Journal articles on the topic 'Interaction protocol'

To see the other types of publications on this topic, follow the link: Interaction protocol.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Interaction protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Juneja, Dimple, Chetali Dhiman, Savneet Monga, and Ashutosh Kumar Singh. "Compendious Study of Interaction Protocols in Multiagent Systems." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 1. http://dx.doi.org/10.14419/ijet.v7i3.8.15208.

Full text
Abstract:
The premise of the paper is to present a compendious study of interaction protocols pertaining to multiagent systems. Multiagent systems have evolved from the field of Distributed Artificial Intelligence and require numerous agents to cooperate and coordinate to cope with goal search. The primary ingredients to goal search are the language of communication and the interaction protocol. Agents in communication must be able to understand the language of communication and should also follow rules of interaction. The paper focuses on sharing understanding about various agent interaction protocols and it also discusses the promises and challenges each protocol offers to MAS research community.
APA, Harvard, Vancouver, ISO, and other styles
2

Ronald, Nicole, Theo Arentze, and Harry Timmermans. "The Effects of Different Interaction Protocols in Agent-Based Simulation of Social Activities." International Journal of Agent Technologies and Systems 3, no. 2 (April 2011): 18–32. http://dx.doi.org/10.4018/jats.2011040102.

Full text
Abstract:
Decision making in models of activity and travel behaviour is usually individual-based and focuses on outcomes rather than the decision process. Using agent-based modelling techniques and incorporating interaction protocols into the model can assist in modelling decision-making in more detail. This paper describes an agent-based model of social activity generation and scheduling, in which utility-based agents interact with each other to schedule activities. Six different protocols are tested. The authors show that the model outcomes reflect minor changes in the protocol, while changing the order of the protocol leads to significantly different outcomes, hence the protocol plays a large role in the simulation results and should be studied in more detail.
APA, Harvard, Vancouver, ISO, and other styles
3

Ignatenko, O. P., and O. A. Molchanov. "Evolutionary games in TCP networks with speed restriction policies." PROBLEMS IN PROGRAMMING, no. 4 (December 2016): 033–47. http://dx.doi.org/10.15407/pp2016.04.033.

Full text
Abstract:
Competitive development of various versions of network protocols is an essential part of computer networks. The most-used protocol today is Transmission Control Protocol (TCP). There is a large number of implementations of the TCP protocol, which differ by mechanism of congestion control. TCP develops by improving its existent implementations, vanishing some of them and via creation of a new ones. The possibility of using new versions of the protocol allows the user to increase the data rate by selecting the appropriate implementation of TCP. It is difficult to predict consequences of computer network users’ interaction in situations when many users try to achieve higher data rate by applying different TCP implementation. The actual task is to develop a theoretical and program tools to model such competitive dynamic interactions. This is the goal of my scientific-research work. Game theory, which is the theory of mathematical models of optimal decision making in situations of conflicts of interest, is the best suited to solve a particular problem because it allows you to find a solution in terms of non-cooperative interaction, which usually happens between the networks TCP-connections. This paper examines the possibility of coexistence of different implementations of protocols that users can change to improve their own capacity. It also examines games between protocols in cases when users’ packets management policies are applied.
APA, Harvard, Vancouver, ISO, and other styles
4

Romanchenko, Alexander Mikhailovitch. "Generalized Structural Metamodel of Information Interaction Protocol." SPIIRAS Proceedings 1, no. 38 (February 24, 2015): 58. http://dx.doi.org/10.15622/sp.38.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vadde, K. K., V. R. Syrotiuk, and D. C. Montgomery. "Optimizing protocol interaction using response surface methodology." IEEE Transactions on Mobile Computing 5, no. 6 (June 2006): 627–39. http://dx.doi.org/10.1109/tmc.2006.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ardissono, Liliana, Roberto Furnari, Giovanna Petrone, and Marino Segnan. "Interaction protocol mediation in web service composition." International Journal of Web Engineering and Technology 6, no. 1 (2010): 4. http://dx.doi.org/10.1504/ijwet.2010.034758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, John, Dana Kay Smith, and Eileen Kupstas. "Automated Protocol Analysis." Human-Computer Interaction 8, no. 2 (June 1, 1993): 101–45. http://dx.doi.org/10.1207/s15327051hci0802_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zelenka, Tomas, and Charalampos Spilianakis. "HiChIP and Hi-C Protocol Optimized for Primary Murine T Cells." Methods and Protocols 4, no. 3 (July 16, 2021): 49. http://dx.doi.org/10.3390/mps4030049.

Full text
Abstract:
The functional implications of the three-dimensional genome organization are becoming increasingly recognized. The Hi-C and HiChIP research approaches belong among the most popular choices for probing long-range chromatin interactions. A few methodical protocols have been published so far, yet their reproducibility and efficiency may vary. Most importantly, the high frequency of the dangling ends may dramatically affect the number of usable reads mapped to valid interaction pairs. Additionally, more obstacles arise from the chromatin compactness of certain investigated cell types, such as primary T cells, which due to their small and compact nuclei, impede limitations for their use in various genomic approaches. Here we systematically optimized all the major steps of the HiChIP protocol in T cells. As a result, we reduced the number of dangling ends to nearly zero and increased the proportion of long-range interaction pairs. Moreover, using three different mouse genotypes and multiple biological replicates, we demonstrated the high reproducibility of the optimized protocol. Although our primary goal was to optimize HiChIP, we also successfully applied the optimized steps to Hi-C, given their significant protocol overlap. Overall, we describe the rationale behind every optimization step, followed by a detailed protocol for both HiChIP and Hi-C experiments.
APA, Harvard, Vancouver, ISO, and other styles
9

Pokussov, V. V. "Formalization and determination of the protocol correctness for information and technical interaction (on the example of integrated information security system)." Informatization and communication, no. 2 (February 16, 2021): 55–68. http://dx.doi.org/10.34219/2078-8320-2021-12-2-55-68.

