用户名: 密码: 验证码:
上下文感知计算若干关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算技术的发展需要与之相适应的计算模式。随着同时具有计算和组网能力设备的大量出现以及这些设备的小型、微型和嵌入化,传统以计算机为中心的计算模式因无法克服“一人多机”所带来的困扰而受到严重挑战。目前,由Mark Weiser提出的以“透明”和“随处可用”为主要特征的普适计算设想因契合了计算技术发展的需求正受到广泛关注。在普适计算中“透明”指的并非完全是物理上的不可见性,更主要的是指用户与计算机之间的交互是否为用户所觉察。正如人们能利用环境上下文避免显示交互一样,计算机也可利用所能感知到的上下文采用蕴涵式的方式进行交互。这种蕴涵的交互方式正是普适计算实现透明交互的重要途径,并也由此发展成为一个独立的研究领域——上下文感知计算。显然它的研究对普适计算设想的实现至关重要。
     本文针对普适环境下上下文感知技术的应用需求,首先分析了上下文感知计算的研究现状,提出了上下文和上下文感知计算的定义以及狭义和广义上下文感知计算的划分原则,通过对现有上下文感知计算系统的分析和总结,建立了上下文感知计算的概念模型,并对上下文感知计算的建模、系统框架和应用等问题进行了重点讨论。从而为进一步的研究提供基础和指导。
     由于现有的上下文感知计算建模方法存在复杂度高、代价大、难于仿真等问题,本文提出了一种规范化的可支持快速原型构建的建模方法。该建模方法以Ptolemy II为平台,在上下文规范化建模的基础上,结合层次化建模和有限状态机等方法,通过系统层次化、模型细化和状态精化等步骤对系统实施建模。实例研究表明,该建模方法能方便快速地构建上下文感知计算系统,并可为部分和完整地研究这类系统提供一个系统级的仿真环境。
     上下文推理是上下文感知计算的关键问题之一。本文利用感知计算中上下文的层次化特点提出了一种用于上下文推理的快速贝叶斯网络自学习算法,通过对贝叶斯网络结构预先进行合理假设,从而缩小了目标搜索空间,降低了算法的时间复杂度,提高了算法的可用性。理论和实验分析均表明,该算法能在较少量数据支持下在较快的时间内查找到与理想结构吻合度较高的贝叶斯结构,是一种面向感知计算的实用贝叶斯网络自学习算法。
     系统框架是上下文感知计算能否被快速开发和广泛部署的关键指标。本文以多Agent技术为基础,提出了一种新的上下文感知计算系统框架。该框架以环境Agent为中心,从而解构了感知器与应用之间的紧密耦合关系,利用感知和演化Agent进行上下文的感知和推理,借助管理Agent实现安全与隐私策略,与人和其它应用的交互则通过用户和应用Agent实现。
     上下文感知除了可用于一般应用外,也可用于路由或系统优化等。针对MANET网络的应用需求,本文提出了一种移动感知的分区MANET路由协议,该协议可通过感知各移动节点的链路状态上下文来自适应地隔离移动异常的节点从而避免频繁的无效路由计算和请求,降低路由开销。
     通过对上下文感知计算建模、演化、系统框架和应用等问题的研究,本文建立了上下文感知计算的全局视图,提出了若干适用于感知计算的关键技术和算法,这可为感知计算更广泛的研究和部署提供基础和有效指导。
The development of computation technology makes the computation paradigm adaptable to it. With the occurrence of equipments with computation and network ability, and the trend to become smaller and embedded, the traditional computation paradigm considering one computer as the core of a system no longer meet the needs, because it cannot overcome the difficulty coming from“one person, many computer”. Pervasive computation paradigm proposed by Mark Weiser which takes“transparent”and“everywhere availability”as the main characteristic has received widespread attention in recent years since it meets the demand of computation technology.“Transparent”in pervasive computing does not only refer to the physical invisibility, but also refers to the interaction invisibility between the human and the computer. Like the human can avoid obvious interaction using contexts, a computer also may use sensed contexts for interaction via some implicit methods. Obviously, this implicit interaction way is a very important way to realize“transparent”in pervasive computing and now it become a hot research topic– context-aware computing.
