期刊文献+
共找到108篇文章
< 1 2 6 >
每页显示 20 50 100
Human Factors Analysis in Software Engineering 被引量:1
1
作者 Xu Ren-zuo Ma Ruo-feng +1 位作者 Liu Li-na Xiong Zhong-wei 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第1期18-22,共5页
The general human factors analysis analyzes human functions,effects and influence in a system.But in a narrow sense,it analyzes human influence upon the reliability of a system,it includes traditional human reliabilit... The general human factors analysis analyzes human functions,effects and influence in a system.But in a narrow sense,it analyzes human influence upon the reliability of a system,it includes traditional human reliability analysis,human error analysis,man-machine interface analysis,human character analysis,and others.A software development project in software engineering is successful or not to be completely determined by human factors.In this paper,we discuss the human factors intensions,declare the importance of human factors analysis for software engineering by listed some instances.At last,we probe preliminarily into the mentality that a practitioner in software engineering should possess. 展开更多
关键词 human factors analysis software engineering software reliability
在线阅读 下载PDF
Refactoring Software Packages via Community Detection in Complex Software Networks 被引量:4
2
作者 Wei-Feng Pan Bo Jiang Bing Li 《International Journal of Automation and computing》 EI CSCD 2013年第2期157-166,共10页
An intrinsic property of software in a real-world environment is its need to evolve, which is usually accompanied by the increase of software complexity and deterioration of software quality, making software maintenan... An intrinsic property of software in a real-world environment is its need to evolve, which is usually accompanied by the increase of software complexity and deterioration of software quality, making software maintenance a tough problem. Refactoring is regarded as an effective way to address this problem. Many refactoring approaches at the method and class level have been proposed. But the research on software refactoring at the package level is very little. This paper presents a novel approach to refactor the package structures of object oriented software. It uses software networks to represent classes and their dependencies. It proposes a constrained community detection algorithm to obtain the optimized community structures in software networks, which also correspond to the optimized package structures. And it finally provides a list of classes as refactoring candidates by comparing the optimized package structures with the real package structures. The empirical evaluation of the proposed approach has been performed in two open source Java projects, and the benefits of our approach are illustrated in comparison with the other three approaches. 展开更多
关键词 REFACTORING community detection complex networks PACKAGE SOFTWARE
原文传递
Investigation on Relationship between Cost and Software Reliability 被引量:3
3
作者 XU Ren-ZUO HAN Yi-fan +1 位作者 HUANG Can YAO Jun-feng 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期9-12,共4页
Based on the fact that the software development cost is an important factorto control the whole project,we discuss the relationship between the software development cost andsoftware reliability according to the empiri... Based on the fact that the software development cost is an important factorto control the whole project,we discuss the relationship between the software development cost andsoftware reliability according to the empirieal data collected from the development process.Byevolutionary modeling we get an empirical model of the relationship between cost and softwarereliability,and validate the estimate results with the empirical data. 展开更多
关键词 cost controlling softwaie reliability:software development cost empiricaldata evolutionary modeling
在线阅读 下载PDF
Generating test cases for software configuration testing 被引量:2
4
作者 Nie Changhai Xu Baowen 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期26-30,共5页
Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common me... Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common methods,such as multiple single-factor experiments,uniform design,and orthogonal experiment design used in other fields.This paper analyzes their merits and improves the orthogonal experiment design method with pairwise testing,and decreases the testing risk caused by incomplete testing with a method of multiple-factors-covering.It presents a simple factor cover method which can cover all the factors and pairwise combinations to the greatest degree.Some comparisons of these methods are made on the aspects of test suite scale,coverage,and usability,etc.. 展开更多
关键词 software testing configuration testing test case combination cover
在线阅读 下载PDF
Empirical Measurement of the Software Testing and Reliability 被引量:1
5
作者 Zou Feng-zhong Xu Ren-zuo 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第1期23-26,共4页
The meanings of parameters of software reliabi-lity models are investigated in terms of the process of the software testing and in terms of other measurements of software.Based on the investigation,the empirical estim... The meanings of parameters of software reliabi-lity models are investigated in terms of the process of the software testing and in terms of other measurements of software.Based on the investigation,the empirical estimation of the parameters is addressed.On one hand,these empirical estimates are also measurements of the software,which can be used to control and to optimize the process of the software development.On the other hand,by treating these empirical estimates as Bayes priors,software reliability models are extended such that the engineers’experience can be integrated into and hence to improve the models. 展开更多
关键词 software reliability MODELS software testing prior Bayesian analysis
在线阅读 下载PDF
Cell Evolutionary Algorithm:a New Optimization Method on Ground-State Energy of the Atomic
6
作者 Liu Lian-jun Xu Jing-wen Li Yuan-xiang 《Wuhan University Journal of Natural Sciences》 EI CAS 2000年第4期425-430,共6页
