name
stringlengths 7
10
| title
stringlengths 13
125
| abstract
stringlengths 67
3.02k
| fulltext
stringclasses 1
value | keywords
stringlengths 17
734
|
---|---|---|---|---|
train_818 | Clausal resolution in a logic of rational agency | A resolution based proof system for a Temporal Logic of Possible Belief is presented. This logic is the combination of the branching-time temporal logic CTL (representing change over time) with the modal logic KD45 (representing belief). Such combinations of temporal or dynamic logics and modal logics are useful for specifying complex properties of multi-agent systems. Proof methods are important for developing verification techniques for these complex multi-modal logics. Soundness, completeness and termination of the proof method are shown and simple examples illustrating its use are given | dynamic logics;kd45;modal logic;branching-time temporal logic;multi-agent systems;resolution based proof system;belief;rational agents;multi-modal logics;temporal logic;ctl |
|
train_819 | Local search with constraint propagation and conflict-based heuristics | Search algorithms for solving CSP (Constraint Satisfaction Problems) usually fall into one of two main families: local search algorithms and systematic algorithms. Both families have their advantages. Designing hybrid approaches seems promising since those advantages may be combined into a single approach. In this paper, we present a new hybrid technique. It performs a local search over partial assignments instead of complete assignments, and uses filtering techniques and conflict-based techniques to efficiently guide the search. This new technique benefits from both classical approaches: a priori pruning of the search space from filtering-based search and possible repair of early mistakes from local search. We focus on a specific version of this technique: tabu decision-repair. Experiments done on open-shop scheduling problems show that our approach competes well with the best highly specialized algorithms | csp;filtering techniques;search algorithms;local search algorithms;constraint satisfaction problems;partial assignments;tabu decision-repair;systematic algorithms |
|
train_82 | Bit-serial AB/sup 2/ multiplier using modified inner product | This paper presents a new multiplication algorithm and, based on this algorithm, proposes a hardware architecture, called modified inner-product multiplier (MIPM), which computes AB/sup 2/ multiplication based on a linear feedback shift register (LFSR). The algorithm is based on the property of the irreducible all one polynomial (AOP) over the finite field GF(2/sup m/). The proposed architecture reduces the time and space complexity for computing AB/sup 2/. The proposed architecture has a potential application to implementing exponentiation architecture for a public-key cryptosystem | modified inner-product multiplier;bit-serial ab/sup 2/ multiplier;space complexity;multiplication algorithm;modified inner product;public-key cryptosystem;time complexity;irreducible all one polynomial;linear feedback shift register;hardware architecture |
|
train_820 | Yet some more complexity results for default logic | We identify several new tractable subsets and several new intractable simple cases for reasoning in the propositional version of Reiter's default logic. The majority of our findings are related to brave reasoning. By making some intuitive observations, most classes that we identify can be derived quite easily from some subsets of default logic already known in the literature. Some of the subsets we discuss are subclasses of the so-called "extended logic programs". All the tractable subsets presented in this paper can be recognized in linear time | complexity results;tractable subsets;extended logic programs;default logic;reasoning;complexity classes;nonmonotonic reasoning |
|
train_821 | Digital rights (and wrongs) | Attempting to grasp the many conflicts and proposed safeguards for intellectual property is extremely difficult. Legal, political, economic, and cultural issues-both domestic and international-loom large, almost dwarfing the daunting technological challenges. Solutions devised by courts and legislatures and regulatory agencies are always late out of the blocks and fall ever farther behind. Recently proposed legislation only illustrates the depth and complexity of the problem | legal issues;economic issues;political issues;intellectual property;cultural issues |
|
train_822 | Reinventing broadband | Many believe that broadband providers need to change their whole approach. The future, then, is in reinventing broadband. That means tiered pricing to make broadband more competitive with dial-up access and livelier, more distinct content: video on demand, MP3, and other features exclusive to the fat-pipe superhighway | tiered pricing;broadband;video on demand;mp3;business plans |
|
train_823 | Estimation of thermal coefficients of magneto-optical media | Previously we described a method for estimating the thermal conductivity of magneto-optic recording media. The method relies on identifying the laser power that brings the maximum temperature of the TbFeCo layer to as high as the Curie temperature. We extensively use a similar method to estimate the heat capacity of a dielectric layer, a TbFeCo layer, and an aluminum alloy layer of magneto-optic recording media. Measurements are conducted on static disks with a beam of light focused on a TbFeCo layer. The method has the advantage of thermal diffusion depending on a multilayer structure and irradiation time | curie temperature;maximum temperature;laser power;multilayer structure;light focusing;magneto-optic recording media;thermal conductivity;thermal diffusion;tbfeco layer;aluminum alloy layer;static disks;magneto-optical media;dielectric layer;thermal coefficients;tbfeco;irradiation time;heat capacity |
|
train_824 | The Internet, knowledge and the academy | As knowledge is released from the bounds of libraries, as research becomes no longer confined to the academy, and education/certification is available, any time/any place, the university and the faculty must redefine themselves. Liberal studies, once the core, and currently eschewed in favor of science and technology, will be reborn in those institutions that can rise above the mundane and embrace an emerging "third culture" | academy;faculty;internet;university;certification;knowledge;liberal studies;education |
|
train_825 | Genetic algorithm-neural network estimation of Cobb angle from torso asymmetry | in scoliosis Scoliosis severity, measured by the Cobb angle, was estimated by artificial neural network from indices of torso surface asymmetry using a genetic algorithm to select the optimal set of input torso indices. Estimates of the Cobb angle were accurate within 5 degrees in two-thirds, and within 10 degrees in six-sevenths, of a test set of 115 scans of 48 scoliosis patients, showing promise for future longitudinal studies to detect scoliosis progression without use of X-rays | scoliosis patients;scoliosis progression;input torso indices;genetic algorithm;torso surface asymmetry;artificial neural network;cobb angle |
|
train_826 | A round of cash, a pound of flesh [telecom] | Despite the upheaval across telecom, venture capital firms are still investing in start-ups. But while a promising idea and a catchy name were enough to guarantee millions in funding at the peak of the dotcom frenzy, now start-ups must prove-their long-term viability, and be willing to concede control of their business to their VC suitors | venture capital firms;telecom;viability |
|
train_827 | Williams nears end of Chapter 11 [telecom] | Leucadia National Corp. comes through with a $330 million boost for Williams Communications, which should keep the carrier afloat through the remainder of its bankruptcy | bankruptcy;leucadia national corp;williams communications |
|
train_828 | Verizon leapfrogs Sprint PCS with Q2 subscriber numbers | The wireless carrier industry's second-quarter results showed a surprising shift in market share as Sprint PCS fell from grace after a nearly four-year lead in subscriber additions and Verizon Wireless added considerably more customers than analysts expected | sprint pcs;verizon wireless;wireless carrier industry |
|
train_829 | Santera targets independents in major strategy overhaul [telecom] | With big carriers slashing capital expense budgets, Santera Systems is broadening the reach of its next-generation switching platform to include independent telcos. This week, the vendor will announce that it has signed a deal with Kerman, Calif-based Kerman Telephone Co. Furthermore, the company is angling for inclusion in the Rural Utilities Service's approved equipment list, hoping to sell its Class 5 replacement boxes to the smallest carriers. The move is almost a complete reversal for the Plano, Texas-based vendor, which previously focused solely on large carriers, including the RBOCs | switching;rural utilities service;santera systems;kerman telephone |
|
train_83 | A distributed mobile agent framework for maintaining persistent distance | education Mobile agent techniques involve distributed control if communication is required among different types of agents, especially when mobile agents can migrate from station to station. This technique can be implemented in a distributed distance learning environment, which allows students or instructors to login from anywhere to a central server in an education center while still retaining the look-and-feel of personal setups. In this research paper, we propose a distributed agent framework along with its communication messages to facilitate mobile personal agents, which serve three different groups of distance education users: instructors, students, and system administrators. We propose an agent communication framework as well as agent evolution states of mobile agents. The communication architecture and message transmission protocols are illustrated. The system is implemented on the Windows platform to support nomadic accessibility of remote distance learning users. Personal data also migrate with the mobile agents, allowing users to maintain accessibility to some extent even when the Internet connection is temperately disconnected. Using user-friendly personal agents, a distance education platform can include different tools to meet different needs for users | central server;message transmission protocols;persistent distance education;distributed agent framework;distributed control;user-friendly personal agents;distributed mobile agent framework |
|
train_830 | The real story behind Calpoint [telecom] | A former Qwest executive sheds light on the carrier's controversial deal with Calpoint. Discusses why Calpoint gets a monthly check from Quest, regardless of whether it provides services | telecom carrier;qwest;calpoint |
|
train_831 | Software vendors' failure fuels consolidation theories [telecom interconnection | and billing] As independent software vendors like AP Engines fall by the wayside as independent entities, attrition could accelerate consolidation in the OSS space | operations supports systems;telecom billing;consolidation;telecom interconnection;quintessent;ap engines |
|
train_832 | Senate to Powell: regulate more [FCC] | FCC Chairman Michael Powell pitched a six-step market-based recovery plan to the Senate last week, but two members of the Commerce Committee told him telecom's revival requires more reliance on regulation | telecom industry;recovery plan;fcc;us senate commerce committee |
|
train_833 | Packet promises past & present [IP switching] | With the death of the competitive carrier market and the significant slashing of RBOC capex budgets, softswitch vendors have been forced to retrench. Now instead of focusing primarily on limited Internet off-load applications, packet-based softswitches are set to gel around real user needs for services such as voice over IP and IP Centrex | voice over ip;softswitch vendors;ip centrex |
|
