The general human factors analysis analyzes human functions,effects and influence in a system.But in a narrow sense,it analyzes human influence upon the reliability of a system,it includes traditional human reliabilit...The general human factors analysis analyzes human functions,effects and influence in a system.But in a narrow sense,it analyzes human influence upon the reliability of a system,it includes traditional human reliability analysis,human error analysis,man-machine interface analysis,human character analysis,and others.A software development project in software engineering is successful or not to be completely determined by human factors.In this paper,we discuss the human factors intensions,declare the importance of human factors analysis for software engineering by listed some instances.At last,we probe preliminarily into the mentality that a practitioner in software engineering should possess.展开更多
An intrinsic property of software in a real-world environment is its need to evolve, which is usually accompanied by the increase of software complexity and deterioration of software quality, making software maintenan...An intrinsic property of software in a real-world environment is its need to evolve, which is usually accompanied by the increase of software complexity and deterioration of software quality, making software maintenance a tough problem. Refactoring is regarded as an effective way to address this problem. Many refactoring approaches at the method and class level have been proposed. But the research on software refactoring at the package level is very little. This paper presents a novel approach to refactor the package structures of object oriented software. It uses software networks to represent classes and their dependencies. It proposes a constrained community detection algorithm to obtain the optimized community structures in software networks, which also correspond to the optimized package structures. And it finally provides a list of classes as refactoring candidates by comparing the optimized package structures with the real package structures. The empirical evaluation of the proposed approach has been performed in two open source Java projects, and the benefits of our approach are illustrated in comparison with the other three approaches.展开更多
Based on the fact that the software development cost is an important factorto control the whole project,we discuss the relationship between the software development cost andsoftware reliability according to the empiri...Based on the fact that the software development cost is an important factorto control the whole project,we discuss the relationship between the software development cost andsoftware reliability according to the empirieal data collected from the development process.Byevolutionary modeling we get an empirical model of the relationship between cost and softwarereliability,and validate the estimate results with the empirical data.展开更多
Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common me...Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common methods,such as multiple single-factor experiments,uniform design,and orthogonal experiment design used in other fields.This paper analyzes their merits and improves the orthogonal experiment design method with pairwise testing,and decreases the testing risk caused by incomplete testing with a method of multiple-factors-covering.It presents a simple factor cover method which can cover all the factors and pairwise combinations to the greatest degree.Some comparisons of these methods are made on the aspects of test suite scale,coverage,and usability,etc..展开更多
The meanings of parameters of software reliabi-lity models are investigated in terms of the process of the software testing and in terms of other measurements of software.Based on the investigation,the empirical estim...The meanings of parameters of software reliabi-lity models are investigated in terms of the process of the software testing and in terms of other measurements of software.Based on the investigation,the empirical estimation of the parameters is addressed.On one hand,these empirical estimates are also measurements of the software,which can be used to control and to optimize the process of the software development.On the other hand,by treating these empirical estimates as Bayes priors,software reliability models are extended such that the engineers’experience can be integrated into and hence to improve the models.展开更多
The purpose of this paper is to present a new general approach to solve ground-state energies of the double-electron systems in a uniform magnetic field,in which the basic element of evolution is the set in the soluti...The purpose of this paper is to present a new general approach to solve ground-state energies of the double-electron systems in a uniform magnetic field,in which the basic element of evolution is the set in the solution space,rather than the point.The paper defines the Cell Evolutionary Algorithm,which implements such a view of the evolution mechanism.First,the optimal set in which the optimal solution may be obtained.Then this approach applies the embedded search method to get the optimal solution.We tested this approach on the atomic structure,and the results show that it can improve not only the efficiency but also the accuracy of the calculations as it relates to this specific problem.展开更多
This paper presents a new method to solve the resource-constrained project scheduling problem for software development. In this method,activity duration times are described as fuzzy variables and resource-constrained ...This paper presents a new method to solve the resource-constrained project scheduling problem for software development. In this method,activity duration times are described as fuzzy variables and resource-constrained software project scheduling problems are described as fuzzy programming models. First,how to model the software project scheduling problem under the fuzzy environment conditions is proposed. Second,in order to satisfy the different requirements of decision-making,two novel fuzzy project scheduling models,expected cost model and credibility maximization model,are suggested. Third,a hybrid intelligent algorithm integrated by genetic algorithm and fuzzy simulation is designed to solve the above two fuzzy programming models. Numerical experiments illustrate the effectiveness of the hybrid intelligent algorithm.展开更多
