The rapid advancement of mobile communication technologies recently has led to the advent of mobile IPTV service. For a variety of multimedia services, a process of session setup using SIP(session initiation protocol)...
详细信息
The proceedings contain 227 papers. The topics discussed include: leveraging distributed computing concepts in mobile;medical robotics and computer-integrated surgery;generation Y: understanding the trend and planning...
ISBN:
(纸本)9780769532622
The proceedings contain 227 papers. The topics discussed include: leveraging distributed computing concepts in mobile;medical robotics and computer-integrated surgery;generation Y: understanding the trend and planning for the impact;software testing for large globally distributed projects;oil-field services' data acquisition system-a globally distributed development;the impact of software assurance on computing education;40 years of softwareengineering;how far have we come?;advances and challenges of softwareengineering;a probabilistic attacker model for quantitaive verification of DoS security threats;embedding rule-based security monitors into Java programs;UML-based framework for design and analysis of dependable software;an algorithmic approach to authorization rules conflict resolution in software security;and an open framework for highly concurrent real-time hardware-in-the-loop simulation.
Unrealizability is a major challenge for GR(1), an expressive assume-guarantee fragment of LTL that enables efficient synthesis. Some works attempt to help engineers deal with unrealizability by generating counter-str...
详细信息
ISBN:
(纸本)9781728108698
Unrealizability is a major challenge for GR(1), an expressive assume-guarantee fragment of LTL that enables efficient synthesis. Some works attempt to help engineers deal with unrealizability by generating counter-strategies or computing an unrealizable core. Other works propose to repair the unrealizable specification by suggesting repairs in the form of automatically generated assumptions. In this work we present two novel symbolic algorithms for repairing unrealizable GR(1) specifications. The first algorithm infers new assumptions based on the recently introduced JVTS. The second algorithm infers new assumptions directly from the specification. Both algorithms are sound. The first is incomplete but can be used to suggest many different repairs. The second is complete but suggests a single repair. Both are symbolic and therefore efficient. We implemented our work, validated its correctness, and evaluated it on benchmarks from the literature. The evaluation shows the strength of our algorithms, in their ability to suggest repairs and in their performance and scalability compared to previous solutions.
In order to provide a solid and stable platform for Big Data (BD) management and application development, a generic model of BD needs to be agreed upon. There is no firm consensus on what defines BD, although a broad ...
详细信息
ISBN:
(纸本)9781538643877
In order to provide a solid and stable platform for Big Data (BD) management and application development, a generic model of BD needs to be agreed upon. There is no firm consensus on what defines BD, although a broad spectrum of competing, sometimes conflicting, ideas in terms of "V"s have been put forth. In this paper, we provide an exhaustive survey of the V-model of Big Data (BD) characteristics proposed by several academic and industry researchers, and motivate a formal approach to a selection of independent Vs that can model BD sufficiently well in any application sector.
Most undergraduate computing courses have a project component that attempts to convey some of the aspects of a 'real-life' development project but these often concentrate on the final product, rather than the ...
详细信息
There are lots of multimedia data files in the network, which have their own features separated from text files. Combing with the good characteristics, such as stronger pseudo-randomness, of hyperchaotic, a new kind o...
详细信息
Cloud computing is a modern way for many businesses to offer computing tools and services that have transformed their business at a low cost. But the main concern is protection and privacy in cloud computing using a s...
详细信息
Clustering software Components for efficient component retrieval is gaining a significant practical importance in the field of softwareengineering from academic researchers and software industry. Clustering reduces t...
详细信息
Design and development of efficient software product depends on the quality of the requirements engineering phase. Hence it is required to devising a general purpose quality evaluation framework for that phase. In thi...
详细信息
ISBN:
(纸本)9781467320887;9781467320870
Design and development of efficient software product depends on the quality of the requirements engineering phase. Hence it is required to devising a general purpose quality evaluation framework for that phase. In this paper, a theoretical approach of quality evaluation framework has been proposed for generic requirement engineering process. For this reason a set of quality metrics have been proposed along with their illustrations specifically based on Business Object based Requirement engineering framework [12]. However, the proposed metrics are applicable to any other frameworks also. Finally future research issues have been specified.
In this paper, we offer a new method for solving control tasks in software-defined networks for use in corporate networks. Its main feature is the ability to increase failure free operation due to employing distribute...
详细信息
ISBN:
(纸本)9781467369022
In this paper, we offer a new method for solving control tasks in software-defined networks for use in corporate networks. Its main feature is the ability to increase failure free operation due to employing distributed computing resources available in the corporate network. To achieve the ability of effective usage of personal computers, our proposed method uses a multi-agent approach, where a proactive agent controls every personal computer and the process of task solution is dispatched in a decentralised way through interactions of agents. To solve every control task, the agents of the system collaborate and thus facilitate dispatch and computation.
暂无评论