Discussing Implicit Parallelism and Its Applications
|
|
- Alfred Fitzgerald
- 7 years ago
- Views:
Transcription
1 OpenStax-CNX module: m Discussing Implicit Parallelism and Its Applications Hong Lin This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 Abstract Methodologies have been developed to allow parallel programming in a higher level. These include the Chemical Reaction Models, Linda, and Unity. We present the Chemical Reaction Models and its applications. An example in modeling a course maintenance system is given. Higher level parallel programming models express parallelism in an implicit way. Instead of imposing programmers to create multiple tasks that can run concurrently and handle their communications and synchronizations explicitly, these models allow programs to be written without assumptions of articial sequenciality. The programs are naturally parallel. Examples of such kind of models include the Chemical Reaction Models (CRMs) (Banatre & Le Metayer, 1990 & 1993), Linda (Carriero & Gelernter, 1989), and Unity (Chandy & Misra, 1988; Misra, 1989). These models are created to address higher level programming issues such as formal program specication, program synthesis, program derivation and verication, and software architecture. Ecient implementation of these models has limited success and therefore obscures its direct applications in software design (Creveui, 1991; Gladitz, 1996). Despite this limitation, eorts have been made in both academic and industrial settings to avail these models in real-world programming. For example, Unity has been used in industrial software design and found successful; execution eciency of Linda has been armed by experiments and it is implemented by IBM Tuple Space. Recent discussions of these models in multi-agent system design have also been found in literature (Cabri, 2000). In the following discussion, we focus on the Chemical Reaction Models and its applications. The Chemical Reaction Models describe computation as chemical reactions. Data (the solution) are represented as a multiset. A set of reaction rules is given to combine elements in the multiset and produce new elements. Reactions take place until the solution becomes inert, namely there are no more elements can be combined. The results of computation are represented as the inert multiset. Gamma is a kernel language in which programs are described in terms of multiset transformations. In Gamma programming paradigm, programmers can concentrate on the logic of problem solving based on an abstract machine and are free from considering any particular execution environment. It has seeded follow-up elaborations, such as Chemical Abstract Machine (Cham) (Berry & Boudol, 1992), higher-order Gamma (Le Metayer, 1994; Cohen & Muylaert-Filho, 1996), and Structured Gamma (Fradet & Le Metayer, 1998). While the original Gamma language is a rst-order language, higher order extensions have been proposed to enhance the expressiveness of the language. These include higher-order Gamma, hmm-calculus, and others. The recent formalisms, γ-calculi, of Gamma languages combine reaction rules and the multisets of data and treat reactions as rst-class citizens (Banâtre, Fradet, & Radenac, 2004, 2005a, 2005b). Among γ-calculi, γ0-calculus is a Version 1.1: Jan 22, :59 pm
2 OpenStax-CNX module: m minimal basis for the chemical paradigm; γc-calculus extends γ0-calculus by adding a condition term into γ-abstractions; and γn-calculus extends γ0-calculus by allowing abstractions to atomically capture multiple elements. Finally, γcn-calculus combines both γc-calculus and γn-calculus. For notational simplicity, we use γ-calculus to mean γcn-calculus from this point on. The basic term of a Gamma program is molecules (or γ-expressions), which can be simple data or programs (γ-abstractions). The execution of the Gamma program can be seen as the evolution of a solution of molecules, which react until the solution becomes inert. Molecules are recursively dened as constants, γ-abstractions, multisets or solution of molecules. The following is their syntax: M :: = 'a' 'b'... ; constants γpc.m ; γ abstraction M 1, M 2 ; multiset M > ; solution (1) The multiset constructor, is associative and commutative (AC rule). Solutions encapsulate molecules. Molecules can move within solutions but not across solutions. γ-abstractions are elements of multisets, just like other elements. They can be applied to other elements of the same solution if a match to pattern P is found and condition C evaluates to true and therefore facilitate the chemical reaction. The pattern has the following syntax: P :: = x P, P < P > (2) where x is a variable. In addition, we allow for the use of tuples (written x1:... : xn) and names of types. For example, γ-abstraction γ (x : Int, y : Int) [x y].x (3) can be interpreted as: replace x, y by x if x y, which is equivalent to nding the maximum of two integers. The semantics of γ-calculus is dened as the following: (γp[c].m1), m2 = m1 if match(p/ m2) = and c ; γ-conversion m1, m2 = m2, m1 ; commutativity m1, (m2, m3) = (m1, m2), m3 ; associativity E1 = E2 => E[E1] = E[E2] ; chemical law The γ-conversion describes the reaction mechanism. When the pattern p matches m2, a substitution is yielded. If the condition c holds, the reactive molecules γp[c].m1 and m2 are consumed and a new molecule m1 is produced. match(p/m) returns the substitution corresponding to the unication of variables if the matching succeeds, otherwise it returns fail. Chemical law formalizes the locality of reactions. E[E1] denotes the molecule obtained by replacing holes in the context E[ ] (denoted by [ ]) by the molecule E1. A molecule is said to be inert if no reaction can be made within: Inert (m) (m m' [(γp [c].m 1 ), m 2 ] match (p/m 2 ) = fail(4) A solution is inert if all molecules within are inert and normal forms of chemical reactions are inert γ-expression. Elements inside a solution can be matched only if the solution is inert. Therefore, a pattern cannot match an active solution. This ensures that solutions cannot be decomposed before they reach their
