energy ,renewable resource ,Mathematics education ,Students ,Technology programmes ,Renewable Energy, Sustainability and the Environment ,business.industry ,Significant difference ,vocational education ,Vocational school ,Renewable energy resources ,Test (assessment) ,Renewable energy ,Statistically significant difference ,energy resource ,Technical presentations ,Alternative Energy Sources Technology ,Programme ,Natural resources ,developing world ,business ,Demography - Abstract
The vocational-technical education (V-TE) system has started a restructuring process recently especially in developing countries. In this study, the awareness level for renewable energy sources of individuals related with V-TE is investigated. Awareness survey for renewable energy sources is applied among the participants who are subdivided to different groups with respect to their gender, role in V-TE system and educational-social status. There is no statistically significant difference observed with respect to gender according to the results; (t((138)) = 0.027, p = 0.978 > 0.05). The participants are investigated in 5 different groups as "students in the Department of Electric and Energy (DEE) in Vocational School (VS)", "graduates from DEE in VS", "students in VS", "graduates from VS" and "parents of the students in VS". According to the One-Way ANNOVA test results (F-(4,F-135)=4.402, p = 0.002
- Published
- 2015
- Full Text
- View/download PDF
13. Material selection study for the brush type arctic skimmers
- Subjects
pickups ,contamination ,diesel fuels ,fuel oils ,technical presentations ,SDG 14 - Life Below Water ,macros ,testing ,SDG 11 - Sustainable Cities and Communities ,marine pollution - Abstract
The objective of the study was to test several bristle materials, which are designed for arctic brush skimmers, and find out the possible differences in their performance with two different oil type and in three temperatures. Additional objective was to clarify the possible correlation between the results from Wilhelmy plate experiments and macro-scale test results. The tests were performed in the collaboration with VTT and SYKE. Two test drums from both bristle materials were manufactured for the macro scale tests, one for marine diesel oil and one for heavy fuel oil. The design of the drums and bristles were predefined to enable the comparison of the results. The test program was two-fold; in the first phase totally 11 different materials were tested with the Wilhelmy plate method in order to determine the surface tension of the particular test oil with the bristle materials. According to the Wilhelmy plate measurements, two materials were selected for the macro-scale tests. The tests were carried out according to a specific test program particularly prepared for the macro-scale tests. All the tests were performed without water or ice, and depending on the oil type and temperature, each test was repeated 5 or 10 times. The results indicated that the differences in the oil pick-up rates were smaller with heavy fuel oil than with marine diesel oil, and different materials had diverse trends in the variation of the pick-up rates between the test runs. In addition, the correlation between the Wilhelmy plate experiments and the macro scale tests could be observed.
- Published
- 2017
14. Material selection study for the brush type arctic skimmers
- Author
-
Jukka Sassi, Tommi Vuorinen, and Jorma Rytkönen
- Subjects
pickups ,contamination ,diesel fuels ,fuel oils ,technical presentations ,SDG 14 - Life Below Water ,macros ,testing ,SDG 11 - Sustainable Cities and Communities ,marine pollution - Abstract
The objective of the study was to test several bristle materials, which are designed for arctic brush skimmers, and find out the possible differences in their performance with two different oil type and in three temperatures. Additional objective was to clarify the possible correlation between the results from Wilhelmy plate experiments and macro-scale test results. The tests were performed in the collaboration with VTT and SYKE. Two test drums from both bristle materials were manufactured for the macro scale tests, one for marine diesel oil and one for heavy fuel oil. The design of the drums and bristles were predefined to enable the comparison of the results. The test program was two-fold; in the first phase totally 11 different materials were tested with the Wilhelmy plate method in order to determine the surface tension of the particular test oil with the bristle materials. According to the Wilhelmy plate measurements, two materials were selected for the macro-scale tests. The tests were carried out according to a specific test program particularly prepared for the macro-scale tests. All the tests were performed without water or ice, and depending on the oil type and temperature, each test was repeated 5 or 10 times. The results indicated that the differences in the oil pick-up rates were smaller with heavy fuel oil than with marine diesel oil, and different materials had diverse trends in the variation of the pick-up rates between the test runs. In addition, the correlation between the Wilhelmy plate experiments and the macro scale tests could be observed.
- Published
- 2017
15. The Art of Technical and Scientific Writing
- Author
-
VIEIRA, A.
- Subjects
Scientific writing ,technical presentations ,technical reports ,lcsh:Electronic computers. Computer science ,lcsh:QA75.5-76.95 - Abstract
In this work we present some guidelines and advices concerning preparation, presentation and writing of scientific and technical texts. Particular attention is given to college level reports. Some principles and effective examples are given.
- Published
- 2011
16. Exploring the use of information visualization for digital libraries
- Author
-
Zaphiris, Panayiotis, Gill, Kulvinder, Ma, Terry H.-Y., Wilson, Stephanie, Petrie, Helen, and Ζαφείρης, Παναγιώτης
- Subjects
Geographic information system ,Computer Networks and Communications ,Computer science ,Graphical user interfaces ,Computer supported cooperative work ,Software prototyping ,Education ,World Wide Web ,Humanities ,Information visualization ,Participatory design ,Visualization ,Information analysis ,Digital libraries ,business.industry ,Cognitive systems ,Arts ,Digital library ,Data science ,Human-Computer Interaction ,Key (cryptography) ,Systems design ,Technical presentations ,User interface ,business ,Decision making ,Information Systems - Abstract
This paper presents the findings from a study conducted to explore the current and future use of information visualization (IV) for digital libraries (DL). A series of query techniques and participatory design workshops were employed with the goal of actively involving users in identifying the key characteristics and applications of IV for DLs. The methodology employed, key findings and overall conclusions are presented and discussed.
- Published
- 2004
- Full Text
- View/download PDF
17. Foreword: 1st International Workshop on High Performance Computing for Big Data
- Author
-
Kaya, Kamer, Gedik, Buğra, and Çatalyürek, Ümit V.
- Subjects
International workshops ,Big data ,High performance computing (HPC) ,Parallel processing ,Technical presentations ,High performance computing ,Data problems - Abstract
Date of Conference: 9-12 Sept. 2014 Conference name: 43rd International Conference on Parallel Processing Workshops, 2014 The 1st International Workshop on High Performance Computing for Big Data (HPC4BD) is held on September 10, 2014 in concordance with 43rd International Conference on Parallel Processing (ICPP-2014). The workshop aimed to bring high performance computing (HPC) experts and experts from various application domains together to discuss their Big Data problems. There were four works accepted to be presented in this year's workshop. This foreword presents a summary of the them. © 2014 IEEE.