The purpose of this paper is to present a new general approach to solve ground-state energies of the double-electron systems in a uniform magnetic field,in which the basic element of evolution is the set in the soluti... The purpose of this paper is to present a new general approach to solve ground-state energies of the double-electron systems in a uniform magnetic field,in which the basic element of evolution is the set in the solution space,rather than the point.The paper defines the Cell Evolutionary Algorithm,which implements such a view of the evolution mechanism.First,the optimal set in which the optimal solution may be obtained.Then this approach applies the embedded search method to get the optimal solution.We tested this approach on the atomic structure,and the results show that it can improve not only the efficiency but also the accuracy of the calculations as it relates to this specific problem. 展开更多
关键词 DOUBLE electron systems GROUND state energy variational principle cell evolutionary algorithm evolutionary algorithm
在线阅读 下载PDF
Fuzzy Resource-Constrained Project Scheduling Problem for Software Development
7
作者 WANG Xianggang HUANG Wei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第1期25-30,共6页
This paper presents a new method to solve the resource-constrained project scheduling problem for software development. In this method,activity duration times are described as fuzzy variables and resource-constrained ... This paper presents a new method to solve the resource-constrained project scheduling problem for software development. In this method,activity duration times are described as fuzzy variables and resource-constrained software project scheduling problems are described as fuzzy programming models. First,how to model the software project scheduling problem under the fuzzy environment conditions is proposed. Second,in order to satisfy the different requirements of decision-making,two novel fuzzy project scheduling models,expected cost model and credibility maximization model,are suggested. Third,a hybrid intelligent algorithm integrated by genetic algorithm and fuzzy simulation is designed to solve the above two fuzzy programming models. Numerical experiments illustrate the effectiveness of the hybrid intelligent algorithm. 展开更多
关键词 project scheduling problem fuzzy simulation genetic algorithm hybrid intelligent algorithm
原文传递
BotGuard: Lightweight Real-Time Botnet Detection in Software Defined Networks
8
作者 CHEN Jing CHENG Xi +2 位作者 DU Ruiying HU Li WANG Chiheng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期103-113,共11页
The distributed detection of botnets may induce heavy computation and communication costs to network devices. Each device in related scheme only has a regional view of Internet, so it is hard to detect botnet comprehe... The distributed detection of botnets may induce heavy computation and communication costs to network devices. Each device in related scheme only has a regional view of Internet, so it is hard to detect botnet comprehensively. In this paper, we propose a lightweight real-time botnet detection framework called Bot-Guard, which uses the global landscape and flexible configurability of software defined network (SDN) to identify botnets promptly. SDN, as a new network framework, can make centralized control in botnet detection, but there are still some challenges in such detections. We give a convex lens imaging graph (CLI-graph) to depict the topology characteristics of botnet, which allows SDN controller to locate attacks separately and mitigate the burden of network devices. The theoretical and experimental resuits prove that our scheme is capable of timely botnet detecting in SDNs with the accuracy higher than 90% and the delay less than 56 ms. 展开更多
关键词 botnet detection software defined network graph theory
原文传递
Evolvable Hardware Based Software-Hardware Co-Designing Platform ECDP
9
作者 TU Hang WU Tao-jun LI Yuan-xiang 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第6期977-982,共6页
Based on the theories of EA (Evolutionary Algorithm) and EHW (Evolvable Hardware), we devise an EHW based software-hardware co designing platform ECDP, on which we provided standards for hardware system encoding a... Based on the theories of EA (Evolutionary Algorithm) and EHW (Evolvable Hardware), we devise an EHW based software-hardware co designing platform ECDP, on which we provided standards for hardware system encoding and evolving operation designing, as well as circuit emulating tools. The major features of this system are: two layer-encoding of circuit structure, off-line evolving with software cmulation and the evolving of genetic program designing. With this system, we implemented the auto designing of sonic software-hardware systems, like the random number generator. 展开更多
关键词 EHW(Evolvable Hardware) EA(Evolutionary Algorithm) ECDP
在线阅读 下载PDF
A multiple template approach for robust tracking of fast motion target 被引量:6
10
作者 SUN Jun HE Fa-zhi +1 位作者 CHEN Yi-lin CHEN Xiao 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2016年第2期177-197,共21页
Target tracking is very important in computer vision and related areas. It is usually difficult to accurately track fast motion target with appearance variations. Sometimes the tracking algorithms fail for heavy appea... Target tracking is very important in computer vision and related areas. It is usually difficult to accurately track fast motion target with appearance variations. Sometimes the tracking algorithms fail for heavy appearance variations. A multiple template method to track fast motion target with appearance changes is presented under the framework of appearance model with Kalman filter. Firstly, we construct a multiple template appearance model, which includes both the original template and templates affinely transformed from original one. Generally speaking, appearance variations of fast motion target can be covered by affine transformation. Therefore, the affine tr templates match the target of appearance variations better than conventional models. Secondly, we present an improved Kalman filter for approx- imate estimating the motion trail of the target and a modified similarity evaluation function for exact matching. The estimation approach can reduce time complexity of the algorithm and keep accuracy in the meantime. Thirdly, we propose an adaptive scheme for updating template set to alleviate the drift problem. The scheme considers the following differences: the weight differences in two successive frames; different types of affine transformation applied to templates. Finally, experiments demonstrate that the proposed algorithm is robust to appearance varia- tion of fast motion target and achieves real-time performance on middle/low-range computing platform. 展开更多
关键词 Target tracking Fast motion target Multiple template match Kalman filter forecast.
