期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Random testing for system-level functional verification of system-on-chip 被引量:4
1
作者 Ma Qinsheng Cao Yang +1 位作者 Yang Jun Wang Min 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第6期1378-1383,共6页
In order to deal with the limitations during the register transfer level verification, a new functional verification method based on the random testing for the system-level of system-on-chip is proposed.The validity o... In order to deal with the limitations during the register transfer level verification, a new functional verification method based on the random testing for the system-level of system-on-chip is proposed.The validity of this method is proven theoretically.Specifically, testcases are generated according to many approaches of randomization.Moreover, the testbench for the system-level verification according to the proposed method is designed by using advanced modeling language.Therefore, under the circumstances that the testbench generates testcases quickly, the hardware/software co-simulation and co-verification can be implemented and the hardware/software partitioning planning can be evaluated easily.The comparison method is put to use in the evaluation approach of the testing validity.The evaluation result indicates that the efficiency of the partition testing is better than that of the random testing only when one or more subdomains are covered over with the area of errors, although the efficiency of the random testing is generally better than that of the partition testing.The experimental result indicates that this method has a good performance in the functional coverage and the cost of testing and can discover the functional errors as soon as possible. 展开更多
关键词 VLSI circuit VERIFICATION random process FUNCTION TESTING SYSTEM-ON-CHIP system-level.
在线阅读 下载PDF
Multi-objective optimization about functions of the East Lake in Wuhan
2
作者 LI Xin-min LI Rong 《汉口学院学报》 2009年第3期49-52,共4页
在线阅读 下载PDF
A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking 被引量:8
3
作者 Yu-Chao Liu Yu-Tao Ma +2 位作者 Hai-Su Zhang De-Yi Li Gui-Sheng Chen 《International Journal of Automation and computing》 EI 2011年第3期280-285,共6页
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dyn... With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtuMized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security. 展开更多
关键词 Cloud computing cloud security trust management cloud watermarking data coloring.
在线阅读 下载PDF
A Hybrid Set of Complexity Metrics for Large-Scale Object-Oriented Software Systems 被引量:2
4
作者 马于涛 何克清 +2 位作者 李兵 刘婧 周晓燕 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1184-1201,共18页
Large-scale object-oriented(OO) software systems have recently been found to share global network characteristics such as small world and scale free,which go beyond the scope of traditional software measurement and ... Large-scale object-oriented(OO) software systems have recently been found to share global network characteristics such as small world and scale free,which go beyond the scope of traditional software measurement and assessment methodologies.To measure the complexity at various levels of granularity,namely graph,class(and object) and source code,we propose a hierarchical set of metrics in terms of coupling and cohesion-the most important characteristics of software,and analyze a sample of 12 open-source OO software systems to empirically validate the set.Experimental results of the correlations between cross-level metrics indicate that the graph measures of our set complement traditional software metrics well from the viewpoint of network thinking,and provide more effective information about fault-prone classes in practice. 展开更多
关键词 complexity metrics quality analysis and evaluation object-oriented programming reverse engineering complex networks
原文传递
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
5
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 Cyberspace security security metrics exploitability surface attack conse quence risk assessment
在线阅读 下载PDF
Collective Intelligence and Uncertain Knowledge Representation in Cloud Computing 被引量:1
6
作者 刘玉超 张海粟 +2 位作者 马于涛 李德毅 陈桂生 《China Communications》 SCIE CSCD 2011年第6期58-66,共9页
The lasting evolution of computing environment, software engineering and interaction methods leads to cloud computing. Cloud computing changes the configuration mode of resources on the Internet and all kinds of resou... The lasting evolution of computing environment, software engineering and interaction methods leads to cloud computing. Cloud computing changes the configuration mode of resources on the Internet and all kinds of resources are virtualized and provided as services. Mass participation and online interaction with social annotations become usual in human daily life. People who own similar interests on the Internet may cluster naturally into scalable and boundless communities and collective intelligence will emerge. Human is taken as an intelligent computing factor, and uncertainty becomes a basic property in cloud computing. Virtualization, soft computing and granular computing will become essential features of cloud computing. Compared with the engineering technological problems of IaaS (Infrastructure as a service), PaaS (Platform as a Service) and SaaS (Software as a Service), collective intelligence and uncertain knowledge representation will be more important frontiers in cloud computing for researchers within the community of intelligence science. 展开更多
