基于可穿戴计算的企业现场作业辅助系统及关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
可穿戴计算机的思想早在上世纪60年代就已出现,而形态化的可穿戴计算机则问世于80年代,其突破了传统桌面计算的束缚,为人们勾画了一种全新的,追求“以人为本,人机合一”目标的计算方式。
     进入90年代中期,在以美国国防高级研究计划局(DefenseAdvanced ResearchProjects Agency,DARPA)为首的一批机构带动下,可穿戴计算技术得到了军方、工业界、大学等多方面研究力量的关注和重视。国际上主要的发达国家都有相关的著名大学和研究机构成立了专门的研究中心或实验室,专注于可穿戴计算技术的研究,其在工业、军事等重要领域的研究成果不断见诸报道,国内也有多个大学、科研院所逐步进入了该研究领域。
     近年来,随着电路材料、计算机制作工艺、结构设计等技术的飞速发展,可穿戴计算机在工业、军事领域的应用逐步走向实用化阶段,在可穿戴计算软件研究领域中则面临了较多的困难和挑战,主要反映在传统桌面计算模式下设计、开发的软件无法满足可穿戴计算应用需求,而移动计算、普适计算模式一方面和可穿戴计算模式存在特征差异,另一方面自身的软件支撑技术很多方面也还处于探索阶段,不能很好的为可穿戴计算软件研究提供支持。
     鉴于上述分析,本文针对可穿戴计算技术在工业领域的应用,特别是针对企业工程技术人员作业任务辅助方面的应用,提出构建基于可穿戴计算的企业现场作业辅助系统(Enterprise On-siteTask Assistant System,EOTAS),并围绕其开展可穿戴计算软件支撑关键技术研究。主要研究内容和创新之处可概况如下:
     1.知晓车间实验原型的构建与上下文信息服务研究
     企业移动作业的工程技术人员面临企业现场环境的复杂性和多变性,以及目标设备的技术复杂性等实际问题,其作业辅助需求同样存在复杂性和多变性等特征,给EOTAS构建带来了较大的困难和挑战。本文从企业现场信息空间基础结构入手,提出了一种新的概念——“知晓车间”,构建实验原型,归纳了企业现场作业辅助领域中的典型上下文类型,研究基于知晓车间的上下文信息服务,力图为实现上下文驱动的EOTAS构建模式提供高效的信息服务支持。重点研究了适合知晓车间应用需求的上下文知识表示和演化方法。
     2.EOTAS结构描述和自主构建方法研究
     知晓车间上下文驱动的EOTAS构建模式带来了EOTAS在结构上的特殊性,使得传统的软件系统结构描述方法不能很好的为EOTAS结构描述提供支持。本文针对典型的现场作业辅助应用需求开展原型软件系统研究,归纳出EOTAS典型的结构特征,研究EOTAS结构形式化描述方法,提出了一种新的扩展分层有色Petri网形式,进而以其为基础,提出了一种结合模型驱动架构、开放式服务平台规范和Petri网标识语言等的EOTAS自主构建方法。
     3.EOTAS动态调度方法研究
     为了避免EOTAS频繁的应用功能重构对系统实时性能和计算资源开销等的影响,需要在一定程度上扩展所构建的EOTAS功能集合,从而带来了现场辅助应用中的EOTAS动态调度需求。本文开展了EOTAS动态调度方法的相关研究,首先针对可穿戴计算所具备的自然人机交互形式基础,提出了一种基于多通道人机自然交互的可穿戴人机协同概念形式,并围绕其应用,提出了一种基于扩展模糊有色Petri网的EOTAS动态调度方法,从而能有效的应对动态调度过程面临的来自企业现场的不确定性和非结构化因素等的影响。
     4.EOTAS应用实例研究
     针对典型的企业现场设备测试、诊断和维修任务,构建EOTAS应用系统。总结了围绕EOTAS应用实例构建开展的上下文获取方法、上下文知识本体具体实现方法、EOTAS自主构建中的MEHCPN软件工具开发等工作。
     5.EOTAS性能支撑关键技术研究
     针对EOTAS知晓车间应用中的性能保障需求,包括实时性需求、可靠性评估需求、安全性和隐私保护需求等,研究面向知晓车间应用的上下文预测问题,提出了相关的领域知识表示和基于知识推理的上下文预测方法;结合可信计算相关研究成果,构建了适合EOTAS结构特征需求的可信性模型,给出了相关的可靠度计算方法等。
The idea of wearable computer had appeared early in the 1960s, and the real emergence of wearable computer was available in the 1980s. It broke through the bondage from the tranditional desktop computing model, and depicted a brand new computing pattern for the goal of "people-oriented and human-computer combined".
