Applied Mechanics and Materials Vols. 543-547

Paper Title Page

Abstract: Because of various advantages of software, implemented system function is more and more through software. In order to ensure the system is running, the verification of fault-oriented processing function module need software fault injected techniques to support. The traditional software fault injection technique method mainly studies the injection achievement of various fault modes. In order to achieve better test coverage, it is necessary to analyze software fault related needs and structure. Therefore, this paper combined gray box testing methods and software fault injection technique, it is proposed gray-box testing technique oriented to software fault injection, and give fault injection process framework.
3360
Abstract: For personalized service, existing user interest model primarily through the select weights Highest N keywords to represent the user interest model based on space vector method. The method of establishing the model is tend to content-based analysis methods and there is a serious "cold start" problem, cannot meet the demand for personalized services. Therefore, this paper add collaborative filtering factor in the process of establishing user interest model, and verified by experiment, after adding personalization features which make the service more obvious. In a certain extent, solve the new user's "cold start" problem.
3364
Abstract: Removed due to plagiarism. The original work was published as: Parallelized Sub-Resource Loading for Web Rendering Engine Deokho Kim, Changmin Lee, Sangpil Lee, and Won Woo Ro Journal of Systems Architecture, Vol. 59, No. 9, pp. 785-793, Oct. 2013
3369
Abstract: In recent years, mobile agent has always been the hot spot of the academic research, this paper introduces the concept of mobile agent, mobile agent system architecture and key technologies, combined with the mobile technology and web information retrieval technology, design a model of information retrieval system based on mobile agent, and expounds the key technology to realize the model needs to solve.
3373
Abstract: Considering the feature of high-security and complex business logic of radio program production, combining with the theory of Computer Supported Cooperative Work (CSCW), we designed and implemented a radio program production system with high-security and strong practicability. Based on the C/S structure and .Net platform, the system implements the unity query management of different data sources by applying and extending the Language Integrated Query (LINQ) technology. This paper focuses on the overall architecture, service module and key technologies of the production system.
3377
Abstract: Retracted paper: The implications of pervasive epistemologies have been far-reaching and pervasive. In fact, few cryptographers would disagree with the important unification of Markov models and RPCs, which embodies the theoretical principles of scalable networking. Soon Apex, our new framework for heterogeneous archetypes, is the solution to all of these challenges.
3382
Abstract: With the increasingly complex of computer software system, traditional software engineering methods for major software development will inevitably produce a lot of mistakes and catastrophic consequences for key industry users. Experiment with software engineering methods cannot guarantee the behavior at infinity reliability and security of the state space. All this requires formal analysis and verification to the complex system. In protocol verification based on automatic machines, the automaton is used to represent the behavior of the system, the time automaton is a formal method can be well applied to the network protocol verification.
3386
Abstract: This paper illustrates the IEEE 802.11 WLAN, Bluetooth and wireless ATM, and then analyzes the structures and traffic characteristics of them. The traffic characteristics of these three kinds of WLAN are summarized.
3391
Abstract: Research progress of network survivability during the last few years were briefly introduced, including definitions, methods, qualitative and quantitative survivability evaluation, etc. Technical measures of survivability including IOT were summarized. Cooperative survivability and further possible research problems were investigated. Based on the idea of machine learning, survivability information can be got from other systems, and were utilized by the local system to enhance local survivability in time. Some research aspects on cooperative network survivability were summarized. Peers in a system collaborate with each other, which can improve the survivability of the whole systems.
3395
Abstract: The design and realization of virtual simulation environment for non-lethal weapon system is presented. Besides the system architecture and design conception, several key problems and our solutions when developing a virtual simulation system, such as OpenGL based on dynamic geometry modeling, scene organization, and interaction are discussed.
3402

Showing 751 to 760 of 1059 Paper Titles