train_834 | Commerce Department plan eases 3G spectrum crunch | The federal government made its first move last week toward cleaning up a spectrum allocation system that was in shambles just a year ago and had some, spectrum-starved wireless carriers fearing they wouldn't be able to compete in third-generation services. The move, however, is far from complete and leaves numerous details unsettled | spectrum allocation system;federal government;wireless carriers;3g spectrum |
|
train_835 | Pioneering women in computer science | Although their contributions are not well documented, women have played an important role in the development of computer science. A survey of women pioneers demonstrates their influence in designing and programming the first electronic computers and languages, while laying the groundwork for women's expanding involvement in science | pioneering women;electronic computers;programming languages;computer science development;history |
|
train_836 | Recruitment and retention of women graduate students in computer science and | engineering: results of a workshop organized by the Computing Research Association This document is the report of a workshop that convened a group of experts to discuss the recruitment and retention of women in computer science and engineering (CSE) graduate programs. Participants included long-time members of the CSE academic and research communities, social scientists engaged in relevant research, and directors of successful retention efforts. The report is a compendium of the experience and expertise of workshop participants, rather than the result of a full-scale, scholarly study into the range of issues. Its goal is to provide departments with practical advice on recruitment and retention in the form of a set of specific recommendations | social scientists;academic communities;engineering;research communities;computer science;directors;recruitment;retention;computing research association;workshop participants;women graduate students |
|
train_837 | Ten suggestions for a gender-equitable CS classroom | Though considerable attention has been paid to the creation of a nurturing environment for women in the field of computer science, proposed solutions have primarily focused on activities outside of the classroom. This paper presents a list of suggestions for modifications to both the pedagogy and content of CS courses designed to make the CS classroom environment more inviting for women students | nurturing environment;cs classroom environment;gender-equitable classroom;women students;computer science;pedagogy;cs course content |
|
train_838 | Pool halls, chips, and war games: women in the culture of computing | Computers are becoming ubiquitous in our society and they offer superb opportunities for people in jobs and everyday life. But there is a noticeable sex difference in use of computers among children. This article asks why computers are more attractive to boys than to girls and offers a cultural framework for explaining the apparent sex differences. Although the data are fragmentary, the world of computing seems to be more consistent with male adolescent culture than with feminine values and goals. Furthermore, both arcade and educational software is designed with boys in mind. These observations lead us to speculate that computing is neither inherently difficult nor uninteresting to girls, but rather that computer games and other software might have to be designed differently for girls. Programs to help teachers instill computer efficacy in all children also need to be developed | women;computer games;culture of computing;male adolescent culture;teachers;sex difference;educational software;children |
|
train_839 | Women in computing: what brings them to it, what keeps them in it? | Career stereotyping and misperceptions about the nature of computing are substantive reasons for the under representation of women in professional computing careers. In this study, 15 women who have work experience in several aspects of computing were asked about their reasons for entering computing, what they liked about working in computing, and what they disliked. While there are many common threads, there are also individual differences. Common reasons for choosing computing as a career included: exposure to computing in a setting which enabled them to see the versatility of computers; the influence of someone close to them; personal abilities which they perceived to be appropriate for a career in computing; and characteristics of such careers which appealed to them. Generally, women working in the field enjoy the work they are doing. Dislikes arising from their work experiences are more likely to be associated with people and politics than with the work they do-and they would like to have more female colleagues | women;personal abilities;politics;career stereotyping;professional computing careers;misperceptions |
|
train_84 | Efficient cellular automata based versatile multiplier for GF(2/sup m/) | In this paper, a low-complexity programmable cellular automata (PCA) based versatile modular multiplier in GF(2/sup m/) is presented. The proposed versatile multiplier increases flexibility by using the same multiplier in different security environments, and it reduces the user's cost. Moreover, the multiplier can be easily extended to high order of m for more security, and low-cost serial implementation is feasible in restricted computing environments, such as smart cards and wireless devices | cellular automata based versatile multiplier;smart cards;security environments;low-complexity programmable cellular automata;wireless devices;restricted computing environments |
|
train_840 | Gender benders [women in computing profession] | As a minority in the upper levels of the computing profession, women are sometimes mistreated through ignorance or malice. Some women have learned to respond with wit and panache | women;computing profession |
|
train_841 | Becoming a computer scientist | The focus of this report is pipeline shrinkage for women in computer science. We describe the situation for women at all stages of training in computer science, from the precollege level through graduate school. Because many of the problems discussed are related to the lack of role models for women who are in the process of becoming computer scientists, we also concern ourselves with the status of women faculty members. We not only describe the problems, but also make specific recommendations for change and encourage further study of those problems whose solutions are not yet well understood | women;pipeline shrinkage;women faculty members;computer science;role models |
|
train_842 | The incredible shrinking pipeline | We look at the harsh facts concerning the percentage of degrees awarded in CS to women. We study the trend of degrees awarded in CS since 1980, and compare the trend in CS to other science and engineering disciplines. We consider the relationship between the percentage of degrees awarded to women by a CS department and the college the CS department is within. We find that CS departments in engineering colleges graduate, on average, proportionately fewer women than CS departments in non-engineering colleges. We request that the community respond to the facts and speculations presented in this article | women;science;engineering;pipeline shrinkage problem;computer science degrees |
|
train_843 | An ACM-W literature review on women in computing | The pipeline shrinkage problem for women in computer science is a well-known and documented phenomenon where the ratio of women to men involved in computing shrinks dramatically from early student years to working years. During the last decade, considerable research ensued to understand the reasons behind the existence of the shrinking pipeline and in some cases to take action to increase the numbers of women in computing. Through the work of a National Science Foundation funded project, ACM's Committee on Women in Computing (ACM-W) has taken a first step towards pulling this research together. A large number of articles was gathered and processed on the topic of women in computing and the shrinking pipeline. The committee created a publicly available online database to organize the references of this body of work by topic, author, and reference information. The database, constantly being updated, is accessible through ACM-W's website <http://www.acm.org/women>. A final report is also available via the ACM-W Web site which covers current statistics on women in computing, summaries of the literature in the database, and a set of recommendations. The article is a brief synopsis of a subset of the literature review as of August 2001 | acm-w literature review;pipeline shrinkage problem;acm committee on women in computing |
|
train_844 | Women in computing history | Exciting inventions, innovative technology, human interaction, and intriguing politics fill computing history. However, the recorded history is mainly composed of male achievements and involvements, even though women have played substantial roles. This situation is not unusual. Most science fields are notorious for excluding, undervaluing, or overlooking the accomplishments of their female scientists. As Lee points out, it is up to the historians and others to remedy this imbalance. Steps have been taken towards this goal through publishing biographies on women in technology, and through honoring the pioneers with various awards such as the GHC'97 Pioneering Awards, the WITI Hall of Fame, and the AWC Lovelace Award. A few online sites contain biographies of women in technology. However, even with these resources, many women who have contributed significantly to computer science are still to be discovered | women;computing history |
|
train_845 | Gender, software design, and occupational equity | After reviewing the work on gender bias in software design, a model of gender-role influenced achievement choice taken from Eccles (1994) is presented. The paper concludes that (1) though laudable, reduction of gender bias in software design is not the most straightforward way to reduce gender inequity in the choice of computing as a career, (2) the model itself makes more clear some of the ethical issues involved in attempting to achieve gender equity on computing, and (3) efforts to reduce gender inequity in the choice of computing as a career need to be evaluated in the light of this model | gender bias;software design;gender-role influenced achievement choice model;occupational equity;ethical issues;computing career |
|
train_846 | Female computer science doctorates: what does the survey of earned doctorates | reveal? Based on the National Center for Education Statistics (2000), in the 1997-1998 academic year 26.7% of earned bachelors' degrees, 29.0% of earned masters' degrees and 16.3% of earned doctorates' degrees in computer science were awarded to women. As these percentages suggest, women are underrepresented at all academic levels in computer science (Camp, 1997). The most severe shortage occurs at the top level-the doctorate in computer science. We know very little about the women who persist to the top level of academic achievement in computer science. This paper examines a subset of data collected through the Survey of Earned Doctorates (SED). The specific focus of this paper is to identify trends that have emerged from the SED with respect to females completing doctorates in computer science between the academic years 1990-1991 and 1999-2000. Although computer science doctorates include doctorates in information science, prior research (Camp, 1997) suggests that the percentage of women completing doctorates in information science as compared to computer science is low. The specific research questions are: 1. How does the percentage of women who complete doctorates in computer science compare to those that complete doctorates in other fields? 2. How does the length of time in school and the sources of funding differ for females as compared to males who complete doctorates in computer science? 3. Where do women go after completing doctorates in computer science and what positions do they acquire? How do these experiences differ from their male peers? | survey of earned doctorates;female computer science doctorates;information science |
