Management of requirements inconsistency is key to the development of complex trustworthy software system, and precise measurement is precondition for the management of requirements inconsistency properly. But at pres...
详细信息
ISBN:
(纸本)076952284X
Management of requirements inconsistency is key to the development of complex trustworthy software system, and precise measurement is precondition for the management of requirements inconsistency properly. But at present, although there are a lot of work on the detection of requirements inconsistency, most of them are limited in treating requirements inconsistency according to heuristic rules, we still lacks of promising method for handling requirements inconsistency properly. Based on an abstract requirements refinement process model, this paper takes domain ontology as infrastructure for the refinement of software requirements, the aim of which is to get requirements descriptions that are comparable. Thus we can measure requirements inconsistency based on tangent plane of requirements refinement tree, after we have detected inconsistent relations of leaf nodes at semantic level.
Verb classification is very important for temporal information analysis and semantic understanding. In English, this topic has been fully studied. However, there are few works and no systematic approaches in Chinese u...
详细信息
ISBN:
(纸本)0780382730
Verb classification is very important for temporal information analysis and semantic understanding. In English, this topic has been fully studied. However, there are few works and no systematic approaches in Chinese up to now. We propose a new approach using fuzzy sets and genetic algorithm for Chinese verb classification. Its contribution lies in two aspects: it (a) provides a flexible and systematic framework for solving this problem; and (b) achieves high precision in experiments.
The homogeneous balance method is a method for solving general partial differential equations (PDEs). Inthis paper we solve a kind of initial problems of the PDEs by using the special Backlund transformations of the i...
详细信息
The homogeneous balance method is a method for solving general partial differential equations (PDEs). Inthis paper we solve a kind of initial problems of the PDEs by using the special Backlund transformations of the initialproblem. The basic Fourier transformation method and some variable-separation skill are used as auxiliaries. Two initialproblems of Nizhnich and the Nizhnich-Novikov-Veselov equations are solved by using this approach.
Anaphora always appears in the text and it is a hot topic in linguistics and computational linguistics area. Anaphora resolution is an important part of the information extraction, and it is also important to discours...
详细信息
Anaphora always appears in the text and it is a hot topic in linguistics and computational linguistics area. Anaphora resolution is an important part of the information extraction, and it is also important to discourse understanding, machine translation, abstract extraction and so on. After studying on the text in Chinese financial domain, an anaphora resolution system is proposed, which is built on a set of filtration rules and a set of evaluation rules. The experiment result shows the precision is 91.4%.
In this paper, we describe a comprehensive study conducted to understand the methodologies which are being used to design Intelligent Decision Support systems (IDSSs) and to identify the key methodological problems an...
详细信息
In this paper, we describe a comprehensive study conducted to understand the methodologies which are being used to design Intelligent Decision Support systems (IDSSs) and to identify the key methodological problems and benefits with using these methodologies. This comprehensive study consists of two parts. The first part is two surveys which together identify the design methodologies being used by a group of IDSS developers and how acceptable they believe their methodologies were for designing their IDSSs. The second part is a comparison of six major formal IDSS design methodologies recently published in the literature and which are not yet known to many developers. This paper is presented to assist IDSS developers in understanding what support can be gained from using existing design methodologies and hence choose the correct one for their project. Furthermore, the paper may be used by IDSS developers to compare the way that they work with the approach proposed by other developers. (C) 1997 Elsevier Science B.V.
Elliptic Curve Cryptography (ECC) is an encryption method that provides security comparable to traditional techniques like Rivest–Shamir–Adleman (RSA) but with lower computational complexity and smaller key sizes, m...
