首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Model checking is an automatic technique used for the verification of finite systems. A model checker explores the full state space of a given model and checks it against a set of requirements. If a state exists in which a requirement is not satisfied most tools will generate a counter-example. Counter-examples are useful for debugging a model and determining if an error exists in the modelled system. However, they can be difficult for end users to understand and this may limit the take-up of model checking in industry.This paper describes a domain-specific approach to automatically interpreting counter-examples and presenting the results in an intuitive form to the end user. Our research extends previous work on model checking railway signalling control tables with signalling engineers from Queensland Rail.  相似文献   

2.
3.
A technology for developing software for reactive systems is proposed that supports the stages of the subject domain investigation, analysis, design, implementation, debugging, certification, and documenting. The technology is based on the automaton approach.  相似文献   

4.
5.
6.
7.
文本自动分类中特征权重算法的改进研究   总被引:25,自引:3,他引:25  
文章研究并改进了文本自动分类中的特征权重算法。传统的特征权重算法着重于考虑频率和反文档频率等因素,而未考虑特征的类间、类内分布与低频高权信息。该文重点研究了特征的类间、类内分布,以及低频高权特征对分类的影响,并在此基础上提出了低频高权特征集的构造方法及特征权重的新算法,同时将该算法推广到多层次分类体系。实验证明该算法能有效提高分类的精确度,而且在多级分类中也能取得很好的效果。  相似文献   

8.
We propose a Controller-Agent model that would greatly minimize distributed denial-of-service (DDoS) attacks on the Internet. We introduce a new packet marking technique and agent design that enables us to identify the approximate source of attack (nearest router) with a single packet even in the case of attacks with spoofed source addresses. Our model is invoked only during attack times, and is able to process the victims traffic separately without disturbing other traffic, it is also able to establish different attack signatures for different attacking sources and can prevent the attack traffic at the nearest router to the attacking system. It is simple in its implementation, it has fast response for any changes in attack traffic pattern, and can be incrementally deployed. Hence we believe that the model proposed in this paper seems to be a promising approach to prevent distributed denial-of-service attacks.  相似文献   

9.
Advancements in the fields of genomic screening, molecular pathology and clinical research have resulted in a major increase in the demand for high quality DNA and RNA. This escalating demand has resulted in a sample preparation bottleneck and an emphasis on the development of new technologies to automate the purification process. Gentra has developed the AUTOPURE LS™ nucleic acid purification instrument, a platform capable of high-throughput sample purification from large samples, such as 10 mL whole blood. This article presents data showing the equivalency of DNA purified using manual and automated processing.  相似文献   

10.
基于语义Web服务的供应链自动采购技术   总被引:1,自引:0,他引:1  
将语义Web服务技术应用到企业间业务的自动集成中,设计实现了自动采购原型系统.通过使用服务发现、匹配以及自动调用技术来实现企业间订单的交互、选择以及自动生成.基于汽车制造业供应链背景,给出了原型系统及关键组件的设计和实现细节.  相似文献   

11.
Mobile devices such as personal digital assistants (PDAs) and mobile phones are in widespread use already today and converging to mobile smart phones. They enable users to access a wide range of services and information without guidance through their actual demands. Especially during mass events like the Olympic Games 2008 in Beijing—which was initially the context of our work—a large service space is expected to support all mobile visitors, being athletes, journalists, or spectators. Current approaches tackling such problems are location based, meaning that a user's location is central to service provision, and even context-aware, meaning that, beyond location, characteristics of a user's environment are taken into account. Such information obviously helps to deliver relevant information at the right time to the mobile users. Going one step further, a situation-aware system abstracts from the context dimensions by translating specific contexts into logical situations. Knowing the situation end users are in allows the system to better identify the information to be delivered to them and to choose the appropriate services with regard to their scope, which is referred to as service roaming. Even though many context frameworks have been introduced in the past few years, what is usually missing is the notion of characteristic features of contexts that are invariant during certain time intervals. This paper presents these concepts in the context of a platform development, namely FLAME2008, which is able to support its mobile users with personalized situation-aware services in push and pull mode.  相似文献   

