Yunnan Key Laboratory of Computer Technology Application

Kunming, China

Yunnan Key Laboratory of Computer Technology Application

Kunming, China
SEARCH FILTERS
Time filter
Source Type

Jiang Y.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Jiang Y.,Peking University | Jin L.,Advanced Digital Technology Co. | And 3 more authors.
Advances in Intelligent Systems and Computing | Year: 2013

The major objective of Component Based Software Development (CBSD) is to reduce the cost and time of software development by reusing available components. Testing is an important phase in CBSD. During the process of component testing reuse, the storage and management of test information play a key role. As a result, it is important to research the issues about the information library for component testing. This paper presents an infrastructure of component test information library. Firstly, the architecture of the library is established. Then the component model for test information description is extended based on BIDM. Towards the main functions of test information library, the classification schemes, retrieval strategy, verification and evaluation method are proposed. As a support for component developers, reusers and the third party, the information library for component testing and its functions will be helpful for component testing and reuse. © 2013 Springer-Verlag.


Lee L.,Yunnan Key Laboratory of Computer Technology Application | Lee L.,Kunming University of Science and Technology | Zhang Y.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Liu Y.,Yunnan Key Laboratory of Computer Technology Application
Research Journal of Applied Sciences, Engineering and Technology | Year: 2013

In this study, we have a research of the distributed access control based on proxy signature in M2M sensor networks M2M sensor networks. As M2M sensor networks are usually deployed in hostile environment, the global communication security of M2M sensor networks is and will continue to be a major concern. Although there are many related works on access control in WSNs (Wireless Sensor Networks), Ad-hoc networks, MANETs (Mobile Ad-hoc Networks) and etc., they cannot be applied to M2M sensor networks directly. Motivated by this consideration, we develop a secure and distributed access control scheme based on proxy signature for M2M sensor networks, which provides strong authentication and achieves efficiency. Moreover, security of the proposed technique does not rely on availability of a secure channel. © Maxwell Scientific Organization, 2013.


Ouyang X.,Kunming University of Science and Technology | Ouyang X.,Yunnan Key Laboratory of Computer Technology Application | Shuai C.Y.,Kunming University of Science and Technology
Applied Mechanics and Materials | Year: 2013

It is always a challenge by using statistical method in corpus database to analyze semantics of natural language Sentences (NLS). This paper proposes a method of recognizing and translating ontology query in natural language, called OntoQuery-NLP. With the help of pre-create semantic templates, the OntoQuery-NLP maps NLSs matching the format of the semantic templates into formal semantic expressions. By parsing these semantic expressions, the OntoQuery-NLP recognizes the queries and gets the correct answers from ontology. Compared with other methods, the OntoQuery-NLP, without the support of any corpus, has faster retrieving speed and higher retrieving accuracy. © 2013 Trans Tech Publications Ltd, Switzerland.


Ou Y.,Kunming University of Science and Technology | Ou Y.,Yunnan Key Laboratory of Computer Technology Application | Zou P.,Kunming University of Science and Technology | Shuai C.,Kunming University of Science and Technology
Communications in Computer and Information Science | Year: 2012

In order to represent the knowledge model of the combination of time and actions in a possible world,this article proposes a knowledge representation(KR) method which is based on first order logic and its semantic can be interpreted by production rules. First,we discuss the basic theory of knowledge representation(KR), and next,we construct a meta language through which semantic can be explained by the rules of semantic interpretation and predicates, and then,by the meta language and its semantic we describe the concepts in the possible world. At last,we use experiments in the possible world to demonstrate the effectiveness of the presented method. © 2012 Springer-Verlag.


Lee L.,Yunnan Key Laboratory of Computer Technology Application | Lee L.,Kunming University of Science and Technology | Zhang Y.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | And 2 more authors.
Research Journal of Applied Sciences, Engineering and Technology | Year: 2012

Pair-wise key establishment with authentication is basic and necessary to configure secure sensor networks. In addition, nodes in a sensor network may be lost because of the power exhaustion problem or malicious attacks. Thereby pair-wise key establishment and new node deployment are necessary in the sensor network. Recently, a study was proposed a practical access control protocol for Secure Sensor Networks based on the elliptic curve cryptography. We point out its weakness and propose more efficient scheme as satisfying better security strength. © Maxwell Scientific Organization, 2012.


Ran M.,Yunnan Key Laboratory of Computer Technology Application | Ran M.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Jiang Y.,Kunming University of Science and Technology | And 6 more authors.
Communications in Computer and Information Science | Year: 2016

With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword-pairs, the user’s emotional tendency about App software is quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective. © Springer Science+Business Media Singapore 2016.


Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Jiang Y.,Kunming University of Science and Technology | Jin L.,Advanced Digital Technology Co. | Liu Y.-P.,Advanced Digital Technology Co.
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2013

During the process of component based software development, components must be tested before reused successfully. Test-data generation is an important topic in black-box component testing. The large number of test data will spend plenty of execution time and increase the testing cost. Based on the contracts of black-box component, this paper presents a test data selection method after generated a great deal of initial test cases. First, the contract grammar of blackbox components is defined. Then the method and process of test data selection is presented based on contract. Finally, some experiments are carried out. The results have shown that the number of test data is reduced while shortening the time and keeping the efficiency after twice selection. © 2013 SPIE.


Zhou X.-B.,Yunnan Key Laboratory of Computer Technology Application | Zhou X.-B.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Jiang Y.,Kunming University of Science and Technology | And 2 more authors.
Proceedings - 2011 4th International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2011 | Year: 2011

Software changes are inevitable during the process of software evolution. To accommodate the changes in the software process, it is necessary to analyze the impacts of the changes. Software change impact analysis (CIA) is a key technique for identifying unpredicted and potential effects caused by changes made to software. CIA allows developers assessing the possible effects of a change, which plays an important role in software maintenance. In this paper, we present the static CIA technology based on program dependence graph (PDG) through analyzing possible change impacts for Object-Oriented source code. An analysis prototype tool for C++ program is implemented. The experimental results show that the method is effective. © 2011 IEEE.


Qin L.-Y.,Yunnan Key Laboratory of Computer Technology Application | Qin L.-Y.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Jiang Y.,Kunming University of Science and Technology | And 2 more authors.
Proceedings - 2011 4th International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2011 | Year: 2011

Software testing includes static testing and dynamic testing. The static testing needn't run the program to be tested. The static analysis belongs to static testing, whose purpose is to collect program's information in order to do further analysis. This paper aims at analyzing the structure for java program and gaining the information at three different levels, including control flow graph at statement level, call graph at class-member level and class relation graph at class level. Then a structure analysis tool for java program (SAT4JP) is designed and implemented. Finally, some experiments are executed to verify the effectiveness of our method and SAT4JP. © 2011 IEEE.

Loading Yunnan Key Laboratory of Computer Technology Application collaborators
Loading Yunnan Key Laboratory of Computer Technology Application collaborators