模型驱动架构的系统结构可靠性计算方法及提升理论
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
为了进一步加强计算机软件在互联网络、人工智能、大数据处理、物联网工程、信息传输和图像处理等信息领域的应用能力,加速计算机软件系统的智能化、工程化和产品化的发展进程,突破束缚软件设计跨越式发展的关键技术,提高软件产品的可靠性和安全性。提出了模型驱动架构向可靠性拓扑结构转换方法、不同软件系统拓扑结构的可靠性计算模型及理论、软件系统中功能模块互相重叠的可靠性叠加技术、软件系统基于条件和关联特征结构缺陷的预测方法,使得基于模型驱动架构的软件系统结构可靠性获得大幅度提高;软件系统结构可靠性提升理论有了新的发展和创新。
     详细分析Weiss、Corcoran、Jelinski、Moranda、Gokhate、Yacoub、毛晓光等人的可靠性模型;Meinhold、Singpurwalla和Ohba等人贝叶斯模型的改进型和非齐次泊松分布模型;cheung等人基于矩阵的状态转移模型;Tarik Hadzic等人的评估模型;徐高潮等人、Khoshgoftaar等人缺陷预测模型等国内外专家学者提出的软件可靠性和软件缺陷预测模型的功能和特点。认真研究和探讨了软件模型驱动架构原理、可靠性增长模型技术、马尔可夫可靠性模型原理与分类和可靠性的缺陷预测方法等内容。经比较确认:所提出的软件可靠性模型理论和方法与这些模型、方法均有较大的区别,属于更高层次的可靠性计算方法与提升技术。
     提出模型驱动架构向可靠性拓扑结构转换方法。在模型驱动架构向可靠性拓扑结构转换过程中,首次建立不改变对象间的时序关系、不改变对象间的逻辑关系和不改变对象间消息传递的原则。建立了逻辑选择关系的可靠性拓扑结构转换模型、逻辑分支关系的可靠性拓扑结构转换模型和逻辑循环关系的可靠性拓扑结构转换模型。提出了将顺序图中的逻辑选择关系图、逻辑分支关系图和逻辑循环关系图向可靠性拓扑结构转换的方法。试验结果表明:模型驱动架构向可靠性拓扑结构转换方法,能够将系统顺序图准确、合理的转换为可靠性拓扑结构图。
     提出了可靠性拓扑结构图向可靠性状态图的转换模型和转换方法;给出了各种不同软件系统拓扑结构和可靠性状态转换的可靠性计算理论。依赖系统中模块与模块间的组成方式、复杂度和顺序图,建立了转移概率串行拓扑结构的可靠性模型、转移概率并行拓扑结构的可靠性模型、转移概率串并混合型拓扑结构的可靠性模型、转移概率环状拓扑结构的可靠性模型、多种拓扑结构的可靠性模型;提出了转换概率可靠性拓扑结构与可靠性状态的对应关系、模块执行的转移与模块状态的转移牵动关系、并串混合型结构图与并串混合型的状态图的转换关系;给出了串行拓扑结构、并行拓扑结构、串并混合型拓扑结构和环形拓扑结构的可靠性值计算公式。试验结果表明:不同软件系统拓扑结构的可靠性计算方法均能够计算出软件系统中的可靠度,这些计算结果与系统可靠性的测试结果基本耦合、可信。
     提出了软件系统中功能模块互相重叠的可靠性叠加技术。经过对软件系统的多分支模块的结构和模块功能的定义与分析,首次建立了软件系统模块分解的原则、功能模块可靠性叠加计算理论和功能模块占用率的可靠性叠加技术;给出了内功能模块与外功能模块可靠性的平均值规划成一个外功能模块的优化可靠性计算方法。并依据结构模型的映射分解法和功能模块的可靠性计算理论,对功能模块占用率可靠性的线性结构进行证明。试验表明:应用可靠性叠加技术原理得到的可靠性计算结果,明显好于未使用叠加技术的可靠性计算结果。
     提出了软件系统基于条件特征结构缺陷的预测方法。通过对结构缺陷在不同条件下特征和缺陷条件进行分析,提出了缺陷成簇的方法。定义了条件特征和缺陷特征,应用K_means算法对具有相同特征缺陷进行聚类,能够有效和及时的发现缺陷集中出现的特征。建立条件特征与缺陷特征的关系模型和缺陷聚类算法,使具有相同条件的缺陷聚集并成簇。实验验证:基于条件的缺陷聚类算法与K_means算法相结合的结构模型,对缺陷预测的准确度和缺陷的修复效率好于DBSCAN算法,为软件系统缺陷的修复节省了时间和资源,相比传统方法效率提高约30%。
     提出了软件系统基于关联特征结构缺陷的预测方法。对在同一个缺陷特征簇和不同的缺陷特征簇中的缺陷相似度进行分析,提出了每个簇中均有一个特征重心,代表簇的整体特征趋势的概念;通过对特征重心、缺陷特征和缺陷关联关系属性分析,给出了具有相同特征的缺陷聚集成簇的结论;同时确认缺陷特征不十分相似的缺陷也能聚集成簇。实际数据验证:基于关联特征结构缺陷的预测方法能够进一步为软件修复节省大量的时间和资源,相比传统软件缺陷的修复方法其效率可提高约50%。
For improving the application abilities of computer software in internet, artificialintellegence, big data computing, internet of things, data transmission and image processing, andpromoting the developing procedure of intelligence, engineering and products, as well the keytechnology of releasing the tight of software design and realizing great-leap-forwarddevelopment, also including advancing the reliability and safety of software, in this paper wepropose a method of transferring the model driven architecture to topological structure reliability,the theories and models of calculation for different software topological structure reliability, theoverlay reliability technology about overlaps of function modules, defects prediction based ondifferent conditions and related characters. So there is a big rise of architecture softwarereliability on model driven architecture. From the above contributions architecture softwarereliability has a big creation and a dramatic development.
