The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Search engines usually return relevant sorted results based on the keywords. Because of the lack of considering the user's current search interest and intention, this kind of strategy may not meet users' personalized search requirements. In order to retrieve results associated with the user's current search interest, existing researches integrate the user's interest information into the search process...
In this paper a new vulnerability discovery method based on symbolic execution and machine learning is proposed. Given a vulnerable function, similar function set can be located efficiently based on machine learning technique. Function call graphs of each function from the similar function set are obtained by dataflow analysis of the whole program. At last, the symbolic execution engine KLEE is used...
Although traditionally seen as separate entities, factory and building automation systems are interdependent. Approaching the management of energy consumption in such settings in a holistic manner would lead to significant benefits in terms of performance. This paper presents an implementation of an ecosystem oriented energy management solution that considers both machines directly implicated in the...
This paper presents an embedded service oriented monitoring approach to enhance awareness of energy consumption at the shop floor and Manufacturing Execution System levels in factories. Appropriate aggregation of information allows fulfilling the needs of personnel having different levels of responsibility and knowledge. The method is applied on a real industrial testbed, originally utilized for mobile...
Internet topic detection and classification is an intelligent information access technology. It studies how to detect new events and classify sentiment of the content. Classical detection and analysis system of internet topics has low analysis efficiency and large process delay. The functions of cluster-based analysis system are internet data collection, real-time analysis and off-line data analysis...
Currently the extensive application of embedded multimedia processing calls for requirement of hardware acceleration and multi-function expansion, it firmly requires an scalable and efficient design of system architecture for embedded multimedia processing terminal. At first, system architecture with distinct structures and reasonable modules is designed, a simplified multimedia framework is designed...
In the research of composite service execution, runtime QoS ensuring of composite service is an important problem in composite service adaptation. This paper gives an introduction to the design and implementation of composite service adaptive execution supported environment monitoring system, analyzes the crucial problem of the system, builds up an experiment environment to test the monitoring system...
This paper presents a composite service execution engine, which can support human tasks and improve their execution by an approach of human task scheduling. In the approach, the performance evaluation model is proposed, which can reflect the performance of the human service resources objectively and comprehensively. Based on this model, the initial scheduling as well as re-scheduling methods for solving...
Ternary Content-Addressable Memory (TCAM) is a popular hardware device for fast IP address lookup. High link transmission speed of Internet backbone demands more powerful IP address lookup engine. Restricted by the memory access speed, the lookup engine for next-generation routers demands exploiting parallelism among multiple TCAM chips. However, most existing schemes improve lookup performance and...
Ternary Content-Addressable Memory (TCAM) is a popular hardware device for fast IP address lookup. High link transmission speed of Internet backbone demands more powerful IP address lookup engine. Restricted by the memory access speed, the lookup engine for next-generation routers demands exploiting parallelism among multiple TCAM chips. In this paper, we propose a fast lookup and power-saving scheme...
One of the advantages of Web service technology is it can create added-value services and complete the complex transactions or workflows by combining existing ones. However, they always run in a highly dynamic and change environment, during the execution process, if one component service fails or becomes overloaded, the failed services replacing mechanism is needed to ensure that the running process...
Chip-level parallel TCAMs were deployed to circumvent the limitation of a single TCAM. In this paper, we propose a crossed address range division and integral caching scheme. We improve the update efficiency significantly by buddy update method while keep low power dissipation by decreasing the number of the triggered TCAMs access in each lookup operation. The lookup throughput is ultra high through...
In order to satisfy dynamic authorization in service-oriented grid environment, a context and trust-based grid service authorization model (CTGSA) is proposed. First, model is defined formally. Benefiting from the mapping relation of user-role, role-service and service-resource assignment, model can provide authorization using service-oriented method, which reduces the management overhead greatly...
Community structure has been recognized as an important statistical feature of network systems over the past decade. The web service in SOA system naturally forms into some service community during execution process, within which the links between nodes are very dense, but between which they are quite sparse. These service communities were generated by repeatedly interaction between composite services...
The grid cross domain authorization has been a research hotspot in the information security held. The existing gird cross-domain authorization mechanisms are not flexible and intelligent enough. To solve the problem we propose a grid authorization model based on the description logic (DL) and the attribute based access control (ABAC). The DL formulates the definition and representation of attributes,...
More and more Web services are emerging in the Internet with development of service computing over the past decade. The web service in SOA system naturally forms into some service community during execution process. Mining and analysis Web service community will help design SOA system and support Web service application effectively. This article addresses the problem of how to discovering Web services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.