The distributed detection of botnets may induce heavy computation and communication costs to network devices. Each device in related scheme only has a regional view of Internet, so it is hard to detect botnet comprehe...The distributed detection of botnets may induce heavy computation and communication costs to network devices. Each device in related scheme only has a regional view of Internet, so it is hard to detect botnet comprehensively. In this paper, we propose a lightweight real-time botnet detection framework called Bot-Guard, which uses the global landscape and flexible configurability of software defined network (SDN) to identify botnets promptly. SDN, as a new network framework, can make centralized control in botnet detection, but there are still some challenges in such detections. We give a convex lens imaging graph (CLI-graph) to depict the topology characteristics of botnet, which allows SDN controller to locate attacks separately and mitigate the burden of network devices. The theoretical and experimental resuits prove that our scheme is capable of timely botnet detecting in SDNs with the accuracy higher than 90% and the delay less than 56 ms.展开更多
Based on the theories of EA (Evolutionary Algorithm) and EHW (Evolvable Hardware), we devise an EHW based software-hardware co designing platform ECDP, on which we provided standards for hardware system encoding a...Based on the theories of EA (Evolutionary Algorithm) and EHW (Evolvable Hardware), we devise an EHW based software-hardware co designing platform ECDP, on which we provided standards for hardware system encoding and evolving operation designing, as well as circuit emulating tools. The major features of this system are: two layer-encoding of circuit structure, off-line evolving with software cmulation and the evolving of genetic program designing. With this system, we implemented the auto designing of sonic software-hardware systems, like the random number generator.展开更多
Target tracking is very important in computer vision and related areas. It is usually difficult to accurately track fast motion target with appearance variations. Sometimes the tracking algorithms fail for heavy appea...Target tracking is very important in computer vision and related areas. It is usually difficult to accurately track fast motion target with appearance variations. Sometimes the tracking algorithms fail for heavy appearance variations. A multiple template method to track fast motion target with appearance changes is presented under the framework of appearance model with Kalman filter. Firstly, we construct a multiple template appearance model, which includes both the original template and templates affinely transformed from original one. Generally speaking, appearance variations of fast motion target can be covered by affine transformation. Therefore, the affine tr templates match the target of appearance variations better than conventional models. Secondly, we present an improved Kalman filter for approx- imate estimating the motion trail of the target and a modified similarity evaluation function for exact matching. The estimation approach can reduce time complexity of the algorithm and keep accuracy in the meantime. Thirdly, we propose an adaptive scheme for updating template set to alleviate the drift problem. The scheme considers the following differences: the weight differences in two successive frames; different types of affine transformation applied to templates. Finally, experiments demonstrate that the proposed algorithm is robust to appearance varia- tion of fast motion target and achieves real-time performance on middle/low-range computing platform.展开更多
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c...Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.展开更多
Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computi...Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.展开更多
The paper mainly represents how to solve the problem.OMG CORBA,MASIF and FIPA standards are closely analysed here,then are combined to guarantee the interoperability of Mobile Agent System.We present four layer of int...The paper mainly represents how to solve the problem.OMG CORBA,MASIF and FIPA standards are closely analysed here,then are combined to guarantee the interoperability of Mobile Agent System.We present four layer of interoperability in our system and the method to implement it and compare our system to the existing system.展开更多
This paper deals with how to implement AMBA bus transaction level modeling in SystemC.There are two main techniques used in the whole modeling process,which consist of starting the platform modeling at the transaction...This paper deals with how to implement AMBA bus transaction level modeling in SystemC.There are two main techniques used in the whole modeling process,which consist of starting the platform modeling at the transaction level and using the uniformed modeling language—System C.According to the concepts of interface,port and hierarchical channel introduced in SystemC 2.0,the system of master-channel(AMBA bus)slave is created as the architecture of the AMBA bus transaction level model,which can make it more extendable.The port and interface classes of the model that are prone to program are defined in accordance with the SoC hierarchical design methodology.In addition,method calls,not signal communication,are used between different modules in the model,so the higher-level abstraction is achieved and the simulation performance is improved.The AMBA bus transaction level model is analyzed and certified by simulation experiment,and proved to be completely compliant to the AMBA specification 2.0.展开更多