Full text
Abstract:
The article deals with the problem of designing protocols for information and technical interaction, which have a sign of correctness. For this, its model is built in graphical and analytical form, as well as using a modified adjacency matrix. A classification of modules participating in the interaction is proposed, namely the following: terminal sensor and executor, degenerate handler, object storage, intermediate handler. Five correctness requirements for the protocol are introduced: the need and sufficiency of exchange objects, input and output terminality of modules, and their involvement. For each of the requirements, a formal definition is given - in terms of an adjacency matrix, as well as an algorithm for their verification. The synthesized requirements and algorithms are used for the author›s protocol of information and technical interaction in an integrated information security system. As a result, the correctness of the protocol is proved.
APA, Harvard, Vancouver, ISO, and other styles
10

Xiong, PengCheng, Calton Pu, and Mengchu Zhou. "Protocol-Level Service Composition Mismatches." International Journal of Web Services Research 7, no. 4 (October 2010): 1–20. http://dx.doi.org/10.4018/jwsr.2010100101.

Full text
Abstract:
Protocol-level mismatch is one of the most important problems in service composition. The state-of-the-art method to deal with protocol mismatch is to generate adaptors to check deadlock-freeness based on a reachability graph. When this property is violated, the generation process will repeat itself until no deadlock state is found; however, the main drawback of this method is that it does not take into account the future deadlock state and requires many interactions with a developer. In this regard, it suffers from low efficiency. In this paper, the authors model multiple web service interaction with a Petri net called Composition net (C-net). The protocol-level mismatch problem is transformed into the empty siphon problem of a C-net. The authors take future deadlock states into consideration through this model, while finding the optimal solution that involves fewest interactions with a developer. The proposed method is proved to achieve higher efficiency for resolving protocol-level mismatch issues than traditional ones.
APA, Harvard, Vancouver, ISO, and other styles
11

Anvari, Hamidreza, and Paul Lu. "Machine-Learned Recognition of Network Traffic for Optimization through Protocol Selection." Computers 10, no. 6 (June 11, 2021): 76. http://dx.doi.org/10.3390/computers10060076.

Full text
Abstract:
We introduce optimization through protocol selection (OPS) as a technique to improve bulk-data transfer on shared wide-area networks (WANs). Instead of just fine-tuning the parameters of a network protocol, our empirical results show that the selection of the protocol itself can result in up to four times higher throughput in some key cases. However, OPS for the foreground traffic (e.g., TCP CUBIC, TCP BBR, UDT) depends on knowledge about the network protocols used by the background traffic (i.e., other users). Therefore, we build and empirically evaluate several machine-learned (ML) classifiers, trained on local round-trip time (RTT) time-series data gathered using active probing, to recognize the mix of network protocols in the background with an accuracy of up to 0.96.
APA, Harvard, Vancouver, ISO, and other styles
12

Ekblad, Torun, Patricia Verheugd, Anders E. Lindgren, Tomas Nyman, Mikael Elofsson, and Herwig Schüler. "Identification of Poly(ADP-Ribose) Polymerase Macrodomain Inhibitors Using an AlphaScreen Protocol." SLAS DISCOVERY: Advancing the Science of Drug Discovery 23, no. 4 (January 9, 2018): 353–62. http://dx.doi.org/10.1177/2472555217750870.

Full text
Abstract:
Macrodomains recognize intracellular adenosine diphosphate (ADP)-ribosylation resulting in either removal of the modification or a protein interaction event. Research into compounds that modulate macrodomain functions could make important contributions. We investigated the interactions of all seven individual macrodomains of the human poly(ADP-ribose) polymerase (PARP) family members PARP9, PARP14, and PARP15 with five mono-ADP-ribosylated (automodified) ADP-ribosyltransferase domains using an AlphaScreen assay. Several mono-ADP-ribosylation-dependent interactions were identified, and they were found to be in the micromolar affinity range using surface plasmon resonance (SPR). We then focused on the interaction between PARP14 macrodomain-2 and the mono-ADP-ribosylated PARP10 catalytic domain, and probed a ~1500-compound diverse library for inhibitors of this interaction using AlphaScreen. Initial hit compounds were verified by concentration–response experiments using AlphaScreen and SPR, and they were tested against PARP14 macrodomain-2 and -3. Two initial hit compounds and one chemical analog each were further characterized using SPR and microscale thermophoresis. In conclusion, our results reveal novel macrodomain interactions and establish protocols for identification of inhibitors of such interactions.
APA, Harvard, Vancouver, ISO, and other styles
13

Elahi, Behzad, William D. Hutchison, Z. Jeff Daskalakis, Carolyn Gunraj, and Robert Chen. "Dose-response curve of associative plasticity in human motor cortex and interactions with motor practice." Journal of Neurophysiology 111, no. 3 (February 1, 2014): 594–601. http://dx.doi.org/10.1152/jn.00920.2012.

Full text
Abstract:
Associative plasticity is hypothesized to be an important neurophysiological correlate of memory formation and learning with potentials for applications in neurorehabilitation and for the development of new electrophysiological measures to study disorders of cortical plasticity. We hypothesized that the magnitude of the paired associative stimulation (PAS)-induced long-term potentiation (LTP)-like effect depends on the number of pairs in the PAS protocol. We also hypothesized that homeostatic interaction of PAS with subsequent motor learning is related to the magnitude of the PAS-induced LTP-like effect. We studied 10 healthy subjects. In experiment 1a, subjects received 90 (PAS90), 180 (PAS180), or 270 (PAS270) pairs of stimuli, followed by a dynamic motor practice (DMP) 1 h after the end of the PAS protocols. In experiment 1b, the DMP preceded the PAS protocol. In experiment 2, the time course of PAS270 was studied. We found that PAS270 resulted in greater increase in motor evoked potential (MEP) amplitude compared with protocols with fewer pairs of stimuli. Moreover, the interaction between PAS protocols with motor learning differed depending on the number of stimulus pairs used to induce PAS. While DMP alone increased MEP amplitudes, DMP during the LTP-like effects induced by PAS270 led to a long-term depression (LTD)-like effect (homeostatic interaction). This homeostatic interaction did not occur after PAS90 and PAS180. In conclusion, we found a dose-dependent effect of the number of stimulus pairs used in the PAS protocol on cortical plasticity. Homeostatic interaction between PAS and DMP was observed only after PAS270.
APA, Harvard, Vancouver, ISO, and other styles
14

