Adaptive Mixed-Initiative Dialogue Management

Size: px
Start display at page:

Download "Adaptive Mixed-Initiative Dialogue Management"

Transcription

1 Adaptive Mixed-Initiative Dialogue Management Gert Veldhuijzen van Zanten IPO, Center for Research on User-System Interaction, P.O. Box 213, 5600 MB Eindhoven, the Netherlands ABSTRACT This paper describes an architecture that supports adaptive mixed-initiative dialogue. It is based on a generalisation of the form-filling paradigm. Rather than a flat slot structure, we use a hierarchy that contains slots at various levels of abstraction. Along with the slot hierarchy, a question hierarchy is defined that allows for adaptive mixed-initiative dialogue. Depending on the success or failure of certain questions, the system can zoom-in to more detailed questions, or zoom-out to higherlevel questions. The distribution of initiative in dialogue is closely related to the granularity of the information that is asked for. To determine the right granularity level for system questions we have to take into account the influences on user freedom, predictability and the knowledge of the user. Giving the user initiative is suitable in situations where the user knows what to do. In such cases, the user may give all relevant information in one turn. However, giving the user more initiative tends to make his behaviour less predictable and therefore increases the chance on speech-understanding errors. The system should switch to lower-level questions when higher-level ones fail, and when the user supplies unsolicited information, the system can switch to higher-level questions. INTRODUCTION Many practical dialogue systems are based on the formfilling paradigm. To perform some action on behalf of the user, the system needs information from the user. This information is represented as a fixed set of slots, and questions can be asked for each slot. One of the merits of the slot-filling paradigm is that it allows a clear distinction between the dialogue task (exchanging information) and the dialogue strategy. The task is described by the slots themselves and the possible values that they may get. The strategy is concerned with the order in which slots are discussed, and with grounding of slot values, i.e. with inconsistencies, ambiguities and uncertainties that can arise when the dialogue participants attempt to build a common ground. Dialogue strategies can be reused for many different domains, so that developing a dialogue system for a new domain is limited to specifying a new set of slots and their semantics. A drawback of the slot-filling paradigm as it stands, is that it results in rather rigid dialogues. The model dialogue within the slot-filling paradigm is one in which a number of system questions are interleaved with answers from the user, each answer answering just the question that was asked by the system. In spoken human-human dialogues, this kind of dialogue is very rare; People ask questions that refer to concepts that involve more than one slot, and they are often overinformative and say things which they believe are relevant, even when they aren t asked for. More so, they use these devices intelligently, using high-level concepts to open the dialogue, and zooming into details when problems arise. Many systems (for instance, the one described by Aust et al. [[1]]) are able to ask questions involving more than one slot and to process overinformative answers. However, there is no way to control this dimension intelligently within these systems. The expectations that users have about the capabilities of the system influence their behaviour. Given the state of technology that most users are familiar with, the expectations will generally not be very high, and consequently users will only assume capabilities that the system itself presents to the user. By asking very specific questions like On which date do you want to travel? a system does not give a clue that it might be able to process over-informative answers, and as a result its users hardly ever give over-informative answers to such systems, even though this could make the dialogue considerably more efficient. Another drawback of using a fixed set of slots is that problems that arise in the understanding of parts of slot values cannot be discussed. To alleviate some of the problems mentioned above, we will present a dialogue-management framework that is based on a hierarchically structured set of slots. The hierarchy contains slots at various levels of abstraction. These slots give rise to questions from relatively general ones like When do you want to travel? to very specific questions like Do you want to travel on September 30th? and several levels in between. The hierarchy serves several purposes: One is the representation of partial information. This is needed when speech-understanding errors occur, or when the user gives incomplete answers. The information that is sup-

2 plied and understood can be stored in lower level slots (for a description of this process see [[2]]). Another purpose is the interpretation of user utterances in which information is given that was not asked for. When this happens, it is assumed that the user utterance answers some higher-level question. This is essential for mixedinitiative dialogue. And finally, it allows for adaptive mixed-initiative. Depending on the success of failure of certain questions, the system can zoom-in to more detailed questions, or zoom-out to higher-level questions. We will claim that initiative in dialogue has to do with the granularity of the information that is asked for. Users, especially naïve ones, tend to answer the system question and are not inclined to give information that was not asked for. So, when the system asks general questions the user may take the initiative in deciding which details to mention. While by asking specific questions the system takes the initiative. Determining the right level of initiative is finding some optimum in the trade-off between user-freedom and user-predictability. User-initiative is suitable in situations where the user knows better than the system what is going on. When given initiative, the user may give all relevant information in one turn. However, giving the user more initiative tends to make his behaviour less predictable and therefore increases the chance of speech-understanding errors. We propose a dialogue-management strategy in which initiative is adaptively given away when appropriate, but where the system takes the initiative when errors are detected. We will give an example of the kind of dialogue we envisage. 1. S: This is the train-information system of the Dutch Railways. How can I help you? 2. U: I want to visit my aunt, she lives opposite the city hall. 3. S: Sorry, I don't understand your request. Do you want information about train connections or about prices? 4. U: About a train connection. 5. S: Which train connection? 6. U: From Utrecht to Amsterdam. 7. S: When do you want to travel from Utrecht CS to Amsterdam CS? 8. U: I need to be there at eleven o'clock tomorrow morning. 9. S: Eleven o'clock tomorrow morning? 10. U: Yes. 11. S: You can leave at half past ten at Utrecht CS. Your train will arrive at Amsterdam CS at eleven o'clock. Do want any other information? 12. U: Yes, at what platform does my train leave? 13. S: Sorry, I don't understand your request. Do you want information about earlier or later trains, the return trip or about the price? 14. U: No thanks. 15. S: OK, thank you for using our service. In utterance (1), the initiative is completely left to the user. The advantage is that the user may directly state all relevant information for his or her request, as in I'd like to travel tomorrow morning from Amsterdam to Utrecht and I need to be there at 11 o'clock. In this example, it leads to a request that cannot be understood, and therefore a more specific question is asked (3), summing up all alternatives that the system can understand. In utterance (5), the system asks the most general question that is still appropriate given the current state. In section I., we discuss the structure of the information exchange task. It is based on a hierarchical value model, which can be seen as a generalisation of a form with slots. In section II., we describe how the dialogue manager makes use of the value hierarchy to define goals that must be fulfilled in the dialogue. In section III., we describe a hierarchy of questions, and in section IV., we show how this question hierarchy can be used as a dimension along which the initiative in the dialogue can be adaptively controlled. I. TASK STRUCTURE Before we look at how a dialogue can be managed, we will first look at the structure of the task that we want to accomplish with the dialogue. The kind of task that we are interested in, in this paper, is the information exchange task. In such a task, the system has information about a set of values, called the value domain. In the case of a train information system, this set represents the set of all train connections. The goal of the information exchange task can be modelled as giving information about a particular subset of the value domain that the user is interested in. The task can be divided into two sub-tasks: In the first sub-task the subset of the value domain that the user is interested in is determined, and in the second sub-task the information is presented to the user. For both subtasks dialogue is needed, so that the user and the system engage can co-ordinate their activity to ensure mutual understanding. In the first sub-task, the user' s interests are matched to the set of values that the system has knowledge about. Pieraccini, Levin and Eckert [[3]] describe a model in which the subset of the value domain is determined by means of constraining and relaxing sub-dialogues. The dialogue starts with the full domain, and by getting constraints from the user, a subset is determined. In this process, the subset may become empty, for instance, when the user says I want to take a train from Amsterdam to Maastricht and want to leave at 15:00 this afternoon, while there is no train that leaves at that time. Then the system enters a relaxation sub-dialogue in order to give some information that is nevertheless relevant, such as There is a train that leaves at 14:58. In the second sub-task, the dialogue deals with making sure that the user understood the information correctly.

