International Conference on Computer Systems and Technologies- CompSysTech ’ 2006 Terminol

合集下载

计算机视觉方向的一些顶级会议和期刊

计算机视觉方向的一些顶级会议和期刊

ICCV的全称是International Comference on Computer Vision,正如很多和他一样的名字的会议一行,这样最朴实的名字的会议,通常也是这方面最nb的会议。

ICCV两年一次,与ECCV正好错开,是公认的三个会议中级别最高的。

它的举办地方会在世界各地选,上次是在北京,下次在巴西,2009在日本。

iccv上的文章看起来一般都比较好懂,我是比较喜欢的。

CVPR的全称是Internaltional Conference on Computer Vision and Pattern Recogintion。

这是一个一年一次的会议,举办地从来没有出过美国,因此想去美国旅游的同学不要错过。

正如它的名字一样,这个会上除了视觉的文章,还会有不少模式识别的文章,当然两方面的结合自然也是重点。

ECCV的全称是Europeon Conference on Computer Vision,是一个欧洲的会议。

虽然名字不是International,但是会议的级别不比前面两个差多少。

欧洲人一般比较看中理论,但是从最近一次会议来看,似乎大家也开始注重应用了,oral里面的demo非常之多,演示效果很好,让人赏心悦目、叹为观止。

不过欧洲的会有一个不好,就是他们的人通常英语口音很重,有些人甚至不太会说英文,所以开会和交流的时候,稍微有些费劲。

总的来说,以上三个会议是做计算机视觉人必须关注的会议,建议每一期的oral都要精读,poster调自己相关的仔细看看。

如果有好的进一步的想法,可以马上发表,因为他们已经是最新的了,对他们的改进通常也是最新的。

同时如果你做了类似的工作,却没有引用这些会议的文章,很有可能会被人指出综述部分的问题,因为评审的人一般都是牛人,对这三个会议也会很关注的。

计算机视觉、IP、AI方向的一些顶级会议和期刊Computer VisionConf.:Best: ICCV, Inter. Conf. on Computer VisionCVPR, Inter. Conf. on Computer Vision and Pattern RecognitionGood: ECCV, Euro. Conf. on Comp. VisionICIP, Inter. Conf. on Image ProcessingICPR, Inter. Conf. on Pattern RecognitionACCV, Asia Conf. on Comp. VisionJour.:Best: PAMI, IEEE Trans. on Patt. Analysis and Machine IntelligenceIJCV, Inter. Jour. on Comp. VisionGood: CVIU, Computer Vision and Image UnderstandingPR, Pattern Reco.NetworkConf.:ACM/SigCOMM ACM Special Interest Group of Communication..ACM/SigMetric 这个系统方面也有不少的Info Com 几百人的大会,不如ACM/SIG的精。

(会议管理)CS专业重要国际学术会议

(会议管理)CS专业重要国际学术会议
Middleware
ACM/IFIP/USENIX中间件国际会议
58.
ACMInternational Symposium on Mobile Ad Hoc Networking and Computing
MobiHoc
ACM移动自组织网络与计算国际会议
59.
InternationalConference on MobileSystems,Applications,andServices
ICCCN
计算机通信和网络国际会议
45.
International Conference on Distributed Computing Systems
ICDCS
分布式计算系统国际会议
46.
IEEEInternational Conference on Data Engineering
ICDE
IEEE数据工程国际会议
EUROCRYPT
加密技术的理论与应用国际会议
37.
The AnnualConference of the European Association for Computer Graphics
Eurographics
计算机图形学欧洲协会年度会议
38.
ACMEUROSYSConference
EUROSYS
11.
International Conference on Computer Vision
ICCV
计算机视觉国际会议
12.
IEEE International Conference on Network Protocols
ICNP
IEEE网络协议国际会议
13.
IEEE International Conference on Computer Communication