     In the mid-1990s, with the strong support from the military institutions headed by United States Defense Advanced Research Projects Agency (DARPA), the research of wearable computing technology is progressing quickly drivend by the strength of military, industry and academe. Many famous and research institution of developed country set up special reseach center or laboratory for wearable computing research. The research production continues to be seen in these fields. Some domestic universities and research institues gradually moved into these research fields.
     In recent years, the application of wearable computer in the industrial and military fields enters into a practical stage followed with the rapid development of circuit materials, manufacturing arts of computer, and structural design. Many difficulties and chanllenges came forth in research of wearable computing software. The reason mainly include two sides: Firstly, the feature differences exist between the wearable computing and mobile computing, pervasive computing; Secondly, the support software technology research of mobile computing and pervasice computing is still in exploration stage.
     In view of the above analysis, according to the application of wearable computing in the industry field, the Enterprise On-site Task Assistant System (EOTAS) is presented in this paper, especially to the application of assistant to the personnel in manufacture fields. The work about some key software supporting technologies is discussed. The main contents include five parts as follows:
     1. Construction of aware workshop experiment prototype and research of context information service.
     Due to complexity and diversity character of enterprise task field, and the technical complexity of target equipment, the complexity of personnel's requirement, the information assistant requirement is also complex and diverse; bring great difficulties and challenges to the construction of EOTAS. In this paper, a new "Aware Workshop (AW)" concept is presented and defined, and an experiment prototype of AW is constructed. Based on AW, the context information service is researched, in order to provide hierarchical, open, complete and high efficient information service including knowledge acquirement, representation, storage, evolution and utilization. The context knowledge representation and evolution methods are mainly discussed.
     2. Research of EOTAS structure description and autonomous construction methods.
     The autonomous construction pattern of EOTAS drivened by AW context brings some special particularity of EOTAS structure, which weakens the support provided by trandition software system structure description method. In this paper, prototype software is developed to outline the EOTAS typical structure characters. The research work of EOTAS structure description method is discussed. Then, a new modular extended hierarchy colored Petri net (MEHCPN) is presented. Base on MEHCPN, the EOTAS autonomous construction methods is presented, which combine the Model Driven Architecture, Open Service Gateway Initiative and Petri Net Markup Language.
     3. Research of EOTAS dynamic schedule method.
     In orde to avoid the bad effect on the system real time performace and computing resource cost which the frequent EOTAS reconfiguration brings, need extend the function set of EOTAS, and then bring a new dynamic schedule requirement to EOTAS. In this paper, some research about EOTAS dynamic schedule method is discussed. At first, a new wearable human-computer collaboration concept formal is presented according to the multi-modal interaction on wearable computer. Then, EOTAS dynamic schedule method based on a new extended fuzzy colored Petri net (EFCPN) is presented, for the dealing with uncertainty and unstructured problem.
     4. Research of EOTAS application.
     According to the typical task about enterprise on-site equipment test, diagnosis and maintence, some EOTAS application system is build. Contents about the context acquisition methods, concrete implementation of context knowledge base and MEHCPN software toolkit development for EOTAS autonomous construction is discussed.
     5. Research of EOTAS performance support technologies.
     According to the requirement of performance guarantee, including real-time performance requirement, reliability evaluation requirement, security and privacy protect requirement, etc., the context prediction problem is discussed, and some domain knowledge description method and context prediction method base on knowledge reason is presented. Combined with some relevant work from trusted computing research field, a trusted model adapted to EOTAS structure character is build, and the computing method of reliability is discussed.