3 Connection = { origin: Event, Price Event Place Town via: LIST OF Event, destination: Event, price: Price } = { guilders: Integer, cents: ( ) } = { place: Place, moment: Moment } = { town: Town, Suffix = cs... Moment suffix: Suffix } VALUES asd... = amsterdam... rotterdam = { date: Date, time: Time } VALUES now... RELATIONS after, before Date = { year: ( ), month: (jan feb... dec), day: ( ), day_of_week: (sun mon... sat) } VALUES today tomorrow... Time = { clock_hour: ( ), hour: ( ); minute: ( ); part_of_day: (night morning afternoon figure 1: types from the train domain A. The Hierarchical Slot Structure For the representation of information in the dialogue, we use a formalism, whose expressive power is rather weak when compared, for instance, to that of first order logic; Disjunctions of values cannot be represented. Yet it is sufficient for our purposes, and it is still stronger than the expressive power of slot-filling formalisms that use a unstructured set of slots. The basis of the formalism is a set of together with a set of constraints. Each slot has a set of possible values. The constraints limit the number of values that a slot can have. A constraint has one of the four following forms f ( x) = y, f ( x) y, x r y or evening) } x ~ y where f is a partial function called a feature, r is a relation and x and y are slots or values. The first two forms are functional constraints, the first one positive and the second one negative. The third form is a relational constraint between slots or values of the same type. And the fourth form represents that one slot or value dominates another through one or more (unknown) positive functional constraints. The slots and values in a domain are typed, and for each type only a limited number of features and relations is defined. A connection value, for instance, has features that return that connection s origin and destination, but these features are not defined for date values. An overview of the types and features in the train domain is shown in figure 1. Here, we can see, for instance, that a value of type moment, has date and time features, which in turn can be further divided with year, month, day, week and day of the week, hour, and minute features. We can also see that now is a value of type moment, and that moments can be related to each other through after and before relations. The set of all features of the domain constitutes a hierarchy over the values of the domain. It is defined as the smallest relation that satisfies the following equations. f ( a) = b a b a b and b c a c The functional character of features constitutes a hierarchy where the value in the argument position of a feature stands higher in the hierarchy than the result. Relations, on the other hand, have no bearing on the hierarchy; They are only allowed to stand between values of the same type, so that here both related values stand at the same level in the hierarchy. Relations are needed to represent the constraints that are expressed by an utterance such as I need to be there before 10 pm. The semantics of a set of constraints P is defined as a set of mappings m from the slots that are mentioned in the constraints, to the values in the domain. These mappings need to satisfy the constraints. [ P] = { m:( X D) D a D m( a) = a, ( f ( x) = y) P f ( m( x)) = m( y), ( f ( x) y) P f ( m( x)) m( y), ( x r y) P ( m( x), m( y)) r and ( x ~ y) P m( x) m( y) } Here, X is the set of all slots, and D is the set of all values in the domain. For our application, it consists of all possible train connections, together with their subvalues, such as train stations, dates, years, months and integers. B. Updates, Belief Revision Utterances of the user and the system are interpreted as updates of an information state, that consists of a set of constraints with associated modalities. The modalities define whether some constraint is in the common ground, a default assumption, or whether one of the participants has requested to know whether the constraint holds or not. We keep track of the reasons why certain constraints have been added to the information state. This is needed in order to do belief revisions, which are needed when corrections or denials occur, or when inconsistencies are detected. Inconsistencies that cannot be removed by dropping assumptions have to be dealt with in the dialogue. The details of the update and belief revision algorithm are beyond the scope of this paper, and are discussed in [[4]]. C. Grounding The predications in the information state are associated with justifications. These justifications may be either utterances or inferences. The justifications are needed for belief revision, but also for a process called ground-

