In this paper, we present a formal process model to support the comprehension and maintenance of softwaresystems. The model provides a formal ontological representation that supports the use of reasoning services acr...
详细信息
ISBN:
(纸本)9783540694885
In this paper, we present a formal process model to support the comprehension and maintenance of softwaresystems. The model provides a formal ontological representation that supports the use of reasoning services across different knowledge resources. In the presented approach, we employ our Description Logic knowledge base to support the maintenance process management, as well as detailed analyses among resources, e.g., the traceability between various software artifacts. The resulting unified process model provides users with active guidance in selecting and utilizing these resources that are context-sensitive to a particular comprehension task. We illustrate both, the technical foundation based on our existing SOUND environment, as well as the general objectives and goals of our process model.
This article introduces a special issue of software Process - Improvement and Practice focusing on processes found in free or open source software development (F/OSSD) projects. It seeks to provide a background overvi...
详细信息
In recent years, traditional computing systems face the problems of scalability as the need for information processing services is ever increasing. Grid, as a pool of computing resources, solves the problem in some de...
详细信息
In recent years, traditional computing systems face the problems of scalability as the need for information processing services is ever increasing. Grid, as a pool of computing resources, solves the problem in some degree by providing an integrated computing and resources environment. Thus, there emerge many strategies related to grid resource allocation management (GRAM). However, almost all of these strategies focus on how to allocate the existing computing resources but overlook the possibility of controlling these resources. Therefore, services and computing nodes are always tightly coupled. In this paper, we describe a new framework called GSAF (a grid-based services transfer framework) to solve the problem. GSAF binds services and computing nodes dynamically through services migration and service cache to break the tight coupling. The migration of service components to more efficient computing nodes helps balance the processing burden and extends the computing abilities. In our experiment, we provide a prototype application of GSAF in the data mining system to demonstrate it.
Comprehension is an essential part of software evolution. Only software that is well understood can evolve in a controlled manner. In this paper, we present a formal process model to support the comprehension of softw...
详细信息
ISBN:
(纸本)9780769526980;0769526980
Comprehension is an essential part of software evolution. Only software that is well understood can evolve in a controlled manner. In this paper, we present a formal process model to support the comprehension of softwaresystems by using ontology and description logic. This formal representation supports the use of reasoning services across different knowledge resources and therefore, enables us to provide users with guidance during the comprehension process that is context sensitive to their particular comprehension task. As part of the process model, we also adopt a new interactive story metaphor, to represent the interactions between users and the comprehension process
This paper describes Threshold Concepts, a theory of learning that distinguishes core concepts whose characteristics can make them troublesome in learning. With an eye to applying this theory in computer science, we c...
详细信息
ISBN:
(纸本)1595936033
This paper describes Threshold Concepts, a theory of learning that distinguishes core concepts whose characteristics can make them troublesome in learning. With an eye to applying this theory in computer science, we consider this notion in the context of related topics in computer science education.
This paper discussed security of medical images and reviewed some work done regarding them. A fragile watermarking scheme was then proposed that could detect tamper and subsequently recover the image. Our scheme requi...
详细信息
This paper discussed security of medical images and reviewed some work done regarding them. A fragile watermarking scheme was then proposed that could detect tamper and subsequently recover the image. Our scheme required a secret key and a public chaotic mixing algorithm to embed and recover a tampered image. The scheme was also resilient to VQ attack. The purposes were to verify the integrity and authenticity of medical images. We used 800times600times8 bits ultrasound (US) greyscale images in our experiment. We tested our algorithm for up to 50% tampered block and obtained 100% recovery for spread-tampered block
This is commonly thought that CASE tools reduce programming efforts and increase development productivity. However, no paper has provide quantitative data supporting the matter. This paper discusses productivity impro...
详细信息
We propose an improved iris recognition method for person identification using an iris segmentation approach based on chain code and zigzag collarette area with support vector machine (SVM). The zigzag collarette area...
详细信息
We propose an improved iris recognition method for person identification using an iris segmentation approach based on chain code and zigzag collarette area with support vector machine (SVM). The zigzag collarette area is selected as a personal identification pattern which captures only the most important areas of iris complex pattern and better recognition accuracy is achieved. The idea to use the zigzag collarette area is that it is insensitive to the pupil dilation and usually not affected by eyelids or eyelashes. The deterministic feature sequence is extracted from iris images using Gabor wavelet technique and used to train SVM as iris classifiers. The traditional SVM is modified as asymmetrical SVM to treat False Accept and False Reject differently to satisfy several security requirements. The parameters of SVM are tuned to improve overall system performance. Our experimental results also indicate that the performance of SVM as a classifier is far better than the performance of backpropagation neural network (BPNN), K-nearest neighbor (KNN), Hamming and Mahalanobis distance. The proposed innovative technique is computationally effective as well as reliable in term of recognition rate of 99.56%.
Logistic planning and programming of construction machinery involves complex sets of objectives and constraints; therefore traditional approaches typically result in a large monolithic model that is difficult to solve...
详细信息
Logistic planning and programming of construction machinery involves complex sets of objectives and constraints; therefore traditional approaches typically result in a large monolithic model that is difficult to solve, understand, and maintain. In order to tackle large, particularly combinatorial, problems in logistic support for construction machinery, we design a constraint programming system, namely DISPDESK, which comprises a specification generator and its underlying domain-specific architecture, an algorithm library and its selector, a pre-defined solution library and a problem solver. The system features separation of concerns in specifications, little requirements for programming skills, domain-specific optimization, and semi-automatic generation of high-performance and reliable problem solvers
暂无评论