How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-...
详细信息
The reliability target is becoming higher and higher for modern embedded operating systems with their being extensively used in safety-critical situations. In order to solve the problem that the fixed duration testing...
详细信息
ISBN:
(纸本)9788988678213
The reliability target is becoming higher and higher for modern embedded operating systems with their being extensively used in safety-critical situations. In order to solve the problem that the fixed duration testing method, which was based on the classical statistics, can't satisfy the requirements of reliability demonstration testing for modern embedded operating systems due to the long testing duration, a new method based on the empirical Bayesian inference is presented. Firstly, the prior distribution of the embedded operating system failure intensity is derived on the basis of analyzing the testing records of reliability growth testing phase. Then, the reliability demonstration testing duration can be calculated by the prior distribution. Finally, the prior knowledge dynamic integrating approach taking both the specific testing information and the prior knowledge into account is developed. Experiment shows that the method introduced above can reduce the testing duration effectively without decreasing the confidence level in the testing results.
In order to verify the correctness of PLC programs by formal methods, the definition of denotational semantics on PLC program language was studied to achieve PLC programs modeling and model checking. Based on the exte...
详细信息
In order to verify the correctness of PLC programs by formal methods, the definition of denotational semantics on PLC program language was studied to achieve PLC programs modeling and model checking. Based on the extended λ-calculus definition, the configuration of PLC program architecture, denotational semantics of PLC programs and functions of denotational semantics were defined, which proves the basis of model checking and theorem.
Designing efficient and secure group key agreement scheme is one of the key issues in mobile ad hoc networks. In this paper, a novel and feasible group key agreement scheme based on identity is proposed. With this sch...
详细信息
Designing efficient and secure group key agreement scheme is one of the key issues in mobile ad hoc networks. In this paper, a novel and feasible group key agreement scheme based on identity is proposed. With this scheme, the direct and secure communications between any subgroups without retransmission could be implemented. The security of the group key agreement scheme can be assured under the complexity assumptions of the ECDLP, CDHP and BIDHP. The detailed analysis of the initialization procedure, subgroup key agreement procedure, group communication procedure and rekeying procedure when membership changes, including joining and leaving, shows that the scheme is efficient in computation and communication cost.
Taking the Chinese-Singapore cooperation project as example, combine the feedback from questionnaires and interviews of students about the bilingual teaching using teaching material in English in the course Operating ...
详细信息
Taking the Chinese-Singapore cooperation project as example, combine the feedback from questionnaires and interviews of students about the bilingual teaching using teaching material in English in the course Operating Systems, proceed from the whole teaching process, include teacher’s teaching, students’ preparation for class, students’ sitting on a class, teacher’s after-class tutorial, teacher’s homework checking and course examination, the representative issues in the process of bilingual teaching in the course Operating Systems were analyzed in this paper. Then from the perspective of the teachers in charge of the course, some possible solutions and personal ideas were proposed.
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to the identity of the individual who si...
详细信息
Due to the huge growth of the World Wide Web, medical images are now available in large numbers in online repositories, and there exists the need to retrieval the images through automatically extracting visual informa...
详细信息
Business Processing Execution Language (BPEL) and BPEL for People (BPEL4People) are two web services orchestration languages for composing web services. To describe formally their semantics, we introduce the πit-calc...
详细信息
Although biometrics technology has progressed substantially, its performance is still to be improved for real applications. This paper aims to improve the accuracy of personal identification, when only single sample i...
详细信息
In an open distributed environment, protection of sensitive files and data becomes more difficult. Traditional access control mechanisms are not suitable for such dynamic environment. Trust can be an effective approac...
详细信息
暂无评论