Super-peer P2P systems strike a balance between searching efficiency in centralized P2P systems and the autonomy, load balancing and robustness provided by pure P2P systems. Super-peer is a node in the super-peer P2P ...
详细信息
Super-peer P2P systems strike a balance between searching efficiency in centralized P2P systems and the autonomy, load balancing and robustness provided by pure P2P systems. Super-peer is a node in the super-peer P2P system that maintains the central index for the information shared by a set of peers within the same cluster. The central index handles the searching request on behalf of the connecting set of peers and also passes on the request to neighboring super-peers in order to access additional indices and peers. In this paper, we study the behavior of query answering in super-peer P2P systems with the aim of understanding the issues and tradeoffs in designing a scalable super-peer system. We focus on where to post queries in order to retrieve the result and investigate the implications for four different architectures: caching queries and caching query results at the super-peer; caching the data location of previous queries; and an ordinary P2P system without any caching facilities. The paper discusses the tradeoffs parameters between architectures with respect to caching, highlights the effect of key parameter on system performance.
Nowadays, the growth of internet has been accompanied by the growth of web services (e.g e-government, e-health, e-commerce). Web services collect data, especially individuals, from users and use them for various purp...
详细信息
Nowadays, the growth of internet has been accompanied by the growth of web services (e.g e-government, e-health, e-commerce). Web services collect data, especially individuals, from users and use them for various purposes. Sometimes, web services need to release the data they own to third parties. Because privacy is an important concern in web services, there are several research efforts have been devoted to address issues related to the development of privacy-preserving data management techniques. In [3], Agrawal et. al. has introduced Hippocratic Database incorporating privacy protection in relational database systems. In this paper, we’ll proposed the use of Hippocratic Database to ensure the privacy in web services. We use a scenario for driving license renewal by Road Transport Department in order to illustrate this.
Component-based softwareengineering (CBSE) is becoming popular due to the benefits of software reuse and the availability of many alternatives of reusable components. By reusing existing software components that have...
详细信息
Component-based softwareengineering (CBSE) is becoming popular due to the benefits of software reuse and the availability of many alternatives of reusable components. By reusing existing software components that have already been tested, software engineers may reduce errors and shorten the time to market the system under development. However, software engineers still have a problem in selecting the existing reusable components as well as difficulties in determining the quality of the developed components for future reuse. Therefore, an appropriate component evaluation framework is extremely needed to harvest the full benefits of software reuse. In this paper, we present the comparative evaluation of the state-of-the-art component evaluation approaches with an emphasize on reusability. The results presented in this paper are very useful in achieving the ultimate aim of our research i.e. providing a holistic component evaluation approach that may assist software engineer both in the selection of the existing reusable components and the development of new reusable components.
In this paper, we proposed an efficient algorithm, TOPK_CLOSED, for mining top-k closed itemsets. This algorithm mines top-k closed itemsets using best-first search. The closed itemsets with the highest supports are f...
详细信息
In this paper, we proposed an efficient algorithm, TOPK_CLOSED, for mining top-k closed itemsets. This algorithm mines top-k closed itemsets using best-first search. The closed itemsets with the highest supports are firstly found from this algorithm. Consequently, the method quickly finds top-k closed itemsets, which leads to an efficient pruning unnecessary itemsets and stop mining rapidly. In addition, this algorithm can generate closed itemsets without keeping candidates in main memory.
Recent advances in microarray technology allow scientists to measure expression levels of thousands of genes simultaneously in human tissue samples. This technology has been increasingly used in cancer research becaus...
详细信息
Recent advances in microarray technology allow scientists to measure expression levels of thousands of genes simultaneously in human tissue samples. This technology has been increasingly used in cancer research because of its potential for classification of the tissue samples based only on gene expression levels. A major problem in these microarray data is that the number of genes greatly exceeds the number of tissue samples. Moreover, these data have a noisy nature. It has been shown from literature review that selecting a small subset of informative genes can lead to an improved classification accuracy. Thus, this paper aims to select a small subset of informative genes that is most relevant for the cancer classification. To achieve this aim, an approach using two hybrid methods has been proposed. This approach is assessed on two well-known microarray data. The experimental results have shown that the gene subsets are very small in size and yield better classification accuracy as compared with other previous works as well as four methods experimented in this work. In addition, a list of informative genes in the best subsets is also presented for biological usage.
