Effective scheduling is a key concern for the execution of performance driven grid applications. In this paper, we propose a dynamic critical path (DCP) based workflow scheduling algorithm that determines efficient ma...
详细信息
Effective scheduling is a key concern for the execution of performance driven grid applications. In this paper, we propose a dynamic critical path (DCP) based workflow scheduling algorithm that determines efficient mapping of tasks by calculating the critical path in the workflow task graph at every step. It assigns priority to a task in the critical path which is estimated to complete earlier. Using simulation, we have compared the performance of our proposed approach with other existing heuristic and meta-heuristic based scheduling strategies for different type and size of workflows. Our results demonstrate that DCP based approach can generate better schedule for most of the type of workflows irrespective of their size particularly when resource availability changes frequently.
A significant open problem of case based reasoning system is a construction of better knowledge base. We propose a new framework for constructing alternative knowledge base in case based reasoning system based on roug...
详细信息
A significant open problem of case based reasoning system is a construction of better knowledge base. We propose a new framework for constructing alternative knowledge base in case based reasoning system based on rough sets and formal concept analysis. Our framework first applies rough set theory for discovering reduced cases required in a case based reasoning system. We then achieve further hierarchical structure of knowledge base using formal concept analysis. The result is the concept lattice knowledge base embedded to our proposed case based reasoning system. A part of case based reasoning system is developed with an example throughout. We also discuss how our proposed framework can be beneficial for a case based reasoning system.
Educational software development processes, used in course projects, must exercise practices and artifacts comparable to similar industry-level processes, while achieving acceptable productivity and quality, and, at t...
详细信息
Educational software development processes, used in course projects, must exercise practices and artifacts comparable to similar industry-level processes, while achieving acceptable productivity and quality, and, at the same time, complying with constraints on available student time. Here, we discuss our experience with a specific model-driven development process, applied in a time-constrained softwareengineering course. The course projects are developed in iterations, each delivering a subset of the product functions. These, specified as use cases, undergo a sequence of model transformations, until they become tested code. Transformation steps are verified using standardized quality gates (inspections, tests, and audits), which serve three purposes: teaching verification, validation and quality assurance; helping to assess and grade projects; and providing feedback for process improvement. Size, effort and defect data is recorded in standardized reports. Collected data show that the quality gates proved effective to ensure compliance with the prescribed process, and that using a balanced reusable framework is necessary to achieve satisfactory productivity and quality.
Detecting errors early within the development process for an embedded system assists a developer in avoiding excessive error correction costs and minimizing catastrophic losses resulting from failures in deployed syst...
ISBN:
(纸本)9783540752080
Detecting errors early within the development process for an embedded system assists a developer in avoiding excessive error correction costs and minimizing catastrophic losses resulting from failures in deployed systems. Towards that end, this paper presents i2MAP, an iterative and incremental goal-driven process for constructing an analysis-level UML model of an embedded system. The UML model is formally analyzed for adherence to the behavioral properties captured in a companion goal model. The process uses goal modeling to capture the requirements of the system, and uses UML to capture analysis-level structural and behavioral information. Both types of i2MAP models can be used to drive a rigorous approach to model-driven development of embedded systems. In this paper, we illustrate the i2MAP process and the accompanying tool suite in the development of an embedded system model for an adaptive light control system.
Intrusion detection systems (IDSs) have been substantially improved in recent past. However, network attacks have become more sophisticated and increasingly complex: many of current attacks are coordinated and origina...
详细信息
Intrusion detection systems (IDSs) have been substantially improved in recent past. However, network attacks have become more sophisticated and increasingly complex: many of current attacks are coordinated and originated in multiple networks. To detect these attacks, IDSs need to obtain information on network events from multiple networks or administrative domains. This work demonstrates that a Distributed IDS (DIDS) can be composed of existing IDSs, improving the detection of misuses in a multiple network environment. We use a grid middleware for creating a service-based intrusion detection grid. We demonstrate through experimental results that the proposed DIDS allows the integration of heterogeneous existing IDSs and improves the detection of attacks by exploring the synergy between existing IDSs.
Semantic annotation and querying is currently applied on a number of versatile disciplines, providing the added-value of such an approach and, consequently the need for more elaborate - either case-specific or generic...
