期刊文献+
共找到1,128篇文章
< 1 2 57 >
每页显示 20 50 100
AI Chain-Driven Control Flow Graph Generation for Multiple Programming Language
1
作者 ZOU Zhou ZUO Zhengkang HUANG Qing 《Wuhan University Journal of Natural Sciences》 2025年第3期222-230,共9页
Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysi... Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysis and Abstract Syntax Trees(ASTs),often face challenges due to the complex syntax of programming languages like Java and Python.This paper introduces a novel approach that leverages Large Language Models(LLMs)to generate CFGs through a methodical Chain of Thought(CoT)process.By employing CoT,the proposed approach systematically interprets code semantics directly from natural language,enhancing the adaptability across various programming languages and simplifying the CFG construction process.By implementing a modular AI chain strategy that adheres to the single responsibility principle,our approach breaks down CFG generation into distinct,manageable steps handled by separate AI and non-AI units,which can significantly improve the precision and coverage of CFG nodes and edges.The experiments with 245 Java and 281 Python code snippets from Stack Overflow demonstrate that our method achieves efficient performance on different programming languages and exhibits strong robustness. 展开更多
关键词 Control flow graph Large Language Model Chain of Thought AI chain
原文传递
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:2
2
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 SOFTWARE SECURITY SOFTWARE VULNERABILITY IMPROVED control flow graph VULNERABILITY detection algorithm
原文传递
Totally Coded Method for Signal Flow Graph Algorithm 被引量:2
3
作者 徐静波 周美华 《Journal of Donghua University(English Edition)》 EI CAS 2002年第2期63-68,共6页
After a code-table has been established by means of node association information from signal flow graph, the totally coded method (TCM) is applied merely in the domain of code operation beyond any figure-earching algo... After a code-table has been established by means of node association information from signal flow graph, the totally coded method (TCM) is applied merely in the domain of code operation beyond any figure-earching algorithm. The code-series (CS) have the holo-information nature, so that both the content and the sign of each gain-term can be determined via the coded method. The principle of this method is simple and it is suited for computer programming. The capability of the computer-aided analysis for switched current network (SIN) can be enhanced. 展开更多
关键词 SIGNAL flow graph algorithm CODED method SIN.
在线阅读 下载PDF
RECONSTRUCTION OF ONE DIMENSIONAL MULTI-LAYERED MEDIA BY USING A TIME DOMAIN SIGNAL FLOW GRAPH TECHNIQUE 被引量:1
4
作者 崔铁军 梁昌洪 《Journal of Electronics(China)》 1993年第2期162-169,共8页
A novel inverse scattering method to reconstruct the permittivity profile of one-dimensional multi-layered media is proposed in this paper.Based on the equivalent network ofthe medium,a concept of time domain signal f... A novel inverse scattering method to reconstruct the permittivity profile of one-dimensional multi-layered media is proposed in this paper.Based on the equivalent network ofthe medium,a concept of time domain signal flow graph and its basic principles are introduced,from which the reflection coefficient of the medium in time domain can be shown to be a series ofDirac δ-functions(pulse responses).In terms of the pulse responses,we will reconstruct both thepermittivity and the thickness of each layer will accurately be reconstructed.Numerical examplesverify the applicability of this 展开更多
