共查询到19条相似文献,搜索用时 850 毫秒
1.
一个改进的传统协商模型和算法 总被引:2,自引:2,他引:0
在传统的Agent协商方法里,博弈论方法和启发式方法解决了很多复杂的系统问题并且得到了广泛的应用,但是现有的协商模型还过于抽象。通过对对手模型,自身模型和环境模型的相互关系及相应算法的进一步阐述可以较好地解决这一问题,并对发展辩论协商模型和传统协商的实际应用具有帮助。 相似文献
2.
3.
首先提出了自动信任协商的通用形式化框架,并将典型的信任协商策略规约到上述框架内;其次,基于上述形式化框架对自动信任协商的形式化验证问题进行了定义,确定了形式化验证的目标以及一般流程;再次,研究了典型信任协商策略的形式化验证问题,讨论了相关问题的计算复杂性并得到系列结论;最后,利用逻辑编程方法和模型检测方法实现了自动信任协商的形式化验证。实验结果表明,规则数是影响形式化验证系统运行时间的关键因素,逻辑编程方法和模型检测方法在规则较少时效率较高,但逻辑编程方法的可扩展性不及模型检测方法。 相似文献
4.
Agent和多Agent系统(Multi—Agent Syste璐,简称MAS)正在成为人工智能研究实用化和在分布计算环境下的软件智能化的重要技术。协商策略是Agent协商的一个重要问题,选择有效的策略,可以有效地提高协商的效率。提出了一个策略选择算法,并以此为基础,在协商模型中运用预测结果,对协商模型进行了优化,使Agent在协商过程中能根据自己的需要来缩短协商进程,同时获得合理的收益,提高协商过程的可控性。最后通过实验证明了工作的有效性。 相似文献
5.
在环境受限的无线通信网络环境中,身份认证和会话密钥的协商是确保通信双方能否建立安全会话的关键。为使认证和密钥建立协议中采用的密码技术能适合受限通信环境中的应用,提出一个基于身份的认证的密钥建立协议,并使用SVO逻辑证明设计协议的安全目标。 相似文献
6.
文章探讨了Agent之间双边多议题的协商。主要以议程和协商程序这两个因素研究了其结果.并分析了不完全信息环境下不同议程和程序的协商过程,在此基础上,我们确定了逐一问题和一揽子交易两个协商程序的平衡策略,最后,给出了每个Agent所有可能议程和过程组合优化的协商结局。 相似文献
7.
9.
岳怡 《电气电子教学学报》1997,(3)
本文论证了在新形势下开设“新型数字逻辑器件GAL及在系统可编程逻辑器件isPLSI及其应用技术”选修课的目的,介绍了该课程的教学特点和开设课程的效果。 相似文献
10.
据有关资料报道,Infineon公司和LSI逻辑公司协商共同开发HDD用IC。二公司决定使现有的IP为共同所有,同时还决定共同开发新的IP。 相似文献
11.
在模型驱动SOA的框架下,业务流程层的合理创建可验证的流程服务。通过形式化定义了服务组合过程中的5种基本的逻辑结构,采用有色Petri网表示,并将其抽象成为服务的代数运算;在此基础上,提出了经过服务运算后得到的服务性质以及组合服务的构造方法;最后通过实例,说明该建模方法可以保证组合的服务是正确而且可终止的。 相似文献
12.
13.
The term "insertion loss" has become such a popular one and is applied to so many different concepts that it is becoming unsuitable for precise use. Certain other concepts connected with insertion loss such as attenuation and mismatch loss, are in need of clarification. A logical set of definitions and equations are presented as a suggested approach to more precise terminology. The effect of complex characteristic impedance on these equations is given in an Appendix. Specific suggestions are given for changes in the usage of terms, which if acceptable and adopted would improve the situation. 相似文献
14.