To meet the end-user's dynamically changed requirements for software and achieve the on-demand changes of operational process in time, based on the Goal model and the Process model, the user's personalized ope...To meet the end-user's dynamically changed requirements for software and achieve the on-demand changes of operational process in time, based on the Goal model and the Process model, the user's personalized operations of the related work were simplified and integrated, and rules for the cooperation between Goal and Process which fit for software engineers were proposed and formalized. The user's personalized operations of the related work were analyzed to conclude the pattern of Goal modification. By the direct drive of Goal modification, the corresponding changes of Process were induced and specified. Then rules for the cooperation between Goal and Process were concluded and the formalization was achieved in Semantic Web Rule Language (SWRL). In this paper, reasoning support was provided for the model modification based on ontology and the dynamic evolution of Process model.展开更多
In this paper,we employ genetic algorithms to solve the migration problem(MP).We propose a new encoding scheme to represent trees,which is composed of two parts:the pre-ordered traversal sequence of tree vertices and ...In this paper,we employ genetic algorithms to solve the migration problem(MP).We propose a new encoding scheme to represent trees,which is composed of two parts:the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices.The proposed encoding scheme has the advantages of simplicity for encoding and decoding,ease for GA operations,and better equilibrium between exploration and exploitation.It is also adaptive in that,with few restrictions on the length of code,it can be freely lengthened or shortened according to the characteristics of the problem space.Furthermore,the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node.The simulation results demonstrate the higher performance of our algorithm,with fast convergence to the optima or sub-optima on various problem sizes.Comparing with the binary string encoding of vertices,when the problem size is large,our algorithm runs remarkably faster with comparable search capability.展开更多
The global growth of the Internet and the rapid expansion of social networks such as Facebook make multilingual sentiment analysis of social media content very necessary. This paper performs the first sentiment analys...The global growth of the Internet and the rapid expansion of social networks such as Facebook make multilingual sentiment analysis of social media content very necessary. This paper performs the first sentiment analysis on code-mixed Bambara-French Facebook comments. We develop four Long Short-term Memory(LSTM)-based models and two Convolutional Neural Network(CNN)-based models, and use these six models, Na?ve Bayes, and Support Vector Machines(SVM) to conduct experiments on a constituted dataset. Social media text written in Bambara is scarce. To mitigate this weakness, this paper uses dictionaries of character and word indexes to produce character and word embedding in place of pre-trained word vectors. We investigate the effect of comment length on the models and perform a comparison among them. The best performing model is a one-layer CNN deep learning model with an accuracy of 83.23 %.展开更多
Nowadays, existing WebGIS applications are isolated from each other. It is meaningful and challenging to integrate these existing applications to reduce resource loss. In this paper, the concept of WebGIS integration ...Nowadays, existing WebGIS applications are isolated from each other. It is meaningful and challenging to integrate these existing applications to reduce resource loss. In this paper, the concept of WebGIS integration service is presented and its classification including width integration and depth integration is brought out. According to width integration and depth integration, a general standard of WebGIS integration is proposed. The merits of WebGIS integration service are analyzed with the representative examples from both of the two classes mentioned above.展开更多
Subsequently to the problem of performance and energy overhead, the reliability problem of the system caused by soft error has become a growing concern. Since register file(RF) is the hottest component in processor,...Subsequently to the problem of performance and energy overhead, the reliability problem of the system caused by soft error has become a growing concern. Since register file(RF) is the hottest component in processor, if not well protected, soft errors occurring in it will do harm to the system reliability greatly. In order to reduce soft error occurrence rate of register file, this paper presents a method to reallocate the register based on the fact that different live variables have different contribution to the register file vulnerability(RFV). Our experimental results on benchmarks from MiBench suite indicate that our method can significantly enhance the reliability.展开更多
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat...Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system.展开更多
基金Supported by the National Natural Science Foun-dation of China(60173013)
文摘The general human factors analysis analyzes human functions,effects and influence in a system.But in a narrow sense,it analyzes human influence upon the reliability of a system,it includes traditional human reliability analysis,human error analysis,man-machine interface analysis,human character analysis,and others.A software development project in software engineering is successful or not to be completely determined by human factors.In this paper,we discuss the human factors intensions,declare the importance of human factors analysis for software engineering by listed some instances.At last,we probe preliminarily into the mentality that a practitioner in software engineering should possess.
