In a wireless sensor network, the regions in which a large percentage of sensor nodes are not available may form holes in the network. In holes, sensor nodes may be depleted or not dense enough to communicate with oth...
详细信息
This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instan...
详细信息
This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instances. It provides the checking based on the weighted mutual instances considering fault tolerance, gives a way to partition the large-scale mutual instances, and proposes a process greatly reducing the manual annotation work to get more mutual instances. Intension annotation that improves the checking method is also discussed. The method is practical and effective to check subsumption relations between concept queries in different ontologies based on mutual instances.
Fuzzy ontologics are efficient tools to handle fuzzy and uncertain knowledge on the semantic web; but there are heterogeneity problems when gaining interoperability among different fuzzy ontologies. This paper uses co...
详细信息
Fuzzy ontologics are efficient tools to handle fuzzy and uncertain knowledge on the semantic web; but there are heterogeneity problems when gaining interoperability among different fuzzy ontologies. This paper uses concept approximation between fuzzy ontologies based on instances to solve the heterogeneity problems. It firstly proposes an instance selection technology based on instance clustering and weighting to unify the fuzzy interpretation of different ontologies and reduce the number of instances to increase the efficiency. Then the paper resolves the problem of computing the approximations of concepts into the problem of computing the least upper approximations of atom concepts. It optimizes the search strategies by extending atom concept sets and defining the least upper bounds of concepts to reduce the searching space of the problem. An efficient algorithm for searching the least upper bounds of concept is given.
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical ba...
详细信息
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical base of parallel computing, parallel programming which is the software support of parallel computing. After that, we also introduce some parallel applications and enabling technologies. We argue that parallel computing research should form an integrated methodology of "architecture algorithm programming application". Only in this way, parallel computing research becomes continuous development and more realistic.
The reusability of components affects how much benefit we can get from the component based software development (CBSD). For enhancing the reuse of components, we propose an approach to derive the desired behavior from...
详细信息
The Unified Modeling Language (UML) is a defacto notation for model driven software development (MDSD), emphasizing on model to model refinements and transformations. However UML may not be expressive enough to descri...
详细信息
ISBN:
(纸本)0889865744
The Unified Modeling Language (UML) is a defacto notation for model driven software development (MDSD), emphasizing on model to model refinements and transformations. However UML may not be expressive enough to describe all aspects as required by recent MDSD models. A noticeable weakness is its inability to express the ontological concepts often encountered in MDSD. In this paper, we propose an extended Entity-Relationship (ER) model called Runtime Entity-Relationship model (RER) for ontological modeling of common MDSD concepts. Different layers of the UML metamodel hierarchy are analyzed in the context of modeling the MDSD using the RER model. Modifications of the UML architecture for more precise modeling of MDSD are suggested.
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result rev...
详细信息
A testbed which includes the common vulnerabilities is built. The paper compares three typical and publicly available tools by applying them to the testbed individually for sake of preventing intrusion. The result reveals that the tools building on finding vulnerable library functions have low false negatives rates but high false positives rates, the constrained based tools have low false positives rates but high false negatives rates, and the module checkers have high true positives rates when finding attacks against given security rules, bat have high false negatives rates when finding many kinds of vulnerabilities.
A zone routing protocol based on the energy consumption speed of nodes in mobile Adhoc networks is presented. A route select parameter computed by residual lifetime of nodes and hop count of route is used to be select...
详细信息
A zone routing protocol based on the energy consumption speed of nodes in mobile Adhoc networks is presented. A route select parameter computed by residual lifetime of nodes and hop count of route is used to be selected the best route, the nodes that have more energy have more probability of chosen. The mechanism can balance the energy consumption of node and prolong network's life. Simulation result comparing with zone routing protocol in NS-2 shows EZRP has less number of death nodes, lower routing overhead, and longer lifetime of network.
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fo...
详细信息
Due to the rapid development of Ad hoc network system, the traditional methods like vulnerability scanning to analyze network troubleshooting are confronted with the large challenge, because it is difficult to find fountainhead of the fault quickly from a number of fault phenomenon. To get the fountainhead of the fault of network, a new type of fault detection system is presented. In the study, according to the principle of positive selection, the system builds up its event database. The behavior model whose frequency is higher will be analyzed and processed first. It improves the speed and effectiveness of fault location. The experiment system implemented by this method shows a good diagnostic ability.
暂无评论