{"title":"Automatically Discovering Hierarchies in Multi-agent Reinforcement Learning","authors":"Xiaobei Cheng, Jing Shen, Haibo Liu, Guochang Gu, Guoyin Zhang","doi":"10.1109/ICICSE.2008.32","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.32","url":null,"abstract":"It is difficult to automatically discovering hierarchies in multi-agent reinforcement learning. We consider an immune clustering approach for automatically discovering hierarchies in option learning framework. The leading agent generates an undirected edge-weighted topological graph of the environment state transitions based on the environment information explored by all agents. An immune clustering algorithm is then used to partition the state space. A second immune response algorithm is used to update the clusters when a new state being encountered later. Local strategies for reaching the different parts of the space are learned distributedly and added to the model in a form of options.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survivable Network System: An Immune Approach","authors":"Huiqiang Wang, Guo-sheng Zhao, Jian Wang","doi":"10.1109/ICICSE.2008.86","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.86","url":null,"abstract":"Survivability has emerged as a new phase for the development of network security technique, but an accepted analysis and construction method is still lacking for it. This paper presents the similarity between biological immunity system and survivable network system, and also provides a kind of new and feasible idea for designing and implementing survivable network system.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Index System of Information Systems Survivability: Formal Definitions and Reasoning","authors":"Huiqiang Wang, Jian Wang, Guo-sheng Zhao","doi":"10.1109/ICICSE.2008.82","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.82","url":null,"abstract":"Establishment of quantitative and operable index system is the basis of quantitative evaluation for information systems survivability. This paper provides a complete overview on performance index for survivability from the aspects of index content, attack phases and evaluating standard, proposes a framework for performance index which can present the survivability, and formalizes the index system. On the basis of which, abstracts the mathematical model of index system, analyses and validates that the proposed index system has the features of standardization and completeness. This research is significant to quantitative evaluation for information systems survivability.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimal Trellises for Two Classes of Linear Codes","authors":"Qinghui Lan, Haibin Kan","doi":"10.1109/ICICSE.2008.48","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.48","url":null,"abstract":"Trellis representations of linear block codes not only illustrate code structure, but also often lead to efficient trellis-based decoding algorithms. In this paper, we try to find the minimal trellises for two important classes of linear codes, i.e., cyclic codes and quasi-cyclic codes.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Decision Trees Updating Algorithm in Grid AC Cache Mechanism","authors":"Baoyi Wang","doi":"10.1109/ICICSE.2008.107","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.107","url":null,"abstract":"In grid environment, PMI (privilege management infrastructure) runs as grid services. Whenever a user accesses a resource, PMI calls his/her AC (Attribute certificate) from LDAP server (a grid service) one or several times. In order to improve the efficiency of accessing AC, an AC cache mechanism is proposed. After discussing the effects brought by the hit ratio of the cache to the system performance, based on probability theory, we defined the AC as often-use-AC and not-often-use-AC, and with the improved decision tree update algorithm, we exclude the not-often-use-AC from the cache to guarantee the hit ratio. The theory and experiment all show that the method is effective and the performance of the PMI is improved.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of GIS in Vehicle Monitoring System","authors":"G. Yuan, Zhi Zhang, W. Shangguan","doi":"10.1109/ICICSE.2008.98","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.98","url":null,"abstract":"With the development of satellite positioning technology and Global Positioning System (GPS), vehicle monitoring and navigation system has begun to appear. And it is a great technology revolution in vehicle monitoring field. In this task, using general packet radio service (GPRS) wireless communication technology, combined with the GPS global positioning technology and Geographic Information System (GIS) geographic information application technology, we raise component GIS secondary develop pattern based on MapX, and provide a realization of vehicle monitoring system. In this paper, application of MapX component in vehicle monitoring system is discussed. On the basis of analysis of composition and work principle of vehicle monitoring system, using Visual C++ and integrating MapX component, we realize functions of vehicles positioning, tracks replay, navigation map, objects query, and the design of digital map module of vehicle monitoring system.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130032462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xincheng Wang, Fengming Liu, Rongrong Yang, Fu Xie
{"title":"Social Computing-Based Trust Establishment in E-Commerce","authors":"Xincheng Wang, Fengming Liu, Rongrong Yang, Fu Xie","doi":"10.1109/ICICSE.2008.90","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.90","url":null,"abstract":"Trust plays an important role in successful online businesses. In this paper, we consider the important case of interactions in peer communities, and then propose a trust established model based on social computing which aims at avoiding interaction with undesirable participants. Our specific approach based on game to trust computing leads to a decentralized society in which agents help each other weed out undesirable players.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid-Based Hierarchical Spatial Clustering Algorithm in Presence of Obstacle and Constraints","authors":"Yue Yang, Jianpei Zhang, Jing Yang","doi":"10.1109/ICICSE.2008.18","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.18","url":null,"abstract":"Clustering of spatial data in the presence of obstacles and constraints has the very strong practical value, and becomes to an important research issue. Most of the existing spatial clustering algorithm in presence of obstacles and constraints can't cluster with irregular obstacles and the veracity of clustering result is affected. The algorithm complexity is affected by complexity of computing obstacle-distance. Grid-based hierarchical spatial clustering algorithm which is abbreviated as GSHCOC is proposed. The advantage of grid-based clustering algorithm is inherited. The obstacle-grid is defined and the algorithm processes arbitrary shape obstacle and finds arbitrary shape clusters efficiently. Meanwhile, the hierarchical strategy is used to reduce the complexity of clustering in presence of obstacles and constraints and the operation efficiency of algorithm is improved. The results of experiment show that GSHCOC algorithm can process spatial clustering in presence of obstacles and constraints and has higher clustering quality and better performance.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125437632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method for Simulating Protein Folding Process -- Snake Algorithm","authors":"J. Zhang, Maozu Guo, Song-Bo Li, Wei Peng","doi":"10.1109/ICICSE.2008.65","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.65","url":null,"abstract":"It is a difficult problem of studying the protein folding process in the protein research field. In this paper, a new simulation algorithm-snake simulation algorithm is put forward to solve the problem. In order to prove the key function in snake simulation algorithm is correct and feasible, theory of molecule oscillation and molecule kinetics are used. In addition, bring forward a model that describes the process of protein folding, concludes that all the protein structure can be constructed by two type functions. Compared with other five protein folding algorithms, the snake simulation algorithm has a great advantage in the energy and similar of protein structure.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123310970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Evaluation Model for Software Process Modeling Methods","authors":"Rubo Zhang, Bingzi Zhang","doi":"10.1109/ICICSE.2008.59","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.59","url":null,"abstract":"In order to help developers choose suitable modeling method according to specific modeling environment and requirement for achieving the best modeling effect, it is important to make reasonable assessment for software process modeling methods. An evaluation system for software process modeling methods is presented, and an evaluation model for evaluating modeling methods is established using method that combines uncertain analytic hierarchy process (AHP) with fuzzy integrated evaluation technology. Further, by an example it proves that using the model can evaluate modeling methods soundly, so it has practical value in software project development.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}