Search results for "architecture"
showing 10 items of 3706 documents
Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – IS…
2017
This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18–20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I—addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning envi…
Sub-symbolic Encoding of Words
2003
A new methodology for sub-symbolic semantic encoding of words is presented. The methodology uses the WordNet lexical database and an ad hoc modified Sammon algorithm to associate a vector to each word in a semantic n-space. All words have been grouped according to the WordNet lexicographers’ files classification criteria: these groups have been called lexical sets. The word vector is composed by two parts: the first one, takes into account the belonging of the word to one of these lexical sets; the second one is related to the meaning of the word and it is responsible for distinguishing the word among the other ones of the same lexical set. The application of the proposed technique over all…
A mechanism of coalition formation in the metaphor of politics multiagent architecture
2003
Hybrid Multi-Agent Architectures allow the support of mobile robots colonies moving in dynamic, not predictable and time variable environments in order to achieve distributed solving strategies that develop collective team-oriented behaviors for solving complicate and difficult tasks. The development of a new robotic architecture for the coordination of a robot colonies in dangerous, unknown and dynamic environment is outlined. The name of this new architecture is Metaphor of Politics (MP), because it loosely takes inspiration from the political organizations of democratic governments.
Metrics in method engineering
1995
So many software development methods have been introduced in the last decade, that one can talk about a “methodology jungle”. To aid the method developers and evaluators in fighting their way through this jungle we propose a systematic approach for measuring properties of methods. We describe two sets of metrics, which measure the complexity of diagrammatic specification techniques on the one hand, and of complete systems development methods on the other hand. Proposed metrics provide a relatively fast and simple way to analyse the technique (or method) properties, and when accompanied with other selection criteria, can be used for estimating the cost of learning the technique and the relat…
A Cognitive Framework for Imitation Learning
2006
Abstract In order to have a robotic system able to effectively learn by imitation, and not merely reproduce the movements of a human teacher, the system should have the capabilities of deeply understanding the perceived actions to be imitated. This paper deals with the development of cognitive architecture for learning by imitation in which a rich conceptual representation of the observed actions is built. The purpose of the following discussion is to show how this Conceptual Area can be employed to efficiently organize perceptual data, to learn movement primitives from human demonstration and to generate complex actions by combining and sequencing simpler ones. The proposed architecture ha…
Reliable Underlay Device-to-Device Communications on Multiple Channels
2019
Device-to-device (D2D) communications provide a substantial increase in spectrum usage and efficiency by allowing nearby users to communicate directly without passing their packets through the base station (BS). In previous works, proper channel assignment and power allocation algorithms for sharing of channels between cellular users and D2D pairs, usually require exact knowledge of the channel-state-information (CSI). However, due to the non-stationary wireless environment and the need to limit the communication and computation overheads, obtaining perfect CSI in the D2D communication scenario is generally not possible. In this work, we propose a joint channel assignment and power allocati…
Uplink DPCCH Gating of Inactive UEs in Continuous Packet Connectivity Mode for HSUPA
2007
In order to further improve the packet performance in the UMTS FDD system, uplink dedicated physical control channel (DPCCH) gating as a scheme is proposed in 3GPP under the work item "continuous connectivity for packet data users". In this paper, the uplink DPCCH gating concept is described and analyzed on both a qualitative and a quantitative level. And the system performance of different gating patterns used in the scheme was investigated by analytical prediction and system level simulations with different channel profiles. As shown, the selection of the gating pattern has a significant influence on the system performance, which is correlated with the uplink data transmission activity an…
Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approach
2017
Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol, in which the receiving node makes the decision on initiating CT or not based on a tradeoff between performing CT and non-CT. In this way, nodes can avoid idle listening and achieve an extended lifetime. A discrete-time Markov chain (DTMC) model is developed to analyze the performance of CT associat…
Energy-Efficient Binary Power Control with Bit Error Rate Constraint in MIMO-OFDM Wireless Communication Systems
2012
Motivated by the demand for energy efficiency improvement in mobile communication industry, we explore an idea of optimizing energy efficiency for MIMO-OFDM wireless communication systems while maintaining users' quality of service (QoS) requirement. Based on the binary power control scheme,a power allocation criterion for energy efficiency optimization is derived under the total power constraint. From a bit error rate (BER) point of view, a protection constraint is configured to guarantee the system QoS. With the aim of energy efficiency optimization under QoS guarantee in MIMO-OFDM wireless communication systems, an energy-efficient binary power control with BER constraint (EBPCB) algorith…
P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research
2006
Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…