首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
The combination of Web services and ontologies is gaining momentum as the potential silver bullets for tomorrows Web, i.e., the Semantic Web. We propose an architectural foundation for managing semantic Web services in dynamic environments. We introduce the concept of community to cater for an ontological organization of Web services. We develop an ontology called community ontology that serves as a template for describing communities of Web services. We also propose a peer-to-peer approach for managing communities in dynamic environments.  相似文献   

2.
In this paper we use free fall approach to develop a high level control/command strategy for a bipedal robot called BIPMAN, based on a multi-chain mechanical model with a general control architecture. The strategy is composed of three levels: the Legs and arms level, the Coordinator level and the Supervisor level. The Coordinator level is devoted to controlling leg movements and to ensure the stability of the whole biped. Actually perturbation effects threaten the equilibrium of the human robot and can only be compensated using a dynamic control strategy. This one is based on dynamic stability studies with a center of mass acceleration control and a force distribution on each leg and arm. Free fall in the gravity field is assumed to be deeply involved in the human locomotor control. According to studies of this specific motion through a direct dynamic model,the notion of equilibrium classes is introduced. They allow one to define time intervals in which the biped is able to maintain its posture. This notion is used for the definition of a reconfigurable high level control of the robot.  相似文献   

3.
The primary purpose of parallel computation is the fast execution of computational tasks that are too slow to perform sequentially. However, it was shown recently that a second equally important motivation for using parallel computers exists: Within the paradigm of real-time computation, some classes of problems have the property that a solution to a problem in the class computed in parallel is better than the one obtained on a sequential computer. What represents a better solution depends on the problem under consideration. Thus, for optimization problems, better means closer to optimal. Similarly, for numerical problems, a solution is better than another one if it is more accurate. The present paper continues this line of inquiry by exploring another class enjoying the aforementioned property, namely, cryptographic problems in a real-time setting. In this class, better means more secure. A real-time cryptographic problem is presented for which the parallel solution is provably, considerably, and consistently better than a sequential one.It is important to note that the purpose of this paper is not to demonstrate merely that a parallel computer can obtain a better solution to a computational problem than one derived sequentially. The latter is an interesting (and often surprising) observation in its own right, but we wish to go further. It is shown here that the improvement in quality can be arbitrarily high (and certainly superlinear in the number of processors used by the parallel computer). This result is akin to superlinear speedup—a phenomenon itself originally thought to be impossible.  相似文献   

4.
Coordinating Multiple Agents via Reinforcement Learning   总被引:2,自引:0,他引:2  
In this paper, we attempt to use reinforcement learning techniques to solve agent coordination problems in task-oriented environments. The Fuzzy Subjective Task Structure model (FSTS) is presented to model the general agent coordination. We show that an agent coordination problem modeled in FSTS is a Decision-Theoretic Planning (DTP) problem, to which reinforcement learning can be applied. Two learning algorithms, coarse-grained and fine-grained, are proposed to address agents coordination behavior at two different levels. The coarse-grained algorithm operates at one level and tackle hard system constraints, and the fine-grained at another level and for soft constraints. We argue that it is important to explicitly model and explore coordination-specific (particularly system constraints) information, which underpins the two algorithms and attributes to the effectiveness of the algorithms. The algorithms are formally proved to converge and experimentally shown to be effective.  相似文献   

5.
The requirements for effective search and management of the WWW are stronger than ever. Currently Web documents are classified based on their content not taking into account the fact that these documents are connected to each other by links. We claim that a pages classification is enriched by the detection of its incoming links semantics. This would enable effective browsing and enhance the validity of search results in the WWW context. Another aspect that is underaddressed and strictly related to the tasks of browsing and searching is the similarity of documents at the semantic level. The above observations lead us to the adoption of a hierarchy of concepts (ontology) and a thesaurus to exploit links and provide a better characterization of Web documents. The enhancement of document characterization makes operations such as clustering and labeling very interesting. To this end, we devised a system called THESUS. The system deals with an initial sets of Web documents, extracts keywords from all pages incoming links, and converts them to semantics by mapping them to a domains ontology. Then a clustering algorithm is applied to discover groups of Web documents. The effectiveness of the clustering process is based on the use of a novel similarity measure between documents characterized by sets of terms. Web documents are organized into thematic subsets based on their semantics. The subsets are then labeled, thereby enabling easier management (browsing, searching, querying) of the Web. In this article, we detail the process of this system and give an experimental analysis of its results.Received: 16 December 2002, Accepted: 16 April 2003, Published online: 17 September 2003  相似文献   