|
train_847 | A gendered view of computer professionals: preliminary results of a survey | The under-representation of women in the computing profession in many parts the western world has received our attention through numerous publications, the noticeable low representation of women at computer science conferences and in the lecture halls. Over the past two decades, the situation had become worse. This paper seeks to add to the dialogue by presenting preliminary findings from a research project conducted in four countries. The aim of this research was to gain an insight into the perceptions future computer professionals hold on the category of employment loosely defined under the term of "a computer professional." One goal was to get insight into whether or not there is a difference between female and mate students regarding their view of computer professionals. Other goals were to determine if there was any difference between female and male students in different parts of the world, as well as who or what most influences the students to undertake their courses in computing | computing profession;employment;female students;women under-representation;computing courses;mate students;future computer professional perceptions |
|
train_848 | Women in computing around the world | This paper describes the participation of women in computing in more than 30 countries, by focussing on participation at undergraduate level. A brief discussion covers how societal and cultural factors may affect women's participation. Statistics from many different sources are presented for comparison. Generally, participation is low - most countries fall in the 10-40% range with a few below 10% and a few above 40% | women;societal factors;undergraduate computing;statistics;cultural factors |
|
train_849 | Ten years of strategies to increase participation of women in computing | programs. The Central Queensland University experience: 1999-2001 In the late eighties, the participation rate of women in information technology courses in most Australian Universities was around 25%. This low level of women's participation in computing courses occurs not only in Australia but also overseas. More studies indicate that the participation rates have not improved and in fact may be even further in decline. Participation rates in the workforce also appear to be in decline. Concerned at the imbalance within Australia, the Federal government directed all Australian Universities to increase the number of women in courses leading to a professional computing qualification (i.e., information technology courses) to 40% of students by 1995. This paper details one Australian university's approach, over a 10 year period (1991-2001), to redress this imbalance. We provide examples of intervention strategies developed and the outcomes for these strategies. We present the outcomes against a background frame of the Australian Higher Education scene of that decade which was influenced by funding levels to universities in general and to equity programs in particular. We present data related to the participation of women in computing programs along with snapshots of the overall changing student demographics over this period | demographics;women;central queensland university;computing programs;australian higher education |
|
train_85 | Strategic implementation of IT/IS projects in construction: a case study | The need for improved implementation of Information Technology (IT) and Information Systems (IS) has been emphasised in both empirical and prescriptive research studies. This problem is magnified in the construction industry, which has been slow to embrace and utilise new technologies with negative consequences on productivity and innovation. This paper presents a strategic implementation framework for IT/IS projects in construction. The framework builds upon recent published works and encompasses well-documented predictors for effective IT/IS implementation. A case study with a large multi-national construction organisation is used to demonstrate the strategic implementation of a Project Management Information System (PMIS) used for the construction of a mobile phone telecommunications network in the South East of Queensland, Australia | swot analysis;information technology;construction industry;analytical hierarchy process;project management information system;strategic implementation;mobile phone telecommunications network;large multi-national construction organisation;predictors;strategic implementation framework;information systems |
|
train_850 | Encouraging women in computer science | At a cost to both their own opportunities and society's ability to produce people with much-needed technical skills, women continue to be underrepresented in computer science degree programs at both the undergraduate and graduate level. Although some of the barriers that women face have their foundations in cultural expectations established well before the college level, we believe that departments can take effective steps to increase recruitment and retention of women students. This paper describes several strategies we have adopted at Stanford over the past decade | graduate level;women student retention;technical skills;women student recruitment;undergraduate level;computer science degree programs;cultural expectations |
|
train_851 | Unlocking the clubhouse: the Carnegie Mellon experience | In the fall of 1995, just seven of 95 students entering the undergraduate program in computer science at Carnegie Mellon University were women. In 2000, 54 of 130, or 42%, were women. What happened? This article presents a brief history of the transformation at Carnegie Mellon's School of Computer Science, and the research project that lay behind it | women;research project;carnegie mellon university;gender issues;history;undergraduate program;students;computer science education |
|
train_852 | Building an effective computer science student organization: the Carnegie | Mellon Women@SCS action plan This paper aims to provide a practical guide for building a student organization and designing activities and events that can encourage and support a community of women in computer science. This guide is based on our experience in building Women@SCS, a community of women in the School of Computer Science (SCS) at Carnegie Mellon University. Rather than provide an abstract "to-do" or "must-do" list, we present a sampling of concrete activities and events in the hope that these might suggest possibilities for a likeminded student organization. However, since we have found it essential to have a core group of activist students at the helm, we provide a "to-do" list of features that we feel are essential for forming, supporting and sustaining creative and effective student leadership | women;carnegie mellon university;gender issues;computer science student organization;women@scs action plan;student leadership;computer science education |
|
train_853 | Virtual Development Center | The Virtual Development Center of the Institute for Women and Technology seeks to significantly enhance the impact of women on technology. It addresses this goal by increasing the number of women who have input on created technology, enhancing the ways people teach and develop technology, and developing need-based technology that serves the community. Through activities of the Virtual Development Center, a pattern is emerging regarding how computing technologies do or do not satisfy the needs of community groups, particularly those communities serving women. This paper describes the Virtual Development Center program and offers observations on the impact of computing technology on non-technical communities | women;information technology;gender issues;community groups;virtual development center;computer science education;teaching |
|
train_854 | A conference's impact on undergraduate female students | In September of 2000, the 3rd Grace Hopper Celebration of Women in Computing was held in Cape Cod, Massachusetts. Along with a colleague from a nearby university, we accompanied seven of our female undergraduate students to this conference. This paper reports on how the conference experience immediately affected these students - what impressed them, what scared them, what it clarified for them. It also reports on how the context in which these students currently evaluate their ability, potential and opportunity in computer science is different now from what it was before the conference. Hopefully, by understanding their experience, we can gain some insight into things we can do for all of our undergraduate female students to better support their computer science and engineering education | undergraduate female students;conference;gender issues;computer science education;engineering education |
|
train_855 | Support communities for women in computing | This article highlights the many activities provided by the support communities available for women in computing. Thousands of women actively participate in these programs and they receive many benefits including networking and professional support. In addition, the organizations and associations help promote the accomplishments of women computer scientists and disseminate valuable information. This article surveys some of these organizations and concludes with a list of suggestions for how faculty members can incorporate the benefits of these organizations in their own institutions | women;support communities;professional support;faculty members;networking;computing;information dissemination |
|
train_856 | People who make a difference: mentors and role models | The literature of gender issues in computing steadfastly and uniformly has advocated the use of mentors and role models (M&RM) for recruiting and retaining women in computer science. This paper, therefore, accepts the results of research studies and avoids reiterating details of the projects but offers instead a practical guide for using M&RM to recruit and retain women in computer science. The guide provides pragmatic advice, describing several different facets of the M&RM concept | women retention;women recruitment;gender issues;computer science;computing;role models;mentors |
|
train_857 | Leveraging an alternative source of computer scientists: reentry programs | Much has been written about the leaky pipeline of women in computer science (CS), with the percentage of women decreasing as one moves from lower levels, such as college, to higher levels, culminating in full professorship. While significant attention focused on keeping women from leaving the pipeline, there is also an opportunity to bring women into the pipeline through non-traditional programs, instead of requiring that everyone enter at the undergraduate level. Both Mills College, a small liberal arts institution for women, and UC Berkeley, a large research university, established programs in the 80's to increase the number of women in computer science by tapping non-traditional students. Both programs share the core value of accommodating older students lacking technical backgrounds. The two programs have produced similar results: graduate degrees earned in computer science by students who would not have qualified without these programs, professional employment in the computer science field by women and minorities, and a recognition that this population represents a rich source of talent for our nation | minorities;women;reentry programs;uc berkeley;professional employment;computer science;graduate degrees;students;mills college |
|
