The reusability of components affects how much benefit we can get from the component based software development (CBSD). For enhancing the reuse of components, we propose an approach to derive the desired behavior from...
详细信息
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result rev...
详细信息
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result reveals that the tools building on finding vulnerable library functions have low false negatives rates but high false positives rates, the constrained based tools have low false positives rates but high false negatives rates, and the module checkers have high true positives rates when finding attacks against given security rules, bat have high false negatives rates when finding many kinds of vulnerabilities.
This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses ecl...
详细信息
This paper presents an approach to build a flow of grid services named GFlow. This approach converts all of the services' interfaces in globus toolkit 3 into platform independent model format. The conversion uses eclipse modeling framework plug-ins and graphical editing framework plug-ins to parse the models into platform specific models, which are responsible for implementation of grid services' clients and servers and their automatic deployment. This paper emphasizes on design method, which uses model drive architecture, and design process, which uses model-view-control.
Earthquakes will do great harms to the people, to estimate the future earthquake situation in Chinese mainland is still an open issue. There have been previous attempts to solve this problem by using artificial neural...
详细信息
The performance of the user's safeguard strategy is a direct factor which touches the reliability and cost of data link network in the whole procedure from fault discovering to trouble shooting. To improve the per...
详细信息
The performance of the user's safeguard strategy is a direct factor which touches the reliability and cost of data link network in the whole procedure from fault discovering to trouble shooting. To improve the performance of network, a novel model of data-link user's safeguard strategy based on reliability theory is designed in this present study. It minimizes the cost of equipments' safeguard procedure and normal running on the premise of the network and solves the problem of redundant management efficiently. An example is given to express the model.
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fo...
详细信息
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fountainhead of the fault quickly from a number of fault phenomenon. To get the fountainhead of the fault of network, a new type of fault detection system is presented. In the study, according to the principle of positive selection, the system builds up its event database. The behavior model whose frequency is higher will be analyzed and processed first. It improves the speed and effectiveness of fault location. The experiment system implemented by this method shows a good diagnostic ability.
This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instan...
详细信息
This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instances. It provides the checking based on the weighted mutual instances considering fault tolerance, gives a way to partition the large-scale mutual instances, and proposes a process greatly reducing the manual annotation work to get more mutual instances. Intension annotation that improves the checking method is also discussed. The method is practical and effective to check subsumption relations between concept queries in different ontologies based on mutual instances.
Fuzzy ontologics are efficient tools to handle fuzzy and uncertain knowledge on the semantic web; but there are heterogeneity problems when gaining interoperability among different fuzzy ontologies. This paper uses co...
详细信息
Fuzzy ontologics are efficient tools to handle fuzzy and uncertain knowledge on the semantic web; but there are heterogeneity problems when gaining interoperability among different fuzzy ontologies. This paper uses concept approximation between fuzzy ontologies based on instances to solve the heterogeneity problems. It firstly proposes an instance selection technology based on instance clustering and weighting to unify the fuzzy interpretation of different ontologies and reduce the number of instances to increase the efficiency. Then the paper resolves the problem of computing the approximations of concepts into the problem of computing the least upper approximations of atom concepts. It optimizes the search strategies by extending atom concept sets and defining the least upper bounds of concepts to reduce the searching space of the problem. An efficient algorithm for searching the least upper bounds of concept is given.
In this paper,we propose a fast motion estimation algorithm of arbitrarily shaped video object in MPEG- *** proposed algorithm incorporates the binary alpha-plane and the extended contour to predict accurately the mot...
详细信息
In this paper,we propose a fast motion estimation algorithm of arbitrarily shaped video object in MPEG- *** proposed algorithm incorporates the binary alpha-plane and the extended contour to predict accurately the motion vectors of boundary macroblocks so that the conventional fast motion estimation algorithms can be employed to search the motion vectors of opaque macro-blocks using the motion vectors of the neighboring boundary macro-blocks as the initial *** results show that the proposed algorithm requires low computation complexity while provides good motion compensation quality.
In this paper, we present a timed automaton reachability analysis algorithm which can use some other properties to improve the model checking efficiency. If the model checker aborts because of memory or CPU time limit...
详细信息
In this paper, we present a timed automaton reachability analysis algorithm which can use some other properties to improve the model checking efficiency. If the model checker aborts because of memory or CPU time limitation when checking a property P, the users can still use a set of auxiliary properties P 1 , P 2 ,..., P n about the system to reduce the space and time requirement. People can verify these auxiliary properties by either model checking or other methods like theorem proving. This algorithm gives the users a way to reduce the space and time requirement of model checking using their knowledge about the system under check.
暂无评论