By Topic

Autonomous Decentralized Systems, 1995. Proceedings. ISADS 95., Second International Symposium on

Date 25-27 April 1995

Filter Results

Displaying Results 1 - 25 of 57
  • Proceedings ISADS 95. Second International Symposium on Autonomous Decentralized Systems

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • A model for negotiation among agents based on the transaction analysis theory

    Publication Year: 1995, Page(s):427 - 433
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB)

    In the research work presented, interactions among the various types of agents in autonomous decentralized systems are based on the theory of transaction analysis (TA) of psychology. Human beings are considered one particular type of autonomous agent. Hence, the agent's structure as well as interactions among them are defined and performed much the same as human behavior and attitudes. Cooperation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autoconfigurable distributed control systems

    Publication Year: 1995, Page(s):162 - 168
    Cited by:  Papers (3)  |  Patents (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of personal communications in distributed office environments

    Publication Year: 1995, Page(s):316 - 322
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    This paper addresses the impacts of advanced personal communications on the design of distributed office communications environments. Fast changing user demands require the integration of state-of-the-art concepts for personal communications, multimedia services, enhanced user control capabilities, and ubiquitous computing into the design of highly efficient office communication environments. We p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network services interface for telepresence applications

    Publication Year: 1995, Page(s):323 - 329
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    Telepresence is the application of computing and telecommunications to support a sense of social proximity among distant collaborators. These applications use a variety of multimedia communications and presentation techniques to achieve these goals. Paramount in these applications is the need to provide distributed control, and to some extent distributed information exchange. A network services in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On efficiently tolerating general failures in autonomous decentralized multiserver systems

    Publication Year: 1995, Page(s):288 - 296
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    We consider a multiserver system consisting of a set of servers that provide some service to a set of clients by accessing some shared objects. The goal is to provide reliable service in spite of client or server failures such that the overhead during normal operating periods is low. We consider a relatively general fault model where a faulty processor can write spurious data for a period of time ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The future of information networks and distributed applications

    Publication Year: 1995, Page(s):144 - 152
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    Information and telecommunications service are a critical and important component of the global economy; expertise in this domain gives a competitive advantage in the global marketplace. The guiding vision for information networks is a system which enables users to access all the information they need, when they need it, and where they need it. For this vision to become reality and revolutionize t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability assessment for decentralized systems

    Publication Year: 1995, Page(s):281 - 286
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Conventional dependability measures, such as reliability or availability, assume that the equipment characterized by the measure is either operational or has failed. This dichotomy does not hold for decentralized or distributed systems because these can operate in modes in which partial or degraded service is furnished. Whether a specific degraded mode should be counted as “operational&rdquo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A truant failure detection algorithm for multi-policy distributed systems

    Publication Year: 1995, Page(s):297 - 303
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    In recent autonomous decentralized systems, every node might not execute the same algorithm because it might have its own local policy and follow that policy rather than the common principle. We model these systems as a multi-policy distributed system. We introduce a new type of failure, a truant failure, on multi-policy distributed systems, which is considered to be the simplest local policy. A t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The new system architecture for next-generation Shinkansen based on the friendly autonomous decentralized system concept

    Publication Year: 1995, Page(s):86 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    The Tokaido and Sanyo Shinkansen (bullet train) has been maintaining remarkable levels of punctuality and safety. Furthermore, as the speed and density of its traffic have been increasing, the Shinkansen must be able to promptly restore scheduled services when they are interrupted. The paper proposes a system architecture based on the FADS concept, for a flexible Shinkansen system that will be inh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Widely-distributed train-traffic computer control system and its step-by-step construction

    Publication Year: 1995, Page(s):93 - 102
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    In a large scale mission critical real time control system, such as the Tokyo metropolitan area train traffic system, it is very difficult to construct the entire system at once. Moreover economic considerations makes year by year investment inevitable for developing the system. The new Tokyo metropolitan area train traffic computer control system, supplying service to 19 train lines, 300 stations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attributed name evaluation

    Publication Year: 1995, Page(s):192 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    A new and original attributed name evaluation method is proposed. This method allows an attributed name to be presented in a non-hierarchy fashion and to be evaluated using a hierarchical approach. The structure of naming contexts which bind attributed names onto objects is presented. The naming contexts are represented with a context-graph. To be able to meet the requirements generated from the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semi-autonomous decentralized system for controlling street traffic signals

    Publication Year: 1995, Page(s):377 - 383
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    Our work is based on distributed and knowledge-based methodology for real-time control of street and highway ramp signals. After a running prototype system that proved the feasibility of the approach, we have now completed the first part of a complex, two-phase learning program of the traffic control regime. It produces optimum local (intersection) control of signals in steady-state traffic scenar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative object model using concept of seed for distributed processing systems