     We deeply analyze the attributes and functions of software reliability and defects predictionmodels from different researchers including the reliability model of Weiss, Corcoran, Jelinski,Moranda, Gokhate, Yacoub, Xiaoguang Mao, the improved bayesian model andnonhomogeneous Poisson distribution model of Meinhold, Singpurwalla, Ohba, the statetransmit based on matrix proposed by cheung, the measurement model of Tarik Hadzic, thedefects prediction models of Gaochao Xu Khoshgoftaar. Additional we concentrate and discusson model driven architecture, the reliability increase model, Markov reliability model and thedefects prediction based on software reliability. From our compare and methods we confirm thatthe methods and theories proposed in this dissertation have a farther difference with the abovemodels. Our method is a advanced reliability computing method and promotion technology.
     We propose a method of the transmission from model driven architecture to topologicalstructure reliability. In the procedure of transmission we also present rules of keeping thesequential relationships, keeping logical relationships and keeping the message transmission among the different objects. In this paper we also build three models. Separately they arereliability of topology transformation model based on the logical choice relationship, reliabilityof topology transformation model based on the branching logic and reliability of topologytransformation model based on the logic loop relationship. The method of transferring thepictures of the logical choice relationship, branching logic and the logic loop relationship to thelogic loop relationship is built. The results show that the method of transformation betweenmodel driven architecture and the topological structure reliability can transfer the systemsequence diagram to the picture of topological structure reliability accurately and reasonably.
     We propose a method of the transformation from the topological structure reliability to thereliability state diagram. Meantime the theories of the different software system topologicalstructures and transformation of the different reliability state diagrams are presented. Dependingon the compositions of different modules, the complexity and sequence diagram, we build thereliability models separately based on transition probability serial topology, transitionprobability of parallel topological structure, transition probability serial and hybrid topology,transition probability of parallel topological structure and kinds of topology structures. thecorresponding relationship between the transformation probability reliability topology structureand reliability state model, the affection relationship between the transfer of models and thetransfer state of models and parallel and the relationship between serial hybrid architecture andserial hybrid states are presented. The formulas of the serial parallel topology, parallel topology,serial and parallel hybrid topology and the loop topology are shown in this paper. Experimentsshow that the different system topology can calculate the reliability reasonably and these resultsand the system reliability test results are basically coupling and credible.
