Filters








73,341 Hits in 10.1 sec

Bridging the Gap Between Agent-Oriented Design and Implementation Using MDA [chapter]

Mercedes Amor, Lidia Fuentes, Antonio Vallecillo
2005 Lecture Notes in Computer Science  
Current agent-oriented methodologies focus mainly on multi-agent systems analysis and design, but without providing straightforward connections to the implementation of such systems on any of the existing  ...  In this paper we show how the Model Driven Architecture (MDA) can be effectively used to derive agent implementations from agent-oriented designs, independently from both the methodology used and the concrete  ...  and AUML, a big step towards bridging the gap between agent-oriented design and MAS implementation.  ... 
doi:10.1007/978-3-540-30578-1_7 fatcat:6cnd53btxrbe5ixjfutbw2sv3y

Coordination and Adaptation Techniques: Bridging the Gap Between Design and Implementation [chapter]

Steffen Becker, Carlos Canal, Nikolay Diakov, Juan Manuel Murillo, Pascal Poizat, Massimo Tivoli
Object-Oriented Technology. ECOOP 2006 Workshop Reader  
The need for adaptation can appear at any stage of the software life-cycle and adaptation techniques for all the stages must be provided. Anyway such techniques  ...  Indeed, one of the most complex tasks when designing and constructing such applications is not only to specify and analyze the coordinated interaction that occurs among the computational entities but also  ...  We discuss the following major issues: Bridging foreign coordination models In our approach to integration of a formal method with a practical technique, a designer needs to deal with bridging two conceptually  ... 
doi:10.1007/978-3-540-71774-4_9 dblp:conf/ecoopw/BeckerCDMPT06 fatcat:qppaymmsk5eljn7pvbf5gv3x2e

Adaptive muting ratio in enhanced Inter-Cell Interference Coordination for LTE-A systems

Giulio Bartoli, Romano Fantacci, Dania Marabissi, Marco Pucci
2014 2014 International Wireless Communications and Mobile Computing Conference (IWCMC)  
Initially, a interference characterization is presented and then the interference management techniques in 4G and 5G systems are discussed.  ...  These techniques, and beamforming in particular, offer an extra degree of freedom to eliminate the interference in cognitive paradigm networks.  ...  These represent a bridge between space-time coding and spatial multiplexing techniques. Some of these transmission schemes explicitly combine ideas of certain space-time codes and the BLAST scheme.  ... 
doi:10.1109/iwcmc.2014.6906490 dblp:conf/iwcmc/BartoliFMP14a fatcat:nfmyo665zjezpdyylhwzxyylyu

Concepts, methods and techniques in adaptive control

G.A. Dumont, M. Huzmezan
2002 Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301)  
A general overview of adaptive control will allow the audience to place on the map several industrial architectures for such controllers, all with the aim of bridging the gap between academic and industrial  ...  Since the first commercial adaptive controller, significant progress in the design and analysis of these controllers has been achieved.  ...  A general overview of adaptive control will allow the audience to understand the architectures of such controllers, all with the aim of bridging the gap between academic and industrial views on this topic.Leaving  ... 
doi:10.1109/acc.2002.1023173 fatcat:jkp7dezlrnhpbjnsgfr5roogza

Fractional cascading: I. A data structuring technique

Bernard Chazelle, Leonidas J. Guibas
1986 Algorithmica  
In computational geometry many search problems and range queries can be solved by performing an iterative search for the same key in separate ordered lists.  ...  Several results related to the dynamization of this structure are also presented. A companion paper gives numerous applications of this technique to geometric problems.  ...  We wish to thank Cynthia Hibbard, Ian Munro, Jorge Stolfi, and Robert Tarjan for many useful comments on the manuscript.  ... 
doi:10.1007/bf01840440 fatcat:k3qxz2xnerg5lnoq22opujipsu

Techniques for the Assessment of Coastal Storm Risk [chapter]

2017 Management of the Effects of Coastal Storms  
Close coordination between climate change adaptation and disaster risk management/policies is also required.  ...  consider trade-offs and synergies between adaptation and mitigation pressures.  ... 
doi:10.1002/9781119116103.ch2 fatcat:qwiwnu6pbba5fb2mywpyu3njvm

Integrating usability techniques into software development

J. Anderson, F. Fleak, K. Garrity, F. Drake
2001 IEEE Software  
Focusing on the user early in the development process goes a long way toward improving product quality and eliminating rework.  ...  In this article, the authors show how their company is working toward this goal.  ...  We spent considerable time trying to bridge the gaps, with each team participating in education classes sponsored by the other team.  ... 
doi:10.1109/52.903166 fatcat:harlwf34gvbjbp5cezboad5f34

Exploring Multi-Paradigm Modeling Techniques

Cécile Hardebolle, Frédéric Boulanger
2009 Simulation (San Diego, Calif.)  
We also discuss the meaning of the words "formalism" and "paradigm", which are often used alternatively in the MPM domain.  ...  Multi-Paradigm Modeling (MPM) addresses the necessity of using multiple modeling paradigms when designing complex systems.  ...  However, the transformation of models may be very complex depending on the semantic gap between the underlying paradigms of the source and target modeling languages.  ... 
doi:10.1177/0037549709105240 fatcat:5aklf7yyzfhz7lidxpnafqq72m