基金supported by National Natural Science Foundation of China(No. 61202048)Zhejiang Provincial Nature Science Foundation of China(No. LQ12F02011)Open Foundation of State Key Laboratory of Software Engineering of Wuhan University of China(No. SKLSE-2012-09-21)
文摘An intrinsic property of software in a real-world environment is its need to evolve, which is usually accompanied by the increase of software complexity and deterioration of software quality, making software maintenance a tough problem. Refactoring is regarded as an effective way to address this problem. Many refactoring approaches at the method and class level have been proposed. But the research on software refactoring at the package level is very little. This paper presents a novel approach to refactor the package structures of object oriented software. It uses software networks to represent classes and their dependencies. It proposes a constrained community detection algorithm to obtain the optimized community structures in software networks, which also correspond to the optimized package structures. And it finally provides a list of classes as refactoring candidates by comparing the optimized package structures with the real package structures. The empirical evaluation of the proposed approach has been performed in two open source Java projects, and the benefits of our approach are illustrated in comparison with the other three approaches.
基金Supported by the National Natural Science Foun dation of China(60173063)
文摘Based on the fact that the software development cost is an important factorto control the whole project,we discuss the relationship between the software development cost andsoftware reliability according to the empirieal data collected from the development process.Byevolutionary modeling we get an empirical model of the relationship between cost and softwarereliability,and validate the estimate results with the empirical data.
基金The Natronal Natural Science Foundation of China(No.60373066)Opening Foundation of State Key Laboratory of Software Engineering in Wuhan UniversityOpening Foundation ofJiangsu Key Laboratory of Computer Information ProcessingTechnology in Soochow University.
文摘Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common methods,such as multiple single-factor experiments,uniform design,and orthogonal experiment design used in other fields.This paper analyzes their merits and improves the orthogonal experiment design method with pairwise testing,and decreases the testing risk caused by incomplete testing with a method of multiple-factors-covering.It presents a simple factor cover method which can cover all the factors and pairwise combinations to the greatest degree.Some comparisons of these methods are made on the aspects of test suite scale,coverage,and usability,etc..
基金Supported by the National Natural Science Foun-dation of China(60173063)
文摘The meanings of parameters of software reliabi-lity models are investigated in terms of the process of the software testing and in terms of other measurements of software.Based on the investigation,the empirical estimation of the parameters is addressed.On one hand,these empirical estimates are also measurements of the software,which can be used to control and to optimize the process of the software development.On the other hand,by treating these empirical estimates as Bayes priors,software reliability models are extended such that the engineers’experience can be integrated into and hence to improve the models.
基金Supported by the opening Foundation of state key Laborstory of Magnetic ResonanceAtomic and Molecularphysics,Wuhan Institute of physica,Chinese Acsdemy of Sciences(981510)
文摘The purpose of this paper is to present a new general approach to solve ground-state energies of the double-electron systems in a uniform magnetic field,in which the basic element of evolution is the set in the solution space,rather than the point.The paper defines the Cell Evolutionary Algorithm,which implements such a view of the evolution mechanism.First,the optimal set in which the optimal solution may be obtained.Then this approach applies the embedded search method to get the optimal solution.We tested this approach on the atomic structure,and the results show that it can improve not only the efficiency but also the accuracy of the calculations as it relates to this specific problem.
基金Supported by the National Natural Science Foundation of China (60975050)the Specialized Research Fund for the Doctoral Program of Higher Education of China (20070486081)
文摘This paper presents a new method to solve the resource-constrained project scheduling problem for software development. In this method,activity duration times are described as fuzzy variables and resource-constrained software project scheduling problems are described as fuzzy programming models. First,how to model the software project scheduling problem under the fuzzy environment conditions is proposed. Second,in order to satisfy the different requirements of decision-making,two novel fuzzy project scheduling models,expected cost model and credibility maximization model,are suggested. Third,a hybrid intelligent algorithm integrated by genetic algorithm and fuzzy simulation is designed to solve the above two fuzzy programming models. Numerical experiments illustrate the effectiveness of the hybrid intelligent algorithm.