12.
An Automated Signature-Based Approach against Polymorphic Internet Worms   总被引:2,自引:0,他引:2  
Capable of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. However, the defense against them is still an open problem. This paper attempts to answer an important question: How can we distinguish polymorphic worms from normal background traffic? We propose a new worm signature, called the position-aware distribution signature (PADS), which fills the gap between traditional signatures and anomaly-based intrusion detection systems. The new signature is a collection of position-aware byte frequency distributions. It is more flexible than the traditional signatures of fixed strings while it is more precise than the position-unaware statistical signatures. We propose two algorithms based on expectation-maximization (EM) and Gibbs sampling to efficiently compute PADS from a set of polymorphic worm samples. We also discuss how to separate a mixture of different polymorphic worms such that their respective PADS signatures can be calculated. We perform extensive experiments to demonstrate the effectiveness of PADS in separating new worm variants from normal background traffic.  相似文献   

13.
针对有限元分析建模的需求,提出一种将工程零件的设计特征模型自动转换为相应的分析特征模型的方法.首先将设计特征模型分解为所有正特征剩余体的集合,然后从各正特征剩余体中分解出一组扫成体和非扫成体,再采用基于二维轮廓的方法从各扫成体中确定出候选分析特征区域,最后通过合成候选分析特征区域得到真正的分析特征区域,并在此基础上生成分析特征和分析特征模型.实验结果表明该方法是有效的.  相似文献   

14.
Programming and Computer Software - In the development of quality software, critical decisions related to planning, estimating, and managing resources are bound to the correct and timely...  相似文献   

15.
Self-training technique for automated gene recognition both in entire genomes and in unassembled ones is proposed. It is based on a simple measure (namely, the vector of frequencies of non-overlapping triplets in sliding window), and needs neither predetermined information, nor preliminary learning. The sliding window length is the only one tuning parameter. It should be chosen close to the average exon length typical to the DNA text under investigation. An essential feature of the technique proposed is preliminary visualization of the set of vectors in the subspace of the first three principal components. It was shown, the distribution of DNA sites has the bullet-like structure with one central cluster (corresponding to non-coding sites) and three or six flank ones (corresponding to protein-coding sites). The bullet-like structure itself revealed in the distribution seems to be very interesting illustration of triplet usage in DNA sequence. The method was examined on several genomes (mitochondrion of P.wickerhamii, bacteria C.crescentus and primitive eukaryot S.cerevisiae). The percentage of truly predicted nucleotides exceeds 90%.  相似文献   

16.
一种可行的自动程序理解途径   总被引:1,自引:0,他引:1  
自动程序理解是软件工程和人工智能的非常活跃的研究领域,本文提出了一种独立于程序设计语言,具有明显结构性和流图结构的中间表示plan来表示程序代码,本文首次提出了应用图文法分析技术于自动程序理解的方法,并给出了基于人工智能技术来进行自动程序理解的模型。  相似文献   

17.
Planning coordination for multiple companies has received much attention from viewpoints of global supply chain management. In practical situations, a plausible plan for multiple companies should be created by mutual negotiation and coordination without sharing such confidential information as inventory costs, setup costs, and due date penalties for each company. In this paper, we propose a framework for distributed optimization of supply chain planning using an augmented Lagrangian decomposition and coordination approach. A feature of the proposed method is that it can derive a near-optimal solution without requiring all of the information. The proposed method is applied to supply chain planning problems for a petroleum complex, and a midterm planning problem for multiple companies. Computational experiments demonstrate that the average gap between a solution derived by the proposed method and the optimal solution is within 3% of the performance index, even though only local information is used to derive a solution for each company.  相似文献   

18.
周超  姜丽红 《计算机工程》2004,30(Z1):643-645
ERP系统运行的质量直接关系到企业的日常业务能否正常运转,企业的规模不断扩大对ERP系统性能要求也不断提高,系统性能测试起到了很好的保证作用.该文描述了ERP系统自动化性能测试,并以SAP R/3系统为例说明了性能测试过程.  相似文献   

19.
20.
本文介绍了X线头影测量自动化系统的设计与实现,同时讨论了该系统的结构、功能特点及其数学模型。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号