4 ing. Traum [[5]] discusses a computational theory of grounding, in which participants in a dialogue engage in co-operative behaviour that involves maintenance of a common ground. Participants check and acknowledge utterances to ensure that both participants agree upon what has been said and establish mutual beliefs. In our system, an important act in the grounding process is the verification act. Each value that was recognised by the speech recogniser is verified, by means of either an implicit or an explicit verification act. An implicit verification is done as in When do you want to travel to Amsterdam Central Station?, where Amsterdam Central Station is implicitly verified. An explicit verification can be done with a yes/no-question, as in Do you want to go to Amsterdam Central Station?. Implicit verification is quite risky, because it depends on the assumption that the user will rectify presuppositions in system utterances. The choice for explicit or implicit verification can be done adaptively, depending on confidence scores [[6]], or on the success of the dialogue so far [[7]]. II. DIALOGUE GOALS For the kind of dialogues we are discussing in this paper, it is safe to assume that participants are engaged in the dialogue because they want to achieve specific goals. The dialogue manager has to select actions that are likely to be effective in achieving these goals. In our framework, goals can be expressed in terms of knowledge that both participants have about certain slots. The more we know about a slot x, i.e. the more constraints it is involved in, the lower the number of values will be that the slot can contain. We call this number the cardinality of x given the set of constraints P. { m [ P] } cardinality( x, P) = a ( m( x) = a) When we know everything about a slot, the cardinality will be one. We distinguish three kinds of goals: Firstly, to get to know what slot(s) the user is interested in. Secondly, to get constraints on a certain slot in order to lower the cardinality of that slot. And thirdly, to get the user to know everything about a certain slot. Assuming that the slot hierarchy is well-designed, these three kinds of goals will be sufficient to model all relevant goals in the dialogue. A. Getting to know the user' s concern Actions that may be effective in achieving the first kind of goal are questions like How may I help you? or Do you want information about prices or about a train connection?. To represent the questions and answers about the user concern, we add a special slot, whose value can be a set of slot, namely those slots that the user is interested in. With this additional slot, we can treat the topic of the user' s concern in just the same way as other topics in the dialogue. B. Getting to know the relevant values When the first kind of goal is fulfilled, the system knows the user s concern. This concern is represented by a (possibly singleton) set of slots. Each slot in this set serves as a goal of the second kind. The cardinality of each concern slot must be lowered. Obviously, this cannot be done by asking questions about that slot itself or about sub-ordinated slots, because the user will not know about these. E.g., when the user wants to know when a train to Amsterdam leaves, she will not know at how many minutes after the hour it will leave. Therefore, the system sets up as a constraining goal a slot that dominates all user-concern slots. Due to the functional character of the features, a low cardinality for the dominating slot will also lead to a low cardinality for the subordinated slots. This dominating slot and, in particular, slots sub-ordinated to it that are not also sub-ordinated to the user-concern slots are called parameters to the user-concern. Suppose, for instance, that the user is concerned with the price of a connection. Then the system cannot ask for how many guilders, or how many cents, but instead has to inquire about other sub-slots of the connection, for instance, the origin and destination sub-slots. When the system knows about the origin and the destination, the cardinality of the connection slot (that dominated the price slot) will be lowered, and therefore, probably also the cardinality of the price slot. In general, the problem of selecting the best sub-slot to inquire about in order to lower the cardinality of a sub-slot is a difficult one, that requires further study. For now, we use a fixed set of rules that is tailored to the application. There are several actions that may lead to the fulfilment of a constraining goal for a given slot x: firstly, we can ask a question, such as Which connection are you interested in? that asks directly for a value of x or, secondly, we can ask a number of questions that query subslots of x. In our case, for instance, From where to where do you want to travel? and When do you want to travel?. Each of these indirect questions can again be expressed as the identification of some slots, in this case an origin, a destination and a date/time slot. These slots stand in relation to the original connection slot through functional predications. origin( c) = o destination( c) = a datetime( c) = m where c is the connection slot, o the origin slot, a the destination slot and m the date/time slot. Each of these slots can again be fulfilled directly or indirectly. For instance, m could be queried indirectly by asking for a date d and then a time t. date( m) = d time( m) = t When the dialogue manager determines that a direct question for some goal slot x is not appropriate, it will set up new goals for slots below x.

5 C. Satisfying the user Once the first and second kinds of goal have been fulfilled, the system must report about the slots that the user wanted to know about. For this purpose, the database is queried, and when successful, the results are matched to the slots that the user was interested in. Then a number of constraints is determined that is sufficient to explain the unit cardinality of the user-concern slot(s). These constraints involve the user-concern slots and slots that are sub-ordinated to it. Through a process of grounding, these constraints are transferred to the user. When the database query is unsuccessful, the cardinality of the concern slots will become zero. The constraints then must be relaxed, so that the cardinality becomes greater than zero. Selecting the right constraints for relaxation is difficult, and depends very much on the task that the user is involved in. In our system, we have selected time slots for relaxation, so that if the system cannot find a connection that arrives or departs at the user specified time, it will give information about a connection that arrives or depart somewhere near the specified time. III. QUESTION HIERARCHY We can distinguish three kinds of questions: open questions, alternatives questions and yes/no questions. An example of an open question is: On which day of the week do you want to travel?, of an alternatives question is: Do you mean 10 o' clock in the morning or in the evening? and a yes/no question is: Do you want to travel to Baarn?. An alternatives question should only be asked when the number of alternatives is rather small, and when it can be expected that the user does not know which alternatives are available. Yes/no questions are appropriate when one alternative is much more likely than the others, or when the speech recogniser has a high probability of mixing up two alternatives. When the system wants information about a slot, it has to chose between these three kinds of questions. A fourth option that the system has is to divide the question into several lower level questions. For instance, when an open question for a date fails, an alternatives question mentioning all possible dates is out of the question. So the system could start asking for the year, month and the day of the month. On closer examination yes/no questions are not a separate category. They can be treated as if they concern boolean sub-slots. For instance, a day-of-the-week slot with values sun through sat, can have features su n- day through saturday that lead to a slot that can co n- tain either the value yes or no. Semantic rules must ensure that only one of the slots can contain yes. The fact that yes/no questions can be treated by sub-slots suggests that we can ask two different kinds of yes/no questions, namely, open yes/no questions and alternatives yes/no questions. This can indeed be useful. When an open yes/no-question like Do you want to travel on Sunday? is not answered by Yes or No, and speech recognition errors occur, we could add a phrase Please answer yes or no, to obtain an alternatives yes/no question. Open and alternatives questions differ only in the amount of information that they give to the user. Therefore, open questions should be used when we have reason to believe that the user knows which kinds of answer the system expects. Otherwise, an alternatives question can be used to inform the user of the possible answers that the system is expecting. Given these observations about questions, we can conclude that the slot hierarchy can be used as a hierarchy of questions. The most general question is How can I help you? that asks about the user concern slot, and lower level questions can be asked for sub-slots. A complication is that not every kind of question can easily be expressed in natural language. For instance, a question like? is not very natural. So in some cases, the system may need to fall back on lower level questions instead. IV. ADAPTIVE INITIATIVE In section II., we discussed the goals that the system can pursue. To pursue a constraining goal for a certain slot, a question can be asked for that slot. But whether this should be an open or an alternatives question depends on the situation. And it also depends on the situation whether we should ask a question for that particular slot, or whether we should ask questions about slots higher-up or lower-down in the hierarchy. In this section, we will discuss the circumstances in which certain kinds of questions are appropriate. In general, the right kind of question depends on the user that is calling the system. A user that knows what she wants, and knows what the system can and cannot do is best helped with a high-level open questions like How can I help you?. In response to it, the user may give all relevant information in one go, e.g. I would like to know, how much is a ticket from Maastricht to Den Helder?, thus telling the system both her concern (ticket price) and the relevant parameters (origin: Maastricht, destination: Den Helder). However, a more naïve user may not know the systems limitations and ask something that the system is incapable of understanding, let alone answering. In that case, it would have been better if the system had told the user what its capabilities are, for instance, by asking an alternatives question like Do you want information about prices, or about a train connection?. Open high-level questions give the user a lot of initiative, whereas low-level alternatives questions take away the initiative from the user. The right level of initiative is the level that corresponds to the level of knowledge that the user has about the application. The problem is that we never know beforehand what kind of user we are dealing with. Therefore, we should construct a user model on the fly, making assumptions

