10 resultados para Context-aware
em Greenwich Academic Literature Archive - UK
Resumo:
This paper describes a highly flexible component architecture, primarily designed for automotive control systems, that supports distributed dynamically- configurable context-aware behaviour. The architecture enforces a separation of design-time and run-time concerns, enabling almost all decisions concerning runtime composition and adaptation to be deferred beyond deployment. Dynamic context management contributes to flexibility. The architecture is extensible, and can embed potentially many different self-management decision technologies simultaneously. The mechanism that implements the run-time configuration has been designed to be very robust, automatically and silently handling problems arising from the evaluation of self- management logic and ensuring that in the worst case the dynamic aspects of the system collapse down to static behavior in totally predictable ways.
Resumo:
This paper proposes a vehicular control system architecture that supports self-configuration. The architecture is based on dynamic mapping of processes and services to resources to meet the challenges of future demanding use-scenarios in which systems must be flexible to exhibit context-aware behaviour and to permit customization. The architecture comprises a number of low-level services that provide the required system functionalities, which include automatic discovery and incorporation of new devices, self-optimisation to best-use the processing, storage and communication resources available, and self-diagnostics. The benefits and challenges of dynamic configuration and the automatic inclusion of users' Consumer Electronic (CE) devices are briefly discussed. The dynamic configuration and control-theoretic technologies used are described in outline and the way in which the demands of highly flexible dynamic configuration and highly robust operation are simultaneously met without compromise, is explained. A number of generic use-cases have been identified, each with several specific use-case scenarios. One generic use-case is described to provide an insight into the extent of the flexible reconfiguration facilitated by the architecture.
Resumo:
One thing is (a) to develop a system that handles some task to one's satisfaction, and also has a universally recognized myrthful side to its output. Another thing is (b) to provide an analysis of why you are getting such a byproduct. Yet another thing is (c) to develop a model that incorporates reflection about some phenomenon in humor for its own sake. This paper selects for discussion especially Alibi, going on to describe the preliminaries of Columbus. The former, which fits in (a), is a planner with an explanatory capability. It invents pretexts. It's no legal defense, but it is relevant to evidential thinking in AI & Law. Some of the output pretext are myrthful. Not in the sense they are silly: they are not. A key factor seems to be the very alacrity at explaining out detail after detail of globally damning evidence. I attempt a reanalysis of Alibi in respect of (b). As to Columbus, it fits instead in (c). We introduce here the basics of this (unimplemented) model, developed to account for a sample text in parody.
Resumo:
This special issue "Formal Approaches to Legal Evidence" of the Artificial Intelligence and Law, September 2001, Vol. 9, Issue 2-3, which was guest edited by Ephraim Nissan.
Resumo:
Optimisation in wireless sensor networks is necessary due to the resource constraints of individual devices, bandwidth limits of the communication channel, relatively high probably of sensor failure, and the requirement constraints of the deployed applications in potently highly volatile environments. This paper presents BioANS, a protocol designed to optimise a wireless sensor network for resource efficiency as well as to meet a requirement common to a whole class of WSN applications - namely that the sensor nodes are dynamically selected on some qualitative basis, for example the quality by which they can provide the required context information. The design of BioANS has been inspired by the communication mechanisms that have evolved in natural systems. The protocol tolerates randomness in its environment, including random message loss, and incorporates a non-deterministic ’delayed-bids’ mechanism. A simulation model is used to explore the protocol’s performance in a wide range of WSN configurations. Characteristics evaluated include tolerance to sensor node density and message loss, communication efficiency, and negotiation latency .
Resumo:
Evacuation models have been playing an important function in the transition process from prescriptive fire safety codes to performance-based ones over the last three decades. In fact, such models became also useful tools in different tasks within fire safety engineering field, such as fire risks assessment and fire investigation. However, there are some difficulties in this process when using these models. For instance, during the evacuation modelling analysis, a common problem faced by fire safety engineers concerns the number of simulations which needs to be performed. In other terms, which fire designs (i.e., scenarios) should be investigated using the evacuation models? This type of question becomes more complex when specific issues such as the optimal positioning of exits within an arbitrarily structure needs to be addressed. Therefore, this paper presents a methodology which combines the use of evacuation models with numerical techniques used in the operational research field, such as Design of Experiments (DoE), Response Surface Models (RSM) and the numerical optimisation techniques. The methodology here presented is restricted to evacuation modelling analysis, nevertheless this same concept can be extended to fire modelling analysis.
Resumo:
[This is a summary of an Oral Presentation] The study explored the expression of Big 5 personality traits in three different social contexts (with parents friends and work colleagues) to test the prediction that personality is socially variable due to the motivation to ‘fit in’. The questionnaire-based method produced results that support this hypothesis; all Big 5 traits were significantly variable across contexts with Conscientiousness the least variable and Extraversion possessiveness. The results indicated that females reported being more distressed than males and older respondents reported being less distressed then younger respondents. The findings from this study contribute to the literature on online infidelity in terms of understanding differences in the way it is perceived.
Resumo:
Internationally literature emphasises concern regarding the phenomenon of violence and aggression within the emergency field. This paper emphasises the important role education and training may play in reducing the risk of staff being exposed to violent or aggressive experiences. Furthermore, the paper emphasises, explores and discusses well recognised theories relating to aggression development. These theories can be used to explain both organisational strategies designed to minimise aggression in the emergency department and situational factors contributing to the development of aggressive interactions.