孤独症谱系障碍是一类以社会交往、沟通困难、行为模式受限或重复为主要表现的心理发育障碍,其病因与脑网络的异常模式有关。非侵入性脑刺激技术可以调节大脑皮质的激活,重塑孤独症谱系障碍患者的脑网络,从而改善行为症状。本文总结了...孤独症谱系障碍是一类以社会交往、沟通困难、行为模式受限或重复为主要表现的心理发育障碍,其病因与脑网络的异常模式有关。非侵入性脑刺激技术可以调节大脑皮质的激活,重塑孤独症谱系障碍患者的脑网络,从而改善行为症状。本文总结了经颅磁刺激(transcranial magnetic stimulation,TMS)和经颅直流电刺激(transcranial direct current stimulation,tDCS)2种非侵入性脑刺激技术对患者行为、认知、言语的影响,评价了非侵入性脑刺激的临床应用前景。展开更多
In the research of software reuse, feature models have been widely adopted to capture, organize and reuse the requirements of a set of similar applications in a software do- main. However, the construction, especially...In the research of software reuse, feature models have been widely adopted to capture, organize and reuse the requirements of a set of similar applications in a software do- main. However, the construction, especially the refinement, of feature models is a labor-intensive process, and there lacks an effective way to aid domain engineers in refining feature models. In this paper, we propose a new approach to support interactive refinement of feature models based on the view updating technique. The basic idea of our approach is to first extract features and relationships of interest from a possibly large and complicated feature model, then organize them into a comprehensible view, and finally refine the feature model through modifications on the view. The main characteristics of this approach are twofold: a set of powerful rules (as the slicing criterion) to slice the feature model into a view auto- matically, and a novel use of a bidirectional transformation language to make the view updatable. We have successfully developed a tool, and a nontrivial case study shows the feasi- bility of this approach.展开更多
During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be ba...During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design.展开更多
文摘孤独症谱系障碍是一类以社会交往、沟通困难、行为模式受限或重复为主要表现的心理发育障碍,其病因与脑网络的异常模式有关。非侵入性脑刺激技术可以调节大脑皮质的激活,重塑孤独症谱系障碍患者的脑网络,从而改善行为症状。本文总结了经颅磁刺激(transcranial magnetic stimulation,TMS)和经颅直流电刺激(transcranial direct current stimulation,tDCS)2种非侵入性脑刺激技术对患者行为、认知、言语的影响,评价了非侵入性脑刺激的临床应用前景。
文摘In the research of software reuse, feature models have been widely adopted to capture, organize and reuse the requirements of a set of similar applications in a software do- main. However, the construction, especially the refinement, of feature models is a labor-intensive process, and there lacks an effective way to aid domain engineers in refining feature models. In this paper, we propose a new approach to support interactive refinement of feature models based on the view updating technique. The basic idea of our approach is to first extract features and relationships of interest from a possibly large and complicated feature model, then organize them into a comprehensible view, and finally refine the feature model through modifications on the view. The main characteristics of this approach are twofold: a set of powerful rules (as the slicing criterion) to slice the feature model into a view auto- matically, and a novel use of a bidirectional transformation language to make the view updatable. We have successfully developed a tool, and a nontrivial case study shows the feasi- bility of this approach.
基金This work received no external funding,but the National Institute of Informatics of Japan funded the trip of the first and fourth authors to Tokyo to participate in meetings where the idea of this paper was developed.
文摘During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design.