6 and changing them when evidence comes to light. The assumptions can be based on user studies, or on educated guesses. The important thing is that the system adapts when things go wrong. There are two important questions: What does a user model consist of? and What kind of evidence can be used to adapt the user model? The user model consists of a function that tells for each slot whether the user is familiar with its relevance to the overall dialogue goal, with the values that it may contain, and with its sub-slots. Speech recognition errors (or very low confidence scores) are a strong form of evidence that something is wrong with the user model. We propose that in case of speech recognition errors, the highest level user model assumption is dropped. This causes the dialogue manager to switch from an open question to an alternatives questions, or to a number of questions about sub-slots. When the user gives an over-informative answer, this is evidence that the user is aware of the relevance of the slots that have been volunteered, and thus the system can adapt its user model and ask the next question at a higher level. V. CONCLUDING REMARKS We have proposed an adaptive mixed-initiative dialogue management strategy that is based on a hierarchical slot structure. The hierarchy is used to divide the application domain into slots of various levels of abstraction. We have argumented that the granularity of information influences the distribution of initiative in dialogues. Conclusive results must come from experiments with an actual system, that is currently being developed. We use a user model to determine the right generality level for asking questions, and adapt the model when evidence comes to light that the assumptions in the model are at fault. This kind of adaptivity is essential for efficient dialogues, because it allows maximum freedom for the user to express herself in a way that she believes is the most efficient for her specific task. Furthermore, and this is an important point, the uncertainty that is inherent in spoken communication makes perfection an unattainable goal, and adaptivity is the next best thing. Train Timetable Information System, in: Proceedings of the IVTTA ' 94 2nd IEEE workshop on interactive voice technology for telecommunications applications, Kyoto, Japan, pp [2] G.E. Veldhuijzen van Zanten (1996) Pragmatic Interpretation and Dialogue Management in Spoken-Language Systems, In: LuperFoy, S., Nijholt, A. and Veldhuijzen van Zanten, G.E., TWLT11: Dialogue Management in Natural Language Systems, Proceedings of the Twente Workshop on Language Technology 11, pp [3] R. Pieraccini, E. Levin and W. Eckert (1997), AMICA: the AT&T Mixed Initiative Convers a- tional Architecture, Eurospeech 97, pp [4] G.E. Veldhuijzen van Zanten (1998), An Efficient Dialogue Module for OVIS2, Document 52, Priority Programme Language and Speech Technology (TST), January 1998, pp [5] David R. Traum (1994), A computational Theory of Grounding in Natural Language Conversation, PhD Thesis, Univ. of Rochester, Rochester, New York, pp [6] A.G.G. Bouwman and J. Hulstijn (1998), Di a- logue Strategy (Re-)Design with Reliability Measures, in proceedings of the first International Conference on Language Resources and Evaluation, Granada, Spain.. [7] W. Eckert (1996), Gesprochener Mensch- Machine-Dialog, PhD thesis, Shaker Verlag, Aachen, ISBN , ISSN , (in German). ACKNOWLEDGEMENT This research is carried out within the framework of the Priority Programme Language and Speech Technology (TST). The TST-Programme is sponsored by NWO (Dutch Organisation for Scientific Research). REFERENCES [1] H. Aust, M. Oerder, F. Seide and V. Steinbiss (1994), Experience with the Philips Automatic

USER MODELLING IN ADAPTIVE DIALOGUE MANAGEMENT

USER MODELLING IN ADAPTIVE DIALOGUE MANAGEMENT USER MODELLING IN ADAPTIVE DIALOGUE MANAGEMENT Gert Veldhuijzen van Zanten IPO, Center for Research on User-System Interaction, P.O. Box 213, 5600 MB Eindhoven, the Netherlands G.E.Veldhuijzenv.Z@tue.nl

More information

VoiceXML-Based Dialogue Systems

VoiceXML-Based Dialogue Systems VoiceXML-Based Dialogue Systems Pavel Cenek Laboratory of Speech and Dialogue Faculty of Informatics Masaryk University Brno Agenda Dialogue system (DS) VoiceXML Frame-based DS in general 2 Computer based

More information

KNOWLEDGE-BASED MODELING OF DISCRETE-EVENT SIMULATION SYSTEMS. Henk de Swaan Arons

KNOWLEDGE-BASED MODELING OF DISCRETE-EVENT SIMULATION SYSTEMS. Henk de Swaan Arons KNOWLEDGE-BASED MODELING OF DISCRETE-EVENT SIMULATION SYSTEMS Henk de Swaan Arons Erasmus University Rotterdam Faculty of Economics, ment of Computer Science P.O. Box 1738, H9-28 3000 DR Rotterdam, The

More information

II. TYPES OF LEVEL A.

II. TYPES OF LEVEL A. Study and Evaluation for Quality Improvement of Object Oriented System at Various Layers of Object Oriented Matrices N. A. Nemade 1, D. D. Patil 2, N. V. Ingale 3 Assist. Prof. SSGBCOET Bhusawal 1, H.O.D.

