Role-based modeling has been proposed almost 40 years ago as a means to model complex and dynamic domains, because roles are able to capture both context-dependent and collaborative behavior of objects. Unfortunately,...
详细信息
ISBN:
(纸本)9783319112459;9783319112442
Role-based modeling has been proposed almost 40 years ago as a means to model complex and dynamic domains, because roles are able to capture both context-dependent and collaborative behavior of objects. Unfortunately, while several researchers have introduced the notion of roles to modeling and programming languages, only few have captured boththe relational and the context-dependent nature of roles. In this work, we classify various proposals since 2000 and show the discontinuity and fragmentation of the whole research field. To overcome discontinuity, we propose a family of metamodels for role-based modeling languages. Each family member corresponds to a design decision captured in a feature model. In this way, it becomes feasible to generate a metamodel for each role-based approach. this allows for the combination and improvement of the different role-based modeling and programming languages and paves the way to reconcile the research field.
CP2K is a widely used application for atomistic simulation that can execute on a range of architectures. Consisting of more than one million lines of Fortran 95 code, the application is tested for correctness with a s...
详细信息
ISBN:
(纸本)9780769551852
CP2K is a widely used application for atomistic simulation that can execute on a range of architectures. Consisting of more than one million lines of Fortran 95 code, the application is tested for correctness with a set of about 2,500 inputs using a dedicated regression testing environment. CP2K can be built with many compilers and executed on different serial and parallel platforms, thus making comprehensive testing even more challenging. this paper presents an effort to improve the existing testing process of CP2K in order to better support its continuing development. Enhancements have been made to the regression testing environment to support multi-platform testing and a new automated multi-platform testing system has been developed to check the code on a regular basis. Also, tools have been used to gain code coverage information for different test configurations. All the information is aggregated and displayed on the dedicated web page.
the aim of this paper is to present a mathematical approach to support the decision making of distribution center location. We use the LP model to decide the (distribution center) DC's capacity and location with t...
详细信息
ISBN:
(纸本)9781479953721
the aim of this paper is to present a mathematical approach to support the decision making of distribution center location. We use the LP model to decide the (distribution center) DC's capacity and location withthe consideration of delivery time. We find that the "time cost" effects decision of distribution center location significantly and suggest that manager should involve cost of time in their decision making process.
the proceedings contain 27 papers. the topics discussed include: label-bag based graph anonymization via edge addition;verification and code generation for timed transitions in pCharts;software specification and autom...
ISBN:
(纸本)9781450327121
the proceedings contain 27 papers. the topics discussed include: label-bag based graph anonymization via edge addition;verification and code generation for timed transitions in pCharts;software specification and automatic code generation to realize homeostatic adaptation in unmanned spacecraft;classification and generation of grammatical errors;on the dynamic scheduling of task farm patterns on a heterogeneous CPU-GPGPU environment;a robust daily human activity recognition and prediction system;a new conceptual model for dynamic text clustering using unstructured text as a case;FDKeeper: a quick and open failure detector for cloud computing system;binary linear programming-based release planning for multi-tenant business SaaS;a design time estimation methodology for spatial databases;and proposed architecture and algorithm for academic personnel evaluation and decision support making.
Proving termination automatically for programs with explicit pointer arithmetic is still an open problem. To close this gap, we introduce a novel abstract domain that can track allocated memory in detail. We use it to...
详细信息
ISBN:
(纸本)9783319085876;9783319085869
Proving termination automatically for programs with explicit pointer arithmetic is still an open problem. To close this gap, we introduce a novel abstract domain that can track allocated memory in detail. We use it to automatically construct a symbolic execution graph that represents all possible runs of the program and that can be used to prove memory safety. this graph is then transformed into an integer transition system, whose termination can be proved by standard techniques. We implemented this approach in the automated termination prover AProVE and demonstrate its capability of analyzing C programs with pointer arithmetic that existing tools cannot handle.
this paper proposes a bi-gram model based on dynamic programming to Chinese person named entity recognition. By studying the previous work, we concluded that we can improve the precision of NER by improving the recall...
详细信息
Firewall is an integral part of security management. Network speed may vary depending on the efficiency of the firewall. So firewall optimization plays a dominant role in network flow. In this paper, we propose a way ...