引文
[1]Steve M.Humanistic Computing:WearComp as a New Framework and Application for Intelligent Signal [J].Proceedings of the IEEE.November 1998,2123-2151.
    [2]陈东义,Blair M.可穿戴计算与系统仿真[J].系统仿真学报.2004,16(2):210-213.
    [3]Lee S,Kim J.Active cooling e-textiles for smart clothing[J].Journal of Donghua University.2006,23(5):24-26.
    [4]Paradiso J A.Systems for human-powered mobile computing[C].Proceedings- Design Automation Conference.43rd ACM/IEEE Design Automation Conference,DAC'06,2006,645-650.
    [5]Das B.Development of a Comprehensive Industrial Work Design Model[J].Human Factors and Ergonomics In Manufacturing,1999,9(4):393-411.
    [6]Maio S T,Orlidge L A.Portable maintenance aid instrument pack-improved weapon system diagnostics[C].Systems Readines Technology.Los Alamitos,United States:IEEE,2002.194- 203.
    [7]Moffett J,Wahila D,etc.Enriching the design process:developing a wearable operator's assistant[C],International Symposium on Wearable Computers.2000,35-42.
    [8]Ushiama,Taketoshi;Watanabe,Toyohide.A Life-Log Search Model Based on Bayesian Network[C].Proc.IEEE Sixth Int.Syrup.Multimedia Softw.Eng.MSE.2004,337-343.
    [9]Sarwal A,Baker C,Filipovic D.Head-worn display-based augmented reality system for manufacturing[C].Proceedings of SPIE.2005,v5800:115-122.
    [10]Brusilovsky P.Cooper D.Domain,Task,and User Models for an Adaptive Hypermedia Performance Support System[C].International Conference on Intelligent User Interfaces,Proceedings IUI.2002,p23-30.
    [11]Smailagic A,Siewiorek D.Application design for wearable and context-aware computers[J].IEEE Pervasive Computing.2002,1 (4):20-29.
    [12]Gerd Kortuem, Martin Bauer, Zary Segall. NETMAN: The Design of a Collaborative Wearable computer System[J]. Journal on Mobile Networks and Applications. 1999, 4(1): 49-58.
    [13]Lehikoinen J, Holopainen J, Salmimaa M. MEX: distributed software architecture for wearable computers[C]. International Symposium on Wearable Computers, Digest of Papers. 1999, 52-57.
    [14]Newman N. Clark A F. Sulawesi: A Wearable Application Integration Framework[C]. International Symposium on Wearable Computers. 1999: 170-171.
    [15]Papagiannakis G. etc. Mixing virtual and real scenes in the site of ancient Pompeii[J]. Computer Animation and Virtual Worlds. 2005, 16(1): 11-24.
    [16]Dey A K, Abowd G D, Salber D A. Conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications[J]. Human-Computer Interaction 2001.16(2-4): 97-166.
    [17]Baldauf M, Dustdar S. Rosenberg F. A survey on context-aware systems[J]. International Journal of Ad Hoc and Ubiquitous Computing. 2007. 2(4): 263-277.
    [18]Khedr M, Karmouch A. ACAI: Agent-based context-aware infrastructure for spontaneous applications[J]. Journal of Network and Computer Applications. 2005,28(1): 19-44.
    [19]Gu T, Pung H K, Zhang D Q. A service-oriented middleware for building context-aware services[J]. Journal of Network and Computer Applications. 2005,28(1): 1-18.
    [20]Schmidt A, Spiekermann S, Gershman A, Michahelles F. Real-world challenges of pervasive computing[J]. IEEE Pervasive Computing, 2006, 5(3): 91-93.
    [21]Ray A, Kurkovsky S. A survey of intelligent pervasive computing[J]. Proceedings of the International Conference on Artificial Intelligence. 2003, vl: 30-35.
    [22]Bradley J, Nelson M, Josh W. Wearable Computing Meets Ubiquitous Computing:Reaping the best of both worlds[C]. International Symposium on Wearable Computers, Digest of Papers, 1999: 141-149.
