您的位置: 专家智库 > >

国家自然科学基金(60773191)

作品数:8 被引量:3H指数:1
相关作者:李瑞轩卢正鼎鲍洋胡和平黄保华更多>>
相关机构:华中科技大学更多>>
发文基金:国家自然科学基金国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术交通运输工程更多>>

文献类型

  • 8篇期刊文章
  • 1篇会议论文

领域

  • 8篇自动化与计算...
  • 1篇交通运输工程

主题

  • 2篇WEB_SE...
  • 2篇BASED_...
  • 1篇对等网
  • 1篇一致性
  • 1篇一致性管理
  • 1篇容错
  • 1篇排序
  • 1篇主题相关
  • 1篇主题相关度
  • 1篇网页
  • 1篇网页排序
  • 1篇网页排序算法
  • 1篇相关度
  • 1篇向量
  • 1篇向量空间
  • 1篇向量空间模型
  • 1篇链接
  • 1篇链接分析
  • 1篇结构化P2P...
  • 1篇基于主题

机构

  • 4篇华中科技大学

作者

  • 4篇卢正鼎
  • 4篇李瑞轩
  • 2篇辜希武
  • 1篇吴炜
  • 1篇於光灿
  • 1篇路松峰
  • 1篇黄保华
  • 1篇苏永红
  • 1篇宋伟
  • 1篇胡和平
  • 1篇梁昆
  • 1篇鲍洋

传媒

  • 3篇Wuhan ...
  • 2篇Journa...
  • 1篇小型微型计算...
  • 1篇Journa...
  • 1篇Tsingh...
  • 1篇2008年全...

