• Title/Summary/Keyword: Event Execution Manager

Search Result 8, Processing Time 0.025 seconds

Autonomous Agents and Event Programming (자율개체와 이벤트 프로그래밍)

  • Cho, Eun-Sang;Ko, Hyeongseok
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.2
    • /
    • pp.57-68
    • /
    • 1998
  • 가상 현실의 궁극적인 목표중의 하나는 참여자가 가치 있는 경험을 얻을 수 있도록 하는 것이다. 경험의 내용은 순차적인 이벤트들로서 구성될 수 있으며 본 논문은 이런 이벤트들을 저작(event authoring)하기 위한 알고리듬을 개발하는 것을 목적으로 한다. Event authoring을 위해서 우리는 우선, 가상환경에 포함되는 개체들의 구조를 제안한다. 그리고, event-program을 기술하여 실험을 행할 수 있게 하는 수단인 event authoring language와 event-program 실행 시에 핵심이 되는 event execution manager를 구현한다. 마지막으로, 몇 가지 실험을 통하여 본 논문에서 제시된 접근방법이 유효함을 증명한다.

  • PDF

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

Autonomous Agents and Event Programming (자율개체와 이벤트 프로그래밍)

  • 조은상
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1998.10a
    • /
    • pp.124-127
    • /
    • 1998
  • One of the eventual goals of VR research is to provide valuable experiences to the participants. In this work, we view that the content of experience is composed of a sequence of events, and develop algorithms authoring those events. Event authoring can be realized by controlling agents in VE in two different modes: (1) the autonomous mode, in which the agent exhibit autonomous behaviors based on the current world status and its own personality, and (2) the event mode, in which the behaviors generated form the autonomous mode is further controlled to meet the needs of the experiment. We define the event authoring language, so that the authors can design experiments by writing event-programs. Then the architecture of event execution manager is described, which is the heart of event-program execution. prove the effectiveness of our approach by showing results of several experiments.

  • PDF

A Methodology for Variable Structure System Specification: Formalism, Framework, and Its Application to ATM-Based Network System

  • Lee, Kyou-H.;Choi, Kil-Y.;Kim, Jae-G.;Vansteenkiste, G.C.
    • ETRI Journal
    • /
    • v.18 no.4
    • /
    • pp.245-264
    • /
    • 1997
  • This paper presents a formalism-based methodology and its implemented environment which constitutes a sound framework for real-time systems development. The software and/or hardware systems developed in such a formal manner are well structured and maintainable. We first propose a set-theoretic VSSS (Variable Structure System Specification) formalism. This formalism is the core of the presented methodology which supports a means of formal specification for real-time systems. We then develop the environment, including VSSS language definition, a translator for the language, and supporting libraries for real-time execution. Finally, a demonstration of the methodology in development of a real-time event manager, a subsystem of an ATM-based communication system, shows the correctness and efficiency of the methodology.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

A study an actual proof analysis for design management strategy of minor enterprise (중소기업의 디자인 경영 전략을 위한 실증 분석연구)

  • 홍성수;박재연
    • Science of Emotion and Sensibility
    • /
    • v.7 no.1
    • /
    • pp.65-81
    • /
    • 2004
  • With the arrival of the 21th century, the management environments such as the knowledge system, information system, and technology system surrounding small and medium enterprises are being rapidly changed. These rapidly changing the environment of enterprises like the above can be thought rather profitable for the elastic and resiling medium enterprises than large enterprises. Additionally, these environments are recognized as the management circumstances which provide with the change by which medium enterprises equipped with the trustworthy creativity in the 21th century are able to become the main player of the industrial development. The position and role of medium enterprises in the national economical system are very important. The execution of the local autonomy system and the policy to activate the local economy will generally enlarge the power of medium enterprises which are based on the concerned local society more ant more. But, by the standpoint of designer, it is pointed out that there is the problem that the effective application means or the availability of the industrial design was not sufficiently recognized or understood by the manager in enterprises. Notwithstanding the above problem, a lot of domestic small and medium enterprises became to apply the industrial design as the means for improving the competitiveness of their own products in the relatively short time powered by the governmental policy, and moreover both of the concerned partners(the manager and industrial designer) had the opportunity to newly recognize the industrial design and evaluate the availability or problem of the industrial design in the actual aspect. This event means very important change. With the understanding on the above situation, the purpose of this study is to recognize whether the design is strategically applied in the management level of domestic small and medium enterprises, whether the strategical establishment of the design management is performed without any problem, whether the field designer and CEO are well recognizing the design management and what their recognition level is in order to seek the new solution for plenty of problems. Therefore, the actual proof analysis was performed for the field designer and management CEO of small and medium enterprises with the questionnaire survey and direct interview method to understand the actuality of small and medium enterprises.

  • PDF