3 OpenStax-CNX module: m normal form and therefore permits the sequentialization of reactions. The following inference rule governs the evolution of γ-expressions: E 1 E 2 E C [E 1 ] E' C [E 2 ] E E' For example, if a list is represented by multiset M = {(a, i) a is value and i an index and i's are consecutive}, the following recursive γ-abstraction replaces any ill-ordered pairs by two other pairs: sigma = γ ((a, i) : M, (b, j) : M) [i < j a > b] : (b, i) : M, (a, j) : M, sigma (6) It species that any two selected pairs (a, i) and (b, j) that satisfy the condition, i < j a > b are replaced by two other pairs (b, i) and (a, j), and a copy of itself. No global control is imposed on the way multiset elements are selected to ignite the reaction. If sigma is placed in an initial set M0 of pairs, it will replace ill-ordered pairs until the entire list is sorted. So a sorting program can be dened as: Sort M 0 =<sigma, M 0 > (7) We found that the dynamic nature of distributed agents makes it an ideal object for modeling using the Gamma languages (Lin, 2004). An agent shows a combination of a number of characteristics, such as autonomy, adaptability, knowledge, mobility, collaboration, and persistence. These features exist in dierent types of agent systems such as collaborative agents, interface agents, reactive agents, mobile agents, information agents, heterogeneous agents, and economic agents. The concurrency and automation of agents require that the modeling language does not have any sequential bias and global control structure. In addition, the dynamic nature and non-determinism of interaction between an agent and its environment are suited to a computation model with a loose mechanism for specifying the underlying data structure. For example, data, which move around the Internet, can be well modeled by chemical solution; and mobile agents, which are created dynamically and transferred from clients to servers, can be represented as molecules containing γ-abstractions that transfer among solutions. This provides a mechanism for describing interagent communications and agent migration in a single framework. It is notable that CRM specications separate architectures from nonessential features of the system eectively. For example, it catches the way program units interact with one another and leaves nonessential specications, such as the number of program units, connection links for communications, and organizations of data, to the subsequent design phases. We refer the readers to the literature for detailed justications for the appropriateness of using the CRM to model MAS (Lin & Yang, 2006; Lin, 2007a, 2007b, 2007c; Ma et al, 2007). Here we give the summary of the benets of using the CRM to model MAS: (1) The architectural design of the system can be separated from the design of individual units that have to deal with proprietary features of the underlying computing resources, because CRM allows us to treat each node in the distributed networking systems as an element of a multi-set data structure, which in-turn can be an active program to be dened in a lower level of the program structure. (2) Parallelism can be easily achieved without extra eorts in designing communication and synchronization mechanism because CRM express them implicitly. (3) Concurrency and dynamic nature of MAS can be easily reected by CRM's non-determinism feature. (4) Autonomy can be expressed naturally by CRM's locality of reaction feature. (5) Combining dierent programming technologies is made feasible in Gamma framework because no assumptions are made about the way for implementing each node in the system hierarchy. (6) The reusability of the agent systems can be promoted by higher-order CRM languages because the existing agents can be combined by using higher-order operations dened in those languages. A special issue in a distributed system is that the system is composed of interacting, but independent program units, each has its own data domain; and the architectural design focuses on the conversation among these units (Lin, Norrie, Flores, & Kremer, 2000; Lin, Lin, & Holt, 2003). A conversation is a sequence of messages involving two or more agents and centering on a set of pre-designated topics, intended to achieve a particular purpose. To correctly and eciently engineer software architecture, we can model and specify agent interactions in distributed learning as conversation schemata, in which interaction patterns and task (5)
