We propose an algorithm for constructing orthogonal n-ary operations which is called a block composition algorithm here. Input data of the algorithm are two series of different arity operations being distributed by bl...
详细信息
We propose an algorithm for constructing orthogonal n-ary operations which is called a block composition algorithm here. Input data of the algorithm are two series of different arity operations being distributed by blocks. The algorithm consists of two parts: composition algorithm for constructing n-ary operations with orthogonal retracts from given blocks of operations and block-wise recursive algorithm for constructing orthogonal n-ary operations from obtained operations. Obtained results are illustrated by examples of orthogonal n-ary operations which are constructible by block-wise recursive algorithm and non-constructible by the well-known trivial recursive algorithm. (C) 2016 Elsevier B.V. All rights reserved.
Software(1) Defined Network (SDN) is a new type of network architecture that has advantages over traditional network. For SDN, security is a basic issue. SDN controller has received considerable attention in the resea...
详细信息
ISBN:
(纸本)9781450365123
Software(1) Defined Network (SDN) is a new type of network architecture that has advantages over traditional network. For SDN, security is a basic issue. SDN controller has received considerable attention in the researches on SDN security. Researchers assign security tasks to SDN controllers generally, but it puts a heavy burden on the SDN controller and leads to a decrease in system stability. On the basis of previous work, we propose a new security protection architecture based on SDN/NFV. Meanwhile, a security function virtual machine pool is designed in infrastructure layer in architecture. It can create virtual machines and manage the ip addresses of the virtual machines automatically, which improves the flexibility and expandability of the architecture. Moreover, a function composition algorithm based on Trie (FCT) has been introduced. We deploy the security protection architecture on VMware cloud platform to validate the availability of the architecture and use experimental data to prove FCT algorithm has good performance.
The use of model composition algorithms is becoming more widespread. For example, model composition can be applied in the context of Software Product Lines when integrating optional features, or when reusing models in...
详细信息
ISBN:
(纸本)9781450381352
The use of model composition algorithms is becoming more widespread. For example, model composition can be applied in the context of Software Product Lines when integrating optional features, or when reusing models in multiple contexts. While composition of structural models is relatively straightforward, behavioural composition is more challenging. In this paper, we propose a composition algorithm for workflow-oriented (modelling) languages, and show how the same algorithm can be reused to compose models expressed with two different requirement modelling languages: Use Case Maps (UCM) and Use Case Specifications (UCS). Despite UCM being a graphical language and UCS being a textual language, both modelling languages model software/system functionality by describing a series of responsibilities or steps. We discuss the effectiveness of our algorithm using an example and a case study.
Organizations could leverage many existing self-service provisioning offers (compute, storage, network, security... as a service) for better flexibility and cost control. However, they are discouraged by the diversity...
详细信息
ISBN:
(纸本)9781467395014
Organizations could leverage many existing self-service provisioning offers (compute, storage, network, security... as a service) for better flexibility and cost control. However, they are discouraged by the diversity and the complexity of composing such services with guarantees. In this paper, we propose a cloud and network broker that serves requests for end-to-end "service packages" by composing, provisioning and stitching together in a coherent way diverse cloud and network services from different providers. Our composition algorithm takes into account multiple criteria such as consumer constraints on QoS, cost and criticality, as well as broker policies in order to determine the optimal placement. The evaluation results sustain the applicability of our approach through the efficiency and speed of the composition strategies with complex requests and large service catalogs.
Automatic service composition converging these two services in telecom and web realm can hardly achieved by far inasmuch as the absent semantic services interface defined with WSDL. In this paper, after analyzing the ...
详细信息
ISBN:
(纸本)9781424436927
Automatic service composition converging these two services in telecom and web realm can hardly achieved by far inasmuch as the absent semantic services interface defined with WSDL. In this paper, after analyzing the shortcoming of these existing description technologies of web services and telecommunication services, we put forward an extending method via enriching the content of OWL-S Profile document with OWL-S to CSTA services specified in ECMA specifications, and an improved algorithm of forward chaining automatic service composition to facilitate the converged service composition between network services and telecommunication services. The proposed technique is applied to an automatic stock quote scenario and composition results are presented demonstrating the rationality of these proposed ideas.
Kernelization is a strong and widely-applied technique in parameterized complexity. A kernelization algorithm, or simply a kernel, is a polynomial-time transformation that transforms any given parameterized instance t...
详细信息
Kernelization is a strong and widely-applied technique in parameterized complexity. A kernelization algorithm, or simply a kernel, is a polynomial-time transformation that transforms any given parameterized instance to an equivalent instance of the same problem, with size and parameter bounded by a function of the parameter in the input. A kernel is polynomial if the size and parameter of the output are polynomially-bounded by the parameter of the input. In this paper we develop a framework which allows showing that a wide range of FPT problems do not have polynomial kernels. Our evidence relies on hypothesis made in the classical world (i.e. non-parametric complexity), and revolves around a new type of algorithm for classical decision problems, called a distillation algorithm, which is of independent interest. Using the notion of distillation algorithms, we develop a generic lower-bound engine that allows us to show that a variety of FPT problems, fulfilling certain criteria, cannot have polynomial kernels unless the polynomial hierarchy collapses. These problems include k-PATH, k-CYCLE, k-EXACT CYCLE, k-SHORT CHEAP TOUR, k-GRAPH MINOR ORDER TEST, k-CUTWIDTH, k-SEARCH NUMBER, k-PATHWIDTH, k-TREEWIDTH. k-BRANCHWIDTH, and several optimization problems parameterized by treewidth and other structural parameters. (C) 2009 Elsevier Inc. All rights reserved.
In this paper, we mainly analyze the generic knowledge of access control method, and propose an ontology-based access control model which can describe different access control models. The paper details the formal desc...
详细信息
ISBN:
(纸本)9781424458516
In this paper, we mainly analyze the generic knowledge of access control method, and propose an ontology-based access control model which can describe different access control models. The paper details the formal description of access control ontologies, and proposes the composition algorithm which is based on access ontology. At last we give a prototype system which uses this model, the practice proves that the access control model can enhance the development efficiency and reduce the costs.
Through analyzing the architecture and domain commonness of enterprise information system (EIS), the paper proposes a composition model of EIS based on domain ontology. The paper specially gives the formal description...
详细信息
Through analyzing the architecture and domain commonness of enterprise information system (EIS), the paper proposes a composition model of EIS based on domain ontology. The paper specially gives the formal description of EIS domain ontology, and proposes the composition algorithm based on semantic similarity of concepts in domain ontology. At last this paper gives an example which uses the composition model. The practice proves that this model can enhance the efficiency of software development, and can reduce the development costs.
暂无评论