- Published
- 2014
18. Integration of occupational risk prevention courses in engineering degrees: Delphi study
- Author
-
Joaquín Catalá, José M. Cortés, Eugenio Pellicer, and Universidad de Sevilla. Departamento de Ingeniería y Ciencia de los Materiales y del Transporte
- Subjects
Risk ,DELPHI study ,Professional competence ,Occupational therapy ,Engineering ,medicine.medical_specialty ,Delphi methodology ,Strategy and Management ,Four-point ,Delphi method ,European universities ,Surveys ,Delphi ,Occupational safety and health ,Engineering education ,Likert scale ,Education ,Information flows ,University degree ,medicine ,Risks ,Exploratory research ,PROYECTOS DE INGENIERIA ,Curriculum ,Occupational safety ,Curricula ,Civil and Structural Engineering ,Engineering degrees ,Medical education ,Occupational risks ,business.industry ,Prevention ,Education and training ,Professional development ,Bologna Process ,Occupational Risk ,Occupational ,Engineering management ,Risk management ,Spain ,Safety culture ,Industrial relations ,Technical presentations ,Bologna process ,business - Abstract
Engineering syllabi often lack courses covering occupational risk prevention. In Spain, professional competences are awarded along with the completion of a university degree. This means that new graduates are certified in areas in which they have received little or no training, such as occupational risk prevention. However, the academic reforms established by the Bologna Process, which strives to homogenize university degrees throughout Europe, compels European universities to design new syllabi. The main goal of this paper is to define a framework for including occupational risk-prevention education in the new engineering syllabi. This exploratory research applied the Delphi methodology to a panel of 59 experts, using questionnaires assessed with a four-point Likert scale through two rounds. A website supported the information flow. According to the experts who participated in this study, education and training in occupational risk-prevention is essential for improving the safety culture within a company or workplace. The experts concurred that this subject should be a separate mandatory course in all engineering degree programs. The participants recommended that an optional course should be considered only if a mandatory course is not approved. It was also deemed desirable to integrate occupational risk prevention as a cross-field subject in other technological courses, even if the curriculum already includes some related courses. © 2012 American Society of Civil Engineers.
- Published
- 2012
19. Ecotoxicity of canola and tallow biodiesel blends to selected soil organisms
- Author
-
Rocheleau, S., Sarrazin, M., Dodard, S., Beaulieu, C., Hawari, J., Hollebone, B.P., Yang, Z., and Sunahara., G.
- Subjects
dehydrogenase activity ,toxicity test ,Paraffins ,Environmental contamination ,advanced fuels ,deleterious effects ,earthworm Eisenia fetida ,n-Alkanes ,Contamination ,accidental release ,petroleum diesel ,Toxicity ,fossil fuel resources ,Fossil fuels ,ecotoxicity ,AMOP ,soil organisms ,lolium perenne ,biodiesel blends ,energy research and development ,seedling emergence ,Soils ,Technical presentations ,Biodiesel ,direct contact ,dry soil ,toxicity assays ,Sulfur ,aquatic toxicity ,environmental concerns - Abstract
In view of depleting fossil fuel resources and environmental concern, biodiesel couldpotentially replace petroleum-derived diesel. Aquatic toxicity of diesel and biodiesel has beenextensively studied over the past decades but little is still known about their toxicity in soilenvironment. The scope of this study was to evaluate the environmental impact of biodiesel,biodiesel blends and petroleum diesel in soil using direct contact toxicity assays. The selectedbiodiesels included canola-source biodiesel (B100 and B20). and tallow-source biodiesel (B100and B20), which were compared to petroleum ultra-low-sulfur based diesel (ULSD). Selectedstandard terrestrial toxicity tests included ryegrass Lolium perenne seedling emergence andgrowth, earthworm Eisenia fetida survival, and soil microbial dehydrogenase activity. Soilcharacterization included the quantification of total extractable materials (corresponding to the n-alkane range of C10-C34). Preliminary results indicate that: 1) canola and tallow B20 biodieselblends were less toxic to earthworm than ULSD; 2) canola and tallow B20 blends had similartoxic effects to ryegrass as ULSD; and 3) petroleum ULSD inhibited the DHA activity at allconcentrations tested, and B20 canola biodiesel had a deleterious effect on the DHA activity atthe lowest nominal loadings tested (1 and 10 ml/kg dry soil). Therefore, this study providesuseful toxicological data for the evaluation of potential adverse impact of biodiesel in theenvironment, such as an accidental release or spill. This project was funded by EnvironmentCanada and Natural Resources Canada and is part of the Advanced Fuels and Technologies forEmissions Reduction (AFTER) Program for energy research and development (PERD)., 35th AMOP Technical Seminar on Environmental Contamination and Response, 5 June 2012 through 7 June 2012, Vancouver, BC
- Published
- 2012
20. Architectural viewpoints for global software development
- Author
-
Bugra Mehmet Yildiz and Bedir Tekinerdogan
- Subjects
EWI-23742 ,Coordinated activity ,Engineering ,GeneralLiterature_MISCELLANEOUS ,Meta model ,Architectural pattern ,Domain analysis ,Architectural views ,View model ,Software design ,Software architecture design ,IR-87805 ,Design decisions ,business.industry ,Software architecture ,Software development ,Viewpoints ,Global Software Development ,Architectural Viewpoint ,Architecture Modeling ,Metamodeling ,Coordination and Control ,Technical presentations ,business ,Software engineering - Abstract
Date of Conference: 15-18 Aug. 2011 Global Software Development (GSD) can be considered as the coordinated activity of software development that is not localized and central but geographically distributed. Designing an appropriate software architecture of a GSD system is important to meet the requirements for the communication, coordination and control of the distributed GSD teams. A common practice in software architecture design is to apply architectural views to model the design decisions for the various stakeholder concerns. Unfortunately, existing architectural viewpoint approaches are general-purpose and not directly dedicated towards GSD projects. In this paper we propose six architectural viewpoints that have been specifically defined to model GSD systems. The architectural viewpoints are based on a meta-model that has been derived after a thorough domain analysis of the GSD literature. © 2011 IEEE.
- Published
- 2011
21. IEEE First Workshop on Collaborative Modeling and Simulation (CoMetS 2010)
- Author
-
Giuseppe Iazeolla, Daniele Gianni, Joachim Fuchs, and Andrea D'Ambrogio
- Subjects
Ubiquitous computing ,Collaborative environments ,Collaborative modeling ,Collaborative systems ,Collaborative technologies ,Innovative research ,Modeling and simulation, Computer simulation ,Computer supported cooperative work ,Innovation, Technical presentations ,Computer science ,Modeling and simulation ,Computer simulation ,computer.software_genre ,World Wide Web ,Engineering management ,Collaboration ,Technical presentations ,Innovation ,Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni ,computer - Abstract
The CoMetS workshop aims to bring together leading researchers and practitioners from both the modeling and simulation (M&S) community and the collaborative environments community, in order to focus on innovative research contributions that address both the use of collaborative technologies in the field of M&S and the use of M&S methodologies and tools to address the design of collaborative systems. This paper reports on the motivations of the workshop and the organization of its first edition.