4 OpenStax-CNX module: m constraints in collaborative agent systems are constructed within class hierarchies of conversation schemata. For example, let's consider an online course material maintenance system. The conversation schema is shown in Figure 1. As we know of e-learning systems, the online course materials are updated often in order to keep them as current as possible, esp. in some rapidly changing elds like computing and information systems. As part of the duty of the course instructor in his/her eort to make the necessary adjustments for the benet of students, whenever there's a signicant change in the content of several designated web pages of online course materials, he/she should notify by s the students who are taking the course and those who are interested in the topic. The conversation model of the system consists of the following core elements: Figure 1 Figure 1: The conversation schema of course maintenance Student Information Agent (ST): A Student Information Agent is designed for providing services about student information, such as providing an list for a course by automatically maintaining the list of students taking a course; and maintaining the prole of each student. While student information agent performs various tasks, for our purpose, we use EM to denote the domain and predicate ST(e, s) to denote that an notication e is sent to student s. Notication Agent (NT): The basic function of the Notication Agent is to send s to students who take the course according to the student proles stored in a database when the course material has been signicantly changed. We use NF to denote the domain of notications and predicate NT(n, e) to denote that e is to disseminate notication n. Monitoring Agent (MT): This agent maintains the content of the topic tree, a course material URL database, monitors updates and noties the notication agent when a change is made to the database. The domain handled by the monitoring agent is the topic link database LK. We use predicate MT(l,
5 OpenStax-CNX module: m n) to denote that notication n is created in accordance to the change made on topic link l. Maintenance Agent (MA): The maintenance agent provides proxy services to the instructor. It takes updating instructions from the instructor and dispatches them to the monitoring agent. We use UD to denote the domain of updates made by the instructor and predicate MA(u, l) to denote that an update is made on topic link l. We assume that there is only one instructor in the system. There are two databases used by this system: Topic Tree or Link Database (LK): The course material is organized in the form of a topic tree. Each entry in the topic tree is a link to a web page. We use LK to denote the domain of topic links. Student Information Database (DT): This database maintains student information and their mail boxes. We use DT to denote the domain of students. Note that although we will focus on modeling the agent conversation in the following discussion, we would like to point out that by no means we are talking about the entire system for e-learning. Our point is to describe our methodology to specify agent conversation in a distributed system. Based on the above conversation schema, the following constraints apply: A1: If the instructor makes any update (u) on any topic link (l), a notication message (n) is generated to notify the change made on the topic link. A2. For any notication message (n) that is generated to notify a change made on any topic link (l), an (e) is sent to deliver the notice. A3. For any (e) that is generated to deliver any notice (n), the to sent to all students. The design goal of the system conversation schemata is that for any update made by the instructor, an notication is sent to all students. A predicate logic specication of the goal is: goal e : EM. s : DT.ST (e, s) (8) However, the goal is not veriable with respect to the given input because the input (viz., the update u) and the output (viz., the e) are not handled by the same agent. Based on constraint A3, we can create a sub-goal (goal2) to check that any notice (n) leads to the creation of an (e). This can be done by the Notication Agent (NT). However, although goal2 checks domain NF, it still does not contain input u. Using A2, we obtain another sub-goal (goal1) to check that a notication (n) is created when a change is made on a topic link (l) and this can be done by the Monitoring Agent (MT). With a similar deduction using A1, we obtain goal0 to ensure a change on the topic link (l) is made according to the update (u) and this is done by the Maintenance Agent (MA). Note that the input and output of the sub-goals form a pipelining structure: A Gamma program of goal0 can be constructed as: u goal0 l goal1 n goal2 e goal (9)
6 OpenStax-CNX module: m Figure 2 where MA[u, l] denote the molecule constructed to verify specication MA(u, l). Similarly, <goal1> can be constructed as: Figure 3 Because the input l in <goal1[l]> is computed using expression: the verication program should be: extract, fail, result, < goal 0 > (10)
7 OpenStax-CNX module: m Figure 4 With similar reasoning, we can construct: Figure 5 To construct the program for we rstly construct the program for we get: goal = e : EM. s : DT.ST (e, s) (11) s : DT.ST (e, s) (12)