关键词 Multi-layered MEDIUM Reconstruct PERMITTIVITY profile INVERSE SCATTERING Time DOMAIN signal flow graph
在线阅读 下载PDF
Development of an Improved GUI Automation Test System Based on Event-Flow Graph 被引量:2
5
作者 Yongzhong Lu Danping Yan +1 位作者 Songlin Nie Chun Wang 《Journal of Software Engineering and Applications》 2008年第1期38-43,共6页
A more automated graphic user interface (GUI) test model, which is based on the event-flow graph, is proposed. In the model, a user interface automation API tool is first used to carry out reverse engineering for a GU... A more automated graphic user interface (GUI) test model, which is based on the event-flow graph, is proposed. In the model, a user interface automation API tool is first used to carry out reverse engineering for a GUI test sample so as to obtain the event-flow graph. Then two approaches are adopted to create GUI test sample cases. That is to say, an improved ant colony optimization (ACO) algorithm is employed to establish a sequence of testing cases in the course of the daily smoke test. The sequence goes through all object event points in the event-flow graph. On the other hand, the spanning tree obtained by deep breadth-first search (BFS) approach is utilized to obtain the testing cases from goal point to outset point in the course of the deep regression test. Finally, these cases are applied to test the new GUI. Moreover, according to the above-mentioned model, a corresponding prototype system based on Microsoft UI automation framework is developed, thus giving a more effective way to improve the GUI automation test in Windows OS. 展开更多
关键词 Automated Software TESTING graphIC User Interface Event-flow graph Regression TESTING ANT COLONY Optimization UI AUTOMATION
暂未订购
Analysis of Electronic Circuits with the Signal Flow Graph Method
6
作者 Feim Ridvan Rasim Sebastian M. Sattler 《Circuits and Systems》 2017年第11期261-274,共14页
In this work a method called “signal flow graph (SFG)” is presented. A signal-flow graph describes a system by its signal flow by directed and weighted graph;the signals are applied to nodes and functions on edges. ... In this work a method called “signal flow graph (SFG)” is presented. A signal-flow graph describes a system by its signal flow by directed and weighted graph;the signals are applied to nodes and functions on edges. The edges of the signal flow graph are small processing units, through which the incoming signals are processed in a certain form. In this case, the result is sent to the outgoing node. The SFG allows a good visual inspection into complex feedback problems. Furthermore such a presentation allows for a clear and unambiguous description of a generating system, for example, a netview. A Signal Flow Graph (SFG) allows a fast and practical network analysis based on a clear data presentation in graphic format of the mathematical linear equations of the circuit. During creation of a SFG the Direct Current-Case (DC-Case) was observed since the correct current and voltage directions was drawn from zero frequency. In addition, the mathematical axioms, which are based on field algebra, are declared. In this work we show you in addition: How we check our SFG whether it is a consistent