- Published
- 2010
22. Fiber Optic Networks for Distributed Radio Architectures: FUTON Concept and Operation
- Author
-
Paulo P. Monteiro, Esther Lopez, Nathan J. Gomes, Atilio Gameiro, Silvia Pato, and David Wake
- Subjects
Signal processing ,Optical fiber ,Wireless communications ,Computer science ,Optical link ,Optical links ,Radio-over-fiber ,Context (language use) ,02 engineering and technology ,law.invention ,Research and development ,020210 optoelectronics & photonics ,Radio over fiber ,Fiber optic networks ,Mobile antennas ,law ,Units prototypes ,Radio architectures ,0202 electrical engineering, electronic engineering, information engineering ,Wireless telecommunication systems ,Wireless ,Optical communication ,Wireless networks ,High data rate ,Network architecture ,Wireless network ,business.industry ,Communication ,020206 networking & telecommunications ,Distributed antenna system ,Remote antenna units ,4th Generation (4G) ,Fiber-optic communication ,Fibers ,Technical presentations ,Antenna (radio) ,business ,Computer network - Abstract
The growing importance of wireless communications has been driving the research and development of advanced network architectures to enable the cost-effective support of large numbers of users at very high data rates. In this context, the FUTON project aims to fulfil the objectives of the so-called 4th Generation (4G) wireless communications through an innovative Distributed Antenna System (DAS) with centralized signal processing. An overview of the FUTON concept is presented in this paper, with emphasis on the optical link design for radio-over-fiber communication providing the virtual-MIMO functionalities between multiple remote antenna units with a centralized processing site. Also, the units being fabricated for the final demonstration are described, and some preliminary measurements are presented. © 2010 IEEE.
- Published
- 2010
- Full Text
- View/download PDF
23. Modulated strip-line leaky-wave antenna using a printed grating lens and a surface-wave source
- Author
-
Karu P. Esselle, Al P. Freundorfer, Yahia M. M. Antar, Ladislau Matekovits, and Symon K. Podilchak
- Subjects
Leaky wave antennas ,Radar systems ,Materials science ,Far field ,Aperture ,Leaky wave antenna ,Grating lens ,In-phase ,Beam steering ,Beam pattern ,Near and far field ,Satellite communications ,Optical instruments ,Grating ,Dielectric slabs ,High-impedance surfaces ,law.invention ,Microstrip antenna ,Optics ,Electromagnetism ,Microwave antennas ,law ,Lens antennas ,Lenses ,Low profile ,business.industry ,Planar antennas ,Satellite communication systems ,Beam pattern, Beam scanning, Dielectric slabs, Far field, Gain values, Grating lens, High-impedance surfaces, In-phase, Leaky wave antennas, Leaky waves, Low profile, Metallic gratings, Planar antennas, Reflection loss, Satellite communications ,Electromagnetism, Lenses, Microwave antennas, Optical instruments, Radar systems, Satellite communication systems, Surface waves, Technical presentations ,Surface waves ,Gain values ,Leaky waves ,Lens (optics) ,Reflection loss ,Surface wave ,Beam scanning ,Technical presentations ,Metallic gratings ,business - Abstract
A planar antenna that utilize surface waves (SWs) for leaky wave (LW) excitation is investigated. Specifically, a surface-wave launcher (SWL) is employed to excite cylindrical SWs which are bound to a grounded dielectric slab (GDS). By the addition of a grid of width-modulated printed strips, a high impedance surface (HIS) can be realized, providing appropriate conditions for LW radiation. A planar metallic grating lens is also included in the design of the antenna to achieve in phase leakage along the aperture. Far field beam pattern results suggest one-sided beam scanning between 22 and 24 GHz with reflection losses below 10 dB and gain values of 8.7 dBi at broadside. Such a printed or planar low-cost and low-profile LWA may be advantageous for radar systems and satellite communications.
- Published
- 2010
24. Do you get it? User-evaluated explainable BDI agents
- Subjects
Interactive storytelling ,Scenario-based training ,Pedagogical systems ,User evaluations ,Autonomous agents ,Training ,Technical presentations ,Quantitative analysis ,BDI Agent ,Multi agent systems - Abstract
In this paper we focus on explaining to humans the behavior of autonomous agents, i.e., explainable agents. Explainable agents are useful for many reasons including scenario-based training (e.g. disaster training), tutor and pedagogical systems, agent development and debugging, gaming, and interactive storytelling. As the aim is to generate for humans plausible and insightful explanations, user evaluation of different explanations is essential. In this paper we test the hypothesis that different explanation types are needed to explain different types of actions. We present three different, generically applicable, algorithms that automatically generate different types of explanations for actions of BDI-based agents. Quantitative analysis of a user experiment (n=30), in which users rated the usefulness and naturalness of each explanation type for different agent actions, supports our hypothesis. In addition, we present feedback from the users about how they would explain the actions themselves. Finally, we hypothesize guidelines relevant for the development of explainable BDI agents. © 2010 Springer-Verlag Berlin Heidelberg.
- Published
- 2010
25. Do you get it? User-evaluated explainable BDI agents
- Author
-
Broekens, J., Harbers, M., Hindriks, K., Bosch, K. van den, Jonker, C., Meyer, J.J.C., and TNO Defensie en Veiligheid
- Subjects
Interactive storytelling ,Scenario-based training ,Pedagogical systems ,User evaluations ,Autonomous agents ,Training ,Technical presentations ,Quantitative analysis ,BDI Agent ,Multi agent systems - Abstract
In this paper we focus on explaining to humans the behavior of autonomous agents, i.e., explainable agents. Explainable agents are useful for many reasons including scenario-based training (e.g. disaster training), tutor and pedagogical systems, agent development and debugging, gaming, and interactive storytelling. As the aim is to generate for humans plausible and insightful explanations, user evaluation of different explanations is essential. In this paper we test the hypothesis that different explanation types are needed to explain different types of actions. We present three different, generically applicable, algorithms that automatically generate different types of explanations for actions of BDI-based agents. Quantitative analysis of a user experiment (n=30), in which users rated the usefulness and naturalness of each explanation type for different agent actions, supports our hypothesis. In addition, we present feedback from the users about how they would explain the actions themselves. Finally, we hypothesize guidelines relevant for the development of explainable BDI agents. © 2010 Springer-Verlag Berlin Heidelberg.