6.
This paper presents generated enhancements for robust two and three-quarter dimensional meshing, including: (1) automated interval assignment by integer programming for submapped surfaces and volumes, (2) surface submapping, and (3) volume submapping. An introduction to the simplex method, an optimization technique of integer programming, is presented. Simplification of complex geometry is required for the formulation of the integer programming problem. A method of i-j unfolding is defined which explains how irregular geometry can be realigned into a simplified form that is suitable for submap interval assignment solutions. Also presented is the processes by which submapping eliminates the decomposition of surface geometry, through a pseudodecomposition process, producing suitable mapped meshes. The process of submapping involves the creation of interpolated virtual edges, user defined vertex types and i-j-k space traversals. The creation of interpolated virtual edges is the method by which submapping automatically subdivides surface geometry. The interpolated virtual edge is formulated according to an interpolation scheme using the node discretization of curves on the surface. User defined vertex types allow direct user control of surface decomposition and interval assignment by modifying i-j-k space traversals. Volume submapping takes the geometry decomposition to a higher level by using mapped virtual surfaces to eliminate decomposition of complex volumes.  相似文献   

7.
Web personalization has quickly changed from a value-added facility to a service required in presenting large quantities of information because individual users of the Internet have various needs and preferences in seeking information. This paper presents a novel personalized recommendation system with online preference analysis in a distance learning environment called Coursebot. Users can both browse and search for course materials by using the interface of Coursebot. Moreover, the proposed system includes appropriate course materials ranked according to a users interests. In this work, an analysis measure is proposed to combine typical grey relational analysis and implicit rating, and thus a users interests are calculated from the content of documents and the users browsing behavior. This algorithms low computational complexity and ease of adding knowledge support online personalized analysis. In addition, the user profiles are dynamically revised to provide efficiently personalized information that reflects a users interests after each page is visited.  相似文献   

8.
Why isn't my pocket calculator a thinking thing?   总被引:2,自引:2,他引:0  
Conclusion What the preceding arguments show — I take it — is that none of the four traditional marks of the mental considered provide a supportable basis for denying that Cal calculates in the same sense as you or I; i.e., I have sought to show that our initial syllogism does not commit the fallacy of four terms by equivocating on calculates, its middle. I will conclude by remarking why the argument — at least as I intend it, and on its least tendentious reading — doesn't equivocate on its major, thinks, either. Ordinarily think is a generic term for any of several different mental activities or states. According to Descartes, a thing that thinks is a thing which doubts, understands, affirms, denies, is willing, is unwilling, and also imagines and has sensory perceptions (1642: 19). Similarly, my dictionary (Webster's New Collegiate), under think, mentions conceive, judge, consider, surmise, expect, determine, resolve, reason, intend, purpose, reflect, infer, opine, and decide. In this ordinary generic sense of the term, I take it, it's undeniable that calculating is thinking, and — if my arguments are sound — that my pocket calculator calculates and consequently thinks.Perhaps some special sense of thinking can be made out for which calculating is not sufficient — perhaps some sense in which it's not sufficient to doubtor understandor will, etc., but in which it's necessary to (be able to) doubtand understandand will, etc. (as Descartes surely intended). Perhaps there is some sense in which thinking requires such unity, or universality of mental capacity — or alternatively some other traditional (or perhaps some non-traditional) mark(s) of the mental. At any rate — whether or not such a sense of thought can be made out — I have only claimed that Cal thinks in the ordinary generic sense of being a subject of at least one kind of contentful or mental state, not that he is a unified, or conscious, or autonomous self or soul or thinker in some special proprietary philosophical sense. I leave it to the opponent of AI to clarify what this sense is and to make out the case, if it can be made, against Cal's thinking inthis sense.  相似文献   

