Web Intelligence (WI) is a new and active research field in current AI and IT. Intelligent B2C Portals are an important research topic in WI. In this paper, we first investigate and analyze the architecture of a B2C p...
详细信息
Requirements engineering and architectural design are key activities for the successful development of software-intensive systems. Although both activities are strongly intertwined and interrelated, many steps to date...
详细信息
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signa...
详细信息
End user acceptance and satisfaction with a new IT innovation is the pre-requisite for the successful introduction of this IT solutino into an organization. More than 70 per cent of health IT projects have failed to a...
详细信息
Requirements engineering and architectural design are key activities for the successful development of software-intensive systems. Although both activities are strongly intertwined and interrelated, many steps to date...
详细信息
Requirements engineering and architectural design are key activities for the successful development of software-intensive systems. Although both activities are strongly intertwined and interrelated, many steps to date are driven solely by the intuition and the architectural knowledge of individuals. Thus, systematic approaches are needed which could minimize the risks of wrong early requirements and architectural decisions and foster the explicit reuse of architectural knowledge especially for supporting early design decisions are. In this paper, we present our vision of supporting the early requirements and architectural decisions by making explicit the interactions between the early steps and artifacts in requirements engineering and architectural design and thereby reusing architectural knowledge. To this end, we propose to couple goal-oriented requirements engineering and compositional architecture development by means of a repository of reusable, generic architectural drivers.
Nowadays, smart spaces occupy an essential part of ubiquitous computing environment. The spaces integrated with wireless sensors networks, actuators and context-aware services become part of our daily life. Smart spac...
详细信息
Nowadays, smart spaces occupy an essential part of ubiquitous computing environment. The spaces integrated with wireless sensors networks, actuators and context-aware services become part of our daily life. Smart spaces are equipped with a large number of wireless sensors that aim to collect large quantities of context information, during the process, there exists a large amount of collisions and energy consumption. Therefore, this paper provides a novel multi-rate based local framing pre-schedule scheme to further reduce collisions and improve energy efficiency in CSMA/TDMA hybrid MAC layer of wireless sensor network. This MAC combines CSMA and TDMA functionalities together while obviates their shortcomings. Having been assigned, slot 0 is preserved as the pre-schedule slot, to inform neighbor nodes the schedule of the senders. During the pre-schedule slot, each node knows exactly the schedule of other neighbor nodes. Multi-rate and power scaling are applied to achieve further energy saving by adpoting an acceptable rate rather than maximum rate. Data rate is dynamically adjusted according to the traffic load of sending nodes, in an energy efficient data rate, to save energy. Being compared with Z-MAC in terms of performances, local framing pre-schedule and multi-rate in this experiment achieved further energy efficiency.
Object-oriented method, agent- oriented programming method, aspect-oriented of programming method, formal specification languages, component-based software designing method,.... This incomplete list of methods propose...
详细信息
ISBN:
(纸本)9781424431779
Object-oriented method, agent- oriented programming method, aspect-oriented of programming method, formal specification languages, component-based software designing method,.... This incomplete list of methods proposed to solve a conventional well-known problem: how to enhance a software of flexibility and ubiquitous ability. Programming methods have been the crucial task during the past decades, and the results still have not been successful yet. Constructing a suitable programming model for ubiquitous computing based on the pervasive spaces is pedestal in improving the flexibility and adaptability, enhancing the robusticity of ubiquitous systems, and creating an open platform for interoperability, complexity and multiplicity. There are many programming models have been proposed and studied for their feasibilities as the groundwork for implementing in the ubiquitous spaces. We contrast their advantages and disadvantages.
Web services are the mainstream distributed computing technology to construct a service-oriented architecture (SOA). Over the past few years, lots of works have been carried out in comparing SOAP with binary protocols...
详细信息
Web services are the mainstream distributed computing technology to construct a service-oriented architecture (SOA). Over the past few years, lots of works have been carried out in comparing SOAP with binary protocols, such as Java RMI and CORBA. These researches show that there is a dramatic difference in the amount of encoding necessary for data transmission, when XML is compared with the binary encoding style, and all these researches have proven that SOAP, because of its reliance on XML, is inefficient compared with its peers in distributed computing. Although the performance of Web services is adequate for many important purposes, processing speed unfortunately remains to be a problem in more demanding applications. Some limitations are inherent in core features of XML: it is text based, flexible in format, and carries redundant information. Aiming at this question, a new approach to improve Web services performance is proposed. To avoid the cost brought by the traditional XML parsing and Java reflection at runtime, a specific SOAP message processor is generated dynamically for each Web service, which can create Java object for service business invoking by scanning SOAP message only once. The given experiments show that the approach can effectively improve the performance of Web service by incorporating the SOAP message processor into the SOAP engine.
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infra...
详细信息
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infrastructure-based networks to be compatible with the characteristics of MANET. Moreover, we add some new features and their associated measurements that we believe important for testing new proposed IDS. The modified measurements with the new added ones form a set of measurements that will be used throughout the testing process. To the best of our knowledge, there has not been any work done for testing IDS in MANET. Simulators are the most common tools used for testing the IDS. Therefore, we add some precautions for choosing a simulator and a list of available simulators. The precautions will help researchers to test the measurements efficiently and the list of simulators will guide them to select one according to their needs. Finally, we present some input parameter precautions that help on having more trustworthy testing results.
It is more convenient to talk about changes in a domainspecific way than to formulate them at the programming construct level or-even worse-purely lexical level. Using aspect-oriented programming, changes can be modul...
详细信息
It is more convenient to talk about changes in a domainspecific way than to formulate them at the programming construct level or-even worse-purely lexical level. Using aspect-oriented programming, changes can be modularized and made reapplicable. In this paper, selected change types in web applications are analyzed. They are expressed in terms of general change types which, in turn, are implemented using aspect-oriented programming. Some of general change types match aspect-oriented design patterns or their combinations.
暂无评论