详细信息
ISBN:
(纸本)9781450330336
Firewall is an integral part of security management. Network speed may vary depending on the efficiency of the firewall. So firewall optimization plays a dominant role in network flow. In this paper, we propose a way to analyze network traffic and dynamically arrange the firewall rules according to the temporal nature of the traffic. the firewall works in two stages. In the first stage, the firewall uses early rejection technique to filter out known malicious traffic. In the second stage, the firewall uses segmentation based tree search to optimize the overhead of matching incoming packet. Further to make the firewall adapt to dynamic nature of Internet traffic, we define parameters to continuously measure traffic characteristic and rebuild the stages when a threshold is exceeded. the traffic-aware firewall is implemented using C language and validated using real traffic traces. Copyright 2014 ACM.
the proceedings contain 21 papers. the special focus in this conference is on functional Nanomaterials and Devices. the topics include: Transport and photoelectric effects in structures with Ge and SiGe nanoclusters g...
ISBN:
(纸本)9783037859421
the proceedings contain 21 papers. the special focus in this conference is on functional Nanomaterials and Devices. the topics include: Transport and photoelectric effects in structures with Ge and SiGe nanoclusters grown on oxidized Si (001);acoustic phonon and surface roughness spin relaxation mechanisms in strained ultra-scaled silicon films;on the mobility behavior in highly doped junctionless nanowire SOI MOSFETs;high sensitive active MOS photo detector on the local 3D SOI-structure;properties of low-dimentional polysilicon in SOI structures for low temperature sensors;carbon-rich nanostructurated a-SiC on Si heterostructures for field-effect electron emission;hybrid solar cells based on CdS nanowire arrays;formation of ordered Si nanowires arrays on Si substrate;reliability-based optimization of spin-transfer torque magnetic tunnel junction implication logic gates;magnetic resonance and optical study of carbonized silica obtained by pyrolysis of surface compounds;electrical properties of composite films with silicon nanocrystals in the insulating matrix;comparative investigation of structural and optical properties of Si-rich oxide films fabricated by magnetron sputtering;charge trapping in hafnium silicate films with modulated composition and enhanced permittivity;low dislocation density and high mobility GaN layers for DHFET channels grown on high-temperature AlN/AlGaN buffer layer by ammonia MBE;peculiarities of the impurity redistribution under ultra-shallow junction formation in silicon;nanoparticles in antivirus therapy and application of oxidized silicon nanowires for nerve fibers regeneration.
In this paper, we propose a linear programming based interactive method for multiobjective linear programming problems, in which fuzzy coefficients and random variable coefficients are involved in the objective functi...
详细信息
In this paper, we propose a linear programming based interactive method for multiobjective linear programming problems, in which fuzzy coefficients and random variable coefficients are involved in the objective functions simultaneously. In the proposed method, it is assumed that the decision maker has a fuzzy goal for each objective function, and such a fuzzy goal can be quantified by eliciting the membership function. through the possibility measure and a fractile optimization model, the original problem is transformed to the well-defined multiobjective programming problem. then, a generalized Pareto optimal concept is defined, and a linear programming based interactive algorithm is proposed to obtain a satisfactory solution from among a generalized Pareto optimal solution set.
the proceedings contain 27 papers. the special focus in this conference is on Information security and cryptology. the topics include: Adaptively secure forward-secure non-interactive threshold cryptosystems;cryptanal...
ISBN:
(纸本)9783642347030
the proceedings contain 27 papers. the special focus in this conference is on Information security and cryptology. the topics include: Adaptively secure forward-secure non-interactive threshold cryptosystems;cryptanalysis vs. provable security;boosting scalability in anomaly-based packed executable filtering;searching short recurrences of nonlinear shift registers via directed acyclic graphs;differential and linear cryptanalysis using mixed-integer linear programming;Adleman-Manders-Miller root extraction method revisited;multi-pixel encryption visual cryptography;an improved electronic voting scheme without a trusted random number generator;fault attacks against the miller algorithm in hessian coordinates;benchmarking for steganography by kernel fisher discriminant criterion;improved tradeoff between encapsulation and decapsulation of HK09;non-interactive deniable authentication protocols;on the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3;efficient self-certified signatures with batch verification;a generic construction from Selective-IBE to public-key encryption with non-interactive opening;fast tate pairing computation on twisted jacobi intersections curves;weak-key class of MISTY1 for related-key differential attack;cryptanalysis of reduced-round KLEIN block cipher;an efficient RSA implementation without precomputation;the stream cipher core of the 3GPP encryption standard 128-EEA3;batching multiple protocols to improve efficiency of multi-party computation;towards attack resilient social network based threshold signing;a ciphertext policy attribute-based encryption scheme without pairings;cryptanalysis of randomized arithmetic codes based on markov model and pseudorandom generators based on subcovers for finite groups.
暂无评论