     Aimming at the demand of context-aware applications under pervasive environment, this dissertation first gives a literature review on the state-of-the-art of context-aware computing; then we proposes the principle of division of context-aware computing in its narrow sense and broad sense; after that we make a discussion on the context-aware computing modeling, context-aware system infrastructure and its applications. After reviewing the existing context-aware systems, we propose a conceptual model of context-aware computing which can set up a solid base for future research in this field. Conceptually, the existing context-aware models have the drawbacks of high complexity, high cost and high modeling difficulty. To solve these problems, this dissertation proposes a standard modeling methodology which supports fast prototype development. Under the platform of Ptolemy II, based on standardized modeling of contexts, Combined the hierarchization modeling method and finite state machine(FSM) method, the methodology propose a standardized process which include steps like system hierarchization, sub-model refinement and state refinement to support context-aware systems modeling. The simulation results indicate that the modeling methodology can facilitate and speed up the development of context-aware systems, and can provide a system-level simulation environment for studying context-aware system partially or completely.
     One of the key issues in context-aware computing is the context inference. Obviously, complete and precise inference is impractical. The bayesian network is an appropriate inference tool in context-aware system. However, searching the optimal bayesian network in many cases is a NP-complete problem. On the other hand, a sub-optimal Bayesian Network can be obtained if the toplogy of the network can be predefined with some prior knowledge on the applications. This dissertation proposes a fast algorithm with low computation complexity. Theoretical and experimental results all show that the algorithm can find a bayesian network similar with the optimal one with affordable search time. Therefore, we say that the algorithm is a practical algorithm for context-aware computing.
     System infrastructure is a key factor in fast development and wide deployment of context-aware system. Based on multi-agent technology, this dissertation proposes a novel system infrastructure for context-aware system. The infrastructure takes environment agent as the center, thus decoupling the relations of sensors with applications. It uses the sensors and evolution agents to do context sense and evolution. The management agents are used to realize security and privacy strategy, while the user and application agent are used to interactive with user and other applications. In addtion, the context-aware can be used in routing algorithm and system optimization. This dissertation proposed a mobility-aware zoned MANET routing protocol, which can sense the link state context between mobile nodes and then isolate unusual node adaptively which can avoid invalid routing computing and requests and then reduce routing costs.
     Our contribution lies in the following aspects: 1) through the study on context-aware computing modeling, context evolution, system infrastructure and context-aware applications, this dissertation establishes a global view of context-aware computing; 2) it proposes many key technologies and algorithms for context-aware computing. All of these can provide effective direction and guidelines on researching and deployment of context-aware system.
引文
[1] Mark Weiser. The computer for the 21st century. Scientific American, 265(3):66–75, Feb. 1991.
    [2] 徐光佑,史元春,谢伟凯. 普适计算,计算机学报,26(9):1042-1050,2003.
    [3] Anind K Dey. Understanding and using context. Personal and Ubiquitous Computing Journal,5:4–7, 2001.
    [4] Bill Schilit, Norman Adams, and Roy Want. Context-aware computing applications. In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pages 85–90, Dec. 1994.
    [5] Paul Castro and Richard Muntz. Managing context data for smart spaces. IEEE Personal Communications, 7(5):44–46, 2000.
    [6] Albrecht Schmidt, Kofi Asante Aidoo, Antti Takaluoma, et al. Advanced interaction in context. In Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, pages 89–101, 1999.
    [7] Amir Padovitz, Arkady Zaslavsky, Seng Wai Loke, et al. Maintaining continuous dependability in sensor-based context-aware pervasive computing systems. In Proceedings of the 38th Hawaii International Conf. on System Sciences, Jan. 2005.
    [8] Kaori Fujinami, Tetsuo Yamabe, and Tatsuo Nakajima. ”take me with you!”: A case study of context-aware application integrating cyber and physical spaces. In 2004 ACM Symposium on Applied Computing, pages 1607–1614, Nicosia, Cyprus, Mar 2004.
    [9] Jason I. Hong. The context fabric: An infrastructure for context-aware computing. In Conference on Human Factors in Computing Systems, 2002, pages 554–555, Minneapolis, Minnesota, USA, April 2002.
    [10] Karen Henricksen and Jadwiga Indulska. Modelling and using imperfect context information. In Proceedings of the 2nd IEEE Annual Conf. on Pervasive Computing and Communications Workshops, pages 33–37, March 2004.