在线阅读 下载PDF
Trustworthy Assurance of Service Interoperation in Cloud Environment 被引量:6
11
作者 Bing Li Bu-Qing Cao +1 位作者 Kun-Mei Wen Rui-Xuan Li 《International Journal of Automation and computing》 EI 2011年第3期297-308,共12页
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c... Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation. 展开更多
关键词 Quality of service (QoS) TRUST service discovery service interoperation service invocation success-rate cloud computing.
在线阅读 下载PDF
Development of Trusted Computing Research 被引量:5
12
作者 ZHANG Huanguo LUO Jie +3 位作者 JIN Gang ZHU Zhiqiang YU Fajiang YAN Fei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1407-1413,共7页
Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computi... Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing. 展开更多
关键词 COMPUTER trusted computing secure computer information security
在线阅读 下载PDF
Study of Interoperability in Mobile Agent Environment 被引量:1
13
作者 PENG De-wei HE Yan-xiang 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期623-628,共6页
The paper mainly represents how to solve the problem.OMG CORBA,MASIF and FIPA standards are closely analysed here,then are combined to guarantee the interoperability of Mobile Agent System.We present four layer of int... The paper mainly represents how to solve the problem.OMG CORBA,MASIF and FIPA standards are closely analysed here,then are combined to guarantee the interoperability of Mobile Agent System.We present four layer of interoperability in our system and the method to implement it and compare our system to the existing system. 展开更多
关键词 mobile agent INTEROPERABILITY CORBA MASIF FIPA
在线阅读 下载PDF
Implementation of Transaction Level AMBA Bus Models Using SystemC 被引量:1
14
作者 He Zhen Cao Yang +1 位作者 Zhang Jun-xin Ma Qin-sheng 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第2期198-202,共5页
This paper deals with how to implement AMBA bus transaction level modeling in SystemC.There are two main techniques used in the whole modeling process,which consist of starting the platform modeling at the transaction... This paper deals with how to implement AMBA bus transaction level modeling in SystemC.There are two main techniques used in the whole modeling process,which consist of starting the platform modeling at the transaction level and using the uniformed modeling language—System C.According to the concepts of interface,port and hierarchical channel introduced in SystemC 2.0,the system of master-channel(AMBA bus)slave is created as the architecture of the AMBA bus transaction level model,which can make it more extendable.The port and interface classes of the model that are prone to program are defined in accordance with the SoC hierarchical design methodology.In addition,method calls,not signal communication,are used between different modules in the model,so the higher-level abstraction is achieved and the simulation performance is improved.The AMBA bus transaction level model is analyzed and certified by simulation experiment,and proved to be completely compliant to the AMBA specification 2.0. 展开更多
关键词 AMBA transaction level SYSTEMC SOC
在线阅读 下载PDF
Formalization of Rules for the Cooperation between Goal and Process 被引量:1
15
作者 李昭 李征 +3 位作者 李宏涛 梁鹏 何克清 刘书宇 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期32-36,共5页
To meet the end-user's dynamically changed requirements for software and achieve the on-demand changes of operational process in time, based on the Goal model and the Process model, the user's personalized ope... To meet the end-user's dynamically changed requirements for software and achieve the on-demand changes of operational process in time, based on the Goal model and the Process model, the user's personalized operations of the related work were simplified and integrated, and rules for the cooperation between Goal and Process which fit for software engineers were proposed and formalized. The user's personalized operations of the related work were analyzed to conclude the pattern of Goal modification. By the direct drive of Goal modification, the corresponding changes of Process were induced and specified. Then rules for the cooperation between Goal and Process were concluded and the formalization was achieved in Semantic Web Rule Language (SWRL). In this paper, reasoning support was provided for the model modification based on ontology and the dynamic evolution of Process model. 展开更多
关键词 personalized reguirements on-demand services Goal and Process rules for the cooperation FORMALIZATION
在线阅读 下载PDF
Optimization in the Migration Problem of Mobile Agents in Distributed Information Retrieval Systems 被引量:1
16
作者 He Yan-xiang Chen Yi-feng +1 位作者 He Jing Cao Jian-nong 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第2期153-160,共8页
