Search results for "computer.software_genre"
showing 10 items of 3858 documents
A Methodology for Graphical Modeling of Business Rules
2011
This work proposes a novel methodology based on the Business Process Modeling Notation (BPMN) standard capable of graphically modeling business rules. A set of new representation patterns allows business analysts to map processes described through BPMN into conditions and actions of business rules. Our approach exploits Domain Specific Language techniques in order to make the methodology independent from the programming language supported by the specific rule engine. Moreover, this work proposes a web graphical editor, instantiated on a specific sample scenario, where the selected rule engine is Drools, one of the most used open source products. The developed editor allows business analysts…
A Modular Framework for Versatile Conversational Agent Building
2011
This paper illustrates a web-based infrastructure of an architecture for conversational agents equipped with a modular knowledge base. This solution has the advantage to allow the building of specific modules that deal with particular features of a conversation (ranging from its topic to the manner of reasoning of the chatbot). This enhances the agent interaction capabilities. The approach simplifies the chatbot knowledge base design process: extending, generalizing or even restricting the chatbot knowledge base in order to suit it to manage specific dialoguing tasks as much as possible.
QoS-Aware Fault Detection in Wireless Sensor Networks
2013
Wireless sensor networks (WSNs) are a fundamental building block of many pervasive applications. Nevertheless the use of such technology raises new challenges regarding the development of reliable and fault-tolerant systems. One of the most critical issues is the detection of corrupted readings amidst the huge amount of gathered sensory data. Indeed, such readings could significantly affect the quality of service (QoS) of the WSN, and thus it is highly desirable to automatically discard them. This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. Generally, these algorithms do not take into account QoS re…
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Fast Training of Self Organizing Maps for the Visual Exploration of Molecular Compounds
2007
Visual exploration of scientific data in life science\ud area is a growing research field due to the large amount of\ud available data. The Kohonen’s Self Organizing Map (SOM) is\ud a widely used tool for visualization of multidimensional data.\ud In this paper we present a fast learning algorithm for SOMs\ud that uses a simulated annealing method to adapt the learning\ud parameters. The algorithm has been adopted in a data analysis\ud framework for the generation of similarity maps. Such maps\ud provide an effective tool for the visual exploration of large and\ud multi-dimensional input spaces. The approach has been applied\ud to data generated during the High Throughput Screening\ud of mo…
Sentence Induced Transformations in Conceptual Spaces
2008
The proposed work illustrates how "primitive concepts" can be automatically induced from a text corpus. The primitive concepts are identified by the orthonormal axis of a "conceptual" space induced by a methodology inspired to the latent semantic analysis approach. The methodology represents a natural language sentence by means of a set of rotations of an orthonormal basis in the "conceptual"space. The rotations, triggered by the sequence of words composing the sentence and realized by means of geometric algebra rotors, allow to highlight "conceptual" relations that can arise among the primitive concepts.
A data association approach to detect and organize people in personal photo collections
2011
In this paper we present a method to automatically segment a photo sequence in groups containing the same persons. Many methods in literature accom- plish to this task by adopting clustering techniques. We model the problem as the search for probable associations between faces detected in subsequent photos con- sidering the mutual exclusivity constraint: a person can not be in a photo two times, nor two faces in the same photo can be assigned to the same group. Associations have been found considering face and clothing descriptions. In particular, a two level architecture has been adopted: at the first level, associations are computed within meaningful temporal windows (situations); at the …
An extended JADE-S based framework for developing secure Multi-Agent Systems
2009
Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…
Reputation Management for Distributed Service-Oriented Architectures
2010
Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented Architecture (SOA) be augmented in order to support the declaration of this information. The correct behavior of such new SOA platforms, however, will depend on the presence of some mechanisms that allow consumer nodes to evaluate trustworthiness of service providers. This work proposes a new…
Medical image registration: Interpolations, similarities and optimizations strategies
2010
This paper presents a study conducted for evaluating different interpolation schemes, similarity metrics and optimization algorithms for the purpose of volumetric medical image registration. Each technique has been implemented to be plugged in a modular system. Rotation, translation and scale error has been measured to obtain a performance evaluation for all of the combinations of the considered techniques. Several experimental tests were conducted for validation both on synthetic and real datasets providing an exhaustive overview of the various strategies used.