Review on the SFCL Control Techniques in grid System

Suman Baghel, Sanjeev Jarariya
2021 SMART MOVES JOURNAL IJOSCIENCE  
In this paper, the authors present a comparative study of inductive and resistive superconducting residual current limiters (SFCLs) from the perspective of current limiting and transient stability of the  ...  Different types of SFCL can be used to reduce the magnitude of the fault current in a power system. The two most commonly used types are the resistive type (rSFCL) and the inductive type (iSFCL).  ...  The aim is to indicate topics relevant to future development in order to bridge the gap between SFCL and future defect detection techniques, which may include AIbased detection and restriction. IV.  ... 
doi:10.24113/ijoscience.v7i1.348 fatcat:csqvxjd5ejbrbamernaqidej4q

Elementary subdomain technique for magnetic field calculation in rotating electrical machines with local saturation effect

Lazhar Roubache, Kamel Boughrara, Frédéric Dubas, Rachid Ibtiouen
2019 Compel  
In this paper, the author presents a novel contribution on improving of this two-dimensional (2-D) technique in polar coordinates by focusing on the local saturation.  ...  In other hand, many different works have been oriented towards the proposal and improvement of hybrid numerical methods [3]-[4] and (semi-)analytical models [5]-[17], which are fast and adapted to the  ...  Then, a more detailed for magnetic field solutions in the various regions and the adaptation of NR iterative algorithm with the proposed technique are done.  ... 
doi:10.1108/compel-11-2017-0481 fatcat:wg3rjxt5kbcxvnvhww3yqfaqzq

Formal Techniques for Java Programs [chapter]

Gary T. Leavens, Sophia Drossopoulou, Susan Eisenbach, Arnd Poetzsch-Heffter, Erik Poll
2002 Lecture Notes in Computer Science  
This report gives an overview of the third ECOOP Workshop on Formal Techniques for Java Programs. It explains the motivation for such a workshop and summarizes the presentations and discussions.  ...  Such formal techniques are sound, only if based on a formalization of the language itself. Java is a good platform to bridge the gap between formal techniques and practical program development.  ...  Coordination, Scripting and Specification The last session consisted of three short presentations.  ... 
doi:10.1007/3-540-47853-1_3 fatcat:rbitilj3dbfgxohlt3lenzkcze

A proof technique for register atomicity [chapter]

Baruch Awerbuch, Lefteris M. Kirousis, Evangelos Kranakis, Paul M. B. Vitányi
1988 Lecture Notes in Computer Science  
An adapter connector is concerned with enabling logical connectivity by bridging the gap between the context schema and protocols used by the source and target applications (in this case, between the service  ...  Coordinating the capabilities between different ESB implementations is where the complexity begins to surface.  ...  The implementation of the business logic was adopted from the Manufacturer service implementation shipped with the IBM Redbook Patterns: Implementing an SOA using an Enterprise Service Bus in WebSphere  ... 
doi:10.1007/3-540-50517-2_87 fatcat:7sgf27oflzeileyg67qtkssaae

A Case Study on the Noncontact Inventory of the Oldest European Cast-iron Bridge Using Terrestrial Laser Scanning and Photogrammetric Techniques

Jacek Kwiatkowski, Wojciech Anigacz, Damian Beben
2020 Remote Sensing  
The achieved effects of the measurements show that the discrepancies between the applied techniques (TLS and photogrammetry) and reference methods varied only within several millimeters and can be regarded  ...  The examined object is an historic cast-iron suspension bridge in Ozimek (south of Poland). The bridge was constructed in 1825–1827 and constitutes the oldest European bridge of this type.  ...  [41] attempted to bridge the gap between the photogrammetry and remote sensing and applications from bridge engineering.  ... 
doi:10.3390/rs12172745 fatcat:vmoe64whxrgwndo6ley2pcxyx4

NESTORE D5.1 Definition of Intervention Techniques

Röcke Christina, Guye Sabrina, Angelini Leonardo, Caon Maurizio, Mugellini Elena, Khaled Omar Abou, Rizzo Giovanna, Matropietro Alfonso, Porcelli Simone, Kniestedt Isabelle
2018 Zenodo  
A wide range of behaviour change techniques (BCTs) has been described in the literature, and recent work has focused on how these can be implemented using digital and technological approaches.  ...  A total of 27 articles were included in the quantitative analysis and the architecture and design of the e-coaching as well as the results of these studies (where reported) are discussed with regards to  ...  can help bridge the intention-behaviour gap most other conceptual models do not address.  ... 
doi:10.5281/zenodo.4549173 fatcat:623kpsetkbcw5kzosqv7xur33i

Artificial intelligent techniques and its applications

Mahalingam Sundhararajan, Xiao-Zhi Gao, Hamed Vahdat Nejad, Mahalingam Sundhararajan, Xiao-Zhi Gao, Hamed Vahdat Nejad
2018 Journal of Intelligent & Fuzzy Systems  
The proposed approach bridges the gap between paper impurities evaluation and sparse feature representations, taking advantages of existing ADMM algorithms to handle sparse codes problem.  ...  the repetitious user tests should be implemented in the last phase.  ... 
doi:10.3233/jifs-169369 fatcat:36zw2x3lprdgni53nbpoacwvsq
« Previous Showing results 1 — 15 out of 73,341 results