CHEN, BO, and SAMIRA SADAOUI. "A GENERIC FORMAL FRAMEWORK FOR CONSTRUCTING AGENT INTERACTION PROTOCOLS." International Journal of Software Engineering and Knowledge Engineering 15, no. 01 (February 2005): 61–85. http://dx.doi.org/10.1142/s0218194005001884.

Full text
Abstract:
Agent interaction protocols (AIP) design is one of the principal issues for building multi-agent systems. Indeed, the construction of AIP should integrate theories, methodologies and tools. We propose in this paper a unifying framework that provides a generic agent architecture to be reused as well as a methodology to construct and refine AIP specifications in an incremental way. This framework is based on the highly expressive formal language Lotos and its related technologies, such as finite state machines and temporal logics. Hence, the proposed framework also facilitates formal validation and verification of AIP specifications using rigorous tools. We argue that there are three layers of semantics of Lotos specifications that can improve Lotos expressivity in describing agent interaction. Therefore, this framework can describe almost all aspects of agent interaction and at different abstraction levels. In addition, we demonstrate how to generate an online auction protocol from the generic framework, and how to validate and verify this protocol.
APA, Harvard, Vancouver, ISO, and other styles
15

Haim, Yulia, Tanya Tarnovscki, Dana Bashari, and Assaf Rudich. "A chromatin immunoprecipitation (ChIP) protocol for use in whole human adipose tissue." American Journal of Physiology-Endocrinology and Metabolism 305, no. 9 (November 1, 2013): E1172—E1177. http://dx.doi.org/10.1152/ajpendo.00598.2012.

Full text
Abstract:
Chromatin immunoprecipitation (ChIP) has become a central method when studying in vivo protein-DNA interactions, with the major challenge being the hope to capture “authentic” interactions. While ChIP protocols have been optimized for use with specific cell types and tissues including adipose tissue-derived cells, a working ChIP protocol addressing the challenges imposed by fresh whole human adipose tissue has not been described. Utilizing human paired omental and subcutaneous adipose tissue obtained during elective abdominal surgeries, we have carefully identified and optimized individual steps in the ChIP protocol employed directly on fresh tissue fragments. We describe a complete working protocol for using ChIP on whole adipose tissue fragments. Specific steps required adaptation of the ChIP protocol to human whole adipose tissue. In particular, a cross-linking step was performed directly on fresh small tissue fragments. Nuclei were isolated before releasing chromatin, allowing better management of fat content; a sonication protocol to obtain fragmented chromatin was optimized. We also demonstrate the high sensitivity of immunoprecipitated chromatin from adipose tissue to freezing. In conclusion, we describe the development of a ChIP protocol optimized for use in studying whole human adipose tissue, providing solutions for the unique challenges imposed by this tissue. Unraveling protein-DNA interaction in whole human adipose tissue will likely contribute to elucidating molecular pathways contributing to common human diseases such as obesity and type 2 diabetes.
APA, Harvard, Vancouver, ISO, and other styles
16

Ping, Li Ru. "Trust Based Authentication Mechanism in Wireless Sensor Networks." International Journal of Online Engineering (iJOE) 12, no. 1 (January 18, 2016): 58. http://dx.doi.org/10.3991/ijoe.v12i1.5173.

Full text
Abstract:
Authentication mechanism is the basis of access control and data exchange. In wireless sensor networks, the vulnerability of network nodes and complexity of communication protocols pose a huge challenge for designing authentication mechanism in such environment. In this paper, we study the authentication mechanism in wireless sensor networks based on trust between nodes. We use the interaction history of nodes for recommendation trust computation, and the interaction history comes from the interactions between nodes. We design a penalty mechanism for hostile nodes based on the TCP congestion control protocol, and present a loyalty based trust recommendation evaluation algorithm. Massive experiments validate the efficiency and effectiveness of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
17

Alberti, Federica, Sven Fischer, Werner Güth, and Kei Tsutsui. "Concession Bargaining." Journal of Conflict Resolution 62, no. 9 (July 31, 2017): 2017–39. http://dx.doi.org/10.1177/0022002717720753.

Full text
Abstract:
We test experimentally whether dynamic interaction is crucial for concession bargaining. In our complete information bargaining experiments, two parties with asymmetric conflict payoffs try to agree how to share a commonly known pie by bargaining over a finite number of successive trials (agreement attempts). We compare the fully dynamic interaction to one less dynamic and one static protocol. In the quasi-dynamic protocol, later trials merely reveal that so far no agreement has been reached, and in the static protocol, no feedback information is given about earlier trials. We find that neither conflict rate nor efficiency or inequality of agreements differs across protocols. Comparing different numbers of maximal trials shows that more trials render conflict more likely due to less concessions.
APA, Harvard, Vancouver, ISO, and other styles
18