     In this dissertation a superposition of reliability technology is presented based on thesystem function parts superposition. By multiple branching module structure and modulefunction definition and analyzing on software system, the software system moduledecomposition principle and function module reliability superposition calculation theory and thefunction module usage reliability of superposition technique are proposed. We present using themethod of calculating the mean of inside function module and the outside functional modules tobecome a functional modules. Depending on the method of mapping decomposition on structuremodel and the theory of the reliability calculation about function modules, the linear structure of the reliability function module utilization is proven. The experiment shows that applyingreliability superposition principle can catch the result of the reliability calculation. The effectsare better than the results of without superposition technique.
     Additional the method of predicting conditions of software system based on thecharacteristics of structure defects is proposed. From analyzing the characters and defectsconditions under the different conditions, the method of defects cluster is proposed. In this partwe also define the condition characters and defects characters. By using K_means to cluster thedefects owing the similar condition characters, the episodes characters can be found. We canbuild condition features and defects relational models to cluster the defects together. Theexperiments show that by combining the cluster theory based on different conditions andK_means, the efficiency and accuracy of this method are better than using DBSCAN. Due tothis method the theory can save the time and resources. Comparing with traditional method a30%rise is presented.
     Software system prediction method based on correlation characteristics of the architecturedefects is proposed. From analyzing the defects in the same defects cluster and the differentdefects cluster, we propose that in each cluster there is a character center. This center can be onbehalf of the overall characteristics of the cluster. From the analyzation of this center, defectsfeatures and defects relationship, we presented the clusters of the same defects characters.Meanwhile we confirm that the clusters owing un-similar characters also can become theclusters. The experimental data shows that the method based on the related defects architecturecharacters can improve the system fixing time and resources. Comparing with traditionalmethod the efficiency has a50%increase.
引文
[1] Katerina GP, Trivedi KS. Architecture-based approach to reliability assessment of softwaresystems[J]. Performance Evaluation,2001(45):179-204
    [2] ROGER C. CHEUNG, A User-Oriented Software Reliability Model, IEEETRANSACTIONS ON SOFTWARE ENGINEERING, VOL. SE-6, NO.2, MARCH1980MEMBER, IEEE
    [3]毛晓光,邓勇进.基于构件软件的可靠性通用模型[J].软件学报,2004,15(1):27-32.
    [4] Wang Wen-Li,Wu Ye, Chen M H.Architecture-based software reliabilityanalysis[C]//Proceedings of Pacific Rim International Symposium on DependableComputing,1999,12:16-17.
    [5] Kapur P G, Singh O.Software reliability growth and innovation diffusion models: aninterface[J].Int’l Journal of Reliability, Quality and Safety Engineering,2004,11(4):339-364.
    [6] Yacoub S M, Ammar H H.A methodology for architecture-level reliability riskanalysis[J].IEEE Transactions on Software Engineering,2002,28(6):529-547.
    [7] Yacoub S.A scenario-based reliability analysis approach for component—basedsoftware[J].IEEE Trans on Reliability,2004,53(4).
    [8] Gokhale S, Member S.Architecture-based software reliability analysis: overview andlimitations[J].IEEE Transactions on Dependable and Secure Computing,2007,4(1):32-40.
    [9] Goseva-Popstojanova K, Mathur A P.Comparison of architecture-based softwarereliability models[C]//12th International Symposium on Software Reliability Engineering,2001:22-31.
    [10]Goseva-Popstojanova K, Hassan A.Architectural-level risk analysis using UML[J].IEEETransactions on Software Engineering,2003,29(10):946-959.
    [11]张友生.软件体系结构[M].北京:清华大学出版社,2004.
