Computing all diagnoses of an inconsistent ontology is important in ontology-based applications. However, the number of diagnoses can be very large. It is impractical to enumerate all diagnoses before identifying the ...
详细信息
Computing all diagnoses of an inconsistent ontology is important in ontology-based applications. However, the number of diagnoses can be very large. It is impractical to enumerate all diagnoses before identifying the target one to render the ontology consistent. Hence, we propose to represent all diagnoses by multiple sets of partial diagnoses, where the total number of partial diagnoses can be small and the target diagnosis can be directly retrieved from these partial diagnoses. We also propose methods for computing the new representation of all diagnoses in an OWL DL ontology. Experimental results show that computing the new representation of all diagnoses is much easier than directly computing all diagnoses.
software systems represent one of the most complex man-made systems. In this paper, we analyze the evolution of Object-Oriented (OO) software using complex network theory from a multi-granularity perspective. First, t...
详细信息
software systems represent one of the most complex man-made systems. In this paper, we analyze the evolution of Object-Oriented (OO) software using complex network theory from a multi-granularity perspective. First, the software net works are constructed for a multi-version software system at different levels of granularity. Then, some parameters used in complex network theory are introduced to study the topological characteristics of these software networks. By investigating the parameters' values in consecutive software networks, we have a better understanding about software evolution. A case study on an open source OO project, Azureus, is conducted as an example to illustrate our approach. It uncovers some underlying dynamic characteristics of OO systems. These results provide a different dimension to our understanding of software system dynamics and also are very useful for the design and development of OO software systems.
作者:
[Systems Research Institute
Polish Academy of Sciences Warsaw and University of Gdansk Warsaw Poland Systems Research Institute
Polish Academy of Sciences Warsaw and Management Academy Warsaw Poland Software Engineering Department
Faculty of Automatics Computers and Electronics University of Craiova Bvd.Decebal Craiova Romania University of Duisburg-Essen
Institute for Computer Science and Business Information Systems (ICB) Practical Computer Science Data Management Systems and Knowledge Representation Essen Germany
This paper aims to investigate the scalability of synchronizability for the complex clustering networks of dense rings or chains with the network scale increasing. Our results reveal that the synchronizability of the ...
详细信息
Scheduling in semiconductor manufacturing system is an important task for the industries faced with a large amount of resource competitions. Effective scheduling can improve the overall system performance and customer...
详细信息
Scheduling in semiconductor manufacturing system is an important task for the industries faced with a large amount of resource competitions. Effective scheduling can improve the overall system performance and customer satisfaction. In this paper, a scheduling method with the core of bottleneck equipment control is designed referring to Drum-Buffer-Rope (DBR) theory. In order to identify the main-bottleneck, the relative load which takes the feature of reentrance into consideration is applied. For the avoidance of local blocking, the management of sub-bottleneck is presented. As both releasing and dispatching are taken into account, a scheduling method based on the compound priority is formed. Finally, HP-24 semiconductor wafer fabrication is used as an example to demonstrate the effectiveness of the proposed method.
Transceiver-free object tracking is to trace a moving object without carrying any communication device in an environment where the environment is pre-deployed with some monitoring nodes. Among all the tracking technol...
详细信息
Transceiver-free object tracking is to trace a moving object without carrying any communication device in an environment where the environment is pre-deployed with some monitoring nodes. Among all the tracking technologies, RF-based technology is an emerging research field facing many challenges. Although we proposed the original idea, until now there is no method achieving scalability without sacrificing latency and accuracy. In this paper, we put forward a real-time tracking system RASS, which can achieve this goal and is promising in the applications like the safeguard system. Our basic idea is to divide the tracking field into different areas, with adjacent areas using different communication channels. So the interference among different areas can be prevented. For each area, three communicating nodes are deployed on the ceiling as a regular triangle to monitor this area. In each triangle area, we use a Support Vector Regression (SVR) model to locate the object. This model simulates the relationship between the signal dynamics caused by the object and the object position. It not only considers the ideal case of signal dynamics caused by the object, but also utilizes their irregular information. As a result it can reach the tracking accuracy to around 1m by just using three nodes in a triangle area with 4m in each side. The experiments show that the tracking latency of the proposed RASS system is bounded by only about 0.26s. Our system scales well to a large deployment field without sacrificing the latency and accuracy.
First the development of cloud computing, virtual techonolody and the cloud security were surveied. Then the evolvements of the covert channel in operating system, database, and network in the last 40 years were revie...
详细信息
First the development of cloud computing, virtual techonolody and the cloud security were surveied. Then the evolvements of the covert channel in operating system, database, and network in the last 40 years were reviewed. Several examples of covert channel were introduced, which indicated the necessity of research. The potential covert channels in cloud computing were classified into two new categories from the aspects of theoretical research and the engineering practice. The four key problems including the lack of definition, the lack of systemic identification and evaluation approach and the lack of security criterions were pointed out. The covert channel in cloud computing was formally defined. Finally, the academic and industrial values of covert channel research are presented.
Complex networks widely exist in our world, thus attracts extensive attentions from the multidisciplinary nonlinear science community. Many existing papers investigated the geometric features, control and synchronizat...
详细信息
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network servi...
详细信息
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network services, the paper puts forward an intent-perceptible service migration model (ISM). In this model, we design a novel trigger mechanism and object selecting method for service migration, and make the service migration intention perceptible for the client with the cooperation of the server. The evaluation results show that ISM model can not only ensure the service invulnerability by maintaining a high randomness of service migration, but also improve the service continuity by reducing the service gap time spending on service migration to the maximum extent. Therefore, ISM model can enhance IP network survivability efficiently.
暂无评论