6,520 research outputs found
Mixing the reactive with the personal: Opportunities for end-user programming in personal information management
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth of real-time information readily available. In this chapter, we describe a personal information assistance engine that lets end-users delegate to it various simple context- and activity-reactive tasks and reminders. Our system, Atomate, treats RSS/ATOM feeds from social networking and life-tracking sites as sensor streams, integrating information from such feeds into a simple unified RDF world model representing people, places and things and their time-varying states and activities. Combined with other information sources on the web, including the user's online calendar, web-based e-mail client, news feeds and messaging services, Atomate can be made to automatically carry out a variety of simple tasks for the user, ranging from context-aware filtering and messaging, to sharing and social coordination actions. Atomate's open architecture and world model easily accommodate new information sources and actions via the addition of feeds and web services. To make routine use of the system easy for non-programmers, Atomate provides a constrained-input natural language interface (CNLI) for behavior specification, and a direct-manipulation interface for inspecting and updating its world model
NILMTK: An Open Source Toolkit for Non-intrusive Load Monitoring
Non-intrusive load monitoring, or energy disaggregation, aims to separate
household energy consumption data collected from a single point of measurement
into appliance-level consumption data. In recent years, the field has rapidly
expanded due to increased interest as national deployments of smart meters have
begun in many countries. However, empirically comparing disaggregation
algorithms is currently virtually impossible. This is due to the different data
sets used, the lack of reference implementations of these algorithms and the
variety of accuracy metrics employed. To address this challenge, we present the
Non-intrusive Load Monitoring Toolkit (NILMTK); an open source toolkit designed
specifically to enable the comparison of energy disaggregation algorithms in a
reproducible manner. This work is the first research to compare multiple
disaggregation approaches across multiple publicly available data sets. Our
toolkit includes parsers for a range of existing data sets, a collection of
preprocessing algorithms, a set of statistics for describing data sets, two
reference benchmark disaggregation algorithms and a suite of accuracy metrics.
We demonstrate the range of reproducible analyses which are made possible by
our toolkit, including the analysis of six publicly available data sets and the
evaluation of both benchmark disaggregation algorithms across such data sets.Comment: To appear in the fifth International Conference on Future Energy
Systems (ACM e-Energy), Cambridge, UK. 201
Knowledge Representation Concepts for Automated SLA Management
Outsourcing of complex IT infrastructure to IT service providers has
increased substantially during the past years. IT service providers must be
able to fulfil their service-quality commitments based upon predefined Service
Level Agreements (SLAs) with the service customer. They need to manage, execute
and maintain thousands of SLAs for different customers and different types of
services, which needs new levels of flexibility and automation not available
with the current technology. The complexity of contractual logic in SLAs
requires new forms of knowledge representation to automatically draw inferences
and execute contractual agreements. A logic-based approach provides several
advantages including automated rule chaining allowing for compact knowledge
representation as well as flexibility to adapt to rapidly changing business
requirements. We suggest adequate logical formalisms for representation and
enforcement of SLA rules and describe a proof-of-concept implementation. The
article describes selected formalisms of the ContractLog KR and their adequacy
for automated SLA management and presents results of experiments to demonstrate
flexibility and scalability of the approach.Comment: Paschke, A. and Bichler, M.: Knowledge Representation Concepts for
Automated SLA Management, Int. Journal of Decision Support Systems (DSS),
submitted 19th March 200
Mechanism Deduction from Noisy Chemical Reaction Networks
We introduce KiNetX, a fully automated meta-algorithm for the kinetic
analysis of complex chemical reaction networks derived from semi-accurate but
efficient electronic structure calculations. It is designed to (i) accelerate
the automated exploration of such networks, and (ii) cope with model-inherent
errors in electronic structure calculations on elementary reaction steps. We
developed and implemented KiNetX to possess three features. First, KiNetX
evaluates the kinetic relevance of every species in a (yet incomplete) reaction
network to confine the search for new elementary reaction steps only to those
species that are considered possibly relevant. Second, KiNetX identifies and
eliminates all kinetically irrelevant species and elementary reactions to
reduce a complex network graph to a comprehensible mechanism. Third, KiNetX
estimates the sensitivity of species concentrations toward changes in
individual rate constants (derived from relative free energies), which allows
us to systematically select the most efficient electronic structure model for
each elementary reaction given a predefined accuracy. The novelty of KiNetX
consists in the rigorous propagation of correlated free-energy uncertainty
through all steps of our kinetic analyis. To examine the performance of KiNetX,
we developed AutoNetGen. It semirandomly generates chemistry-mimicking reaction
networks by encoding chemical logic into their underlying graph structure.