    [23]Bristow H W. Baber C, Cross J, etc. Defining and evaluating context for wearable computing[J]. International Journal of Human Computer Studies. 2004, 60(5-6):798-819.
    [24]Smailagic A, Siewiorek D, Reilly D. CMU wearable computers for real-time speech translation[J]. IEEE Personal Communications, 2001, 8(2): 6-12.
    [25]Clarkson B. Mase K. Pentland A. Recognizing user context via wearable sensors[C].International Symposium on Wearable Computers, Digest of Papers, 2000: 69-75.
    [26]Krause A, Smailagic A, Siewiorek D P. Context-aware mobile computing: Learning context-dependent personal preferences from a wearable sensor array[J]. IEEE Transactions on Mobile Computing, 2006, 5(2): 113-127.
    [27]Seate M, Dwolatzky B. Adaptive context human-computer interface (HCI) for power distribution network maintenance teams[C]. IEEE AFRICON Conference,2002, v2: 907-912.
    [28]Costello A, Tang A. Source: An egocentric augmented reality interface for spatial information management in crisis response situations[J]. Lecture Notes in Computer Science, 2007, 4563: 451-457.
    [29]Graaf B. Model-driven evolution of software architectures[C]. Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, 2007,357-360.
    [30]Schilit B N. Disseminating active map information to mobile hosts[J]. IEEE Network, 1994, 8(5): 22-32.
    [31]Brown P J, Jones G J F. Exploiting contextual change in context-aware retrieval[C].Proceedings of the ACM Symposium on Applied Computing, 2002: 650-656.
    [32]Mohr P H, Ryan N, Timmis Jon. Capturing regular human activity through a learning context memory[J]. AAAI Workshop - Technical Report, Modeling and Retrieval of Context - Papers from the AAAI Workshop, Technical Report, 2006,WS-06-12: 3-8.
    [33]R(?)mer K, Friedemann M. The Design Space of Wireless Sensor Networks[J]. IEEE Wireless Communications 11 (6): 54-61.
    [34]Chen H, Finin T, Joshi Anupam. A context broker for building smart meeting rooms[R]. AAAI Spring Symposium - Technical Report, Knowledge Representation and Ontologies for Autonomous Systems, 2004,4: 53-60.
    [35]Samulowitz M, Michahelles F, Linnhoff-Popien, C. Capeus: An architecture for context-aware selection and execution of services[J]. In New developments in distributed applications and interoperable systems, 2001: 23-39.
    [36]Indulska J, Robinsona R, Rakotonirainy A, Henricksen K. Experiences in using cc/pp in context-aware systems[C].In LNCS 2574:Proceedings of the 4th International Conference on Mobile Data Management,2003:247-261.
    [37]Henricksen K,Indulska J.Modelling and using imperfect context information[C].In Pervasive Computing and Communications Workshops,2004:33-37.
    [38]Schmidt A,Van L K.How to build smart appliances[J].IEEE Personal Communications,2001.8(4):66-71.
    [39]Robert E M,Anand R.Use of Ontologies in Pervasive Computing Environments[R].Technical report,University of Illinois at Urbana-Champaign,April 2003.
    [40]Ghidini C,Giunchiglia E Local Models Semantics,or contextual reasoning = locality + compatibility[J].Artificial Intelligence,April,2001,127(2):221-259.
    [41]陆钟万.面向计算机科学的数理逻辑(第二版)[M].科学出版社.2002.1.
    [42]Mantyjarvi J,Seppanen T.Adapting applications in handheld devices using fuzzy context information[J].Interacting with Computers,2003,15(4):521-538.
    [43]Roman G,Julien C,Payton J.Modeling adaptive behaviors in Context UNITY[J].Theoretical Computer Science,2007,376(3):185-204.
    [44]Baader F,Nutt W.Handbook of Description Logic[M],the second chapter.Cambridge University Press,Jan.2003.
    [45]Schmidt-Schaup M,Smolka G.Attributive concept descriptions with complements[J].Artificial Intelligence,1991,48(1):1-26.
