In this paper, we describe an optimization method based on differential evolution (DE). It shows good convergence properties with few parameters. However, the appropriate selection of the parameters is a difficult tas...
详细信息
ISBN:
(纸本)9781479909964
In this paper, we describe an optimization method based on differential evolution (DE). It shows good convergence properties with few parameters. However, the appropriate selection of the parameters is a difficult task. Hence, we here analyze the performance indexes of the DE algorithm to set the control parameters. Moreover, to identify the best parameter intervals, the DE approach is first compared to two different Particle Swarm Optimization (PSO) algorithms and then to a recent adaptive genetic algorithm (DABGA). The optimization of benchmark functions shows that the DE algorithm performs better than PSO and DABGA methods.
In this paper we will describe a modification of the matrix factorization (MF) algorithm which allows visualizing the user and item characteristics. When applying MF for collaborative filtering, we get a model that re...
详细信息
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial featur...
详细信息
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial features of human mobility. In addition, many recent HMMs based on social networks have begun to take into account social factors, which naturally influence the results of the HMMs. Unfortunately, these mobility models do not focus on the impact of several important social factors that can affect a person's actions, such as language, citizenship, and culture. This paper introduces a hybrid human mobility model that integrates social behavior, cultural and language factors into HMMs in order to measure their effect on human mobility, as well as temporal and spatial features. Results demonstrate the feasibility of the proposed model.
The software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has organized four Static Analysis Tool Expositions (SATE). SATE is designed to advance ...
详细信息
ISBN:
(纸本)9781479929269
The software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has organized four Static Analysis Tool Expositions (SATE). SATE is designed to advance research in static analysis tools that find security-relevant defects in source code. Briefly, participating tool makers run their tools on a set of programs. Researchers led by NIST analyze the tool outputs. The results and experiences are reported at a workshop. These expositions have accumulated large amounts of data. This collection allowed for the development and validation of practical metrics in regard to static analysis tool effectiveness and independence. In this paper, we discuss the role of the data in determining which metrics can be derived. Specifically, we detail the three characteristics test data should exhibit and explain why the data we use express each combination of two out of these three properties.
There are diverse factors involved in the transmission of live video over internet. These factors have direct impact on the quality of the transmitted video. The underlying protocol, encapsulation method and the choic...
详细信息
ISBN:
(纸本)9781467349901
There are diverse factors involved in the transmission of live video over internet. These factors have direct impact on the quality of the transmitted video. The underlying protocol, encapsulation method and the choice of video codec are the, key factors involved in the transmission of video over streaming network. Up to our knowledge various studies have been performed to analyze the impact of these factors individually on the quality of video transmission however their joint impact on video transmission is not yet done. In this paper we characterize the performance of live video streaming setup, while keeping in view the effect of stack-protocol, encapsulation method and the underlying video codec on delay as the key investigating parameter. The results obtained while considering diverse video streaming setups are provided in the results section of this paper. More specifically, it was observed that stack (http, mjpeg, mjpeg) performs best and stack (mms, asf, wmv1) perform worst.
When reusable software elements are defined in the requirements phase, this raises a number of issues for the measurement of their functional size, when a reusable element implements a business rule or a business sub ...
详细信息
When reusable software elements are defined in the requirements phase, this raises a number of issues for the measurement of their functional size, when a reusable element implements a business rule or a business sub process, for example. A case study is presented with project functional size measurement data to illustrate the impact of reuse on the resulting size and to determine criteria of reuse effectiveness and efficiency.
Conducting a systematic literature review (SLR) is difficult and time-consuming for an experienced researcher, and even more so for a novice graduate student. With a better understanding of the most common difficultie...
详细信息
Conducting a systematic literature review (SLR) is difficult and time-consuming for an experienced researcher, and even more so for a novice graduate student. With a better understanding of the most common difficulties in the SLR process, mentors will be better prepared to guide novices through the process. This understanding will help researchers have more realistic expectations of the SLR process and will help mentors guide novices through its planning, execution, and documentation phases. Consequently, the objectives of this work are to identify the most difficult and time-consuming phases of the SLR process. Using data from two sources - 52 responses to an online survey sent to all authors of SLRs published in softwareengineering venues and qualitative experience reports from 8 PhD students who conducted SLRs as part of a course - we identified specific difficulties related to each phase of the SLR process. Our findings highlight the importance of planning, teamwork, and mentoring by an experienced researcher throughout the process. The paper also identifies implications for the teaching of the SLR process.
The key feature of Unified Communications (UC) lies in its ability to provide the service that the customer wants, when he wants and regardless of the device being used. At the heart of the UC architecture, which span...
详细信息
ISBN:
(纸本)9781479905058
The key feature of Unified Communications (UC) lies in its ability to provide the service that the customer wants, when he wants and regardless of the device being used. At the heart of the UC architecture, which spans different layers from application layer to network, comes the Quality of Service (QoS) framework that is essential to provide adequate service to different communication session's call participates. The heterogeneity of access networks and diversity of a UC session's participants make it necessary to classify incoming traffic based on its type and the QoS requirements of the participating parties. The existence of different traffic classifications for different existing access networks raises the question of how to classify incoming traffic when it belongs to a diverse set of access networks and devices. In this paper, we investigate different classification methods currently adopted in different access networks and industry standards. We introduce a traffic classification method that should satisfy the requirements of real-time traffic that traverses most of the existing access networks. The classification method has been tested using both First In First Out (FIFO) and Weighted Fair Queuing (WFQ) schedulers to evaluate different classes performance in a shared environment with diverse QoS requirements. The results obtained showed the feasibility of our proposed classification.
Attack models can be used to assess network security. Purely graph based attack representation models (e.g., attack graphs) have a state-space explosion problem. Purely tree-based models (e.g., attack trees) cannot ca...
详细信息
ISBN:
(纸本)9780729807029
Attack models can be used to assess network security. Purely graph based attack representation models (e.g., attack graphs) have a state-space explosion problem. Purely tree-based models (e.g., attack trees) cannot capture the path information explicitly. Moreover, the complex relationship between the host and the vulnerability information in attack models create difficulty in adjusting to changes in the network, which is impractical for modern large and dynamic network systems. To deal with these issues, we propose hierarchical attack representation models (HARMs). The main idea is to use two-layer hierarchy to separate the network topology information (in the upper layer) from the vulnerability information of each host (in the lower layer). We compare the HARMs with existing attack models (including attack graph and attack tree) in model complexity in the phase of construction, evaluation and modification.
QoS-aware service composition is the generation of a business process to fulfill functional goals and optimize the QoS criteria at the same time. People may focus on the optimization of a single QoS criterion or a set...
详细信息
暂无评论