In order to select service based on users’ QoS preference,the paper studied and presented several ways to describe QoS preference ***,these ways were applied to the algorithm of service selection,the QoS preference f...
详细信息
In order to select service based on users’ QoS preference,the paper studied and presented several ways to describe QoS preference ***,these ways were applied to the algorithm of service selection,the QoS preference function and user’s satisfaction degree which as an evaluation criteria of user were ***,the paper put forward an algorithm of service selection based on QoS *** tests showed that the algorithm could reliably select the optimal service with a good stability.
The development of computer processor has stepped into the era of multi-core, providing a good chance to spread the parallel discrete event simulation. The parallel programming model and synchronization problem during...
详细信息
ISBN:
(纸本)9781424435692
The development of computer processor has stepped into the era of multi-core, providing a good chance to spread the parallel discrete event simulation. The parallel programming model and synchronization problem during the parallelization of discrete event simulation on multi-core platform were discussed. A parallel discrete event simulator based on multi-core platform was designed and implemented using the optimistic synchronization algorithm. On an HP multi-core server with up to 8 cores, both the overheads of the parallel simulator and the effects of event granularity, process number, lookahead on the simulation performance were tested using the Phold model. The experiment results show that the optimistic parallel discrete event simulation based on multi-core platform could achieve good speedup for simulation applications with coarse-grained events.
Over its lifetime, adaptive software may have to deal with the environment not anticipated during the original development. In such cases, we should introduce new adaptive code, for example, to detect the strange cont...
详细信息
Over its lifetime, adaptive software may have to deal with the environment not anticipated during the original development. In such cases, we should introduce new adaptive code, for example, to detect the strange contexts or update the out-of-date adaptation decision logic. This paper proposes an engineering approach facilitates this kind of post-delivery modifications based on software architecture techniques. Our approach introduces a component model separates different adaptation concerns (sensing, decision and execution) as different types of software architecture elements. The clear separation lays the foundation for the independent maintenance of each concern. And then, with the aid of a container supports the instantiation and run-time modification of the software architecture model, those concerns can be bound together without recompiling the whole software, even while it is running. Our approach enables the fine-grained, low-cost modifications of delivered adaptive software in the case that an unanticipated environment emerges.
The goal of the workshop is to clarify the relationship between business process management and service provisioning. This relatively recent area of interest requires the development of concepts and methods to assist ...
详细信息
The goal of the workshop is to clarify the relationship between business process management and service provisioning. This relatively recent area of interest requires the development of concepts and methods to assist the engineering and the management of service-oriented enterprise architectures and their support systems. Five peer-reviewed papers have been presented during the workshop. They allowed to characterize the strong relationship existing between business process management and service oriented enterprise architecture.
In order to design the image hash from human being's view, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cort...
详细信息
In order to design the image hash from human being's view, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against RST (Rotation, Scale, Translation) attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, approximately determined tamper methods (delete, add, modify) and the original direction of each block. The ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and it is much more effective than the other state of art image hash method.
Semantic Web enables semantic-level processing on real world information, and is often used for context information format in pervasive computing environments. Conventionally, application developers manage Semantic We...
详细信息
ISBN:
(纸本)9781424452095
Semantic Web enables semantic-level processing on real world information, and is often used for context information format in pervasive computing environments. Conventionally, application developers manage Semantic Web data in a general purpose programming language through related APIs. However, such a traditional approach has known drawbacks-the generated code is liable to be spoiled with tedious sequences of method invocations with quite long actual parameters. We propose a simplified way of light-weight Semantic Web data management by suggesting a Java-based script language equipped with new facilities of direct management of RDF (Resource Description Format) data. We expect using this language to yield shorter and less erroneous codes and to accelerate development cycles, in implementing Semantic Web data management software.
With the rapid development of electronic technology, semiconductor section resistivity measurement is receiving increasing attention. This paper applies electrical impedance tomography (EIT) technology to semiconducto...
详细信息
With the rapid development of electronic technology, semiconductor section resistivity measurement is receiving increasing attention. This paper applies electrical impedance tomography (EIT) technology to semiconductor resistivity measurements. FEM is applied to solve the EIT forward problem. Mathematical description of partial differential equation, equivalent variation differential problem, element characteristic matrix and the assembly rule of general matrix are given for calculation. To solve the EIT inverse problem, a new method of image reconstruction algorithm based on RBF neural network is proposed. This method can well adapt to non-linear and ill-posed characteristics of EIT. The simulation experiment results indicate that the RBF algorithm can improve the reconstruction image's quality and the accuracy obviously.
Detecting community structure in complex networks is a challenging problem which has attracted great interest in recent *** this paper,a method called adaptive kernel affinity propagation is proposed to detect communi...
详细信息
Detecting community structure in complex networks is a challenging problem which has attracted great interest in recent *** this paper,a method called adaptive kernel affinity propagation is proposed to detect communities in networks,in which Markov diffusion kernel is transformed to implicitly measure the dissimilarities between different nodes and then adaptive affinity propagation is applied to determine the optimal number of communities and the corresponding membership assignment *** results on both computer-generated and real-world networks demonstrate that adaptive kernel affinity propagation can detect the correct and meaningful communities efficiently.
Chernoff face is a technique of multidimensional data visualization in multivariate *** paper proposes a new method to quantify the overall features of Chernoff faces,and presents a new programmed method for clusterin...
详细信息
Chernoff face is a technique of multidimensional data visualization in multivariate *** paper proposes a new method to quantify the overall features of Chernoff faces,and presents a new programmed method for clustering Chernoff *** this method misjudgment caused by human eyes can be ***,people can further evaluate the samples if the evaluation standard is *** results of the experimental tests indicate that this method is effective and useful.
A good design is key to a successful product. This paper proposes a new method to estimate fault proneness of a class in design phase. Moreover, early estimation of fault proneness leads to early indication and antici...
详细信息
A good design is key to a successful product. This paper proposes a new method to estimate fault proneness of a class in design phase. Moreover, early estimation of fault proneness leads to early indication and anticipation of quality because with each iteration of software development, cost impact of modification and improvement get significantly increased. A fault proneness model for object-oriented software (dFPM) has been proposed, which can be used in early stage of software development life cycle. Relevant metric suit has been quantified, and a multivariate logistic regression model has been set [12]. Proposed model has been validated with the help of hypothesis testing.
暂无评论