    [46]Mei J,Lin Z,Boley H.etc.The datalogDL combination of deduction rules and description logics[J].Computational Intelligence,2007,23(3):356-372.
    [47]Motik B.Sattler U.A comparison of reasoning techniques for querying large description logic aboxes[C].LNCS,2006,v4246:227-241.
    [48]Van B M,Maguire G Q,Stolfo S.Constraint-based paradigm:Integrating object-oriented and rule-based programming[C].Proceedings of the Hawaii Intemational Conference on System Science,1990,2:358-366.
    [49]Magro D,Torasso P.Decomposition strategies for configuration problems[J].Artificial Intelligence for Engineering Design,Analysis and Manufacturing:AIEDAM,January,2003,17(1):51-73.
    [50]Dimitropoulos X,Riley G.Modeling autonomous-system relationships[J].Proceedings - Workshop on Principles of Advanced and Distributed Simulation,PADS,2006,143-149.
    [51]BN G,Horrocks I,Volz R,Decker S.Description logic programs:Combining logic programs with description logics[J].In Proceedings WWW-2003,pp.48-57.
    [52]Kaneiwa K.A hybrid reasoning system for terminologies and clause sets[C].Proceedings of the IASTED International Conference.Applied Informatics,2004,564-570.
    [53]倪明,徐福缘,沈运红.基于IDEFO方法的企业信息化建设复杂系统[J].系统工程,2005,23(3):69-74.
    [54]Walsh J D,Bordeleau F,Selic B.Domain analysis of dynamic system reconfiguration[J].Sotftware and Systems Modeling.2007,6(4):355-380.
    [55]Ivkovic I,Kontogiannis K.Towards automatic establishment of model dependencies using formal concept analysis[J].International Journal of Software Engineering and Knowledge Engineering,2006,16(4):499-522.
    [56]Kieburtz R B.Programmed Strategies for Program Verification[J].Electronic Notes in Theoretical Computer Science,SPEC.ISS.Jul 2,2007,174(10):3-38.
    [57]Davis,Ruth E.Logic programming and prolog:a tutorial[J].IEEE Software,1985,2(5):53-62.
    [58]Wielemaker J.Huang Z.Van D M.SWI-Prolog and the web[J].Theory and Practice of Logic Programming,2008,8(3):363-392.
    [59]董明楷,蒋运承,史忠植.一种带缺省推理的描述逻辑[J].计算机学报.2003,26(6):729-736.
    [60]Abdullah,Mohd Syazwan;Paige,Richard;Benest,Ian;Kimble,Chris.Unified modeling language for knowledge modelling[C].International Conference on Computational Intelligence for Modelling,Control and Automation,and International Conference on Intelligent Agents,Web Technologies and Interne,2005,v2:952-957.
    [61]龚晓洁,胡圣明,陈平,郑变红.逆向工程中动静态结合分析面向对象系统研究[J].系统工程与电子技术.2008,30(1):85-88.
    [62]Pretorius L,Bosch S E.Finite-state computational morphology:An analyzer prototype for Zulu[J].Machine Translation.2003,18(3):195-216.
    [63]M.Hack.Petri net languages[R].Computation Structures Group.MIT Project MAC.Meno124.June 1975.
    [64]Lee D,Zimmer R,Lee S Y,Park S.Colored Petri net modeling and simulation of signal transduction pathways[J]. Metabolic Engineering, 2006, 8(2): 112-122.
    [65]Huber P, Jensen K, Shapiro R M. Hierarchies in coloured Petri nets[J]. Advances in Petri Nets 1990, G Rozenberg, ed., 313-341.
    [66] E Nemeth, K. M Hangos. Multi-scale process model description by generalized hierarchical CPN models[R]. Hungary: MTA SZTAKI Computer and Automation Research Institute, 2004.
    [67] A. G. Kleppe, J. B. Warmer, W. Bast, and A. Watson, MDA Explained: The Model Driven Architecture: Practice and Promise[J]. Addison-Wesley Professional, 2003.
