Contextual refinement is a compositional approach to compositional verification of concurrent *** has been much work designing program logics to prove the contextual refinement between the object implementation and it...
详细信息
Contextual refinement is a compositional approach to compositional verification of concurrent *** has been much work designing program logics to prove the contextual refinement between the object implementation and its abstract ***,these program logics for contextual refinement verification cannot support objects with resource ownership transfer,which is a common pattern in many concurrent objects,such as the memory management module in OS kernels,which transfers the allocated memory block between the object and *** this paper,we propose a new approach to give abstract and implementation independent specifications to concurrent objects with ownership *** also design a program logic to verify contextual refinement of concurrent objects *** abstract *** have successfully applied our logic to verifying an implementation of the memory management module,where the implementation is an appropriately simplified version of the original version from a real-world preemptive OS kernel.
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
Community detection is an important methodology for understanding the intrinsic structure and function of a realworld network. In this paper, we propose an effective and efficient algorithm, called Dominant label Prop...
详细信息
Community detection is an important methodology for understanding the intrinsic structure and function of a realworld network. In this paper, we propose an effective and efficient algorithm, called Dominant label Propagation Algorithm(Abbreviated as DLPA), to detect communities in complex networks. The algorithm simulates a special voting process to detect overlapping and non-overlapping community structure in complex networks simultaneously. Our algorithm is very efficient, since its computational complexity is almost linear to the number of edges in the network. Experimental results on both real-world and synthetic networks show that our algorithm also possesses high accuracies on detecting community structure in networks.
The quality of internetware software is significantly associated with class *** software evolves,changes often introduce many unrelated responsibilities to the same classes or distribute tightly-related methods in dif...
详细信息
The quality of internetware software is significantly associated with class *** software evolves,changes often introduce many unrelated responsibilities to the same classes or distribute tightly-related methods in different *** changes make the classes difficult to understand and *** class refactoring is an effective technique to improve the quality of software structure by decomposing unrelated methods in one class to create new classes or extracting tightly-related methods from different *** this paper,we propose a novel approach for class extraction from internetware source *** approach leverages a community structure detection technique to partition software into clusters and extracts classes from the resulting *** experimental results,which investigate the public well-known internetware PKUAS,indicate that:(1)the proposed approach is much faster than existing search-based clustering approaches(Hillclimbing and Genetic algorithm)and is thus applicable for large-scale internetware;(2)the proposed approach can identify meaningful class extractions for internetware;and(3)Extract Class refactoring candidates identified by the proposed approach significantly improve class cohesion of internetware.
Mining community structures has become a general problem which exists in many fields including: computer-science, Mathematics, Physics, Biology, Sociology and so on. It has developed rapidly and been used widely in ma...
详细信息
ISBN:
(纸本)9781479929719
Mining community structures has become a general problem which exists in many fields including: computer-science, Mathematics, Physics, Biology, Sociology and so on. It has developed rapidly and been used widely in many applications: web data mining, social network analysis, criminal network mining, protein interaction network analysis, metabolic network analysis, genetic network analysis, customers relationship mining and user online behavior analysis, etc. Most community detection algorithms try to obtain the global information of the network, but increasing large scale of the current network makes it computationally expensive. In the meanwhile, the different influence and different behavior of nodes in the network are ignored. In fact, if we know the local information of the network or the interested node, we can easily detect the local community. This paper proposes a multi-resolution local community detection algorithm named MRCDA which uses local structural information in the network to optimize the multi-resolution modularity based on the Potts spin-glass model. A local community can be detected through continuous optimization of the function by expanding from an initial influential node computed by a modified Page Rank sorting algorithm. The proposed MRCDA has been tested on both synthetic and real world networks and tested against other algorithms. The experiments demonstrate its efficiency and accuracy.
JAPS is an automatic parallelizing system based on JAVA running on NOW. It implements the automatic process from dependence analysis to parallel execution. The current version of JAPS can exploit functional parallelis...