Brewer, Thomas L. "The WTO and the Kyoto Protocol: interaction issues." Climate Policy 4, no. 1 (January 1, 2004): 3–12. http://dx.doi.org/10.3763/cpol.2004.0402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Brewer, Thomas L. "The WTO and the Kyoto Protocol: interaction issues." Climate Policy 4, no. 1 (January 2004): 3–12. http://dx.doi.org/10.1080/14693062.2004.9685506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nielsen, Jakob. "A virtual protocol model for computer-human interaction." International Journal of Man-Machine Studies 24, no. 3 (March 1986): 301–12. http://dx.doi.org/10.1016/s0020-7373(86)80028-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jeong, Yunju, Md Israfil Ansari, WooHyeon Shin, Bonggu Kang, JinSeop Lim, HyeonSik Moon, and Jaechang Shim. "PLC and Arduino Interaction Based on Modbus Protocol." Journal of Korea Multimedia Society 20, no. 3 (March 30, 2017): 511–19. http://dx.doi.org/10.9717/kmms.2017.20.3.511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ramaswamy, Vinod, Diganto Choudhury, and Srinivas Shakkottai. "Which Protocol? Mutual Interaction of Heterogeneous Congestion Controllers." IEEE/ACM Transactions on Networking 22, no. 2 (April 2014): 457–69. http://dx.doi.org/10.1109/tnet.2013.2262773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Coutinho, M., T. C. de Souza Neto, Robson De Oliveira Albuquerque, and Rafael Timóteo de Sousa Júnior. "Cryptanalysis of Kowada-Machado key exchange protocol." Journal of Information Security and Cryptography (Enigma) 4, no. 1 (July 21, 2018): 12. http://dx.doi.org/10.17648/enigma.v4i1.64.

Full text
Abstract:
A non-interactive key exchange (NIKE) protocol allows N parties who know each other’s public key to agree on a symmetric shared key without requiring any interaction. A classic example of such protocol for N = 2 is the Diffie-Hellman key exchange. Recently, some techniques were proposed to obtain a NIKE protocol for N parties, however, it is still considered an open problem since the security of these protocols must be confirmed. In a recent work, Kowada and Machado [1] proposed a protocol that solves the NIKE problem for N parties. However, this work found security problems in the proposed solution and implemented an efficient attack to their protocol demonstrating that their key-exchange scheme is insecure.
APA, Harvard, Vancouver, ISO, and other styles
24

Hruschka, Daniel J., Shirajum Munira, Khaleda Jesmin, Joseph Hackman, and Leonid Tiokhin. "Learning from failures of protocol in cross-cultural research." Proceedings of the National Academy of Sciences 115, no. 45 (November 5, 2018): 11428–34. http://dx.doi.org/10.1073/pnas.1721166115.

Full text
Abstract:
The many tools that social and behavioral scientists use to gather data from their fellow humans have, in most cases, been honed on a rarefied subset of humanity: highly educated participants with unique capacities, experiences, motivations, and social expectations. Through this honing process, researchers have developed protocols that extract information from these participants with great efficiency. However, as researchers reach out to broader populations, it is unclear whether these highly refined protocols are robust to cultural differences in skills, motivations, and expected modes of social interaction. In this paper, we illustrate the kinds of mismatches that can arise when using these highly refined protocols with nontypical populations by describing our experience translating an apparently simple social discounting protocol to work in rural Bangladesh. Multiple rounds of piloting and revision revealed a number of tacit assumptions about how participants should perceive, understand, and respond to key elements of the protocol. These included facility with numbers, letters, abstract number lines, and 2D geometric shapes, and the treatment of decisions as a series of isolated events. Through on-the-ground observation and a collaborative refinement process, we developed a protocol that worked both in Bangladesh and among US college students. More systematic study of the process of adapting common protocols to new contexts will provide valuable information about the range of skills, motivations, and modes of interaction that participants bring to studies as we develop a more diverse and inclusive social and behavioral science.
APA, Harvard, Vancouver, ISO, and other styles
25

Oliveira, Bárbara Malta Neves, Karime Botelho Alves, Gláucia Maria Bovi Ambrosano, Débora Alves Nunes leite Lima, Giselle Maria Marchi Baron, Flávio Henrique Baggio Aguiar, and Maria Cecília Caldas Giorgi. "Influence of photoactivation protocol and ceramic thickness on mechanical properties of cementation agents." Journal of Research in Dentistry 1, no. 3 (September 1, 2013): 253. http://dx.doi.org/10.19177/jrd.v1e32013253-262.

Full text
Abstract:
The objective of this work was to evaluate the influence of photoactivation protocol and ceramic thickness on the Knoop microhardness (KHN) and the diametrical tensile strength (DTS) of a dual resin cement (Rely X ARC 3M ESPE (RL)) and a low viscosity composite resin (Filtek Z350 Flow 3M ESPE (Z)). Thereunto, cementation agents were photoactivated under ceramic discs of lithium disilicate with thickness of 1 and 2mm, and a glass slide (control group). The photoactivation was performed with halogen light-curing unit in continuous mode (XL 3000 3M Espe,) (XL) 500 mW/cm2 X 38 s, and with third generation LED light-curing unit (Valo Ultradent) in Standard mode (S) 1000 mW/cm2 X 19 s and Plasma Emulation mode (PE) 3200 mW/cm2 X 6 s, all them providing approximately 19 J/cm2. For KHN measurement, samples (5mm X 1mm) were made (n=8) and submitted to the KHN test on the top surface under a load of 10g applied for 10 seconds. For the DTS (n=8), samples (5mm X 3mm) were made and submitted to a compressive load of 0.5 mm/s until fracture. The data obtained were submitted to the statistical analysis. For KHN, there was statistically significant effect for interactions cementation agent X ceramic thickness, where RL presented higher values of KHN than Z. Comparing inside of cementation agent, RL presented higher values of KHN when photoactivated under 1 mm of ceramic thickness, different from the others. For Z, there was no statistically significant difference between different thickness and the control. The interaction cementation agent X photoactivation protocol was also significant, where for all the photoactivation protocols RL presented higher values of KHN than Z. For the cementation agent there was no significant difference in the values of KHN in all the photoactivation protocols for RL. For Z, the higher values of KHN were obtained by XL protocol and the lower values by S. For DTS, there was significant effect for the interaction cementation agent X photoactivation protocol, where in the photoactivation protocol factor, RL presented higher DTS when photoactivated by XL protocol. For cementation agent factor, the higher values of DTS for RL were obtained with XL, and the lower ones with S. For Z, similar values of DTS were obtained among photoactivation protocols evaluated. It was possible conclude that ceramic thickness and the photoactivation protocols exerted influence on the mechanical properties of cementation agents evaluated.
APA, Harvard, Vancouver, ISO, and other styles
26

Seguel, Ricardo, Rik Eshuis, and Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors." International Journal of Cooperative Information Systems 23, no. 04 (December 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.

