This paper presents a newly developed environment for supporting the management of software testing. This environment has been built on the top of UNIX and RCS to maintain all versions of the specifications, the test ...
详细信息
This paper presents a newly developed environment for supporting the management of software testing. This environment has been built on the top of UNIX and RCS to maintain all versions of the specifications, the test cases and programs, as well as managing the relationships among these components. It is a practical model of applying software configuration management methods to the testing process.< >
Edge intelligence (EI) integrates edge computing and artificial intelligence empowering service providers to deploy deep neural networks (DNNs) on edge servers in proximity to users to provision intelligent applicatio...
详细信息
Edge intelligence (EI) integrates edge computing and artificial intelligence empowering service providers to deploy deep neural networks (DNNs) on edge servers in proximity to users to provision intelligent applications (e.g., autonomous driving) for ubiquitous Internet of Things (IoT) in smart cities, which facilitates the quality of experience (QoE) of users and improves the processing and energy efficiency. However, considering DNN is typically computational-intensive and resource-hungry, conventional placement approaches ignore the influence of multi-dimensional resource requirements (processor, memory, etc.), which may degrade the real-time performance. Moreover, with the increasing scale of geo-distributed edge servers, centralized decision-making is still challenging to find the optimal strategies effectively. To overcome these shortcomings, in this paper we propose a game theoretic DNN placement approach in EI-enabled IoT. First, a DNN placement optimization problem is formulated to maximize system benefits, which is proven to be \(\mathcal {N}\mathcal {P}\)-hard and model the original problem as an exact potential game (EPG). Moreover, an EPG-based DNN model placement algorithm, named EPOL, is designed for edge servers to make sub-optimal strategies independently and theoretical analysis is possessed to guarantee the performance of EPOL. Finally, real-world dataset based experimental results corroborate the superiority and effectiveness of EPOL.
In this paper, a modeling method of supply chain process(SCP) based on SCP grammar definition and analyst is proposed. In this method, a SCP is taken as a whole sentence. On basis of this idea, the sy
In this paper, a modeling method of supply chain process(SCP) based on SCP grammar definition and analyst is proposed. In this method, a SCP is taken as a whole sentence. On basis of this idea, the sy
With the widespread application of sequential pattern mining (SPM) algorithms, sequential patterns that allow gap constraints are valuable for discovering knowledge from biological data such as DNA and protein sequenc...
详细信息
With the widespread application of sequential pattern mining (SPM) algorithms, sequential patterns that allow gap constraints are valuable for discovering knowledge from biological data such as DNA and protein sequences and some non-biological data. This approach achieves a balance between contiguous constraint SPM and traditional SPM, enabling the discovery of a wider range of patterns while accommodating user-defined gaps as needed. Among all kinds of gap-constrained mining, non-overlapping SPM, which involves discovering interesting patterns where occurrences do not overlap with each other, satisfies the anti-monotonic property (the Apriori property, i.e., the support of a pattern is not larger than that of its sub-patterns). However, existing algorithms do not search for target sequential patterns, resulting in unnecessary and redundant pattern generation. Targeted pattern mining is a technique employed to discover itemsets or sequential patterns that are directly related to items of interest to the user. In this paper, we define and formalize the problem of targeted non-overlapping SPM and propose an algorithm named TALENT (TArgeted mining of SequentiaL PattErN with ConsTraints). Two search methods, including breadth-first and depth-first searching, are designed to address the generation of patterns. Furthermore, several pruning strategies are presented to reduce the reading of sequences and items in the data and terminate redundant pattern extensions. Finally, we conduct extensive experiments to compare the TALENT algorithm with the existing algorithms for mining non-overlapping sequential patterns. The experimental results demonstrate that TALENT has excellent mining efficiency and can deal efficiently with different query settings. In the best-case scenario, TALENT exhibits a three-order-of-magnitude reduction in time and a memory decrease to 20% of the original consumption compared to the baseline algorithm, NOSEP\(\rm _{Ta}\).
Genetic algorithm is widely applied to the field of image matching. But it is very time-consuming to solve some large computational problems with large search space or complex fitness function. Image
Genetic algorithm is widely applied to the field of image matching. But it is very time-consuming to solve some large computational problems with large search space or complex fitness function. Image
On behalf of the Organizing Committee I am pleased to present the proceedings of the 2006 Symposium on Component-Based softwareengineering (CBSE). CBSE is concerned with the development of software-intensive systems ...
详细信息
ISBN:
(数字)9783540356295
ISBN:
(纸本)9783540356288
On behalf of the Organizing Committee I am pleased to present the proceedings of the 2006 Symposium on Component-Based softwareengineering (CBSE). CBSE is concerned with the development of software-intensive systems from reusable parts (components), the development of reusable parts, and system maintenance and improvement by means of component replacement and customization. CBSE 2006 was the ninth in a series of events that promote a science and technology foundation for achieving predictable quality in software systems through the use of software component technology and its associated softwareengineering practices. We were fortunate to have a dedicated Program Committee comprising 27 internationally recognized researchers and industrial practitioners. We received 77 submissions and each paper was reviewed by at least three Program Committee members (four for papers with an author on the Program Committee). The entire reviewing process was supported by Microsoft’s CMT technology. In total, 22 submissions were accepted as full papers and 9 submissions were accepted as short papers. This was the first time CBSE was not held as a co-located event at ICSE. Hence special thanks are due to Ivica Crnkovic for hosting the event. We also wish to thank the ACM Special Interest Group on softwareengineering (SIGSOFT) for their sponsorship of CBSE 2005. The proceedings you now hold were published by Springer and we are grateful for their support. Finally, we must thank the many authors who contributed the high-quality papers contained within these proceedings.
Selection and configuration of equipments in flax short spinning, performances of FXL series gilling machine, and its main parameters during processing were introduced in this paper. Discussion was al
Selection and configuration of equipments in flax short spinning, performances of FXL series gilling machine, and its main parameters during processing were introduced in this paper. Discussion was al
Aiming at the problems caused by hasty increasing of server’s quantity, this paper presents a virtual server environment constructed based on Citrix XenS erver and integrates all existing server resou
Aiming at the problems caused by hasty increasing of server’s quantity, this paper presents a virtual server environment constructed based on Citrix XenS erver and integrates all existing server resou
This book provides a platform for academics and practitioners for sharing innovative results, approaches, developments, and research projects in computerscience and information technology, focusing on the l...
详细信息
ISBN:
(数字)9789813366329
ISBN:
(纸本)9789813366312;9789813366343
This book provides a platform for academics and practitioners for sharing innovative results, approaches, developments, and research projects in computerscience and information technology, focusing on the latest challenges in advanced computing and solutions introducing mathematical and engineering approaches. The book presents discussions in the area of advances and challenges of modern computerscience, including telecommunications and signal processing, machine learning and artificial intelligence, intelligent control systems, modeling and simulation, data science and big data, data visualization and graphics systems, distributed, cloud and high-performance computing, and softwareengineering. The papers included are presented at TELECCON 2019 organized by Peter the Great St. Petersburg university during November 18–19, 2019.
This book constitutes the refereed post-conference proceedings of the 13;International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2017, held in Dalian, China, in Dece...
详细信息
ISBN:
(数字)9783319780788
ISBN:
(纸本)9783319780771
This book constitutes the refereed post-conference proceedings of the 13;International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2017, held in Dalian, China, in December 2017. The 25 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks, starting with mobile and wireless networks, quality and reliability, wireless networking algorithms and protocols, and smart applications.
暂无评论