In order to reduce network traffic in distributed virtual environment, combined LOD techniques with active interest management based on layered interest management, a layered filtering method based on multi-resolution...
详细信息
During the development of a software, its source code is continuously being modified. Even after the deployment, the maintenance work still involves changing the source code. Some of the modification performed on the ...
详细信息
State Machine Diagram (SMD) is one of the SysML behavior diagrams, but it is a kind of semi-formal model language. As a consequence, models can not be verified conveniently and efficiently, especially in real-time emb...
详细信息
Modern real time embedded systems are typically composed of multiple functional and nonfunctional concerns with nonfunctional concerns affect the former in many aspects. MARTE, an extension profile of UML2, aims to be...
详细信息
Current modeling of infectious diseases allows for the study of complex and realistic scenarios that go from the population to the individual level of description. However, most epidemic models assume that the spreadi...
详细信息
Current modeling of infectious diseases allows for the study of complex and realistic scenarios that go from the population to the individual level of description. However, most epidemic models assume that the spreading process takes place on a single level (be it a single population, a metapopulation system, or a network of contacts). In particular, interdependent contagion phenomena can be addressed only if we go beyond the scheme-one pathogen-one network. In this paper, we propose a framework that allows us to describe the spreading dynamics of two concurrent diseases. Specifically, we characterize analytically the epidemic thresholds of the two diseases for different scenarios and compute the temporal evolution characterizing the unfolding dynamics. Results show that there are regions of the parameter space in which the onset of a disease’s outbreak is conditioned to the prevalence levels of the other disease. Moreover, we show, for the susceptible-infected-susceptible scheme, that under certain circumstances, finite and not vanishing epidemic thresholds are found even at the limit for scale-free networks. For the susceptible-infected-removed scenario, the phenomenology is richer and additional interdependencies show up. We also find that the secondary thresholds for the susceptible-infected-susceptible and susceptible-infected-removed models are different, which results directly from the interaction between both diseases. Our work thus solves an important problem and paves the way toward a more comprehensive description of the dynamics of interacting diseases.
Community detection in bipartite network is very important in the research on the theory and applications of complex network analysis. In this paper, an algorithm for detecting community structure in bipartite network...
详细信息
Communication networks are vulnerable to the natural disasters or malicious attacks, which may cause a large area of corruptions and long term disconnection of network services. Such significant outage has become a se...
详细信息
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do...
详细信息
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do not exist but may appear in the future in dynamic multi-dimensional networks. Firstly, we construct a dynamic multi-dimensional networks from an E-mail network and a telephone network, which makes us correctly describe a Group's staff relationship. Then we present some algorithms to build a reduction dimensional network and a dynamic network. After that, we give bi-directional link mining methods in a dynamic multi-dimensional weighted network and apply these methods in the enterprise's employee relational network. Experimental results show that these methods can effectively predict associations among persons in a large scale employee networks.
software architecture (SA) documentation provides a blueprint of a software-intensive system for the communication between stakeholders about the high-level design of the system. In open source software (OSS) developm...
详细信息
software architecture (SA) documentation provides a blueprint of a software-intensive system for the communication between stakeholders about the high-level design of the system. In open source software (OSS) development, a lack of SA documentation may hinder the use and further development of OSS, but how much "architecture" documentation is enough and appropriate is largely dependent on the contextual factors of development. In order to understand the state of the practice of SA documentation in OSS projects, we conducted a documentation-based survey to explore how SA is documented in OSS projects. Out of 2,000 OSS projects from four major OSS sources, we found that 108 projects have some SA documentation, which shows that the SA documentation is scarce in OSS development. We analyzed these 108 projects to understand what SA information has been documented and how they have been described. We have found that frequently-documented architectural information is model, system, and mission, natural language is the most frequently-used architectural language for specifying architectural information in OSS SA documents. The results also show that the likelihood that an OSS project will document SA is increased when more developers are involved in the project, and industry and research OSS projects are more likely to create SA documents than freelance projects.
Many networks of interest in sciences and social research can be divided naturally into anti-communities. The problem of detecting and characterising such anti-community structure has attracted recent attention. In th...
详细信息
暂无评论