9.
In this paper, the authors address the problem of edge-perception for its applications to vision-feedback control in robotic systems.In natural vision, the recognition of objects takes place through the process consisting of eye system, neural networks and cognition. The cognitive process, in turn yields a phenomenon known as perception. This is the phenomenon of perception of physical attributes, such as edges, color and texture, etc., which is responsible for the recognition of objects through the natural vision processes.In this paper, we make an attempt to postulate the theory of perception for gray-level images. The gray-level images, when going through the cognitive and perception processes, are contaminated by the uncertainty; here we call it cognitive uncertainty.The studies in this paper are confined to the phenomenon of edge-perception for two-dimensional gray-level images, however, these studies can be extended to other types of visual attributes both in two-dimensional and three-dimensional spaces. Indeed, the perception of these attributes, which attempts to emulate the human vision system, may help in the design of a truly robust computer vision-feedback control system for robotic applications.  相似文献   

10.
11.
Horst  Steven 《Minds and Machines》1999,9(3):347-381
Over the past several decades, the philosophical community has witnessed the emergence of an important new paradigm for understanding the mind.1 The paradigm is that of machine computation, and its influence has been felt not only in philosophy, but also in all of the empirical disciplines devoted to the study of cognition. Of the several strategies for applying the resources provided by computer and cognitive science to the philosophy of mind, the one that has gained the most attention from philosophers has been the Computational Theory of Mind (CTM). CTM was first articulated by Hilary Putnam (1960, 1961), but finds perhaps its most consistent and enduring advocate in Jerry Fodor (1975, 1980, 1981, 1987, 1990, 1994). It is this theory, and not any broader interpretations of what it would be for the mind to be a computer, that I wish to address in this paper. What I shall argue here is that the notion of symbolic representation employed by CTM is fundamentally unsuited to providing an explanation of the intentionality of mental states (a major goal of CTM), and that this result undercuts a second major goal of CTM, sometimes refered to as the vindication of intentional psychology. This line of argument is related to the discussions of derived intentionality by Searle (1980, 1983, 1984) and Sayre (1986, 1987). But whereas those discussions seem to be concerned with the causal dependence of familiar sorts of symbolic representation upon meaning-bestowing acts, my claim is rather that there is not one but several notions of meaning to be had, and that the notions that are applicable to symbols are conceptually dependent upon the notion that is applicable to mental states in the fashion that Aristotle refered to as paronymy. That is, an analysis of the notions of meaning applicable to symbols reveals that they contain presuppositions about meaningful mental states, much as Aristotle's analysis of the sense of healthy that is applied to foods reveals that it means conducive to having a healthy body, and hence any attempt to explain mental semantics in terms of the semantics of symbols is doomed to circularity and regress. I shall argue, however, that this does not have the consequence that computationalism is bankrupt as a paradigm for cognitive science, as it is possible to reconstruct CTM in a fashion that avoids these difficulties and makes it a viable research framework for psychology, albeit at the cost of losing its claims to explain intentionality and to vindicate intentional psychology. I have argued elsewhere (Horst, 1996) that local special sciences such as psychology do not require vindication in the form of demonstrating their reducibility to more fundamental theories, and hence failure to make good on these philosophical promises need not compromise the broad range of work in empirical cognitive science motivated by the computer paradigm in ways that do not depend on these problematic treatments of symbols.  相似文献   

12.
In this paper we present a fragment of (positive) relevant logic which can be computed by a straightforward extension to SLD resolution while allowing full nesting of implications. These two requirements lead quite naturally to a fragment in which the major feature is an ambiguous user-level conjunction which is interpreted intensionally in query positions and extensionally in assertion positions. These restrictions allow a simple and efficient extension to SLD resolution (and more particularly, the PROLOG evaluation scheme) with quite minor loss in expressive power.  相似文献   

13.
The World Wide Web is a decentralized, unmanaged, dynamically changing repository of digital documents. Waldens Paths provides tools that enable authors to collect, organize, annotate, and present Web-based information to reader communities via a linear metadocument called a path. Waldens Paths includes path authoring and reading interfaces supporting the contextualization of included materials to match authors goals as well as enabling browsing off the path to match readers personal interests. It also provides tools to manage these paths of transient Web materials based on the identification and evaluation of changes to the component pages. Experience with Waldens Paths in educational settings and changes to Web technology as well as the Web-savvyness of users have led to a variety of changes to earlier designs. Current directions of work include the development of methods for evaluating readers understanding via quizzes associated with paths and richer path structures.  相似文献   