train_858 | Recruiting and retaining women in undergraduate computing majors | This paper recommends methods for increasing female participation in undergraduate computer science. The recommendations are based on recent and on-going research into the gender gap in computer science and related disciplines. They are intended to work in tandem with the Computing Research Association's recommendations for graduate programs to promote a general increase in women's participation in computing professions. Most of the suggestions offered could improve the educational environment for both male and female students. However, general improvements are likely to be of particular benefit to women because women in our society do not generally receive the same level of support that men receive for entering and persisting in this field | women recruitment;computer science;female participation;undergraduate computing majors;women retention;gender gap |
|
train_859 | Developing a hardware and programming curriculum for middle school girls | Techbridge provides experiences and resources that would teach girls technology skills as well as excite their curiosity and build their confidence. Funded by the National Science Foundation and sponsored by Chabot Space and Science Center in Oakland, California, Techbridge is a three-year program that serves approximately 200 girls annually. Techbridge is hosted at 8 middle and high schools in Oakland and at the California School for the Blind in Fremont, California generally as an after-school program meeting once a week. Techbridge comes at a critical time in girls' development when girls have many important decisions to make regarding classes and careers, but often lack the confidence and guidance to make the best choices. Techbridge helps girls plan for the next steps to high school and college with its role models and guidance. Techbridge also provides training and resources for teachers, counselors, and families | hardware and programming curriculum;techbridge;technology skills teaching;middle school girls |
|
train_86 | Laser-based internal profile measurement system | An automatic laser-based system to measure the internal profiles of various structures has been developed. The system uses a point laser source through a rotating optical device fixed on to a laser measurement meter. A notebook computer with custom software is used to control the laser meter and rotating device to estimate the scanned profile shape and to determine the resulting cross-section area. The information provided by this system is essential to construction industry, including window and door builders; the glass, panel, board, and floor tile manufacturers; carpet venders; and building contractors for cost estimation and production control. As a result, the lead time for delivering the customized windowpanes, woodwork, floor tiles, and ceilings can be reduced. Applications of this system for measuring the shapes of window frames and floor plans are described and demonstrated. The measurement accuracy is evaluated and analyzed. Results have indicated that the measurement accuracy can be achieved within 4% of the measurement distance, for typical window designs and floor patterns required by major window manufacturers. Recommendations to improve the system are also included | point laser source;cost estimation;internal profiles;carpet venders;laser meter;laser-based internal profile measurement system;floor tile manufacturers;building contractors;rotating optical device;rotating device;window frames;production control;customized windowpanes |
|
train_860 | 'Virtual Family': an approach to introducing Java programming | This paper introduces and discusses Virtual Family (VF): a gender-neutral game-based software that introduces Java programming. VF provides a completely functioning game that students extend and enhance via programming. We discuss the background and context within which Virtual Family was developed and other available multimedia resources for teaching programming. The paper then goes on to describe Virtual Family's concept and design. Finally, feedback received from Virtual Family teaching workshops is related, as well as preliminary results from using VF in high-school teaching units. Virtual Family is under development in a research lab at the University of British Columbia and is an initiative of Supporting Women in Information Technology (SWIFT). SWIFT is a five-year research action and implementation project to increase the participation of women in information technology | virtual family;supporting women in information technology;high-school teaching units;teaching workshops;java programming teaching;gender-neutral game-based software;multimedia resources |
|
train_861 | The decision procedure for profitability of investment projects using the | internal rate of return of single-period projects The internal rate of return (IRR) criterion is often used to evaluate profitability of investment projects. In this paper, we focus on a single-period project which consists of two types of cash flows; an investment at one period and a return at a succeeding period, and a financing at one period and a repayment at a succeeding period. We decompose the given investment project into a series of the single-period projects. From the viewpoint of the single-period project, we point out the applicability issue of the IRR criterion, namely the IRR criterion cannot be applied in which a project is composed of both investment type and financing type. Investigating the properties of a series of the single-period projects, we resolve the applicability issue of the IRR criterion and propose the decision procedure for profitability judgment toward any type of investment project based on the comparison between the IRR and the capital cost. We develop a new algorithm to obtain the value of the project investment rate (PIR) for the given project, which is a function of the capital cost, only using the standard IRR computing routine. This outcome is a theoretical breakthrough to widen the utilization of IRR in practical applications | decision procedure;project investment rate;irr criterion;investment project profitability;single-period projects;pir;cash flows;profitability;internal rate of return;investment project decomposition |
|
train_862 | Two efficient algorithms for the generalized maximum balanced flow problem | Minoux (1976) considered the maximum balanced flow problem, i.e. the problem of finding a maximum flow in a two-terminal network N = (V,A) with source s and sink t satisfying the constraint that any arc-flow of N is bounded by a fixed proportion of the total flow value from s to t, where V is vertex set and A is arc set. As a generalization, we focus on the problem of maximizing the total flow value of a generalized flow in N with gains gamma (a) > 0 (a in A) where any arc-flow is bounded by a fixed proportion of the total flow value, where gamma (a)f(a) units arrive at the vertex w for each arc-flow f(a) (a identical to ( upsilon , w) in A) entering vertex upsilon in a generalized flow. Our main results are to propose two polynomial algorithms for this problem. The first algorithm runs in O(mM(n, m, B') log B) time, where B is the maximum absolute value among integral values used by an instance of the problem, and M(n, m, B') denotes the complexity of solving a generalized maximum flow problem in a network with n vertices, and m arcs, and a rational instance expressed with integers between 1 and B'. In the second algorithm, using a parameterized technique, runs in O({M(n, m, B')}/sup 2/) time | polynomial algorithms;two-terminal network;generalized maximum balanced flow problem;parameterized technique |
|
train_863 | A scanline-based algorithm for the 2D free-form bin packing problem | This paper describes a heuristic algorithm for the 2D free-form bin packing (2D-FBP) problem. Given a set of 2D free-form bins and a set of 2D free-form items, the 2D-FBP problem is to lay out items inside one or more bins in such a way that the number of bins used is minimized, and for each bin, the yield is maximized. The proposed algorithm handles the problem as a variant of the 1D problem; i.e., items and bins are approximated as sets of scanlines, and scanlines are packed. The details of the algorithm are given, and its application to a nesting problem in a shipbuilding company is reported. The proposed algorithm consists of the basic and the group placement algorithms. The basic placement algorithm is a variant of the first-fit decreasing algorithm which is simply extended from the 1D case to the 2D case by a novel scanline approximation. A numerical study with real instances shows that the basic placement algorithm has sufficient performance for most of the instances, however, the group placement algorithm is required when items must be aligned in columns. The qualities of the resulting layouts are good enough for practical use, and the processing times are good | heuristic algorithm;group placement algorithm;shipbuilding company;2d-fbp problem;irregular packing;scanline-based algorithm;yield maximization;2d free-form bin packing problem;minimization;first-fit decreasing algorithm;irregular cutting;nesting problem |
|
train_864 | Valuing corporate debt: the effect of cross-holdings of stock and debt | We have developed a simple approach to valuing risky corporate debt when corporations own securities issued by other corporations. We assume that corporate debt can be valued as an option on corporate business asset value, and derive payoff functions when there exist cross-holdings of stock or debt between two firms. Next we show that payoff functions with multiple cross-holdings can be solved by the contraction principle. The payoff functions which we derive provide a number of insights about the risk structure of company cross-holdings. First, the Modigliani-Miller theorem can obtain when there exist cross-holdings between firms. Second, by establishing cross-shareholdings each of stock holders distributes a part of its payoff values to the bond holder of the other's firm, so that both firms can decrease credit risks by cross-shareholdings. In the numerical examples, we show that the correlation in firms can be a critical condition for reducing credit risk by cross-holdings of stock using Monte Carlo simulation. Moreover, we show we can calculate the default spread easily when complicated cross-holdings exist, and find which shares are beneficial or disadvantageous | cross-shareholdings;credit risks;risky corporate debt valuation;option;payoff functions;stock holdings;multiple cross-holdings;debt holdings;monte carlo simulation;corporate business asset value;securities;correlation;bond holder;modigliani-miller theorem |
|
train_865 | Setup cost and lead time reductions on stochastic inventory models with a | service level constraint The stochastic inventory models analyzed in this paper explore the problem of lead time associated with setup cost reductions for the continuous review and periodic review inventory models. For these two models with a mixture of backorders and lost sales, we respectively assume that their mean and variance of the lead time demand and protection interval (i.e., lead time plus review period) demand are known, but their probability distributions are unknown. We develop a minimax distribution free procedure to find the optimal solution-for each case | minimax distribution free procedure;lead time demand;lead time reductions;continuous review inventory models;service level constraint;probability distributions;lost sales;backorders;periodic review inventory models;stochastic inventory models;setup cost reductions;protection interval |
|