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

INF5820, Obligatory Assignment 3: Development of a Spoken Dialogue System

INF5820, Obligatory Assignment 3: Development of a Spoken Dialogue System INF5820, Obligatory Assignment 3: Development of a Spoken Dialogue System Pierre Lison October 29, 2014 In this project, you will develop a full, end-to-end spoken dialogue system for an application domain

More information

Business Rules and Decision Processes in Mediated Business Coordination

Business Rules and Decision Processes in Mediated Business Coordination Business Rules and Decision Processes in Mediated Business Coordination Zheng Zhao and Virginia Dignum and Frank Dignum Department of Information and Computing Sciences Utrecht University The Netherlands

More information

Rich Traceability. by Jeremy Dick Quality Systems and Software Ltd. Abstract

Rich Traceability. by Jeremy Dick Quality Systems and Software Ltd. Abstract www.telelogic.com Rich Traceability by Jeremy Dick Quality Systems and Software Ltd. Abstract Creating traceability through the use of links between paragraphs of documents, or between objects in a requirements

More information

Task Management under Change and Uncertainty

Task Management under Change and Uncertainty Task Management under Change and Uncertainty Constraint Solving Experience with the CALO Project Pauline M. Berry, Karen Myers, Tomás E. Uribe, and Neil Yorke-Smith Artificial Intelligence Center, SRI

More information

2 AIMS: an Agent-based Intelligent Tool for Informational Support

2 AIMS: an Agent-based Intelligent Tool for Informational Support Aroyo, L. & Dicheva, D. (2000). Domain and user knowledge in a web-based courseware engineering course, knowledge-based software engineering. In T. Hruska, M. Hashimoto (Eds.) Joint Conference knowledge-based

More information

Curriculum Vitae. Dr ir Gert E. Veldhuijzen van Zanten. Personal data. Profile

Curriculum Vitae. Dr ir Gert E. Veldhuijzen van Zanten. Personal data. Profile Curriculum Vitae Dr ir Gert E. Veldhuijzen van Zanten Personal data Name Veldhuijzen van Zanten Address Eikendreef 16 Christian Names Gerrit Eduard Zip 6581 PE First Name Gert Titles Dr ir (PhD) Date of

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

THE EURO AREA BANK LENDING SURVEY 3RD QUARTER OF 2014

THE EURO AREA BANK LENDING SURVEY 3RD QUARTER OF 2014 THE EURO AREA BANK LENDING SURVEY 3RD QUARTER OF 214 OCTOBER 214 European Central Bank, 214 Address Kaiserstrasse 29, 6311 Frankfurt am Main, Germany Postal address Postfach 16 3 19, 666 Frankfurt am Main,

More information

Measuring the Quality of Problem Management in an ITIL Environment

Measuring the Quality of Problem Management in an ITIL Environment Measuring the Quality of Problem Management in an ITIL Environment By Berrie Schuurhuis Consultant Service Excellence In an attempt to find the customer value created in an Information Technology Infrastructure

More information

Knowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture

Knowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture 5 th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics January 25-26, 2007 Poprad, Slovakia Knowledge-based Approach in Information Systems Life Cycle and Information

More information

Management and optimization of multiple supply chains

Management and optimization of multiple supply chains Management and optimization of multiple supply chains J. Dorn Technische Universität Wien, Institut für Informationssysteme Paniglgasse 16, A-1040 Wien, Austria Phone ++43-1-58801-18426, Fax ++43-1-58801-18494

More information

Robustness of a Spoken Dialogue Interface for a Personal Assistant

Robustness of a Spoken Dialogue Interface for a Personal Assistant Robustness of a Spoken Dialogue Interface for a Personal Assistant Anna Wong, Anh Nguyen and Wayne Wobcke School of Computer Science and Engineering University of New South Wales Sydney NSW 22, Australia

More information

Improving Knowledge-Based System Performance by Reordering Rule Sequences

Improving Knowledge-Based System Performance by Reordering Rule Sequences Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050

More information

Utility Software II lab 1 Jacek Wiślicki, jacenty@kis.p.lodz.pl original material by Hubert Kołodziejski

Utility Software II lab 1 Jacek Wiślicki, jacenty@kis.p.lodz.pl original material by Hubert Kołodziejski MS ACCESS - INTRODUCTION MS Access is an example of a relational database. It allows to build and maintain small and medium-sized databases and to supply them with a graphical user interface. The aim of

More information

Adapting to the Level of Experience of the User in Mixed-Initiative Web Self-Service Applications

Adapting to the Level of Experience of the User in Mixed-Initiative Web Self-Service Applications Adapting to the Level of Experience of the User in Mixed-Initiative Web Self-Service Applications Mehmet H. Göker Kaidara Software 330 Distel Circle, Suite 150 Los Altos, CA 94022 mgoker@kaidara.com Abstract.

More information

Classification of Fuzzy Data in Database Management System

Classification of Fuzzy Data in Database Management System Classification of Fuzzy Data in Database Management System Deval Popat, Hema Sharda, and David Taniar 2 School of Electrical and Computer Engineering, RMIT University, Melbourne, Australia Phone: +6 3

More information

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by

More information

Module 3: Functional Requirements

Module 3: Functional Requirements smart BA Distance Learning Programme Module 3: Functional Requirements Hello and welcome to the smart BA distance learning programme Module 3 in this module you are going to analyse the requirements of

More information

Family Evaluation Framework overview & introduction

Family Evaluation Framework overview & introduction A Family Evaluation Framework overview & introduction P B Frank van der Linden O Partner: Philips Medical Systems Veenpluis 4-6 5684 PC Best, the Netherlands Date: 29 August, 2005 Number: PH-0503-01 Version:

More information

An Intelligent Sales Assistant for Configurable Products

An Intelligent Sales Assistant for Configurable Products An Intelligent Sales Assistant for Configurable Products Martin Molina Department of Artificial Intelligence, Technical University of Madrid Campus de Montegancedo s/n, 28660 Boadilla del Monte (Madrid),

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Requirements Traceability. Mirka Palo

Requirements Traceability. Mirka Palo Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS

More information

Application Design: Issues in Expert System Architecture. Harry C. Reinstein Janice S. Aikins

Application Design: Issues in Expert System Architecture. Harry C. Reinstein Janice S. Aikins Application Design: Issues in Expert System Architecture Harry C. Reinstein Janice S. Aikins IBM Scientific Center 15 30 Page Mill Road P. 0. Box 10500 Palo Alto, Ca. 94 304 USA ABSTRACT We describe an