8 OpenStax-CNX module: m Figure 6 Then we have: Figure 7 Though we omitted some details of the construction process of the above program, we would like to point out that these programs can be constructed using predened rules and the process can be semi-automated (Lin, 2007a). This sample application of the Chemical Reaction Model shows that parallelism can be achieved in a very high level and this approach is especially suitable to address architectural design issues of a large software system. Interested readers are welcome to contact the author at linh@uhd.edu 1. 1 Bibliography Banatre, J.-P., & Le Metayer, D. (1990). The Gamma model and its discipline of programming. Science of Computer Programming, 15, Banatre J.-P., & Le Metayer, D. (1993). Programming by multiset transformation. CACM, 36(1), Banâtre, J.-P., Fradet, P., & Radenac, Y. (2004). Chemical specication of autonomic systems. In Proc. of the 13th International Conference on Intelligent and Adaptive Systems and Software Engineering (IASSE'04), July Banâtre, J.-P., Fradet, P., & Radenac, Y. (2005a). Principles of chemical programming. In S. Abdennadher and C. Ringeissen (eds.): Proc. of the 5th International Workshop on Rule-Based Programming (RULE'04), 124, ENTCS, linh@uhd.edu
9 OpenStax-CNX module: m Banâtre, J.-P., Fradet, P., & Radenac, Y. (2005b). Higher-order Chemical Programming Style. In Proceedings of Unconventional Programming Paradigms, Springer-Verlag, LNCS, 3566, Berry, G., & Boudol, G. (1992). The Chemical Abstract Machine. Theoretical Computer Science, 96, Cabri, et al. (2000). Mobile-Agent Coordination Models for Internet Applications. Computer, 2000 February, 2. Carriero, N., & Gelernter, D. (1989). Linda in context. CACM, 32(4), Cohen, D., & Muylaert-Filho, J. (1996). Introducing a calculus for higher-order multiset programming. In Coordination Languages and Models, LNCS, 1061, Creveuil, C. (1991). Implementation of Gamma on the Connection Machine. Proc. Workshop on Research Directions in High-Level Parallel Programming Languages, Mont-Saint Michel, Springer-Verlag, LNCS 574, Chandy, K.M., & Misra, J. (1988). Parallel Program Design: A Foundation. Addison-Wesley. Gladitz, K., & Kuchen, H. (1996). Shared memory implementation of the Gamma-operation. Journal of Symbolic Computation 21, Le Metayer, D. (1994). Higher-order multiset processing. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 18, Lin F., Norrie D. H., Flores, R.A., & Kremer R.C. (2000). Incorporating Conversation Managers into Multi-agent Systems, in M. Greaves, F. Dignum, J. Bradshaw & B. Chaib-draa (Eds.), Proc. of the Workshop on Agent Communication and Languages, 4th Inter. Conf. on Autonomous Agents (Agents 2000), Barcelona, Spain, June, 3-7, 2000, 1-9. Lin, F.O., Lin, H., & Holt, P. (2003). A Method for Implementing Distributed Learning Environments, Proc Information Resources Management Association International Conference, May 18-21, 2003, Philadelphia, Pennsylvania, USA, Lin, H. (2004). A language for specifying agent systems in E-Learning environments. in: F.O. Lin (ed.), Designing Distributed Learning Environments with Intelligent Software Agents, Lin, H., & Yang, C. (2006). Specifying Distributed Multi-Agent Systems in Chemical Reaction Metaphor. The International Journal of Articial Intelligence, Neural Networks, and Complex Problem-Solving Technologies, Springer-Verlag, 24(2), Lin, H. (2007a). From Logic Specication to [U+F067]-Calculus: A Method for Designing Multi-agent Systems, International Journal of Intelligent Information Technologies, 3(3), pp Lin, H. (2007b). A Module Language for Implementing Multi-Agent Systems Specied by Gamma Calculus. Journal of System and Management Sciences, Communications of the ICISA, 8(2), Lin, H. (2007c). Agent-Based Architecture of a Distributed Laboratory System, International Journal of Information & Communication Technology Education (IJICTE). 3(1), Also included in reference collection: Craig Van Slyke (Ed.), Information Communication Technologies: Concepts, Methodologies, Tools, and Applications, Ma, W., Tran, D., Sharma, D., Lin, H., & Anderson, M. (2007). Concurrent Programming with Multi- Agents and the Chemical Abstract Machine, in: H. Lin (ed.): Architectural Design of Multi-Agent Systems: Technologies and Techniques, Idea Group Inc., Misra, J. (1989). A foundation of parallel programming. In M. Broy (ed.). Constructive Methods in Computing Science. NATO ASI Series, Vol. F55, Fradet, P., & Le Metayer, D. (1998). Structured Gamma, Science of Computer Programming, 31(2-3),
NRC Publications Archive Archives des publications du CNRC
NRC Publications Archive Archives des publications du CNRC Specification of Multi-Agent Systems in the Gamma Language Lin, H.; Yang, Chunsheng NRC Publications Record / Notice d'archives des publications
More informationIntelligent Agents. Based on An Introduction to MultiAgent Systems and slides by Michael Wooldridge
Intelligent Agents Based on An Introduction to MultiAgent Systems and slides by Michael Wooldridge Denition of an Agent An agent is a computer system capable of autonomous action in some environment, in
More informationGOAL-BASED INTELLIGENT AGENTS
International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798
More informationData Integration using Agent based Mediator-Wrapper Architecture. Tutorial Report For Agent Based Software Engineering (SENG 609.