    [68] J. Greenfield and K. Short, Software factories: assembling applications with patterns, models, frameworks and tools: John Wiley and Sons, Ltd., 2004.
    [69] Dobrzanski L. An approach to refactoring of executable UML models[C].Proceedings of the 2006 ACM Symposium on Applied Computing, 2006, v2,1273-1279.
    [70] Gu T, Pung H K, Zhang D Q. Toward an OSGi-based infrastructure for context-aware applications[J]. IEEE Pervasive Computing. 2006, 3(4): 66-74.
    [71] Boyette N, Krishna V, Srinivasan S. Eclipse modeling framework for document management[J]. Proceedings of the 2005 ACM Symposium on Document Engineering, 2005, 220-222.
    [72] High-level Petri Nets: Concepts, Definitions and Graphical Notation[S]. Final Draft International Standard ISO/IEC 15909. Version 4.7.3, May 10,2002.
    [73] Schweitzer R H, Manke A, etc. A Relax NG way to live: The story of updating the live access server configuration XML[J]. 85th AMS Annual Meeting, American Meteorological Society - Combined Preprints, 2005, 639-641.
    [74] Nait-Sidi-Moh A, Wack M. Modelling of process of electronic signature with petri nets and (max, plus) algebra[J]. Lecture Notes in Computer Science, Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings,2005, 3483(Ⅳ): 792-801.
    [75] The Petri Net Kernel: File Format Documentation[Z], http://www.informatik.hu-berlin.de/top/pnk.
    [76] Wells L. Performance analysis using CPN tools[C]. 1st International Conference on Performance Evaluation Methodologies and Tools, 2006, vl80: 1190171.
    [77] Jean-Paul B, Mamoun F, PJulia L, PGilles M. Automatic Verification of Bossa Scheduler Properties[J].Electronic Notes in Theoretical Computer Science.2007,v185:17-32.
    [78]Zhao C.Kong J,Zhang K.Design pattern evolution and verification using graph transformation[J].Proceedings of the 40th Annual Hawaii International Conference on System Sciences,2007,4076970.
    [79]Wang X,Dong J S,Chin C Y,etc.Semantic space:An infrastructure for smart spaces[J].IEEE Pervasive Computing,July/September,2004,3(3):32-39.
    [80]吴哲辉.Petri网导论[M].北京:机械工业出版社,2006.181-188.
    [81]Dodd R.Coloured petri net modelling of real-time task scheduling[C].Proceedings,25th DASC Digital Avionics Systems Conference Proceedings - Network-Center Environment:The Impact on Avionics and Systems,2006,4106343.
    [82]El-Fakih K,Yamaguchi H,Bochmann G,Higashino T.Petri net-based protocol synthesis with minimum communication costs[J].Journal of the Franklin Institute.2006,343(4-5):501-520.
    [83]Hiraishi K,Tanaka H.An algorithm for legal firing sequence problem of Petri nets based on partial order method[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2001,E84-A(11):2881-2884.
    [84]董士海.人机交互的进展及面临的挑战[J].计算机辅助设计与图形学学报.2004,16(1):1-13.
    [85]Doswell J T.Augmented learning:Context-aware mobile augmented reality architecture for learning[C].Proceedings - Sixth International Conference on Advanced Learning Technologies,2006,1182-1183.
    [86]Haller M,Landerl F,Billinghurst M.A loose and sketchy approach in a mediated reality environment[C].Proceedings - GRAPHITE 2005 - 3rd International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia,2005,371-379.
    [87]Schindler Grant,Metzger Christian,Starner Thad.A wearable interface for topological mapping and localization in indoor environments[C].Lecture Notes in Computer Science,Location- and Context-Awareness - Second International Workshop,Proceedings,2006,3987:64-73.
    [88]Van V G,Van V H.The human-computer interface is the system;A plea for a poor man's HCI component in software engineering curricula[C].Software Engineering Education Conference,Proceedings,2001,276-286.
    [89]Seate M,Dwolatzky B.Adaptive context human-computer interface (HCI) for power distribution network maintenance teams[C].IEEE AFRICON Conference,2002,2:907-912.
