Message-passing based concurrent languages are widely used in developing large distributed and coordination systems. This paper presents the buffered π-calculus - a variant of the π-calculus where channel names are ...
详细信息
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in in...
详细信息
ISBN:
(纸本)9781479920327
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in information exchange and computing. Based on the analysis of the features of electric vehicle charging load and the research of cloud computing, we propose a cloud computing based schedule platform for optimal charging of electric vehicles. In addition, the function and implementation of the three basic modules of the platform (the data collection module, the cloud computing center and the control center) are exposed. The platform performs well in optimal scheduling for electric vehicles. In addition, the platform can also make full use of the computing resource and reduce the communication congestion.
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases w...
详细信息
With the development of depth sensors, images with high quality depth can be obtained easily. Using depth information, some challenging problems in gait recognition can be reconsidered and better solutions can be deve...
详细信息
software change impact analysis (CIA) is a key technique to identify the potential effects caused by software changes. In this paper, a new graph mining based CIA technique is proposed, which takes the interference am...
详细信息
ISBN:
(纸本)9781450316569
software change impact analysis (CIA) is a key technique to identify the potential effects caused by software changes. In this paper, a new graph mining based CIA technique is proposed, which takes the interference among multiple proposed changes into account to improve the precision of the impact results. Empirical evaluations on two real-world software projects demonstrate the effectiveness of our CIA technique. Copyright 2013 ACM.
Web accessible services on mobile devices such as smart phones and tablets are a reality in today's age. Services hosted on mobile devices consume valuable device resources such as battery power, network connectiv...
详细信息
Web accessible services on mobile devices such as smart phones and tablets are a reality in today's age. Services hosted on mobile devices consume valuable device resources such as battery power, network connectivity, and Global Positioning Systems (GPS) availability. For this research, clients consume web accessible services, provisioned from mobile devices acting as service providers. A challenge for constrained mobile devices is how the efficiency and discovery of web accessible services on mobile devices can be improved. To address this, a framework is presented that considers context information focusing on lightweight services and their discovery.
Reputation is used to regulate relationships of trust in online communities. When deploying a reputation system, it needs to accommodate the requirements and constrains of the specific community in order to assist the...
详细信息
Reputation is used to regulate relationships of trust in online communities. When deploying a reputation system, it needs to accommodate the requirements and constrains of the specific community in order to assist the community to reach their goals. This paper identifies that there is a need for a framework to define a configurable reputation system with the ability to accommodate the requirements of a variety of online communities. Such a reputation system can be defined as a service on the Cloud, to be composed with the application environment of the online community. This paper introduces the concept of RaaS (Reputation-as-a-Service) and discusses a potential framework for creating a RaaS. In order to achieve such a framework, research is conducted into features of SaaS (software-as-a-Service) components, user requirements for trust and reputation, and features of current reputation frameworks that can be configured in order to support a reputation service on the Cloud.
Context: Testing and debugging consume a significant portion of software development effort. Both processes are usually conducted independently despite their close relationship with each other. Test adequacy is vital ...
详细信息
Context: Testing and debugging consume a significant portion of software development effort. Both processes are usually conducted independently despite their close relationship with each other. Test adequacy is vital for developers to assure that sufficient testing effort has been made, while finding all the faults in a program as soon as possible is equally important. A tight integration between testing and debugging activities is essential. Objective: The paper aims at finding whether three factors, namely, the adequacy criterion to gauge a test suite, the size of a prioritized test suite, and the percentage of such a test suite used in fault localization, have significant impacts on integrating test case prioritization techniques with statistical fault localization techniques. Method: We conduct a controlled experiment to investigate the effectiveness of applying adequate test suites to locate faults in a benchmark suite of seven Siemens programs and four real-life UNIX utility programs using three adequacy criteria, 16 test case prioritization techniques, and four statistical fault localization techniques. We measure the proportion of code needed to be examined in order to locate a fault as the effectiveness of statistical fault localization techniques. We also investigate the integration of test case prioritization and statistical fault localization with postmortem analysis. Result: The main result shows that on average, it is more effective for a statistical fault localization technique to utilize the execution results of a MC/DC-adequate test suite than those of a branch-adequate test suite, and is in turn more effective to utilize the execution results of a branch-adequate test suite than those of a statement-adequate test suite. On the other hand, we find that none of the fault localization techniques studied can be sufficiently effective in suggesting fault-relevant statements that can fit easily into one debug window of a typical IDE. Conclusion: We find
We focus the attention on the extraction of Mel-frequency cepstral coefficients (MFCC) features from MDCT spectrum in AAC domain for audio content analysis. In particular, a MFCC extraction method is proposed, which i...
详细信息
Identity management provides a view on who has access to systems. Continuous organisational integration creates new Identity Management requirements such as Federation of Identities, Secure Token Services and Social M...
详细信息
Identity management provides a view on who has access to systems. Continuous organisational integration creates new Identity Management requirements such as Federation of Identities, Secure Token Services and Social Media Identity Providers. Access Management addresses the question of what resources an identity can access. A common implementation approach to address this is to utilise Role Modeling that links an identity with required access, enabling Role Based Access Control for access to system functions. Access Assurance provides fine grained access control ensuring that the identity has the right access based on attributes or rules defined by dynamic security policies. The need for Identity and Access Assurance (IAA) is not only for operational efficiency but often driven by legislative and user-experience requirements. IAA requirements are clearly visible as they are often highlighted in audit findings. Disconnect is often found between identity and access that results in integration complexity and duplication between systems because IAA programs are rarely implemented from a top-down approach, driven by the CIO into the organisation. Most often IAA is implemented from an operational management perspective within business unit silos. Furthermore, Security Frameworks such as SABSA (Sherwood Applied Business Security Architecture) provide comprehensive insights into the IAA domain but are focused either too narrowly or broadly. This paper investigates the creation of a Identity and Access Assurance Component Model by evaluating the prominent security frameworks in order to assist C-Level executives to make informed decisions on IAA investment and implementation priorities.
暂无评论