    [11] Manuele Kirsch-Pinheiro, Marl′ene Villanova-Oliver, J′erome Gensel, et al. Context-aware filtering for collaborative web system: Adapting the awareness information to the user’s context. In 2005 ACM Symposium on Applied Computing, pages 1668–1673, Santa Fe, New Mexico, Mar. 2005.
    [12] Mohamed Khedr and Ahmed Karmouch. Negotiating context information incontext-aware systems. IEEE Intelligent Systems, 19(6):21–29, Nov.–Dec. 2004.
    [13] Anind K. Dey and Jennifer Mankoff. Designing mediation for context-aware applications. ACM Transaction on Computer-Human Interaction, 12(1):58–80, Mar. 2005.
    [14] Manuel Roman, Christopher Hess, Renato Cerqueira, et al. Gaia: A middleware infrastructure to enable active spaces. IEEE Pervasive Computing, pages 74–83, Oct.–Dec. 2002.
    [15] Manuel Roman, Christopher Hess, Renato Cerqueira, et al. Gaia: A Middleware Infrastructure to Enable Active Spaces. University of Illinois at Urbana-Champaign, 2002.
    [16] Sharat Khungar and Jukka Riekki. A context based storage system for mobile computing applications. Mobile Computing and Communications Review, 9(1):64–68, Jan. 2005.
    [17] Guanling Chen and David Kotz. A survey of context-aware mobile computing research. Technical report, Dept. of Computer Science, Dartmouth College, Nov. 2000.
    [18] Lee Hoi Leong, Shinsuke Kobayashi, Noboru Koshizuka, et al. Casis: A context-aware speech interface system. In Proceeding of IUI’05, pages 231–238, San Diego, California, USA, Jan. 2005.
    [19] Alois Ferscha, Clemens Holzmann, and Stefan Oppl. Context awareness for group interaction support. In Proceeding of MobiWac’04, pages 88–97, Philadelphia, PA, USA, Oct. 2004.
    [20] Patrick Hertzog and Marc Torrens. Context-aware mobile assistants for optimal interaction: a prototype for supporting the business traveler. In ACM IUI’04, pages 256–258, 2004.
    [21] Harish Kammanahalli, Srividya Gopalan, and Sridhar V. Context aware retrieval in web-based collaborations. In Proceedings of the 2nd IEEE Annual Conf. on Pervasive Computing and Communications Workshops, pages 8–12, March 2004.
    [22] Carey Williamson and Qian Wu. A case for context-aware tcp/ip. 29(4):11–23, Mar. 2002.
    [23] Carey Williamson and Qian Wu. Context-aware tcp/ip. 30(1):262–263, Jun. 2002.
    [24] A. K. Dey, G. D. Abowd, and D. Salber. A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Computer Interaction, 16:97–166, 2001.
    [25] W. K. Edwards. Coordination Infrastructure in Collaborative Systems. PhD thesis, College of Computing, Georgia Inst. of Technology, Atlanta, 1995.
    [26] P. Maes. Agents that reduce work and information overload. Communication ACM, 37(7):30–40, July 1994.
    [27] Kay R?mer, Friedemann Mattern, et al. Infrastructure for virtual counterparts of real world objects. Technical report, Department of Computer Science, ETH Zurich, 2001.
    [28] Stephen Voida, Elizabet D. Mynatt, Blair MacIntyre, and Gregory M. Corso. Integrating virtual and physical context to support knowledge workers. IEEE Pervasive Computing, 1(3):73–79, July–Sept. 2002.
    [29] Quan Z. Sheng and Boualem Benatallah. Contextuml: A uml-based modeling language for model driven development of context-aware web services. In Proceedings of the International Conf. on Mobile Business, pages 206–212, July 2005.
    [30] Jan Van den Bergh and Karin Coninx. Towards modeling context-sensitive interactive applications: the context-sensitive user interface profile(cup). In Proceedings of the 2005 ACM symposium on Software visualization, pages 87–94, May 2005.
    [31] Michael Derntl and Karin A. Hummel. Modeling context-aware e-learning scenarios. In Proceedings of the 3rd Int’l Conf. on Pervasive Computing and Communications Workshops, pages 337–342, Mar. 2005.
    [32] Shih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon, et al. Semantic web technologies for context-aware museum tour guide applications. In Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pages 709–714, Mar. 2005.