More information

TIME OFFICE MANUAL A BRIEF

TIME OFFICE MANUAL A BRIEF TIME OFFICE MANUAL A BRIEF We welcome you to a brief introduction of our Application Software. As the name TimeDESK suggest, the software is used as a vital tool for the HR and Accounts Departments for

More information

Lecture 8 The Subjective Theory of Betting on Theories

Lecture 8 The Subjective Theory of Betting on Theories Lecture 8 The Subjective Theory of Betting on Theories Patrick Maher Philosophy 517 Spring 2007 Introduction The subjective theory of probability holds that the laws of probability are laws that rational

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming

More information

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,

More information

App Development with Talkamatic Dialogue Manager

App Development with Talkamatic Dialogue Manager App Development with Talkamatic Dialogue Manager Dialogue Systems II September 7, 2015 Alex Berman alex@talkamatic.se Staffan Larsson Outline! Introduction to TDM! Technical architecture! App development

More information

Demonstrating WSMX: Least Cost Supply Management

Demonstrating WSMX: Least Cost Supply Management Demonstrating WSMX: Least Cost Supply Management Eyal Oren 2, Alexander Wahler 1, Bernhard Schreder 1, Aleksandar Balaban 1, Michal Zaremba 2, and Maciej Zaremba 2 1 NIWA Web Solutions, Vienna, Austria

More information

Context Aware Predictive Analytics: Motivation, Potential, Challenges

Context Aware Predictive Analytics: Motivation, Potential, Challenges Context Aware Predictive Analytics: Motivation, Potential, Challenges Mykola Pechenizkiy Seminar 31 October 2011 University of Bournemouth, England http://www.win.tue.nl/~mpechen/projects/capa Outline

More information

Specialty Answering Service. All rights reserved.

Specialty Answering Service. All rights reserved. 0 Contents 1 Introduction... 2 1.1 Types of Dialog Systems... 2 2 Dialog Systems in Contact Centers... 4 2.1 Automated Call Centers... 4 3 History... 3 4 Designing Interactive Dialogs with Structured Data...

More information

Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur

Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur Module 2 Software Life Cycle Model Lesson 4 Prototyping and Spiral Life Cycle Models Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a prototype is.

More information

Introduction. Book Structure

Introduction. Book Structure Fundamentals of Project Management, 4 th Edition Simple Solutions for Busy People By Joseph Heagney (A Book review by R. Max Wideman, FPMI) The views expressed in this article are strictly those of Max

More information

Appendix B Data Quality Dimensions

Appendix B Data Quality Dimensions Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

1. Introduction to Spoken Dialogue Systems

1. Introduction to Spoken Dialogue Systems SoSe 2006 Projekt Sprachdialogsysteme 1. Introduction to Spoken Dialogue Systems Walther v. Hahn, Cristina Vertan {vhahn,vertan}@informatik.uni-hamburg.de Content What are Spoken dialogue systems? Types

More information

I look forward to doing business with you and hope we get the chance to meet soon

I look forward to doing business with you and hope we get the chance to meet soon Emailing 1: Worksheet 1 - Reading Tasks Dear Mr Smith, I would like to introduce myself. My name is Saarland and I am the new South Western sales manager for Chou Cream English Schools. The previous sales

More information

Designing an Adaptive Virtual Guide for Web Applications

Designing an Adaptive Virtual Guide for Web Applications 6th ERCIM Workshop "User Interfaces for All" Long Paper Designing an Adaptive Virtual Guide for Web Applications Luisa Marucci, Fabio Paternò CNUCE-C.N.R. Via V.Alfieri 1, 56010 Ghezzano - Pisa, Italy

More information

Towards Better Software Projects and Contracts: Commitment Specifications in Software Development Projects

Towards Better Software Projects and Contracts: Commitment Specifications in Software Development Projects Paper presented at the 20th International Conference on Software Engineering, April 19-25, 1998, Kyoto, JAPAN Towards Better Software Projects and Contracts: Commitment Specifications in Software Development

More information

Verification of Good Design Style of UML Models

Verification of Good Design Style of UML Models Verification of Good Design Style of UML Models Bogumiła Hnatkowska 1 1 Institute of Applied Informatics, Wrocław University of Technology, Wybrzeże Wyspiańskiego 27, 50-370 Wrocław, Poland Bogumila.Hnatkowska@pwr.wroc.pl

More information

Chapter 21: The Discounted Utility Model

Chapter 21: The Discounted Utility Model Chapter 21: The Discounted Utility Model 21.1: Introduction This is an important chapter in that it introduces, and explores the implications of, an empirically relevant utility function representing intertemporal

More information

Paper 10-27 Designing Web Applications: Lessons from SAS User Interface Analysts Todd Barlow, SAS Institute Inc., Cary, NC

Paper 10-27 Designing Web Applications: Lessons from SAS User Interface Analysts Todd Barlow, SAS Institute Inc., Cary, NC Paper 10-27 Designing Web Applications: Lessons from SAS User Interface Analysts Todd Barlow, SAS Institute Inc., Cary, NC ABSTRACT Web application user interfaces combine aspects of non-web GUI design

More information

Moving Enterprise Applications into VoiceXML. May 2002

Moving Enterprise Applications into VoiceXML. May 2002 Moving Enterprise Applications into VoiceXML May 2002 ViaFone Overview ViaFone connects mobile employees to to enterprise systems to to improve overall business performance. Enterprise Application Focus;

More information

Relational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology

Relational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology COS 597A: Principles of Database and Information Systems elational model elational model A formal (mathematical) model to represent objects (data/information), relationships between objects Constraints

More information

Development of a Network Configuration Management System Using Artificial Neural Networks

Development of a Network Configuration Management System Using Artificial Neural Networks Development of a Network Configuration Management System Using Artificial Neural Networks R. Ramiah*, E. Gemikonakli, and O. Gemikonakli** *MSc Computer Network Management, **Tutor and Head of Department

More information

Learning More Effective Dialogue Strategies Using Limited Dialogue Move Features

Learning More Effective Dialogue Strategies Using Limited Dialogue Move Features Learning More Effective Dialogue Strategies Using Limited Dialogue Move Features Matthew Frampton and Oliver Lemon HCRC, School of Informatics University of Edinburgh Edinburgh, EH8 9LW, UK M.J.E.Frampton@sms.ed.ac.uk,

More information

A Framework for the Delivery of Personalized Adaptive Content

A Framework for the Delivery of Personalized Adaptive Content A Framework for the Delivery of Personalized Adaptive Content Colm Howlin CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Danny Lynch CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Abstract

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

A very short history of networking

A very short history of networking A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the

More information

Development at the top: Who really cares?