14.
The “explicit-implicit” distinction   总被引:3,自引:3,他引:0  
Much of traditional AI exemplifies the explicit representation paradigm, and during the late 1980's a heated debate arose between the classical and connectionist camps as to whether beliefs and rules receive an explicit or implicit representation in human cognition. In a recent paper, Kirsh (1990) questions the coherence of the fundamental distinction underlying this debate. He argues that our basic intuitions concerning explicit and implicit representations are not only confused but inconsistent. Ultimately, Kirsh proposes a new formulation of the distinction, based upon the criterion ofconstant time processing.The present paper examines Kirsh's claims. It is argued that Kirsh fails to demonstrate that our usage of explicit and implicit is seriously confused or inconsistent. Furthermore, it is argued that Kirsh's new formulation of the explicit-implicit distinction is excessively stringent, in that it banishes virtually all sentences of natural language from the realm of explicit representation. By contrast, the present paper proposes definitions for explicit and implicit which preserve most of our strong intuitions concerning straightforward uses of these terms. It is also argued that the distinction delineated here sustains the meaningfulness of the abovementioned debate between classicists and connectionists.  相似文献   

15.
In order to cope with the changing health needs in the community, an holistic approach on AIDS prevention and control with particular reference to essential quality was introduced at an educational seminar at Hebei Medical University in China, 1996. We have identified three major points in the present study through learning and research process: 1. The importance of cultural norm for the unification of science and technology is identified for the community approach; 2. community care emphasising human quality provides unity in diversity for educational program; and 3. community control emphasising quality assurance demonstrates the effectiveness for program analysis from the viewpoint of human centred systems.  相似文献   

16.
Semantics connected to some information based metaphor are well-known in logic literature: a paradigmatic example is Kripke semantic for Intuitionistic Logic. In this paper we start from the concrete problem of providing suitable logic-algebraic models for the calculus of attribute dependencies in Formal Contexts with information gaps and we obtain an intuitive model based on the notion of passage of information showing that Kleene algebras, semi-simple Nelson algebras, three-valued ukasiewicz algebras and Post algebras of order three are, in a sense, naturally and directly connected to partially defined information systems. In this way wecan provide for these logic-algebraic structures a raison dêetre different from the original motivations concerning, for instance, computability theory.  相似文献   

17.
This study demonstrates an objective method used to evaluate the enhanceability of commercial software. It examines the relationship between enhancement and repair, and suggests that enhancement be considered when developing formal models of defect cause. Another definition of defect-prone software is presented that concentrates attention on software that requires unusually high repair considering the magnitude of planned enhancement.  相似文献   

18.
The consistency problem of both mean field and variational Bayes estimators in the context of linear state space models is investigated. We prove that the mean field approximation is asymptotically consistent when the variances of the noise variables in the system are sufficiently small, but neither the mean field estimator nor the variational Bayes estimator is always asymptotically consistent as the sample size becomes large. The gap between the estimators and the true values is roughly estimated.  相似文献   

19.
Summary A single multiaccess channel is studied with the outcome of a transmission being either idle, success, or collision (ternary channel). Packets involved in a collision must be retransmitted, and an efficient way to solve a collision is known in the literature as Gallager-Tsybakov-Mikhailov algorithm. Performance analysis of the algorithm is quite hard. In fact, it bases on a numerical solution of some recurrence equations and on a numerical evaluation of some series. The obvious drawback of it is lack of insight into the behavior of the algorithm. We shall present a new approach of looking at the algorithm and discuss some attempts of analyzing its performance. In particular, expected lengths of a resolution interval and a conflict resolution interval as well as throughput of the algorithm will be discussed using asymptotic approximation and a small input rate approximation.  相似文献   

20.
Some basic theorems about ordinal numbers were proved using McCunes computer program OTTER, building on Quaifes modification of Gödels class theory. Our theorems are based on Isbells elegant definition of ordinals. Neither the axiom of regularity nor the axiom of choice is used.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号