Full text
Abstract:
Business chains increasingly rely on the dynamic integration of business processes of different partners. The interaction constraints that result from the business processes are captured in business protocols. Since the business protocols of each partner support its own way of working, the business protocols can easily mismatch, which hinders organizations from forming a business chain. Such mismatches can be resolved by protocol adaptors. In this paper, we show how protocol adaptors can be used to enable the flexible formation of business chains. For different types of business chains, we present formation cases that describe which partners are responsible for the construction and operation of protocol adaptors. Next, we present for each formation case an accompanying concrete software architecture that realizes the case. The presented software architectures support the flexible formation of business chains and use protocol adaptation as a key component. We show the feasibility of the approach by discussing a prototype implementation, which we apply to a case study from the healthcare domain.
APA, Harvard, Vancouver, ISO, and other styles
27

Ionescu, Clara Mihaela, Maria Ghita, Dana Copot, Eric Derom, and Dirk Verellen. "A Minimal PKPD Interaction Model for Evaluating Synergy Effects of Combined NSCLC Therapies." Journal of Clinical Medicine 9, no. 6 (June 12, 2020): 1832. http://dx.doi.org/10.3390/jcm9061832.

Full text
Abstract:
This paper introduces a mathematical compartmental formulation of dose-effect synergy modelling for multiple therapies in non small cell lung cancer (NSCLC): antiangiogenic, immuno- and radiotherapy. The model formulates the dose-effect relationship in a unified context, with tumor proliferating rates and necrotic tissue volume progression as a function of therapy management profiles. The model accounts for inter- and intra-response variability by using surface model response terms. Slow acting peripheral compartments such as fat and muscle for drug distribution are not modelled. This minimal pharmacokinetic-pharmacodynamic (PKPD) model is evaluated with reported data in mice from literature. A systematic analysis is performed by varying only radiotherapy profiles, while antiangiogenesis and immunotherapy are fixed to their initial profiles. Three radiotherapy protocols are selected from literature: (1) a single dose 5 Gy once weekly; (2) a dose of 5 Gy × 3 days followed by a 2 Gy × 3 days after two weeks and (3) a dose of 5 Gy + 2 × 0.075 Gy followed after two weeks by a 2 Gy + 2 × 0.075 Gy dose. A reduction of 28% in tumor end-volume after 30 days was observed in Protocol 2 when compared to Protocol 1. No changes in end-volume were observed between Protocol 2 and Protocol 3, this in agreement with other literature studies. Additional analysis on drug interaction suggested that higher synergy among drugs affects up to three-fold the tumor volume (increased synergy leads to significantly lower growth ratio and lower total tumor volume). Similarly, changes in patient response indicated that increased drug resistance leads to lower reduction rates of tumor volumes, with end-volume increased up to 25–30%. In conclusion, the proposed minimal PKPD model has physiological value and can be used to study therapy management protocols and is an aiding tool in the clinical decision making process. Although developed with data from mice studies, the model is scalable to NSCLC patients.
APA, Harvard, Vancouver, ISO, and other styles
28

Hansson, Andreas, Kees Goossens, and Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip." VLSI Design 2007 (April 30, 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.

Full text
Abstract:
Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions introduce message dependencies that affect deadlock properties of the SoC as a whole. Even when NoC and IP dependency graphs are cycle-free in isolation, put together they may still create cycles. Traditionally, SoCs rely solely on request-response protocols. However, emerging SoCs adopt higher-level protocols for cache coherency, slave locking, and peer-to-peer streaming, thereby increasing the complexity in the interaction between the NoC and the IPs. In this paper, we analyze message-dependent deadlock, arising due to protocol interactions between the NoC and the IP modules. We compare the possible solutions and show that deadlock avoidance, in the presence of higher-level protocols, poses a serious challenge for many current NoC architectures. We evaluate the solutions qualitatively, and for a number of designs we quantify the area cost for the two most economical solutions, strict ordering and end-to-end flow control. We show that the latter, which avoids deadlock for all protocols, adds an area and power cost of 4% and 6%, respectively, of a typical Æthereal NoC instance.
APA, Harvard, Vancouver, ISO, and other styles
29

de Mori, Barbara, Linda Ferrante, Daniela Florio, Elisabetta Macchi, Ilaria Pollastri, and Simona Normando. "A Protocol for the Ethical Assessment of Wild Animal–Visitor Interactions (AVIP) Evaluating Animal Welfare, Education, and Conservation Outcomes." Animals 9, no. 8 (July 25, 2019): 487. http://dx.doi.org/10.3390/ani9080487.

Full text
Abstract:
Due to the popularity of wild animal–visitor interactions (AVIs), there is a need for an ethical assessment of their impact on animal welfare, education, and conservation. The protocol presented in this study is designed to evaluate such interactions on an integrated level, using a transparent analysis of all the aspects involved, including all the stakeholders and the potential conflicts of values. The protocol consists of a six-step process encompassing dedicated data acquisition and a specific ethical assessment. When the protocol was applied to assess a “giraffe feeding” interaction, steps devoted to data acquisition found that animal welfare risks were low, and that visitors described giraffes with emotionally linked descriptors more often after the interaction. The net promoter score, which refers to how likely visitors would recommend to a friend to join the animal–visitor interaction, was 74%. The subsequent ethical assessment, which consisted of a comparison of the results of the previous steps with an ethical matrix highlighting the ideal situation for all stakeholders’ interests, allowed the overall identification of the ethical concerns entailed by the interaction. A final ethical checklist of the examined AVI had a “yes” in entries regarding animal welfare, emotional, and conservation mindedness outcomes and ethical assessment.
APA, Harvard, Vancouver, ISO, and other styles
30

Salvucci, Dario D., and John R. Anderson. "Automated Eye-Movement Protocol Analysis." Human–Computer Interaction 16, no. 1 (March 2001): 39–86. http://dx.doi.org/10.1207/s15327051hci1601_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Singh, Munindar, and Amit Chopra. "Clouseau: Generating Communication Protocols from Commitments." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 7244–52. http://dx.doi.org/10.1609/aaai.v34i05.6215.