Development at the top: Who really cares? Development at the top: Who really cares? A survey of executive teams Erik de Haan Ashridge Business School Inge Wels Ashridge Business School Bill Lucas Talent Foundation Jonathan Winter Career Innovation

More information

Skills of a change maker

Skills of a change maker Which of these come easily to you now, and which do you need to work on? Helping others to rise to the challenge I do these aspects easily and well WORKSHEET 1 (page 10 of Practitioner) Skills of a change

More information

PROJECT SCOPE MANAGEMENT

PROJECT SCOPE MANAGEMENT 5 PROJECT SCOPE MANAGEMENT Project Scope Management includes the processes required to ensure that the project includes all the work required, and only the work required, to complete the project successfully

More information

GQM + Strategies in a Nutshell

GQM + Strategies in a Nutshell GQM + trategies in a Nutshell 2 Data is like garbage. You had better know what you are going to do with it before you collect it. Unknown author This chapter introduces the GQM + trategies approach for

More information

Ontological Representations of Software Patterns

Ontological Representations of Software Patterns Ontological Representations of Software Patterns Jean-Marc Rosengard and Marian F. Ursu University of London http://w2.syronex.com/jmr/ Abstract. This paper 1 is based on and advocates the trend in software

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

A terminology model approach for defining and managing statistical metadata

A terminology model approach for defining and managing statistical metadata A terminology model approach for defining and managing statistical metadata Comments to : R. Karge (49) 30-6576 2791 mail reinhard.karge@run-software.com Content 1 Introduction... 4 2 Knowledge presentation...

More information

DPL. Portfolio Manual. Syncopation Software, Inc. www.syncopation.com

DPL. Portfolio Manual. Syncopation Software, Inc. www.syncopation.com 1 DPL Portfolio Manual Syncopation Software, Inc. www.syncopation.com Copyright 2009 Syncopation Software, Inc. All rights reserved. Printed in the United States of America. March 2009: First Edition.

More information

PREPARATION GUIDE FOR WRITTEN TESTS

PREPARATION GUIDE FOR WRITTEN TESTS PREPARATION GUIDE FOR WRITTEN TESTS Prepared by: The Department of Administrative Services Human Resources Management August 2004 GENERAL INFORMATION ON WRITTEN TESTS Two types of questions are often used

More information

Co-Creation of Models and Metamodels for Enterprise. Architecture Projects.

Co-Creation of Models and Metamodels for Enterprise. Architecture Projects. Co-Creation of Models and Metamodels for Enterprise Architecture Projects Paola Gómez pa.gomez398@uniandes.edu.co Hector Florez ha.florez39@uniandes.edu.co ABSTRACT The linguistic conformance and the ontological

More information

3 Traditional approach

3 Traditional approach The Unified Approach to Modeling of Software Project Management Processes Šárka Květoňová 1, Zdeněk Martínek 1 1 Dept. of Information Systems, Faculty of Information Technology, Brno University of Technology,

More information

The Role of Requirements Traceability in System Development

The Role of Requirements Traceability in System Development The Role of Requirements Traceability in System Development by Dean Leffingwell Software Entrepreneur and Former Rational Software Executive Don Widrig Independent Technical Writer and Consultant In the

More information

Evaluating OO-CASE tools: OO research meets practice

Evaluating OO-CASE tools: OO research meets practice Evaluating OO-CASE tools: OO research meets practice Danny Greefhorst, Matthijs Maat, Rob Maijers {greefhorst, maat, maijers}@serc.nl Software Engineering Research Centre - SERC PO Box 424 3500 AK Utrecht

More information

Market Value of Insurance Contracts with Profit Sharing 1

Market Value of Insurance Contracts with Profit Sharing 1 Market Value of Insurance Contracts with Profit Sharing 1 Pieter Bouwknegt Nationale-Nederlanden Actuarial Dept PO Box 796 3000 AT Rotterdam The Netherlands Tel: (31)10-513 1326 Fax: (31)10-513 0120 E-mail:

More information

SYSTEMS, CONTROL AND MECHATRONICS

SYSTEMS, CONTROL AND MECHATRONICS 2015 Master s programme SYSTEMS, CONTROL AND MECHATRONICS INTRODUCTION Technical, be they small consumer or medical devices or large production processes, increasingly employ electronics and computers

More information

BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4

BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4 International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.

More information

Minesweeper as a Constraint Satisfaction Problem

Minesweeper as a Constraint Satisfaction Problem Minesweeper as a Constraint Satisfaction Problem by Chris Studholme Introduction To Minesweeper Minesweeper is a simple one player computer game commonly found on machines with popular operating systems

More information

requirements engineering Managing Requirements for Medical IT Products

requirements engineering Managing Requirements for Medical IT Products focus requirements engineering Managing Requirements for Medical IT Products Stewart A. Higgins, Maurice de Laat, Paul M.C. Gieles, and Emilienne M. Geurts, Philips Medical Systems Philips Medical Systems

More information

Software Engineering. Hans van Vliet Vrije Universiteit Amsterdam, The Netherlands email: hans@cs.vu.nl

Software Engineering. Hans van Vliet Vrije Universiteit Amsterdam, The Netherlands email: hans@cs.vu.nl Software Engineering Hans van Vliet Vrije Universiteit Amsterdam, The Netherlands email: hans@cs.vu.nl ARIANE Flight 501 http://www.youtube.com/watch?v=gp_d8r-2hwk Disintegration after 39 sec origin of

More information

Analyze and Design of Information Systems Using OODPM for Small Scale Businesses

Analyze and Design of Information Systems Using OODPM for Small Scale Businesses Analyze and Design of Information Systems Using OODPM for Small Scale Businesses Pavel Petkun Offer Drori The Hebrew University of Jerusalem E-mail: pashka, offerd {@cs.huji.ac.il} Abstract In the modern

More information

An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology

An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology An Investigation of Agent Oriented Software Engineering Methodologies to Provide an Extended Methodology A.Fatemi 1, N.NematBakhsh 2,B. Tork Ladani 3 Department of Computer Science, Isfahan University,

