631,278 research outputs found

    Temporal Constraints for Concurrent Object Synchronisation

    No full text
    This is a brief introduction to the language Jeeg (presented as an invited talk at WOODS 2003

    Pragmatic constraints on (adverbial) (temporal) quantification

    Get PDF
    Even if we can generate a logical form, principles of use may limit the ways in which we can use it. In this paper, I motivate one such principle of use, and explore its effects. Much of the discussion involves kinds of sentences that have received attention in the literature on "individual-level predicates"

    Managing temporal relations

    Get PDF
    Various temporal constraints on the execution of activities are described, and their representation in the scheduling system MAESTRO is discussed. Initial examples are presented using a sample activity described. Those examples are expanded to include a second activity, and the types of temporal constraints that can obtain between two activities are explored. Soft constraints, or preferences, in activity placement are discussed. Multiple performances of activities are considered, with respect to both hard and soft constraints. The primary methods used in MAESTRO to handle temporal constraints are described as are certain aspects of contingency handling with respect to temporal constraints. A discussion of the overall approach, with indications of future directions for this research, concludes the study

    Method of Forming Recommendations Using Temporal Constraints in a Situation of Cyclic Cold Start of the Recommender System

    Get PDF
    The problem of the formation of the recommended list of items in the situation of cyclic cold start of the recommendation system is considered. This problem occurs when building recommendations for occasional users. The interests of such consumers change significantly over time. These users are considered ā€œcoldā€ when accessing the recommendation system. A method for building recommendations in a cyclical cold start situation using temporal constraints is proposed. Temporal constraints are formed on the basis of the selection of repetitive pairs of actions for choosing the same objects at a given level of time granulation. Input data is represented by a set of user choice records. For each entry, a time stamp is indicated. The method includes the phases of the formation of temporal constraints, the addition of source data using these constraints, as well as the formation of recommendations using the collaborative filtering algorithm. The proposed method makes it possible, with the help of temporal constraints, to improve the accuracy of recommendations for ā€œcoldā€ users with periodic changes in their interests

    Coalition Formation with Spatial and Temporal Constraints

    No full text
    The coordination of emergency responders and robots to undertake a number of tasks in disaster scenarios is a grand challenge for multi-agent systems. Central to this endeavour is the problem of forming the best teams (coalitions) of responders to perform the various tasks in the area where the disaster has struck. Moreover, these teams may have to form, disband, and reform in different areas of the disaster region. This is because in most cases there will be more tasks than agents. Hence, agents need to schedule themselves to attempt each task in turn. Second, the tasks themselves can be very complex: requiring the agents to work on them for different lengths of time and having deadlines by when they need to be completed. The problem is complicated still further when different coalitions perform tasks with different levels of efficiency. Given all these facets, we define this as The Coalition Formation with Spatial and Temporal constraints problem (CFSTP).We show that this problem is NP-hardā€”in particular, it contains the wellknown complex combinatorial problem of Team Orienteering as a special case. Based on this, we design a Mixed Integer Program to optimally solve small-scale instances of the CFSTP and develop new anytime heuristics that can, on average, complete 97% of the tasks for large problems (20 agents and 300 tasks). In so doing, our solutions represent the first results for CFSTP

    MDP Optimal Control under Temporal Logic Constraints

    Get PDF
    In this paper, we develop a method to automatically generate a control policy for a dynamical system modeled as a Markov Decision Process (MDP). The control specification is given as a Linear Temporal Logic (LTL) formula over a set of propositions defined on the states of the MDP. We synthesize a control policy such that the MDP satisfies the given specification almost surely, if such a policy exists. In addition, we designate an "optimizing proposition" to be repeatedly satisfied, and we formulate a novel optimization criterion in terms of minimizing the expected cost in between satisfactions of this proposition. We propose a sufficient condition for a policy to be optimal, and develop a dynamic programming algorithm that synthesizes a policy that is optimal under some conditions, and sub-optimal otherwise. This problem is motivated by robotic applications requiring persistent tasks, such as environmental monitoring or data gathering, to be performed.Comment: Technical report accompanying the CDC2011 submissio

    A secure, constraint-aware role-based access control interoperation framework

    Get PDF
    With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming increasingly important. To avoid security breaches, such policies must enforce the policy constraints of the individual domains. Such constraints may include temporal constraints that limit the times when the users can access the resources, and separation of duty (SoD) constraints. Existing interoperation solutions do not address such cross-domain temporal access control and SoDs requirements. In this paper, we propose a role-based framework to facilitate secure interoperation among multiple domains by ensuring the enforcement of temporal and SoD constraints of individual domains. To support interoperation, we do not modify the internal policies, as most of the current approaches do. We present experimental results to demonstrate our proposed framework is effective and easily realizable. Ā© 2011 IEEE
    • ā€¦
    corecore