Data Integration using Agent based Mediator-Wrapper Architecture Tutorial Report For Agent Based Software Engineering (SENG 609.22) Presented by: George Shi Course Instructor: Dr. Behrouz H. Far December
More informationPS engine. Execution
A Model-Based Approach to the Verication of Program Supervision Systems Mar Marcos 1 y, Sabine Moisan z and Angel P. del Pobil y y Universitat Jaume I, Dept. of Computer Science Campus de Penyeta Roja,
More informationPersonalized e-learning a Goal Oriented Approach
Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,
More informationMaster of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
More informationJieh Hsiang Department of Computer Science State University of New York Stony brook, NY 11794
ASSOCIATIVE-COMMUTATIVE REWRITING* Nachum Dershowitz University of Illinois Urbana, IL 61801 N. Alan Josephson University of Illinois Urbana, IL 01801 Jieh Hsiang State University of New York Stony brook,
More informationManaging Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationA three-dimensional visualization of communications in distributed program environments
Engineering Industrial & Management Engineering fields Okayama University Year 2003 A three-dimensional visualization of communications in distributed program environments Mariko Sasakura Okayama University
More informationThesis work and research project
Thesis work and research project Hélia Pouyllau, INRIA of Rennes, Campus Beaulieu 35042 Rennes, helia.pouyllau@irisa.fr July 16, 2007 1 Thesis work on Distributed algorithms for endto-end QoS contract
More informationAN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS
AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS ZORAN JEREMIĆ, VLADAN DEVEDŽIĆ, DRAGAN GAŠEVIĆ FON School of Business Administration, University of Belgrade Jove Ilića 154, POB 52, 11000 Belgrade,
More informationAgent-based University Library System
_ Course Number: SENG 609.22 Session: Fall, 2004 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Project Report Agent-based University Library
More informationInformation integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A
Title Information integration platform for CIMS Author(s) Chan, FTS; Zhang, J; Lau, HCW; Ning, A Citation IEEE International Conference on Management of Innovation and Technology Proceedings, Singapore,
More informationRegular Expressions with Nested Levels of Back Referencing Form a Hierarchy
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety
More informationOverview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
More informationUnit Testing with Monkeys Karl-Mikael Björklid (bjorklid@jyu.) University of Jyväskylä Department of Mathematical Information Technology
Abstract Unit Testing with Monkeys Karl-Mikael Björklid (bjorklid@jyu.) University of Jyväskylä Department of Mathematical Information Technology Unit testing has become an incresingly popular way of assuring
More informationExtending Data Processing Capabilities of Relational Database Management Systems.
Extending Data Processing Capabilities of Relational Database Management Systems. Igor Wojnicki University of Missouri St. Louis Department of Mathematics and Computer Science 8001 Natural Bridge Road
More informationDepartment of Computer and Information Science, Ohio State University. In Section 3, the concepts and structure of signature
Proceedings of the 2nd International Computer Science Conference, Hong Kong, Dec. 1992, 616-622. 616 SIGNATURE FILE METHODS FOR INDEXING OBJECT-ORIENTED DATABASE SYSTEMS Wang-chien Lee and Dik L. Lee Department
More informationRequirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
More informationFrom Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
More informationData Integration. Maurizio Lenzerini. Universitá di Roma La Sapienza
Data Integration Maurizio Lenzerini Universitá di Roma La Sapienza DASI 06: Phd School on Data and Service Integration Bertinoro, December 11 15, 2006 M. Lenzerini Data Integration DASI 06 1 / 213 Structure
More informationAppendices master s degree programme Artificial Intelligence 2014-2015
Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability
More informationEnforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Sean Thorpe 1, Indrajit Ray 2, and Tyrone Grandison 3 1 Faculty of Engineering and Computing,
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationMULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
More informationFrom Business Process Modeling to the Specification of Distributed Business Application Systems - An Object-Oriented Approach -
From Business Process Modeling to the Specification of Distributed Business Application Systems - An Object-Oriented Approach - Otto K. Ferstl, Elmar J. Sinz 1 Abstract A business application system is
More informationspecication [3]. FlowDL allows to indicate the source of the documents, their control ow and the activities that make use of these documents. A MARIFl
A Workow System through Cooperating Agents for Control and Document Flow over the Internet? A. Dogac 1,Y.Tambag 1,A.Tumer 1, M. Ezbiderli 1,N.Tatbul 1, N. Hamali 1,C. Icdem 1 and C. Beeri 2 1 Software
More informationResistors in Series and Parallel
OpenStax-CNX module: m42356 1 Resistors in Series and Parallel OpenStax College This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 3.0 Abstract Draw a circuit
More informationA Tool for Enterprise Architecture Analysis using the PRM formalism
A Tool for Enterprise Architecture Analysis using the PRM formalism Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, and Teodor Sommestad Industrial Information and Control Systems, KTH
More informationDescribe the process of parallelization as it relates to problem solving.