train_866 | Adjoint-based optimization of steady suction for disturbance control in | incompressible flows The optimal distribution of steady suction needed to control the growth of single or multiple disturbances in quasi-three-dimensional incompressible boundary layers on a flat plate is investigated. The evolution of disturbances is analysed in the framework of the parabolized stability equations (PSE). A gradient-based optimization procedure is used and the gradients are evaluated using the adjoint of the parabolized stability equations (APSE) and the adjoint of the boundary layer equations (ABLE). The accuracy of the gradient is increased by introducing a stabilization procedure for the PSE. Results show that a suction peak appears in the upstream part of the suction region for optimal control of Tollmien-Schlichting (T-S) waves, steady streamwise streaks in a two-dimensional boundary layer and oblique waves in a quasi-three-dimensional boundary layer subject to an adverse pressure gradient. The mean flow modifications due to suction are shown to have a stabilizing effect similar to that of a favourable pressure gradient. It is also shown that the optimal suction distribution for the disturbance of interest reduces the growth rate of other perturbations. Results for control of a steady cross-flow mode in a three-dimensional boundary layer subject to a favourable pressure gradient show that not even large amounts of suction can completely stabilize the disturbance | incompressible flows;adjoint-based optimization;gradient-based optimization procedure;laminar-turbulent transition;tollmien-schlichting waves;parabolized stability equations;stabilization procedure;mean flow;oblique waves;steady cross-flow mode;quasithree-dimensional incompressible boundary layers;steady streamwise streaks;adverse pressure gradient;disturbance control;steady suction;flat plate |
|
train_867 | Tracking control of the flexible slider-crank mechanism system under impact | The variable structure control (VSC) and the stabilizer design by using the pole placement technique are applied to the tracking control of the flexible slider-crank mechanism under impact. The VSC strategy is employed to track the crank angular position and speed, while the stabilizer design is involved to suppress the flexible vibrations simultaneously. From the theoretical impact consideration, three approaches including the generalized momentum balance (GMB), the continuous force model (CFM), and the CFM associated with the effective mass compensation EMC are adopted, and are derived on the basis of the energy and impulse-momentum conservations. Simulation results are provided to demonstrate the performance of the motor-controller flexible slider-crank mechanism not only accomplishing good tracking trajectory of the crank angle, but also eliminating vibrations of the flexible connecting rod | conservation laws;continuous force model;flexible vibrations;generalized momentum balance;tracking trajectory;impact;tracking control;effective mass compensation;crank angular position;pole placement technique;flexible connecting rod;multibody dynamics;variable structure control;stabilizer design;flexible slider-crank mechanism system |
|
train_868 | Two quantum analogues of Fisher information from a large deviation viewpoint of | quantum estimation We discuss two quantum analogues of the Fisher information, the symmetric logarithmic derivative Fisher information and Kubo-Mori-Bogoljubov Fisher information from a large deviation viewpoint of quantum estimation and prove that the former gives the true bound and the latter gives the bound of consistent superefficient estimators. As another comparison, it is shown that the difference between them is characterized by the change of the order of limits | kubo-mori-bogoljubov fisher information;consistent superefficient estimators;symmetric logarithmic derivative fisher information;quantum analogues;quantum estimation;statistical inference;large deviation viewpoint |
|
train_869 | An exactly solvable random satisfiability problem | We introduce a new model for the generation of random satisfiability problems. It is an extension of the hyper-SAT model of Ricci-Tersenghi, Weigt and Zecchina (2001), which is a variant of the famous K-SAT model: it is extended to q-state variables and relates to a different choice of the statistical ensemble. The model has an exactly solvable statistic: the critical exponents and scaling functions of the SAT/UNSAT transition are calculable at zero temperature, with no need of replicas, also with exact finite-size corrections. We also introduce an exact duality of the model, and show an analogy of thermodynamic properties with the random energy model of disordered spin system theory. Relations with error correcting codes are also discussed | statistical ensemble;exact duality;thermodynamic properties;hyper-sat model;q-state variables;error correcting codes;exactly solvable random satisfiability problem;exact finite-size corrections;random energy model;disordered spin system theory |
|
train_87 | Positional control of pneumatic manipulators for construction tasks | This paper describes solutions that can be applied to pneumatic manipulator problems in positioning, both for angle trajectories and for long linear trajectories, used in construction tasks. Optimal positioning of a pneumatic manipulator along angle trajectories with minimum control energy consumption is given. The implementation of the control system is presented. Control algorithms for a long linear trajectory manipulator based on two-phase and three-phase motion modes of the end-effector are investigated. Conventional and fuzzy logic controls of a pneumatic manipulator were applied and experimental testing was carried out. The obtained results allow widening the application range of pneumatic manipulators in construction, particularly in gantry type machines | three-phase motion modes;angle trajectories;gantry type machines;fuzzy logic controls;positioning;construction tasks;positional control;long linear trajectory manipulator;two-phase motion modes;pneumatic manipulators |
|
train_870 | Speaker identification from voice using neural networks | The paper provides three different schemes for speaker identification of personnel from their voice using artificial neural networks. The first scheme recognizes speakers by employing the classical backpropagation algorithm pre-trained with known voice samples of the persons. The second scheme provides a framework for classifying the known training samples of the voice features using a hierarchical architecture realized with a self-organizing feature map neural net. The first scheme is highly robust as it is capable of identifying the personnel from their noisy voice samples, but because of its excessive training time it has limited applications for a large voice database. The second scheme though not so robust as the former, however, can classify an unknown voice sample to its nearest class. The time needed for classification by the first scheme is always unique irrespective of the voice sample. It is proportional to the number of feedforward layers in the network. The time-requirement of the second classification scheme, however, is not free from the voice features and is proportional to the number of 2D arrays traversed by the algorithm on the hierarchical structure. The third scheme is highly robust and mis-classification is as low as 0.2 per cent. The third scheme combines the composite benefits of a radial basis function neural net and backpropagation trained neural net | classification;hierarchical architecture;personnel;radial basis function neural net;self-organizing feature map;known voice samples;pre-training;artificial neural networks;speaker identification;2d arrays;feedforward layers;backpropagation algorithm |
|
train_871 | Priming the pipeline [women in computer science careers] | In 1997 The Backyard Project, a pilot program of the Garnett Foundation, was instituted to encourage high school girls to explore careers in the computer industry. At that time, the Garnett Foundation commissioned the Global Strategy Group to execute a survey of 652 college-bound high school students (grades 9 through 12), to help discover directions that The Backyard Project might take to try to move toward the mission of the pilot program. It conducted the study by telephone between March 25 and April 8, 1997 in the Silicon Valley, Boston, and Austin metropolitan areas. It conducted all interviews using a random digit dialing methodology, derived from a file of American households with high incidences of adolescent children. The top six answers from girls to the survey question "why are girls less likely to pursue computer science careers?" in order of perceived importance by the girls were: not enough role models; women have other interests; didn't know about the industry; limited opportunity; negative media; and too nerdy. These responses are discussed | college-bound high school students;computer industry careers;high school girls;the backyard project |
|
train_872 | Shortchanging the future of information technology: the untapped resource | Building on ideas from a virtual workshop and additional input from the scientific community, the CISE Directorate at the National Science Foundation established the Information Technology Workforce Program (ITWF) in March 2000 to support a broad set of scientific research studies focused on the under-representation of women and minorities in the information technology workforce. In this paper, we explore various approaches that the funded researchers are taking to address the problem of women in information technology. We begin with a brief history of the ITWF, and then focus on some of the research projects in terms of their goals, approaches, and expected outcomes | itwf;information technology workforce program;women under-representation;scientific research studies;untapped resources;cise directorate;information technology future;virtual workshop;history;national science foundation |
|
train_873 | Programmatic efforts encouraging women to enter the information technology | workforce For over a decade the National Science Foundation (NSF) has been supporting projects designed to improve opportunities for women in computing. From an initial emphasis on increasing the number of women in graduate school studying computer science and engineering, NSF's current emphasis has broadened to include research studies examining the underlying reasons why women are underrepresented in the information technology (IT) workforce. This paper describes the recent history of NSF's activities in this area and the subsequent emergence of a research portfolio addressing the underrepresentation issue | it workforce;graduate school;women;engineering;computing;history;national science foundation |
|
train_874 | The curious ways of professional cultures and the "two-body opportunity" | When two professionals are a couple, we sometimes refer to them as having a "two-body problem." However, when each partner of a couple exists in the same cultures, they also have an opportunity for deeply shared understanding and empathy, simply because each understands at a deep level the culture in which the other works. I explore this notion. A couple has what we call the "two-body problem" when both are professionals who are qualified for a kind of position that is relatively rare and who are very selective about the positions that they accept. For example, there are relatively scant numbers of jobs as a computer science professor-at any level. An individual considering an academic job may only be interested in research universities, or in teaching universities, restricting the choice of open positions substantially. The classic two-body "problem" arises when one partner wants to accept a new position that requires geographical relocation. Then, the other partner also needs to find a new position. Moreover, it can be very difficult to find a suitable position when they are naturally scarce | computer science;academics;professional cultures;two-body opportunity |
|
train_875 | Women of color in computing | It is well known that there is a need to increase the number of women in the area of computing, that is in computer science and computer engineering. If we consider women of color, that is women of under-represented ethnicities, we find the numbers are very dismal. The goal of this article is to bring to light the unique issues of women of color based upon the personal experience of one African-American woman who has been in the field of computing for over 20 years (including the years of higher education) | computer engineering;gender issues;women of color;higher education;computer science;society;ethnic minority |
