9,588 research outputs found

    Approaches to Semantic Web Services: An Overview and Comparison

    Get PDF
    Abstract. The next Web generation promises to deliver Semantic Web Services (SWS); services that are self-described and amenable to automated discovery, composition and invocation. A prerequisite to this, however, is the emergence and evolution of the Semantic Web, which provides the infrastructure for the semantic interoperability of Web Services. Web Services will be augmented with rich formal descriptions of their capabilities, such that they can be utilized by applications or other services without human assistance or highly constrained agreements on interfaces or protocols. Thus, Semantic Web Services have the potential to change the way knowledge and business services are consumed and provided on the Web. In this paper, we survey the state of the art of current enabling technologies for Semantic Web Services. In addition, we characterize the infrastructure of Semantic Web Services along three orthogonal dimensions: activities, architecture and service ontology. Further, we examine and contrast three current approaches to SWS according to the proposed dimensions

    Flaw Selection Strategies for Partial-Order Planning

    Full text link
    Several recent studies have compared the relative efficiency of alternative flaw selection strategies for partial-order causal link (POCL) planning. We review this literature, and present new experimental results that generalize the earlier work and explain some of the discrepancies in it. In particular, we describe the Least-Cost Flaw Repair (LCFR) strategy developed and analyzed by Joslin and Pollack (1994), and compare it with other strategies, including Gerevini and Schubert's (1996) ZLIFO strategy. LCFR and ZLIFO make very different, and apparently conflicting claims about the most effective way to reduce search-space size in POCL planning. We resolve this conflict, arguing that much of the benefit that Gerevini and Schubert ascribe to the LIFO component of their ZLIFO strategy is better attributed to other causes. We show that for many problems, a strategy that combines least-cost flaw selection with the delay of separable threats will be effective in reducing search-space size, and will do so without excessive computational overhead. Although such a strategy thus provides a good default, we also show that certain domain characteristics may reduce its effectiveness.Comment: See http://www.jair.org/ for an online appendix and other files accompanying this articl

    Learning Features that Predict Cue Usage

    Get PDF
    Our goal is to identify the features that predict the occurrence and placement of discourse cues in tutorial explanations in order to aid in the automatic generation of explanations. Previous attempts to devise rules for text generation were based on intuition or small numbers of constructed examples. We apply a machine learning program, C4.5, to induce decision trees for cue occurrence and placement from a corpus of data coded for a variety of features previously thought to affect cue usage. Our experiments enable us to identify the features with most predictive power, and show that machine learning can be used to induce decision trees useful for text generation.Comment: 10 pages, 2 Postscript figures, uses aclap.sty, psfig.te

    Partner selection supported by opaque reputation promotes cooperative behavior

    Get PDF
    Reputation plays a major role in human societies, and it has been proposed as an explanation for the evolution of cooperation. While the majority of previous studies equates reputation with a transparent and complete history of players' past decisions, in real life, reputations are often ambiguous and opaque. Using web-based experiments, we explore the extent to which opaque reputation works in isolating defectors, with and without partner selection opportunities. Our results show that low reputation works as a signal of untrustworthiness, whereas medium or high reputation are not taken into account by participants for orienting their choices. We also find that reputation without partner selection does not promote cooperative behavior; that is, defectors do not turn into cooperators only for the sake of getting a positive reputation. Finally, in a third study, we find that, when reputation is pivotal to selection, then a substantial proportion of would-be defectors turn into cooperators. Taken together, these results provide insights on the characteristics of reputation and on the way in which humans make use of it when selecting partners but also when knowing that they will be selected

    APEnet+: high bandwidth 3D torus direct network for petaflops scale commodity clusters

    Full text link
    We describe herein the APElink+ board, a PCIe interconnect adapter featuring the latest advances in wire speed and interface technology plus hardware support for a RDMA programming model and experimental acceleration of GPU networking; this design allows us to build a low latency, high bandwidth PC cluster, the APEnet+ network, the new generation of our cost-effective, tens-of-thousands-scalable cluster network architecture. Some test results and characterization of data transmission of a complete testbench, based on a commercial development card mounting an Altera FPGA, are provided.Comment: 6 pages, 7 figures, proceeding of CHEP 2010, Taiwan, October 18-2

    Relationship between molecular connectivity and carcinogenic activity: a confirmation with a new software program based on graph theory.

