Web service schema matching is the preliminary phase of service composition and service Mashup. With the entry of large numbers of services on the Internet, it will be difficult to find and suggest the most relevant s...
详细信息
Web service schema matching is the preliminary treatment phase of service composition and service mashup. With the entry and exit of large numbers of services on the Internet, it will be difficult to find and suggest ...
详细信息
Where IP cores to be mapped must be carefully solved for any given application in order to optimize different performance metrics in Network-on-Chip (NoC) design flow. The optimization of different performance metrics...
详细信息
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the most serious problems in the spike sorting f...
详细信息
Large-scale object-oriented(OO) softwaresystems have recently been found to share global network characteristics such as small world and scale free,which go beyond the scope of traditional software measurement and ...
详细信息
Large-scale object-oriented(OO) softwaresystems have recently been found to share global network characteristics such as small world and scale free,which go beyond the scope of traditional software measurement and assessment *** measure the complexity at various levels of granularity,namely graph,class(and object) and source code,we propose a hierarchical set of metrics in terms of coupling and cohesion-the most important characteristics of software,and analyze a sample of 12 open-source OO softwaresystems to empirically validate the *** results of the correlations between cross-level metrics indicate that the graph measures of our set complement traditional software metrics well from the viewpoint of network thinking,and provide more effective information about fault-prone classes in practice.
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network servi...
详细信息
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network services, the paper puts forward an intent-perceptible service migration model (ISM). In this model, we design a novel trigger mechanism and object selecting method for service migration, and make the service migration intention perceptible for the client with the cooperation of the server. The evaluation results show that ISM model can not only ensure the service invulnerability by maintaining a high randomness of service migration, but also improve the service continuity by reducing the service gap time spending on service migration to the maximum extent. Therefore, ISM model can enhance IP network survivability efficiently.
This paper presents the transformation of dual transition timed Petri Net (DTTPN) into timed automaton for model checking embedded system described in DTTPN which can model real-time embedded system in both control an...
详细信息
Networks have been considered an effective tool to describe the topological structure of software. Recently, many object-oriented softwaresystems were found to share global network features such as scale free and sma...
详细信息
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...
详细信息
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
We present the design of pService system for P2P Web services discovery supporting similarity earch with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. ser...
详细信息
暂无评论