    [33] Fabien L. Gandon and Norman M. Sadeh. Semantic web technologies to reconcile privacy and context awareness. Journal of Web Semantics, 1(3):241–260, April 2004.
    [34] Panu Korpipaa, Jonna Hakkila, Juha Kela, et al. Utilising context ontology in mobile device application personalisation. In Proceeding of MUM, pages 133–140, Oct. 2004.
    [35] Tao Gu, Hung Keng Pung, and Da Qing Zhang. A middleware for building context-aware mobile services. In Proceedings of IEEE 59th Vehicular Technology Conference, 2004., volume 5, pages 2656–2660, May 2004.
    [36] Sven Buchholz, Thomas Hamann, and Gerald H¨ubsch. Comprehensive structured context profiles(cscp): Design and experiences. In Proceedings of the 2nd IEEE Annual Conf. on Pervasive Computing and Communications Workshops, pages 43–47, March 2004.
    [37] M. Khedr and A. Karmouch. Acai: agent-based context-aware infrastructure forspontaneous applications. Network and Computer Applications, 28(1):19–44, Jan. 2005.
    [38] Jens Wohltorf, Richard Cissee, Andreas Rieger, et al. Berlintainment - an agent-based serviceware framework for context-aware services. IEEE Communications Magazine, 43(6):102–109, June 2005.
    [39] Shi Yuan Chun , Xie Wei Kai , Xu Guang You et al. The smart classroom: Merging technologies for seamless tele-education. IEEE Pervasive Computing , 2 (2) : 47~55, 2003
    [40] Paolo Bellavista, Antonio Corradi, Rebecca Montanari, et al. Context-aware middleware for resource management in the wireless internet. IEEE transactions on software engineering, 29(12):1086–1099, December 2003.
    [41] William G. Griswold, Robert Boyer, Steven W. Brown, et al. A component architecture for an extensible, highly integrated context-aware computing infrastructure. In Proceedings of the 25th International Conference on Software Engineering, 2003, pages 363–372, May 2003.
    [42] William G. Griswold, Patricia Shanahan, Steven W. Brown, et al. Activecampus: Experiments in community-oriented ubiquitous computing. IEEE Computer Society, 37(10):73–81, Oct. 2004.
    [43] Licia Capra, Wolfgang Emmerich, and Cecilia Mascolo. Carisma: Context-aware reflective middleware system for mobile applications. IEEE Transaction on Software Engineering, 29(10):929–944, October 2003.
    [44] Oleg Davidyuk, Jukka Riekki, Ville-Mikko Rautio, et al. Context-aware middleware for mobile multimedia application. In Proceedings of MUM 2004, pages 213–220, College Park, Maryland, USA, October 2004.
    [45] 王悦,岳玮宁,王衡,董士海. 手持移动计算中的多通道交互. 软件学报,16(1):29-36,2005.
    [46] 普建涛,王悦,陈文广,董士海. 多通道用户界面原型系统 FreeVoiceCAD. 计算机研究与发展,40(9):1382-1388,2003.
    [47] Tao Gu, Hung Keng Pung, and Da Qing Zhang. A service-oriented middleware for building contextaware services. Network and Computer Applications, 28(1):1–18, Jan. 2005.
    [48] Nam-Shik Park, Kang-Woo Lee, and Hyun Kim. A middleware for supporting context-aware services in mobile and ubiquitous environment. pages 694–697, July 2005.
    [49] Anind K. Dey, Raffay Hamid, Chris Bechmann, et al. a cappella: Programming bydemonstration of context-aware applications. In Proceedings of CHI 2004, pages 33–40, April 2004.
    [50] Panu Korpipaa, Esko-Juhani Malm, llkka Salminen, et al. Context management for end user development of context-aware applications. In Proceedings of MDM 2005, pages 304–308, 2005.
    [51] Timothy Y. Sohn. icap: An informal tool for interactive prototyping of context-aware applications. In Proceedings of CHI 2003, pages 974–975, April 2003.
    [52] Yang Li, Jason I. Hong, and James A. Landay. Topiary: A tool for prototyping location-enhanced applications. In Proceedings of UIST’04, volume 6, pages 217–226, October 2004.