Level 2 (recommended for grades 6 9) Computer Science and Community Middle school/junior high school students begin using computational thinking as a problem-solving tool. They begin to appreciate the
More informationOverview of major concepts in the service oriented extended OeBTO
Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business
More informationA Systematic Approach. to Parallel Program Verication. Tadao TAKAOKA. Department of Computer Science. Ibaraki University. Hitachi, Ibaraki 316, JAPAN
A Systematic Approach to Parallel Program Verication Tadao TAKAOKA Department of Computer Science Ibaraki University Hitachi, Ibaraki 316, JAPAN E-mail: takaoka@cis.ibaraki.ac.jp Phone: +81 94 38 5130
More information22C:22 (CS:2820) Object-Oriented Software Development
The University of Iowa 22C:22 (CS:2820) Object-Oriented Software Development Fall 2012 Software Complexity by Cesare Tinelli Complexity Software systems are complex artifacts Failure to master this complexity
More informationSystem Modelingg Models of Computation and their Applications Axel Jantsch Laboratory for Electronics and Computer Systems (LECS) Royal Institute of Technology, Stockholm, Sweden February 4, 2005 System
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More informationOn the general structure of ontologies of instructional models
On the general structure of ontologies of instructional models Miguel-Angel Sicilia Information Engineering Research Unit Computer Science Dept., University of Alcalá Ctra. Barcelona km. 33.6 28871 Alcalá
More informationRelational Databases
Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 18 Relational data model Domain domain: predefined set of atomic values: integers, strings,... every attribute
More informationEFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP
EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA jiangh@benedict.edu ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has
More information4. Multiagent Sys stems Design. Part 2: The PROMETHEUS methodology.
4. Multiagent Systems Design Part 2: Multiagent Syste ems (SMA-UPC) https://kemlg.upc.edu The PROMETHEUS methodology. Javier Vázquez-Salceda SMA-UPC Methodological Extensions to Object-Oriented Approaches
More informationComputer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation
Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation Stephen S. Yau and Xinyu Zhang Computer Science and Engineering Department Arizona State University
More informationinteractive automatic (rules) automatic (patterns) interactive REP ENVIRONMENT KERNEL
AN APPROACH TO SOFTWARE CHANGE MANAGEMENT SUPPORT Jun Han Peninsula School of Computing and Information Technology Monash University, McMahons Road, Frankston, Vic 3199, Australia phone: +61 3 99044604,
More informationComponents for Operating System Design
Components for Operating System Design Alan Messer and Tim Wilkinson SARC, City University, London, UK. Abstract Components are becoming used increasingly in the construction of complex application software.
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationTECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.
CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express
More informationPersonalization of Web Search With Protected Privacy
Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information
More informationInclude Requirement (R)
Using Inuence Diagrams in Software Change Management Colin J. Burgess Department of Computer Science, University of Bristol, Bristol, BS8 1UB, England Ilesh Dattani, Gordon Hughes and John H.R. May Safety
More informationMODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson
More informationEnvironments. Peri Tarr. Lori A. Clarke. Software Development Laboratory. University of Massachusetts
Pleiades: An Object Management System for Software Engineering Environments Peri Tarr Lori A. Clarke Software Development Laboratory Department of Computer Science University of Massachusetts Amherst,
More informationMining various patterns in sequential data in an SQL-like manner *
Mining various patterns in sequential data in an SQL-like manner * Marek Wojciechowski Poznan University of Technology, Institute of Computing Science, ul. Piotrowo 3a, 60-965 Poznan, Poland Marek.Wojciechowski@cs.put.poznan.pl
More informationRegular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
More informationMasters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
More informationMasters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
More informationSoftware Engineering
Software Engineering Lecture 06: Design an Overview Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 35 The Design Phase Programming in
More informationDynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of
More informationDistributed Database for Environmental Data Integration
Distributed Database for Environmental Data Integration A. Amato', V. Di Lecce2, and V. Piuri 3 II Engineering Faculty of Politecnico di Bari - Italy 2 DIASS, Politecnico di Bari, Italy 3Dept Information
More informationMultiagent Systems Engineering: A Methodology And Language for Designing Agent Systems
Presented at Agent-Oriented Information Systems (AOIS) 99 Multiagent Systems Engineering: A Methodology And Language for Designing Agent Systems Scott A. DeLoach Department of Electrical & Computer Engineering
More informationQuery Processing in Data Integration Systems
Query Processing in Data Integration Systems Diego Calvanese Free University of Bozen-Bolzano BIT PhD Summer School Bressanone July 3 7, 2006 D. Calvanese Data Integration BIT PhD Summer School 1 / 152
More informationPROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE
International Journal of Computer ScienceandCommunication Vol. 2, No. 1, January-June2011, pp. 153-157 PROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE Neeraj Kumar Singhania University,
More informationMathematical Induction. Lecture 10-11
Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach
More informationProgramming Languages
Programming Languages Qing Yi Course web site: www.cs.utsa.edu/~qingyi/cs3723 cs3723 1 A little about myself Qing Yi Ph.D. Rice University, USA. Assistant Professor, Department of Computer Science Office:
More informationcategory field F 2 feature field feature field ART b ART a F b 1 F 1 a - x a x b b w
FOCI: A Personalized Web Intelligence System Ah-Hwee Tan, Hwee-Leng Ong, Hong Pan, Jamie Ng, Qiu-Xiang Li Kent Ridge Digital Labs 21 Heng Mui Keng Terrace, Singapore 119613, email: fahhwee, hweeleng, panhong,
More informationIntegration of Workflow and Agent Technology for Business Process Management
The Sixth International Conference on CSCW in Design. July 12-14, 2001, London, Ontario, Canada Integration of Workflow and Agent Technology for Business Process Management Yuhong Yan 1, Zakaria Maamar
More informationLanguage. Johann Eder. Universitat Klagenfurt. Institut fur Informatik. Universiatsstr. 65. A-9020 Klagenfurt / AUSTRIA
PLOP: A Polymorphic Logic Database Programming Language Johann Eder Universitat Klagenfurt Institut fur Informatik Universiatsstr. 65 A-9020 Klagenfurt / AUSTRIA February 12, 1993 Extended Abstract The
More informationMICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES FIELD 050: COMPUTER SCIENCE
MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES Subarea Educational Computing and Technology Literacy Computer Systems, Data, and Algorithms Program Design and Verification Programming Language
More informationFormal Engineering for Industrial Software Development
Shaoying Liu Formal Engineering for Industrial Software Development Using the SOFL Method With 90 Figures and 30 Tables Springer Contents Introduction 1 1.1 Software Life Cycle... 2 1.2 The Problem 4 1.3
More informationRigorous Software Development CSCI-GA 3033-009
Rigorous Software Development CSCI-GA 3033-009 Instructor: Thomas Wies Spring 2013 Lecture 11 Semantics of Programming Languages Denotational Semantics Meaning of a program is defined as the mathematical
More information0 0-10 5-30 8-39. Rover. ats gotorock getrock gotos. same time compatibility. Rock. withrover 8-39 TIME
Verication of plan models using UPPAAL Lina Khatib 1, Nicola Muscettola, and Klaus Havelund 2 NASA Ames Research Center, MS 269-2 Moett Field, CA 94035 1 QSS Group, Inc. 2 RECOM Technologies flina,mus,havelundg@ptolemy.arc.nasa.gov
More informationSemantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
More informationVerifying Semantic of System Composition for an Aspect-Oriented Approach
2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach
More informationNeighborhood Data and Database Security
Neighborhood Data and Database Security Kioumars Yazdanian, FrkdCric Cuppens e-mail: yaz@ tls-cs.cert.fr - cuppens@ tls-cs.cert.fr CERT / ONERA, Dept. of Computer Science 2 avenue E. Belin, B.P. 4025,31055
