In the distributed computing environment, XML becomes the main choice as the way to transfer and store data in Web Services and distributed systems. With the development of the Web Services technique, there is a highe...
详细信息
In the distributed computing environment, XML becomes the main choice as the way to transfer and store data in Web Services and distributed systems. With the development of the Web Services technique, there is a higher demand for an efficient XML message processing in some real-time systems. The XML messages are always parsed by software. Although many software-based XML processing techniques have been studied to improve the processing efficiency, this cannot help much. Hardware-based methods can be another efficient choice of boosting XML message processing. In this paper, we present a novel hardware-based XML message processing technique and design a binary token descriptor data structure to describe the document's structure and information. By utilizing the processing technique we are able to parse the XML into a set of binary token descriptor. The architecture is designed and implemented on a FPGA. Our experimental results show that the processing rate is more efficient than the traditional software processing.
ABox abduction is an important aspect for abductive reasoning in Description Logics (DLs). It finds all minimal sets of ABox axioms that should be added to a background ontology to enforce entailment of a specified se...
详细信息
The primary goal of requirements engineering research is to propose, develop, and validate effective solutions for important practical problems. However practice has shown that successful projects often take from 20-2...
详细信息
The primary goal of requirements engineering research is to propose, develop, and validate effective solutions for important practical problems. However practice has shown that successful projects often take from 20-25 years to reach the stage of full industry adoption, while many other projects fizzle out and never advance beyond the initial research phase. In this interactive panel, teams of researchers representing several different requirements engineering research areas, bring ideas for technology transfer to a panel of industrial and government practitioners. The teams proceed through a series of interactive presentations and receive feedback from panelists. Underlying the game-show genre of the panel is the more serious goal to foster conversation between practitioners and researchers in order to improve the effectiveness of technology transfer in the requirements engineering community.
Navigational Programming (NavP) is a new approach to distributed programming based on migrating threads. Under this model of computation, an application is structured as a collection of processes, which can migrate au...
详细信息
In multimodal optimization, the basic particle swarm optimization is easy to duplicate and miss points of the optimal value. To solve this problem, a modified particle swarm optimization algorithm, called BNPSO, is pr...
详细信息
In multimodal optimization, the basic particle swarm optimization is easy to duplicate and miss points of the optimal value. To solve this problem, a modified particle swarm optimization algorithm, called BNPSO, is proposed. This modified particle swarm optimization algorithm is based on the niche particle swarm optimization (NPSO) algorithm, and implemented a Bernoulli trial. It is proved theoretically that the algorithm BNPSO is much more effective than the algorithm NPSO for multimodal function optimization problems. However, the time complexity of the new scheme is increased. Testing of the algorithm indicate that the algorithm BNPSO has better perform in stability and convergence.
With the growth of Cloud computing, more and more companies are offering different cloud services. From the customer's point of view, it is always difficult to decide whose services they should use, based on users...
详细信息
With the growth of Cloud computing, more and more companies are offering different cloud services. From the customer's point of view, it is always difficult to decide whose services they should use, based on users' requirements. Currently there is no software framework which can automatically index cloud providers based on their needs. In this work, we propose a framework and a mechanism, which measure the quality and prioritize Cloud services. Such framework can make significant impact and will create healthy competition among Cloud providers to satisfy their Service Level Agreement (SLA) and improve their Quality of Services (QoS).
Automatic layout can be a crucial support feature for complex diagramming tools. Adding suitable layout algorithms to diagramming tools is a complex task and meta-tools should incorporate these for reuse. We present M...
详细信息
Automatic layout can be a crucial support feature for complex diagramming tools. Adding suitable layout algorithms to diagramming tools is a complex task and meta-tools should incorporate these for reuse. We present MaramaALM, a generalised set of automatic layout mechanisms. This has been incorporated in the Eclipse-based Marama meta-toolset to support automatic layout in Marama diagrams. It provides an easy-to-use mechanism for tool developers to add such layouts to their generated tools. We describe our motivation for MaramaALM, our approach to its implementation and an example case study of using these tool extensions.
Extensive data generated by peers of nodes in wireless sensor networks (WSNs) needs to be analysed and processed in order to extract information that is meaningful to the user. Data processing techniques that achieve ...
详细信息
Dynamic taint analysis has been proved to be very effective in solving security problems recently, especially in software vulnerability detection and malicious behavior prevention. Unfortunately, most of current resea...
详细信息
Dynamic taint analysis has been proved to be very effective in solving security problems recently, especially in software vulnerability detection and malicious behavior prevention. Unfortunately, most of current researches in this field focus on the runtime protection, and are incapable to discover the potential threat in the software. This paper describes a novel approach to overcome the limitation of traditional dynamic taint analysis by integrating static analysis into the system and presents framework SDCF. The framework translates the binary into assembly code and tracks the data flow. Then with static method, the system can get the important information which can't be gained at runtime, such as unexecuted part of the code. When this information is acquired, they will be provided to the client tools. The practicability of the framework is validated by implementing and evaluating a tool built on SDCF. The result of the experiments shows that our system is able to detect latent software vulnerabilities efficiently.
Nowadays, with the development of technology, E-Learning becomes a new trend of conductive and independent learning model. The primary purpose of this study is to develop an intelligent system for online tutoring whic...
详细信息
Nowadays, with the development of technology, E-Learning becomes a new trend of conductive and independent learning model. The primary purpose of this study is to develop an intelligent system for online tutoring which provides a communication platform for teaching-learning activities. This paper presents an intelligent approach for implementing the web-based E-Learning and tutoring. The system is integrated with different modules including the adaptive navigation learning control, the intelligent quiz module for learning outcome assessment, and the video conference module for group discussion or presentation. Promising results are collected indicating that the system is supportive to off-campus students.
暂无评论