    [53] RoyWant, Bill N. Schilit, Norman I. Adams, et al. An overview of the parctab ubiquitous computing experiment. IEEE Personal Communications, 2(6):28–43, Dec. 1995.
    [54] R. Want, A. Hopper, V. Falcao, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems, 10(1):91–102, Jan. 1992.
    [55] S. Long et al. Rapid prototyping of mobile context-aware applications: The cyberguide case study. In 2nd ACM International Conference on Mobile Computing and Networking, pages 97–107, 1996.
    [56] N. Davies, K. Mitchell, K. Cheverest, and G. Blair. Developing a context sensitive tourist guide. In First Workshop on Human Computer Interaction With Mobile Devices, pages 64–68, May 1998.
    [57] Abhaya Asthana, Mark Cravatts, and Paul Krzyzanowski. An indoor wireless system for personalized shopping assistance. In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pages 69–74, Dec. 1994.
    [58] Anind K. Dey. Enabling the use of context in interactive applications. In Proceedings of the 2000 Conference on Human Factors in Computing System, CHI 2000, pages 79–80, April 2000.
    [59] Markus C. Huebscher and Julie A. McCann. Adaptive middleware for context-aware applications in smart-homes. pages 111–116, Toronto, Canada, 2004.
    [60] Lynne Rosenthal and Vincent Stanford. Nist smart space: Pervasive computing initiative. In Proceedings of IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 6–11, 2000.
    [61] G. E. Krasner and S. T. Pope. A description of the model-view-controller user interface paradiam in the smalltalk-80 system. 1998.
    [62] Renato Cerqueira, Christopher K. Hess, et al. Gaia: A development infrastructurefor active spaces. In Workshop on Applicaton Models and Programming Tools for Ubiquitous Computing, 2001.
    [63] Debashis Saha and Amitava Mukherjee. Pervasive computing: A paradigm for the 21st century. IEEE Computer Society, 36(3):25–31, March 2003.
    [64] Joao Pedro Sousa and David Garlan. Aura: An architectural framework for user mobility in ubiquitous computing environments. In Proceedings of the 3rd Working IEEE/IFIP Conference on Software Architecture, pages 29–43, 2002.
    [65] Deborah Estrin, David Culler, Kris Pister, et al. Connecting the physical world with pervasive networks. IEEE Pervasive Computing, 1(1):59–69, Jan.–March 2002.
    [66] Stephen S. Yau, Fariaz Karim, Yu Wang, et al. Reconfigurable context-sensitive middleware for pervasive computing. IEEE Pervasive Computing, 1(3):33–40, July–Sept. 2002.
    [67] Tim Kindberg and Armando Fox. System software for ubiquitous computing. IEEE Pervasive Computing, 1(1):70–81, Jan.–March 2002.
    [68] Marc Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. Technical report, Institute of Information Systems,IFW,Swiss Federal Institute of Technology,ETH Zurich, 2000.
    [69] Lynne Rosenthal and Vincent Stanford. Nist smart space: Pervasive computing initiative. In Proceedings of IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 6–11, 2000.
    [70] Vince Stanford. Pervasive computing goes the last hundred feet with rfid systems. IEEE Pervasive Computing, pages 9–14, 2003.
    [71] Roy Want. Enabling ubiquitous sensing with rfid. IEEE Invisible Computing, pages 84–86, April 2004.
    [72] 危辉,何新贵. 表象式直接知识表示. 计算机学报,24(8):891-896,2001.
