Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D s...
详细信息
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D space(3D-Parallel Coordinates)consisted of attribute,range and time *** that timevarying multidimensional data can be displayed as polygonal line cluster for recording and analyzing.A technique called clipping shade is taken to highlight datasets around the current time,and results reveal that 3D-Parallel Coordinates can effectively analyze attribute's time-varying character.
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the constr...
详细信息
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the construction of software repository service by combining with the requirement of security management about software repository.A hierarchical access control model based on RBAC was proposed,and it database of the software repository based on RBAC was *** effective application of this model in the process of software management can ensure the convenience of software distribution;and meanwhile it can effectively improve the security of the software packages.
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidim...
详细信息
ISBN:
(纸本)9781509051557
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare. Characteristic of network boundary protection technique is analyzed and methods are proposed about how to construct network boundary protection.
In the evaluation of equipment system of systems(So S), equipment data has shown some new characters, such as big volume, wide range sources, and dynamic variance. The paper pointed out the idea to evaluate equipment ...
详细信息
ISBN:
(纸本)9781510803084
In the evaluation of equipment system of systems(So S), equipment data has shown some new characters, such as big volume, wide range sources, and dynamic variance. The paper pointed out the idea to evaluate equipment So S based on big data analysis techniques. The outline of the method is provided from two points of view, namely the big data processing techniques and equipment So S evaluation methods. Based on big data, equipment So S efficiency evaluation, counter evaluation, and other deeper level applications, such as intelligence processing and situation analysis, can be made. The method is a new method in the equipment So S evaluation field.
A novel scheme based on neural networks for optimizing semantic similarity measure is proposed in this study. This scheme is investigated by using three representative neural networks, i.e., the Back Propagation (BP) ...
详细信息
Microservices is a flexible architectural style that has many advantages over the alternative monolithic style. These include better performance and scalability. It is particularly suitable, and widely adopted, for cl...
详细信息
Microservices is a flexible architectural style that has many advantages over the alternative monolithic style. These include better performance and scalability. It is particularly suitable, and widely adopted, for cloud-based applications, because in this architecture a software system consisting of a large suite of services of fine granularity, each running its own process and communicating with the others. However, programming such systems is more complex. In this paper we report on CIDE, an integrated software development environment that helps with this. CIDE supports programming in a novel agent-oriented language called CAOPLE and tests their execution in a cluster environment. We present the architecture of CIDE, discuss its design based on the principles of the DevOps software development methodology, and describe facilities that support continuous testing and seamless integration, two other advantages of Microservices.
Matching precision is very important and difficult in accurate photography, remote sensing and 3D reconstruction. After analyzing the advantages and shortcomings of current matching algorithms and the epipolar geometr...
详细信息
Following the high-speed development of information technology,we increasingly attach important to the information *** development of independent self-controlled SW&HW(software and hardware) was *** to the faultin...
详细信息
Following the high-speed development of information technology,we increasingly attach important to the information *** development of independent self-controlled SW&HW(software and hardware) was *** to the faultiness of independent self-controlled industry,the integration and verification of foundational SW&HW must be largely *** the basis of analyzing the whole process of integration and verification of foundational SW&HW,the technologysystem was advanced,and the process,the content and the flow were provided,and the environment of integration and verification was constructed.
In order to solve the integrated condition monitoring problem in space information network, there are three works finished including analyzing the characteristics of tasks process and system health monitoring,adopting...
详细信息
In order to solve the integrated condition monitoring problem in space information network, there are three works finished including analyzing the characteristics of tasks process and system health monitoring,adopting the automata modeling method, and respectively establishing the models for state inference and state determination. The state inference model is a logic automaton and is gotten by concluding engineering experiences. The state determination model is a double-layer automaton, the lower automaton is responsible for parameter judge and the upper automaton is responsible for state diagnosis. At last, the system state monitoring algorithm has been proposed, which realizes the integrated condition monitoring for task process and system health, and can avoid the false alarm.
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic softwar...
详细信息
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic software security testing method. In this paper we present a guided fuzzing approach based on dynamic taint analysis for security testing of network protocol software. This approach identifies the security sensitive functions of target application affected by network packets via dynamic taint analysis, and generates testcases by mutating these packets with the elements of a fuzz library. Due to the guidance of taint information, it to some extend overcomes the blindness of traditional fuzzing methods and improves efficiency. The approach integrates several successive steps, we currently focus on the taint analysis step and have received interesting preliminary experimental results.
暂无评论