-
2007Wassim Ayadi,
A Novel Parallel Boolean Approach for Discovering Frequent Itemsets
Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007) Pages 297-302, IEEE, 2007
Abstract
ships among sets of items is an important problem in data mining. Finding frequent itemsets is computationally the most expensive step in a association rules discovery algorithms. Therefore, it has grasped significant research focus. Most of the previous studies adopt Apriori-like algorithms, whom iteratively generate candidate itemsets and check their frequencies in the database. These approaches suffer from serious costs of repeated passes over the database. To address this problem, we propose a new parallel method, called PARALLELTREESUPBDD-MINE, for reducing cost time to find frequent itemset discovery algorithms. The idea of PRALLELTREESUPBDD-MINE consists in using a Binary De- cision Diagram (BDD) and a prefix tree for representing both database and frequent itemsets. The proposed method requires only one scan over the source database to create the associated tree and BDD and to check discovered itemset supports. The originality of our work stands on the fact that the proposed algorithm extracts in a parallel manner the frequent itemsets directly from the TREESUPBDD. We have tested our algorithm using different benchmark datasets and we have obtained good results. Keywords: Data mining, Association rules, Frequent itemsets, Binary decision diagram, Parallel data mining.
Mohamed Hmiden, Lamjed Ben Said,Multi-agent Simulation for the transshipment problem with a non-negligible transfer lead times and a limited transportation mean capacity
Wirtschaftinformatik Proceedings 2007, 92, 2007
Abstract
We consider a supply chain consisting of n locations replenished at the beginning of each period
by a supplier. These locations may coordinate in order to balance their inventory level through
transshipment. Transshipment is the items transfer from location having an inventory excess to
another in need. The transshipment problem consists to determine the initial inventory level
where a transshipment policy is practiced. In this work, we consider the transshipment problem
characterized by a non-negligible transshipment lead times and a limited transportation mean
capacity. Our aim is to find a transshipment policy that reduces the inventory costs and improve
the customer fill-rates. To realize this aim, we proposed a new formal transshipment model in
which the period is divided into a set of sub-periods and the transshipment decision is made at
the end of one of them. We also introduced a multi-agent model allowing to simulate the
cooperated behavior of the inventory locations. -
2006,
Through Personalized Web Service Composition Specification: From BPEL to C-BPEL
Electronic Notes in Theoretical Computer Science, 2006
Abstract
Over the last few years, Web services technologies offered a new and successful way for interoperability among web applications. A Web service is a software system designed in a way that other software components and humans can discover and invoke to satisfy different needs. The vision of WS as a software component allows to combine several WS, providing a global value-added WS, called composite WS.Although there are several researches in web services composition, more effort should be focused on its personalization, particularly regarding how well the composition results correspond to what the user really wants. Accordingly, we present in this paper an approach that may contribute to the personalization of web services composition specification. Our approach is a context-based proposal that makes services composition specification more efficient by taking into account both user context, needs, and preferences and web services context, and by integrating them to the composition process. In addition, to permit the reuse of specifications, we enhance BPEL by developing a specification language based on context to be used in composition that we called C-BPEL. -
2005Lilia Rejeb, ,
An Adaptive Approach for the Exploration-Exploitation Dilemma for Learning Agents
Rejeb, L., Guessoum, Z., M’Hallah, R. (2005)In: Pěchouček, M., Petta, P., Varga, L.Z. (eds) Multi-Agent Systems and Applications IV. CEEMAS 2005. Lecture Notes in Compute, 2005
Abstract
Learning agents have to deal with the exploration-exploitation
dilemma. The choice between exploration and exploitation is very difficult in
dynamic systems; in particular in large scale ones such as economic systems.
Recent research shows that there is neither an optimal nor a unique solution for
this problem. In this paper, we propose an adaptive approach based on meta-rules
to adapt the choice between exploration and exploitation. This new adaptive approach relies on the variations of the performance of the agents. To validate the
approach, we apply it to economic systems and compare it to two adaptive methods: one local and one global. Herein, we adapt these two methods, which were
originally proposed by Wilson, to economic systems. Moreover, we compare different exploration strategies and focus on their influence on the performance of
the agentsHatem Ben Sta, Lamjed Ben Said, , ,Cartographies of Ontology Concepts
In ICEIS (3) (pp. 486-494)., 2005
Abstract
We are interested to study the state of the art of ontologies and to synthesize it. This paper makes a synthesis of definitions, languages, ontology classifications, ontological engineering, ontological platforms and application fields of ontologies. The objective of this study is to cover and synthesize the ontological concepts through the proposition of a whole of cartographies related to these concepts.