重邮科技处对于论文期刊级别的认定文件

重邮科技处对于论文期刊级别的认定文件

学科 综合
中国科学 科学通报
刊名
理学
数学学报、物理学报、力学学报、地球物理学报
工学
电子学报、通信学报、电子与信息学报、软件学报、计算机 学报、中国激光、自动化学报、机械工程学报、仪器仪表学 报、生物化学与生物物理进展
重庆邮电大学认定的自然科学类 B 类权威期刊
学科
刊名
理学
中国物理快报、化学学报、高等学校化学学报、物理化学学 报、高分子学报、应用数学学报、数学年刊
29 INFORMS (管理科学与运筹学国际会议)
30 ICIS(International Conference on Information Systems,信息系统国际会议) IEEE/SMC(IEEE Conference on Systems, Man and Cybernetics,系统工程
讨会)
STOC (ACM Symposium on Theory of Computing ,ACM 国际计算理论学术 研讨会) FOCS (IEEE Symposium on Foundations of Computer Science,IEEE 国际计 算机科学基础学术研讨会) FSE (ACM Conference on the Foundations of Software Engineering,ACM 国 际软件工程基础学术会议)
26 IBC(International Botanical Congress,国际植物学大会)
27 IEEE-EMBS(IEEE-生物医学工程学会国际学术年会)
28
IUBMB(The International Union of Biochemistry and Molecular Biology,国 际生物化学与分子生物学联盟会议)

国内外各领域顶级学术会议大全

国内外各领域顶级学术会议大全
文案大全
实用标准文档
序号 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
刊物名称(以期刊名称的拼音为序) 总被引频次
电子学报(英文版、中文版)
中文版 1676
高技术通讯(英文版、中文版) 计算机辅助设计与图形学学报 计算机工程 计算机集成制造系统 J COMPUT SCI & TECH 计算机学报 计算机研究与发展 计算数学(英) 科学通报(英文版、中文版) 模式识别与人工智能 软件学报 系统仿真学报 系统工程理论与实践
数学类第 4 名 综合类第 1 名
计算机类第 10 名 计算机类第 2 名 电子类第 7 名 信息类第 7 名 信息类第 3 名 计算机类第 16 名
综合类第 10 名
计算机类第 7 名 计算机类第 6 名
综合类第 11 名
计算机类第 9 名 计算机类第 18 名 计算机类第 20 名 计算机类第 21 名
28 IEEE/ACM Design Automation Conference
国际计算语言学会年会,是本领域最权威的国际学术会 议之一,每年举办一次 计算语言学会议,也是本领域最权威的国际学术会议之 一,两年一次 是语音和声学信号处理领域最权威的国际学术会议之 一,也是图像、视频信号处理领域的权威会议之一,每 年举办一次 自然语言处理亚洲联盟主办的国际会议,是自然语言处 理领域亚洲区域最有影响的学术会议,基本是每年举办 一次
网络测量领域顶级的专业会议
网络测量
下一代互联网研究 rank1
中心
12 ICCV: IEEE International Conference on
Computer Vision
领域顶级国际会议,录取率 20%左右,2 年一次,中国 计算机视觉,模式

电子信息领域学术会议分级目录

电子信息领域学术会议分级目录

电子信息领域学术会议分级目录随着科技发展,电子信息领域的学术会议也越来越多。

在海量的学术会议中,如何筛选出对自己的研究有帮助的会议成为了每个研究人员都必须面对的问题。

本文将为大家介绍电子信息领域常见的学术会议分级目录。

一、顶级会议一般来讲,顶级会议具有国际影响力和权威性,其论文接收率极低,一般不超过20%。

这类会议的论文质量高,容量大,能吸引国内外专家前来参会。

电子信息领域的顶级会议有:IEEE International Conference on Computer Vision(ICCV)、Conference on Computer Vision and Pattern Recognition(CVPR)、IEEE International Conference on Robotics and Automation(ICRA)、International Conference on Machine Learning(ICML)。

二、重要会议重要会议在电子信息领域较为活跃,论文接收率在30%~50%,对于大部分学者而言,选择参加这类会议是较为明智的选择。

重要会议通常会邀请权威学者发表主题演讲,展示最前沿的科研成果。

电子信息领域的重要会议包括: Asian Conference on Computer Vision (ACCV)、IEEE Conference on Computer Communications (INFOCOM)、International Conference on Data Mining (ICDM)、International Joint Conference on Artificial Intelligence (IJCAI)。