Chonggang Wang Bo Li Mahmoud Daneshmand Kazem Sohraby Rittwik Jana 《Mobile Networks and Applications》2011,16(1):71-80
Radio frequency identification (RFID) provides a more convenient and automatic approach for object identification than traditional
universal product code-based barcode technology. However, radio communications are naturally unreliable and inevitably lead
to unreliable object identification, which in turn encumber some special applications demanding large-scale deployment of
RFID, even though many RFID applications have been emerging recent years. This paper discusses object identification reliability.
We first list factors that could cause false readings and lead to unreliable object identification. Then we provide five definitions
that directly and formally define object identification reliability. Based on these reliability-related definitions, a general
framework for guaranteeing object identification reliability is proposed in this paper. Existing schemes for reliability improved
are briefly compared within this framework. 相似文献
15.
基于动态冗余机制的数据并行型计算网格模型 总被引:2,自引:0,他引:2
在由多个普通计算机机群构成的网格环境下,为了解决大规模数据并行型计算加速比问题、容错问题和动态负载均衡问题,提出了一个基于动态冗余机制的数据并行型网格模型。给出了由多个计算机机群组成的数据并行型计算网格等一系列形式化定义。利用逻辑计算机机群、机群逻辑环、计算节点逻辑环和m-冗余策略,研究了动态冗余、动态负载均衡技术。根据这些技术,描述了网格环境下的数据并行型计算过程。理论分析和实践表明,该模型有效地解决了大规模数据并行型计算所需的负载均衡、容错和资源优化问题。该模型适合基于网格的数据并行型计算。 相似文献
16.
Integrating SNMP agents with XML-based management systems 总被引:2,自引:0,他引:2
XML-based network management systems are becoming more and more popular these days. However, it has to be taken into account that there is a broad existing management infrastructure based on non-XML protocols. Today, the most dominant technology in Internet management is based on the SNMP framework. This article presents an approach for seamless integration of management information supplied by SNMP agents into XML-based systems. This is done by an automated transformation of SMI MIB definitions into XML schema definitions, which implies a corresponding transformation of SNMP management information into XML documents. Furthermore, we present an SNMP-to-XML gateway that allows retrieval of such XML management information at runtime. 相似文献
17.
《Electron Devices, IEEE Transactions on》1977,24(12):1369-1370
The El-Mansy and Boothroyd MOSFET model is shown to be inconsistent. Therefore, MOSFET characteristics predicted by this model are not logical consequences of their assumed form for the minority carrier density Qm . Moreover, their derivation and heuristic arguments in favor of Qm are faulty. These circumstances leave the physical origin of Qm a mystery. 相似文献
18.
Ralf Küsters Anupam Datta John C. Mitchell Ajith Ramanathan 《Journal of Cryptology》2008,21(4):492-546
Several compositional forms of simulation-based security have been proposed in the literature, including Universal Composability,
Black-Box Simulatability, and variants thereof. These relations between a protocol and an ideal functionality are similar
enough that they can be ordered from strongest to weakest according to the logical form of their definitions. However, determining
whether two relations are in fact identical depends on some subtle features that have not been brought out in previous studies.
We identify two main factors: the position of a “master process” in the distributed system and some limitations on transparent
message forwarding within computational complexity bounds. Using a general computational framework, called Sequential Probabilistic
Process Calculus (SPPC), we clarify the relationships between the simulation-based security conditions. Many of the proofs
are carried out based on a small set of equivalence principles involving processes and distributed systems. These equivalences
exhibit the essential properties needed to prove relationships between security notions and allow us to carry over our results
to those computational models which satisfy these equivalences. 相似文献
19.
由于自组网独特的特性,在该网络中支持QoS非常困难,需要进行系统研究。本文首先分析了自组网中QoS支持面临的挑战,接着从系统角度出发,结合自组网的特点,在QoS模型和QoS支持体系以及体系中具体的QoS技术等方面对自组网QoS支持做了详尽的分析与探讨,同时指出:定义自组网QoS模型需要综合考虑应用需求和网络特性;实现QoS模型可以采用分层QoS支持体系或跨层QoS支持体系,而后者将是今后研究的重点;结合路由层、MAC层和物理层的跨层QoS支持体系具有研究价值。 相似文献