- Published
- 2010
26. The Algebra of Adjacency Patterns: Rees Matrix Semigroups with Reversion
- Author
-
Marcel Jackson and Mikhail V. Volkov
- Subjects
Pure mathematics ,Unary operation ,REES MATRIX SEMIGROUP ,GRAPH THEORY ,Lattice (discrete subgroup) ,Matrix (mathematics) ,MATRIX ALGEBRA ,Limit (category theory) ,Computer Science::Logic in Computer Science ,FOS: Mathematics ,UNIVERSAL HORN CLASS ,TECHNICAL PRESENTATIONS ,Mathematics ,20M07, 08C15, 05C15, 20M17 ,FINITE BASIS PROBLEM ,Mathematics::Operator Algebras ,Directed graph ,Mathematics - Logic ,COMPUTER SCIENCE ,Trivial group ,MEMBERSHIP PROBLEM ,Adjacency list ,GRAPH ,UNARY SEMIGROUP VARIETY ,VARIETY MEMBERSHIP PROBLEM ,Variety (universal algebra) ,Logic (math.LO) ,UNARY SEMIGROUP IDENTITY ,MATRIX ,SEMI-GROUP ,UNIVERSAL HORN SENTENCE - Abstract
We establish a surprisingly close relationship between universal Horn classes of directed graphs and varieties generated by so-called adjacency semigroups which are Rees matrix semigroups over the trivial group with the unary operation of reversion. In particular, the lattice of subvarieties of the variety generated by adjacency semigroups that are regular unary semigroups is essentially the same as the lattice of universal Horn classes of reflexive directed graphs. A number of examples follow, including a limit variety of regular unary semigroups and finite unary semigroups with NP-hard variety membership problems., 30 pages, 9 figures
- Published
- 2010
27. Time delay estimation in cognitive radio systems
- Author
-
Hasari Celebi, Khalid A. Qaraqe, H. Vincent Poor, Fatih Kocak, Huseyin Arslan, Sinan Gezici, and Gezici, Sinan
- Subjects
FOS: Computer and information sciences ,Mathematical optimization ,Step time ,Computational complexity theory ,Computer Science - Information Theory ,Cognitive radio ,Radio systems ,Cramer-Rao lower bound ,Signal-to-noise ratio ,Cramer Rao lower bound ,Communication complexity ,Mathematics ,Estimation ,Diversity ,Sensors ,Information Theory (cs.IT) ,Maximum-likelihood ,Bandwidth (signal processing) ,Cognitive systems ,Estimator ,Cramer-Rao bounds ,Time delay estimation ,Asymptotic optimality ,Theoretical result ,Maximum likelihood estimation ,Radio ,Computational complexity ,ON time ,Simulation result ,Theoretical limits ,Technical presentations ,Cramér–Rao bound ,Algorithm ,Time delay - Abstract
In cognitive radio systems, secondary users can utilize multiple dispersed bands that are not used by primary users. In this paper, time delay estimation of signals that occupy multiple dispersed bands is studied. First, theoretical limits on time delay estimation are reviewed. Then, two-step time delay estimators that provide trade-offs between computational complexity and performance are investigated. In addition, asymptotic optimality properties of the two-step time delay estimators are discussed. Finally, simulation results are presented to explain the theoretical results., To appear at CAMSAP 2009
- Published
- 2009
28. Information Hovering in Vehicular Ad-Hoc Networks
- Author
-
Xeros, Andreas, Lestas, Marios, Andreou, Maria I., Pitsillides, Andreas, Ioannou, Petros A., Pitsillides, Andreas [0000-0001-5072-2851], and Xeros, Andreas [0000-0002-6616-5954]
- Subjects
Washington ,Ad hoc networks ,Specific time ,Computer science ,Wireless ad hoc network ,Probability functions ,Interval (mathematics) ,Microscopic simulation ,Low markets ,Intelligent vehicle highway systems ,Traffic densities ,Probabilistic flooding ,New concept ,Mobile sets ,computer.programming_language ,Geographical area ,Vehicular ad hoc networks ,Information need ,business.industry ,Telecommunication networks ,Probabilistic logic ,Vehicles ,Reachability ,Electron transitions ,Road network ,VisSim ,Motor transportation ,Gaussians ,Technical presentations ,Mobile telephony ,business ,Reference models ,computer ,Computer network - Abstract
Information Hovering is a relatively new concept of information dissemination over a mobile set of peers. It naturally applies in many applications in Vehicular Ad-Hoc Networks, where useful information needs to be made available to all vehicles within a confined geographical area for a specific time interval. A straightforward approach, is to have all vehicles within the hovering area exchange messages with each other. However, this method does not guarantee that all vehicles within the hovering area will receive the message due to potential partitioning of the network in areas with low traffic density and/or low market penetration rate. In this work, we address the problem by applying probabilistic flooding schemes outside the hovering area. Informed vehicles outside the hovering area can serve as information bridges towards partitioned uninformed areas thus leading to high reachability.We consider a number of rebroadcast probability functions and we evaluate their performance using the microscopic simulation tool VISSIM. Our reference model represents a section of the road network in the cities of Bellevue and Redmond in Washington. The obtained results indicate that probabilistic flooding with a Gaussian like probability function outperforms other approaches by achieving high reachability values and a relatively small number of exchanged messages. © 2009 IEEE. Conference code: 79889 Cited By :6
- Published
- 2009
- Full Text
- View/download PDF
29. Millimeter-wave scale metamaterials
- Author
-
Kamil Boratay Alici, Ekmel Ozbay, and Özbay, Ekmel
- Subjects
Angular width ,Materials science ,Frequency band ,Transmission band ,Narrow frequency band ,Millimeter waves ,Radiometers ,Refractive index ,Physics::Optics ,Directional patterns (antenna) ,Millimeter wave devices ,Radiation pattern ,Split-ring resonator ,Optics ,Electronic equipment ,Frequency bands ,Far field radiation patterns ,Propagation direction ,Infrared radiation ,100 GHz ,business.industry ,Research ,Terahertz waves ,Metamaterial ,Horn antenna ,Number of layers ,Metamaterials ,Extremely high frequency ,Negative index of refraction ,Technical presentations ,Low loss ,business ,Metamaterial antenna - Abstract
Conference name: 2009 International Workshop Terahertz and Mid Infrared Radiation: Basic Research and Practical Applications Date of Conference: 3-6 November 2009 We review two metamaterial configurations, which are operating at the millimeter-wave scale, in terms of design, fabrication, and characterization. We observed both numerically and experimentally at around 100 GHz a narrow frequency band for which the metamaterial was low loss and had a negative index of refraction. We investigated flat and wedge shaped samples to support our characterization results. We analyzed the transmission band with respect to number of layers at the propagation direction and commented on the bulk nature of these metamaterials. Oblique response of the planar sample was also included in this study. Finally, we demonstrate a device, which yields a rather small angular width at the far field radiation pattern, and composed of a horn antenna and flat metamaterial slabs at the propagation direction. ©2009 IEEE.
- Published
- 2009
- Full Text
- View/download PDF
30. Integrated Platform for Autonomic Computing
- Author
-
Panayiotou, Christoforos, Fytros, E., Tsetsos, V., Samaras, George S., Hadjiefthymiades, S., and Piquet, D.