三、普通会议普通会议绝大部分为本地或地区性质较强的学术会议,成果难以在国际学术界产生很大影响。

但是,普通会议通常为研究人员提供了一个相对成熟的交流机制,也为他们展示和发表研究成果提供了一个很好的平台。

体系结构顶会

体系结构顶会

体系结构顶会随着计算机技术的不断进步与发展,计算机体系结构的研究变得越来越重要。

体系结构顶会是计算机体系结构领域里最具权威性的会议之一,每年都会吸引来自世界各地的科研人员和学者参加。

在这篇文章中,我将介绍一下体系结构顶会的一些信息。

体系结构顶会(The International Symposium on Computer Architecture,简称ISCA)是由计算机体系结构学会(ACM SIGARCH)主办的、历史最悠久、最具权威性的计算机体系结构会议之一。

ISCA自1973年至今已经成功举办了47届,是计算机体系结构领域的重要盛会之一。

二、ISCA有哪些特点?1.精选论文ISCA的论文要经过严格的筛选程序,只选取最具有代表性、最具有前瞻性的研究论文。

在ISCA会议上发表论文,需要通过两轮评审,主要评估的是论文的原创性和科学性。

2.高水平报告ISCA吸引了众多国际上计算机体系结构领域的知名学者和研究人员,这些专家将为参会者们带来高水平的报告,展示最新的技术动态和发展方向。

3.开放性交流ISCA会议以开放性的交流为主,各参会人员可以互相学习、交流、讨论。

此外,ISCA 还提供了丰富的报告展示和互动机会,能够为参会人员提供更多的学术交流平台。

三、ISCA的主要议题1.单芯片多处理器(CMP)计算机体系结构2.存储系统体系结构3.高效能可扩展的流处理器体系结构4.功率,功率管理和动力学5.软件和编译器优化技术6.可扩展多核计算机体系结构7.可编程体系结构和可重构计算8.单元操作和指令集体系结构四、ISCA历届会议简介ISCA会议自1973年开始,至今已经举办了47届。

以下是ISCA会议近几年的简介: 1.2020年ISCA时间:2020年5月30日至6月3日地点:美国加利福尼亚州圣地亚哥论文数量:153篇地点:美国西雅图地点:日本津市地点:加拿大多伦多地点:韩国首尔六、总结体系结构顶会是计算机体系结构领域里最权威的会议之一,对于该领域的学者和研究人员具有重要的意义。

CCF推荐的国际学术会议和期刊目录修订版发布

CCF推荐的国际学术会议和期刊目录修订版发布

CCF推荐的国际学术会议和期刊目录修订版发布CCF(China Computer Federation中国计算机学会)于2010年8月发布了第一版推荐的国际学术会议和期刊目录,一年来,经过业内专家的反馈和修订,于日前推出了修订版,现将修订版予以发布。

本次修订对上一版内容进行了充实,一些会议和期刊的分类排行进行了调整,目录包括:计算机科学理论、计算机体系结构与高性能计算、计算机图形学与多媒体、计算机网络、交叉学科、人工智能与模式识别、软件工程/系统软件/程序设计语言、数据库/数据挖掘/内容检索、网络与信息安全、综合刊物等方向的国际学术会议及期刊目录,供国内高校和科研单位作为学术评价的参考依据。

目录中,刊物和会议分为A、B、C三档。

A类表示国际上极少数的顶级刊物和会议,鼓励我国学者去突破;B类是指国际上著名和非常重要的会议、刊物,代表该领域的较高水平,鼓励国内同行投稿;C类指国际上重要、为国际学术界所认可的会议和刊物。