    [12]张友生,李雄.基于Petri网的软件体系结构可靠性分析[J].计算机工程与应用,2006,42(25):70-73.
    [13]Couvreur C, Fontaine V, Gaunard P, et al.Automatic classification of environmental noiseevents by hidden Markov models [J].Applied Acoustics,1998,54(3):187-206.
    [14]Churchill G.Hidden Markov chains and the analysis of genome structure[J].Computers&Chemistry,1992,16(2):107-115.
    [15]Bellone E, Hughes J P, Guttorp P.A hidden Markov model for downscaling synopticatmospheric patterns to precipitation amounts [J]. Climate Research,2000,15(1):1-12.
    [16]Bohm C, Jacopini G.Flow diagrams, turning machines and languages with only twoformation rules [J].Communications of the ACM,1966,9(5):366-371.
    [17]Reynolds D A.Speaker verification using adapted Gaussian mixture models[J].DigitalSignal Processing,2000,10(1/3):19-41.
    [18]杨晓敏,何小海,吴炜,等.基于高斯混合模型的车辆字符识别算法[J].光电子·激光,2007,18(4):487-490.
    [19]Hernandez-Hernandez D, Marcus S I, Fard P J.Analysis of a risk-sensitive controlproblem for hidden Markov chains[J].IEEE Transactions on Automatic Control,1999,44(5):1093-1100.
    [20]Georgoulakis K, Theodoridis S.Bind and semi-blind equalization using hidden Markovmodels and clustering techniques [J].Signal Processing,2000,80(9):1795-1807.
    [21]Li J, Najmi A, Gray R M.Image classification by a two-dimensional hidden Markovmodel[J].IEEE Transactions on Signal Processing,2000,48(2):517-533.
    [22]Huang C L,Wu M S, Jeng S H.Gesture recognition using the multi-PDM method andhidden Markov model[J].Image and Vision Computing,2000,18(11):865-879.
    [23]Michalek S,Wagner M, Timmer J.A new approximate likelihood estimator for ARMA-filtered hidden Markov models [J].IEEE Transactions on Signal Processing,2000,48(6):1537-1547.
    [24]Roberts W J J, Ephraim Y.Hidden Markov modeling of speech using Toeplitz covariancematrices[J].Speech Communication,2000,31(1):1-14.
    [25]张脂平.因子分析算法的研究及其在Web文本特征提取中的应用[D].福州:福州大学,2005.
    [26]张贤达.矩阵分析与应用[M].北京:清华大学出版社,2004.
    [27]Knerr S, Augustin E, Price D.Hidden Markov model based word recognition and itsapplication to legal amount reading on French checks[J].Computer Vision and ImageUnderstanding,1998,70(3):404-419.
    [28]Churchill G A.Hidden Markov chains and the analysis of genome structure[J].Computers&Chemistry,1992,16(2):107-115.
    [29]丁春忠,汪四水.基于EM算法学生成绩的因子分析[J].数学的实践与认识,2004,20(4):25-28.
    [30]雷雄国.基于因子分析概率统计模型的说话人识别[D].湘潭:湘潭大学,2006.
    [31]郭永基.可靠性工程原理[M].北京:清华大学出版社,2002.
    [32]李海泉,李刚.系统可靠性分析与设计[M].北京:科学出版社,2003.
    [33]徐高潮,刘新忠,胡亮,付晓东,董玉双.引入关联缺陷的软件可靠性评估模型[J].软件学报,2011,22(3):439-450.
    [34]Shufen Liu, Huang Leng, Changhong Hu“A universal gravitation based clustering algorithmfor distributed file system,” Chinese Journal of Electronics, vol.21, no.1, pp.28–32,2012.
    [35]"Google Press Center: Fun Facts". www.google.com. Archived from the original on2009-04-24.
    [36]“Introduction to Information Retrieval"(HTML). Cambridge University Press.2008.Retrieved2008-11-09.
