This paper presents an improved genetic algorithm for solving conic fitting problem. We first use several parallel small-populations genetic algorithms to obtain initial population, which has better average fitness. T...
详细信息
This paper presents an improved genetic algorithm for solving conic fitting problem. We first use several parallel small-populations genetic algorithms to obtain initial population, which has better average fitness. The range of mutation operator is also set to be gradually reduced with the growing of generation to guarantee the proportion of outstanding individuals within the population. An experiment shows that our improvements on genetic algorithm can remarkably increase the average fitness of population during evolution and enhance the performance of the algorithm as a whole.
This paper proposes a new method for measuring the complexity of software systems based on complex network theory. We first construct the complex network model for software system. Then, the complexity of a homogeneou...
详细信息
This paper proposes a new method for measuring the complexity of software systems based on complex network theory. We first construct the complex network model for software system. Then, the complexity of a homogeneous system is defined according to the entropy theory. With the experiments on open source software systems, we show that our method can reveal the complexity on different aspects of software systems,such as inheritance and understanding complexity.
A new family of GMW sequences over an arbitrary Galois ring was defined by using the trace functions and *** generalizes the concept of GMW sequences over finite *** the Fourier representation,we derived an estimate o...
详细信息
A new family of GMW sequences over an arbitrary Galois ring was defined by using the trace functions and *** generalizes the concept of GMW sequences over finite *** the Fourier representation,we derived an estimate of the linear complexities of this family of GMW *** the result shows that such sequences have large linear complexities.
Improved interpolation attack and new integral attack are proposed in this paper, and they can be applied to block ciphers using round functions with low algebraic degree. In the new attacks, we can determine not only...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.
The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x...
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,...
详细信息
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties...
详细信息
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties and even destroys the conceptual integrity of programs. To assure the quality of an aspect-oriented system, rigorous analysis and design of aspects are highly desirable. In this paper, we present an approach to aspect-oriented modeling and verification with finite state machines. Our approach provides explicit notations (e.g., pointcut, advice and aspect) for capturing crosscutting concerns and incremental modification requirements with respect to class state models. For verification purposes, we compose the aspect models and class models in an aspect-oriented model through a weaving mechanism. Then we transform the woven models and the class models not affected by the aspects into FSP (Finite State Processes), which are to be checked by the LTSA (Labeled Transition system Analyzer) model checker against the desired system properties. We have applied our approach to the modeling and verification of three aspect-oriented systems. To further evaluate the effectiveness of verification, we created a large number of flawed aspect models and verified them against the system requirements. The results show that the verification has revealed all flawed models. This indicates that our approach is effective in quality assurance of aspect-oriented state models. As such, our approach can be used for model-checking state-based specification of aspect-oriented design and can uncover some system design problems before the system is implemented.
Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource disseminati...
详细信息
ISBN:
(纸本)9781605588728
Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource dissemination between Internetware nodes. In this paper, we focus on an evidence-based trustworthiness-assurance mechanism in the approach. An architecture and a protocol that enforces this approach in Internetware systems are also described. Copyright 2009 ACM.
We present the wavelet depth-frequency analysis and variable-scale frequency cycle analysis methods to study sedimentary cycles. The spectrum analysis, variable-scale frequency cycle analysis, and wavelet depth-freque...
详细信息
We present the wavelet depth-frequency analysis and variable-scale frequency cycle analysis methods to study sedimentary cycles. The spectrum analysis, variable-scale frequency cycle analysis, and wavelet depth-frequency analysis methods are mainly discussed to distinguish sedimentary cycles of different levels. The spectrum analysis method established the relationship between the spectrum characteristics and the thickness and number of sedimentary cycles. Both the variable-scale frequency cycle analysis and the wavelet depth-frequency analysis are based on the wavelet transform. The variable-scale frequency cycle analysis is used to obtain the relationship between the periodic changes of frequency in different scales and sedimentary cycles, and the wavelet depth-frequency analysis is used to obtain the relationship between migration changes of frequency energy clusters and sedimentary cycles. We designed a soft-ware system to process actual logging data from the Changqing Oilfield to analyze the sedimentary cycles, which verified the effectiveness of the three methods, and good results were obtained.
暂无评论