|
train_876 | Perspectives on academic vs. industry environments for women in computer | science The authors were tenure track faculty members at the Colorado School of Mines and later moved into senior positions at software companies. Both are part of two-career couples as well, and both have two children. In this article, they discuss their impressions and share anecdotes regarding the differing experiences of women and families in these two environments | women;career;industry environment;faculty members;academic environments;computer science;software companies;children;gender gap |
|
train_877 | What do you say? Open letters to women considering a computer science major | In the last decade we have both monitored with great interest the ratio of female to male computer science majors at our respective institutions. With each entering class, we think: "Surely, now is the time when the numbers will become more balanced." Logic tells us that this must eventually happen, because the opportunities in computing are simply too attractive for an entire segment of our population to routinely pass up. But each year we are again disappointed in the number of women students, as they continue to be woefully under-represented among computer science majors. So, what do you say to a young woman who is considering a college choice and a choice of major in order to make computer science a more attractive option? We have organized some thoughts on that subject into open letters | women;gender issues;computer science majors;female;computer science education;male |
|
train_878 | Girls, boys, and computers | Today North American girls, boys, teachers, and parents frequently regard computer science and programming as something boys are better at. The author considers how many of the factors that contribute to the low participation of women in computing occur first, and perhaps most forcefully, in childhood. She presents four recommendations to address the situation | women;girls;gender issues;computer science;teachers;childhood;programming;boys |
|
train_879 | Well behaved women rarely make history! | The author considers women in the history of computer science. Prior to the ENIAC, women were extremely important to the computing business as "computers". Just as women had taken over the tasks as secretaries in the late 1800s with the advent of the typewriter, and in the early 1900s staffing telephone exchanges, so computing relied on women as the "workhorses" of the business | women;gender issues;business;eniac;computer science;history |
|
train_88 | Planning linear construction projects: automated method for the generation of | earthwork activities Earthworks planning for road construction projects is a complex operation and the planning rules used are usually intuitive and not well defined. An approach to automate the earthworks planning process is described and the basic techniques that are used are outlined. A computer-based system has been developed, initially to help planners use existing techniques more efficiently. With their input, the system has been extended to incorporate a knowledge base and a simulation of the earthworks processes. As well as creating activity sets in a much shorter time, the system has shown that for a real project, the model is able to generate activity sets that are comparable to those generated by a project planner | knowledge base;earthworks planning process;road construction projects;planning rules;earthwork activities;computer-based system;linear construction projects |
|
train_880 | Computing 2002: democracy, education, and the future | Computer scientists, computer engineers, information technologists, and their collective products have grown and changed in quantity, quality, and nature. In the first decade of this new century, it should become apparent to everyone that the computing and information fields, broadly defined, will have a profound impact on every element of every person's life. The author considers how women and girls of the world have been neither educated for computing nor served by computing. Globally, women's participation in computer science grew for a while, then dropped precipitously. Computing, science, engineering, and society will suffer if this decline continues, because women have different perspectives on technology, what it is important for, how it should be built, which projects should be funded, and so on. To create a positive future, to assure that women equally influence the future, computing education must change | women;girls;future;gender issues;democracy;society;computer science education |
|
train_881 | Is diversity in computing a moral matter? | We have presented an ethical argument that takes into consideration the subtleties of the issue surrounding under-representation in computing. We should emphasize that there is nothing subtle about overt, unfair discrimination. Where such injustice occurs, we condemn it. Our concern is that discrimination need not be explicit or overt. It need not be individual-to-individual. Rather, it can be subtly built into social practices and social institutions. Our analysis raises ethical questions about aspects of computing that drive women away, aspects that can be changed in ways that improve the profession and access to the profession. We hope that computing will move towards these improvements | women;unfair discrimination;ethical argument;social institutions;computing under-representation;social practices |
|
train_882 | On M/D/1 queue with deterministic server vacations | We study a single server vacation queue with Poisson arrivals, deterministic service of constant duration b (> 0) and deterministic vacations of constant duration d (> 0) and designate this model as M/D/D/1. After completion of each service, the server may take a vacation with probability p or may continue working in the system with probability 1 - p. We obtain time-dependent as well as steady state probability generation functions for the number in the system. For the steady state we obtain explicitly the mean number and the mean waiting time for the system and for the queue. All known results of the M/D/1 queue are derived as a special case. Finally, a numerical illustration is discussed | m/d/1 queue;mean waiting time;deterministic vacations;steady state probability generation functions;mean number;deterministic server vacations;poisson arrivals;m/d/d/1 model;time-dependent probability generation functions;deterministic service |
|
train_883 | On conflict-free executions of elementary nets | Deals with analysis of elementary Petri nets with respect to possibilities of avoiding conflicts during their executions. There are two main aims of the paper. The first is to find a method of checking if a net is conflict-avoidable (i.e., if it possesses a conflict-free fair run). The second is to find a method of rebuilding any net to a totally conflict-avoidable net (i.e., a net possessing a conflict-free fair run in every one process) with the same behaviour. The main results are the following: 1. The proof of decidability, for elementary nets, of the problem of existence of a conflict-avoidable fair process (and an algorithm producing all fair runs). 2. Construction, for an arbitrary given elementary net, of a totally conflict-avoidable net with the same behaviour. The net, completed this way, has the same behaviour as the original one. Moreover, it is totally conflict-avoidable, and its execution may be supervised (in order to ensure conflict-freeness) by the reduced case graph built by the algorithm of the former section | elementary petri nets;conflict-free executions;decidability;conflict-free fair run;reduced case graph;totally conflict-avoidable net |
|
train_884 | A hybrid-neural network and population learning algorithm approach to solving | reliability optimization problem Proposes a hybrid approach integrating a dedicated artificial neural network and population learning algorithm applied to maximising system reliability under cost and technical feasibility constraints. The paper includes a formulation of the system reliability optimisation (SRO) problem and a description of the dedicated neural network trained by applying the population learning algorithm. A solution to the example SRO problem is shown and results of the computational experiment are presented and discussed | cost constraints;reliability optimization problem;technical feasibility constraints;population learning algorithm;system reliability;dedicated artificial neural network;hybrid approach |
|
train_885 | Assignment of periods and priorities of messages and tasks in distributed | control systems Presents a task and message-based scheduling method to guarantee the given end-to-end constraints including precedence constraints, time constraints, and period and priority of task and message. The method is an integrated one considering both tasks executed in each node and messages transmitted via the network and is designed to apply to a general distributed control system that has multiple loops and a single loop has sensor nodes with multiple sensors, actuator nodes with multiple actuators, controller nodes with multiple tasks, and several types of constraints. The assigning method of the optimal period and priority of task and message is proposed, using the presented task and message-based scheduling method | end-to-end constraints;task-based scheduling method;time constraints;message-based scheduling method;precedence constraints;distributed control systems;periods assignment;priorities assignment |
|
train_886 | A fractional-flow model of serial manufacturing systems with rework and its | reachability and controllability properties A dynamic fractional-flow model of a serial manufacturing system incorporating rework is considered. Using some results on reachability and controllability of positive linear systems the ability of serial manufacturing systems with rework to "move in space", that is their reachability and controllability properties, are studied. These properties are important not only for optimising the performance of the manufacturing system, possibly off-line, but also to improve its functioning by using feedback control online | rework;controllability;serial manufacturing systems;performance optimisation;positive linear systems;reachability;feedback control;dynamic fractional-flow model |
|
train_887 | Towards strong stability of concurrent repetitive processes sharing resources | The paper presents a method for design of stability conditions of concurrent, repetitive processes sharing common resources. Steady-state behaviour of the system with m cyclic processes utilising a resource with the mutual exclusion is considered. Based on a recurrent equations framework necessary and sufficient conditions for the existence of maximal performance steady-state are presented. It was shown that if the conditions hold then the m-process system is marginally stable, i.e., a steady-state of the system depends on the perturbations. The problem of finding the relative positions of the processes leading to waiting-free (maximal efficiency) steady-states of the system is formulated as a constraint logic programming problem. An example illustrating the solving of the problem for a 3-process system using object-oriented, constraint logic programming language Oz is presented. A condition sufficient for strong stability of the m-process system is given. When the condition holds then for any initial phases of the processes a waiting-free steady-state will be reached | necessary and sufficient conditions;strong stability;maximal performance steady-state;concurrent repetitive processes;mutual exclusion;steady-state behaviour;cyclic processes;3-process system;waiting-free steady-states;constraint logic programming;oz language;recurrent equations framework;common resources |
|
