As one of the most important patterns of cloud service, PaaS provides an entire development, deployment and runtime platform for SaaS applications. In a specific PaaS environment such as e-commerce platform, there are...
详细信息
As one of the most important patterns of cloud service, PaaS provides an entire development, deployment and runtime platform for SaaS applications. In a specific PaaS environment such as e-commerce platform, there are similar functionalities among multiple applications, such as "searching items". In this paper, we focus on enhancing general PaaS platform with the mechanism of shared component-based application construction. We discuss some key issues of constructing such abilities with large number of heterogeneous components in the PaaS platform. A component layer with a semantic-enabled multi-level abstract component model is constructed and added to the general PaaS platform. We also give a description of the prototype of our enhanced e-commerce PaaS platform, which can efficiently simplify SaaS application constructing with reusable components.
Independent spanning trees(ISTs) have increasing applications in fault-tolerance, reliable communication protocols and secure message distribution. In this paper, we propose an O(N) parallel algorithm to construct n B...
详细信息
Independent spanning trees(ISTs) have increasing applications in fault-tolerance, reliable communication protocols and secure message distribution. In this paper, we propose an O(N) parallel algorithm to construct n BISTs rooted at any vertex on n-dimensional twisted cube, where BISTs denote the ISTs isomorphic to binomial-like tree and N =2 n .
Privacy-preserving data publishing (PPDP) deals with data publishing while preserving individual's privacy in the data. Recent researches show that knowledge of mechanism of anonymization provides a loophole for a...
详细信息
Privacy-preserving data publishing (PPDP) deals with data publishing while preserving individual's privacy in the data. Recent researches show that knowledge of mechanism of anonymization provides a loophole for attacks [1] , [2] , we call this kind of attack a mechanism-based attack. In this paper, we first give a comprehensive study of mechanism-based attack and point out that the range of mechanism-based disclosure is much broader than ever said. Then, we analyze the rationale of mechanism-based attack and give the definition of mechanism-based attack formally. To counteract mechanism-based attack, we introduce a model called e -secrecy and corresponding solution algorithm MAIA. We conduct a comprehensive set of experiments to show mechanism-based attacks are practical concern in the real-world data sets and that our method introduces better data utility and very minor computation than the existing algorithms.
The methods of moving vehicles detection were normally difficult to count the correct numbers of the vehicles and they may not be able to reach the real-time requirement. To solve those problems, a vehicle detection a...
详细信息
The methods of moving vehicles detection were normally difficult to count the correct numbers of the vehicles and they may not be able to reach the real-time requirement. To solve those problems, a vehicle detection algorithm was proposed based on improved Adaboost algorithm and frame differencing rule. A cascaded classifier was trained using Haar-like features of the vehicle image samples, while a binary mask image was created by the three-frame differencing rule, then a foreground mask image was rebuilt by removing interference noise and finding connected domains, finally the cascaded classifier was loaded to make a multi-scale detection in the current frame's foreground region, and then the moving vehicles were marked and counted. The results of experiments show that this algorithm can effectively screen out the useful information, by this way, the detection accuracy and speed of the moving vehicles are highly improved, this algorithm is capable of detecting the moving vehicles in effective area of the traffic intersection. It was also induced a strong response under a complex motion.
A novel method was proposed to generate regression test cases guided by the branch possibility (GBP). The symbolic execution was applied to search the paths of the program and generate control dependence graph of the ...
详细信息
A novel method was proposed to generate regression test cases guided by the branch possibility (GBP). The symbolic execution was applied to search the paths of the program and generate control dependence graph of the program. The branch possibility was proposed to measure the possibility of that the new test case can cover the target code, which is generated by reserving the branch. The branch possibility of each branch in the test case was calculated to find the highest one which will be reserved to generate a new case, until the target code was run in the test case. 20 versions of two programs were selected to compare our method with two existing algorithms such as eXpress and dynamic symbolic execution. The results show that the GBP can generate the test case effectively, and the search time is 45.6% and 61.1% lower than that of eXpress and dynamic symbolic execution (DSE).
A new method was proposed to evaluate the survivability of the software system based on the calling structure of the software. Firstly, the interactions among the components of the software were obtained using the sta...
详细信息
A new method was proposed to evaluate the survivability of the software system based on the calling structure of the software. Firstly, the interactions among the components of the software were obtained using the static lexical analysis technology and dynamic monitoring of the AOP (Aspect ORIENTED PROGRAmming). The calling network was constructed to model the calling structure of the software. Secondly, a component failure simulation method was proposed by removing the nodes and edges corresponding to the selected components from the calling network. The residual calling network was considered as the software calling structure when the components are disabled. Then, the survivability coefficient was presented to measure the survivability of the software system, the proportion of the biggest connected subgraph of the residual network compared to the original call network diagram. In the experiments, nine open source software projects were selected to compare their survivability, and 20 versions of Struts (J2EE framework) were chosen to investigate the changes of the software survivability during their updating. Our evaluation concurs with the intuition that minor upgrades, aimed at fixing bugs and adding minor functionality quickly, reduce software survivability, whereas major upgrades, which normally clean up messy code and re-construct the software, improve software quality.
Wireless hosts can communicate with each other without a fixed infrastructure in wireless ad-hoc networks. Deploying and monitoring a large number of hosts in such networks involves high cost and intensive labor. As a...
详细信息
ISBN:
(纸本)9781479914449
Wireless hosts can communicate with each other without a fixed infrastructure in wireless ad-hoc networks. Deploying and monitoring a large number of hosts in such networks involves high cost and intensive labor. As a result, most experiments are achievable through simulation. However, most simulators currently used are intended to evaluate individual routing protocols or algorithms. Direct simulation of an application's source code is not supported. To simulate an application, we have to extract the protocols or algorithms from the source code and rewrite them in accordance with the simulator's requirements. In this paper, we introduce a new wireless ad-hoc network simulator called TimSim. TimSim focuses on simulating the source code of wireless ad-hoc network application directly. As a unique feature, TimSim provides some similar APIs with real device driver so that users can simulate their source code on TimSim with only a few modifications. Driven by a timestep-based simulation engine, TimSim can simulate the data transmitted over wireless ad-hoc networks in bit-level. Additionally, we import database to store the simulation data that TimSim generates. Performance evaluation by means of a series of benchmark experiments demonstrates the efficiency of TimSim. Also a case study is presented to illustrate the practicability of TimSim.
A research was made on the weak security of access control model based on the role, which was showed in the cross-domain access of cloud computing. An access control strategy based on the hops was put forward by intro...
详细信息
A research was made on the weak security of access control model based on the role, which was showed in the cross-domain access of cloud computing. An access control strategy based on the hops was put forward by introducing the role mapping technology and the definition of hop. It was presented to solve the problem of penetration of authority, which emerged in the process of role mapping. The strategy was studied from two aspects of both access process and formal definition, and according simulation experiment was done. Compared with other strategies, this strategy achieved fine-grained control on distance of cross-domain access by adding the corresponding field in the role set and user set. This strategy produced no new collection, and it did not need to establish any mirror role in the process of cross-domain access. The experimental results show that this strategy has higher efficiency and lower consumption of storage compared with the traditional strategy about cross-domain access.
With developments of energy harvesting technolo-gies, rechargeable Wireless Sensor networks (WSNs) are in-creasing. This paper introduces the energy renewable property and further proposes a novel 2-hop geographic nod...
详细信息
In this paper, aim at the disadvantages of standard Particle Swarm Optimization (PSO) algorithm like being trapped easily into a local optimum, we improves the standard PSO and proposes a new algorithm to solve the ov...
详细信息
暂无评论