期刊文献+

基于AI Planning的Parlay X电信业务设计 被引量:1

AI Planning Based Parlay X Telecom Services Design
下载PDF
导出
摘要 Parlay X是一组电信网络服务(WS)应用程序接口(APIs),智能规划可作为一种WS组合(WSC)方法,所以理论上可基于智能规划设计使用Parlay X APIs的电信业务.但WSC有容错和对动作变化推理的要求,电信业务有多种触发方式和异步响应等特性,智能规划要有确定状态等Parlay X不满足的条件.结合典型Parlay X电信业务模型,基于AI Planning的Parlay X电信业务设计(APBPTSD)方法被提出.APBPTSD用标准后处理动作(SPCA)处理容错,用等待事件动作(WFEA)处理异步响应,用本地动作(LA)处理动作变化推理并对多种触发进行业务分拆.在已有业务上实验表明APBPTSD可有效指导Parlay X电信业务设计. Parlay X is a set of Web Service(WS) application programming interfaces(APIs) for the telecommunication network.AI Planning could be a method for WS Composition(WSC).So theoretically one can design telecom services using Parlay X APIs based on AI planning.However,on one hand,WSC requires the ability of fault tolerance and reasoning about actions or changes and telecom services have properties such as multiple trigger modes and asynchronous responding.On the other hand,classical planning needs deterministic states which Parlay X does not guarantee.Therefore,combining typical Parlay X telecom services models,this paper presents a method called AI Planning based Parlay X Telecom Services Design(APBPTSD).APBPTSD uses standard post-call actions(SPCA) for fault tolerance,wait-for-event actions(WFEA) for asynchronous call-back,local actions(LA) for reasoning about changes,and splits services based on multiple trigger modes.Experiments on existing services show that APBPTSD can effectively guide Parlay X telecom services design.
出处 《计算机学报》 EI CSCD 北大核心 2011年第2期304-317,共14页 Chinese Journal of Computers
关键词 人工智能 智能规划 网络服务组合 PARLAY X artificial intelligence automated planning Web service composition Parlay X
  • 相关文献

参考文献11

二级参考文献98

共引文献30

同被引文献23

  • 1王珏,袁小红,石纯一,郝继刚.关于知识表示的讨论[J].计算机学报,1995,18(3):212-224. 被引量:54
  • 2穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 3诸葛建伟,韩心慧,叶志远,邹维.基于扩展目标规划图的网络攻击规划识别算法[J].计算机学报,2006,29(8):1356-1366. 被引量:17
  • 4年志刚,梁式,麻芳兰,李尚平.知识表示方法研究与应用[J].计算机应用研究,2007,24(5):234-236. 被引量:61
  • 5国家互联网应急中心.中国互联网网络安全报告[DB/0L ]. http://www. cert. org. cn/Userfiles/File/2010%20fet%20half.pdf,2011-4-22.
  • 6James P Anderson Company. Computer Security Threat Moni-toring and Surveillance [R]. Fort Washington, Pennsylvania:James P Anderson Company, 1980.
  • 7Carla P Gomes. Artificial intelligence and operations research:challenges and opportunities in planning and scheduling[ J]. TheKnowledge Engineering Review,2000,15(1) : 1 - 10.
  • 8R Davis,H Shrobe,P Szolovits.What is a knowledge represen-tation[j]. Al Magazine, 14(1): 17 - 33,1993.
  • 9Hornsby K, Egenhofer MJ. Indentity-based change: A founda-tion for spatio-temporal knowledge representation [j]. Interna-tional Journal of Geographical Information Science, 2000, 14(3):207 - 224.
  • 10Raskin RG,Pan MJ. Knowledge representation in the semanticweb for earth and environmental terminology (SWEET) [ J ].Computers & Geosciences,2005,31(9) : 1119 - 1125.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部