Full text
Abstract:
Engineering a decentralized multiagent system (MAS) requires realizing interactions modeled as a communication protocol between autonomous agents. We contribute Clouseau, an approach that takes a commitment-based specification of an interaction and generates a communication protocol amenable to decentralized enactment. We show that the generated protocol is (1) correct—realizes all and only the computations that satisfy the input specification; (2) safe—ensures the agents' local views remain consistent; and (3) live—ensures the agents can proceed to completion.
APA, Harvard, Vancouver, ISO, and other styles
32

Kušej, Nina Gala. "Music as a protocol element." Musicological Annual 53, no. 1 (June 23, 2017): 267–70. http://dx.doi.org/10.4312/mz.53.1.267-270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

ZHANG, WEIFANG, DA-CHUANG LI, WEI XIONG, CUI-PING XU, HAO QIU, and DI BAO. "ENTANGLEMENT CONCENTRATION WITH CROSS-KERR NONLINEARITY." International Journal of Modern Physics B 28, no. 05 (February 6, 2014): 1450010. http://dx.doi.org/10.1142/s0217979214500106.

Full text
Abstract:
We propose a protocol for realizing two entanglement concentration scheme with cross-Kerr nonlinearity and double cross-phase modulation method. In our protocols, two remote parties do not require the accurate information of the less entangled state and the double cross-phase modulation is introduced to overcome the errors caused by the imperfect Kerr interaction. By this way, a single-photon entanglement is concentrated, and a three-photon polarized GHZ state is also achieved. Furthermore this protocol can be scaled to multiphoton polarized GHZ state concentration and the giant Kerr media is not needed, which makes our protocols more feasible in experiment.
APA, Harvard, Vancouver, ISO, and other styles
34

Benatia, Imene, Mohamed Ridda Laouar, Sean B. Eom, and Hakim Bendjenna. "Incorporating the Negotiation Process in Urban Planning DSS." International Journal of Information Systems in the Service Sector 8, no. 2 (April 2016): 14–29. http://dx.doi.org/10.4018/ijisss.2016040102.

Full text
Abstract:
Cooperation in multi-agent systems is necessary in order to perform complex tasks and lead Multi-agent System (MAS) towards its objective. Contract-Net Protocol (CNP) is one of the communication and coordination mechanisms used by multi-agent systems which prefer cooperation through interaction protocols. This paper proposes a new cooperation and negotiation protocol based on the principals of the Contact Net Protocol (CNP). The auhtors' suggested negotiation protocol is used to solve one of the problems in the context of the city planning which is the problem of election of urban projects. Their proposed protocol is intended to the decision makers in order to help them resolve the problem of the evaluation and the selection of the best urban project without the need to be together in a decision urban room.
APA, Harvard, Vancouver, ISO, and other styles
35

Zhou, Luying, Pat S. Y. Chan, and R. Radhakrishna Pillai. "Effect of TCP/LLC protocol interaction in GPRS networks." Computer Communications 25, no. 5 (March 2002): 501–6. http://dx.doi.org/10.1016/s0140-3664(01)00370-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Su, H. T., K. W. Chan, and L. A. Snider. "Parallel interaction protocol for electromagnetic and electromechanical hybrid simulation." IEE Proceedings - Generation, Transmission and Distribution 152, no. 3 (2005): 406. http://dx.doi.org/10.1049/ip-gtd:20049019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Jules, Guiovanni D., Mozafar Saadat, and Salman Saeidlou. "Holonic Ontology and Interaction Protocol for Manufacturing Network Organization." IEEE Transactions on Systems, Man, and Cybernetics: Systems 45, no. 5 (May 2015): 819–30. http://dx.doi.org/10.1109/tsmc.2014.2387099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Sinjari, Bruna, Gianmaria D’Addazio, Giovanna Murmura, Giorgio Di Vincenzo, Mario Semenza, Sergio Caputi, and Tonino Traini. "Avoidance of Interaction between Impression Materials and Tooth Surface Treated for Immediate Dentin Sealing: An In Vitro Study." Materials 12, no. 20 (October 22, 2019): 3454. http://dx.doi.org/10.3390/ma12203454.

Full text
Abstract:
Immediate dentin sealing (IDS) is an advantageous approach for realizing adhesive restorations, but it interferes with the polymerization of impression material due to the oxygen-inhibition layer (OIL), which leaves residues of impression material on the teeth. The aim of this study is to identify a clinical surface cleaning protocol after IDS in order to achieve defect-free impressions. Sixty extracted human teeth were cut to expose fresh dentin and the IDS protocol was performed. Samples were divided into six groups where different surface cleaning protocols were made before taking impressions: G1S and G1P groups, IDS and silicone (S) or polyether (P) impressions; G2S and G2P, treatment with prophy paste and impressions; G3S and G3P, final cleaning phase with surfactant agent and impressions. Teeth were evaluated with a scanning electron microscope to identify the areas (expressed in mm2) where residual impression material was present. The results demonstrate a reduction of residues in the G2 groups and the total disappearance in G3 groups with statistically significant differences between them. Superficial cleaning protocols with the prophy paste and surfactant agent lead to the elimination of the interaction with impression materials and OIL. These results suggest a safe clinical protocol for obtaining defect-free impressions after IDS.
APA, Harvard, Vancouver, ISO, and other styles
39

Frost, Lori, and Joy Silverman McGowan. "Strategies for Transitioning From PECS to SGD. Part I: Overview and Device Selection." Perspectives on Augmentative and Alternative Communication 20, no. 4 (December 2011): 114–18. http://dx.doi.org/10.1044/aac20.4.114.