这些分类目录每年将学术界的反馈和意见,进行修订,并逐步增加研究方向。

中国计算机学会推荐国际学术刊物(网络/信息安全)一、 A类序号刊物简称刊物全称出版社网址1. TIFS IEEE Transactions on Information Forensics andSecurity IEEE /organizations/society/sp/tifs.html2. TDSC IEEE Transactions on Dependable and Secure ComputingIEEE /tdsc/3. TISSEC ACM Transactions on Information and SystemSecurity ACM /二、 B类序号刊物简称刊物全称出版社网址1. Journal of Cryptology Springer /jofc/jofc.html2. Journal of Computer SecurityIOS Press /jcs/3. IEEE Security & Privacy IEEE/security/4. Computers &Security Elsevier http://www.elsevier.nl/inca/publications/store/4/0/5/8/7/7/5. JISecJournal of Internet Security NahumGoldmann. /JiSec/index.asp6. Designs, Codes andCryptography Springer /east/home/math/numbers?SGWID=5 -10048-70-35730330-07. IET Information Security IET /IET-IFS8. EURASIP Journal on InformationSecurity Hindawi /journals/is三、C类序号刊物简称刊物全称出版社网址1. CISDA Computational Intelligence for Security and DefenseApplications IEEE /2. CLSR Computer Law and SecurityReports Elsevier /science/journal/026736493. Information Management & Computer Security MCB UniversityPress /info/journals/imcs/imcs.jsp4. Information Security TechnicalReport Elsevier /locate/istr中国计算机学会推荐国际学术会议(网络/信息安全方向)一、A类序号会议简称会议全称出版社网址1. S&PIEEE Symposium on Security and Privacy IEEE /TC/SP-Index.html2. CCSACM Conference on Computer and Communications Security ACM /sigs/sigsac/ccs/3. CRYPTO International Cryptology Conference Springer-Verlag /conferences/二、B类序号会议简称会议全称出版社网址1. SecurityUSENIX Security Symposium USENIX /events/2. NDSSISOC Network and Distributed System Security Symposium Internet Society /isoc/conferences/ndss/3. EurocryptAnnual International Conference on the Theory and Applications of Cryptographic Techniques Springer /conferences/eurocrypt2009/4. IH Workshop on Information Hiding Springer-Verlag /~rja14/ihws.html5. ESORICSEuropean Symposium on Research in Computer Security Springer-Verlag as.fr/%7Eesorics/6. RAIDInternational Symposium on Recent Advances in Intrusion Detection Springer-Verlag /7. ACSACAnnual Computer Security Applications ConferenceIEEE /8. DSNThe International Conference on Dependable Systems and Networks IEEE/IFIP /9. CSFWIEEE Computer Security Foundations Workshop /CSFWweb/10. TCC Theory of Cryptography Conference Springer-Verlag /~tcc08/11. ASIACRYPT Annual International Conference on the Theory and Application of Cryptology and Information Security Springer-Verlag /conferences/ 12. PKC International Workshop on Practice and Theory in Public Key Cryptography Springer-Verlag /workshops/pkc2008/三、 C类序号会议简称会议全称出版社网址1. SecureCommInternational Conference on Security and Privacy in Communication Networks ACM /2. ASIACCSACM Symposium on Information, Computer and Communications Security ACM .tw/asiaccs/3. ACNSApplied Cryptography and Network Security Springer-Verlag /acns_home/4. NSPWNew Security Paradigms Workshop ACM /current/5. FC Financial Cryptography Springer-Verlag http://fc08.ifca.ai/6. SACACM Symposium on Applied Computing ACM /conferences/sac/ 7. ICICS International Conference on Information and Communications Security Springer /ICICS06/8. ISC Information Security Conference Springer /9. ICISCInternational Conference on Information Security and Cryptology Springer /10. FSE Fast Software Encryption Springer http://fse2008.epfl.ch/11. WiSe ACM Workshop on Wireless Security ACM /~adrian/wise2004/12. SASN ACM Workshop on Security of Ad-Hoc and Sensor Networks ACM /~szhu/SASN2006/13. WORM ACM Workshop on Rapid Malcode ACM /~farnam/worm2006.html14. DRM ACM Workshop on Digital Rights Management ACM /~drm2007/15. SEC IFIP International Information Security Conference Springer http://sec2008.dti.unimi.it/16. IWIAIEEE International Information Assurance Workshop IEEE /17. IAWIEEE SMC Information Assurance Workshop IEEE /workshop18. SACMATACM Symposium on Access Control Models and Technologies ACM /19. CHESWorkshop on Cryptographic Hardware and Embedded Systems Springer /20. CT-RSA RSA Conference, Cryptographers' Track Springer /21. DIMVA SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment IEEE /dimva200622. SRUTI Steps to Reducing Unwanted Traffic on the Internet USENIX /events/23. HotSecUSENIX Workshop on Hot Topics in Security USENIX /events/ 24. HotBots USENIX Workshop on Hot Topics in Understanding Botnets USENIX /event/hotbots07/tech/25. ACM MM&SEC ACM Multimedia and Security Workshop ACM。