system or not. A signal flow graph can be verified by generating the identity of the signal flow graph itself, illustrated by the inverse signal flow graph (SFG&minus;1). Two signal flow graphs are always generated from one circuit, so that the signal flow diagram already presented in previous sections corresponds to only half of the solution. The other half of the solution is the so-called identity, which represents the (SFG&minus;1). If these two graphs are superposed with one another, so called 1-edges are created at the node points. In Boolean algebra, these 1-edges are given the value 1, whereas this value can be identified with a zero in the field algebra. 展开更多
关键词 ANALOG FEEDBACK Network Theory SYMBOLIC ANALYSIS Signal flow graph TRANSFER Function
在线阅读 下载PDF
A Survey of Malware Classification Methods Based on Data Flow Graph
7
作者 Tingting Jiang Lingling Cui +1 位作者 Zedong Lin Faming Lu 《国际计算机前沿大会会议论文集》 2022年第1期80-93,共14页
Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the o... Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the obfuscation problem to a certain extent.Many malware classification methods based on data flow graphs have been proposed.Some of them are based on userdefined features or graph similarity of data flow graphs.Graph neural networks have also recently been used to implement malware classification recently.This paper provides an overview of current data flow graph-based malware classification methods.Their respective advantages and disadvantages are summarized as well.In addition,the future trend of the data flow graph-based malware classification method is analyzed,which is of great significance for promoting the development of malware detection technology. 展开更多
关键词 Malware detection Malware classification Data flow graph graph neural network
原文传递
Bipartite graph-based control flow checking for COTS-based small satellites 被引量:2
8
作者 Wang Honghao Wang Huiquan Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期883-893,共11页
Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced contr... Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites. 展开更多
关键词 Bipartite graph Control flow checking Commercial-off-the-shelves(COTS) Error injection Fault tolerant Illegal branch Small satellites
原文传递
Graph-tree-based software control flow checking for COTS processors on pico-satellites 被引量:1
9
作者 Yang Mu Wang Hao +1 位作者 Zheng Yangming Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第2期413-422,共10页
This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processo... This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processors. A graph tree data structure with a topology similar to common trees is introduced to transform the control flow graphs of target programs. This together with design of IDs and signatures of its vertices and edges allows for an easy check of legality of actual branching during target program execution. As a result, the algorithm not only is capable of detecting all single and multiple branching errors with low latency and time overheads along with a linear-complexity space overhead, but also remains generic among arbitrary instruction sets and independent of any specific hardware. Tests of the algorithm using a COTS-processor-based onboard computer (OBC) of in-service ZDPS-1A pico-satellite products show that GTCFC can detect over 90% of the randomly injected and all-pattern-covering branching