详细信息
ISBN:
(纸本)9780769530154;076953015X
Semantic annotation and querying is currently applied on a number of versatile disciplines, providing the added-value of such an approach and, consequently the need for more elaborate - either case-specific or generic - tools. In this context, we have developed Eikonomia: an integrated semantically-aware tool for the description and retrieval of Byzantine artwork Information. Following the needs of the ORMYLIA Art Diagnosis Center for adding semantics to their legacy data, an ontology describing Byzantine artwork based on CIDOC-CRM, along with the interfaces for synchronization to and from the existing RDBMS have been implemented. This ontology has been linked to a reasoning tool, while a dynamic interface for the automated creation of semantic queries in SPARQL was developed. Finally, all the appropriate interfaces were instantiated, in order to allow easy ontology manipulation, query results projection and restrictions creation.
A combination of closed sequential pattern mining and closed itemset pattern mining was proposed to mine closed multidimensional sequential patterns. There are two ways for this combination; (1) mining closed itemset ...
详细信息
A combination of closed sequential pattern mining and closed itemset pattern mining was proposed to mine closed multidimensional sequential patterns. There are two ways for this combination; (1) mining closed itemset patterns from multidimensional information followed by mining closed sequential patterns from sequences associated with closed itemset patterns, and (2) mining closed sequential patterns from sequences followed by mining closed itemset patterns from multidimensional information associated with closed sequential patterns. In the first way the major cost is mining all sequences associated with closed itemset patterns. A similar problem occurs with the second way, the major cost is mining all multidimensional information associated with closed sequential patterns. Therefore, this paper proposes two new combinations that don't need to mine all sequences in the first combination, and all multidimensional information in the second combination. Both combinations can be effected by exploiting two concepts. In the first combination, any closed sequential patterns associated with a closed itemset patten I can be found from a set of closed sequential patterns associated with a closed itemset pattern I' if I sup I'. In the second combination, any closed itemset patterns associated with a closed sequential pattern s can be found from a set of closed sequential patterns associated with a closed itemset pattern s' if s sup s'.
In this paper, we propose a new hybrid case based reasoning system based on rough set theory, formal concept analysis and fuzzy sets. This system applies rough set theory to assure minimally sufficient cases in its ca...
详细信息
In this paper, we propose a new hybrid case based reasoning system based on rough set theory, formal concept analysis and fuzzy sets. This system applies rough set theory to assure minimally sufficient cases in its case base. It uses formal concept analysis to reveal knowledge of attribute dependencies in terms of concept lattices. Numeric attributes are transformed to be suitable for formal concept analysis using fuzzy sets.
Service-oriented architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are frequently used to realise such servi...
详细信息
Service-oriented architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are frequently used to realise such service-oriented architectures. In such systems, autonomic principles of self-configuration, self-optimisation, self-healing and self- adapting are desirable to ease management and improve robustness. In this paper we focus on the extension of the self management and autonomic behaviour of a WSRF container connected by a structured P2P overlay network to monitor and rectify its QoS to satisfy its SIAs. The SLA plays an important role during two distinct phases in the life-cycle of a WSRF container. Firstly during service deployment when services are assigned to containers in such a way as to minimise the threat of SLA violations, and secondly during maintenance when violations are detected and services are migrated to other containers to preserve QoS. In addition, as the architecture has been designed and built using standardised modern technologies and with high levels of transparency, conventional Web services can be deployed with the addition of a SLA specification.
software risk advisory tools have been developed to support Verification and Validation (V&V) processes for NASA flight projects on the Constellation program. The Orthogonal Defect Classification COnstructive QUAL...
详细信息
ISBN:
(纸本)1563479079
software risk advisory tools have been developed to support Verification and Validation (V&V) processes for NASA flight projects on the Constellation program. The Orthogonal Defect Classification COnstructive quality MOdel (ODC COQUALMO) predicts software defects introduced and removed classifying them with ODC defect types, allowing various tradeoff analyses. We have been exploring methods to design and optimize V&V processes with static and dynamic versions of the quality model by integrating it with different risk minimization techniques. These techniques allow "what-if" experimentation to determine the impact of V&V techniques on specific risks and overall flight risk. V&V techniques are quantified from a value-based perspective when the defect model is integrated with machine learning, strategic optimization and JPL's Defect Detection and Prevention (DDP) risk management method. Results to-date show that the automated methods are practical for flight projects to design higher value V&V processes in shorter time and with fewer resources.
暂无评论