计算机TOP40国际学术会议(A、B分类)

计算机TOP40国际学术会议(A、B分类)

计算机TOP40国际学术会议(A、B分类)为提高学术水平、促进国际学术交流,经研究决定,拟将计算机学科国际顶尖学术会议学术论文分为A、B两类,等同于《华中科技大学期刊分类办法》中规定的A、B类期刊。

A、B类国际顶尖学术会议学术论文分类如下:一、A类1. International Conference on Architectural Support for ProgrammingLanguages and Operating Systems (ASPLOS)2. ACM Conference on Computer and Communication Security (CCS)3. USENIX Conference on File and Storage Techniques (FAST)4. International Symposium on High Performance Computer Architecture(HPCA)5. International Conference on Software Engineering (ICSE)6. International Symposium on Computer Architecture (ISCA)7. USENIX Conference on Operating System and Design (OSDI)8. ACM SIGCOMM Conference (SIGCOMM)9. ACM Annual International ACM SIGIR Conference on Research andDevelopment in Information Retrieval (SIGIR)10. International Conference on Management of Data and Symposium onPrinciples of Database Systems (SIGMOD/PODS)11. ACM Symposium on Operating Systems Principles (SOSP)12. Annual ACM Symposium on Theory of Computing (STOC)13. USENIX Annual Technical Conference (USENIX)14. ACM International Conference on Virtual Execution Environments (VEE)15. International Conference on Very Large Data Bases (VLDB)二、B类1. International Conference on Dependable Systems and Networks (DSN)2. IEEE Symposium on Foundations of Computer Science (FOCS)3. IEEE International Symposium on High Performance DistributedComputing (HPDC)4. International Conference on Distributed Computing Systems (ICDCS)5. International Conference on Data Engineering (ICDE)6. IEEE International Conference on Network Protocols (ICNP)7. ACM International Conference on Supercomputing (ICS)8. International Joint Conference on Artificial Intelligence (IJCAI)9. IEEE Conference on Computer Communications (INFOCOM)10. ACM SIGKDD International Conference on Knowledge Discovery and DataMining (KDD)11. Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)12. ACM/IFIP/USENIX International Middleware Conference (Middleware)13. ACM International Conference on Multimedia (MM)14. ACM International Conference on Mobile Systems, Applications, andServices (MobiSys)15. ACM Conference on Programming Language Design and Implementation(PLDI)16. Annual ACM Symposium on Principles of Distributed Computing (PODC)17. ACM Symposium on Principles of Programming Languages (POPL)18. ACM SIGPLAN Symposium on Principles and Practice of ParallelProgramming (PPoPP)19. IEEE Real-Time Systems Symposium (RTSS)20. Supercomputing (SC'XY) Conference21. ACM Conference on Computer Graphics and Interactive Techniques(SIGGRAPH)22. ACM Conference on Measurement and Modeling of Computer Systems(SIGMETRICS)23. IEEE Symposium on Security and Privacy (SP)24. Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA)25. International World Wide Web Conference (WWW)。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Terminology of Nested Simulation ModelsIvan Krivy and Eugene KindlerAbstract: The aim of this paper is to propose a terminology of nested simulation models. The terminology is based on our recently recommended classification of nested simulation, i.e. of simulation of systems containing simulating elements, with respect to three basic criteria (reflectivity, size and depth of nesting). The criteria are explained and supported by giving references to existing implementations of simulation models. The criteria can be combined and confused and, therefore, the real terminology must be limited to the cases that seem to be realistic in the near future.Key words: Simulation, Terminology, Nested models, Reflective models, Anticipatory simulation, Object-oriented programming.INTRODUCTIONLet us start from the explanation of the term nested simulation. Nested simulation is considered to be a simulation of systems containing some simulating elements e.g. computers. We proposed to use the term external models or nesting models for the models of such systems and the term internal models or nested models for the models carried by the simulating elements. The importance of nested simulation is continue to grow, namely because of the following two reasons:1. The modern man-made systems like transport, production and other ones apply computers for so called anticipatory simulation, i.e. simulation existing during real time existence of the system and making possible to inform users and/or automatic