train_888 | Storage functionals and Lyapunov functions for passive dynamical systems | For nonlinear time-invariant input-output dynamical systems the passivity conditions are obtained under some restrictions. The conditions imply storage functions satisfying a dissipation inequality. A class of storage functions allowing unique reconstruction of a passive dynamical system is defined. These results are illustrated by an example of a linear system with fading memory. An important, for practical application, class of the linear relaxation systems without direct input-output interaction is considered. A necessary condition for dynamical systems to be of the relaxation type is obtained for this class. The condition is connected with the existence of a unique quadratic Lyapunov function satisfying the complete monotonicity condition. This unique Lyapunov function corresponds to a "standard" thermodynamic potential in a compact family of potentials in the nonequilibrium thermodynamics. The results obtained can be useful in automatic control, mechanics of viscoelastic materials, and various applications in physics and the system theory | nonequilibrium thermodynamics;viscoelastic materials;necessary condition;passive dynamical systems;dissipation inequality;automatic control;fading memory;mechanics;storage functionals;thermodynamic potential;linear system;passivity conditions;nonlinear time-invariant input-output dynamical systems;complete monotonicity condition;unique quadratic lyapunov function |
|
train_889 | Synthesis of the control systems via reflection onto auxiliary surfaces | An approach to robust control systems synthesis, both linear and nonlinear, and nonstationary is offered. The control is carried out, providing the given phase constraints varied in acceptable limits, in view of constraints on its value and incompleteness of the information about functioning disturbances. The approach is based on the introduction of auxiliary integral surfaces, on which the initial moving is projected. As a result the reduced equivalent moving is formed, being described by the scalar equation which in many important cases can be integrated directly. On the basis of the equation obtained solving a synthesis task is carried out and can be reduced to algebraic or integral inequalities. The final relations defined for linear equivalent moving are presented | auxiliary surfaces;linear equivalent moving;robust control systems;control systems synthesis;integral inequalities;linear systems;nonlinear systems;algebraic inequalities |
|
train_89 | A framework for rapid local area modeling for construction automation | Rapid 3D positioning and modeling in construction can be used to more effectively plan, visualize, and communicate operations before execution. It can also help to optimize equipment operations, significantly improve safety, and enhance a remote operator's spatial perception of the workspace. A new framework for rapid local area sensing and 3D modeling for better planning and control of construction equipment operation is described and demonstrated. By combining human-assisted graphical workspace modeling with pre-stored Computer-Aided Design (CAD) models and simple sensors (such as single-axis laser rangefinders and remote video cameras), modeling time can be significantly reduced while potentially increasing modeling accuracy | pre-stored computer-aided design models;equipment operations;rapid local area modeling;single-axis laser rangefinders;remote video cameras;3d modeling;construction automation;spatial perception;rapid local area sensing;human-assisted graphical workspace modeling;rapid 3d positioning |
|
train_890 | Multiple criteria decision making without optimization | We present a development intended to make interactive decision making schemes accessible for a wider spectrum of decision makers. To this aim we propose to eliminate the need to solve optimization problems at successive iterations of interactive decision processes. We show that the need for optimization can be eliminated by the ability of establishing sufficiently tight bounds on criteria values for efficient decisions prior to explicit identification of such decisions. We present a technique, fully operational and numerically simple, for establishing such bounds. Bounds are dynamic, i.e., they become stronger with the growing number of decisions explicitly identified. They are also parametric with respect to weighting coefficients. We also point out how this technique can enhance the existing interactive decision making methods | multiple criteria decision making;criteria values bounds;efficient decisions;decision makers;interactive decision making schemes |
|
train_891 | Establishing the discipline of physics-based CMP modeling | For the past decade, a physically based comprehensive process model for chemical mechanical polishing has eluded the semiconductor industry. However, a long-term collaborative effort has now resulted in a workable version of that approach. The highly fundamental model is based on advanced finite element analysis and is beginning to show promise in CMP process development | cmp;chemical mechanical polishing;finite element analysis;cmp process development;physically based process model |
|
train_892 | Dementing disorders: volumetric measurement of cerebrospinal fluid to | distinguish normal from pathologic finding - feasibility study We have demonstrated that automated methods to describe the severity and distribution of cerebral atrophy are capable of providing diagnostic information in the classification of neurodegenerative diseases | dementing disorders;neurodegenerative diseases classification;cerebral atrophy distribution;diagnostic information;cerebral atrophy severity;normal-pathologic findings distinguishing;automated methods;healthy subjects;medical diagnostic imaging;cerebrospinal fluid volumetric measurement;magnetic resonance imaging technique |
|
train_893 | Use of natural language processing to translate clinical information from a | database of 889,921 chest radiographic reports The aim was to evaluate translation of chest radiographic reports using natural language processing and to compare the findings with those in the literature. A natural language processor coded 10 years of narrative chest radiographic reports from an urban academic medical center. Coding for 150 reports was compared with manual coding. Frequencies and cooccurrences of 24 clinical conditions (diseases, abnormalities, and clinical states) were estimated. The ratio of right to left lung mass, association of pleural effusion with other conditions, and frequency of bullet and stab wounds were compared with independent observations. The sensitivity and specificity of the system's pneumothorax coding were compared with those of manual financial coding. Internal and external validation in this study confirmed the accuracy of natural language processing for translating chest radiographic narrative reports into a large database of information | stab wounds;clinical condition cooccurrence;pleural effusion;pneumothorax coding;bullet wounds;chest radiographic report database;urban academic medical center;natural language processing;clinical information translation;right to left lung mass ratio;clinical condition frequency |
|
train_894 | Improved detection of lung nodules by using a temporal subtraction technique | The authors evaluated the effect of a temporal subtraction technique for digital chest radiography with regard to the accuracy of detection of lung nodules. Twenty solitary lung nodules smaller than 30 mm in diameter, including 10 lung cancers and 10 benign nodules, were used. The nodules were grouped subjectively according to their subtlety. For nonnodular cases, 20 nodules without perceptible interval changes were selected. All chest radiographs were obtained by using a computed radiographic system, and temporal subtraction images were produced by using a program developed at the University of Chicago. The effect of the temporal subtraction image was evaluated by using an observer performance study, with use of receiver operating characteristic analysis. Observer performance with temporal subtraction images was substantially improved (A/sub z/ = 0.980 and 0.958), as compared with that without temporal subtraction images (A/sub z/ = 0.920 and 0.825) for the certified radiologists and radiology residents, respectively. The temporal subtraction technique clearly improved diagnostic accuracy for detecting lung nodules, especially subtle cases. In conclusion, the temporal subtraction technique is useful for improving detection accuracy for peripheral lung nodules on digital chest radiographs | temporal subtraction technique;subtle cases;radiology residents;improved lung nodules detection;digital chest radiography;30 mm;observer performance;certified radiologists;computed radiographic system;peripheral lung nodules;medical diagnostic imaging;university of chicago;perceptible interval changes |
|
train_895 | Algorithms for improving the quality of R-trees | A novel approach to operation with a structure for spatial indexing of extended objects shaped as R-trees is considered. It consists of the initial global construction of an efficient R-tree structure and the subsequent operation with it using conventional dynamic algorithms. A global strategy for constructing an R-tree reduced to a problem of dividing a set of rectangular objects into K parts with minimum mutual overlay is suggested. Base, box, and "Divide and Conquer" algorithms are suggested. The results of experimental modeling of the execution of various algorithms are discussed | rectangular objects;computational geometry;graphical search;extended objects;minimum mutual overlay;r-trees;spatial indexing;dynamic algorithms |
|
train_896 | Calculation of the probability of survival of an insurance company with | allowance for the rate of return for a Poisson stream of premiums The probability of survival of an insurance company with the working capital is calculated for a Poisson stream of premiums | poisson premium stream;survival probability;insurance company;probability density function;return rate |
|
train_897 | Optimization of advertising expenses in the functioning of an insurance company | With the use of Pontryagin's maximum principle, a problem of optimal time distribution of advertising expenses in the functioning of an insurance company is solved | insurance company;optimal time distribution;optimization;pontryagin maximum principle;advertising expenses;differential equations |
|
train_898 | Influence of advertising expenses on the characteristics of functioning of an | insurance company The basic characteristics of the functioning of an insurance company, including the average capital, ruin and survival probabilities, and the conditional time before ruin, are examined with allowance for advertising expenses | survival probabilities;conditional time;ruin probabilities;insurance company functioning characteristics;average capital;advertising expenses influence |
|
train_899 | Mathematical model of functioning of an insurance company with allowance for | advertising expenses A mathematical model of the functioning of an insurance company with allowance for advertising expenses is suggested. The basic characteristics of the capital of the company and the advertising efficiency are examined in the case in which the advertising expenses are proportional to the capital | advertising expenses allowance;capital;mathematical model;insurance company functioning |
|