    Get PDF
    For a database of 826 chemicals tested for carcinogenicity, we fragmented the structural formula of the chemicals into all possible contiguous-atom fragments with size between two and eight (nonhydrogen) atoms. The fragmentation was obtained using a new software program based on graph theory. We used 80% of the chemicals as a training set and 20% as a test set. The two sets were obtained by random sorting. From the training sets, an average (8 computer runs with independently sorted chemicals) of 315 different fragments were significantly (p < 0.125) associated with carcinogenicity or lack thereof. Even using this relatively low level of statistical significance, 23% of the molecules of the test sets lacked significant fragments. For 77% of the molecules of the test sets, we used the presence of significant fragments to predict carcinogenicity. The average level of accuracy of the predictions in the test sets was 67.5%. Chemicals containing only positive fragments were predicted with an accuracy of 78.7%. The level of accuracy was around 60% for chemicals characterized by contradictory fragments or only negative fragments. In a parallel manner, we performed eight paired runs in which carcinogenicity was attributed randomly to the molecules of the training sets. The fragments generated by these pseudo-training sets were devoid of any predictivity in the corresponding test sets. Using an independent software program, we confirmed (for the complex biological endpoint of carcinogenicity) the validity of a structure-activity relationship approach of the type proposed by Klopman and Rosenkranz with their CASE program

    Seismic monitoring of gas emissions at mud volcanoes: The case of Nirano (northern Italy)

    Get PDF
    Seismic signals generated at the Nirano mud volcanoes in Northern Italy have been monitored by deploying a set of small dimensions seismic arrays of vertical geophones and thee-directional sensors. During two seismic surveys campaigns, seismic signals characterized by sequences of short impulsive signals (lasting 0.1 s–0.2 s) were identified above the background seismic noise. The respective seismic sources have been identified at shallow depths (&lt;30 m) and results sparsely distributed over a wide area. Estimated propagation velocities and polarization analysis indicate that detected pulses also include a significant S waves contribution. These findings have been interpreted as the effect of a stick-slip mechanism due to the interaction between exsolved gas bubbles, mud plugs and the vent walls. On the basis of this model, an estimate of the gas outflow was attempted and results in line with independent measurements of CH4 and CO2 emissions carried out in the area

    Automatic identification of sites prone to topographic seismic amplification effects by the current seismic codes

    Get PDF
    Current seismic codes provide proxies to estimate seismic amplification effects expected in correspondence of some morphological features. To make possible any empirical validation of these proxies, these features must be univocally identified on the basis of an automatic procedure. To this purpose, based on geomorphological considerations, a GIS-based numerical approach has been developed. The results of a morphometric analysis allowed the correct identification and mapping of the landforms of concern, at a detail corresponding to the resolution of the available digital elevation model (DEM). Some case-studies are provided to show the feasibility of the proposed approach. © 2023 The Author

    Hopf algebraic structure of the parabosonic and parafermionic algebras and paraparticle generalization of the Jordan Schwinger map

    Full text link
    The aim of this paper is to show that there is a Hopf structure of the parabosonic and parafermionic algebras and this Hopf structure can generate the well known Hopf algebraic structure of the Lie algebras, through a realization of Lie algebras using the parabosonic (and parafermionic) extension of the Jordan Schwinger map. The differences between the Hopf algebraic and the graded Hopf superalgebraic structure on the parabosonic algebra are discussed.Comment: 11 pages, LaTex2e fil
    corecore