control units on the future behavior of the system. As it was shown by Kindler [6], during the design of such a system it is desirable to include the anticipatory simulation into the simulation models that exist before the simulated system is physically realized. This idea was applied for example to transitic systems [1,2] and patient-in bed systems in hospitals [7-9].2. The quality of the simulation programming tools is so high that one can apply them to a so-called fictitious simulation or pseudosimulation [6], i.e. for implementing certain non-simulation-oriented routines by means of simulation models of fictitious system. When such an implementation is used in a man-made system, the simulation model of the fictitious system is nested into the simulation model of the man-made system. Regarding the examples of fictitious simulation, we can mention the Dijkstra-Dahl’s method of computing the shortest path [3]. This method was successfully applied to simulation models of container terminals (see e.g. [1,2,5]).CRITERIA FOR CLASSIFICATION OF NESTED SIMULATION MODELSFirst of all we introduce the following terminological scheme. Let M be an external simulation model of a system S containing a computer C that simulates. It means that M carries an internal model m of a certain system s.For the classification of nested simulation models three basic criteria are proposed: •size of nesting,•depth of nesting,• relation of reflectivity.We can imagine that M contains more than one computer and all the computers simulate. It means that more than one internal model is nested in the external one. The number of nested internal models is said to be the size of nesting. A model without nesting (i.e. conventional simulation model) can be considered to be a model with zero size of nesting. If M contains just one model nested in it, the size of nesting is equal to one. An example of a model with the nesting size two is given in the Fig. 1 using so called the Mejtsky’s diagram (see [10,11]).Not only the external system S can contain a simulating computer but also the internal system s can have a computer that simulates a systemσ, i.e. that carries itsFigure 2: Nested simulation: depth 2, size 1modelμ. Therefore, we can introduce the term depth(level) of nesting. While a conventional simulation without nesting can be considered to be of the depth zero and the simple nesting displayed in Fig. 1 is of the depth one, the example just mentioned is of thedepth one relating to m. This situation is illustrated in Fig. 2, the images of computers carrying models m and μ being denoted by C* and c*, respectively. The natural demand is that since the nesting of m in M is of depth 1 and so that of μ in m, the nesting of μ in M should be viewed as that of depth 2. It is evident that such a nesting can continue in order to get the depth of nesting greater than two. And it is also evident that one can introduce the notion of “relative nesting”, i.e., in the last example, nesting of m relating to M is of depth 1 and so nesting of μrelating to m. The generally sounding statement of nesting without the complement “relating to”, e.g. that in Fig. 2 one meets nesting of depth 2, concerns generally two models m and μ so that μ is nested relating to m and m is nested relating to M, while no model is nested relating to μ.Let m be of the depth one with respect to M. If both M and m concern the same system (model the same object in very similar manner), we can say that the nesting is reflective or that m is reflectively nested in M. (It is evident that in case M and m can be similar one to another but they can never be equivalent – see further). Otherwise, the nesting is said to be non-reflecting. Such a case is met for example, when m is a model of a fictitious system.Figure 3: Nesting treeDISSCUSSION ON THE CRITERIAIn general, the size of nesting is a dynamic value: a simulated system can contain several computers and the function of them is often not limited to simulation. So in the model of the system the number of the nested models varies from zero to a certain maximum value. Naturally the most important and frequent case is that the maximum value is equal to one. However, there are already implemented models that show the depth equal two or more (see e.g. [4]).Therefore, it seems that beside the (dynamic) size concept it is suitable to introduce static size criterion that could be declared as the maximum value of size. In case the situation is clear the adjective static could be omitted.Suppose an example illustrating a general situation, i.e. the situation of a model of the size greater than one and depth as well. Such a model should be characterized by a dynamic tree of depths and sizes like that in Fig. 3, where the natural numbers represent the depths of models to the external one.Therefore it would be suitable to define also the static depth of the model as the maximum depth occurring in it. For the model presented in Fig. 3, the depth would be 5.Nevertheless, the example turns our attention again to the static size of nesting. Should it be three – according to the maximum size (in time) of the models nested directly in the external model – or four (according to the maximum size of nesting in one of the models at level 2), or 22, according to the maximum number of nesting models that can contemporarily occur? A good answer, which might be valid for a long time, is difficult; maybe 4.The concept of reflectivity is not exact. There are some cases of nesting that are evidently non-reflective (e.g. if the nested model concerns a fictitious system), but the question where are limits of reflectivity has no exact answer. The nested models must always differ from the model in which it is nested – otherwise it should contain also aFig. 4: Nesting tree with reflectivitynested model that should also contain a nested model etc. until infinity.When the reflectivity criterion is combined with the other two criteria, other problems arise, namely that a nested model m1 can be reflectively nested to a model M1, while another nested model m2 can not be reflectively nested to M1; possibly m2 can be reflectively nested to another model M2. If we would like to respect the reflectivity exactly, we should introduce the reflective nesting into the tree introduced above. Naturally, such a structure would not be tree more. For example, the tree presented in Fig. 3 would be completed by other – dotted – arrows that represent the reflectivity relation (see Fig. 4).Suppose the case with the depth equal to one and the size greater than one. If we have only one class C of simulating elements (computers) carrying internal models, we get homogeneous models(simulation) because all the internal models belong to the same class C. In case the nesting is reflective, we can speak on homogeneous reflective models(simulation), otherwise the models (simulation) can be considered to be homogeneous non-reflective. Let simulation that is not homogeneous be called non-reflective.A question arises, whether a non-reflective simulation of non-zero depth has a certain importance e.g. in practical applications. An idea arises that in case we could prove that such cases are behind a horizon of a rational interest, we could omit them and our analysis could be limited to the homogeneous cases. The answer speaks against such an idea. There are “commercial” simulation models that are not homogeneous. One of them was applied in the simulation of container terminals at sea harbors [5]. In the case there are two classes C1 and C2 of simulating elements: C1 makes a simulation of a fictitious system, which allows to compute the optimum trace of a ground-moving transport tool inthe labyrinth of free places among the containers, and C2 tests whether the computed trace does not cause a conflict between the given transport tool and another element of the dynamically changing structure of the container yard. While C2 leads to reflective nesting C1 leads to the non-reflective nesting and the alternating of the activities made by those classes must be classified as non-homogeneous nesting (simulation , models ).Suppose a nesting simulation of depth two and size two so that one of the nested model is reflective with respect to the external model, while the other nested model is evidently non-reflective because it concerns a fictitious system. After an extended analysis of certain special but great classes of systems it appeared that both the nested models could be joined into one model; then it is difficult to decide whether this case (see [12]) is reflective simulation or non-reflective one. The arising nesting simulation