详细信息
Elliptic Curve Cryptography (ECC) is an encryption method that provides security comparable to traditional techniques like Rivest–Shamir–Adleman (RSA) but with lower computational complexity and smaller key sizes, making it a competitive option for applications such as blockchain, secure multi-party computation, and database security. However, the throughput of ECC is still hindered by the significant performance overhead associated with elliptic curve (EC) operations, which can affect their efficiency in real-world scenarios. This paper presents gECC, a versatile framework for ECC optimized for GPU architectures, specifically engineered to achieve high-throughput performance in EC operations. To maximize throughput, gECC incorporates batch-based execution of EC operations and microarchitecture-level optimization of modular arithmetic. It employs Montgomery’s trick [40] to enable batch EC computation and incorporates novel computation parallelization and memory management techniques to maximize the computation parallelism and minimize the access overhead of GPU global memory. Furthermore, we analyze the primary bottleneck in modular multiplication by investigating how the user codes of modular multiplication are compiled into hardware instructions and what these instructions’ issuance rates are. We identify that the efficiency of modular multiplication is highly dependent on the number of Integer Multiply-Add (IMAD) instructions. To eliminate this bottleneck, we propose novel techniques to minimize the number of IMAD instructions by leveraging predicate registers to pass the carry information and using addition and subtraction instructions (IADD3) to replace IMAD instructions. Our experimental results show that, for ECDSA and ECDH, the two commonly used ECC algorithms, gECC can achieve performance improvements of 5.56 × and 4.94 ×, respectively, compared to the state-of-the-art GPU-based system. In a real-world blockchain application, we can achieve performance impr
Welcome to the proceedings of GCC2004 and the city of Wuhan. Grid computing has become a mainstream research area in computer science and the GCC conference has become one of the premier forums for presentation of new...
详细信息
ISBN:
(数字)9783540302070
ISBN:
(纸本)9783540235781
Welcome to the proceedings of GCC2004 and the city of Wuhan. Grid computing has become a mainstream research area in computer science and the GCC conference has become one of the premier forums for presentation of new and exciting research in all aspectsofgridandcooperativecomputing. Theprogramcommitteeispleasedtopresent the proceedings of the 3rd International Conference on Grid and Cooperative Comp- ing (GCC2004), which comprises a collection of excellent technical papers, posters, workshops, and keynote speeches. The papers accepted cover a wide range of exciting topics, including resource grid and service grid, information grid and knowledge grid, grid monitoring,managementand organizationtools, grid portal, grid service, Web s- vices and their QoS, service orchestration, grid middleware and toolkits, software glue technologies, grid security, innovative grid applications, advanced resource reservation andscheduling,performanceevaluationandmodeling,computer-supportedcooperative work, P2P computing, automatic computing, and meta-information management. The conference continues to grow and this year a record total of 581 manuscripts (including workshop submissions) were submitted for consideration. Expecting this growth, the size of the program committee was increased from 50 members for GCC 2003 for 70 in GCC 2004. Relevant differences from previous editions of the conf- ence: it is worth mentioning a signi?cant increase in the number of papers submitted by authors from outside China; and the acceptance rate was much lower than for p- vious GCC conferences. From the 427 papers submitted to the main conference, the program committee selected only 96 regular papers for oral presentation and 62 short papers for poster presentation in the program.
Connected Autonomous Vehicle (CAV) Driving, as a data-driven intelligent driving technology within the Internet of Vehicles (IoV), presents significant challenges to the efficiency and security of real-time data manag...
详细信息
Connected Autonomous Vehicle (CAV) Driving, as a data-driven intelligent driving technology within the Internet of Vehicles (IoV), presents significant challenges to the efficiency and security of real-time data management. The combination of Web3.0 and edge content caching holds promise in providing low-latency data access for CAVs’ real-time applications. Web3.0 enables the reliable pre-migration of frequently requested content from content providers to edge nodes. However, identifying optimal edge node peers for joint content caching and replacement remains challenging due to the dynamic nature of traffic flow in IoV. Addressing these challenges, this article introduces GAMA-Cache, an innovative edge content caching methodology leveraging Graph Attention Networks (GAT) and Multi-Agent Reinforcement Learning (MARL). GAMA-Cache conceptualizes the cooperative edge content caching issue as a constrained Markov decision process. It employs a MARL technique predicated on cooperation effectiveness to discern optimal caching decisions, with GAT augmenting information extracted from adjacent nodes. A distinct collaborator selection mechanism is also developed to streamline communication between agents, filtering out those with minimal correlations in the vector input to the policy network. Experimental results demonstrate that, in terms of service latency and delivery failure, the GAMA-Cache outperforms other state-of-the-art MARL solutions for edge content caching in IoV.
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are org...
详细信息
ISBN:
(数字)9783642395277
ISBN:
(纸本)9783642395260
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
暂无评论