errors for different types of target programs, with performance and overheads consistent with the theoretical analysis; and beats well-established preeminent control flow checking algorithms in these dimensions. Furthermore, it is validated that GTCGC not only can be accommodated in pico-satellites conveniently with still sufficient system margins left, but also has the ability to minimize the risk of control flow errors being undetected in their space missions. Therefore, due to its effectiveness, efficiency, and compatibility, the GTCFC solution is ready for applications on COTS processors on pico-satellites in their real space missions. 展开更多
关键词 Branching error Commercial-off-the-shelf (COTS) Control flow checking Error injection graph tree On-board computer Pico-satellite
原文传递
Cyclic Reconfigurable Flow Shop under Different Configurations Modeling and Optimization Based on Timed Event Graph
10
作者 REN Si-Cheng XU De WANG Fang TAN Min 《自动化学报》 EI CSCD 北大核心 2006年第1期15-20,共6页
Based on the idea that modules are independent of machines, different combinations of modules and machines result in different configurations and the system performances differ under different configurations, a kind o... Based on the idea that modules are independent of machines, different combinations of modules and machines result in different configurations and the system performances differ under different configurations, a kind of cyclic reconfigurable flow shops are proposed for the new manufacturing paradigm-reconfigurable manufacturing system. The cyclic reconfigurable flow shop is modeled as a timed event graph. The optimal configuration is defined as the one under which the cyclic reconfigurable flow shop functions with the minimum cycle time and the minimum number of pallets. The optimal configuration, the minimum cycle time and the minimum number of pallets can be obtained in two steps. 展开更多
关键词 循环流程 制造业 时间事件 建模 优化设计
在线阅读 下载PDF
一种基于图同构时空网络的交通流预测模型
11
作者 张伟阳 陈宏敏 林兵 《福建师范大学学报(自然科学版)》 北大核心 2026年第1期1-9,共9页
准确的交通流预测对于智能交通系统的有效运作至关重要,为此提出了图同构时空网络(graph isomorphism spatio-temporal network,GISTN)模型,旨在提高交通流预测的准确性。GISTN将图同构网络应用于交通流预测任务,并创新性地与双尺度时... 准确的交通流预测对于智能交通系统的有效运作至关重要,为此提出了图同构时空网络(graph isomorphism spatio-temporal network,GISTN)模型,旨在提高交通流预测的准确性。GISTN将图同构网络应用于交通流预测任务,并创新性地与双尺度时间卷积网络和门控循环单元相结合,有效捕捉了交通数据中的复杂非线性空间依赖关系和不同尺度时间特征。基于3个公开数据集上的实验结果表明,GISTN在不同预测时间尺度下的性能均优于经典基线模型。GISTN为交通流预测提供了一个新颖且高效的解决方案,对于提高智能交通系统的性能和效率具有重要意义。 展开更多
关键词 交通流预测 图神经网络 图同构网络 时空建模 智能交通系统
在线阅读 下载PDF
基于分段函数的不透明谓词
12
作者 陈沈杰 王智昊 吴彪 《电子科技》 2026年第2期45-53,共9页
作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号... 作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号执行技术以及混淆后程序控制流较简单问题,文中提出了一种基于分段函数的不透明谓词。攻击动态符号执行存在的缺陷,利用分段函数使引入的变量收敛于设定值,以此构造不透明谓词,隐藏程序真实控制流。基于LLVM(Low Level Virtual Machine)框架实现了所提混淆系统,并进行了实验检测。实验结果表明,所提混淆方法有效增加了程序控制流的复杂度,能够抵御动态符号执行技术。相较于现有混淆系统,所提方法使程序的可维护度平均下降23.8%,具有更高的混淆强度。 展开更多
关键词 代码混淆系统 不透明谓词 虚假控制流 符号执行 静态分析 LLVM 逆向工程 控制流图
在线阅读 下载PDF
基于多维特征融合与残差增强的交通流量预测
13
作者 张振琳 郭慧洁 +4 位作者 窦天凤 亓开元 吴栋 曲志坚 任崇广 《计算机应用研究》 北大核心 2026年第1期161-169,共9页
交通流量预测在智能交通系统中占据核心地位。针对当前交通流量预测方法在特征利用和时空依赖建模方面的不足,提出了一种新的基于多维特征融合与残差增强的交通流量预测模型MFRGCRN(multi-dimensional feature fusion and residual-enha... 交通流量预测在智能交通系统中占据核心地位。针对当前交通流量预测方法在特征利用和时空依赖建模方面的不足,提出了一种新的基于多维特征融合与残差增强的交通流量预测模型MFRGCRN(multi-dimensional feature fusion and residual-enhanced graph convolutional recurrent network)。该模型通过结合自编码器、深度可分离卷积及时间卷积全方位挖掘时空相关性,使用门控循环单元与多尺度卷积注意力结合学习数据的关联关系,同时利用多尺度残差增强机制实现对复杂模式的逐步建模。在四个真实数据集上的实验结果表明,所提出的模型在预测性能上优于对比的基线模型,尤其在PEMS08数据集的12步预测任务中,MAE、RMSE和MAPE分别降低约7.7%、2.9%和4.5%,展现出优异的长期预测能力。模型在准确性、稳定性和鲁棒性方面均表现出较强优势,为智能交通系统中的复杂交通流建模提供了有效解决方案。 展开更多