More information

Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System

Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System Oana NICOLAE Faculty of Mathematics and Computer Science, Department of Computer Science, University of Craiova, Romania oananicolae1981@yahoo.com

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

Object Location Modeling in Office Environments First Steps

Object Location Modeling in Office Environments First Steps Object Location Modeling in Office Environments First Steps Thomas Pederson Department of Computing Science, Umeå University, SE-90187 Umeå, Sweden top@cs.umu.se Abstract. In this position paper we briefly

More information

Report on the Dagstuhl Seminar Data Quality on the Web

Report on the Dagstuhl Seminar Data Quality on the Web Report on the Dagstuhl Seminar Data Quality on the Web Michael Gertz M. Tamer Özsu Gunter Saake Kai-Uwe Sattler U of California at Davis, U.S.A. U of Waterloo, Canada U of Magdeburg, Germany TU Ilmenau,

More information

Agenda. Interface Agents. Interface Agents

Agenda. Interface Agents. Interface Agents Agenda Marcelo G. Armentano Problem Overview Interface Agents Probabilistic approach Monitoring user actions Model of the application Model of user intentions Example Summary ISISTAN Research Institute

More information

Building a virtual marketplace for software development tasks

Building a virtual marketplace for software development tasks Building a virtual marketplace for software development tasks Boris Kötting & Frank Maurer University of Kaiserlautern & University of Calgary koetting@informatik.uni-kl.de & maurer@cpsc.ucalgary.ca Abstract

More information

Data Modeling Basics

Data Modeling Basics Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy

More information

Obligation Policies and Policy - A Theory of Communication

Obligation Policies and Policy - A Theory of Communication Journal of Network and Systems Management, Plenum Press, Vol. 2, No. 4, 1994, pp. 333-360 POLICY DRIVEN MANAGEMENT FOR DISTRIBUTED SYSTEMS Morris Sloman Imperial College Department of Computing 180 Queen's

More information

Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.

Do you know? 7 Practices for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"

More information

Business Intelligence Not a simple software development project

Business Intelligence Not a simple software development project Business Intelligence Not a simple software development project By V. Ramanathan Executive Director, Saksoft Date: Mar 2006 India Phone: +91 44 2461 4501 Email: info@saksoft.com USA Phone: +1 212 286 1083

More information

Transaction-Typed Points TTPoints

Transaction-Typed Points TTPoints Transaction-Typed Points TTPoints version: 1.0 Technical Report RA-8/2011 Mirosław Ochodek Institute of Computing Science Poznan University of Technology Project operated within the Foundation for Polish

More information

Introduction to Software Paradigms & Procedural Programming Paradigm

Introduction to Software Paradigms & Procedural Programming Paradigm Introduction & Procedural Programming Sample Courseware Introduction to Software Paradigms & Procedural Programming Paradigm This Lesson introduces main terminology to be used in the whole course. Thus,

More information

PRACTICAL DIRECTIVES RELATIVE TO THE APPLICATION OF THE CODE OF ETHICS

PRACTICAL DIRECTIVES RELATIVE TO THE APPLICATION OF THE CODE OF ETHICS PRACTICAL DIRECTIVES RELATIVE TO THE APPLICATION OF THE CODE OF ETHICS Unofficial translation Only the official texts in the Dutch or French language are authentic. Contents PART I. Explanation of basic

More information

Overview of the TACITUS Project

Overview of the TACITUS Project Overview of the TACITUS Project Jerry R. Hobbs Artificial Intelligence Center SRI International 1 Aims of the Project The specific aim of the TACITUS project is to develop interpretation processes for

More information

Semantic Errors in SQL Queries: A Quite Complete List

Semantic Errors in SQL Queries: A Quite Complete List Semantic Errors in SQL Queries: A Quite Complete List Christian Goldberg, Stefan Brass Martin-Luther-Universität Halle-Wittenberg {goldberg,brass}@informatik.uni-halle.de Abstract We investigate classes

More information

SILs and Software. Introduction. The SIL concept. Problems with SIL. Unpicking the SIL concept

SILs and Software. Introduction. The SIL concept. Problems with SIL. Unpicking the SIL concept SILs and Software PG Bishop Adelard and Centre for Software Reliability, City University Introduction The SIL (safety integrity level) concept was introduced in the HSE (Health and Safety Executive) PES

More information

THE LOGIC OF ADAPTIVE BEHAVIOR

THE LOGIC OF ADAPTIVE BEHAVIOR THE LOGIC OF ADAPTIVE BEHAVIOR Knowledge Representation and Algorithms for Adaptive Sequential Decision Making under Uncertainty in First-Order and Relational Domains Martijn van Otterlo Department of

More information

#10. This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in in May 1995 in Tel Aviv, Israel.

#10. This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in in May 1995 in Tel Aviv, Israel. D A N T E I N P R I N T #10 Technical Options for a European High-Speed Backbone Michael Behringer This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in

More information

Development of a personal agenda and a distributed meeting scheduler based on JADE agents

Development of a personal agenda and a distributed meeting scheduler based on JADE agents Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad

More information

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013 PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the

More information

Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms

Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms Irina Astrova 1, Bela Stantic 2 1 Tallinn University of Technology, Ehitajate tee 5, 19086 Tallinn,

More information

Physical Design. Meeting the needs of the users is the gold standard against which we measure our success in creating a database.

Physical Design. Meeting the needs of the users is the gold standard against which we measure our success in creating a database. Physical Design Physical Database Design (Defined): Process of producing a description of the implementation of the database on secondary storage; it describes the base relations, file organizations, and

More information

Deducing software process improvement areas from a COCOMO II-based productivity measurement

Deducing software process improvement areas from a COCOMO II-based productivity measurement Deducing software process improvement areas from a COCOMO II-based productivity measurement Lotte De Rore, Monique Snoeck, Geert Poels, Guido Dedene Abstract At the SMEF2006 conference, we presented our

More information

Is Big Data a Big Deal? What Big Data Does to Science

Is Big Data a Big Deal? What Big Data Does to Science Is Big Data a Big Deal? What Big Data Does to Science Netherlands escience Center Wilco Hazeleger Wilco Hazeleger Student @ Wageningen University and Reading University Meteorology PhD @ Utrecht University,

More information