- Subjects
Component ,Sensor networks ,Ad hoc networks ,Ubiquitous computing ,Large scale systems ,Computer science ,Wireless ad hoc network ,Distributed computing ,Information Dissemination ,Mobile computing ,Context- awareness ,Certain rule ,Autonomic computing ,Autonomic Computing ,Software fault tolerance ,Mobile nodes ,Integrated platform ,Pervasive computing ,Information services ,Short-range communication ,Middleware ,Stateless protocol ,New applications ,Sensors ,business.industry ,Communication ,Distribution channel ,Sensing components ,Application components ,Short range communications ,Application creation environments ,Autonomic applications ,Service creation environment ,Context aware services ,Technical presentations ,Mobile middleware ,Mobile telephony ,business ,Computer network - Abstract
IPAC (Integrated Platform for Autonomic Computing) aims at delivering a middleware and service creation environment for developing embedded, intelligent, collaborative, context-aware services in mobile nodes. IPAC relies on short range communications for the ad hoc realization of dialogs among collaborating nodes. Advanced sensing components leverage the context-awareness attributes of IPAC, thus rendering it capable of delivering highly innovative applications for mobile and pervasive computing. IPAC networking capabilities are based on rumour spreading techniques, a stateless and resilient approach, and information dissemination among embedded nodes. Spreading of information is subject to certain rules (e.g., space, time, price). IPAC nodes may receive, store, assesses and possibly relay the incoming content to other nodes. The same distribution channel is followed for the dissemination of new applications and application components that "join the IPAC world". © 2009 IEEE. Conference code: 78373 Cited By :1
- Published
- 2009
- Full Text
- View/download PDF
31. Designing needs statements in a systematic iterative way
- Author
-
Verstegen, D.M.L., Barnard, Y.F., Pilot, A., and TNO Defensie en Veiligheid
- Subjects
Simulations ,Internet ,E - learnings ,Instructional designers ,Design ,Authoring tools and methods ,Interdisciplinary projects ,E-learning ,Media in education ,Instructional designs ,Specifications ,Workshop participants ,Training ,User requirements ,Technical presentations ,Case studies ,Take alls ,Multimedia systems - Abstract
Designing specifications for technically advanced instructional products, such as e-learning, simulations or simulators requires different kinds of expertise. The SLIM method proposes to involve all stakeholders from the beginning in a series of workshops under the guidance of experienced instructional designers. These instructional designers ensure that specifications are designed in a systematic, iterative, way based on instructional design and development models. The workshop participants, however, bring in all the necessary information and they take all the decisions. The SLIM method is geared towards the first phase of the instructional design process: designing a needs statement in the form of a first set of global user requirements. It has been used in eight case studies. The results of these case studies have led to improvements to the method and suggestions for further research. 1. Introduction 2. Problem and setting 3. Basic principles underlying the SLIM method 4. The SLIM method 4.1. Research questions 5. Case studies: method 5.1. Procedure 5.2. The cases 6. Case studies: results 6.1. Development of adequate needs statements 6.2. Iteration 6.3. The required amount of time 6.4. The number and kind of participants 6.5. The role of facilitators 7. Conclusions and recommendations 8. Future work Acknowledgements References
- Published
- 2009
32. Designing needs statements in a systematic iterative way
- Subjects
Simulations ,Internet ,E - learnings ,Instructional designers ,Design ,Authoring tools and methods ,Interdisciplinary projects ,E-learning ,Media in education ,Instructional designs ,Specifications ,Workshop participants ,Training ,User requirements ,Technical presentations ,Case studies ,Take alls ,Multimedia systems - Abstract
Designing specifications for technically advanced instructional products, such as e-learning, simulations or simulators requires different kinds of expertise. The SLIM method proposes to involve all stakeholders from the beginning in a series of workshops under the guidance of experienced instructional designers. These instructional designers ensure that specifications are designed in a systematic, iterative, way based on instructional design and development models. The workshop participants, however, bring in all the necessary information and they take all the decisions. The SLIM method is geared towards the first phase of the instructional design process: designing a needs statement in the form of a first set of global user requirements. It has been used in eight case studies. The results of these case studies have led to improvements to the method and suggestions for further research.
- Published
- 2009
33. Piecewise smooth signal denoising via principal curve projections
- Author
-
Umut Ozertem, Deniz Erdogmus, Orhan Arikan, and Arıkan, Orhan
- Subjects
Signal processing ,Piece wises ,Common problems ,Piecewise smoothes ,Signal ,Gibbs phenomenon ,symbols.namesake ,Wavelet ,Nonparametric ,Total variations ,Mathematics ,Learning systems ,business.industry ,Signal reconstruction ,Gibbs phenomenons ,Pattern recognition ,Filter (signal processing) ,Wavelet coefficients ,Total variation denoising ,Principal curves ,Signal denoising ,Denoised signals ,Denoising algorithms ,Computer Science::Computer Vision and Pattern Recognition ,Piecewise ,symbols ,Step detection ,Technical presentations ,Artificial intelligence ,business ,Robot learning - Abstract
Date of Conference: 16-19 Oct. 2008 Conference name: 2008 IEEE Workshop on Machine Learning for Signal Processing One common problem in signal denoising is that if the signal has a blocky, in other words a piecewise-smooth structure, the denoised signal may suffer from oversmoothed discontinuities or exhibit artifacts very similar to Gibbs phenomenon. In the literature, total variation methods and some modifications on the signal reconstructions based on wavelet coefficients are proposed to overcome these problems. We take a novel approach by introducing principal curve projections as an artifact-free signal denoising filter alternative. The proposed approach leads to a nonparametric denoising algorithm that does not lead to Gibbs effect or so-called staircase type unnatural artifacts in the denoised signal. ©2008 IEEE.
- Published
- 2008
34. Automated Web Services Composition with the Event Calculus
- Author
-
Nihan Kesim Cicekli, Ilyas Cicekli, and Onur Aydın
- Subjects
Web standards ,medicine.medical_specialty ,Web services compositions ,Web development ,Differentiation (calculus) ,Web service compositions ,Computer science ,Web service composition ,computer.software_genre ,Event calculus ,Mathematical techniques ,World Wide Web ,Planning capabilities ,medicine ,Chemical analysis ,Semantic Web Stack ,Data Web ,Web services ,business.industry ,Planning ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Process engineering ,Technical presentations ,Web service ,Calculations ,business ,WS-Policy ,Composite processes ,computer ,Web modeling ,Event calculuses ,Generic processes - Abstract
Date of Conference: 22-24 October, 2007 Conference name: International Workshop on Engineering Societies in the Agents World. ESAW 2007: Engineering Societies in the Agents World VIII As the web services proliferate and complicate it is becoming an overwhelming job to manually prepare the web service compositions which describe the communication and integration between web services. This paper analyzes the usage of the Event Calculus, which is one of the logical action-effect definition languages, for the automated preparation and execution of web service compositions. In this context, abductive planning capabilities of the Event Calculus are utilized. It is shown that composite process definitions in OWL-S can be translated into Event Calculus axioms so that planning with generic process definitions is possible within this framework. © 2008 Springer-Verlag Berlin Heidelberg.
- Published
- 2008
- Full Text
- View/download PDF
35. Channel polarization: A method for constructing capacity-achieving codes
- Author
-
Erdal Arikan
- Subjects
Block code ,Information theory ,Symmetry properties ,Combinatorics ,Code sequences ,Channel capacity ,Polarization ,International symposium ,Programming theory ,Input channels ,Time complexity ,Computer Science::Information Theory ,Mathematics ,Discrete mathematics ,Symmetric capacity ,Discrete memoryless channel ,Codes (symbols) ,Full Rate ,Channel coding ,Linear code ,Codes (standards) ,Technical presentations ,Binary code ,Cybernetics ,Binary sequences ,Decoding methods ,Full rate ,Communication channel - Abstract
Date of Conference: 6-11 July 2008 Conference name: 2008 IEEE International Symposium on Information Theory A method is proposed, called channel polarization, to construct code sequences that achieve the symmetric capacity I(W) of any given binary-input discrete memoryless channel (B-DMC) W. The symmetric capacity I(W) is the highest rate achievable subject to using the input letters of the channel equiprobably and equals the capacity C(W) if the channel has certain symmetry properties. Channel polarization refers to the fact that it is possible to synthesize, out of N independent copies of a given B-DMC W, a different set of N binary-input channels such that the capacities of the latter set, except for a negligible fraction of them, are either near 1 or near 0. This second set of N channels are well-conditioned for channel coding: one need only send data at full rate through channels with capacity near 1 and at 0 rate through the others. The main coding theorem about polar coding states that, given any B-DMC W with I(W) > 0 and any fixed 0 < δ < I(W), there exist finite constants n1 (W, δ) and c(W, δ) such that for all n ≥ n1, there exist polar codes with block length N = 2n, rate R > I(W)-δ, and probability of block decoding error Pe ≤ cN-1/4. The codes with this performance can be encoded and decoded within complexity O(N log N). © 2008 IEEE.
