Based on predecessors' work, this propose the concept of degenerate test set (DTS) and an approach that performs test generation and redundancy elimination in the light of the special requirement of verification o...
详细信息
Network intrusion detection system needs to handle huge data selected from network environments which usually contain lots of irrelevant or redundant features. It makes intrusion detection with high resource consumpti...
详细信息
Image space photon mapping has the advantage of simple implementation on GPU without pre-computation of complex acceleration structures. However, existing approaches use only a single image for tracing caustic photons...
详细信息
This paper presents a cooperative anti-worm system model based on distributed honeypots for local area network(LAN). This model deployes honeypot systems in DMZ, at the back of firewall and in the internal subnets res...
详细信息
In this paper, we propose a semi-supervised text classification approach for bug triage to avoid the deficiency of labeled bug reports in existing supervised approaches. This new approach combines naive Bayes classifi...
详细信息
ISBN:
(纸本)1891706268
In this paper, we propose a semi-supervised text classification approach for bug triage to avoid the deficiency of labeled bug reports in existing supervised approaches. This new approach combines naive Bayes classifier and expectationmaximization to take advantage of both labeled and unlabeled bug reports. This approach trains a classifier with a fraction of labeled bug reports. Then the approach iteratively labels numerous unlabeled bug reports and trains a new classifier with labels of all the bug reports. We also employ a weighted recommendation list to boost the performance by imposing the weights of multiple developers in training the classifier. Experimental results on bug reports of Eclipse show that our new approach outperforms existing supervised approaches in terms of classification accuracy.
Based on chaotic Tent map, this paper proposed a new 5×L (L ≥ 32) bits extensible Hash function with symmetric keys. The structure only performed Boolean algorithm and shift operation. In order to generate fast ...
详细信息
This study examined spatial variations in the concentration,grain size and heavy mineral assemblages on Cedar Beach(Lake Erie,Canada).Magnetic studies of heavy mineral-enriched,dark-reddish sands present on the beac...
详细信息
This study examined spatial variations in the concentration,grain size and heavy mineral assemblages on Cedar Beach(Lake Erie,Canada).Magnetic studies of heavy mineral-enriched,dark-reddish sands present on the beach showed that magnetite(~150μm) is the dominant magnetic *** magnetic susceptibility values defined three zones:a lakeward region close to the water line(Zone 1),the upper swash zone(Zone 2) and the region landwards of the upper swash zone (Zone 3).Zone 2 showed the highest bulk and mass susceptibility(κ,χ) and the highest mass percentage of smaller grain-size(250μm) fractions in the bulk sand ***(i.e.κandχ) values decreased and grain size coarsened from Zone 2 lakewards(into Zone 1) and landwards (into Zone 3),and correlated with the distribution of the heavy mineral assemblage,most probably reflecting preferential separation of large,less dense particles by waves and currents both along and across the *** eroded western section of Cedar Beach showed much higher concentrations of heavy minerals including magnetite,and finer sand grain sizes than the accreting eastern section, suggesting that magnetic techniques could be used as a rapid,cost-effective way of examining erosion along sensitive coastline areas.
The adequate testing of black-box components is an important basis before they will be reused in the approach of Component Based software Development. The test-data generation and test adequacy ensuring are difficult ...
详细信息
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requir...
详细信息
ISBN:
(纸本)9781424472369
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requirement and FSM (Finite State Machine) to verity the safety requirements of the specification. The device specifications of railway interlocking system are modeled with UML, and dynamic behaviors of the device and whole system are modeled with FSM, the safety specification is translated LTL (Linear Temporal Logic) and analyzed with NuSMV. We try to show the feasibility of improving the reliability and reducing revalidation efforts when designing and developing a decentralized railway signaling system.
Services computing is an interdisciplinary subject that devotes to bridging the gap between business services and IT services. It is recognized that Requirements engineering is fundamental in implementing the service ...
详细信息
暂无评论