Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Intelligent Software For Ecological Building Design, Jens G. Pohl, Hisham Assal, Kym J. Pohl Aug 2010

Intelligent Software For Ecological Building Design, Jens G. Pohl, Hisham Assal, Kym J. Pohl

Collaborative Agent Design (CAD) Research Center

Building design is a complex process because of the number of elements and issues involved and the number of relationships that exist among them. Adding sustainability issues to the list increases the complexity of design by an order of magnitude. There is a need for computer assistance to manage the increased complexity of design and to provide intelligent collaboration in formulating acceptable design solutions. Software development technology today offers opportunities to design and build an intelligent software system environment that can serve as a reliable intelligent partner to the human designer.

In this paper the authors discuss the requirements for …


Preconference Proceedings On Advances In Adaptive Planning Capabilities, Jens G. Pohl Aug 2010

Preconference Proceedings On Advances In Adaptive Planning Capabilities, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

No abstract provided.


A Method To Implement Location Transparency In A Web Service Environment, Xiaoshan Pan, Jens G. Pohl Aug 2010

A Method To Implement Location Transparency In A Web Service Environment, Xiaoshan Pan, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

Location transparency offers some significant benefits in the areas of middleware, Service-Oriented Architecture (SOA) and Cloud Computing. However, methods for achieving location transparency in a Web service environment are scarcely presented in the literature. This paper introduces such a method by describing a design and HTTP protocol-based implementation of location transparency. A number of benefits, including support for the creation of a virtual platform and increased mobility, availability and scalability of services, are elaborated. Two significant capabilities -performance-based load balancing and failover -are demonstrated as part of the experimental results.


On The Road To Intelligent Web Applications, Hisham Assal, Kym J. Pohl, Jens G. Pohl Aug 2010

On The Road To Intelligent Web Applications, Hisham Assal, Kym J. Pohl, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

Increasing access to data sources on the Internet offers expanding opportunities for equipping intelligent applications with the content they require whether broad in scope or rich in detail. Although typically originating within the web in a semi-structured form, with the use of inference-based translation and analysis mechanisms such content can be transformed into useful information and ultimately into actionable knowledge. Service-Oriented Architecture (SOA) offers a platform for accessing the web as invocable resources and effectively incorporating multiple sources of data and capabilities on the Internet into enterprise applications. Adding inference capabilities to SOA-based applications not only aids in the translation …


Solving The Data Deluge Problem, Jens G. Pohl Aug 2010

Solving The Data Deluge Problem, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

The paper postulates that the information technology revolution that is commonly referred to as the Information Age is currently in a transition stage between data-processing and knowledge management that should be more aptly referred to as the Data Age. Symptoms of this transition stage are a data deluge problem that is evidenced by the inability of human computer-users to effectively analyze and draw useful conclusions from the overwhelming volume of data that is being collected, the increasing complexity of networked systems, and the acknowledged vulnerability of virtually all existing digital systems to cyber security threats.

The author suggests that the …