For services that have similar functionalities, if they are published by different cloud platforms, it is a challenge to evaluate them, for satisfying different end users' personal preferences. In view of this cha...
详细信息
For services that have similar functionalities, if they are published by different cloud platforms, it is a challenge to evaluate them, for satisfying different end users' personal preferences. In view of this challenge, a method for web service ranking, named WSRank, is investigated in cloud environment in this paper. It aims at ranking different Web services published by different cloud platforms, taking advantage of Page Rank principle. At last, a case study and experiment are presented to demonstrate the feasibility of the method.
In order to improve the accuracy of the image segmentation in video surveillance sequences and to overcome the limits of the traditional clustering algorithms that can not accurately model the image data sets which Co...
详细信息
In order to improve the accuracy of the image segmentation in video surveillance sequences and to overcome the limits of the traditional clustering algorithms that can not accurately model the image data sets which Contains noise data,the paper presents an automatic and accurate video image segmentation algorithm,according to the spatial properties,which uses the Gaussian mixture models to segment the imageBut the expectation-maximization algorithm is very sensitive to initial values,and easy to fall into local optimums,so the paper presents a differential evolution-based parameters estimation for Gaussian mixture modelsThe experiment result shows that the segmentation accuracy has been improved greatly than by the traditional segmentation algorithms
FOX is a family of symmetric block ciphers from MediaCrypt AG that helps to secure digital media, communications, and storage. The high-level structure of FOX is the so-called (extended) Lai–Massey scheme. This paper...
FOX is a family of symmetric block ciphers from MediaCrypt AG that helps to secure digital media, communications, and storage. The high-level structure of FOX is the so-called (extended) Lai–Massey scheme. This paper presents a detailed fault analysis of the block cipher FOX64, the 64-bit version of FOX, based on a differential property of two-round Lai–Massey scheme in a fault model. Previous fault attack on FOX64 shows that each round-key (resp. whole round-keys) could be recovered through 11.45 (resp. 183.20) faults on average. Our proposed fault attack, however, can deduce any round-key (except the first one) through 4.25 faults on average (4 in the best case), and retrieve the whole round-keys through 43.31 faults on average (38 in the best case). This implies that the number of needed faults in the fault attack on FOX64 can be significantly reduced. Furthermore, the technique introduced in this paper can be extended to other series of the block cipher family FOX.
WS-BPEL processes can facilitate service discovery when the services have multiple interfaces in certain order. Current approaches derive the abstract WS-BPEL processes directly from the corresponding executable ones ...
详细信息
WS-BPEL processes can facilitate service discovery when the services have multiple interfaces in certain order. Current approaches derive the abstract WS-BPEL processes directly from the corresponding executable ones by hiding or omitting the internal activities. However, these simple approaches may prevent the services from being found by valuable potential partners at service discovery stage. To address this problem, we propose a novel approach to refactoring the executable and abstract WS-BPEL processes for service discovery. We show the application of our approach through a typical travel agency service.
Spectrum-based Fault Localization (SBFL) is one of the most popular approaches for locating software faults, and has received much attention because of its simplicity and effectiveness. It utilizes the execution resul...
详细信息
Spectrum-based Fault Localization (SBFL) is one of the most popular approaches for locating software faults, and has received much attention because of its simplicity and effectiveness. It utilizes the execution result of each test case (failure or pass) and the corresponding coverage information to evaluate the likelihood of each program entity (e.g., a statement or a predicate) being faulty. Different formulas for computing such likelihood have been proposed based on different intuitions. All existing SBFL techniques have assumed the existence of a testing oracle, that is, a mechanism which can determine whether the execution of a test case fails or passes. However, such an assumption does not always hold. Recently, metamorphic testing has been proposed to alleviate the oracle problem. Thus, it is a natural extension to investigate how it can help SBFL techniques to locate faults even without using a testing oracle. Based on the framework of metamorphic testing, we have developed a novel concept of mice as a counterpart of the slice used in the current SBFL techniques. More precisely, in the absence of a testing oracle, we can determine whether an expected characterization of the program is satisfied. The outcomes of dissatisfaction or satisfaction of an expected characterization are then regarded as the counterparts of failed or passed executions, respectively, when a testing oracle exists. Since our approach does not require the existence of a testing oracle, it significantly enhances the applicability of SBFL techniques. Case studies on three popular SBFL techniques (Tarantula, Ochiai and Jaccard) with 9 applications are reported to demonstrate the use of the proposed fault localization technique.
