首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Conclusions Despite the accumulated evidence, many of the investigators as of quite recently have failed to understand that behavioral strategy or decision rules can be inherited and evolve and that they are subject to certain constraints that cannot be surmounted other than by natural selection. For example, in [9, p. 422] we read: The evolutionary pressure cannot act upon the relative contents of social interactions favoring certain individuals over others. The present study shows that the following scheme of conflict, which favors those individuals that conform to it with a better accuracy, can be evolutionary stable. On the basis of the information they receive, the partners estimate the role situation and the equilibrium pair of elementary strategies and use their strategies. If the role situations of the partners are coordinated, the partners cooperate in reducing the conflict and define its result according to AIS. If AIS are not coordinated, they cooperate in reducing the conflict if its expected loss for each is greater than the expected payoff; they escalate the against those that have a lesser set of elementary strategies but also against those that have a less accurate mechanism of AIS recognition. A poor accuracy of recognition mechanism would replace a strictly equilibrium ESS with a mixed strategy.From the point of view of behavioral control, the multilevel conflict model shows that generally for controlling the choices at a certain level actions of an equally high level are necessary. It is impossible, for example, to accomplish certain economic choices by using only informational actions.Translated from Kibernetika, No. 1, pp. 90–98, January–February, 1988.  相似文献   

2.
A resolution proof of an unsatisfiable propositional formula in conjunctive normal form is a Davis-Putnam resolution proof iff there exists a sequence of the variables of the formula such thatx is eliminated (with the resolution rule) beforey on any branch of the proof tree representing the resolution proof, only ifx is beforey in this sequence. Davis-Putnam resolution is one of several resolution restrictions. It is complete.We present an infinite family of unsatisfiable propositional formulas and show: These formulas have unrestricted resolution proofs whose length is polynomial in their size. All Davis-Putnam resolution proofs of these formulas are of superpolynomial length. In the terminology of [4, definition 1.5]: Davis-Putnam resolution does notp-simulate unrestricted resolution.  相似文献   

3.
This paper presents a simulation study of several conflict-handling methods in shared-memory vector processors. These methods differ with respect to (1) the way memory sections are accessed, (2) the types of conflicts that may occur, (3) whether a conflict halts the vector stream or not, and (4) buffering of pending requests. In the first method, access privilege to a particular section of memory is exclusively granted to each vector stream in its own time phase. This static control strategy prevents contention in the memory interconnect at the expense of a limited capability to adapt to dynamic situations. Two dynamic methods are also considered, in which simultaneous bank conflicts and line conflicts may occur and are resolved at run time. A fourth method helps to identify the relative contribution of the different types of memory conflicts. We also study linked conflicts that occur due to buffering in the time-phased strategy.  相似文献   

4.
Norms (permissions, obligations and prohibitions) offer a useful and powerful abstraction with which to capture social constraints in multi-agent systems. Norms should exclude disruptive or antisocial behaviour without prescribing the design of individual agents or restricting their autonomy. An important challenge, however, in the design and management of systems governed by norms is that norms may, at times, conflict with one another; e.g, an action may be simultaneously prohibited and obliged for a particular agent. In such circumstances, agents no longer have the option of complying with these norms; whatever they do or refrain from doing will lead to a social constraint being broken. In this paper, we present mechanisms for the detection and resolution of normative conflicts. These mechanisms, based on first-order unification and constraint solving techniques, are the building blocks of more sophisticated algorithms we present for the management of normative positions, that is, the adoption and removal of permissions, obligations and prohibitions in societies of agents. We capture both direct and indirect conflicts between norms, formalise a practical concept of authority, and model conflicts that may arise as a result of delegation. We are able to formally define classic ways for resolving conflicts such as lex superior and lex posterior.  相似文献   

5.
In this study the planning process is applied to a conflict resolution problem by structuring a well known conflict (the Northern Ireland problem) using the levels of a conceptual hierarchy. The parties to the conflict form the first level, the objectives of these parties form the second level, and possible political solutions to the problem are at the third and final level.This present model is an update of an earlier analysis, carried out in 1976 and 1977, in which it was shown that the outcome which would to the greatest possible extent satisfy the aspirations of all parties would be legislative independence for Northern Ireland. The current analysis takes into account changes which have taken place since the earlier work was performed. It is shown that the most satisfactory outcome is still one of legislative independence. However, the results suggest a short-term compromise solution. An assembly, subordinate to the British government, would also satisfy most of the basic needs of the parties, provided that such an Assembly is given a wide range of powers and a large measure of autonomy.The method used here, the Analytic Hierarchy Technique (Saaty, 1977, 1980), is easy to understand and to use, and provides an efficient method for evaluating possible solutions to a conflict.  相似文献   

