Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud reso...
详细信息
ISBN:
(纸本)9781424446469;9780769537559
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud resource provider has to decide on how to allocate his scarce resources in order to maximize his profit. The application of bid price control for evaluating incoming service requests is a common approach for capacity control in network revenue management. In this paper we introduce a customized version of the concept of self-adjusting bid prices and apply it to the area of cloud computing. Furthermore, we perform a simulation in order to test the efficiency of the proposed model.
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directl...
详细信息
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directly be applied to databases because the data on the Internet and database are in different forms. So keyword search systems in relational databases have recently proposed. However existing systems limit type of keywords to database value terms, and generally assumed that answers are in instance level. Thus, this research aims to propose an effective approach for free-form keyword searching in databases which allows users to search either with database value terms, metadata terms or user terms. The metadata model accommodates these terms as well as underlying database semantics. Moreover, we present a branch and bound algorithm used for finding the optimal answer graphs. Our preliminary experiment results confirm precision of our approach.
Assessing softwareengineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant vo...
详细信息
Assessing softwareengineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant volume of materials, following a consistent, repetitive and effective procedure, even for small projects. Quality assurance must be performed according to similar requirements. This paper discusses the use of quality audits, a comprehensive quality assurance procedure, as a tool for the assessment of course projects.
This paper proposes a mobile-agent-based data gathering system (called TinyBee) in wireless sensor networks. Most existing mobile-agent-based systems consider only static sinks/servers. In this paper, we consider both...
详细信息
This paper proposes a mobile-agent-based data gathering system (called TinyBee) in wireless sensor networks. Most existing mobile-agent-based systems consider only static sinks/servers. In this paper, we consider both mobile servers and lightweight mobile agents. We aim to design a data gathering system using a special kind of mobile agent called TinyBee to collect data all over a network. TinyBee migrates from node to node after being dispatched from a mobile server in order to collect data so that physical movement of mobile servers is greatly reduced. Mobile-agent-based approaches outperform traditional client/server paradigms in terms of execution time and power consumption. Extensive simulation results demonstrate that our proposed schemes achieve significant performance gains.
With the ongoing trend towards the globalization of softwaresystems and their development, components in these systems might not only work together, but may end up evolving independently from each other. Modern IDEs ...
详细信息
ISBN:
(纸本)9781424445257
With the ongoing trend towards the globalization of softwaresystems and their development, components in these systems might not only work together, but may end up evolving independently from each other. Modern IDEs have started to incorporate support for these highly distributed environments, by adding new collaborative features. As a result, assessing and controlling system quality (e.g. security concerns) during system evolution in these highly distributed systems become a major challenge. In this research, we introduce a unified ontological representation that integrates best security practices in a context-aware tool implementation. As part of our approach, we integrate information from traditional static source code analysis with semantic rich structural information in a unified ontological representation. We illustrate through several use cases how our approach can support the evolvability of softwaresystems from a security quality perspective.
Over the last decades, softwareengineering processes have constantly evolved to reflect cultural, social, technological, and organizational changes, which are often a direct result of the Internet. The introduction o...
详细信息
Over the last decades, softwareengineering processes have constantly evolved to reflect cultural, social, technological, and organizational changes, which are often a direct result of the Internet. The introduction of the Web 2.0 resulted in further changes creating an interactive, community driven platform. However, these ongoing changes have yet to be reflected in the way we document softwaresystems. Documentation generators, like Doxygen and its derivatives (Javadoc, Natural Docs, etc.) have become the de-facto industry standards for creating external technical software documentation from source code. However, the inter-woven representation of source code and documentation within a source code editor limits the ability of these approaches to provide rich media, internationalization, and interactive content. In this paper, we combine the functionality of a Web browser with a source code editor to provide source code documentation with rich media content. The paper presents our fully functional implementation of the editor within the Eclipse framework.
The purpose of this paper is to present a new size metric for business process *** metric aims to measure size of process from use case *** metric consists of four series to support four perspectives of business proce...
详细信息
The purpose of this paper is to present a new size metric for business process *** metric aims to measure size of process from use case *** metric consists of four series to support four perspectives of business process:functional,behavioral,informational and *** addition,the guidance for pointing to related use case elements is included in each *** this paper,each size of perspective which measured from the new metric can use for indicating the number of business process elements are represented by UML-activity *** the example of the metric is only one,it is possible to apply for another modeling method such as BPMN,Petri Net and EPC.
Dynamic Bayesian Networks(DBNs) provide a systematic framework for robust online monitoring of dynamic *** paper presents an approach for increasing the efficiency of online estimation by partitioning a system DBN int...
详细信息
Dynamic Bayesian Networks(DBNs) provide a systematic framework for robust online monitoring of dynamic *** paper presents an approach for increasing the efficiency of online estimation by partitioning a system DBN into a set of smaller factors,such that estimation algorithms can be applied to each factor *** factoring scheme is based on the analysis of structural observability of the dynamic *** establish the theoretical background for structural observability and derive an algorithm for generating the factors using structural observability *** present experimental results to demonstrate the effectiveness of our factoring approach for accurate estimation of system behavior.
For the alarm flooding problem, a hierarchical alarm processing model is studied to filter, reduce and correlate alarms. In filtering, false alarms are eliminated with repository. In reduction, a reduction algorithm i...
详细信息
Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,...
详细信息
Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,needed to supports selection,However,the existing design pattern searching methodologies generally have problems on keywordsearch *** this paper,we proposed an initial model to solve the problem by using Case-Based Reasoning(CBR) and Formal Concept Analysis(FCA).For the proposed model,a case base is created to represent design *** is used to be case organization that analyze case base for obtain knowledge embedded,The knowledge can suggest suitable indexes to use for new *** method is beneficial for learning index,This paper discusses the basis theoretical of representation and retrieval design patterns for this inprogress research,along with some preliminary result.
暂无评论