-
2004Nadia Ben Azzouna,
Experimental analysis of the impact of peer‐to‐peer applications on traffic in commercial IP networks
European Transactions on Telecommunications, 15: 511-522., 2004
Abstract
To evaluate the impact of peer-to-peer (P2P) applications on traffic in wide area networks, we analyze measurements from a high speed IP backbone link carrying TCP traffic towards several ADSL areas. The first observations are that the prevalent part of traffic is due to P2P applications (almost 80% of total traffic) and that the usage of network becomes symmetric in the sense that customers are not only clients but also servers. This latter point is observed by the significant proportion of long flows mainly composed of ACK segments. When analyzing the bit rate created by long flows, it turns out that the TCP connections due to P2P applications have a rather small bit rate and that there is no evidence for long range dependence. These facts are intimately related to the way P2P protocols are running. We separately analyze signaling traffic and data traffic. It turns out that by adopting a suitable level of aggregation, global traffic can be described by means of usual tele-traffic models based on M/G/∞ queues with Weibullian service times.
Nadia Ben Azzouna,Charcteristic of ip traffic in commercial wide area networks
Proceedings of the International Conference on Computing, Communcations and Control Technologies (CCCT’2004), Austin, Texas (TX), 2004
Abstract
Measurements from an Internet backbone link carrying TCP traf
f
ic towards different ADSL areas are analyzed in this paper. For
traffic analysis, we adopt a flow-based approach and the popular
mice/elephants dichotomy. The originality of the experimental
data reported in this paper, when compared with previous mea
surements from very high speed backbone links, is in that com
mercial traffic comprises a significant percentage due to peer-to
peer applications. This kind of traffic exhibits some remarkable
properties in terms of mice, elephants and bit rates, which are
thoroughly described in this paper. Mice due to p2p protocols and
mice due to classical Internet applications such as HTTP, ftp, etc.
are analyzed separately. It turns out that by adopting a suitable
level of aggregation, global traffic can be described by means of
usual tele-traffic models based on M/G/∞ queues with Weibul
lian service times. The global bit rate can be approximated by the
superposition of Gaussian processes perturbed by a white noise
and does not exhibit long range dependence., Nadia Ben Azzouna,IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm
Freire, M.M., Chemouil, P., Lorenz, P., Gravey, A. (eds) Universal Multiservice Networks. ECUMN 2004. Lecture Notes in Computer Science, vol 3262. Springer, Berlin, Heidelberg., 2004
Abstract
By distinguishing long and short TCP flows, we address in this paper the problem of efficiently computing the characteristics of long flows. Instead of using time consuming off-line flow classification procedures, we investigate how flow characteristics could directly be inferred from traffic measurements by means of digital signal processing techniques. The proposed approach consists of classifying on the fly packets according to their size in order to construct two signals, one associated with short flows and the other with long flows. Since these two signals have intertwined spectral characteristics, we use a blind source separation technique in order to reconstruct the original spectral densities of short and long flow sources. The method is applied to a real traffic trace captured on a link of the France Telecom IP backbone network and proves efficient to recover the characteristics of long and short flows.
, Lilia Rejeb,Using adaptive multi-agent systems to simulate economic models
Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004., New York, NY, USA, 2004, pp. 68-75., 2004
Abstract
Economic markets are complex systems. They are characterized by a large and dynamic population of firms. To deal with this complexity, we propose an adaptive multiagent system which models a set of firms in competition with each other within a shared market. The firms are represented by agents; each firm is represented by an adaptive agent. We show the advantages of adaptive agents to represent firms. Moreover, we underline the limits of the economic models which account for the firms only and ignore the organizational forms. We propose a new adaptive multiagent model that includes the organizational forms into the economic models. We simulate this model and discuss its advantages.
-
2003Nadia Ben Azzouna,
Analysis of ADSL traffic on an IP backbone link
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489), 2003
Abstract
Measurements from an Internet backbone link carrying TCP traffic towards different ADSL areas are analyzed. For traffic analysis, we adopt a flow based approach and the popular mice/elephants dichotomy, where mice refer to short traffic transfers and elephants to long transfers. The originality of the reported experimental data, when compared with previous measurements from very high speed backbone links, is that the commercial traffic includes a significant part generated by peer-to-peer applications. This kind of traffic exhibits some remarkable properties in terms of mice and elephants, as we describe. It turns out that by adopting a suitable level of aggregation, the bit rate of mice can be described by means of a Gaussian process. The bit rate of elephants is smoother than that of mice and can also be well approximated by a Gaussian process.