    [37]Yizhou Suny, Jiawei Hany, Peixiang Zhaoy, Zhijun Yiny, Hong Chengz, Tianyi “RankClus:Integrating Clustering with Ranking for Heterogeneous Information Network Analysis”.Wuy. ACM. EDBT2009, March24 26,2009, Saint Petersburg, Russia.
    [38]“RankCompete:Simultaneous ranking and clustering of information networks”.Neurocomputing95(2012)98 104Available online21March2012.
    [39]Xiang Sean Zhou, Thomas S. Huang.“Relevance feedback in image retrieval: Acomprehensive review”. Multimedia Systems8:536 544(2003)
    [40]LIU Shufen and HU Changhong.“Group Competitive Model of Optimal Node Selectionbased on Service Evaluation”. Chinese Journal of Electronics.404-413Vol.21, No.3, July2012
    [41]G. Jeh and J. Widom. SimRank,“a measure of ntructural-context similarity”. In Proceedingsof the eighth ACM SIGKDD conference (KDD'02), pages538-543. ACM,2002.
    [42]Landauer, T. K., Foltz, P. W.,&Laham, D.“Introduction to Latent Semantic Analysis”(1998).Discourse Processes,25,259-284.
    [43]D. Lowe, Object recognition from local scale-invariant features, in: ICCV,1999.
    [44]Q. Mei, D. Cai, D. Zhang, C. Zhai, Topic modeling with network regularization, in: WWW,2008.
    [45]Gitlin LN, Hauck WW, Winter L, Dennis MP, Schulz R. Effect of an in-home occupationaland physical therapy intervention on reducing mortality in functionally vulnerable olderpeople: preliminary findings. J Am Geriatr Soc2006;54:950-5.
    [46]Gitlin LN, Winter L, Dennis MP, Corcoran M, Schinfeld S, Hauck WW. A randomized trialof a multicomponent home intervention to reduce functional difficulties in older adults. JAm Geriatr Soc2006;54:809-16.
    [47]Giusti A, Barone A, Oliveri M, et al. An analysis of the feasibility of home rehabilitationamong elderly people with proximal femoral fractures. Arch Phys Med Rehabil2006;87:826-31.
    [48]Crotty M, Whitehead C, Miller M, Gray S. Patient and caregiver outcomes12months afterhome-based therapy for hip fracture: a randomized controlled trial. Arch Phys Med Rehabil2003;84:1237-9.
    [49]Kuisma R. A randomized, controlled comparison of home versus institutional rehabilitationof patients with hip fracture. Clin Rehabil2002;16:553-61.
    [50]Landry MD, Jaglal S, Wodchis WP, Raman J, Cott CA. Analysis of factors affectingdemand for rehabilitation services in Ontario, Canada: a health-policy perspective. DisabilRehabil2008;30:1837-47.
    [51]Altman,M.,and M. P. McDonald.2001. Choosing Reliable Statistical Software. PoliticalScience and Politics34:681–687.
    [52]Altman, M., J. Gill, and M. P. McDonald.2004. Numerical Issues in Statistical Computingfor the Social Scientist. Hoboken, NJ: John Wiley&Sons.
    [53]Benichou, M., J. M. Gauthier, G. Hentges,and G. Ribiere.1977. The Efficient Solution ofLarge-Scale Linear Programming Problems—Some Algorithmic Techniques andComputational Results. Mathematical Programming13:280–322.
    [54]Brown, B. W.2003. DCDFLIB: Library of Routines for Cumulative Distribution FunctionsInverses,and Other Parameters. Division of Quantitative Science, University ofTexasMDAnderson Cancer Center.http://biostatistics.mdanderson.org/SoftwareDownload/SingleSoftware.aspx–Software_Id=21(accessed June2,2010).
    [55]Crowder, H. P., R. S. Dembo, and J. M. Mulvey.1978. Reporting ComputationalExperiments in Mathematical Programming. Mathematical Programming15:316–329.
