The negative database (NDB) is a complement of the corresponding database. The NDB could protect the privacy of the data, but it should be complete and hard-to-reverse. However, existent techniques cannot generate the...
详细信息
Message Sequence Charts(MSCs) are a popular visual formalism for documenting system requirementsFrom MSCs to architecture level model is usually through manual work, which puts the burden on the human and may introduc...
详细信息
Message Sequence Charts(MSCs) are a popular visual formalism for documenting system requirementsFrom MSCs to architecture level model is usually through manual work, which puts the burden on the human and may introduce errors to the designIn this paper, we present a framework for automatically mapping MSCs to service component models from a model-based point of viewThe generated models capture service component signatures and language independent dynamic behaviorsWe have implemented our framework and demonstrated the benefits via a case study.
As an emerging portable service platform, OSGi is now taking a more and more important role in Ubiquitous computing environment. As a module management framework, OSGi provides the functions of dynamic loading and unl...
详细信息
Requirements need to be validated at an early stage of analysis to address inconsistency and incompleteness issues. Capturing requirements usually involves natural language analysis, which is often imprecise and error...
详细信息
Numerous operating systems have been designed to manage and control system resources with large and complicated features, so they need high security protection. However, previous security applications can not provide ...
详细信息
In this paper we discuss how to precisely reconstruct porous media 3D model and simulate the fluid flow in the porous media. Considering the characteristics of the porous media's fault slice images, we present a c...
详细信息
Database application is one of the most common types of systems. Grounded on the simple concept of data lifecycle-any data in database is created from insertion, used via selection and modification and terminated at d...
详细信息
ISBN:
(纸本)1891706292
Database application is one of the most common types of systems. Grounded on the simple concept of data lifecycle-any data in database is created from insertion, used via selection and modification and terminated at deletion-this paper proposes a novel approach to reverse engineer the data lifecycle automatically from the source code of database applications. The extracted information can be used for the selection of open-source database applications for adaptation. It can also be used for maintenance and verification of database applications. A tool has been developed to implement the proposed approach for PHP-based database applications. Case studies have also been conducted to evaluate the use of the proposed approach.
Explanation, trust, and transparency are concepts that are strongly tied in with users' confidence in, and acceptance of computerised systems. Case-based reasoning (CBR) systems lend themselves easily to generate ...
详细信息
Explanation, trust, and transparency are concepts that are strongly tied in with users' confidence in, and acceptance of computerised systems. Case-based reasoning (CBR) systems lend themselves easily to generate explanations, as they typically organise and represent knowledge in a way that makes it possible to reason about and thereby generate explanations. The work presented here is a first step towards making a CBR engine explanation-aware. We demonstrate how a plugin for Protégé and myCBR can facilitate explanations for the retrieval phase of a CBR system.
In this paper firstly we discuss an approach for supporting risk identification with the use of higher-level organizational models. We provide some intuitive metrics for extracting measures of actor criticality and vu...
详细信息
Most of the existing work about fairness verification was carried out by checking the fairness based on state, action, or process respectively. It is hard to resolve the fairness issue for complex software systems, es...
详细信息
Most of the existing work about fairness verification was carried out by checking the fairness based on state, action, or process respectively. It is hard to resolve the fairness issue for complex software systems, especially in life-critical systems and safety-critical systems. In this paper, we verify the fairness based on both state and action, which is realized mainly by introducing an extended Kripke structure and four kinds of fairness (weak global/local fairness and strong global/local fairness). The experimental results show the superiority of our method by the savings in memory (2.08%) and time consumption (26.45%).
暂无评论