关键词 collective intelligence social annotation common sense uncertain knowledge representation
在线阅读 下载PDF
Constructing Projection Frequent Pattern Tree for Efficient Mining 被引量:1
7
作者 Xiang Jian-wen He Yan-xiang +1 位作者 Kokichi Futatsugi Kong Wei-qiang 《Wuhan University Journal of Natural Sciences》 EI CAS 2003年第02A期351-357,共7页
Frequent Pattern mining plays an essential role in data mining.Most of the previous studies adopt an Apriori-like candidate set generation-and-test approach.However,candidate set generation is still costly,especially ... Frequent Pattern mining plays an essential role in data mining.Most of the previous studies adopt an Apriori-like candidate set generation-and-test approach.However,candidate set generation is still costly,especially when there exist prolific patterns and/or long patterns.We introduce a novel frequent pattern growth(FP-growth)method,which is efficient and scalable for mining both long and short frequent patterns without candidate generation.And build a new projection frequent pattern tree(PFP-tree)algorithm,which not only heirs all the advantages in the FP-growth method,but also avoids it's bottleneck in database size dependence when constructing the frequent pattern tree(FP-tree).Efficiency of mining is achieved by introducing the projection technique,which avoid serial scan each frequent item in the database,the cost is mainly related to the depth of the tree,namely the number of frequent items of the longest transaction in the database,not the sum of all the frequent items in the database,which hugely shortens the time of tree-construction.Our performance study shows that the PFP-tree method is efficient and scalable for mining large databases or data warehouses,and is even about an order of magnitude faster than the FP-growth method. 展开更多
关键词 ALGORITHMS Database systems Trees(mathematics)
在线阅读 下载PDF
Service-Oriented Semantic Interoperability Technologies and Standards
8
作者 He Keqing Li Bing 《ZTE Communications》 2010年第4期10-14,共5页
Service-Oriented Software Engineering (SOSE) presents new challenges; in particular, how to promote interoperability and cooperation among loosely-coupled service resources. This is critical for service resource sha... Service-Oriented Software Engineering (SOSE) presents new challenges; in particular, how to promote interoperability and cooperation among loosely-coupled service resources. This is critical for service resource sharing and for implementing on-demand services. This paper discusses key technologies of service virtualization, including encapsulation of service interoperability (for available resources); ontology-based Role, Goal, Process, and Service (RGPS) metamodeling (for interoperable aggregation and organization of virtualization services); registration and repository management of Metamodel Framework for Interoperability (MFI) (for virtualization service management); and virtualization service ontology and its represented association with RGP& Latest progress of the MFI and ISQ standards is also discussed. 展开更多
关键词 metamodel framework for interoperability service on demand service aggregation
在线阅读 下载PDF
Event semantic recognizing based on Markov chain
9
作者 ZENG Cheng OU Wei-jie CUI Xiao-jun 《通讯和计算机(中英文版)》 2008年第6期1-9,共9页
关键词 马尔可夫链 复杂系统 计算机技术 信息技术
在线阅读 下载PDF
Automated Analysis of the SCR-StyleRequirements Specifications 被引量:2
10
作者 WU Guoqing LIU Xiang +1 位作者 YING Shi Tetsuo Tamai 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第4期401-407,共7页
The SCR(Software Cost Reduction)requirements method is aneffective method for specifying software system requirements.This paper presents aformal model analyzing SCR-style requirements.The analysis model mainly applie... The SCR(Software Cost Reduction)requirements method is aneffective method for specifying software system requirements.This paper presents aformal model analyzing SCR-style requirements.The analysis model mainly appliesstate translation rules,semantic computing rules and attributes to define formal se-mantics of a tabular notation in the SCR requirements method,and may be used toanalyze requirements specifications to be specified by the SCR requirements method.Using a simple example,this paper introduces how to analyze consistency and com-pleteness of requirements specifications. 展开更多
关键词 requirements engineering requirements specifications mode tran-sition rule requirements analysis
原文传递
Time Complexity Analysis of an Evolutionary Algorithm for Finding Nearly Maximum Cardinality Matching 被引量:1
11
作者 Jun He Xin Yao 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第4期450-458,共9页
Most of works on the time complexity analysis of evolutionary algorithms havealways focused on some artificial binary problems.The time complexity of the algorithms forcombinatorial optimisation has not been well unde... Most of works on the time complexity analysis of evolutionary algorithms havealways focused on some artificial binary problems.The time complexity of the algorithms forcombinatorial optimisation has not been well understood.This paper considers the time complexity ofan evolutionary algorithm for a classical combinatorial optimisation problem,to find the maximumcardinality matching in a graph.It is shown that the evolutionary algorithm can produce a matchingwith nearly maximum cardinality in average polynomial time. 展开更多