This paper presents a case study that describes TSPi teaching (introduction to the team software process) to 4th year students, grouped by teams, at the computer Science School, Polytechnic University of Madrid (UPM)....
详细信息
This paper presents a case study that describes TSPi teaching (introduction to the team software process) to 4th year students, grouped by teams, at the computer Science School, Polytechnic University of Madrid (UPM). The achievements of the teams, due to training and the use of TSPi, were analyzed and discussed. This paper briefly discusses the approach to the teaching and some of the issues that were identified. The teams collected data on the projects developed. They reviewed the schedule and quality status weekly. The metrics selected to analyze the impact on the students were: size, effort, productivity, costs and defects density. These metrics were chosen to analyze teams 'performance evolution through project development. This paper also presents a study related to the evolution of estimation, quality and productivity improvements these teams obtained. This study will prove that training in TSPi has a positive impact on getting better estimations, reducing costs, improving productivity, and decreasing defect density. Finally, the teams 'performance are analyzed.
Aesthetics is vital in affecting users' usage in Web interaction. In order to measure aesthetics, an application such as aesthetic measurement application (AMA) needs to be created. In the effort of doing so, this...
详细信息
Aesthetics is vital in affecting users' usage in Web interaction. In order to measure aesthetics, an application such as aesthetic measurement application (AMA) needs to be created. In the effort of doing so, this article describes the accuracy of our AMA in measuring the aesthetic aspect by comparing the results of our application and users' perceptions in measuring the aesthetics of the Web page interfaces. The Web pages used in our study were Mandarin learning Web pages that comprised of main pages, learning pages and exercise pages. For this research, the positions of objects, images element and texts element are defined as objects in a Web page interface. The objects of the Web pages were manipulated in order to produce the desired aesthetic values. The six aesthetics related elements used are balance, equilibrium, symmetry, sequence, rhythm, as well as order and complexity. The object modeling used as well as the process in developing this application were discussed in details. The steps on how to run our application were explained. This is to assist those who are interested may duplicate our study and improve the aesthetic measurement design in order to come up with a more ideal aesthetic measurement tool.
The magnetostrictive linear position sensor (MLPS) is a kind of sensor that can get the distance being measured by detecting and calculating the induced wave signal and elastic wave signal. The magnetostrictive effect...
详细信息
The magnetostrictive linear position sensor (MLPS) is a kind of sensor that can get the distance being measured by detecting and calculating the induced wave signal and elastic wave signal. The magnetostrictive effect and inverse magnetostrictive effect of magnetostrictive material should induce the turning of magnetic domain and the moving of magnetic domain wall on the senor line. This essay discussed the main characteristic of the oscillator signal of induced waves under experiments, and main factors contributing to oscillator signal were analyzed. The relationship between the rolls of coil and the waveform character of induced waves were analyzed in the paper.
作者:
He-xuan HuAnne-lise GehinMireille BayartLanguages
Informatics Systems and Software Engineering Department Faculty of Computer Science Université des Sciences et Technologies de Lille Villeneuve d'Ascq France
This paper proposes a formal framework for reconfigurable control, based on model checking. This framework first generates a flexible model (i.e., an execution structure) according to the diagnosis, then defines a tem...
详细信息
This paper proposes a formal framework for reconfigurable control, based on model checking. This framework first generates a flexible model (i.e., an execution structure) according to the diagnosis, then defines a temporal specification language to deal with the problems due to infinite execution cycles and non-determinism, and finally provides the algorithms that will automatically verify whether the updated model satisfies the desired specification.
暂无评论