基金Supported by the National Natural Science Foundation of China(61272451,61572380)
文摘The distributed detection of botnets may induce heavy computation and communication costs to network devices. Each device in related scheme only has a regional view of Internet, so it is hard to detect botnet comprehensively. In this paper, we propose a lightweight real-time botnet detection framework called Bot-Guard, which uses the global landscape and flexible configurability of software defined network (SDN) to identify botnets promptly. SDN, as a new network framework, can make centralized control in botnet detection, but there are still some challenges in such detections. We give a convex lens imaging graph (CLI-graph) to depict the topology characteristics of botnet, which allows SDN controller to locate attacks separately and mitigate the burden of network devices. The theoretical and experimental resuits prove that our scheme is capable of timely botnet detecting in SDNs with the accuracy higher than 90% and the delay less than 56 ms.
基金Supported by the National 863 Project(2002AA1Z1490)
文摘Based on the theories of EA (Evolutionary Algorithm) and EHW (Evolvable Hardware), we devise an EHW based software-hardware co designing platform ECDP, on which we provided standards for hardware system encoding and evolving operation designing, as well as circuit emulating tools. The major features of this system are: two layer-encoding of circuit structure, off-line evolving with software cmulation and the evolving of genetic program designing. With this system, we implemented the auto designing of sonic software-hardware systems, like the random number generator.
基金Supported by the National Science Foundation of China(61472289)Hubei Province Science Foundation(2015CFB254)
文摘Target tracking is very important in computer vision and related areas. It is usually difficult to accurately track fast motion target with appearance variations. Sometimes the tracking algorithms fail for heavy appearance variations. A multiple template method to track fast motion target with appearance changes is presented under the framework of appearance model with Kalman filter. Firstly, we construct a multiple template appearance model, which includes both the original template and templates affinely transformed from original one. Generally speaking, appearance variations of fast motion target can be covered by affine transformation. Therefore, the affine tr templates match the target of appearance variations better than conventional models. Secondly, we present an improved Kalman filter for approx- imate estimating the motion trail of the target and a modified similarity evaluation function for exact matching. The estimation approach can reduce time complexity of the algorithm and keep accuracy in the meantime. Thirdly, we propose an adaptive scheme for updating template set to alleviate the drift problem. The scheme considers the following differences: the weight differences in two successive frames; different types of affine transformation applied to templates. Finally, experiments demonstrate that the proposed algorithm is robust to appearance varia- tion of fast motion target and achieves real-time performance on middle/low-range computing platform.
基金supported by National Basic Research Program of China (973 Program) (No. 2007CB310801)National Natural Science Foundation of China (No. 60873083, No. 60803025, No. 60970017, No. 60903034, No. 60873225)+3 种基金Natural Science Foundation of Hubei Province for Distinguished Young Scholars (No. 2008CDB351)Natural Science Foundation of Hubei Province (No. 2008ABA358, No. 2008ABA379)Research Fund for the Doctoral Program of Higher Education of China (No. 20070486065)Open Foundation of State Key Laboratory of Software Engineering (No. SKLSE20080718)
文摘Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.
基金Supported by the National Natural Science Foun-dation of China (90104005 ,60373087 ,60473023) Network andInformation Security Key Laboratory Programof Ministry of Educa-tion of China
文摘Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.
基金Supported by the Key Saence and Techndology projet of Wuhan City(20011007087)
文摘The paper mainly represents how to solve the problem.OMG CORBA,MASIF and FIPA standards are closely analysed here,then are combined to guarantee the interoperability of Mobile Agent System.We present four layer of interoperability in our system and the method to implement it and compare our system to the existing system.