关键词 交通流量预测 动态图卷积网络 特征融合 残差建模 注意力机制
在线阅读 下载PDF
基于高斯分布和Householder flow的无监督图嵌入算法 被引量:1
14
作者 刘国军 范天祥 +2 位作者 王乃正 张正达 齐广智 《山东大学学报(工学版)》 CAS CSCD 北大核心 2024年第4期35-41,共7页
为更好地表示节点,提出一种新的图嵌入方法,将节点表示为由均值和方差构成的高斯分布,通过应用一系列可逆Householder变换,将相对简单的分布转换为更灵活的分布,可以更好地捕获关于其表示的不确定性。为提高稳定性,采用Wasserstein距离... 为更好地表示节点,提出一种新的图嵌入方法,将节点表示为由均值和方差构成的高斯分布,通过应用一系列可逆Householder变换,将相对简单的分布转换为更灵活的分布,可以更好地捕获关于其表示的不确定性。为提高稳定性,采用Wasserstein距离进行分布之间的度量。试验结果表明,在多个基准数据集上,使用Householder变换的Graph2Gauss(G2G)算法比原始模型的链接预测表现更好。通过节点分类的效果可以看出,对于节点信息缺失的图,使用Wasserstein距离可以大幅增加节点分类的F1分数。 展开更多
关键词 无监督学习 图嵌入 高斯分布 Householder flow Wasserstein距离
原文传递
LSFormer:用于交通流预测的负载量感知空间异质性变换器
15
作者 李轩 李艳红 +2 位作者 徐昊翔 黄健翔 陈亮亮 《中南民族大学学报(自然科学版)》 2026年第1期86-96,共11页
高精度的交通流预测可以有效缓解智能城市道路的拥堵压力.然而,交通流预测面临着如何有效揭示交通流数据中隐藏的时空依赖关系的挑战.目前大多数方法都是基于图神经网络(GNN)或变压器模型.前者只考虑短程空间信息,无法捕捉长程空间依赖... 高精度的交通流预测可以有效缓解智能城市道路的拥堵压力.然而,交通流预测面临着如何有效揭示交通流数据中隐藏的时空依赖关系的挑战.目前大多数方法都是基于图神经网络(GNN)或变压器模型.前者只考虑短程空间信息,无法捕捉长程空间依赖关系,而后者虽然能够捕捉长程依赖关系,但大多数研究都没有充分挖掘变压器架构的潜力.为此,提出了一种用于交通流预测的新型负载感知空间异质性变换器,即LSFormer.具体来说,为空间自注意力模块设计了相对位置编码以优化空间位置信息感知问题,使模型能更好地捕捉位置信息.然后,引入了负载感知模块,以突出周边交通流对中心点的影响,解决了现有方法对周边区域依赖关系建模不足的问题.在5个真实世界公共交通数据集上的广泛实验结果表明:文中所提模型可以达到先进的性能.此外,还将学习到的空间嵌入可视化,使模型具有可解释性. 展开更多
关键词 交通流预测 时空特征 变换器 图神经网络
在线阅读 下载PDF
一种基于FlowDroid的Android隐私保护方法 被引量:2
16
作者 马绍菊 万良 +1 位作者 杨婷 马林进 《计算机应用与软件》 2017年第5期317-321,共5页
随着移动设备市场的扩大,Android智能系统占据了手机市场的很大份额,手机设备是承载用户隐私数据较多的移动设备。由于Android系统的开源特性,其存在很多安全隐患。提出一种基于FlowDroid的Android增强型隐私保护方法。对Android应用进... 随着移动设备市场的扩大,Android智能系统占据了手机市场的很大份额,手机设备是承载用户隐私数据较多的移动设备。由于Android系统的开源特性,其存在很多安全隐患。提出一种基于FlowDroid的Android增强型隐私保护方法。对Android应用进行静态污点分析,判断其是否存在隐私泄露,并基于FlowDroid静态污点分析工具实现与验证。通过验证表明提出的方法是有效的。 展开更多
关键词 静态污点 隐私泄露 程序间控制流图 ANDROID操作系统
在线阅读 下载PDF
RESEARCH ON THE BLOCKING FLOW IN A TRANSPORTATION NETWORK──THE GENERAL CONCEPTS AND THEORY OF THE BLOCKING FLOW 被引量:4
17
作者 Ning Xuanxi (Industry and Business College,NUAA 29 Yudao Street,Nanjing 210016,P.R.China) 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1994年第2期215-223,共9页
Blockage is a kind of phenomenon occurring frequently in modern transportation network. This paper deals with the research work on the blocking now in a network with the help of network flow theory. The blockage pheno... Blockage is a kind of phenomenon occurring frequently in modern transportation network. This paper deals with the research work on the blocking now in a network with the help of network flow theory. The blockage phenomena can be divided intO local blockage and network blockage. In this paper, which deals mainly with the latter, the fundamental concepts and definitions of network blocking flow, blocking outset are presented and the related theorems are proved. It is proved that the sufficient and necessary condition for the emergence of a blocking now in a network is the existence of the blocking outset. The necessary conditions for the existence of the blocking outset in a network are analysed and the characteristic cutset of blockage which reflects the all possible situation of blocking nows in the network is defined.In the last part of the paper the mathematical model of the minimum blocking now is developed and the solution to a small network is given. 展开更多