- Published
- 2008
- Full Text
- View/download PDF
36. Robust estimation with applications to phase and envelope estimation in frequency selective wireless fading channels
- Author
-
Socratous, Y., Charalambous, Charalambos D., Georghiades, C. N., and Charalambous, Charalambos D. [0000-0002-2168-0231]
- Subjects
Optimization ,Uncertain modeling ,Mathematical optimization ,Information theory ,Kullback–Leibler divergence ,Relative entropy ,Fading wireless channels ,Fading channels ,Variational methods ,Joint probability distribution ,International symposium ,Fading ,Wireless fading channels ,Mathematics ,Multi-path ,Robust estimations ,Maximization ,Fading (radio) ,Minimax ,A posteriori ,Joint distributions ,Frequency-selective ,Probability distribution ,Frequency estimation ,Technical presentations ,Mini-max ,Estimation ,Cybernetics ,Algorithm ,Multipath propagation ,Sufficient statistic - Abstract
This paper derives robust niiniinax estimators for a class of uncertain models. The uncertainty is described by a relative entropy constraint between the unknown joint distribution and a fixed nominal joint distribution. The maximization is addressed using variational methods, while the minimization is addressed using the concept of a sufficient statistic, which is an unnormalized version of the a posteriori density. The theory developed is applied to multipath fading wireless channels, to derive minimax envelope and phase estimates. Related results are also derived when the uncertainty shrinks to zero. © 2008 IEEE. 1238 1242
- Published
- 2008
- Full Text
- View/download PDF
37. Identifying Failures in Grids through Monitoring and Ranking
- Author
-
Zeinalipour-Yazdi, Constantinos D., Neocleous, Kyriacos, Georgiou, Chryssis, Dikaiakos, Marios D., Georgiou, Chryssis [0000-0003-4360-0260], Zeinalipour-Yazdi, Constantinos D. [0000-0002-8388-1549], Dikaiakos, Marios D. [0000-0002-4350-6058], and Neocleous, Kyriacos [0000-0002-2445-5814]
- Subjects
Job scheduler ,Job scheduling ,Computer science ,Distributed computing ,02 engineering and technology ,computer.software_genre ,Grid ,Adaptive systems ,Scheduling (computing) ,Grid computing ,Ranking ,GRID environments ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,Technical presentations ,International symposium ,020201 artificial intelligence & image processing ,Experimental evaluations ,Data mining ,computer ,Computer networks - Abstract
In this paper we present FailRank, a novel framework for integrating and ranking information sources that characterize failures in a grid system. After the failing sites have been ranked, these can be eliminated from the job scheduling resource pool yielding in that way a more predictable, dependable and adaptive infrastructure. We also present the tools we developed towards evaluating the FailRank framework. In particular, we present the FailBase Repository which is a 38GB corpus of state information that characterizes the EGEE Grid for one month in 2007. Such a corpus paves the way for the community to systematically uncover new, previously unknown patterns and rules between the multitudes of parameters that can contribute to failures in a Grid environment. Additionally, we present an experimental evaluation study of the FailRank system over 30 days which shows that our framework identifies failures in 93% of the cases. We believe that our work constitutes another important step towards realizing adaptive Grid computing systems. © 2008 IEEE. 291 298 Conference code: 73523 Cited By :2
- Published
- 2008
- Full Text
- View/download PDF
38. Fault model identification with Petri nets
- Author
-
Cabasino, M. P., Giua, A., Hadjicostis, Christoforos N., Seatzu, C., and Hadjicostis, Christoforos N. [0000-0002-1706-708X]
- Subjects
Marine biology ,Net systems ,Structure (mathematical logic) ,Engineering ,Discrete event systems ,Event (computing) ,business.industry ,Distributed computing ,Linguistics ,Petri nets ,Fault identifications ,Unobservable ,Hardware_PERFORMANCEANDRELIABILITY ,Petri net ,Fault (power engineering) ,Fault detection and isolation ,Graph theory ,Identification (information) ,Electric fault location ,Faulty transitions ,Fault modeling ,Technical presentations ,Fault model ,business - Abstract
Most of the fault identification problems in the Discrete Event Systems literature assume knowledge of the structure of the net system, including the nature (and behavior) of the possible faults. In this paper we deal with this problem within the framework of Petri nets by removing the requirement that the nature (and behavior) of the fault is known. In particular, we devise a way to identify the structure of the faulty transitions of the system given its language. Then, we generalize this procedure to unobservable faults, in which case the structure of the faulty system needs to be recognized from the knowledge of the structure of the fault-free system, and the projection of the faulty system language on the set of non-faulty events, that are assumed to be observable. ©2008 IEEE. 455 461
- Published
- 2008
- Full Text
- View/download PDF
39. Designing mechanisms for reliable internet-based computing
- Author
-
Fernández Anta, Antonio, Georgiou, Chryssis, Mosteiro, Miguel A., Georgiou, Chryssis [0000-0003-4360-0260], and Fernández Anta, Antonio [0000-0001-6501-2377]
- Subjects
Service (systems architecture) ,Mechanism design ,Internet ,Game-theoretic models ,Computer science ,business.industry ,Reliability (computer networking) ,Distributed computing ,Internet-based computing ,computer.software_genre ,Computer systems ,Reliability ,Set (abstract data type) ,Task (computing) ,Grid computing ,Mechanisms ,The Internet ,Resource management ,Technical presentations ,International symposium ,business ,computer ,Game theory ,Computer networks - Abstract
In this work, using a game-theoretic approach, cost-sensitive mechanisms that lead to reliable Internet-based computing are designed. In particular, we consider Internet-based master-worker computations, where a master processor assigns, across the Internet, a computational task to a set of potentially untrusted worker processors and collects their responses. Several game-theoretic models that capture the nature of the problem are analyzed and mechanisms that, for each given set of cost and system parameters, achieve high reliability are designed. Additionally, two specific realistic system scenarios are studied. These scenarios are a system of volunteering computing like SETI, and a company that buys computing cycles from Internet computers and sells them to its customers in the form of a task-computation service. Notably, under certain conditions, non redundant allocation yields the best trade-off between cost and reliability. © 2008 IEEE. 315 324 Sponsors: IEEE Comput. Soc. Technical Committee on Distributed Processing Akamai Technologies, Inc. International Research Institute on Autonomic Network Computing Conference code: 73523 Cited By :11
- Published
- 2008
40. Developing and evaluating a meeting assistant test bed
- Subjects
Questionnaires ,Interactive computer systems ,Learning systems ,GeneralLiterature_INTRODUCTORYANDSURVEY ,Data recording ,Surveys ,Equipment testing ,Audio-video capture ,Meeting assistant ,Technical presentations ,Test facilities ,Evaluation ,Remote meetings ,Flow interactions ,Robot learning - Abstract
A test bed has been developed in which participants are tasked to work in simulated, scenario based, projects in which face-to-face and remote meetings of about 45 minutes have to be held. Measures on performance, team factors and remote aspects are automatically collected with electronic questionnaires. The sensitivity and reliability of these questionnaires are positively evaluated. The test bed is now ready to be used for evaluating how well meeting assistants support collocated meetings and videoconferencing. © 2008 Springer-Verlag Berlin Heidelberg.