    [56]Davidson, R., and J. G. MacKinnon.1993. Estimation and Inference in Econometrics.NewYork: Oxford University Press.
    [57]Dewald, W. G., T. G. Thursby, and R. G. Anderson.1986. Replication in EmpiricalEconomics: The Journal of Money, Credit and Banking Project. American EconomicReview76:587–603.
    [58]Gay, D.1990. Usage Summary for Selected Optimization Routines, Computing ScienceTechnical Report No.153. Murray Hill, NJ: AT&T Bell Laboratories.http://netlib.bell-labs.com/cm/cs/cstr/153.pdf (accessed June2,2010).
    [59]Gill, P. E., W. Murray, and M. H. Wright.1981. Practical Optimization. London: AcademicPress.
    [60]Ibaraki, T.1976. Theoretical Comparisons of Search Strategies in Branch-and BoundAlgorithms. International Journal of Computer Information Science5:315–344.
    [61]Keeling, K. B., and R. J. Pavur.2007. A Comparative Study of Nine Statistical SoftwarePackages. Computational Statistics and Data Analysis51:3811–3831.
    [62]Land,A. H.,and S. Powell.1973. Fortran Codes for Mathematical Programming: Linear,Quadratic and Discrete. New York: John Wiley&Sons.
    [63]Leamer, E. E.1983. Let’s Take the Con out of Econometrics. American Economic Review73:31–43. L’ecuyer, P., and Simard, R.2007. TestU01: A C Library for Empirical Testing ofRandom Number Generators. ACM Transactions on Mathematical Software33(4).http://portal.acm.org/citation.cfm–id=1268777(accessed June2,2010).
    [64]McCullough, B. D., and D. A. Heiser.2008. On the Accuracy of Statistical Procedures inMicrosoft Excel2007. Computational Statistics and Data Analysis52:4570–4578.
    [65]McCullough, B. D., and H. D. Vinod.1999. The Numerical Reliability of EconometricSoftware. Journal of Economic Literature37(2):633–665.
    [66]McCullough, B. D., and B. Wilson.1999. On the Accuracy of Statistical Procedures inExcel97. Computational Statistics and Data Analysis31(1):27–37.
    [67]Murray,W.1972. Failure, the Causes and Cures. In Numerical Methods for UnconstrainedOptimization, ed.W. Murray, pp.107–122. New York: Academic Press,.
    [68]National Institute of Standards and Technology.2003. Statistical Reference Datasets.http://www.itl.nist.gov/div898/strd (accessed on March2,2010).
    [69]Nerlove, M.2005. On the Numerical Accuracy of Mathmatica5.0for Doing Linear andNonlinear Regression. Mathematica Journal9(4):824–851.
    [70]SAS Institute.2003. Assessing the Numerical Accuracy of SAS Software, version2.http://support.sas.com/rnd/app/papers/statisticalaccuracy.pdf (accessed June2,2010).
    [71]Sawitzki, G.1994. Numerical Reliability of Data Analysis Systems. ComputationalStatistics and DataAnalysis18(2):269–286.
    [72]Silk, J.1996. System Estimation: A comparison of SAS, SHAZAM, and TSP. Journal ofApplied Econometrics11(4):437–450.
    [73]Simon, S. D., and J. P. LeSage.1988. Benchmarking Numerical Accuracy of StatisticalAlgorithms. Computational Statistics and Data Analysis7:197–209.
    [74]Stata.2007. NIST StRD Certification Results Using STATA10. http://www.stata.com/support/cert/nist10/(accessedJune2,2010).
    [75]Tice, T. F., and M. G. Kletke.1984. Reliability of Linear Programming Software: AnExperience with the IBM Mathematical Programming System Series. American Journal ofAgricultural Economics66:104–107.
    [76]Tomek, W. G.1993. Confirmation and Replication in Empirical Econometrics:A StepToward Improved Scholarship. American Journal of Agricultural Economics75:6–14.
    [77]Time Series Processor.2010. Benchmarks.http://www.tspintl.com/products/tsp/benchmarks/index.htm (accessed June2,2010).