    Publication Year: 1995, Page(s):330 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    A new cooperative model for design and implementation of distributed systems is proposed. The model uses a concept of seeds of software objects. An object at a site of a distributed system can make its seed and send it to another site for making approaches to another object. The seed is germinated, becoming a child object. The child object executes necessary jobs and returns to home site if necess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach to asynchronous, decentralized decision-making in military command and control

    Publication Year: 1995, Page(s):25 - 31
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    This paper proposes a novel asynchronous, decentralized decision-making algorithm for military command and control. Unlike centralized command and control, in the proposed approach, all entities-infantry, tanks, and aircrafts, of the system are granted significant autonomy, subject to strict guidelines and directives, and provided with the necessary computing power, intelligence gathering faciliti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The pinwheel asynchronous atomic broadcast protocols

    Publication Year: 1995, Page(s):215 - 221
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    We discuss two asynchronous atomic broadcast protocols that provide fast delivery and stability times, use a small number of messages to accomplish a broadcast, distribute evenly the processing load, use efficient flow control techniques, and provide gracefully degraded performance in the presence of communication failures. In a prototype implementation on top of UDP and Ethernet, for a group of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelizing a level 3 BLAS library for LAN-connected workstations

    Publication Year: 1995, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Parallel BLAS libraries have recently shown promise as a means of taking advantage of parallel computing in solving scientific problems. However, little work has been done on providing such a parallel library in LAN-connected workstations. Our motivation for this research lies in the strong belief that since LAN-connected workstations are highly cost-effective, it is important to study the issues ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic transition from rapid prototyping to target code for distributed systems

    Publication Year: 1995, Page(s):104 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    High level operational languages support the specification and validation of complex reactive systems through the automatic generation of rapid prototypes since the early stages of the development lifecycle. However, when it comes to the implementation stage, these prototypes must be translated into target code to accomplish performance requirements without losing validation results. A transformat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hi-Cell system architecture for manufacturing systems

    Publication Year: 1995, Page(s):154 - 161
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    In factory automation systems, conventional hierarchal systems are no longer able to meet changing demands of customers today. Flexible systems, which are realized by making flat and autonomous judgment of workers in each section, to meet these demands rapidly are required. The paper proposes the expanded Hi-Cell system architecture which coordinates the whole system under the autonomous judgment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient and reliable group multicast protocol

    Publication Year: 1995, Page(s):127 - 133
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    Maintaining a consistent state is crucial for cooperative work in autonomous and decentralized systems (ADS). This is achieved through reliable communication protocols in a group of autonomous components. Many existing protocols are quite expensive and not very suitable for the ADS. The paper presents a logical token ring based group multicast protocol for the service of decentralized action manag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Properties of membership services

    Publication Year: 1995, Page(s):200 - 207
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    A membership service is used in a distributed system to maintain information about which sites are functioning and which have failed at any given time. Such services have proven to be fundamental for constructing distributed applications, with many example services and algorithms defined in the literature. Despite these efforts, however, little has been done on examining the abstract properties im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Cooperating Autonomous Decentralized System Architecture

    Publication Year: 1995, Page(s):40 - 47
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Research can rarely be performed on open platform based large scale distributed systems which always consist of heterogeneous sub-systems and heterogeneous hardware and software components. It is not also pursued to realize the integration of these sub-systems, highly reliable system operations and high productivity of application software development. Our solution is a Cooperating Autonomous Dece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The synchronizing of loosely coupled distributed real time system

    Publication Year: 1995, Page(s):384 - 390
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    In this paper the control architecture and the characteristics of the synchronization of an industrial application are presented. The control procedure is implemented with a loosely coupled distributed real time system, where parallel processing is possible. There are five nodes in the network, one master actuator, three slave actuators and a machine controller. All nodes are implemented using Mot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic subgoal generation of autonomous agents moving in a lattice world

    Publication Year: 1995, Page(s):434 - 441
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The paper approaches self organization of autonomous agents moving in a lattice world to achieve a shared final goal from the viewpoint of self regeneration and forced regeneration of subgoals. The model is referred to as The Tower of Babel proposed by T. Ishida (1991), which includes block subgoal and intersection subgoal. First, the paper proposes fundamental schemes to make a decision on block ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed management of network links supporting multimedia computing

    Publication Year: 1995, Page(s):242 - 248
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The paper analyses distributed algorithms used to control network links carrying random data traffic generated by multimedia computing based on local information. Distributed computing, multimedia mail, and interactive shopping are just a few examples of applications where the current approaches for traffic control (as foreseen by ITU-TS) are not suitable. Traffic descriptors (other than maybe pea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.