- Published
- 2008
41. Developing and evaluating a meeting assistant test bed
- Author
-
Post, W.M., Lincoln, M., and TNO Defensie en Veiligheid
- Subjects
Questionnaires ,Interactive computer systems ,Learning systems ,GeneralLiterature_INTRODUCTORYANDSURVEY ,Data recording ,Surveys ,Equipment testing ,Audio-video capture ,Meeting assistant ,Technical presentations ,Test facilities ,Evaluation ,Remote meetings ,Flow interactions ,Robot learning - Abstract
A test bed has been developed in which participants are tasked to work in simulated, scenario based, projects in which face-to-face and remote meetings of about 45 minutes have to be held. Measures on performance, team factors and remote aspects are automatically collected with electronic questionnaires. The sensitivity and reliability of these questionnaires are positively evaluated. The test bed is now ready to be used for evaluating how well meeting assistants support collocated meetings and videoconferencing. © 2008 Springer-Verlag Berlin Heidelberg.
- Published
- 2008
42. Use Cases, Requirements and Assessment Criteria for Future Self-Organising Radio Access Networks
- Author
-
Neil Scully, Kathleen Spaey, Thomas Jansen, Mehdi Amirijoo, Martin Döttling, Ulrich Türke, R. Litjens, and TNO Informatie- en Communicatietechnologie
- Subjects
Computer science ,Use cases ,Quantitative comparisons ,Self-healing ,One hands ,Assessment criterions ,Network operations center ,Set (abstract data type) ,Wireless ,Cybernetics ,Optimisation ,Use case ,Wireless networks ,Computer. Automation ,Access network ,business.industry ,Wireless network ,Network operations ,Radio access networks ,Risk analysis (engineering) ,Software deployment ,Technical requirements ,Technical presentations ,business ,Wireless access networks ,Computer network - Abstract
Self-organisation (self-optimisation, self-configuration, and self-healing) methods are a promising concept to automate wireless access network planning, deployment and optimisation. This paper contains a mind setting exercise. First the mechanisms for which self-organisation is anticipated to be effective and feasible are identified. Then technical and non-technical requirements that need to be taken into account for the successful development of self-organisation functionalities are discussed. Furthermore, a set of metrics and appropriate reference cases (benchmarks) are presented, which allow to do on one hand a quantitative comparison of the different algorithms developed for a given use case, and on the other hand to evaluate the gains from self-organisation by comparing self-organisation solutions with the case of manual network operations. © 2008 Springer Berlin Heidelberg.
- Published
- 2008
- Full Text
- View/download PDF
43. Decision-level fusion for audio-visual laughter detection
- Subjects
Level fusions ,Interactive computer systems ,ComputingMethodologies_PATTERNRECOGNITION ,Audio visuals ,Learning systems ,GeneralLiterature_INTRODUCTORYANDSURVEY ,ComputerApplications_MISCELLANEOUS ,Automatic detections ,Technical presentations ,Decision levels ,Video classifiers ,Flow interactions ,Robot learning - Abstract
Laughter is a highly variable signal, which can be caused by a spectrum of emotions. This makes the automatic detection of laughter a challenging, but interesting task. We perform automatic laughter detection using audio-visual data from the AMI Meeting Corpus. Audio-visual laughter detection is performed by fusing the results of separate audio and video classifiers on the decision level. This results in laughter detection with a significantly higher AUC-ROC than single-modality classification. © 2008 Springer-Verlag Berlin Heidelberg.
- Published
- 2008
44. Verification of initial-state opacity in security applications of DES
- Author
-
Saboori, A., Hadjicostis, Christoforos N., and Hadjicostis, Christoforos N. [0000-0002-1706-708X]
- Subjects
Opacity ,Observer (quantum physics) ,Discrete event systems ,Optical properties ,business.industry ,Estimation problems ,Security applications ,Estimator ,Cryptography ,State (functional analysis) ,Set (abstract data type) ,Control theory ,State estimators ,Technical presentations ,Initial states ,Map projection ,business ,Algorithm ,State estimation ,Event (probability theory) ,Mathematics - Abstract
Motivated by security applications where the initial state of a system needs to be kept secret (opaque) to outside observers (intruders), we formulate, analyze and verify the notion of initial-state opacity in discrete event systems. Specifically, a system is initial-state opaque if the membership of its true initial state to a set of secret states remains opaque to an intruder who is modeled as an observer of the system activity through some projection map. In other words, based on observations through this map, the observer is never certain that the initial state of the system is within the set of secret states. To verify initial-state opacity, we address the initial-state estimation problem in discrete event systems via the construction of an initial-state estimator. This estimator captures estimates of the initial state of the system which are consistent with all observations obtained so far. We also analyze the properties and complexity of the initial-state estimator. ©2008 IEEE. 328 333
- Published
- 2008
45. A formal approach to aggregated belief formation
- Author
-
Heuvelink, A., Klein, M.C.A., Treur, J., TNO Defensie en Veiligheid, Artificial intelligence, and Social AI
- Subjects
TheoryofComputation_MISCELLANEOUS ,Aggregates ,Operationality ,Formal methods ,Term algebra ,Agents ,Reasoning processes ,Formal approaches ,Algebra ,Memory ,Applications ,Technical presentations ,Belief aggregation - Abstract
This paper introduces a formal method to aggregate over basic beliefs, in order to deduce aggregated or complex beliefs as often used in applications. Complex beliefs can represent several things, such as a belief about a period in which other beliefs held or the minimal or maximal certainty with which a belief held. As such they contain richer information than the basic beliefs they are aggregated from and can be used to optimize an agent's search through its memory and its reasoning processes. The developed method can also aggregate over aggregated beliefs, hence nested aggregations are possible. An implementation in Prolog demonstrates its operationality. © 2008 Springer-Verlag Berlin Heidelberg.