关键词 evolutionary algorithm(EA) combinatorial optimisation time complexity maximum matching
原文传递
A location-aware GIServices quality prediction model via collaborative filtering
12
作者 Qingxi Peng Lan You Na Dong 《International Journal of Digital Earth》 SCIE EI 2018年第9期897-912,共16页
The quality of GIServices(QoGIS)is an important consideration for services sharing and interoperation.However,QoGIS is a complex concept and difficult to be evaluated reasonably.Most of the current studies have focuse... The quality of GIServices(QoGIS)is an important consideration for services sharing and interoperation.However,QoGIS is a complex concept and difficult to be evaluated reasonably.Most of the current studies have focused on static and non-scalable evaluation methods but have ignored location sensitivity subsequently resulting in the inaccurate QoGIS values.For intensive geodata and computation,GIServices are more sensitive to the location factor than general services.This paper proposes a location-aware GIServices quality prediction model via collaborative filtering(LAGCF).The model uses a mixed CF method based on time zone feature from the perspectives of both user and GIServices.Time zone is taken as the location factor and mapped into the prediction process.A time zone-adjusted Pearson correlation coefficient algorithm was designed to measure the similarity between the GIServices and the target,helping to identify highly similar GIServices.By adopting a coefficient of confidence in the final generation phase,the value of the QoGIS most similar to the target services will play a dominant role in the comprehensive result.Two series of experiments on large-scale QoGIS data were implemented to verify the effectivity of LAGCF.The results showed that LAGCF can improve the accuracy of QoGIS prediction significantly. 展开更多
关键词 LOCATION-AWARE QoGIS quality prediction GIServices collaborative filtering
原文传递
Semantic Interoperability Aggregation in Service Requirements Refinement 被引量:7
13
作者 何克清 王健 梁鹏 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1103-1117,共15页
Semantic refinement of stakeholders' requirements is a fundamental issue in requirements engineering. Facing with the on-demand collaboration problem among the heterogeneous, autonomous, and dynamic service resources... Semantic refinement of stakeholders' requirements is a fundamental issue in requirements engineering. Facing with the on-demand collaboration problem among the heterogeneous, autonomous, and dynamic service resources in the Web, service requirements refinement becomes extremely important, and the key issue in service requirements refinement is semantic interoperability aggregation. A method for creating connecting ontologies driven by requirement sign ontology is proposed. Based on connecting ontologies, a method for semantic interoperability aggregation in requirements refinement is proposed. In addition, we discover that the necessary condition for semantic interoperability is semantic similarity, and the sufficient condition is the coverability of the agreed mediation ontology. Based on this viewpoint, a metric framework for calculating semantic interoperability capability is proposed. This methodology can provide a semantic representation mechanism for refining users' requirements; meanwhile, since users' requirements in the Web usually originate from different domains, it can also provide semantic interoperability guidance for networked service discovery, and is an effective approach for the realization of on-demand service integration. The methodology will be beneficial in service-oriented software engineering and cloud computing. 展开更多
关键词 connecting ontologies requirements refinement semantic interoperability aggregation
原文传递
Patent expanded retrieval via word embedding under composite-domain perspectives 被引量:1
14
作者 Fei WANG Tieyun QIAN +1 位作者 Bin LIU Zhiyong PENG 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第5期1048-1061,共14页
Patent prior art search uses dispersed information to retrieve all the relevant documents with strong ambiguity from the massive patent database. This challenging task con-sists in patent reduction and patent expansio... Patent prior art search uses dispersed information to retrieve all the relevant documents with strong ambiguity from the massive patent database. This challenging task con-sists in patent reduction and patent expansion. Existing stud-ies on patent reduction ignore the relevance between techni-cal characteristics and technical domains, and result in am-biguous queries. Works on patent expansion expand terms from external resource by selecting words with similar dis-tribution or similar semantics. However, this splits the rele-vance between the distribution and semantics of the terms. Besides, common repository hardly meets the requirement of patent expansion for uncommon semantics and unusual terms. In order to solve these problems, we first present a novel composite-domain perspective model which converts the technical characteristic of a query patent to a specific composite classified domain and generates aspect queries. We then implement patent expansion with double consistency by combining distribution and semantics simultaneously. We also propose to train semantic vector spaces via word em-bedding under the specific classified domains, so as to pro-vide domain-aware expanded resource. Finally, multiple re-trieval results of the same topic are merged based on perspec-tive weight and rank in the results. Our experimental results on CLEP-IP 2010 demonstrate that our method is very effec-tive. It reaches about 5.43% improvement in recall and nearly 12.38% improvement in PRES over the state-of-the-art. Our work also achieves the best performance balance in terms of recall, MAP and PRES. 展开更多