基金Supported by the National High Teehnology Development 863 Program of China(2002AAlZ1490)
文摘This paper deals with how to implement AMBA bus transaction level modeling in SystemC.There are two main techniques used in the whole modeling process,which consist of starting the platform modeling at the transaction level and using the uniformed modeling language—System C.According to the concepts of interface,port and hierarchical channel introduced in SystemC 2.0,the system of master-channel(AMBA bus)slave is created as the architecture of the AMBA bus transaction level model,which can make it more extendable.The port and interface classes of the model that are prone to program are defined in accordance with the SoC hierarchical design methodology.In addition,method calls,not signal communication,are used between different modules in the model,so the higher-level abstraction is achieved and the simulation performance is improved.The AMBA bus transaction level model is analyzed and certified by simulation experiment,and proved to be completely compliant to the AMBA specification 2.0.
基金National Key Basic Research Program of China (973 program) (No. 2007CB310801)Fundamental Research Fund for the Central Universities,China (No. 201121102020004)
文摘To meet the end-user's dynamically changed requirements for software and achieve the on-demand changes of operational process in time, based on the Goal model and the Process model, the user's personalized operations of the related work were simplified and integrated, and rules for the cooperation between Goal and Process which fit for software engineers were proposed and formalized. The user's personalized operations of the related work were analyzed to conclude the pattern of Goal modification. By the direct drive of Goal modification, the corresponding changes of Process were induced and specified. Then rules for the cooperation between Goal and Process were concluded and the formalization was achieved in Semantic Web Rule Language (SWRL). In this paper, reasoning support was provided for the model modification based on ontology and the dynamic evolution of Process model.
基金Supported by the National Natural Science Foundation of China(90104005)the Natural science Foundation of Hubei Province and the Hong Kong Poly-technic University under the grant G-YD63
文摘In this paper,we employ genetic algorithms to solve the migration problem(MP).We propose a new encoding scheme to represent trees,which is composed of two parts:the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices.The proposed encoding scheme has the advantages of simplicity for encoding and decoding,ease for GA operations,and better equilibrium between exploration and exploitation.It is also adaptive in that,with few restrictions on the length of code,it can be freely lengthened or shortened according to the characteristics of the problem space.Furthermore,the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node.The simulation results demonstrate the higher performance of our algorithm,with fast convergence to the optima or sub-optima on various problem sizes.Comparing with the binary string encoding of vertices,when the problem size is large,our algorithm runs remarkably faster with comparable search capability.
基金Supported by the National Natural Science Foundation of China(61272451,61572380,61772383 and 61702379)the Major State Basic Research Development Program of China(2014CB340600)
文摘The global growth of the Internet and the rapid expansion of social networks such as Facebook make multilingual sentiment analysis of social media content very necessary. This paper performs the first sentiment analysis on code-mixed Bambara-French Facebook comments. We develop four Long Short-term Memory(LSTM)-based models and two Convolutional Neural Network(CNN)-based models, and use these six models, Na?ve Bayes, and Support Vector Machines(SVM) to conduct experiments on a constituted dataset. Social media text written in Bambara is scarce. To mitigate this weakness, this paper uses dictionaries of character and word indexes to produce character and word embedding in place of pre-trained word vectors. We investigate the effect of comment length on the models and perform a comparison among them. The best performing model is a one-layer CNN deep learning model with an accuracy of 83.23 %.
基金Supported by the National Natural Science Foundation of China (60773007)
文摘Nowadays, existing WebGIS applications are isolated from each other. It is meaningful and challenging to integrate these existing applications to reduce resource loss. In this paper, the concept of WebGIS integration service is presented and its classification including width integration and depth integration is brought out. According to width integration and depth integration, a general standard of WebGIS integration is proposed. The merits of WebGIS integration service are analyzed with the representative examples from both of the two classes mentioned above.
基金Supported by the National Natural Science Foundation of China(61272110)
文摘Subsequently to the problem of performance and energy overhead, the reliability problem of the system caused by soft error has become a growing concern. Since register file(RF) is the hottest component in processor, if not well protected, soft errors occurring in it will do harm to the system reliability greatly. In order to reduce soft error occurrence rate of register file, this paper presents a method to reallocate the register based on the fact that different live variables have different contribution to the register file vulnerability(RFV). Our experimental results on benchmarks from MiBench suite indicate that our method can significantly enhance the reliability.
基金Supported by the National Natural Science Foundation of China(61170026)
文摘Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system.