- Published
- 2008
- Full Text
- View/download PDF
46. Texture synthesis based simulation of secondary agents
- Author
-
Kyriakou, M., Chrysanthou, Yiorgos L., and Chrysanthou, Yiorgos L. [0000-0001-5136-8890]
- Subjects
Example based ,Current states ,Computer games ,Virtual agents ,Technical presentations ,Textures ,Agents ,Virtual Characters ,Realistic simulations ,Texture synthesis ,Game theory ,Inert gas welding ,Work in progresses - Abstract
Realistic simulation of virtual characters is essential in many applications and particularly in computer games. Having a realistic simulation of an agent is a complex matter since there are many different ways in which the real equivalent would have responded in real life. In addition a human viewer is very accustomed to observing other humans so the slightest inconsistency will be picked up. The complexity of the task increases when we address the simulation of groups of virtual agents interacting amongst them. In this paper we argue that, given the current state of the art, example based methods provide a lot of promise in addressing the realistic simulation. We start by discussing the recently proposed example based methods and then continue to present a novel approach based on texture synthesis. Although it is still work in progress, some preliminary results indicate that this is a viable approach that could potentially achieve results not so easily reached with rule based methods. © 2008 Springer Berlin Heidelberg. 5277 LNCS 1 10 Sponsors: GATE project NLGD Festival of Games Conference code: 74866 Cited By :3
- Published
- 2008
47. Use cases, requirements and assessment criteria for future self-organising radio access networks
- Subjects
Network operations ,Technical requirements ,Use cases ,Quantitative comparisons ,Self-healing ,Technical presentations ,Optimisation ,Radio access networks ,One hands ,Assessment criterions ,Wireless networks ,Cybernetics ,Wireless access networks - Abstract
Self-organisation (self-optimisation, self-configuration, and self-healing) methods are a promising concept to automate wireless access network planning, deployment and optimisation. This paper contains a mind setting exercise. First the mechanisms for which self-organisation is anticipated to be effective and feasible are identified. Then technical and non-technical requirements that need to be taken into account for the successful development of self-organisation functionalities are discussed. Furthermore, a set of metrics and appropriate reference cases (benchmarks) are presented, which allow to do on one hand a quantitative comparison of the different algorithms developed for a given use case, and on the other hand to evaluate the gains from self-organisation by comparing self-organisation solutions with the case of manual network operations. © 2008 Springer Berlin Heidelberg.
- Published
- 2008
48. An abstract channel specification and an algorithm implementing it using Java sockets
- Author
-
Georgiou, Chryssis, Shvartsman, A. A., Musiał, Peter M., Sonderegger, E. L., and Georgiou, Chryssis [0000-0003-4360-0260]
- Subjects
Information theory ,Java ,Computer science ,Distributed computing ,Semantics ,Specifications ,Conformal mapping ,Computer programming languages ,Communication channels (information theory) ,Formal specification ,Abstracting ,Code generation ,International symposium ,Boolean functions ,Computer networks ,computer.programming_language ,Automata theory ,Input/output automata ,Formal methods ,Distributed algorithm ,Asynchronous communication ,Applications ,Java sockets ,Algorithm design ,Technical presentations ,Translation (languages) ,computer ,Algorithm - Abstract
Models and specifications can be used in the design of distributed applications to formally reason about their safety properties. However, the benefits of using formal methods are often negated by the ad hoc process of mapping the semantics of an abstract specification to algorithms designed to be executed on target distributed platforms. The challenge of formally specifying communication channels and correctly implementing them as algorithms that use realistic distributed system services is the focus of this paper. This work provides an original formal specification of an abstract asynchronous communication channel with support for dynamic creation and tear down of links between participating network nodes, and its implementation as an algorithm using Java sockets. The specification and the algorithm are expressed using the Input/Output Automata formalism, and it is proved that the algorithm correctly implements the specification, viz. that any externally observable behavior (trace) of the algorithm has a corresponding behavior of the specification. The approach presented here can be used to implement algorithms for dynamic systems, where communicating nodes may join, leave, and experience delays. The result is also of direct benefit to automated code generation, such as that implemented within the Input/Output Automata Toolkit at MIT. © 2008 IEEE. 211 219 Sponsors: IEEE Comput. Soc. Technical Committee on Distributed Processing Akamai Technologies, Inc. International Research Institute on Autonomic Network Computing Conference code: 73523 Cited By :2
- Published
- 2008
49. Automatic recognition of spontaneous emotions in speech using acoustic and lexical features
- Author
-
Raaijmakers, S., Truong, K.P., and TNO Defensie en Veiligheid
- Subjects
Interactive computer systems ,User interfaces ,Emotional speeches ,Classifiers ,Learning systems ,Acoustics ,Speech recognition ,emotions ,Video games ,Feature levels ,Audio acoustics ,Automatic recognitions ,Classification performances ,Lexical features ,Speech analysis ,Technical presentations ,Flow interactions ,Robot learning ,Boosting algorithms ,Spontaneous emotions - Abstract
We developed acoustic and lexical classifiers, based on a boosting algorithm, to assess the separability on arousal and valence dimensions in spontaneous emotional speech. The spontaneous emotional speech data was acquired by inviting subjects to play a first-person shooter video game. Our acoustic classifiers performed significantly better than the lexical classifiers on the arousal dimension. On the valence dimension, our lexical classifiers usually outperformed the acoustic classifiers. Finally, fusion between acoustic and lexical features on feature level did not always significantly improve classification performance. © 2008 Springer-Verlag Berlin Heidelberg.
- Published
- 2008
50. On the capacity of a class of MIMO channels subject to normed uncertainty
- Author
-
Loyka, S., Charalambous, Charalambos D., and Charalambous, Charalambos D. [0000-0002-2168-0231]
- Subjects
Optimization ,Mathematical optimization ,Two types ,Spectral norms ,Information theory ,Worst-case channel ,Covariance matrix ,MIMO ,Matrix norm ,Topology ,Matrix algebra ,Multiplexing ,Channel capacity ,Communication channels (information theory) ,Arsenic compounds ,Mi mo channels ,Wireless telecommunication systems ,International symposium ,Channel matrices ,Mathematics ,Computer Science::Information Theory ,Mim devices ,Covariance ,Food additives ,Saddle points ,Chlorine compounds ,Mutual information ,Channel state information ,Error analysis ,Closed-form solutions ,Norm (mathematics) ,Technical presentations ,Eigenvectors ,Partial channel state information ,Cybernetics ,Communication channel - Abstract
The compound capacity of uncertain MIMO channels is considered, when the channel is modeled by a class described by an induced norm constraint. Within this framework, two types of classes are investigated, namely, additive and multiplicative uncertainties subject to a spectral norm constraint, using partial channel state information at the transmitter side. The compound capacity is defined as a maxmin of the mutual information, corresponding to the capacity of the class, in which the minimization is done over the class of channels while the maximization is done over the transmit covariance. Closed form solutions for the compound capacity of the classes are obtained while several properties related to transmit and received eigenvectors are presented. It is also shown that capacity of the class of channels is equal to the worst-case channel capacity, while establishing a saddle-point property. Additionally, explicit closed-from solutions are given for the capacity-achieving Tx covariance matrix and the worst-case channel uncertainty. The effect of uncertainty is shown to be equivalent to an SNR loss which is proportional to the size of the uncertainty of the channel matrix measured by the spectral norm. © 2008 IEEE. 2578 2582
- Published
- 2008
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.