In this paper,we employ genetic algorithms to solve the migration problem(MP).We propose a new encoding scheme to represent trees,which is composed of two parts:the pre-ordered traversal sequence of tree vertices and ... In this paper,we employ genetic algorithms to solve the migration problem(MP).We propose a new encoding scheme to represent trees,which is composed of two parts:the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices.The proposed encoding scheme has the advantages of simplicity for encoding and decoding,ease for GA operations,and better equilibrium between exploration and exploitation.It is also adaptive in that,with few restrictions on the length of code,it can be freely lengthened or shortened according to the characteristics of the problem space.Furthermore,the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node.The simulation results demonstrate the higher performance of our algorithm,with fast convergence to the optima or sub-optima on various problem sizes.Comparing with the binary string encoding of vertices,when the problem size is large,our algorithm runs remarkably faster with comparable search capability. 展开更多
关键词 distributed information retrieval mobile agents migration problem genetic algorithms
在线阅读 下载PDF
Sentiment Analysis of Code-Mixed Bambara-French Social Media Text Using Deep Learning Techniques 被引量:3
17
作者 Arouna KONATE DU Ruiying 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第3期237-243,共7页
The global growth of the Internet and the rapid expansion of social networks such as Facebook make multilingual sentiment analysis of social media content very necessary. This paper performs the first sentiment analys... The global growth of the Internet and the rapid expansion of social networks such as Facebook make multilingual sentiment analysis of social media content very necessary. This paper performs the first sentiment analysis on code-mixed Bambara-French Facebook comments. We develop four Long Short-term Memory(LSTM)-based models and two Convolutional Neural Network(CNN)-based models, and use these six models, Na?ve Bayes, and Support Vector Machines(SVM) to conduct experiments on a constituted dataset. Social media text written in Bambara is scarce. To mitigate this weakness, this paper uses dictionaries of character and word indexes to produce character and word embedding in place of pre-trained word vectors. We investigate the effect of comment length on the models and perform a comparison among them. The best performing model is a one-layer CNN deep learning model with an accuracy of 83.23 %. 展开更多
关键词 sentiment analysis code-mixed Bambara-French Facebook comments deep learning Long Short-Term Memory(LSTM) Convolutional Neural Network(CNN)
原文传递
A General Standard of WebGIS Integration 被引量:1
18
作者 LI Shijun HONG Hui +2 位作者 LIU Pei YU Wei ZHANG Zhuo 《Wuhan University Journal of Natural Sciences》 CAS 2009年第2期125-128,共4页
Nowadays, existing WebGIS applications are isolated from each other. It is meaningful and challenging to integrate these existing applications to reduce resource loss. In this paper, the concept of WebGIS integration ... Nowadays, existing WebGIS applications are isolated from each other. It is meaningful and challenging to integrate these existing applications to reduce resource loss. In this paper, the concept of WebGIS integration service is presented and its classification including width integration and depth integration is brought out. According to width integration and depth integration, a general standard of WebGIS integration is proposed. The merits of WebGIS integration service are analyzed with the representative examples from both of the two classes mentioned above. 展开更多
关键词 WEBGIS integration service data integration
原文传递
Register Reallocation for Soft Error Reduction 被引量:1
19
作者 WEN Peng YAN Guochang +1 位作者 LI Xuhui YING Shi 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期519-525,共7页
Subsequently to the problem of performance and energy overhead, the reliability problem of the system caused by soft error has become a growing concern. Since register file(RF) is the hottest component in processor,... Subsequently to the problem of performance and energy overhead, the reliability problem of the system caused by soft error has become a growing concern. Since register file(RF) is the hottest component in processor, if not well protected, soft errors occurring in it will do harm to the system reliability greatly. In order to reduce soft error occurrence rate of register file, this paper presents a method to reallocate the register based on the fact that different live variables have different contribution to the register file vulnerability(RFV). Our experimental results on benchmarks from MiBench suite indicate that our method can significantly enhance the reliability. 展开更多
关键词 register allocation soft error reliability
原文传递
Hidden Process Offline Forensic Based on Memory Analysis in Windows 被引量:1
20
作者 CUI Jingsong ZHANG Heng +2 位作者 QI Jing PENG Rong ZHANG Manli 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期346-354,共9页
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat... Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system. 展开更多
关键词 virtual machine introspection hidden process detection process linked list memory forensics
原文传递
上一页 1 2 6 下一页 到第
使用帮助 返回顶部