The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pervasive computing systems often use middleware as a means to communicate with the changing environment. However, the interactions with the context-aware middleware as well as the interactions among applications sharing the same middleware may introduce faults that are difficult to reveal by existing testing techniques. Our previous work proposed the notion of context diversity as a metric to measure...
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
Semantic Web applications meet a serious problem in practice: the shortage of semantic data (ontologies). Since the vast majority of data are still stored in relational databases, they are unavailable for the most next generation Web applications, such as Semantic Digital Libraries. Therefore, it becomes one of core challenges of Semantic Web whether applications can automatically retrieve semantic...
Frequent closed itemsets is a smaller, representative of the frequent itemsets. Some existed algorithms for mining frequent closed itemsets based on FP-Tree improvement or incremental mining the database with objects, thus, mining frequent closed itemsets inefficient in the database of increasing attribute. This paper, based on Iceberg concept lattice model, presents a frequent closed itemsets mining...
Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships,...
Current distributed systems are usually composed of several distributed components that communicate through specific ports. When testing these systems we separately observe sequences of inputs and outputs at each port rather than a global sequence and potentially cannot reconstruct the global sequence that occurred. In this paper we concentrate on the problem of formally testing systems with distributed...
To improve sharing and reusability of designing knowledge in domestic enterprises, a proposal of sharing of knowledge based on functional ontology was proposed. By using bases of knowledge of functional ontology, the mapping of structure-to-function has been realized. On basis of comprehensively understanding original functional model, through changing way of function achievement to obtain new functional...
Due to technological advances of handheld computing and communication devices, Mobile commerce (M-commerce) has emerged and attracted a growing number of research efforts. M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. In this paper, we discuss some...
A traditional research direction in SA and dependability is to deduce system dependability properties from the Knowledge of the system Software Architecture. This will reflect the fact that traditional systems are built by using the closed world assumption. In mobile and ubiquitous systems this line of reasoning becomes too restrictive to apply due to the inherent dynamicity and heterogeneity of the...
This paper presents a framework for enabling mobile agents to be organized dynamically and autonomously with two unique compositions and interagent interactions on dependable distributed systems. The first enable an agent to contain other agents inside it and migrate to another agent or computer with its inner agents. It provides a powerful approach to composing and deploying large-scale mobile software...
With the growing usage of ontologies, different ontologies are constructed in the same domain from different specialist's knowledge structures, this results in ontology heterogeneity, and the interoperability of ontologies is seriously blocked by ontology heterogeneity. It is known that Ontology Merging is an effective approach to solve this problem, so a novel method FCA-OntMerge for ontology merging...
Introduce the cognitive view to the information retrieval field. Research the method and process related to cognitive information retrieval and knowledge. Cognitive information retrieval evaluation system is given, finally the future look and work direction is discussed.
This article discussed about modeling of uCOS real time operation system kernel which is widely used in embedded system field based on CSP, describing the behavior of uCOS from the higher abstract layer, to help us understand how uCOS working better, also provide foundation of further working on uCOS includes model checking and soundness verification on uCOS. This article focused on the task scheduling...
The paper focuses on emergent systems, i.e., complex systems for which it is impossible to foresee the overall system's behavior from the composition/interaction of the single functions/services performed by its components. The lack of knowledge on some aspects of the system, which is the source of the emergence, is an unavoidable aspect that should be explicitly taken into account in all the phases...
Information on Internet is so huge,and increases quickly. A huge information pool is coming up on the Internet. And much important information can be found on the Internet. Internet is really an important source of information. So extract the key words from the pages on Internet is so important. A page description model based on undirection graph is proposed and then a entity ranking algorithm named...
Constraints are considered to be the principal motivation for RBAC model. XACML profile for RBAC can not meet the need of expressing static and dynamic RBAC constraints well. We give the XACML syntax of common static and dynamic Separation of Duty constraints and cardinality constraints of RBAC. We also complement Role Enablement Authority to extend this profile in order to enforce these constraints.
We introduce the notion of obligation constraints in the context of access control systems. Such constraints requires that in order to have all permissions necessary to complete a sensitive task, the cooperation of at least a certain number of users is required. In this paper, we formally define the notion of obligation constraints, strict obligation constraints, and introduce the obligation satisfy...
In service robotics systems, understanding the relationship between environmental objects and user intention is the key feature to provide suitable services according to context. RT Ontology has shown to be an efficient technique to represent this relationship, yet it contains non-context information. In this paper, we propose a novel method to develop the RT Ontology automatically and a learning...
In order to satisfy dynamic authorization in service-oriented grid environment, a context and trust-based grid service authorization model (CTGSA) is proposed. First, model is defined formally. Benefiting from the mapping relation of user-role, role-service and service-resource assignment, model can provide authorization using service-oriented method, which reduces the management overhead greatly...
ROHINI is a humanoid type flower robot that mediates interactions between occupants and various devices and equipments embedded in a smart home environment. Traditional interfaces such as remote controllers, switches or buttons at home lack of intuitive and natural interactions needed to provide a highly sophisticated monitoring and control of various smart home operations. ROHINI, a rose-like anthropomorphic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.