6.
基于自适应移动多跳Ad Hoc网络,针对其DSR协议的路由缓存机制,分析不足之处,探索对现有的路由缓存机制的优化方法.提出了缓存路由有效期的概念,为网络中节点的路由表添加一个用于反馈的“缓存路由跳数”参数,节点选择此参数值最小者的路由信息.仿真实验表明,经过改进的缓存机制有效地避免了响应冲突问题,实现了路由的最短优化,在平均传输延迟、分组投递率、吞吐量性能方面都有提高.  相似文献   

7.
复制/缓存技术是为移动应用提供数据可用性的有效技术,但是,也存在数据大量冗余以及数据冲突等问题.以数据的语义片段为管理单位,将不同客户需要复制的数据进行合并管理,大大地减少了数据被复制的次数.同时,模拟传统数据库中锁的机制,提出了事务协调器方案,避免和解决数据冲突问题.  相似文献   

8.
Distributed conflict resolution among cooperating expert systems   总被引:4,自引:0,他引:4  
Abstract: Cooperating experts approach attempts to integrate and coordinate the activities of multiple specialised problem solvers that come together to solve complex tasks such as design, medical diagnosis, business management and so on. Due to the different goals, knowledge and viewpoints of agents, conflicts may arise at any phase of the problem-solving process. Managing diverse expertise requires well-organised models of conflict resolution. In this paper, a model for cooperating experts is described which openly supports multi-agent conflict detection and resolution. The model is based on the idea that each agent has its own conflict knowledge which is separated from its domain level knowledge, and each agent has its own conflict resolution knowledge which is not accessible and known by others. Furthermore, there are no globally known conflict resolution strategies. Each agent involved in a conflict chooses a resolution scheme according to its self interest. The model is described by using an example in the domain of office design and it is compared with other systems.  相似文献   

9.
The production of wire-wrap schedules by hand is extremely tedious and error prone. This paper discusses a program which has been developed to generate an easy-to-follow, cross-referenced wiring schedule from a simply-formatted data file. The program also provides extensive checking of the input data. The language used was SIMULA, and was found to be an ideal vehicle for implementing the requirements of wire-wrap schedule generation. The class concept, in particular, was found to be most useful.  相似文献   

10.
策略冲突的解决是基于策略的网络管理系统正常运行的前提之一。论文提出了一种基于网元的策略冲突解决方法,以网元为单位构造策略优先级关系矩阵,用以解决与该网元相关的策略冲突问题。该方法避免了大矩阵的计算处理,从而减少了基于策略的网络管理系统的计算成本。经实验验证,该方法可以有效地解决基于策略的网络管理系统中存在的策略冲突问题。  相似文献   

11.
For fulfilling customer requests, enterprises are increasingly part of collaboration networks with peers. Such collaborations, also known as virtual enterprises (VE), are governed by pre-defined contracts that restrict the behaviour of each participating enterprise. However, since each enterprise is autonomous, the potential arises for conflicts during collaboration. In this paper, we extend our earlier work on virtual-enterprise modelling and address the existing gap of conflict modelling, management and resolution in VEs. Our approach works as follows: first, to detect a conflict by analysing the exceptions reported during execution; second, to uncover the conflict type, origin and impact of an exception; and third, depending on the nature of an exception, to implement the appropriate conflict negotiation and resolution strategy among the participating entities of a VE. Crucial to this approach, and serving as one of the key contributions of this paper, is the conflict ontology. This ontology helps to model conflict types along with related exceptions, negotiation and resolution strategies, thereby enabling conflict management and resolution. Throughout this paper, we illustrate our ideas with a running example and also present a detailed evaluation based on a case study from the automotive production domain.  相似文献   