年份

  • 1篇2012
  • 3篇2010
  • 1篇2009
  • 4篇2008
8 条 记 录,以下是 1-9
排序方式:
Typed formal model for WS-CDL specification of web services composition
2008年
In order to formally reason and verify web services composition described by web services choreography specification WS-CDL,a typed formal model named typed Abstract WS-CDL(web services choreography description language)for WS-CDL specifications is proposed.In typed Abstract WS-CDL,the syntax of type and session,typing rules and operational semantics are formalized;the collaborations of web services are formally described by sessions;the operational semantics of a session can help to formally reason the execution of the choreography;the typing rules can help to formally check the data type consistency of exchanged information between web services and capture run-time errors due to type mismatches.Particularly,the concepts of type assumption set extension and type assumption set compatibility are proposed,and the merging algorithm of type assumption sets is defined so as to eliminate type assumption conflict.Based on the formal model,typed mapping rules for mapping web services choreography to orchestration is also defined.With the typed mapping rules,orchestration stubs and their type assumption sets can be generated from a given choreography; thus, web services composition can be verified at choreography and orchestration levels,respectively.The model is proved to have properties of type safety,and how the model can help to reason and verify web services composition is illustrated through a case study.
辜希武李瑞轩卢正鼎
Disambiguating Authors by Pairwise Classification被引量:1
2010年
Name ambiguity is a critical problem in many applications, in particular in online bibliography sys-tems, such as DBLP, ACM, and CiteSeerx. Despite the many studies, this problem is still not resolved and is becoming even more serious, especially with the increasing popularity of Web 2.0. This paper addresses the problem in the academic researcher social network ArnetMiner using a supervised method for exploiting all side information including co-author, organization, paper citation, title similarity, author's homepage, web constraint, and user feedback. The method automatically determines the person number k. Tests on the researcher social network with up to 100 different names show that the method significantly outperforms the baseline method using an unsupervised attribute-augmented graph clustering algorithm.
林泉王波杜圆王雪至李玉华陈松灿
一种基于主题相关度的网页排序算法
针对现有基于链接结构的PageRank算法的不足,提出了基于网页主题相关度的改进PageRank算法.通过分析网页内容,提取出网页中的链接及其对应的锚文本,建立网页链接库,利用向量空间模型(VSM)计算链接锚文本和网页内...
吴炜梁昆李瑞轩辜希武卢正鼎
关键词:网页排序主题相关度链接分析向量空间模型
文献传递
TSPN: Term-Based Semantic Peer-to-Peer Networks
2012年
In this paper, we propose Term-based Semantic Peerto-Peer Networks (TSPN) to achieve semantic search. For each peer, TSPN builds a full text index of its documents. Through the analysis of resources, TSPN obtains series of terms, and distributes these terms into the network. Thus, TSPN can use query terms to locate appropriate peers to perform semantic search. Moreover, unlike the traditional structured P2P networks, TSPN uses the terms, not the peers, as the logical nodes of DHT. This can withstand the impact of network chum. The experimental results show that TSPN has better performance compared with the existing P2P semantic searching algorithms.
GAO GuoqiangLI RuixuanLU Zhengding
Caching Scheme Based on Power-Law Characteristic in Unstructured P2P Networks
2009年
In order to reduce the traffic load and improve the availability of the shared resources in unstructured P2P networks, a caching scheme combining alternative index and adaptive replication (AIAR) is presented. AIAR uses random walk mechanism to disperse the caching information of resources in the network based on its power-law characteristic, and dynamically adjusts replicas according to the visit frequency on resources and the degree information of peers. Subsequent experimental results show that the proposed AIAR scheme is beneficial to improve the search performance of success rate and respond speed. In addition, compared to some existing caching scheme, AIAR can perform much better in success rate, especially in a dynamic environment.
左翠华李瑞轩卢正鼎
关键词:REPLICATION
结构化P2P系统中副本一致性管理的一种新算法被引量:1
2010年
结构化P2P系统通常使用数据复制来提高数据可用性,但P2P环境中的节点搅动、多节点并发更新以及恶意节点的存在也为副本的一致性管理带来了新的挑战.基于协商的算法要求节点间以全交换的方式通讯,在P2P环境中其可伸缩性不够理想.本文针对结构化P2P系统提出一种基于Quorum的副本管理算法:使用混合失效模型降低容错开销,利用DHT服务处理节点搅动,将数据存储与其元信息管理分离,使数据可靠性和数据可用性得以独立调整.模拟实验表明该算法可以明显改善系统的可伸缩性,减少系统的容错开销.
鲍洋卢正鼎黄保华李瑞轩胡和平路松峰
关键词:拜占庭容错QUORUM系统对等网一致性
Multi-level access control model for tree-like hierarchical organizations
2008年
An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning security tags to subjects and objects is greatly simplified.The interoperation among different departments is implemented through assigning multiple security tags to one post, and the more departments are closed on the organization tree,the more secret objects can be exchanged by the staff of the departments.The access control matrices of the department,post and staff are defined.By using the three access control matrices,a multi granularity and flexible discretionary access control policy is implemented.The outstanding merit of the BLP model is inherited,and the new model can guarantee that all the information flow is under control.Finally,our study shows that compared to the BLP model,the proposed model is more flexible.
於光灿李瑞轩卢正鼎Mudar Sarem宋伟苏永红
PeerMD:A P2P Molecular Dynamics Simulation Framework Based on Web Services
2008年
PeerMD, a P2P molecular dynamics simulation frame-work based on Web services is proposed. It utilizes rich free CPU time and network bandwidth of P2P networks to provide enough resources for dynamics simulation of bio-macromolecule, and has resolved the problem that it is difficult to interoperate between heterogeneous peers in P2P environment through Web services. Structure of PeerMD is given. Function, input and output of molecular dynamics simulation Web service are defined. Processes of publishing, discovering and invoking of molecular dynamics simulation Web service based on multi-level SuperPeer are given. A protocol system of PeerMD is implemented on a basic P2P platform JXTA, and experimental simulations of tumor necrosis fact alpha (TNF-α) and two mutations of it are executed on the protocol system. Simulation results show that PeerMD can speed up molecular dynamics simulation perfectly.
HUANG BaohuaHE LinBAO YangLI ZhuoyaLI Ruixuan
关键词:P2P
Construction of High Dependable Distributed Access Control Architecture Based on Quorum System被引量:1
2010年
Quorum system is a preferable model to construct distributed access control architecture, but not all quorum system can satisfy the requirements of distributed access control architecture. Aiming at the dependable problem of authorization server in distributed system and combining the requirements of access control, a set of criterions to select and evaluate quorum system is presented. The scheme and algorithm of constructing an authorization server system based on Paths quorum system are designed, and the integrated sys- tem performance under some servers attacked is fully analyzed. Role-based access control on the Web implemented by this scheme is introduced. Analysis shows that with certain node failure probability, the scheme not only has high dependability but also can satisfy the special requirements of distributed access control such as real-time, parallelism, and consistency of security policy.
XIONG TinggangLU ZhengdingZHANG JiahongMA Zhong
关键词:DEPENDABILITY
共1页<1>
聚类工具0