关键词 NETWORK flow NETWORK graph THEORY NETWORK now PROGRAMMING BLOCKING flow
在线阅读 下载PDF
面向交通流量预测的时空Graph-CoordAttention网络 被引量:2
18
作者 刘建松 康雁 +2 位作者 李浩 王韬 王海宁 《计算机科学》 CSCD 北大核心 2023年第S01期558-564,共7页
交通预测是城市智能交通系统的一个重要研究组成部分,使人们的出行更加效率和安全。由于复杂的时间和空间依赖性,准确预测交通流量仍然是一个巨大的挑战。近年来,图卷积网络(GCN)在交通预测方面表现出巨大的潜力,但基于GCN的模型往往侧... 交通预测是城市智能交通系统的一个重要研究组成部分,使人们的出行更加效率和安全。由于复杂的时间和空间依赖性,准确预测交通流量仍然是一个巨大的挑战。近年来,图卷积网络(GCN)在交通预测方面表现出巨大的潜力,但基于GCN的模型往往侧重于单独捕捉时间和空间的依赖性,忽视了时间和空间依赖性之间的动态关联性,不能很好地融合它们。此外,以前的方法使用现实世界的静态交通网络来构建空间邻接矩阵,这可能忽略了动态的空间依赖性。为了克服这些局限性,并提高模型的性能,提出了一种新颖的时空Graph-CoordAttention网络(STGCA)。具体来说,提出了时空同步模块,用来建模不同时刻的时空依赖交融关系。然后,提出了一种动态图学习的方案,基于车流量之间数据关联,挖掘出潜在的图信息。在4个公开的数据集上和现有基线模型进行对比实验,STGCA表现了优异的性能。 展开更多
关键词 交通流量预测 时空预测 图卷积网络 注意力机制 时空依赖
在线阅读 下载PDF
Detecting Data-flow Errors Based on Petri Nets With Data Operations 被引量:4
19
作者 Dongming Xiang Guanjun Liu +1 位作者 Chungang Yan Changjun Jiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期251-260,共10页
In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so o... In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so on. However, there are not too many methods for detecting data-flow errors. This paper defines Petri nets with data operations(PN-DO) that can model the operations on data such as read, write and delete. Based on PN-DO, we define some data-flow errors in this paper. We construct a reachability graph with data operations for each PN-DO, and then propose a method to reduce the reachability graph. Based on the reduced reachability graph, data-flow errors can be detected rapidly. A case study is given to illustrate the effectiveness of our methods. 展开更多
关键词 Business process modeling data-flow errors Petri nets reachability graph
在线阅读 下载PDF
RESEARCH ON THE LOCAL BLOCKAGE OF A TRANSPORTATION NETWORK AND ITS MINIMUM FLOW CAPACITY
20
作者 Ning Xuanxi(Industry and Business College ,NUAA 29 Yudao Street ,Nanjing 210016 ,P.R.China) 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1994年第1期60-66,共7页
This paper deals with the research work on the phenomena of local blockage in a transportation network. Onthe basis of introducing the research results in [1], theminimum now capacity problem of a network in the mosts... This paper deals with the research work on the phenomena of local blockage in a transportation network. Onthe basis of introducing the research results in [1], theminimum now capacity problem of a network in the mostseriously blocked situation is studied. With the conceptof complete outset presented in [1], the relationship between the minimum now capacity of a network and its minimum complete cut capacity is discussed, and the reasons for the difference betweent the minimum now capacity of a network and its minimum complete cut capa-city are analysed. In order to get the solution to the problem, the concepts of normalization of a network and its blocking path graph are presented. In the paper it is proved that the necessary and sufficient conditions for the equality between the minumum now capacity and its minumum complete cut capacity are the existence of a feasible flow in the blocking path graph. For the reason that there are some dependent production points in the blocking path graph of a network, the proof about the tenability of the Gale's Theorm for the planat normalized network without circuit is made. 展开更多
关键词 NETWORK flow NETWORK graph theory BLOCKING flow NETWORK now PROGRAMMING
在线阅读 下载PDF
上一页 1 2 57 下一页 到第
使用帮助 返回顶部