train_9 | Achieving competitive capabilities in e-services | What implications does the Internet have for service operations strategy? How can business performance of e-service companies be improved in today's knowledge-based economy? These research questions are the subject of the paper. We propose a model that links the e-service company's knowledge-based competencies with their competitive capabilities. Drawing from the current literature, our analysis suggests that services that strategically build a portfolio of knowledge-based competencies, namely human capital, structural capital, and absorptive capacity have more operations-based options, than their counterparts who are less apt to invest. We assume that the combinative capabilities of service quality, delivery, flexibility, and cost are determined by the investment in intellectual capital. Arguably, with the advent of the Internet, different operating models (e.g., bricks-and-mortar, clicks-and-mortar, or pure dot-com) have different strategic imperatives in terms of knowledge-based competencies. Thus, the new e-operations paradigm can be viewed as a configuration of knowledge-based competencies and capabilities | business performance;delivery;structural capital;bricks-and-mortar;clicks-and-mortar;knowledge-based competencies;investment;intellectual capital;flexibility;combinative capabilities;absorptive capacity;knowledge-based economy;service operations strategy;service quality;internet;human capital;strategic imperatives;cost;operations-based options;e-services;dot-com;competitive capabilities |
|
train_90 | LAN-based building maintenance and surveillance robot | The building and construction industry is the major industry of Hong Kong as in many developed countries around the world. After the commissioning of a high-rise building or a large estate, substantial manpower, both inside the management centre under a standby manner, as well as surveillance for security purposes around the whole building, is required for daily operation to ensure a quality environment for the occupants. If the surveillance job can be done by robots, the efficiency can be highly enhanced, resulting in a great saving of manpower and the improved safety of the management staff as a by-product. Furthermore, if the robot can retrieve commands from the building management system via a local area network (LAN), further savings in manpower can be achieved in terms of first-line fault attendance by human management staff. This paper describes the development of a robot prototype here in Hong Kong, which can handle some daily routine maintenance works and surveillance responsibilities. The hardware structure of the robot and its on-board devices are described. Real-time images captured by a camera on the robot with pan/tilt/zoom functions can be transmitted back to the central management office via a local area network. The interface between the robot and the building automation system (BAS) of the building is discussed. This is the first key achievement of this project with a strong implication on reducing the number of human staff to manage a modem building. Teleoperation of the robot via the Internet or intranet is also possible, which is the second achievement of this project. Finally, the robot can identify its physical position inside the building by a landmark recognition method based on standard CAD drawings, which is the third achievement of this project. The main goal of this paper is not the description of some groundbreaking technology in robotic development. It is mainly intended to convince building designers and managers to incorporate robotic systems when they are managing modem buildings to save manpower and improve efficiency | pan/tilt/zoom functions;hardware structure;high-rise building;local area network;lan-based building maintenance and surveillance robot;building management system;first-line fault attendance;landmark recognition method;teleoperation;security purposes |
|
train_900 | Mathematical models of functioning of an insurance company with allowance for | the rate of return Models of the functioning of insurance companies are suggested, when the free capital increases from interest at a certain rate. The basic characteristics of the capital of a company are studied in the stationary regime | free capital increase;return rate allowance;stationary regime;interest;insurance company functioning;mathematical models |
|
train_901 | Estimation of the Poisson stream intensity in a multilinear queue with an | exponential job queue decay Times the busy queue periods start are found for a multilinear queue with an exponential job queue decay and uniform resource allocation to individual servers. The stream intensity and the average job are estimated from observations of the times the queue busy periods start | individual servers;stream intensity;uniform resource allocation;poisson stream intensity;multilinear queue;exponential job queue decay;busy queue periods start |
|
train_902 | TCP explicit congestion notification over ATM-UBR: a simulation study | The enhancement of transmission control protocol's (TCP's) congestion control mechanisms using explicit congestion notification (ECN) over asynchronous transfer mode (ATM) networks is overviewed. TCP's congestion control is enhanced so that congestion is indicated by not only packet losses as is currently the case but an agent implemented at the ATM network's edge as well. The novel idea uses EFCI (explicit forward congestion indication) bits (available in every ATM cell header) to generalize the ECN response to the UBR (unspecified bit rate) service, notify congestion, and adjust the credit-based window size of the TCR. The authors' simulation experiments show that TCP ECN achieves significantly lower cell loss, packet retransmissions, and buffer utilization, and exhibits better throughput than (non-ECN) TCP Reno | tcp explicit congestion notification;packet losses;cell loss;atm networks;agent;simulation;throughput;packet retransmissions;congestion control mechanisms;unspecified bit rate service;credit-based window size;buffer utilization;explicit forward congestion indication bits;atm-ubr |
|
train_903 | Modeling and simulation of an ABR flow control algorithm using a virtual | source/virtual destination switch The available bit rate (ABR) service class of asynchronous transfer mode networks uses a feedback control mechanism to adapt to varying link capacities. The virtual source/virtual destination (VS/VD) technique offers the possibility of segmenting the otherwise end-to-end ABR control loop into separate loops. The improved feedback delay and control of ABR traffic inside closed segments provide a better performance for ABR connections. This article presents the use of classical linear control theory to model and develop an ABR VS/VD flow control algorithm. Discrete event simulations are used to analyze the behavior of the algorithm with respect to transient behavior and correctness of the control model. Linear control theory offers the means to derive correct choices of parameters and to assess performance issues, such as stability of the system, during the design phase. The performance goals are high link utilization, fair bandwidth distribution, and robust operation in various environments, which are verified by discrete event simulations. The major contribution of this work is the use of analytic methods (linear control theory) to model and design an ABR flow control algorithm tailored for the special layout of a VS/VD switch, and the use of simulation techniques to verify the result | closed segments;control model;link capacities;transient behavior;virtual source/virtual destination switch;feedback delay;fair bandwidth distribution;atm networks;available bit rate service class;performance issues;high link utilization;classical linear control theory;feedback control mechanism;robust operation;traffic control;modeling;stability;discrete event simulations;control loop;abr flow control algorithm |
|
train_904 | Modeling and simulation of adaptive available bit rate voice over asynchronous | transfer mode networks This article presents a modeling and simulation methodology to analyze the performance of voice quality when sent over the available bit rate service in asynchronous transfer mode networks. Sources can modify the rate at which they send traffic to the network based on the feedback carried in the resource management cells. This is achieved by changing the encoding level. As the contention increases to network resources-bandwidth in this case-sources start reducing the rate at which they generate and send traffic. The efficiency of the scheme under different scheduling/drop policies and other operating conditions and environments is evaluated using simulation modeling. Furthermore, sensitivity analysis is applied to different parameters, such as queue size and averaging interval length, to investigate their impact on the performance metrics. Results show that limiting the load to 41% of the link capacity results in an acceptable quality | feedback;queue size;performance analysis;averaging interval length;voice quality;traffic;bandwidth contention;scheduling/drop policies;atm networks;performance metrics;simulation;resource management cells;encoding level;adaptive available bit rate voice;link capacity;modeling |
|
train_905 | Ultra-high speed positioning control of a gravure engraving unit using a | discrete-time two-degree-of-freedom H/sub infinity / control The piezoelectric actuator has high-speed response in comparison with the electro-magnetic actuator. However, it is not easy to achieve both high-speed and high-precision response by feedforward control only because the piezoelectric element has nonlinear properties such as the hysteresis effect. Thus, feedback control is required to achieve good performance. We develop a control design method to achieve both high-speed and high-precision response for piezoelectric actuators using the discrete-time H/sub infinity / control method and the two-degree-of-freedom control scheme. The effectiveness of our proposed method has been shown by simulation and experimental results. The most important contribution of our study is that our method can be directly applied to commercial machines | discrete-time two-degree-of-freedom h/sub infinity / control;high-precision response;digital control system;hysteresis;control design method;ultra-high speed positioning control;piezoelectric actuator;feedback control;feedforward;gravure engraving unit;nonlinear properties |
|
train_906 | High-performance servo systems based on multirate sampling control | In this paper, novel multirate two-degree-of-freedom controllers are proposed for digital control systems, in which the sampling period of plant output is restricted to be relatively longer than the control period of plant input. The proposed feedforward controller assures perfect tracking at M inter-sampling points. On the other hand, the proposed feedback controller assures perfect disturbance rejection at M inter-sample points in the steady state. Illustrative examples of position control for hard disk drive are presented, and advantages of these approaches are demonstrated | feedback;hard disk drive;disturbance rejection;position control;tracking;digital control systems;feedforward;multirate sampling control;servo system |
|
train_907 | Development of an integrated and open-architecture precision motion control | system In this paper, the development of an integrated and open-architecture precision motion control system is presented. The control system is generally applicable, but it is developed with a particular focus on direct drive servo systems based on linear motors. The overall control system is comprehensive, comprising of various selected control and instrumentation components, integrated within a configuration of hardware architecture centred around a dSPACE DS1004 DSP processor board. These components include a precision composite controller (comprising of feedforward and feedback control), a disturbance observer, an adaptive notch filter, and a geometrical error compensator. The hardware architecture, software development platform, user interface, and all constituent control components are described | feedback;geometrical error compensation;adaptive notch filter;dspace ds1004 processor;open-architecture;precision;direct drive servo systems;composite controller;motion control;feedforward;linear motors |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.