1,916,107 research outputs found

    WIDE - A Distributed Architecture for Workflow Management

    Get PDF
    This paper presents the distributed architecture of the WIDE workflow management system. We show how distribution and scalability are obtained by the use of a distributed object model, a client/server architecture, and a distributed workflow server architecture. Specific attention is paid to the extended transaction support and active rule support subarchitectures

    Aesthetic attention

    Get PDF
    The aim of this paper is to give a new account of the way we exercise our attention in some paradigmatic cases of aesthetic experience. I treat aesthetic experience as a specific kind of experience and like in the case of other kinds of experiences, attention plays an important role in determining its phenomenal character. I argue that an important feature of at least some of our aesthetic experiences is that we exercise our attention in a specific, distributed, manner: our attention is focused on one perceptual object, but it is distributed among the various properties of this object. I argue that this way of exercising one’s attention is very different from the way we attend most of the time and it fits very well with some important features of paradigmatic examples of aesthetic experience

    Applying Prolog to Develop Distributed Systems

    Get PDF
    Development of distributed systems is a difficult task. Declarative programming techniques hold a promising potential for effectively supporting programmer in this challenge. While Datalog-based languages have been actively explored for programming distributed systems, Prolog received relatively little attention in this application area so far. In this paper we present a Prolog-based programming system, called DAHL, for the declarative development of distributed systems. DAHL extends Prolog with an event-driven control mechanism and built-in networking procedures. Our experimental evaluation using a distributed hash-table data structure, a protocol for achieving Byzantine fault tolerance, and a distributed software model checker - all implemented in DAHL - indicates the viability of the approach

    A computational approach to the covert and overt deployment of spatial attention

    Get PDF
    Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of them per seconds and that the neural substrate for the deployment of attention and the execution of an eye movement might considerably overlap. Here we propose a computational model in which the deployment of attention with or without a subsequent eye movement emerges from local, distributed and numerical computations

    Specification of multiparty audio and video interaction based on the Reference Model of Open Distributed Processing

    Get PDF
    The Reference Model of Open Distributed Processing (RM-ODP) is an emerging ISO/ITU-T standard. It provides a framework of abstractions based on viewpoints, and it defines five viewpoint languages to model open distributed systems. This paper uses the viewpoint languages to specify multiparty audio/video exchange in distributed systems. To the designers of distributed systems, it shows how the concepts and rules of RM-ODP can be applied.\ud \ud The ODP ¿binding object¿ is an important concept to model continuous data flows in distributed systems. We take this concept as a basis for multiparty audio and video flow exchanges, and we provide five ODP viewpoint specifications, each emphasising a particular concern. To ensure overall correctness, special attention is paid to the mapping between the ODP viewpoint specifications

    A Distributed Method for Trust-Aware Recommendation in Social Networks

    Full text link
    This paper contains the details of a distributed trust-aware recommendation system. Trust-base recommenders have received a lot of attention recently. The main aim of trust-based recommendation is to deal the problems in traditional Collaborative Filtering recommenders. These problems include cold start users, vulnerability to attacks, etc.. Our proposed method is a distributed approach and can be easily deployed on social networks or real life networks such as sensor networks or peer to peer networks
    • …
    corecore