It is general process of client authentication for a user to gain authority by the user’s ID and password. But using client’s password is not always secure because of various security attacks of many opponents. In t...
详细信息
作者:
王胜文洪炳熔Dept. of Computer Science and Engineering
Harbin Institute of Technology Harbin 150001 China Dept. of Computer Science and Engineering
Harbin Institute of Technology Harbin 150001 Chinaonsidering the deficiency of the means for confirming the attribution of fault redundancy in the research of Automatic Testing System(ATS) a fault-injection system has been proposed to study fault redundancy of automatic testing system through compurison. By means of a fault-imbeded environmental simulation the faults injected at the input level of the software are under test. These faults may induce inherent failure mode thus bringing about unexpected output and the anticipated goal of the test is attained. The fault injection consists of voltage signal generator current signal generator and rear drive circuit which are specially developed and the ATS can work regularly by means of software simulation. The experimental results indicate that the fault injection system can find the deficiency of the automatic testing software and identify the preference of fault redundancy. On the other hand some soft deficiency never exposed before can be identified by analyzing the testing results.
Considering the deficiency of the means for confirming the attribution of fault redundancy in the re-search of Automatic Testing system(ATS) , a fault-injection system has been proposed to study fault redundancyof aut...
详细信息
Considering the deficiency of the means for confirming the attribution of fault redundancy in the re-search of Automatic Testing system(ATS) , a fault-injection system has been proposed to study fault redundancyof automatic testing system through compurison. By means of a fault-imbeded environmental simulation, thefaults injected at the input level of the software are under test. These faults may induce inherent failure mode,thus bringing about unexpected output, and the anticipated goal of the test is attained. The fault injection con-sists of voltage signal generator, current signal generator and rear drive circuit which are specially developed,and the ATS can work regularly by means of software simulation. The experimental results indicate that the faultinjection system can find the deficiency of the automatic testing software, and identify the preference of fault re-dundancy. On the other hand, some soft deficiency never exposed before can be identified by analyzing the tes-ting results.
In this paper, a simulation of neural network controller for a three links robot arm is presented. The network is based on modified Kohonen's self-organizing map. In the proposed model, recurrent network and modif...
详细信息
Agents have been touted as a very promising technology that have inspired many researchers around the world to develop prototype systems that seem to change the way software works. With major organizations involved in...
详细信息
Efficient database design and construction is one of the most difficult and hard tasks for constructing information systems. During the database designing process, we have performed data modeling for understanding rea...
详细信息
Agents have been touted as a very promising technology that have inspired many researchers around the world to develop prototype systems that seem to change the way software works. With major organizations involved in...
详细信息
Agents have been touted as a very promising technology that have inspired many researchers around the world to develop prototype systems that seem to change the way software works. With major organizations involved in projects that utilize agents as solutions, it is believed that agents may have the potential to be part of everyday life in the future. This paper briefly discusses the implementation of multi-agents in university timetabling where agents have to communicate with each other in order to produce a good timetable.
One of the popular network security programs supporting host access control is the 'TCP Wrapper' (Venema, 1992). TCP Wrapper is a software-only system and many computers connected to the Internet are using it....
详细信息
ISBN:
(纸本)0769511538
One of the popular network security programs supporting host access control is the 'TCP Wrapper' (Venema, 1992). TCP Wrapper is a software-only system and many computers connected to the Internet are using it. However, TCP Wrapper does 'IP address-based' access control. The IP address is not such a reliable source when authenticating a host. We point out two possible attacks against the TCP Wrapper, propose a new way to prevent them, and describe the prototype implementation, Ethernet Wrapper. By adding an Ethernet address check, we augmented the TCP Wrapper. The test results showed that Ethernet Wrapper can prevent such attacks effectively.
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically gene...
详细信息
ISBN:
(纸本)0769509819
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically generated from digest video scenes selected by user preference. (2) Directions can be added using a happiness or sadness level based on the user preferences. (3) Personalized TV programs for an individual viewer can be made. The procedures taken by the system are as follows: (1) Conjunctive expressions between scenes are automatically generated; (2) Emotional expressions are automatically generated by user preference; (3) TV program metaphors are defined; (4) Direction templates corresponding to the metaphors are defined; (5) These expressions and definitions are coded using a markup language, and (6) Contents such as virtual characters and movies are synchronized. The resultant program can be shown on a TV set.
In recent years, goal based requirements analysis methods have attracted increasing attention in the area of requirements engineering. However, there is no systematic way in the existing approaches to handle the impac...
详细信息
In recent years, goal based requirements analysis methods have attracted increasing attention in the area of requirements engineering. However, there is no systematic way in the existing approaches to handle the impacts of requirements on the structuring of software architecture. As an attempt towards the investigation of the interactions among goals, scenarios, and software architectures, we propose a goal based approach to building software architecture based on the interactions in an incremental fashion. The proposed approach is illustrated using the problem domain of a virtual university environment.
Emerging parallel or distributed heterogeneous real-time computersystems with many disparate constraints and requirements would benefit from a unifying and comprehensive systems engineering support in the design, tes...
详细信息
Emerging parallel or distributed heterogeneous real-time computersystems with many disparate constraints and requirements would benefit from a unifying and comprehensive systems engineering support in the design, testing and deployment phases, which interfaces with a human at a very high level and efficiently handles the system complexity. We present an approach to integration of: a compiler and constraint logic programming-based approach to design and engineering of complex real-time systems; and an online performance analysis and visualization technology with steering. An example distributed real-time system is used to help describe the integrated approach. Details are presented about how the involved technologies are used to help system developers and users achieve better system performance through on-line repair and reconfiguration.
暂无评论