Full text
Abstract:
Abstract The Picture Exchange Communication System (PECS) is used to systematically teach functional communication through an evidence-based protocol. As a low-tech AAC system, PECS differs from many treatment protocols in that the learner must give a picture or a sequence of pictures to a communicative partner, thus ensuring social approach and interaction. Students who have mastered Phase IV of the PECS protocol and use a large, categorized vocabulary and sentence structure are candidates for transition to a speech generating devise (SGD). When choosing the SGD, the transition team has an ethical responsibility to ensure that the PECS user does not lose current communication abilities, such as independent access, initiation and efficiency of interactions, and sentence structure and length across environments. With careful assessment of SGD features, the clinician can select a device to replicate current PECS skills and allow for language growth. The use of relevant training strategies from the PECS protocol will help the clinician ensure a successful transition to and use of the SGD.
APA, Harvard, Vancouver, ISO, and other styles
40

Kirsch, Rebecca, V. Janett Olzog, Sonja Bonin, Christina E. Weinberg, Heike Betat, Peter F. Stadler, and Mario Mörl. "A streamlined protocol for the detection of mRNA–sRNA interactions using AMT-crosslinking in vitro." BioTechniques 67, no. 4 (October 2019): 178–83. http://dx.doi.org/10.2144/btn-2019-0047.

Full text
Abstract:
Until recently, RNA–RNA interactions were mainly identified by crosslinking RNAs with interacting proteins, RNA proximity ligation and deep sequencing. Recently, AMT-based direct RNA crosslinking was established. Yet, several steps of these procedures are rather inefficient, reducing the output of identified interaction partners. To increase the local concentration of RNA ends, interacting RNAs are often fragmented. However, the resulting 2′,3′-cyclic phosphate and 5′-OH ends are not accepted by T4 RNA ligase and have to be converted to 3′-OH and 5′-phosphate ends. Using an artificial mRNA/sRNA pair, we optimized the workflow downstream of the crosslinking reaction in vitro. The use of a tRNA ligase allows direct fusion of 2′,3′-cyclic phosphate and 5′-OH RNA ends.
APA, Harvard, Vancouver, ISO, and other styles
41

Jayakumar, Geetha, and Gopinath Ganapathi. "Reference Point Group Mobility and Random Waypoint Models in Performance Evaluation of MANET Routing Protocols." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–10. http://dx.doi.org/10.1155/2008/860364.

Full text
Abstract:
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols plays an important role. We compare the performance of two prominent on-demand routing protocols for mobile ad hoc networks: dynamic source routing (DSR), ad hoc on-demand distance vector routing (AODV). A detailed simulation model with medium access control (MAC) and physical layer models is used to study the interlayer interactions and their performance implications. We demonstrate that even though DSR and AODV share similar on-demand behavior, the differences in the protocol mechanisms can lead to significant performance differentials. In this paper, we examine both on-demand routing protocols AODV and DSR based on packet delivery ratio, normalized routing load, normalized MAC load, average end-to-end delay by varying the node density, network loading, and mobility variations for reference point group mobility and random waypoint models. This framework aims to evaluate the effect of mobility models on the performance of mobile ad hoc networks (MANETs) routing protocols. Our results show that the protocol performance may vary drastically across mobility models and performance rankings of protocols may vary with the mobility models used. This effect can be explained by the interaction of the mobility characteristics with the connectivity graph properties.
APA, Harvard, Vancouver, ISO, and other styles
42

Díaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.

Full text
Abstract:
El objeto de este trabajo es analizar el Protocolo Familiar, estudiando su concepto, naturaleza jurídica y eficacia, su contenido, publicidad y desarrollo. El protocolo familiar es un instrumento jurídico que pretende organizar la relación entre la familia y la empresa, separando ambas realidades y, especialmente, trata de planificar adecuadamente la sucesión de la empresa familiar. Se trata de reflexionar sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las Sociedades Familiares.<br /><br /><br />The object of this work is to analyze the Family Protocol, studying his concept, juridical nature and effectiveness, his content, advertising and development. The family protocol is a legal instrument that, intends to organize the interaction between a family and their family-owned business, separating both realities and, specially, it tries to plan adequately the succession of the family business. It is a question of thinking about the Spanish Royal decree 171/2007, of February 9rd, by which there is regulated the advertising of the family protocols in the Familiar Companies.<br />
APA, Harvard, Vancouver, ISO, and other styles
43

Fajardo-Flores, Silvia, J. R. G. Pulido, and María Andrade-Aréchiga. "Keyboard-Based Protocol for Typing Algebraic Expressions." Interacting with Computers 32, no. 1 (January 2020): 52–65. http://dx.doi.org/10.1093/iwcomp/iwaa004.

Full text
Abstract:
Abstract Writing mathematical contents on digital format is more common every day. The usual method is to use WYSIWYG (What You See Is What You Get) equation editors included in mainstream text editors. However, this method requires a good deal of interaction with formula templates and the use of a pointing device. While this type of equation editors is accessible to users without visual disabilities, they present barriers for users with visual disability (UWVDs). Keyboard-based equation editors should promote not only inclusion but also an acceptable performance for sighted and non-sighted users. In this article, we analyze the efficiency of the typing protocol of the Algebra Editor, an accessible keyboard-based equation editor prototype, with sighted users. Results suggest that the protocol allows typing approximately 60 characters per minute. We also analyze the type and frequency of errors made by participants and suggest improvements to the protocol, derived from the findings. These results can be used as a reference to compare the efficiency of the protocol with non-sighted users and with other equation editors in future studies.
APA, Harvard, Vancouver, ISO, and other styles
44

Baranski, Erica, Ernest Baskin, Sean Coary, Charles R. Ebersole, Lacy E. Krueger, Ljiljana B. Lazarević, Jeremy K. Miller, et al. "Many Labs 5: Registered Replication of Shnabel and Nadler (2008), Study 4." Advances in Methods and Practices in Psychological Science 3, no. 3 (September 2020): 405–17. http://dx.doi.org/10.1177/2515245920917334.

