Most algorithms developed for scheduling applications on global Grids focus on a single Quality of Service (QoS) parameter such as execution time, cost or total data transmission time. However, if we consider more tha...
详细信息
ISBN:
(纸本)9781595939449
Most algorithms developed for scheduling applications on global Grids focus on a single Quality of Service (QoS) parameter such as execution time, cost or total data transmission time. However, if we consider more than one QoS parameter (eg. execution cost and time may be in conflict) then the problem becomes more challenging. To handle such scenarios, it is convenient to use heuristics rather than a deterministic algorithm. In this paper we have proposed a workflow execution planning approach using Multiobjective Differential Evolution (MODE). Our goal was to generate a set of trade-off schedules according to two user specified QoS requirements (time and cost). The alternative tradeoff solutions offer more flexibility to users when estimating their QoS requirements of workflow executions. We have compared our results with two baseline multiobjective evolutionary algorithms. Simulation results show that our modified MODE is able to find a comparatively better spread of compromise solutions. Copyright 2007 ACM.
We present a novel approach for point-set implicit surface sampling that is able to rapidly distribute particles over the surface of 3D objects. Our methods benefit from the inner structure of a MPU implicit to obtain...
详细信息
Tool support for the Java Modeling Language (JML) is a very pressing problem. A main issue with current tools is their architecture: the cost of keeping up with the evolution of Java is prohibitively high: e.g., almos...
详细信息
ISBN:
(纸本)9781595937216
Tool support for the Java Modeling Language (JML) is a very pressing problem. A main issue with current tools is their architecture: the cost of keeping up with the evolution of Java is prohibitively high: e.g., almost three years following its release, Java 5 has yet to be fully supported. This paper presents the architecture of JML4, an Integrated Verification Environment (IVE) for JML that builds upon Eclipse's support for Java, enhancing it with Extended Static Checking (ESC), an early form of Runtime Assertion Checking (RAC) and JML's non-null type system. Early results indicate that the synergy of complementary verification techniques (being made available within a single tool) can help developers be more effective;we demonstrate new bugs uncovered in JML annotated Java source - -like ESC/Java2 - -which is routinely verified using first generation JML tools. Copyright 2007 ACM.
The use of property classifications and patterns, i.e., high-level abstractions that describe common behavior have been shown to assist practitioners in generating formal specifications that can be used informal verif...
详细信息
ISBN:
(纸本)9780769530437
The use of property classifications and patterns, i.e., high-level abstractions that describe common behavior have been shown to assist practitioners in generating formal specifications that can be used informal verification techniques. The Specification Pattern System (SPS) provides descriptions of a collection of patterns. The extent of program execution over which a pattern must hold is described by the notion of scope. SPS provides a manual technique for obtaining formal specifications from a pattern and a scope. The Property Specification Tool (Prospec) extends SPS by introducing Composite Propositions (CPs), a classification for defining sequential and concurrent behavior to represent pattern and scope parameters, and provides a tool to support users. This work provides general templates for generating formal specifications in Linear Temporal Logic (LTL) for all pattern, scope, and CP combinations. In addition, the work explains the methodology for the verification of the correctness of these templates.
Information Retrieval systems used in digital libraries need to find the extent of similarity between a pair of text documents for providing access to topically relevant documents on one hand and for identifying docum...
详细信息
ISBN:
(纸本)9781615677214
Information Retrieval systems used in digital libraries need to find the extent of similarity between a pair of text documents for providing access to topically relevant documents on one hand and for identifying document replication on the other hand. In this paper the details of a Rough Set based Document Ranking system (RSDRS) developed by the authors are presented. The terms associated with related concepts are grouped together to form equivalence classes by clustering the terms of the vocabulary. The query passage and the documents are represented as rough sets using these equivalence classes of terms and further partitioned into families of rough sets in higher level approximation spaces which impose partial ordering on the families of documents with reference to the query passage. Documents falling in the same family are ordered in accordance with their similarity to the query to form the relevance ranking of the documents. The performance of the RSDRS is analyzed using Average Precision metric by computing the precision at different positions in the ranking list.
This paper shows that one of soft actuators, Ionic Polymer-Metal Composite (IPMC) can be modeled in terms of distributed port-Hamiltonian systems with multi-scale. The physical structure of IPMC consists of three part...
详细信息
This paper shows that one of soft actuators, Ionic Polymer-Metal Composite (IPMC) can be modeled in terms of distributed port-Hamiltonian systems with multi-scale. The physical structure of IPMC consists of three parts. The first part is an electric double layer at the interface between the polymer and the metal electrodes. The frequency response of the polymer-metal interface shows a fractal degree of gain slope. Then we adopt a black-box circuit model to this part and give considerations for distributed impedance parameters. The second part is an electrostress diffusion coupling model with bending and relaxation dynamics. This part is represented by an electro-osmosis, which is a water transport by an electric field, and a streaming potential, which is an electric field created by a water transport. We discuss the relationship of stress and bending moment induced by swelling. The third part is a mechanical system modeled as a flexible beam with large deformations. The representation has the capability extracting the control structure based on passivity from distributed parameter systems possessing a complex behavior.
The Bowl Championship Series (BCS) is the system used to select the top two college football teams to play in a championship game at the end of a season. During the nine seasons played under the BCS, few have not caus...
详细信息
Publish/Subscribe model has become a prevalent paradigm for building distributed event delivering systems. Content-based publish/subscribe allows high expresses in subscriptions and thus is more appropriate for conten...
详细信息
software patch generation is a critical phase in the life-cycle of a software vulnerability. The longer it takes to generate a patch, the higher the risk a vulnerable system needs to take to avoid from being compromis...
详细信息
ISBN:
(纸本)1595935746
software patch generation is a critical phase in the life-cycle of a software vulnerability. The longer it takes to generate a patch, the higher the risk a vulnerable system needs to take to avoid from being compromised. However, in practice, it is a rather lengthy process to generate and release software patches. For example, the analysis on 10 recent Microsoft patches (MS06-045 to MS06-054) shows that, for an identified vulnerability, it took 75 days on average to generate and release the patch. In this paper, we present the design, implementation, and evaluation of AutoPaG, a system that aims at reducing the time needed for software patch generation. In our current work, we mainly focus on a common and serious type of software vulnerability: the out-of-bound vulnerability which includes buffer overflows and general boundary condition errors. Given a working out-of-bound exploit which may be previously unknown, AutoPaG is able to catch on the fly the out-of-bound violation, and then, based on data flow analysis, automatically analyzes the program source code and identifies the root cause - vulnerable source-level program statements. Furthermore, within seconds, AutoPaG generates a fine-grained source code patch to temporarily fix it without any human intervention. We have built a proof-of-concept system in Linux and the preliminary results are promising: AutoPaG is able to successfully identify the root cause and generate a source code patch within seconds for every vulnerability test in the Wilander's buffer overflow benchmark test-suite. In addition, the evaluation with a number of real-world out-of-bound exploits also demonstrates its effectiveness and practicality in automatically identifying (vulnerable) source code root causes and generating corresponding patches. Copyright 2007 ACM.
This paper introduces a fault-adaptive control approach for the robust and reliable performance management of computing systems. Fault adaptation involves the detection and isolation of faults, and then taking appropr...
详细信息
暂无评论