Scheduling sensor activities is an effective way to prolong the lifetime of wireless sensor networks (WSNs). In this paper, we explore the problem of wake-up scheduling in WSNs where sensors have different lifetime. A...
详细信息
Scheduling sensor activities is an effective way to prolong the lifetime of wireless sensor networks (WSNs). In this paper, we explore the problem of wake-up scheduling in WSNs where sensors have different lifetime. A novel local wake-up scheduling (LWS) strategy is proposed to prolong the network lifetime with full coverage constraint. In the LWS strategy, sensors are divided into a first layer set and a successor set. The first layer set which satisfies the coverage constraint is activated at the beginning. Once an active sensor runs out of energy, some sensors in the successor set will be activated to satisfy the coverage constraint. Based on the LWS strategy, this paper presents an ant colony optimization based method, namely mc-ACO, to maximize the network lifetime. The mc-ACO is validated by performing simulations on WSNs with different characteristics. A recently published genetic algorithm based wake-up scheduling method and a greedy based method are used for comparison. Simulation results reveal that mc-ACO yields better performance than the two algorithms.
In many sensor network applications, it is essential to get the data distribution of the attribute value over the network. Such data distribution can be got through clustering, which partitions the network into contig...
详细信息
In this paper, we consider hybrid wireless networks with a general node density λ ∈ [1, n ], where n ad hoc nodes are uniformly distributed and m base stations (BSs) are regularly placed in a sq...
In this paper, we consider hybrid wireless networks with a general node density λ ∈ [1, n ], where n ad hoc nodes are uniformly distributed and m base stations (BSs) are regularly placed in a square region A ( n , A ) = 1 , A × 1 , A with A ∈ [1, n ]. We focus on multicast sessions in which each ad hoc node as a user chooses randomly d ad hoc nodes as its destinations. Specifically, when d = 1 (or d = n − 1), a multicast session is essentially a unicast (or broadcast) session. We study the asymptotic multicast throughput for such a hybrid wireless network according to different cases in terms of m ∈ [1, n ] and d ∈ [1, n ], as n → ∞. To be specific, we design two types of multicast schemes, called hybrid scheme and BS - based scheme , respectively. For the hybrid scheme, there are two alternative routing backbones : sparse backbones and dense backbones . Particularly, according to different regimes of the node density λ = n A , we derive the thresholds in terms of m and d . Depending on these thresholds, we determine which scheme is preferred for the better performance of network throughput.
As one foundational technology of cloud computing, services computing is playing a critical role to enable provisioning of software as a service (SaaS). However, how to effectively and efficiently discover proper avai...
详细信息
As one foundational technology of cloud computing, services computing is playing a critical role to enable provisioning of software as a service (SaaS). However, how to effectively and efficiently discover proper available services from the cloud of resources remains a big challenge. This paper reports our continuous efforts on semantic services discovery. We extend the Support Vector Machine (SVM)-based text clustering technique in the context of service-oriented categorization in a service repository, and propose an iterative process to incrementally enrich domain ontology. A popular Web 2.0 mashup platform is used as a testbed; and preliminary evaluation results are reported.
Ontology reasoning and reasoning-based search expansion are powerful tools for semantic applications. In this paper, we investigate how to apply ontology reasoning, with different ontology metamodeling approaches, to ...
详细信息
Ontology reasoning and reasoning-based search expansion are powerful tools for semantic applications. In this paper, we investigate how to apply ontology reasoning, with different ontology metamodeling approaches, to diagnose software models, in particular on models with multiple levels software models, in particular on models with multiple levels of abstraction.
暂无评论