Full text
Abstract:
Shnabel and Nadler (2008) assessed a needs-based model of reconciliation suggesting that in conflicts, victims and perpetrators have different psychological needs that when satisfied increase the chances of reconciliation. For instance, Shnabel and Nadler found that after a conflict, perpetrators indicated that they had a need for social acceptance and were more likely to reconcile after their sense of social acceptance was restored, whereas victims indicated that they had a need for power and were more likely to reconcile after their sense of power was restored. Gilbert (2016), as a part of the Reproducibility Project: Psychology (RP:P), attempted to replicate these findings using different study materials but did not find support for the original effect. In an attempt to reconcile these discrepant findings, we conducted two new sets of replications—one using the RP:P protocol and another using modified materials meant to be more relatable to undergraduate participants. Teams from eight universities contributed to data collection ( N = 2,738). We did find moderation by protocol; the focal interaction from the revised protocol, but not from the RP:P protocol, replicated the interaction in the original study. We discuss differences in, and possible explanations for, the patterns of results across protocols.
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.

Full text
Abstract:
Industrial control protocol is the basis of communication and interaction of industrial control system, and its security is related to the whole industrial infrastructure. Because many industrial control systems use proprietary protocols, it is necessary to adopt protocol reverse analysis technology to parse them and then detect whether there are secure vulnerabilities in the protocols by means of fuzzy testing. However, most of the existing technologies are designed for common network protocols, and there is no improvement for industrial control protocol. Therefore, we propose a multistage ensemble reverse analysis method, namely, MSERA, which fully considers the design concept of industrial control protocols. MSERA divides the traditional reverse analysis process into three stages and identifies the fields with different semantic characteristics in different stages and combines with field rectification to effectively improve the results of reverse analysis of industrial control protocols. Through the experimental comparison of some public and proprietary industrial control protocols, it is found that MSERA not only outperforms Netzob in the accuracy of field split but also far exceeds Netzob in semantic recognition accuracy. The experimental results show that MSERA is very practical and suitable for reverse analysis of industrial control protocols.
APA, Harvard, Vancouver, ISO, and other styles
46

Shebilske, Wayne L., Jeffrey A. Jordan, Barry P. Goettl, and Leigh E. Paulus. "Observation versus Hands-on Practice of Complex Skills in Dyadic, Triadic, and Tetradic Training-Teams." Human Factors: The Journal of the Human Factors and Ergonomics Society 40, no. 4 (December 1998): 525–40. http://dx.doi.org/10.1518/001872098779649319.

Full text
Abstract:
We saved trainer time and resources by reducing hands-on practice in training-team protocols without reducing computer-based learning. During 1-h sessions, young adults learned Space Fortress, a video task that has been employed during pilot training. Observers (Experiment 1) learned more in 3 sessions than did test-only trainees. Individuals, dyads, triads, and tetrads (Experiment 2) learned in 3 sessions with no differences in learning or interaction between learning and protocol. Individuals, dyads, and tetrads (Experiment 3) learned in 10 sessions with no differences in learning or interaction between learning and protocol. As predicted by social learning theory, observational learning seems to compensate for hands-on practice efficiently and effectively. Applications of this research have been developed for computer-based group training of airline and air force pilots.
APA, Harvard, Vancouver, ISO, and other styles
47

Shao, Zhi Yi, and Bo Yang. "Private Set Intersection via Searchable Encryption against Malicious Adversaries." Advanced Materials Research 1049-1050 (October 2014): 1812–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1812.

Full text
Abstract:
Shao et al. proposed a novel method for computing private set intersection based on searchable encryption. Compared with the traditional protocols, their technique requires much less computation for the client to obtain the intersection. Concretely, the client only computes m (the cardinality of the client’s input set) multiplications, m hashes, and one modular exponentiation. However, their protocol only satisfies security against semi-honest behaviors. In this paper, we aim to promote the security of Shao et al.’s protocol. Our solution woks in the CRS model, and is based on the non-interactive zero knowledge proof and the succinct non-interactive argument. The proposed protocol satisfies security against malicious adversaries and needs only one round interaction.
APA, Harvard, Vancouver, ISO, and other styles
48

Clark, Timothy. "Halogen bonds and σ-holes." Faraday Discuss. 203 (2017): 9–27. http://dx.doi.org/10.1039/c7fd00058h.

Full text
Abstract:
The models behind simple bonding theory and the origins of some components often proposed to be involved in weak intermolecular bonds are described with special reference to σ-hole bonding, of which halogen bonds are a subset. A protocol for the analysis of weak intermolecular interactions is proposed on the basis of sound physical principles. This protocol uses three different levels of interaction; “permanent” Coulomb interactions between unperturbed monomers, relaxed Coulomb interactions and dispersion. Of the three, only dispersion is not a real, measurable quantity. It is, however, included in order to describe interactions that cannot be treated entirely by the first two levels.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Xiong, Wei Pu, Wei Zhang, and Xiaodong Zhao. "A new paradigm of modeling for military industrial logistics agent interaction protocol: Command interaction diagram." Computers & Industrial Engineering 157 (July 2021): 107347. http://dx.doi.org/10.1016/j.cie.2021.107347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ashkenazi, Shaked, Alexander Plotnikov, Anat Bahat, and Rivka Dikstein. "Effective cell-free drug screening protocol for protein-protein interaction." Analytical Biochemistry 532 (September 2017): 53–59. http://dx.doi.org/10.1016/j.ab.2017.05.030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography