Entity

Time filter

Source Type


Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Jiang Y.,Kunming University of Science and Technology | Jin L.,Advanced Digital Technology Co. | Liu Y.-P.,Advanced Digital Technology Co.
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2013

During the process of component based software development, components must be tested before reused successfully. Test-data generation is an important topic in black-box component testing. The large number of test data will spend plenty of execution time and increase the testing cost. Based on the contracts of black-box component, this paper presents a test data selection method after generated a great deal of initial test cases. First, the contract grammar of blackbox components is defined. Then the method and process of test data selection is presented based on contract. Finally, some experiments are carried out. The results have shown that the number of test data is reduced while shortening the time and keeping the efficiency after twice selection. © 2013 SPIE. Source


Ou Y.,Kunming University of Science and Technology | Ou Y.,Yunnan Key Laboratory of Computer Technology Application | Zou P.,Kunming University of Science and Technology | Shuai C.,Kunming University of Science and Technology
Communications in Computer and Information Science | Year: 2012

In order to represent the knowledge model of the combination of time and actions in a possible world,this article proposes a knowledge representation(KR) method which is based on first order logic and its semantic can be interpreted by production rules. First,we discuss the basic theory of knowledge representation(KR), and next,we construct a meta language through which semantic can be explained by the rules of semantic interpretation and predicates, and then,by the meta language and its semantic we describe the concepts in the possible world. At last,we use experiments in the possible world to demonstrate the effectiveness of the presented method. © 2012 Springer-Verlag. Source


Ouyang X.,Kunming University of Science and Technology | Ouyang X.,Yunnan Key Laboratory of Computer Technology Application | Shuai C.Y.,Kunming University of Science and Technology
Applied Mechanics and Materials | Year: 2013

It is always a challenge by using statistical method in corpus database to analyze semantics of natural language Sentences (NLS). This paper proposes a method of recognizing and translating ontology query in natural language, called OntoQuery-NLP. With the help of pre-create semantic templates, the OntoQuery-NLP maps NLSs matching the format of the semantic templates into formal semantic expressions. By parsing these semantic expressions, the OntoQuery-NLP recognizes the queries and gets the correct answers from ontology. Compared with other methods, the OntoQuery-NLP, without the support of any corpus, has faster retrieving speed and higher retrieving accuracy. © 2013 Trans Tech Publications Ltd, Switzerland. Source


Lee L.,Yunnan Key Laboratory of Computer Technology Application | Lee L.,Kunming University of Science and Technology | Zhang Y.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Liu Y.,Yunnan Key Laboratory of Computer Technology Application
Research Journal of Applied Sciences, Engineering and Technology | Year: 2013

In this study, we have a research of the distributed access control based on proxy signature in M2M sensor networks M2M sensor networks. As M2M sensor networks are usually deployed in hostile environment, the global communication security of M2M sensor networks is and will continue to be a major concern. Although there are many related works on access control in WSNs (Wireless Sensor Networks), Ad-hoc networks, MANETs (Mobile Ad-hoc Networks) and etc., they cannot be applied to M2M sensor networks directly. Motivated by this consideration, we develop a secure and distributed access control scheme based on proxy signature for M2M sensor networks, which provides strong authentication and achieves efficiency. Moreover, security of the proposed technique does not rely on availability of a secure channel. © Maxwell Scientific Organization, 2013. Source


Jiang Y.,Kunming University of Science and Technology | Jiang Y.,Yunnan Key Laboratory of Computer Technology Application | Jiang Y.,Peking University | Jin L.,Advanced Digital Technology Co. | And 3 more authors.
Advances in Intelligent Systems and Computing | Year: 2013

The major objective of Component Based Software Development (CBSD) is to reduce the cost and time of software development by reusing available components. Testing is an important phase in CBSD. During the process of component testing reuse, the storage and management of test information play a key role. As a result, it is important to research the issues about the information library for component testing. This paper presents an infrastructure of component test information library. Firstly, the architecture of the library is established. Then the component model for test information description is extended based on BIDM. Towards the main functions of test information library, the classification schemes, retrieval strategy, verification and evaluation method are proposed. As a support for component developers, reusers and the third party, the information library for component testing and its functions will be helpful for component testing and reuse. © 2013 Springer-Verlag. Source

Discover hidden collaborations