    [78]Vinod, H. D.2000. Review ofGAUSS forWindows, Including Its Numerical Accuracy,Journal of Applied Econometrics15(2):211–220.
    [79]Yalta, A. T.2007. The Numerical Reliability of GAUSS8.0. The American Statistician61:262–268.
    [80]M. Anisetti, C.A. Ardagna, E. Damiani,“Fine-grained modeling of web services fortest-based security Certification”, Procs. of the8th InternationalConference on ServiceComputing (SCC2011), Washington, DC, USA, July2011.
    [81]A. Avizienis, J. C. Laprie, B. Randell, C. Landwehr,“Basic Concepts and Taxonomy ofDependable and Secure Computing”, Procs. of IEEE Transactions on Dependable andSecure Computing, vol.1, no.1,11-33, Jan.-Mar.2004, doi:10.1109/TDSC.2004.2.
    [82]BEA System, http://dev2dev.bea.com/webservices/WS-Acknowledgement-0_9.htm,2008,(Last accessed March30,2012).
    [83]S. Becker, K. Koziolek, R. Reussner,“The Palladio component model for model-drivenperformance prediction”, Journal of Systems and Software (JSS,) vol.82no.1,3-22,2009.
    [84]S. Bernardi, J. Merseguer, D.C. Petriu,“A dependability profile within MARTE”, Procs. ofSoftware and Systems Modelling, vol.10, no.3, August14,313-336,2009, doi:10.1007/s10270-009-0128-1.
    [85]Boeing Commercial Airplanes,“P8”,http://www.boeing.com/defensespace/military/p8/index.html,2010.(Last accessed: March28,2012).
    [86]Boeing Commercial Airplanes,“Statistical Summary of Commercial Jet Airplane AccidentsWorldwide Operations1959-2010”, June2011,http://www.boeing.com/news/techissues/pdf/statsum.pdf,(Last accessed:February23,2011).
    [87]F. Braz, E. B.Fernandez, M. VanHilst,“Eliciting security requirements through misuseactivities”, Procs. of the2nd Int. Workshop on Secure Systems Methodologies usingPatterns (SPattern'07),328-33, Turin, Italy, September1-5,2007.
    [88]I. A. Buckley and E.B. Fernandez,“Three patterns for fault tolerance”, Procs. of theOOPSLA MiniPLoP, October26,2009.http://www.refactory.com/miniploppapers/FTPatts.pdf.(Last accessed:August29,2011).
    [89]I. Buckley and E.B.Fernandez,“Patterns Combing Reliability and Security”, Procs. of theThird International Conferences on Pervasive Patterns and Applications, September25-30,2011, Rome, Italy.
    [90]Buckley, E. B. Fernandez, M. Anisetti, C. A. Ardagna, M. Sadjadi, E.Damiani,“TowardsPattern-based Reliability Certification of Services”, Procs.of1st International Symposiumon Secure Virtual Infrastructures (DOASVI'11) OTM2011, Part II, LNCS7045,558–574,2011.
    [91]Buckley, E. B. Fernandez,“Dependability Patterns: A Survey”, unpublished manuscript,Department of Computer&Electrical Engineering and Computer Science, Florida AtlanticUniversity,2012.
    [92]Buckley, E. B. Fernandez,“Failure Pattern: A New Approach to Analyze Failures”,submitted for publication to the Technical Symposium on Software Architecture andPatterns conference, LACCEI2012, July23-27,2012.
    [93]E. B. Fernandez, O. Ajaj, I. Buckley, N. Delessy, K. Hashizume, M. M. Larrondo-Petrie,“APattern Language for Web Services Security and Reliability Standards”, accepted in FutureInternet, Special issue on Recent Advances in Web Services, March,2012.
    [94]V. Cardellini, E. Casalicchio, V. Grassi, F. L. Presti, R. Mirandola,“Towards self-adaptationfor dependable service-oriented systems”, Procs. of the Workshop on ArchitectingDependable Systems (WADS2008). Anchorage, AK, USA (June2009)
    [95]CBS News,“153Killed In Madrid Plane Crash”,http://www.cbsnews.com/stories/2008/08/20/world/main4365961.shtml, March23,2009.(Last Accessed: February23,2012).
    [96]V.Challagulla, F. Bastani, R. Paul, W. Tsai, Y. Yinong Chen,“A machine learning-basedreliability assessment model for critical software systems”, Procs. of the31st AnnualInternational Computer Software and Applications Conference (COMPSAC), Beijing,China, July,2007.
    [97]V. Challagulla, F. Bastani, I. L. Yen, High-confidence compositional reliability assessmentof SOA-based systems using machine learning techniques, In Tsai, J.,Yu, P.(eds.) MachineLearning in Cyber Trust:Reliability, Security, Privacy,279-322, Spinger-Verlag,2009.
    [98]Y. Choi,“Early safety analysis: from use cases to component-based software development”,Journal of Y. Choi,“Early safety analysis: from use cases to component-based softwaredevelopment”, Journal of Object Technology, vol.6, no.8,2007,185-203,doi:10.5381/jot.2007.6.8.a4.(Last accessed:September2,2011).
    [99]E. Damiani, C. A. Ardagna, N. El Ioini,“Open source systems security certification”,Springer, New York, NY, USA,2009.
    [100] E. B. Fernandez,“Patterns for operating systems access control”, Procs. Of PLoP2002,http://www.hillside.net/plop/plop2002/.(Last accessed: August29,2011).
    [101] H. Gawand, H. Bhabha, R.S. Mundada, P. Swaminathan,“Design Patterns toImplement Safety and Fault Tolerance”, International Journal of Computer Applications(0975–8887), vol.18, no.2, March2011.
    [102] Xiang Sean Zhou, Thomas S. Huang.“Relevance feedback in image retrieval: Acomprehensive review”. Multimedia Systems8:536–544(2003)
    [103] G. Jeh and J. Widom. SimRank,“a measure of ntructural-context similarity”. InProceedings of the eighth ACM SIGKDD conference (KDD'02), pages538-543. ACM,2002.
    [104] Landauer, T. K., Foltz, P. W.,&Laham,“Introduction to Latent Semantic Analysis” D.(1998).Discourse Processes,25,259-284.
    [105] D. Lowe, Object recognition from local scale-invariant features, in: ICCV,1999.
    [106] Q. Mei, D. Cai, D. Zhang, C. Zhai, Topic modeling with network regularization, in:WWW,2008.
    [107] Gitlin LN, Hauck WW, Winter L, Dennis MP, Schulz R. Effect of an in-homeoccupational and physical therapy intervention on reducing mortality in functionallyvulnerable older people: preliminary findings. J Am Geriatr Soc2006;54:950-5.
    [108] Gitlin LN, Winter L, Dennis MP, Corcoran M, Schinfeld S, Hauck WW. A randomizedtrial of a multicomponent home intervention to reduce functional difficulties in older adults.J Am Geriatr Soc2006;54:809-16.
    [109] Giusti A, Barone A, Oliveri M, et al. An analysis of the feasibility of homerehabilitation among elderly people with proximal femoral fractures. Arch Phys MedRehabil2006;87:826-31.
    [110] Crotty M, Whitehead C, Miller M, Gray S. Patient and caregiver outcomes12monthsafter home-based therapy for hip fracture: a randomized controlled trial. Arch Phys MedRehabil2003;84:1237-9.
    [111] Kuisma R. A randomized, controlled comparison of home versus institutionalrehabilitation of patients with hip fracture. Clin Rehabil2002;16:553-61.
    [112] Landry MD, Jaglal S, Wodchis WP, Raman J, Cott CA. Analysis of factors affectingdemand for rehabilitation services in Ontario, Canada: a health-policy perspective. DisabilRehabil2008;30:1837-47.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.