The importance of the data uncertainty was studied deeply with the rapid development in data gathering and processing in various fields, inclusive of economy, military, logistic, finance and telecommunication, etc. Un...
详细信息
The importance of the data uncertainty was studied deeply with the rapid development in data gathering and processing in various fields, inclusive of economy, military, logistic, finance and telecommunication, etc. Uncertain data has many different styles, such as relational data, semistructured data, streaming data, and moving objects. According to scenarios and data characteristics, tens of data models have been developed, stemming from the core possible world model that contains a huge number of the possible world instances with the sum of probabilities equal to 1. However, the number of the possible world instances is far greater than the volume of the uncertain database, making it infeasible to combine medial results generated from all of possible world instances for the final query results. Thus, some heuristic techniques, such as ordering, pruning, must be used to reduce the computation cost for the high efficiency. This paper introduces the concepts, characteristics and challenges in uncertain data management, proposes the advance of the research on uncertain data management, including data model, preprocessing, integrating, storage, indexing, and query processing.
This paper presents an approach to check WS-CDL documents statically. To deal with those constraints appeared in CDL documents, which cannot be captured by its meta model (XML Schema) totally, we use B abstract machin...
详细信息
The discovery of invariants and ranking functions plays a central role in program verification. In our previous work, we investigated invariant generation and non-linear ranking function discovering of polynomial prog...
详细信息
This paper introduces an automated container terminal system which is used to transport containers from a ship to a yard. The system consists of a computation unit(CU) and several types of devices. The CU selects appr...
详细信息
This paper introduces an automated container terminal system which is used to transport containers from a ship to a yard. The system consists of a computation unit(CU) and several types of devices. The CU selects appropriate devices to transport the container. Due to the fact that the devices move concurrently and the intricate signals are exchanged between each device and the CU, it is very important to formally describe the system in a clear way. We thus present a method of modelling and analyzing the system in a model checker, UPPAAL. Through this work, the efficiency and correctness of the terminal system design is guaranteed.
This paper presents an approach to check WS-CDL documents statically. To deal with those constraints appeared in CDL documents, which cannot be captured by its meta model (XML Schema) totally, we use B abstract machin...
详细信息
This paper presents an approach to check WS-CDL documents statically. To deal with those constraints appeared in CDL documents, which cannot be captured by its meta model (XML Schema) totally, we use B abstract machines to represent the constraints and design the corresponding checking algorithms to implement the static check of CDL documents. Meanwhile, the checking algorithms are integrated into the WS-CDL editor plug-in for Eclipse project. The case studies show that our approach is effective for real examples in practise.
Bus model is a kind of service integration model that is responsible for integrating heterogeneous services. Buses not only store the messages exchanged between services but also coordinate the service executions. Rec...
详细信息
Bus model is a kind of service integration model that is responsible for integrating heterogeneous services. Buses not only store the messages exchanged between services but also coordinate the service executions. Recently, the bus model has been widely used in engineering field to manage interactions between services and support a given choreography. In this paper, we propose the formal design of services compatible with the bus infrastructure, and make some analyses of bus composition patterns. The service model is formalized on three levels and a composition approach is proposed to describe the composition patterns with the bus infrastructure.
P2P networks have become a popular way to share large volumes of data due to its open and anonymous nature. P2P network model is designed with the targets of decentralization, well-scaling, fault-tolerance and low cos...
详细信息
P2P networks have become a popular way to share large volumes of data due to its open and anonymous nature. P2P network model is designed with the targets of decentralization, well-scaling, fault-tolerance and low cos...
详细信息
ISBN:
(纸本)9780769533162
P2P networks have become a popular way to share large volumes of data due to its open and anonymous nature. P2P network model is designed with the targets of decentralization, well-scaling, fault-tolerance and low cost. Meanwhile however, new targets bring new challenges. P2P network expose more security threats due to its open and anonymous nature. P2P networks are vulnerable to attacks by malicious peers that have an incentive to spread viruses, in authentic data, or provide poor quality services. In this paper, we analyze the potential trust problems for different kinds of P2P networks, and then present the general trust factors that are indispensable for building trust models in any kinds of networks.
暂无评论