首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
The video explains briefly the concept of Smart-Its and shows examples of applications developed using the Smart-Its platform, including proactive furniture assembly, avalanche rescue and child monitoring.  相似文献   

3.
Kavi  K. Browne  J.C. Tripathi  A. 《Computer》1999,32(1):30-39
That computing and communication systems are becoming increasingly interdependent is evident in almost every aspect of society. Applications of these integrated systems are also spreading. As this trend continues, it will force the computing community not only to develop revolutionary systems but also to redefine “computer system” and the roles of traditional research disciplines, such as operating systems, architectures, compilers, languages, and networking. Systems research faces an unprecedented challenge. Systems developers are facing a major discontinuity in the scale and nature of both applications and execution environments. Applications are changing from transforming data to directly interacting with humans; they will use hardware and data that span wide area, even global, networks of resources and involve interactions among users as well. Even the architecture of individual processors is uncertain. The authors look at three challenges facing systems research, describe developing solutions, and review remaining obstacles. Using this information, they formulate three clear first steps to addressing the identified challenges: (a) define a new paradigm for systems research; (b) attack problems common to all system development; (c) build a research infrastructure  相似文献   

4.
The J. Lyons food and catering company in 1949 undertook an ambitious project known as LEO (Lyons Electronic Office). This created, for the first time anywhere, computer hardware and software for business applications. The author describes the history and applications legacy of this successful endeavor, using personal reminiscences and letters from one of LEO's founding participants  相似文献   

5.
The design of intelligent socio-technical systems calls for careful examination of relevant social and organizational concepts. We present a method for supporting this design process, placing emphasis on different levels of formal characterization, with equal attention to both the analysis of concepts in a formal calculus independent of computational concerns, and the representation of concepts in a machine-processable form, fully cognizant of implementation issues—a step in the method we refer to as principled operationalization. There are many tools (i.e. formal languages) that can be used to support the design method; we define and discuss criteria for evaluating such tools. We believe that, were the method proposed to be adopted, it would enhance the state-of-the-art in the systematic design and engineering of socio-technical systems, respecting the fundamentally interdisciplinary nature of those tasks, in both their theoretical and practical dimensions.  相似文献   

6.
7.
Trust aware Collaborative Learning Automata based Intrusion Detection System (T-CLAIDS) for VANETs is proposed in this paper. Learning Automata (LA) are assumed to be deployed on vehicles in the network to capture the information about the different states of the vehicles on the road. A Markov Chain Model (MCM) is constructed for representation of states and their transitions in the network. Transitions from one state to other are dependent upon the density of the vehicles in a particular region. A new classifier is designed for detection of any malicious activity in the network and is tuned based upon the new parameter called as Collaborative Trust Index (CTI) so that it covers all possible types of attacks in the network. An algorithm for detection of abnormal events using the defined classifier is also proposed. The results obtained show that T-CLAIDS performs better than the other existing schemes with respect to parameters such as false alarm ratio, detection ratio and overhead generated.  相似文献   

8.
The intelligent manufacturing systems of the future will be highly productive and effective, but they may have undesirable social effects as well as beneficial ones. Possible motivations for developing them are therefore examined against a background of the long, continuing resistance to the use of innovations in production machinery since the start of the industrial revolution. The claim that advanced computer-integrated manufacturing technology has a specially beneficial effect on the prosperity of nations is critically examined, as well as the nature of the beneficial synergism between manufacturing and services in creating wealth. A sombre view is taken of international competition which seems to be leading to an “ultimate” competitive race. The continuing substantial reductions expected in manufacturing employment may be much greater than any compensating employment increase in the service sector, owing to the application of the new technologies in this sector which is only now getting under way. Because full employment in traditional form is now widely seen to be an unattainable goal, a social revolution is required in attitudes to employment, work and its value. The paper ends with a proposal to consider ways of creating new social and economic structures in order to make this social revolution a practical reality, before social catastrophe occurs.  相似文献   