has interesting and important properties of both reflective and non-reflective simulation. We propose to consider the case to be reflective-plus .CONCLUSIONSFor classifying nesting simulation models, we applied only three criteria that seem to be sufficiently rational, easily implementable and clear at the present days. When taking into account the three basic criteria, it is rather impossible to give short names to all the cases produced by all possible combinations of the criteria. Therefore, we recommend to limit our considerations only to the cases that can be implemented (at least when using SIMULA language), i.e. to the cases with their depth one and two.For nesting simulation of (static) depth one and (static) size one, we propose to use the term simple nesting that covers the terms simple reflective nesting , simple non-reflective nesting and simple reflective-plus nesting .As regards nesting simulation of depth two and size , we recommend to use the term nesting of size n that covers the terms homogeneous reflecting nesting , homogeneous non-reflective nesting and non-homogeneous nesting .1n >For the cases with their depth greater than two, no special terms are so far proposed. Our opinion is that characterizing them by help of trees like in Fig. 3 or even Fig. 4 is the best method.ACKNOWLEDGEMENTThis work was supported by the grant 201/06/0612 of the Czech Grant Agency as well as by the institutional research scheme MSM6198898701.REFERENCES[1] Berruet, P., T. Coudert, E. Kindler. Object-Oriented Reflective Simulation of Transitic Systems. In: The International Workshop on Harbour, Maritime and Multimodal Logistics Modelling & Simulation HMS 2003 (Y. Merkuryev, A. G. Bruzzone, G. Merkuryeva, L. Novitsky, E. Williams , Eds.). Riga : Riga Technical University, 2003, pp. 202-205.[2] Kindler, E., T. Coudert, P. Berruet: Component-Based Simulation for a Reconfiguration Study of Transitic Systems, SIMULATION, 2004, vol. 80, no. 3, pp.153-163.[3] Kindler, E. Simulation of Systems Containing Simulating Elements. In: Modelling and Simulation 1995, Proceedings of the 1995 European Simulation Multiconference. San Diego: Society for Computer Simulation International, pp. 609-613.[4] Blümel, P., E. Kindler. Simulation of Antagonist Mutually Simulating Systems. In: Simulation und Animation '97(O. Deussen and P. Lorenz, Eds.). Erlangen, Ghent, Budapest, San Diego: Society for Computer Simulation International,1997,pp. 56-65.[5] Kindler, E. Nesting Simulation of a Container Terminal Operating With its Own Simulation Model. JORBEL(Belgian Journal of Operations Research, Statistics and Computer Sciences), 2000, vol. 40, no. 3-4, pp. 169-181[6] Kindler, E. Computer Models of Systems Containing Simulating Elements. In: Computing Anticipatory Systems CASYS 2000(Daniel M. Dubois, Ed.). Melville, New York: AIP (American Institute of Physics), 2001, pp. 390-399.[7] Kindler, E., Křivý, I. On the way to reflective simulation of hospitals. In: Proceedings of 4th International Conference Aplimat 2005. Part II. Bratislava: Slovak University of Technology, 2005, pp. 309-314.[8] Křivý, I., E. Kindler. Reflective Simulation of in-Patients Dynamics. In: Proceedings of 5th International Conference Aplimat 2006. Part I. Bratislava: Slovak University of Technology, 2006, pp. 613-617.[9] Křivý, I., E. Kindler. Synthesis of two Anticipatory Models in Design and Life-Cycle of Hospitals. To be printed in the International Journal of Computing Anticipatory Systems 2006.[10] Mejtsky, J., E. Kindler. Diagrams for Quasi-Parallel Sequencing – Part I. SIMULA Newsletter, 1980, vol. 8, no. 3, pp. 46-49.[11] Mejtsky, J., E. Kindler. Diagrams for Quasi-Parallel Sequencing – Part II. SIMULA Newsletter, 1981, vol. 9, no.1, pp. 17-19.[12] Novak, P. Reflective Simulation With Simula and Java. In: Simulation und Visualization 2000 (T. Schulze, V. Hinz, P. Lorenz, Eds.). San Diego – Erlangen – Ghent – Delft:: Society for Computer Simulation International, 2000, pp. 183-196.ABOUT THE AUTHORSProf. Dr. Ivan Křivý, PhD., University of Ostrava, Faculty of Science, Department of Computer Science, Phone: +420 596 160 273, E-mail: ivan.krivy@osu.cz.Prof. Dr. Eugene Kindler, PhD., University of Ostrava, Faculty of Science, Dept. of Mathematics, Phone: +420 596 160 288, E-mail: evzen.kindler@mff.cuni.cz.。

相关文档
最新文档