    [73] Stefano Ceri and Florian Daniel and Maristella Matera, “Extending WebML for Modeling Multi-Channel Context-Aware Web Applications”, Proceedings of the Fourth International Conference on Web Information Systems Engineering Workshops(WISEW’03), IEEE, 2004
    [74] Quan Z. Sheng and Boualem Benatallah, “ContextUML: A UML-Based Modeling Language for Model-Driven Development of Context-Aware Web Services”, Proceedings of the International Conference on Mobile Business(ICMB’05), IEEE, 2005
    [75] Yu Wang, “An FSM Model for Situation-Aware Mobile Application Software Systems”, Proceedings of the ACM Southeast Conference(ACMSE’04), ACM,Huntsville, Alabama, USA, 2004
    [76] Oh Byung Kwon, “Modeling and Generating Context-Aware Agent-Based Applications with Amended Colored Petri Nets”, Expert Systems with Applications, vol 27, 609~621, Elsevier, 2004
    [77] Lu Yan and Kaisa Sere, “A Formalism for Context-Aware Mobile Computing”, Proceedings of the ISPDC/HeteroPar’04, IEEE, 2004
    [78] Christopher Brooks and Edward A. Lee and Xiaojun Liu et al. “Ptolemy II: Heterogeneous Concurrent Modeling and Design in Java - Introduction to Ptolemy II”, Department of Electrical Engineering and Computer Sciences, University of California at Berkeley. 2005
    [79] Christopher Brooks and Edward A. Lee and Xiaojun Liu et al. “Ptolemy II: Heterogeneous Concurrent Modeling and Design in Java – Ptolemy II Software Architecture”, Department of Electrical Engineering and Computer Sciences, University of California at Berkeley. 2005
    [80] Christopher Brooks and Edward A. Lee and Xiaojun Liu et al. “Ptolemy II: Heterogeneous Concurrent Modeling and Design in Java – Ptolemy II Domains”, Department of Electrical Engineering and Computer Sciences, University of California at Berkeley. 2005
    [81] Judea Pearl. Probabilistic Reasoning in Intelligent Systems: network of plausible inference[M]. Morgan Kaufmann, Publishers,Inc.,San Mateo,CA 1988.
    [82] Bauer, E., D. Koller, and Y. Singer, Update Rules for Parameter Estimation in Bayesian Networks, in Geiger, D., and P. Shenoy (Eds.): Uncertainty in Artificial Intelligence; Proceedings of the Thirteenth Conference, Morgan Kaufmann, San Mateo, California, 1997.
    [83] Beinlich, I.A., H.J. Suermondt, R.M. Chavez, and G.F. Cooper, The ALARM Monitoring System: A Case Study with Two Probabilistic Inference Techniques for Belief Networks. Proceedings of the Second European Conference on Artificial Intelligence in Medicine, London, England, 1989.
    [84] Bloemeke, M., and M. Valtora, A Hybrid Algorithm to Compute Marginal and Joint Beliefs in Bayesian Networks and Its Complexity. in Cooper, G.F., and S. Moral (Eds.): Uncertainty in Artificial Intelligence; Proceedings of the Fourteenth Conference, Morgan Kaufmann, San Mateo, California, 1998.
    [85] Chickering, D., and D. Heckerman, Efficient Approximation for the Marginal Likelihood of Incomplete Data Given a Bayesian Network. in Horvitz, E., and F. Jensen (Eds.): Uncertainty in Artificial Intelligence; Proceedings of the TwelfthConference, Morgan Kaufmann, San Mateo, California, 1996.
    [86] Chickering, D., and C. Meek, Finding Optimal Bayesian Networks. in Darwiche, A., and N. Friedman (Eds.): Uncertainty in Artificial Intelligence; Proceedings of the Eighteenth Conference, Morgan Kaufmann, San Mateo, California, 2002.
    [87] Cooper, G.F., “A Bayesian Method for Causal Modeling and Discovery Under Selection, in Boutilier, C. and M. Goldszmidt (Eds.): Uncertainty in Artificial Intelligence; Proceedings of the Sixteenth Conference, Morgan Kaufmann, San Mateo, California, 2000.
    [88] Friedman, N., The Bayesian Structural EM Algorithm. in Cooper, G.F., and S. Moral (Eds.): Uncertainty in Artificial Intelligence; Proceedings of the Fourteenth Conference, Morgan Kaufmann, San Mateo, California, 1998.
    [89] Friedman, N., K. Murphy, and S. Russell, Learning the Structure of Dynamic Probabilistic Networks. in Cooper, G.F., and S. Moral (Eds.): Uncertainty in Artificial Intelligence; Proceedings of the Fourteenth Conference, Morgan Kaufmann, San Mateo, California, 1998.
    [90] Y. Moreau and P. Antal and G. Fannes and B. De Moor. Probabilistic Graphical Models for Computational Biomedicine. Methods in Information in Medicine, 41(2), 2003.
    [91] Friedman, N., M. Ninio, I. Pe’er, and T. Pupko, A Structural EM Algorithm for Phylogenetic Inference. Journal of Computational Biology, 2002.
