The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Users always wait to be served by Web service in the community. The cost of Web service community is increased due to the users queue up in the community will consumes resources. In this paper we research on setting optional number of Web services in the community in order to make the cost of community be minimum. A solution was proposed based on both theory of queue and marginal analysis method....
As a typical user activity based model in search engines, click model is currently the mainstream approach to describe and analyze user behaviors when handling a number of search-related applications, such as automated ranking alternations, search quality metrics, and online advertising. However, most of the existing work in this literature only consider click through data but ignore other aspects...
This paper proposes a watermarking algorithm for 3D meshes based on local roughness analysis. The proposed method is a robust and partition-based watermarking method. It is composed of two stages: watermark embedding and extraction. During the watermark embedding stage, the input mesh is decomposed into groups corresponding to different values of roughness, which is measured by the Laplacian of Gaussian...
Traditional FCM algorithm has the problems of sensitivity to initialization, local optimal and the Euclidean distance is only applied to handle the dataset of spatial data structure for the super-ball. Hence a semi-supervised Fuzzy C-Means algorithm based on pairwise constraints for the intrusion detection is proposed. The pairwise constraints can be used to improve the learning ability of the algorithm...
Validation and Verification are necessary in the life cycle of any safety-critical software system. It answers the question of “are we building the right product?” It's very important to be able to decide if its outputs are correct and system meets specifications, failing to do so can result in loss of human lives or huge financial loss. V&V process and its planning must start early in SDLC (Software...
A new method based on Latent Dirichlet Allocation (LDA) is proposed to retrieval information in Mongolian. Semantic information is also considered by Mongolian documents when consider relationship between keywords and retrieval documents. This method models Mongolian documents with LDA, parameters are estimated with Gibbs sampling and probability of word is represented, it can mine the hidden relationship...
The wide variety of devices currently available, which is bound to increase in the coming years, posed a number of issues for the design cycle of interactive Web applications. That couldn't develop user interface with high quality such as usability and user experience. So this paper propose that combine responsive design method with Model-based method. Add responsive model in the FMP(F-Function, M-Model,...
Virtual Network (VN) bandwidth guarantee is an important issue in scenarios such as enterprise network and multi-tenant datacenter. The Software Defined Network (SDN) is sophisticated technology for network control and management. In this paper we proposed a VN bandwidth guarantee method which use SDN controller and Open vSwitch to allocate the available bandwidth by VN's priority. According to simulation...
Taint analysis determines whether values from untrusted or private sources may flow into security-sensitive or public sinks, and can discover many common security vulnerabilities in both Web and mobile applications. Static taint analysis detects suspicious data flows without running the application and achieves a good coverage. However, most existing static taint analysis tools only focus on discovering...
This paper analyzes the problem of heterogeneous database and synchronization mechanism in enterprise data integration, provides a heterogeneous database integrated approach, then link up to a database center by web service, It provides a transparent unified interface. Users can not only query the database of the center, but also add, delete, update operation, and synchronize to the source database,...
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
In the command post, multi-person discussion is an effective means to improve the efficiency of command decision-making. Based on the existing command collaborative interaction technology, we discussed the application of command post “Brainstorming” argument process and mind map in collaborative research, and then, standardized users' operation in the process of discussion. At last, S PIN is used...
This paper proposes an approach to analyze customer satisfaction from Chinese reviews using opinion mining. Opinion mining technology is adopted to analyze customer satisfaction and discover useful information that can provide decision support. The proposed approach first extracts and groups the aspects simultaneously through a topic model based method. Then utilizing sentence based opinion mining...
Probabilistic key pre-distribution techniques for ad-hoc wireless sensor networks cannot guarantee link establishment and are prone to redundancy and key reuse. There is also a tradeoff between storage requirements, scalability and key reuse, which limits secure scalability. Master key an d Computation based key establishment techniques are vulnerable to clone attacks in case of compromised nodes...
Test coverage is a effective approach of testing effectiveness and adequacy, which has positive impact on software reliability and defect coverage. The test coverage function describes the change of test coverage during the test procedure, and it is an important factor of software reliability models with test coverage. In this paper, the change of test coverage is represented by the generalized logistic...
Accurate analysis of the shared variables plays a critical role in enhancing the software quality level especially for safety-critical real-time embedded systems. Many methods are currently available to warn programmers for racing conditions. However, most of the methods focus on detection of suspicious shared variable access, leaving room for improvement on the level of accuracy of warnings. In this...
There are two types of software defects: (1)implementation defects(i.e., discrepancies between a implementation and its specification), and (2)specification defects(Systems implemented correctly may also fail due to its defective specification design). This paper presents a specification defects detection method called Specification Defects Detection Using Statecharts (SDDS), and applies it to 5 classes...
In modern enterprises, customer data is highly valued for consumer behavior analysis and business strategy development. The objective of this research is to develop a framework that promotes the use of Unity for Big Data Analytics on consumer behaviors with Technology Acceptance Model. Unity3D is a popular game engine and a development tool that enables graphical game development for multiple platforms...
The development of a distributed simulation is a complex multidisciplinary task. It brings together computer science, systems engineering, operational research and a range of domain specific expertise. Thus, MATLAB introduced many distributed connectivity for developers, this connectivity with other environments requires some resources. In this paper, a new software connector is introduced to facilitate...
The SOFL (Structured Object-Oriented Formal Language) formal engineering method is developed to overcome the deficiencies of existing formal methods and to provide both rigorous and practical techniques for building formal specifications, transforming specifications to programs, and verifying both specifications and programs. Although it has been applied to system modeling and design in both industrial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.