Search results for "architecture"

showing 10 items of 3706 documents

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – IS…

2017

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18–20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I—addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning envi…

Computer sciencebusiness.industryInformation systems architectureSoftware engineeringbusiness
researchProduct

Sub-symbolic Encoding of Words

2003

A new methodology for sub-symbolic semantic encoding of words is presented. The methodology uses the WordNet lexical database and an ad hoc modified Sammon algorithm to associate a vector to each word in a semantic n-space. All words have been grouped according to the WordNet lexicographers’ files classification criteria: these groups have been called lexical sets. The word vector is composed by two parts: the first one, takes into account the belonging of the word to one of these lexical sets; the second one is related to the meaning of the word and it is responsible for distinguishing the word among the other ones of the same lexical set. The application of the proposed technique over all…

Computer sciencebusiness.industryLatent semantic analysisWordNetLexical databaseSemanticscomputer.software_genreLexical setLexical itemLexicographySyntactic categoryArtificial intelligencebusinesscomputerNatural languageWord (computer architecture)Natural language processing
researchProduct

A mechanism of coalition formation in the metaphor of politics multiagent architecture

2003

Hybrid Multi-Agent Architectures allow the support of mobile robots colonies moving in dynamic, not predictable and time variable environments in order to achieve distributed solving strategies that develop collective team-oriented behaviors for solving complicate and difficult tasks. The development of a new robotic architecture for the coordination of a robot colonies in dangerous, unknown and dynamic environment is outlined. The name of this new architecture is Metaphor of Politics (MP), because it loosely takes inspiration from the political organizations of democratic governments.

Computer sciencebusiness.industryMetaphormedia_common.quotation_subjectComputer Science (all)Mobile robotRoboticsDemocracyTheoretical Computer SciencePoliticsOrder (exchange)Human–computer interactionRobotArtificial intelligenceArchitecturebusinessMechanism (sociology)media_common
researchProduct

Metrics in method engineering

1995

So many software development methods have been introduced in the last decade, that one can talk about a “methodology jungle”. To aid the method developers and evaluators in fighting their way through this jungle we propose a systematic approach for measuring properties of methods. We describe two sets of metrics, which measure the complexity of diagrammatic specification techniques on the one hand, and of complete systems development methods on the other hand. Proposed metrics provide a relatively fast and simple way to analyse the technique (or method) properties, and when accompanied with other selection criteria, can be used for estimating the cost of learning the technique and the relat…

Computer sciencebusiness.industryMethod engineeringSearch-based software engineeringSoftware developmentMachine learningcomputer.software_genreInformation engineeringArchitecture tradeoff analysis methodComputer engineeringSoftware constructionSoftware systemArtificial intelligencebusinessComputer-aided software engineeringcomputer
researchProduct

A Cognitive Framework for Imitation Learning

2006

Abstract In order to have a robotic system able to effectively learn by imitation, and not merely reproduce the movements of a human teacher, the system should have the capabilities of deeply understanding the perceived actions to be imitated. This paper deals with the development of cognitive architecture for learning by imitation in which a rich conceptual representation of the observed actions is built. The purpose of the following discussion is to show how this Conceptual Area can be employed to efficiently organize perceptual data, to learn movement primitives from human demonstration and to generate complex actions by combining and sequencing simpler ones. The proposed architecture ha…

Computer sciencebusiness.industryMovement (music)General Mathematicsmedia_common.quotation_subjectImitationlearningRepresentation (systemics)Cognitive architectureCognitive roboticsRobotics Imitation LearningIntelligent manipulationComputer Science ApplicationsControl and Systems EngineeringPerceptionConceptual spacesArtificial intelligenceCognitive imitationImitationbusinessCognitive roboticsSoftwaremedia_common
researchProduct

Reliable Underlay Device-to-Device Communications on Multiple Channels

2019

Device-to-device (D2D) communications provide a substantial increase in spectrum usage and efficiency by allowing nearby users to communicate directly without passing their packets through the base station (BS). In previous works, proper channel assignment and power allocation algorithms for sharing of channels between cellular users and D2D pairs, usually require exact knowledge of the channel-state-information (CSI). However, due to the non-stationary wireless environment and the need to limit the communication and computation overheads, obtaining perfect CSI in the D2D communication scenario is generally not possible. In this work, we propose a joint channel assignment and power allocati…

Computer sciencebusiness.industryNetwork packetComputationReliability (computer networking)05 social sciences050801 communication & media studies020302 automobile design & engineeringThroughput02 engineering and technologyBase station0508 media and communications0203 mechanical engineeringComputer Science::Networking and Internet ArchitectureWirelessUnderlaybusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science::Information TheoryCommunication channelComputer network2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
researchProduct

Uplink DPCCH Gating of Inactive UEs in Continuous Packet Connectivity Mode for HSUPA

2007

In order to further improve the packet performance in the UMTS FDD system, uplink dedicated physical control channel (DPCCH) gating as a scheme is proposed in 3GPP under the work item "continuous connectivity for packet data users". In this paper, the uplink DPCCH gating concept is described and analyzed on both a qualitative and a quantitative level. And the system performance of different gating patterns used in the scheme was investigated by analytical prediction and system level simulations with different channel profiles. As shown, the selection of the gating pattern has a significant influence on the system performance, which is correlated with the uplink data transmission activity an…

Computer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYGatingDPCCHVoIPTelecommunications linkComputer Science::Networking and Internet ArchitectureElectronic engineeringHSUPAbusinessUMTS frequency bandsComputer Science::Information TheoryCommunication channelPower controlComputer networkData transmission2007 IEEE Wireless Communications and Networking Conference
researchProduct

Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approach

2017

Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol, in which the receiving node makes the decision on initiating CT or not based on a tradeoff between performing CT and non-CT. In this way, nodes can avoid idle listening and achieve an extended lifetime. A discrete-time Markov chain (DTMC) model is developed to analyze the performance of CT associat…

Computer sciencebusiness.industryNode (networking)05 social sciencesReal-time computing050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSynchronizationlaw.invention0508 media and communicationsTransmission (telecommunications)RelaylawComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkEnergy (signal processing)Computer networkEfficient energy use2017 IEEE International Conference on Communications (ICC)
researchProduct

Energy-Efficient Binary Power Control with Bit Error Rate Constraint in MIMO-OFDM Wireless Communication Systems

2012

Motivated by the demand for energy efficiency improvement in mobile communication industry, we explore an idea of optimizing energy efficiency for MIMO-OFDM wireless communication systems while maintaining users' quality of service (QoS) requirement. Based on the binary power control scheme,a power allocation criterion for energy efficiency optimization is derived under the total power constraint. From a bit error rate (BER) point of view, a protection constraint is configured to guarantee the system QoS. With the aim of energy efficiency optimization under QoS guarantee in MIMO-OFDM wireless communication systems, an energy-efficient binary power control with BER constraint (EBPCB) algorith…

Computer sciencebusiness.industryOrthogonal frequency-division multiplexingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMIMO-OFDMComputer Science::PerformanceConstraint (information theory)Computer Science::Networking and Internet ArchitectureBit error rateElectronic engineeringMobile telephonybusinessComputer Science::Information TheoryEfficient energy usePower control2012 IEEE Vehicular Technology Conference (VTC Fall)
researchProduct

P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research

2006

Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…

Computer sciencebusiness.industryP2PStudioDistributed computingPeer-to-peerNetwork topologycomputer.software_genreNetwork simulationVisualizationResource (project management)vertaisverkkoArchitecturebusinesscomputervalvontatyökaluStudioNetwork management stationComputer network
researchProduct