Most transactional memory (TM) research focused on multi-core processors, and others investigated at the clusters, leaving the area of non-uniform memory access (NUMA) system unexplored. The existing TM implementation...Most transactional memory (TM) research focused on multi-core processors, and others investigated at the clusters, leaving the area of non-uniform memory access (NUMA) system unexplored. The existing TM implementations made significant performance degradation on NUMA system because they ignored the slower remote memory access. To solve this problem, a latency-based conflict detection and a forecasting-based conflict prevention method were proposed. Using these techniques, the NUMA aware TM system was presented. By reducing the remote memory access and the abort rate of transaction, the experiment results show that the NUMA aware strategies present good practical TM performance on NUMA system.展开更多
This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and con...This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and conflict solution sequence.Considering pipe routing as an assembling process,a conflict detection approach for pipe routing in collaborative architectural design is proposed based on an aforementioned model.Constraint network is used to describe the relationship among pipe routing design parameters and constraints;design conflicts are detected by matching designers' input and constraint network;and detected design conflicts are reordered according to the number of pipe parameters in conflicts.In order to support the collaborative requirement of pipe routing design,a prototype system using browser/server architecture is developed.An illustrative example of water pipe routing in a room is used to show the effectiveness and efficiency of the approach.展开更多
The conflict detection and resolution in collaborative design is a key issue to maintain multi disciplinary design consistency. This paper proposes a new method for conflict detection and resolution based on constrain...The conflict detection and resolution in collaborative design is a key issue to maintain multi disciplinary design consistency. This paper proposes a new method for conflict detection and resolution based on constraint satisfaction technique. The representation of design constraint, the interval arithmetic of the constraint satisfaction problem CSP and the conflict resolution strategy based on constraint relaxation and adjustment are introduced. A constraint satisfaction based conflict detection and resolution tool CSCDR is then developed. It can help collaborative designers to detect and resolve the conflicts in time in the early stage of the design process so that the unnecessary design iteration and repeated negotiation are avoided and the design efficiency is then much improved. A design case illustrates the effectiveness of CSCDR.展开更多
Engineering-oriented constraint of harness technology has much information and project information presents progressive changes along with the design. Therefore, how to handle conflict resolution quickly is a problem ...Engineering-oriented constraint of harness technology has much information and project information presents progressive changes along with the design. Therefore, how to handle conflict resolution quickly is a problem to be solved. Process model of con- flict detection is put forward according to characteristics of harness technology design engineering-oriented constraint, and then two problems of how to conduct conflict positioning and judgment of constraint rules are introduced in this paper. Afterwards in this pa- per, constraint information directed acyclic graph is established by classified project constraint information to solve the conflict posi- tioning problem; solution of constraint satisfaction problem is applied to realize judgment problem of constraint rules. Finally, exam- ple is used to analyze the method in this paper to further verify the correctness and effectiveness of this method.展开更多
Conflict Detection and Resolution(CD&R) is the key to ensure aviation safety based on Trajectory Prediction(TP). Uncertainties that affect aircraft motions cause difficulty in an accurate prediction of the trajec...Conflict Detection and Resolution(CD&R) is the key to ensure aviation safety based on Trajectory Prediction(TP). Uncertainties that affect aircraft motions cause difficulty in an accurate prediction of the trajectory, especially in the context of four-dimensional(4D) Trajectory-Based Operation(4DTBO), which brings the uncertainty of pilot intent. This study draws on the idea of time geography, and turns the research focus of CD&R from TP to an analysis of the aircraft reachable space constrained by 4D waypoint constraints. The concepts of space–time reachability of aircraft and space–time potential conflict space are proposed. A novel pre-CD&R scheme for multiple aircraft is established. A key advantage of the scheme is that the uncertainty of pilot intent is accounted for via a Space-Time Prism(STP) for aircraft. Conflict detection is performed by verifying whether the STPs of aircraft intersect or not, and conflict resolution is performed by planning a conflict-free space–time trajectory avoiding intersection. Numerical examples are presented to validate the efficiency of the proposed scheme.展开更多
Despite extensive research on R-trees, most of the proposed schemes have notbeen integrated into existing DBMS owing to the lack of protocols of concurrency control. R-linktree is an acceptable data structure to deal ...Despite extensive research on R-trees, most of the proposed schemes have notbeen integrated into existing DBMS owing to the lack of protocols of concurrency control. R-linktree is an acceptable data structure to deal with this issue, but problems like phantom still exist.In this paper, we focus on a conflict detection scheme based on R-link tree for completeconcurrency control. An in-memory operation control list is designed to suspend conflictingoperations . The main features of this approach are (1) it can be implemented easily and does notneed any extra information ; (2) No deadlocks are involved in locking scheme ; (3) Non-conflictingoperations are not restricted ; and (4) Phantom problems in R-link tree are avoided throughbeforehand predication . The experiment results show that this scheme is correct and gains bettersystem performance.展开更多
The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective co...The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective conflict detection and resolution methods to maintain the consistency of authorization polices in WFMSs.To address these concerns,we propose the definition of authorization policies in which context constraints are considered and the complicated requirements in WFMSs can be satisfied.Based on the definition,we put forward static and dynamic conflict detection methods for authorization policies.By defining two new concepts,the precedence establishment rule and the conflict resolution policy,we provide a flexible approach to resolving conflicts.展开更多
In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algor...In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algorithm improves the traditional flight conflict detection method in two aspects:(i) New observation data are integrated into system state transition probability, and Gauss-Hermite Filter(GHF) is used for generating the importance density function.(ii) GHPF is used for flight trajectory prediction and flight conflict probability calculation. The experimental results show that the accuracy of conflict detection and tracing with GHPF is better than that with standard particle filter. The detected conflict probability is more precise with GHPF, and GHPF is suitable for early free flight conflict detection.展开更多
The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict dete...The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict detection.We research the global conflict detection algorithm in this paper.We presented a semantic model that captures more complete classifications of the policy using knowledge concept in rough set.Based on this model,we presented the global conflict formal model,and represent it with OBDD(Ordered Binary Decision Diagram).Then we developed GFPCDA(Global Firewall Policy Conflict Detection Algorithm) algorithm to detect global conflict.In experiment,we evaluated the usability of our semantic model by eliminating the false positives and false negatives caused by incomplete policy semantic model,of a classical algorithm.We compared this algorithm with GFPCDA algorithm.The results show that GFPCDA detects conflicts more precisely and independently,and has better performance.展开更多
Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,con...Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,considering background knowledge,we propose a conflict detection mechanism to search and locate conflicts of heterogeneous policies.First,we propose a general access control model to describe authorization mechanisms of cloud service and a translation scheme designed to translate a cloud service policy to an Extensible Access Control Markup Language(XACML)policy.Then the scheme based on Multi-terminal Multi-data-type Interval Decision Diagram(MTMIDD)and Extended MTMIDD(X-MTMIDD)is designed to represent XACML policy and search the conflict among heterogeneous policies.To reduce the rate of false positives,the description logic is used to represent XACML policy and eliminate false conflicts.Experimental results show the efficiency of our scheme.展开更多
To the issues of low efficiency of conflict resolution method in collaborative design, we proposed a method, which is conflict resolution about collaborative design based on grid services.It uses the grid services fro...To the issues of low efficiency of conflict resolution method in collaborative design, we proposed a method, which is conflict resolution about collaborative design based on grid services.It uses the grid services from the current design points, uses the method of retrospective thinking to find the conflict point by detecting, and then uses the corresponding method to resolve the conflict point according to the conflict characteristic, after that carried on the conflict detection again. If there is still the conflict, resolve the conflict point again, until the conflict no longer exists. This method combines various traditional resolution methods, makes full use of the grid idle high-performance large-scale sharing resources. With this method the collaborative design conflict resolution cost reduced and the conflict resolution efficiency was raised. And then the problem which is not handled completely was then solved, so that the conflict resolution Quality was guaranteed.展开更多
In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To ana...In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matrices of the policy set. Lastly, we conducted experiments to verify the performance of the algorithm using various spatial data sets and rule sets. The results show that the algorithm can detect all the formalized conflicts. Moreover, the algorithm's efficiency is more influenced by the spatial object granularity than the size of the rule set.展开更多
In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution com...In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution commands for the air traffic controller to verify and issue to aircraft.To understand the potential workload implications of introducing advisory conflict-detection and resolution tools,this paper examines a metric of controller taskload:how many resolution commands an air traffic controller issues under the guidance of an advisory system.Through a simulation study,the research presented here evaluates how the underlying protocol of a conflict-resolution tool affects the controller taskload(system demands)associated with the conflict-resolution process,and implicitly the controller workload(physical and psychological demands).Ultimately,evidence indicates that there is significant flexibility in the design of conflict-resolution algorithms supporting an advisory system.展开更多
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p...Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection ef- ficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.展开更多
Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an importan...Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an important issue to investigate safety management approaches of UAVs to ensure safe and efficient operation.In this paper,we present a comprehensive overview of safety management approaches in large,middle and small scales.In large-scale safety management,path-planning problem is a crucial issue to ensure safety and ordered operation of UAVs globally.In middle-scale safety management,it is an important issue to study the conflict detection and resolution methods.And in small-scale safety management,real-time collision avoidance is the last line of ensuring safety.Moreover,a UAV can be regarded as a terminal device connected through communication and information network.Therefore,the enabling technologies,such as sensing,command and control communication,and collaborative decision-making control technology,have been studied in the last.展开更多
Transaction parallelism in database systems is an attractive way of improving transaction performance. There exists two levels of transaction parallelism, inter-transaction level and intra-transaction level. With the ...Transaction parallelism in database systems is an attractive way of improving transaction performance. There exists two levels of transaction parallelism, inter-transaction level and intra-transaction level. With the advent of multi- core processors, new hopes of improving transaction parallelism appear on the scene. The greatest execution efficiency of concurrent transactions comes from the lowest dependencies of them. However, the dependencies of concurrent transactions stand in the way of exploiting parallelism. In this paper, we present Resource Snapshot Model (RSM) for resource modeling in both levels. We propose a non-restarting scheduling algorithm in the inter-transaction level and a processor assignment algorithm in the intra-transaction level in terms of multi-core processors. Through these algorithms, execution performance of transaction streams will be improved in a parallel system with multiple heterogeneous processors that have different number of cores.展开更多
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that mul...Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights.Existing approaches to access control cannot satisfy the requirements of collaborative access control.To address this concern,we propose an authorization model for collaborative access control.The central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a permission.The implementation architecture of the model is also provided.Furthermore,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.展开更多
基金Projects(61003075, 61170261) supported by the National Natural Science Foundation of China
文摘Most transactional memory (TM) research focused on multi-core processors, and others investigated at the clusters, leaving the area of non-uniform memory access (NUMA) system unexplored. The existing TM implementations made significant performance degradation on NUMA system because they ignored the slower remote memory access. To solve this problem, a latency-based conflict detection and a forecasting-based conflict prevention method were proposed. Using these techniques, the NUMA aware TM system was presented. By reducing the remote memory access and the abort rate of transaction, the experiment results show that the NUMA aware strategies present good practical TM performance on NUMA system.
基金Supported by the National High Technology Research and Development Programme of China(No.2006AA04Z112)the National Natural Science Foundation of China(No.51175287)the National S&T Major Program(No.2009ZX02001-003)
文摘This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and conflict solution sequence.Considering pipe routing as an assembling process,a conflict detection approach for pipe routing in collaborative architectural design is proposed based on an aforementioned model.Constraint network is used to describe the relationship among pipe routing design parameters and constraints;design conflicts are detected by matching designers' input and constraint network;and detected design conflicts are reordered according to the number of pipe parameters in conflicts.In order to support the collaborative requirement of pipe routing design,a prototype system using browser/server architecture is developed.An illustrative example of water pipe routing in a room is used to show the effectiveness and efficiency of the approach.
文摘The conflict detection and resolution in collaborative design is a key issue to maintain multi disciplinary design consistency. This paper proposes a new method for conflict detection and resolution based on constraint satisfaction technique. The representation of design constraint, the interval arithmetic of the constraint satisfaction problem CSP and the conflict resolution strategy based on constraint relaxation and adjustment are introduced. A constraint satisfaction based conflict detection and resolution tool CSCDR is then developed. It can help collaborative designers to detect and resolve the conflicts in time in the early stage of the design process so that the unnecessary design iteration and repeated negotiation are avoided and the design efficiency is then much improved. A design case illustrates the effectiveness of CSCDR.
基金Supported by Chinese national Science Foundation (No.61070124)the Fundamental Research Funds for the Central Universities(No.2012HGBZ0195)
文摘Engineering-oriented constraint of harness technology has much information and project information presents progressive changes along with the design. Therefore, how to handle conflict resolution quickly is a problem to be solved. Process model of con- flict detection is put forward according to characteristics of harness technology design engineering-oriented constraint, and then two problems of how to conduct conflict positioning and judgment of constraint rules are introduced in this paper. Afterwards in this pa- per, constraint information directed acyclic graph is established by classified project constraint information to solve the conflict posi- tioning problem; solution of constraint satisfaction problem is applied to realize judgment problem of constraint rules. Finally, exam- ple is used to analyze the method in this paper to further verify the correctness and effectiveness of this method.
基金financial support from the Civil Aviation Joint Funds of the National Natural Science Foundation of China (No’s.U1533203,61179069)
文摘Conflict Detection and Resolution(CD&R) is the key to ensure aviation safety based on Trajectory Prediction(TP). Uncertainties that affect aircraft motions cause difficulty in an accurate prediction of the trajectory, especially in the context of four-dimensional(4D) Trajectory-Based Operation(4DTBO), which brings the uncertainty of pilot intent. This study draws on the idea of time geography, and turns the research focus of CD&R from TP to an analysis of the aircraft reachable space constrained by 4D waypoint constraints. The concepts of space–time reachability of aircraft and space–time potential conflict space are proposed. A novel pre-CD&R scheme for multiple aircraft is established. A key advantage of the scheme is that the uncertainty of pilot intent is accounted for via a Space-Time Prism(STP) for aircraft. Conflict detection is performed by verifying whether the STPs of aircraft intersect or not, and conflict resolution is performed by planning a conflict-free space–time trajectory avoiding intersection. Numerical examples are presented to validate the efficiency of the proposed scheme.
文摘Despite extensive research on R-trees, most of the proposed schemes have notbeen integrated into existing DBMS owing to the lack of protocols of concurrency control. R-linktree is an acceptable data structure to deal with this issue, but problems like phantom still exist.In this paper, we focus on a conflict detection scheme based on R-link tree for completeconcurrency control. An in-memory operation control list is designed to suspend conflictingoperations . The main features of this approach are (1) it can be implemented easily and does notneed any extra information ; (2) No deadlocks are involved in locking scheme ; (3) Non-conflictingoperations are not restricted ; and (4) Phantom problems in R-link tree are avoided throughbeforehand predication . The experiment results show that this scheme is correct and gains bettersystem performance.
基金supported by the National Natural Science Foundation of China (Nos.50705084 and 60473129)the Science and Technology Plan of Zhejiang Province,China (No.2007C13018)
文摘The specification of authorization policies in access control models proposed so far cannot satisfy the requirements in workflow management systems(WFMSs).Furthermore,existing approaches have not provided effective conflict detection and resolution methods to maintain the consistency of authorization polices in WFMSs.To address these concerns,we propose the definition of authorization policies in which context constraints are considered and the complicated requirements in WFMSs can be satisfied.Based on the definition,we put forward static and dynamic conflict detection methods for authorization policies.By defining two new concepts,the precedence establishment rule and the conflict resolution policy,we provide a flexible approach to resolving conflicts.
基金Supported by the Joint Project of National Natural Science Foundation of ChinaCivil Aviation Administration of China(U1333116)
文摘In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algorithm improves the traditional flight conflict detection method in two aspects:(i) New observation data are integrated into system state transition probability, and Gauss-Hermite Filter(GHF) is used for generating the importance density function.(ii) GHPF is used for flight trajectory prediction and flight conflict probability calculation. The experimental results show that the accuracy of conflict detection and tracing with GHPF is better than that with standard particle filter. The detected conflict probability is more precise with GHPF, and GHPF is suitable for early free flight conflict detection.
基金supported by the National Nature Science Foundation of China under Grant No.61170295 the Project of National ministry under Grant No.A2120110006+2 种基金 the Co-Funding Project of Beijing Municipal Education Commission under Grant No.JD100060630 the Beijing Education Committee General Program under Grant No. KM201211232010 the National Nature Science Foundation of China under Grant NO. 61370065
文摘The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict detection.We research the global conflict detection algorithm in this paper.We presented a semantic model that captures more complete classifications of the policy using knowledge concept in rough set.Based on this model,we presented the global conflict formal model,and represent it with OBDD(Ordered Binary Decision Diagram).Then we developed GFPCDA(Global Firewall Policy Conflict Detection Algorithm) algorithm to detect global conflict.In experiment,we evaluated the usability of our semantic model by eliminating the false positives and false negatives caused by incomplete policy semantic model,of a classical algorithm.We compared this algorithm with GFPCDA algorithm.The results show that GFPCDA detects conflicts more precisely and independently,and has better performance.
基金This work has been funded by the National Natural Science Foundation of China(No.U1836203)the Shandong Provincial Key Research and Development Program(2019JZZY20127).
文摘Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,considering background knowledge,we propose a conflict detection mechanism to search and locate conflicts of heterogeneous policies.First,we propose a general access control model to describe authorization mechanisms of cloud service and a translation scheme designed to translate a cloud service policy to an Extensible Access Control Markup Language(XACML)policy.Then the scheme based on Multi-terminal Multi-data-type Interval Decision Diagram(MTMIDD)and Extended MTMIDD(X-MTMIDD)is designed to represent XACML policy and search the conflict among heterogeneous policies.To reduce the rate of false positives,the description logic is used to represent XACML policy and eliminate false conflicts.Experimental results show the efficiency of our scheme.