    [90]Kim G S,Cho H,Eom Y I.The implementation of adaptive user interface migration based on ubiquitous mobile agents[C].Lecture Notes in Computer Science,LNCS,Human Interface and the Management of Information:Methods,Techniques and Tools in Information Design - Symposium on Human Interface 2007,4557(PART 1):659-668.
    [91]Tsinarakis G J,Valavanis K P,Tsourveloudis N C.Modular Petri Net based modeling,analysis and synthesis of dedicated production systems[C].IEEE International Conference on Robotics and Automation,2003,3:3559-3564.
    [92]Penttila J,Peltola J,Seppanen T.A speech/music discriminator-based audio browser with a degree of certainty measure[C].Proc.Infotech Oulu International Workshop on Information Retrieval,Oulu,Finland,2001.125 - 131.
    [93]Ouahid H,Karmouch A.Web ontology description language[C].Conference Record / IEEE Global Telecommunications Conference,1999,3:1959-1963.
    [94]Ducharme B.RDF:The resource description framework[J].Dr.Dobb's Journal,2005,30(4):38-41.
    [95]Kim Y,Kim B,Lim H.Design of storage structure for path-based query on RDF and RDF schema[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2006,E89-A(6):1733-1735.
    [96]Lukasiewicz T.Expressive probabilistic description logics[J].Artificial Intelligence,2008,172(6-7):852-883.
    [97]Mayrhofer,R.:An architecture for context prediction[J].In:Advances in Pervasive.Computing.Volume 176.Austrian Computer Society (OCG) (2004) 65-72.
    [98]Degiannakis S,Xekalaki E.Predictability and model selection in the context of ARCH models[J].Applied Stochastic Models in Business and Industry,January/February,2005,21(1):55-82.
    [99]刘宏伟,杨孝宗,曲峰,董剑.可穿戴计算机软件系统可靠性增长模型研究[J].哈尔滨工业大学学报,2003,35(7):919-921.
    [100]Di Pietro.Security and privacy issues of handheld and wearable wireless devices[J].Communications of the ACM,46(9),pp.74-79 2003.
    [101]Sadeghi A R.Challenges for trusted computing[C].Lecture Notes in Computer Science,Cryptographic Hardware and Embedded Systems,CHES 2006 - 8th International Workshop,Proceedings,2006,4249:414.
    [102]张晓菲,许访,沈昌祥.基于可信状态的多级安全模型及其应用研究[J].电子学报,2007,35(8):1511-1515.
    [103]Xiaoping Wu,Zhidong Shen,Huanguo Zhang,The Mobile Agent Security Enhanced by Trusted Computing Technology[C].International Conference on Wireless Communications,Networking and Mobile Computing,2006,pp.1-4,2006.
    [104]Volovoi V,Kavalieratos G,Waters M,Mavris D.Modeling the reliability of distribution power systems using Petfi nets[C],l lth International Conference on Harmonics and Quality of Power,2004,567-571.
    [105]Kabashkin I.Reliability model of intelligent transport systems[C].Proceedings,7th International Conference on Intelligent Transport Systems Telcommunications,2007,450-453.
    [106]Lgirdas A.Jean-c Lande Laprie.Basic Concepts and taxonomy of dependable and secure computing[J].IEEE Transactions on Dependable and Secure Computing.2004,1(1):11-33.
    [107]Uzam M.The use of the Petri net reduction approach for an optimal deadlock prevention policy for flexible manufacturing systems[J].International Journal of Advanced Manufacturing Technology,2004,23(3-4):204-219.
    [108]Tricas F,Garcia-Valles F,Colom J.A Petri net structure-based deadlock prevention solution for sequential resource allocation systems[C].Proceedings - IEEE International Conference on Robotics and Automation,2005,271-277.
    [109]林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报.2006,34(2):322-332.
    [110]Lutz C.The complexity of Reasoning with Concrete Domains[D],LuFG Theoretical Computer Science,RWTH Aachen,Germany,2002.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700