Since the last two decades, mobile computing has spread the wings like wild fire. With more than three billion phones around the globe and more mobiles than fixed line subscribers, mobile phone companies are the most ...
详细信息
In this paper, a potential-based genetic algorithm is proposed for formation control of robot swarm. The proposed algorithm consists of a global path planner and a motion planner. The global path planning algorithm se...
详细信息
High Level Architecture (HLA) is a distributed simulation architecture which is applied to many simulation environments. In most of these environments, the simulation entities (called the federate in HLA) communicate ...
详细信息
Overlay networks are widely adopted in many distributed systems for efficient resource sharing. Recently, issues in overlay network have also been introduced into cloud systems, in order to organize thousands of virtu...
详细信息
Carrier sensing mechanism has been adopted in IEEE 802.11 MAC for collision avoidance under single channel based wireless ad hoc networks. However, due to the hardware limitation, the carrier sensing mechanism can not...
详细信息
A service-oriented network (SON) is defined as a set of networked devices which collaborate to fulfill a complex ubiquitous service (u-service). Thus, the service quality of a u-service request highly depends on the q...
详细信息
In this study, we propose an efficient localization scheme in wireless sensor networks. The proposed scheme utilizes mobile anchors and is based on ring overlapping. In a wireless sensor network, there are some nodes ...
详细信息
"Every thing that can be counted does not necessarily count;every thing that counts cannot necessarily be counted" Albert Einstein Many software reliability assessment approaches were proposed by researchers...
详细信息
ISBN:
(纸本)9781617822667
"Every thing that can be counted does not necessarily count;every thing that counts cannot necessarily be counted" Albert Einstein Many software reliability assessment approaches were proposed by researchers and some were applied in practical application cases. However, there are also controversial arguments over each reliability assessment approach. Specifically, the focuses of these arguments are over the assumptions made by each measurement approach;these assumptions are often criticized as unrealistic. The purpose of this paper is to present an investigation of these assumptions from both theoretical and empirical perspectives. In this paper, we first compared the theoretical frameworks between hardware and software reliability practice. We identified the layers that exist in hardware reliability but are skipped in software reliability measurement practice;they are layers for the component behavior model, set theory, and measure theory. We then explicitly analyzed these skipped layers for software reliability measurement practice. For the component behavior model, we applied computability theory concept to formalize program failure behavior characteristics and proposed a Program Behavior Model (PBM). Relevant concepts such as faults, failures, fault size, are first defined, then failure rate and reliability are derived based on these concepts. The necessary and sufficient conditions for measurable software reliability are identified based on the above definitions. Empirical experiments have been performed to observe the validity of these necessary and sufficient conditions. Moreover, two past incidents have been investigated using our PBM model. It is found that most current approaches have difficulty to meet the proposed necessary and sufficient conditions, and that explains why current software reliability assessment approaches are controversial. Based on the results of investigation, suggestions are proposed for both applicants and regulators to consider duri
The study of wireless Sensor Networks (WSN) recently has drawn a lot of attention. Such networks are composed of a large number of tiny wireless sensors, which have limited calculating capability as well as limited po...
详细信息
Linear text segmentation has been used in several natural language processing tasks, such as information retrieval and text summarization. It has been proven that linear text segmentation is beneficial to these tasks....
详细信息
暂无评论