关键词 PATENT RETRIEVAL composite-domain perspective double-consistency expansion WORD EMBEDDING
原文传递
An Uncertainty Enhanced Trust Evolution Strategy for e-Science 被引量:1
15
作者 杜薇 崔国华 刘伟 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1225-1236,共12页
Resources shared in e-Science have critical requirements on security.Thus subjective trust management is essential to guarantee users' collaborations and communications on such a promising infrastructure.As an import... Resources shared in e-Science have critical requirements on security.Thus subjective trust management is essential to guarantee users' collaborations and communications on such a promising infrastructure.As an important nature of subjective trust,uncertainty should be preserved and exhibited in trust definition,representation and evolution.Consider the drawbacks of existing mechanisms based on random mathematics and fuzzy theory,this paper designs an uncertainty enhanced trust evolution strategy based on cloud model theory.We define subjective trust as trust cloud.Then we propose new algorithms to propagate,aggregate and update trust.Furthermore,based on the concept of similar cloud,a method to assess trust level is put forward.The simulation results show the effiectiveness,rationality and efficiency of our proposed strategy. 展开更多
关键词 cloud model theory similar cloud operator subjective trust trust cloud
原文传递
演化算法求解近似最大匹配问题的时间复杂性分析
16
作者 Jun He Xin Yao 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期15-15,共1页
虽然演化算法已经广泛地被用于求解不同的组合优化问题,但是对于其时间复杂性目前仍然了解得比较少。最近,在这方面有了一些初步的研究,然而迄今的结果大多局限于讨论一些简单的演化算法(如(1+1)类型的演化策略)和人造的模型问题(如二... 虽然演化算法已经广泛地被用于求解不同的组合优化问题,但是对于其时间复杂性目前仍然了解得比较少。最近,在这方面有了一些初步的研究,然而迄今的结果大多局限于讨论一些简单的演化算法(如(1+1)类型的演化策略)和人造的模型问题(如二进制类型的示例问题),很少涉及到使用种群、杂交操作演化算法和传统的组合优化问题。因此,理论上需要分析演化算法,求解一些典型的组合优化问题的时间复杂性。 展开更多
关键词 演化算法 时间复杂性 最大匹配问题 组合优化问题 二进制 演化策略 近似 求解 种群
原文传递
An intelligent market making strategy in algorithmic trading
17
作者 Xiaodong LI Xiaotie DENG +2 位作者 Shanfeng ZHU Feng WANG Haoran XIE 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第4期596-608,共13页
Market making (MM) strategies have played an important role in the electronic stock market. However, the MM strategies without any forecasting power are not safe while trading. In this paper, we design and implement... Market making (MM) strategies have played an important role in the electronic stock market. However, the MM strategies without any forecasting power are not safe while trading. In this paper, we design and implement a twotier framework, which includes a trading signal generator based on a supervised learning approach and an event-driven MM strategy. The proposed generator incorporates the information within order book microstructure and market news to provide directional predictions. The MM strategy in the second tier trades on the signals and prevents itself from profit loss led by market trending. Using half a year price tick data from Tokyo Stock Exchange (TSE) and Shanghai Stock Exchange (SSE), and corresponding Thomson Reuters news of the same time period, we conduct the back-testing and simulation on an industrial near-to-reality simulator. From the empirical results, we find that 1) strategies with signals perform better than strategies without any signal in terms of average daily profit and loss (PnL) and sharpe ratio (SR), and 2) correct predictions do help MM strategies readjust their quoting along with market trending, which avoids the strategies triggering stop loss procedure that further realizes the paper loss. 展开更多
关键词 algorithmic trading market making strategy or- der book microstructure news impact analysis market simulation
原文传递
Mobile agent-enabled framework for structuring and building distributed systems on the internet
18
作者 CAO Jiannong ZHOU Jingyang +1 位作者 ZHU Weiweit LI Xuhui 《Science in China(Series F)》 2006年第6期885-905,共21页
Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and... Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of processing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel approach to detecting deadlocks in distributed system by using mobile agents, which demonstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detection strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy. 展开更多
关键词 mobile agent internet computing distributed systems deadlock detection.
原文传递
Distribution-free data density estimation in large-scale networks
19
作者 Minqi ZHOU Rong ZHANG +1 位作者 Weining QIAN Aoying ZHOU 《Frontiers of Computer Science》 SCIE EI CSCD 2018年第6期1220-1240,共21页
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部