The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stability is one of the most desirable quality attributes of any software design. The stability of a class diagram indicates its resistance to interclass propagation of changes that the diagram would have when it is modified. This short paper discusses with examples the impact of four structural design patterns (adapter, bridge, composite and facade) on the stability of class diagrams
Granular Computing is a new computing paradigm. The panel will focus on its potentials on E-security and web intelligence among others. One of the main component of granular computing is "Granulate and Conquer," that lies in the heart of this conference. Fruitful discussions and conclusions will be expected.
As the e-commerce is done faster, there is a continuous flourishing of e-marketplaces. Matchmaking is an important aspect of e-commerce interactions. Recently, an approach has been taken to service matchmaking based on semantic Web technologies; the designed matching rule can be used to find the sellers' compatible advertisements for buyers. In this paper, we define three categories of attributes...
The Sage development method and associated tool set support an incremental, iterative, model-driven process to build and maintain high assurance, reactive multi-agent systems. A set of interconnected models provide documentation supporting high assurance certification efforts, maintenance, and reuse. Tools can analyze the models for important classes of errors, and generate complete multi-agent systems
This paper discusses foundations of conventional style of rule mining in which rules are extracted from a data table. Rule mining mainly uses the structure of a table, data partition, but two different approaches are observed: divide and conquer and covering: the former focuses on the nature of data partition and the latter does on the nature of information granules. This paper illustrates that granular...
As two related emerging fields of research, Web intelligence (WI) and brain informatics (BI) mutually support each other. Their synergy will yield profound advances in the analysis and understanding of data, knowledge, intelligence and wisdom, as well as their relationships, organization and creation process. When WI meets BI, it is possible to have a unified and holistic framework for the study of...
This paper presents a novel particle dynamics model (PDM) for the adaptive self-organization of software processes in complex distributed environment. Differing from traditional models, the particle dynamics model regards software processes in distributed environment as a random Markov process, and hence establishes self-organizing networks for software processes. The conception, algorithm and properties...
The optimization of software cybernetics in complex environment is of great significance and extreme difficulty. This paper proposes a novel generalized particle dynamics model (GPDM) for software cybernetics in the context of optimal allocation of software resources and software jobs in complex environment. The GPDM approach transforms software cybernetics problems into the kinematics and dynamics...
Load and stress testing are important to guarantee the system is able to support specified load conditions as well as properly recover from the excess use of resources. The generation of test cases to achieve levels of load and stress is a demanding task. Here we propose an approach for the automatic generation of test cases to achieve specified levels of load and stress for a combination of resources...
We describe the use of property-based peer trust to provide security in Sleeper, a new energy-efficient service discovery protocol which uses proxied advertisement and discovery to dynamically offload service discovery workload from power-limited devices. Property-based digital certificates have previously been used in trust-negotiation methods. In earlier work we developed a new method for secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.