9.
《Software, IEEE》2003,20(4):51-53
We can divide software systems architecturally along two broad dimensions. The first is the tarchitecture or "technical architecture" and the second is the marketecture or "marketing architecture." I refer to the traditional software architect or chief technologist as the tarchitect and the product-marketing manager, business manager, or program manager responsible for the system as the marketect. The tarchitecture is the dominant frame of reference when developers think of a system's architecture. For software systems, it encompasses subsystems, interfaces, the distribution of processing responsibilities among processing elements, threading models, and so forth. In recent years, several authors, including Martin Fowler and Mary Shaw, have documented distinct tarchitecture styles or patterns, including client-server, pipeline, embedded systems, and blackboards. Our profession has begun to document how and when these various kinds of architectures are appropriate. It remains to be seen if we'll have the discipline to routinely leverage this knowledge.  相似文献   

10.
Possibilities of application of new ideas connected with control in development of practically useful intelligent systems are discussed. Basic subsystems of the system controlling the software are distinguished: monitoring, manual, automatic, and automated control. It is shown that the development of control actions on the software can be performed according to prior knowledge of managers, input data flow, and user models. A classification of control problems of intelligent systems is proposed. According to this classification, methods for achieving controllability of intelligent systems and examples of control problems of information resources, problem solvers, and user interfaces of intelligent systems are considered.  相似文献   

11.
12.
13.
Paul  J.M. 《Computer》2006,39(3):87-89
Hardware/software codesign grew out of system-level synthesis. ASICs offer performance advantages at the expense of post-design- time programmability. This contrasts with computer architecture, which focuses on support for a wide variety of end-use programming scenarios. Currently neither hardware synthesis nor hardware/software codesign describes the system-level design represented in CODES+ISSS. CODES were the name of the International Conference on Hardware/Software Codesign. ISSS was the name of the International Symposium on System Synthesis.  相似文献   

14.
In peer-to-peer (P2P) networks, trust management is a key tool to minimize the impact of malicious nodes. EigenTrust is claimed to be one of the most powerful distributed reputation management systems focused on P2P file-sharing applications. It is the theoretical base of other systems, and it has also been directly modified in an attempt to improve its performance. However, none of them give appropriate importance to all the information about transactions. This paper proposes an enhancement of EigenTrust, which considers unsatisfactory transactions in greater depth. Pos&Neg EigenTrust is able to obtain a blacklist of the identities of the malicious nodes. Therefore, it is able to significantly reduce the number of unsatisfactory transactions in the network.  相似文献   

15.
This research supports the hypothesis that the Trust Vector model can be modified to fit the CyberCraft Initiative, and that there are limits to the utility of historical data. This research proposed some modifications and expansions to the Trust Model Vector, and identified areas for future research.  相似文献   

16.
17.
具体介绍了嵌入式系统智能管理方面的相关内容,建立了一种基于FPGA的嵌入式智能管理系统的框架结构。此外,分析并实现了系统各项基本的智能功能,这对提高系统整体性能有着很大的帮助。  相似文献   

18.
Several models have been proposed in the past for representing both reliability and reputation. However, we remark that a crucial point in the practical use of these two measures is represented by the possibility of suitably combining them to support the agent's decision. In the past, we proposed a reliability–reputation model, called RRAF, that allows the user to choose how much importance to give to the reliability with respect to the reputation. However, RRAF shows some limitations, namely: (i) The weight to assign to the reliability versus reputation is arbitrarily set by the user, without considering the system evolution; (ii) the trust measure that an agent a perceives about an agent b is completely independent of the trust measure perceived by each other agent c, while in the reality the trust measures are mutually dependent. In this paper, we propose an extension of RRAF, aiming at facing the limitations above. In particular, we introduce a new trust reputation model, called TRR, that considers, from a mathematical viewpoint, the interdependence among all the trust measures computed in the systems. Moreover, this model dynamically computes a parameter measuring the importance of the reliability with respect to the reputation. Some experiments performed on the well‐known ART(Agent Reputation and Trust) platform show the significant advantages in terms of effectiveness introduced by TRR with respect to RRAF. © 2011 Wiley Periodicals, Inc.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号