    [92] Dagum, P., and M. Luby, Approximate Probabilistic Inference in Bayesian Belief Networks in NP-hard. Artificial Intelligence, Vol. 60, No.1.
    [93] Henrion, M., Propagating Uncertainty in Bayesian Networks by Logic Sampling. in Lemmer, J.F. and L.N. Kanal (Eds.): Uncertainty in Artificial Intelligence 2, North-Holland, Amsterdam, 1988.
    [94] Cooper, G.F., and E. Herskovits, “A Bayesian Method for the Induction of Probabilistic Networks from Data,” Machine Learning, Vol. 9, 1992.
    [95] Chickering, D., Learning Bayesian Networks is NP-Complete, In Fisher, D., and H. Lenz (Eds.): Learning From Data. Springer-Verlag, New York, 1996.
    [96] Richard E. Neapolitan, Learning Bayesian Networks. Upper Saddle River, NJ: Prentice Hall, 2003: 674
    [97] Wooldridge, M., N. R. Jennings. Agents Theories, Architectures and languages: a Survey. In Wooldridge and Jennings, Intelligent Agents, Berlin: Springer-Verlag, 1995.
    [98] Jianzhong Chen, Kun Yang, Dayou Liu, Agents: Present Status and Trends, China Journal of Software, 11(3), 2000.
    [99] Herbert A. Simon, Administrative Behavior, Fourth Edition, The Free Press.1997.
    [100] Mehran Abolhasan, Tadeusz Wysocki, and Eryk Dukiewicz. A review of routing protocols for mobile ad hoc networks[J]. Elsevier Ad Hoc Networks, (2):1.22, 2004
    [101] C. R. Dow, P. J. Lin, S. C. Chen, et al. A study of recent research trends and experimental guidelines in mobile ad-hoc networks[A]. In Proceedings of the 19th InternationalConference on Advanced Information networking and Applications(AINA'05). IEEE, 2005.
    [102] Charles E. Perkins and Elzabeth M. Royer. Ad hoc on-demand distance vector routing[A]. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Application, pages 90.100, New Orleans, LA, February 1999.
    [103] Ian D. Chakeres and Elizabeth M. Royer. Aodv routing protocol implementation design[A]. In Proceedings of the International Workshop on Wireless Ad Hoc Network-ing(WWAN), Tokyo, Japan, March 2004.
    [104] David B. Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks[J]. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.
    [105] Guangyu Pei, Mario Gerla, and Tsu-Wei Chen. Fisheye state routing: A routing scheme for ad hoc wireless networks[J]. In ICC(1), pages 77.74, 2000.
    [106] Amis A. D., Prakash R., Huynh D., et al. Max-min d-cluster formation in wireless ad hoc networks[A]. In Proceedings of IEEE INFOCOM2000, pages 32.41, 2000.
    [107] McDonald A. B. and Znati T. F. Design and performance of a distributed dynamic clustering algorithm for ad hoc networks[A]. In Proceedings of the 34th Annual Simulation Symposium 2001, pages 27.35, 2001.
    [108] Z. J. Haas, M. R. Pearlman, et al. The zone routing protocol(zrp) for ad hoc networks[EB/OL]. draft-ietf-manet-zone-zrp-04.txt, 2002.
    [109] Y-B Ko and N. H. Vaidya. Location-aided routing(lar) in mobile ad hoc networks[A]. In Proceedings of 4th ACM/IEEE International Conference on Mobile Computing and Networking, Oct 1998.
    [110] Yunjung Yi and Mario Gerla. Efficient flooding in ad hoc networks[A]. In Proceedings of 2003 IEEE International Conference on Communications, pages 1059.1063,Anchorage Alaska, USA, 2003.
    [111] S. Basagni, I. Chlamtac, and V. R. Syrotiuk. A distance routing effect algorithm for mobility(dream)[A]. In Proceedings of ACM/IEEE Mobicom 98, pages76.84, 1998.
    [112] Wenhwa Liao, Jangping Sheu, and Yuchee Tseng. A fully location-aware routing protocol for mobile ad hoc networks[J]. Telecommunication Systems, pages 37.60, 2001.
    [113] W. Su and M. Gerla. IPv6 flow handoff in ad hoc wireless networks using mobility prediction[A]. In IEEE Global Communication Conference, pages 271.275, Dec 1999.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700