详细信息
JAPS is an automatic parallelizing system based on JAVA running on NOW. It implements the automatic process from dependence analysis to parallel execution. The current version of JAPS can exploit functional parallelism and the detection of data parallelism will be incorporated in the new version, which is underway. The framework and key techniques of JAPS are presented. Specific topics discussed are task partitioning, summary information collection, data dependence analysis, pre-scheduling and dynamic scheduling, etc.
An element may have heterogeneous semantic interpretations in different ontologies. Therefore, understanding the real local meanings of elements is very useful for ontology operations such as querying and reasoning, w...
详细信息
An element may have heterogeneous semantic interpretations in different ontologies. Therefore, understanding the real local meanings of elements is very useful for ontology operations such as querying and reasoning, which are the foundations for many applications including semantic searching, ontology matching, and linked data analysis. However, since different ontologies have different preferences to describe their elements, obtaining the semantic context of an element is an open problem. A semantic subgraph was proposed to capture the real meanings of ontology elements. To extract the semantic subgraphs, a hybrid ontology graph is used to represent the semantic relations between elements. An extracting algorithm based on an electrical circuit model is then used with new conductivity calculation rules to improve the quality of the semantic subgraphs. The evaluation results show that the semantic subgraphs properly capture the local meanings of elements. Ontology matching based on semantic subgraphs also demonstrates that the semantic subgraph is a promising technique for ontology applications.
With the development of Internet technology,a large portion of computersoftwares appear to run in a network-oriented,distributed-deployed,and self-evolving *** emerging wireless communication technologies broaden the...
详细信息
With the development of Internet technology,a large portion of computersoftwares appear to run in a network-oriented,distributed-deployed,and self-evolving *** emerging wireless communication technologies broaden the usage of software in mobile platforms,enabling the pervasive computing paradigm,where people can access information/service anytime and anywhere with portable *** the pervasive networking environment where mobile devices operate on the ad hoc mode and communicate with each other opportunistically without wireless infrastructures,distributing the evolving software updates to a set of mobile terminals is a challenging *** this paper,we address the problem of distributing multiple software updates in pervasive networks with storage and bandwidth constraints,and propose age-based solutions to tackle this *** basic idea is to introduce different age-based priority mechanisms for propagation decision making in order to resolve the contention of wireless bandwidth and storage *** investigate a number of update propagation strategies including random spread,youngest age,and golden *** models are derived to analyse the performance of the proposed *** is shown that the golden age strategy has the burst effect,which could be used to enhance the efficiency of software update *** principles for choosing golden age values are proposed aiming to optimize different utility *** simulations under various network parameters show that the golden age strategy outperforms other strategies for multi-source software updates propagation.
Functional encryption(FE)[1,2]is a modern type of encryption scheme that extends several previous notions and allows tremendous flexibility in controlling and computing on encrypted *** enables an authority to derive ...
详细信息
Functional encryption(FE)[1,2]is a modern type of encryption scheme that extends several previous notions and allows tremendous flexibility in controlling and computing on encrypted *** enables an authority to derive constrained decryp-
An object on the Semantic Web is likely to be denoted with several URIs by different parties. Object core-ferencing is a process to identify "equivalent" URIs of objects for achieving a better Data Web. In this pape...
详细信息
An object on the Semantic Web is likely to be denoted with several URIs by different parties. Object core-ferencing is a process to identify "equivalent" URIs of objects for achieving a better Data Web. In this paper, we propose a bootstrapping approach for object coreferencing on the Semantic Web. For an object URI, we firstly establish a kernel that consists of semantically equivalent URIs from the same-as, (inverse) functional properties and (max-)cardinalities, and then extend the kernel with respect to the textual descriptions (e.g., labels and local names) of URIs. We also propose a trustworthiness-based method to rank the coreferent URIs in the kernel as well as a similarity-based method for ranking the URIs in the extension of the kernel. We implement the proposed approach, called ObjectCoref, on a large-scale dataset that contains 76 million URIs collected by the Falcons search engine until 2008. The evaluation on precision, relative recall and response time demonstrates the feasibility of our approach. Additionally, we apply the proposed approach to investigate the popularity of the URI alias phenomenon on the current Semantic Web.
暂无评论