AutoNetGen allows us to consider a vast number of distinct chemistry-like
scenarios and, hence, to discuss assess the importance of rigorous uncertainty
propagation in a statistical context. Our results reveal that KiNetX reliably
supports the deduction of product ratios, dominant reaction pathways, and
possibly other network properties from semi-accurate electronic structure data.Comment: 36 pages, 4 figures, 2 table
Implementation of Restorative Justice Practices within our Schools
This School Improvement Plan details the importance of implementing a restorative justice system for high school students amongst the current educational climate. Current research points to restorative practices for long term improvement of student behavior and eliminating racial disparities in exclusionary discipline policies. Research indicates schools that places value on empathy and growth foster positive student-teacher relationships leading to a positive school climate. With those findings in mind, this plan focuses on creating school policy that eliminates racial disparities in discipline, reduces office referrals, and improving school culture. The plan outlines an implementation guide for administrators and teachers along with details for all staff professional development
Context-Adaptive Coordination of Pervasive Services by Interpreting Models during Runtime
[EN] One of the most important goals of pervasive systems is to help users in their daily life by automating their behaviour patterns. To achieve this, pervasive services must be dynamically coordinated, executed and adapted to context according to user behaviour patterns. In this work, we propose a model-driven solution to meet this challenge. We propose a task model and a context ontology to design context-adaptive coordination of services at a high level of abstraction. This design facilitates the coordination analysis at design time and is also reused at runtime. We propose a software architecture that interprets the models at runtime in order to coordinate the service execution that is required to support user behaviour patterns. This coordination is done in a context-adaptive way and decoupled from service implementation. This approach makes the models the only representation of service coordination, which facilitates the maintenance and evolution of the executed service coordination after deployment.This work has been developed with the support of (a) MICINN under the project EVERYWARE TIN2010-18011 and (b) MITYC under the project LIFEWEAR TSI-020400-2010-100 co-funded with ERDF.Serral Asensio, E.; Valderas Aranda, PJ.; Pelechano Ferragud, V. (2013). Context-Adaptive Coordination of Pervasive Services by Interpreting Models during Runtime. Computer Journal. 56(1):87-114. https://doi.org/10.1093/comjnl/bxs019S8711456
An Analysis of the Efficacy of Disciplinary Methods
The practice of punitive discipline is the most common response to misbehavior in American school systems, despite having no evidence to support its continued use. However, there is research that demonstrates its active harm to students in multiple capacities. Punitive discipline has been found to only exacerbate students’ behavior issues, as well as negatively impact their academic performance. Additionally, research has pointed out that punitive discipline impacts students of minority demographics at a significantly higher rate than students belonging to majority demographics. More research in the way of alternative restorative policies, such as Positive Behavior Interventions and Supports (PBIS), is desperately needed so that districts can see an effective substitute. Punitive discipline does not correct behavior, improve grades, or provide any benefit to students. Therefore, punitive discipline should be abandoned in favor of restorative policies that are proven to help students get back on track
A deployed multi agent system for meteorological alerts
The Australian Bureau of Meteorology has a requirement for complex and evolving systems to manage its weather forecasting, monitoring and alerts. This paper describes a system that monitors in real time the current terminal area forecasts (forecasts for areas around airports) and alerts forecasters to inconsistencies between these and observations obtained from automatic weather station (AWS) data. The contributions of the paper are a description of the overall architecture including legacy components, and the mechanisms that have been used to interface to legacy components; a description of an inferencing mechanism, available in recent versions of the JACK Intelligent Agents toolkit which has been particularly useful in some of the reasoning needed in this application; and a detailed description of the architecture for data sharing and data management. The system is currently deployed and a project is underway to extend this to a much larger system
- …