In response to Internet emergencies, Internet resiliency is investigated directly through an autonomous system (AS) level graph inferred from policy-compliant BGP paths or/and traceroute paths. Due to policy-driven in...
详细信息
In this paper, we propose a specification approach combining interface automata and Z language. This approach can be used to describe behavioural properties and data properties of software components. We also study th...
详细信息
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ...
详细信息
A 680 V LDMOS on a thin SOI with an improved field oxide(FOX) and dual field plate was studied *** FOX structure was formed by an "oxidation-etch-oxidation" process,which took much less time to form,and had a low ...
详细信息
A 680 V LDMOS on a thin SOI with an improved field oxide(FOX) and dual field plate was studied *** FOX structure was formed by an "oxidation-etch-oxidation" process,which took much less time to form,and had a low protrusion profile.A polysilicon field plate extended to the FOX and a long metal field plate was used to improve the specific *** optimized drift region implant for linear-gradient doping was adopted to achieve a uniform lateral electric *** a SimBond SOI wafer with a 1.5μm top silicon and a 3μm buried oxide layer,CMOS compatible SOI LDMOS processes are designed and implemented successfully. The off-state breakdown voltage reached 680 V,and the specific on-resistance was 8.2Ω·mm^2.
The ability to efficiently retrieve data in their encrypted form is important for the cloud to become a truly secure and practical data sharing platform. Although this field has attracted tremendous research attention...
详细信息
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence o...
详细信息
ISBN:
(纸本)9789898565105
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence of infeasible traces for which there is no input data for them to be executed. In this paper we build on the theory of workflow nets and introduce workflow nets where transitions have conditions associated with them. We then demonstrate that we can determine which execution traces, that are possible according to the control-flow dependencies, are actually possible taking the data perspective into account. This way we are able to more accurately determine in design time the infeasible traces caused by the correlation between transition conditions along this trace. Finally, we provide a solution to automatically detecting the shortest infeasible trace.
A verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML to model the function requirement and LTL to verify the safety requir...
详细信息
Replication is a widely used technique in unstructured overlays to improve content availability or system performance. A fundamental question often addressed by previous work focused on: how many replicas ought to be ...
详细信息
Replication is a widely used technique in unstructured overlays to improve content availability or system performance. A fundamental question often addressed by previous work focused on: how many replicas ought to be allocated for each data item given the fixed query rates and limited storage capability? In this paper, we have put forth two optimal replica distributions to achieve the highest success rate and the lowest message consumption. Especially, we have investigated the influence of item size on replica distribution. Our results show that Square-Root Replication, which is traditionally considered to be optimal, is not always the best choice. Our study offers a new deep understanding of resource managment in self-organized unstructured overlays.
Software structure is the most important factor affecting the quality of a *** evaluation of software structure is a foundational technique for software ***,the traditional evaluation criteria,such as "high cohes...
详细信息
Software structure is the most important factor affecting the quality of a *** evaluation of software structure is a foundational technique for software ***,the traditional evaluation criteria,such as "high cohesion and low coupling",are no longer appropriate for the new web applications,which are designed with a hierarchical framework.A novel approach is proposed in this paper to evaluate software quality based on the interaction and encapsulation of *** particular,two criteria for high quality software,the functional and hierarchical structure,are proposed to support widely used web *** cohesion and coupling and layer matching ratios between methods within a software package are calculated to determine whether the package is well implemented in terms of functional or hierarchical *** approach enables us to quantify the quality of a software system according to the structural types of its *** were carried out on 18 versions of Struts and six open-source software *** evaluation concurs with the intuition that minor upgrades,aimed at fixing bugs and adding minor functionality quickly,reduce software quality,whereas major upgrades,which normally clean up messy code and re-construct the software,improve software quality.
We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other p...
详细信息
暂无评论