12.
Planning methods for effective manipulation of single or multiple redundant arm systems must take account of DOF, the task, constraints, and joint drifts. Here, a new approach to redundancy resolution and obstacle avoidance for cooperative robot arms is proposed. In this development, a relative Jacobian and a relative dexterity measure for cooperative robot arms are derived. A nonlinear programming method is used to optimize the relative dexterity while satisfying cooperative task requirements, limits on joint angles, and obstacle avoidance. With this approach, it is not necessary to balance the weightings between the cost term to be optimized and the penalty from constraints. Configuration jumps over obstacles are avoided. Further, since globally optimal joint configurations are produced, drifts in joint configurations will be absent from the resulting configurations. This article includes several illustrative examples to demonstrate the effectiveness and usefulness of this approach. Results have indicated the benefits of both the relative dexterity and the sum of individual arm dexterities in planning of cooperative tasks. ©1999 John Wiley & Sons, Inc.  相似文献   

13.
14.
This paper presents an approach and a corresponding mechanism for adjusting resource use strategies under conditions of uncertainty. Situations of competition between two economic agents are considered in which individual agents can affect the general characteristics of resources (particularly, the price). The proposed approach allows one to choose strategies depending on one’s interests regardless of the behavior of other agents as in the case of perfect competition.  相似文献   

15.
改进蚁群算法在飞行冲突求解问题中的应用   总被引:1,自引:0,他引:1  
改进的蚁群算法可以用于空中交通飞行冲突问题的求解.对空中交通飞行冲突问题的研究背景以及研究现状进行系统概述,简要介绍了人工势场法和蚁群算法.建立了相关的数学模型,将空中交通飞行冲突问题转化为有约束的非线性整数规划问题,并且把人工势场法和蚁群算法相结合,设计了将人工势场法的规划结果作为蚁群优化算法先验知识的求解思路.最后的仿真计算表明了该方法能加快蚁群算法的收敛速度,在短时间内提供理想的冲突解决方案.  相似文献   

16.
Preference uncertainty in the graph model for conflict resolution   总被引:2,自引:0,他引:2  
A new preference structure is introduced into the graph model for conflict resolution. This structure can handle a decision-maker's (DM) strict preference for one state or scenario over another, equal preference for states, and uncertain or unknown preference in the comparison of two states. Built upon this preference structure, four types of solution definitions modeling human behavior under conflict are extended to accommodate uncertainty in preferences. Four distinct ways to consider uncertain preference information are identified, producing sixteen extended stability definitions. Interrelationships of these definitions within and across the four definition sets are investigated. Illustrative examples of two-DM and multi-DM conflict models are presented to show how the new solution concepts can be applied in practice.  相似文献   

17.
Generally, workspace conflict analysis between construction activities by a 3D or 4D CAD system is performed for checking the conflict between element bodies. However, in case of many projects which consist of diverse activities in limited area, the workspace conflict analysis for reducing interferences caused by labor or equipment work is also an important management factor. In particular, if some activities are constructed adjacent to the overlap period, the workspace for those activities may be conflicting. Workspace conflicts decrease work productivity, and accidents can occur. Therefore, it is desirable that the workspace conflict should be minimized in order to perform efficient work. This paper presents a methodology that generates workspaces using a bounding box model and an algorithm in order to identify schedule and workspace conflict. Additionally, a workspace conflict verification system was developed to analyze the workspace information by integrating algorithms that include the automated generation of workspace models and an automatic check of workspace conflict within a 4D simulator. If a project manager can identify the workspace conflict using the system described, the overlapped activities can be rescheduled to minimize the conflict. A case study of a bridge project has been conducted to evaluate the practical applications and feasibility of the developed system. Therefore, the safety and constructability of a project can be improved by the workspace analysis system.  相似文献   

18.
针对分布式系统在共享资源冲突和消解的复杂性问题,综合考虑时间、空间、约束条件等因素,在混合Petri网同时具备描述离散系统和连续系统的能力的基础上,加入时间约束条件、测试孤,从而形成一个能够描述更复杂分布式系统的Petri网模型.利用Petri网描述系统的基本思想,经过扩展得出新模型,变迁使能、变迁触发和变迁冲突检测的定义.结合实例,对模型进行了仿真分析,给出了实例中系统冲突的消解方案,表明了模型的可行性.  相似文献   

19.
20.
本文通过对策略冲突进行系统研究,找到其中的主要因素,按照“策略冲突发生时策略的状态”和“策略冲突发生时策略作用对象之间的关系”给出了策略冲突的两种分类,通过这两种分类解决了“何时检测冲突”和“如何检测冲突”的问题.而后进一步阐述了如何应用冲突数据库来判别策略冲突类型的方法.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号