More informationHow To Understand The Theory Of Computer Science
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
More informationDescription of the program
Study program Faculty Cycle Software Engineering Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program The Masters programme in Software Engineering
More informationprogramming languages, programming language standards and compiler validation
Software Quality Issues when choosing a Programming Language C.J.Burgess Department of Computer Science, University of Bristol, Bristol, BS8 1TR, England Abstract For high quality software, an important
More informationWeb Hosting Analysis Tool for Service Providers
Web Hosting Analysis Tool for Service Providers Ludmila Cherkasova, Mohan DeSouza 1, Jobin James 1 Computer Systems and Technology Laboratory HPL-1999-150 November, 1999 E-mail: {cherkasova,mdesouza,jobin}@hpl.hp.com
More informationMulti-Agent Based Peer-to-Peer Workflow Management System
Multi-Agent Based Peer-to-Peer Workflow Management System A. Aldeeb, K. Crockett and M. J. Stanton Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, M1 5GD, UK {a.aldeeb,
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationA Search Engine to Categorize LOs
A Search Engine to Categorize LOs Gianni Fenu Abstract The main purpose of this paper is to analyze the state of the art of search engines in e-learning platforms, and to elaborate a new model that exploits
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationLecture 1: Introduction
Programming Languages Lecture 1: Introduction Benjamin J. Keller Department of Computer Science, Virginia Tech Programming Languages Lecture 1 Introduction 2 Lecture Outline Preview History of Programming
More informationA Framework towards the Verication of Emergent Properties in Spatial Multi-Agent Systems
PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 37-44, 2011 A Framework towards the Verication of Emergent Properties in Spatial Multi-Agent Systems Isidora Petreska
More informationPage 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT
Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.
More informationOntologies for Enterprise Integration
Ontologies for Enterprise Integration Mark S. Fox and Michael Gruninger Department of Industrial Engineering,University of Toronto, 4 Taddle Creek Road, Toronto, Ontario M5S 1A4 tel:1-416-978-6823 fax:1-416-971-1373
More informationIntroducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
More informationMasters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
More informationFunctional Programming. Functional Programming Languages. Chapter 14. Introduction
Functional Programming Languages Chapter 14 Introduction Functional programming paradigm History Features and concepts Examples: Lisp ML 1 2 Functional Programming Functional Programming Languages The
More informationSustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,
More informationML for the Working Programmer
ML for the Working Programmer 2nd edition Lawrence C. Paulson University of Cambridge CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface to the Second Edition Preface xiii xv 1 Standard ML 1 Functional Programming
More informationA Componentware Methodology based on Process Patterns Klaus Bergner, Andreas Rausch Marc Sihling, Alexander Vilbig Institut fur Informatik Technische Universitat Munchen D-80290 Munchen http://www4.informatik.tu-muenchen.de
More informationCassandra. References:
Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationMeeting Scheduling with Multi Agent Systems: Design and Implementation
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and
More information2015-2016 North Dakota Advanced Placement (AP) Course Codes. Computer Science Education Course Code 23580 Advanced Placement Computer Science A
2015-2016 North Dakota Advanced Placement (AP) Course Codes Computer Science Education Course Course Name Code 23580 Advanced Placement Computer Science A 23581 Advanced Placement Computer Science AB English/Language
More informationAN AI PLANNING APPROACH FOR GENERATING BIG DATA WORKFLOWS
AN AI PLANNING APPROACH FOR GENERATING BIG DATA WORKFLOWS Wesley Deneke 1, Wing-Ning Li 2, and Craig Thompson 2 1 Computer Science and Industrial Technology Department, Southeastern Louisiana University,
More informationINFORMATION INTEGRATION ARCHITECTURE DEVELOPMENT: A MULTI-AGENT APPROACH
INFORMATION INTEGRATION ARCHITECTURE DEVELOPMENT: A MULTI-AGENT APPROACH Stéphane Faulkner, Manuel Kolp, Tai Nguyen, Adrien Coyette, Tung Do Information Systems Research Unit, University of Louvain, 1
More informationImplementation of hybrid software architecture for Artificial Intelligence System
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and
More informationCOMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)
VCU 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) The Bachelor of Science in Computer Science is built on a rigorous, highly concentrated, accredited curriculum of computer science courses. The program
More informationPossibilistic Petri nets as a basis for agent service description language
Available online at www.sciencedirect.com Fuzzy Sets and Systems 144 (2004) 105 126 www.elsevier.com/locate/fss Possibilistic Petri nets as a basis for agent service description language Jonathan Lee a;,
More informationStatistical Machine Translation: IBM Models 1 and 2
Statistical Machine Translation: IBM Models 1 and 2 Michael Collins 1 Introduction The next few lectures of the course will be focused on machine translation, and in particular on statistical machine translation
More information