Along with the development of middleware technology, middleware has been widely used in many applications, especially in banking systems in which a three-layer structure model based on Tuxedo can be used. This model p...
详细信息
This paper presents a method, which performs edge stereo matching at different levels, from significant edges to less significant ones. At each level, the process starts by selecting significant edges with respect to ...
详细信息
ISBN:
(纸本)0780382927
This paper presents a method, which performs edge stereo matching at different levels, from significant edges to less significant ones. At each level, the process starts by selecting significant edges with respect to their gradient magnitude. The selected edges are then matched in order to obtain reference edges from which less significant edges will be matched in the next level. The matching procedure is based on a voting scheme by using local and global constraints. The performance of the proposed stereo matching method is evaluated for real-time obstacle detection in front of a vehicle using linear cameras.
software evolution techniques have been traditionally concentrated on the code level. However, recent researches have shifted the focus of evolution from the code level to the architectural level. In this paper, we pr...
详细信息
ISBN:
(纸本)9780769538594
software evolution techniques have been traditionally concentrated on the code level. However, recent researches have shifted the focus of evolution from the code level to the architectural level. In this paper, we proposed a formal modeling method of dynamic evolution of web-based systems at the architectural level using hypergraph grammars. We represent architectures of web-based systems with hypergraphes, and give out evolution production rules based on hypergraph grammars, and then modeled dynamic evolution of web-based systems at the architectural level according to those rules. A detailed case study is given to demonstrate our approach.
software inspections aim to find defects early in the development process and studies have found them to be effective. However, there is almost no data available regarding the impact of UML diagram utilization in soft...
详细信息
The proceedings contain 39 papers. The topics discussed include: a perspective from the field on high assurance systems;checking modification tolerance;formal specification in collaborative design of critical software...
ISBN:
(纸本)0818692219
The proceedings contain 39 papers. The topics discussed include: a perspective from the field on high assurance systems;checking modification tolerance;formal specification in collaborative design of critical software tools;combining various solution techniques for dynamic fault tree analysis of computer systems;using composition to design secure, fault-tolerant systems;architecture and reliability model of high-assurance systems;log-logistic software reliability growth model;a flexible software architecture for high availability computing;ROAFTS: a middleware architecture for real-time object-oriented adaptive fault tolerance support;system requirements and analysis issues for high assurance systems;software component independence;using classification trees for software quality models: lessons learned;the application of fuzzy enhanced case-based reasoning for identifying fault-prone modules;estimating the number of residual defects;system survivability through security bug tolerance;design for constraint violation detection in safety-critical systems;fault and leak tolerance in firewall engineering;verification in concurrent programming with Petri nets structural techniques;specifying and verifying temporal behavior of high assurance systems using reachability tree logic;and object-oriented software testing - some research and development.
Through comprehensive analysis of software security vulnerability, a novel vulnerability detecting method based on similar characteristic is proposed in this paper. The method aims at C Code security detection. Based ...
详细信息
ISBN:
(纸本)9781424421961
Through comprehensive analysis of software security vulnerability, a novel vulnerability detecting method based on similar characteristic is proposed in this paper. The method aims at C Code security detection. Based on Case-based Reasoning technology, the method performs similarity matching between security characteristic of source code and the characteristic of known security vulnerabilities, and calculates the similarity to determine if the code has security vulnerabilities. The experiments demonstrate that the presented method can effectively improve the veracity and efficiency of vulnerability detection. And it solves the problems that current detecting methods based on rule-matching cannot rapidly and accurately handle the large-scale legacy software and structure-complicated software. Furthermore, the definition and selection of threshold also improves the adaptability and agility of detecting method
In this paper we present our experiences developing two distributed computing applications on NT. In both examples a legacy application is ported from Unix to NT and is then further developed to be a distributed appli...
详细信息
ISBN:
(纸本)1880446294
In this paper we present our experiences developing two distributed computing applications on NT. In both examples a legacy application is ported from Unix to NT and is then further developed to be a distributed application within the NT environment. We shall present two different approaches to managing the remote execution of tasks. One is a port of a serial vibroacoustic analysis code called PAFEC VibroAcoustic and the other is the parallelisation of the non-linear analysis modules of the LUSAS FE analysis package. We shall show in these two projects that it is technically possible to carry out scientific computing on a distributed NT resource.
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system39;s modules and components ...
详细信息
ISBN:
(纸本)9783642191244
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system's modules and components are continuously modified and refined until all constraints are met and the system design is in a stable state. A transaction level model can be used for such a design space exploration in this phase. It is essential that security requirements are considered from the very first beginning. In this work we(1) demonstrate a novel approach how to use meta-information in transaction level models to verify the consistent application of security requirements in embedded systems.
Current techniques for reliability evaluation are based purely upon the single software product itself, and their capability falls beneath most reliability requirements. It is proposed to augment these techniques by e...
详细信息
The transport type metal detector balanced differential transmission coil to detect metal particles. In the process of industrial production, other metal production equipment, transmission belt of steel and other exte...
详细信息
ISBN:
(纸本)9781538604854
The transport type metal detector balanced differential transmission coil to detect metal particles. In the process of industrial production, other metal production equipment, transmission belt of steel and other external factors are influenced by the test. Repeated experiments can reduce the interference, but will affect the production efficiency, this paper provides a more efficient and effective finite element modeling method, greatly shorten the development cycle. First of all, it's introduced the actual experimental system of metal detectors and the geometric model. Then, using the finite element simulation software COMSOL which can build twodimensional modeling method to model the balance coil, analyze the magnetic field and the output current amplitude in order to found the relationships between the amplitude of output current and materials, size, location of the metal objects. Finally, the curves of numerical simulation and practical measure are accomplished. The research results provide some theoretical basis for the design of the metal detector, and have certain application value.
暂无评论