基金the National High Technology Research and Development Program of China (863 Program) (2002AA414060, 2001AA411310)the Key Science and Technology Program of Shaanxi Province (2006K05- G10)
文摘To the issues of low efficiency of conflict resolution method in collaborative design, we proposed a method, which is conflict resolution about collaborative design based on grid services.It uses the grid services from the current design points, uses the method of retrospective thinking to find the conflict point by detecting, and then uses the corresponding method to resolve the conflict point according to the conflict characteristic, after that carried on the conflict detection again. If there is still the conflict, resolve the conflict point again, until the conflict no longer exists. This method combines various traditional resolution methods, makes full use of the grid idle high-performance large-scale sharing resources. With this method the collaborative design conflict resolution cost reduced and the conflict resolution efficiency was raised. And then the problem which is not handled completely was then solved, so that the conflict resolution Quality was guaranteed.
基金supported by the National Natural Science Foundation of China(Nos.51204185 and 41674030)Natural Youth Science Foundation of Jiangsu Province,China(No.BK20140185)+1 种基金China Postdoctoral Science Foundation(No.2016M601909)the Fundamental Research Funds for the Central Universities(No.2014QNA44)
文摘In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matrices of the policy set. Lastly, we conducted experiments to verify the performance of the algorithm using various spatial data sets and rule sets. The results show that the algorithm can detect all the formalized conflicts. Moreover, the algorithm's efficiency is more influenced by the spatial object granularity than the size of the rule set.
基金funded by NASA(No.NNX08AY52A)FAA Award(No.07-C-NEGIT)+1 种基金Amendment(Nos.005,010,020)Air Force Contract(No.FA9550-08-1-0375)。
文摘In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution commands for the air traffic controller to verify and issue to aircraft.To understand the potential workload implications of introducing advisory conflict-detection and resolution tools,this paper examines a metric of controller taskload:how many resolution commands an air traffic controller issues under the guidance of an advisory system.Through a simulation study,the research presented here evaluates how the underlying protocol of a conflict-resolution tool affects the controller taskload(system demands)associated with the conflict-resolution process,and implicitly the controller workload(physical and psychological demands).Ultimately,evidence indicates that there is significant flexibility in the design of conflict-resolution algorithms supporting an advisory system.
文摘Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection ef- ficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.
基金This work was supported by the National Key Laboratory of CNS/ATM,Bei-jing Key Laboratory for Network-based Cooperative Air Traffic Manage-ment and the State Key Program of National Natural Science of China(No.71731001)。
文摘Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an important issue to investigate safety management approaches of UAVs to ensure safe and efficient operation.In this paper,we present a comprehensive overview of safety management approaches in large,middle and small scales.In large-scale safety management,path-planning problem is a crucial issue to ensure safety and ordered operation of UAVs globally.In middle-scale safety management,it is an important issue to study the conflict detection and resolution methods.And in small-scale safety management,real-time collision avoidance is the last line of ensuring safety.Moreover,a UAV can be regarded as a terminal device connected through communication and information network.Therefore,the enabling technologies,such as sensing,command and control communication,and collaborative decision-making control technology,have been studied in the last.
基金supported by the National Natural Science Foundation of China under Grant No.61073061
文摘Transaction parallelism in database systems is an attractive way of improving transaction performance. There exists two levels of transaction parallelism, inter-transaction level and intra-transaction level. With the advent of multi- core processors, new hopes of improving transaction parallelism appear on the scene. The greatest execution efficiency of concurrent transactions comes from the lowest dependencies of them. However, the dependencies of concurrent transactions stand in the way of exploiting parallelism. In this paper, we present Resource Snapshot Model (RSM) for resource modeling in both levels. We propose a non-restarting scheduling algorithm in the inter-transaction level and a processor assignment algorithm in the intra-transaction level in terms of multi-core processors. Through these algorithms, execution performance of transaction streams will be improved in a parallel system with multiple heterogeneous processors that have different number of cores.
基金Project (Nos. 2008C13073 and 2009C03015-1) supported by the Large Science and Technology Special Social Development Program of Zhejiang Province,China
文摘Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights.Existing approaches to access control cannot satisfy the requirements of collaborative access control.To address this concern,we propose an authorization model for collaborative access control.The central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a permission.The implementation architecture of the model is also provided.Furthermore,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.