logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 10: 108102(2016) https://doi.org/10.1007/s11432-015-0856-7

Multi-objective evaluation and optimization on trustworthy computing

More info
  • ReceivedMar 1, 2016
  • AcceptedApr 19, 2016
  • PublishedSep 13, 2016

Abstract


Funded by

National Natural Science Foundation of China(61472199)

Tsinghua University Initiative Scientific Research Program(20121087999)


Acknowledgment

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant No. 61472199), Tsinghua University Initiative Scientific Research Program (Grant No. 20121087999).


References

[1] Liu K, Shan Z G, Wang J, et al. Overview on major research plan of trustworthy software. Bulletin National Natural Sci Found China, 2008, 22: 145-151 Google Scholar

[2] Tao H, Chen Y. A new metric model for trustworthiness of softwares. Telecommun Syst, 2012, 51: 95-105 CrossRef Google Scholar

[3] Wang J, Chen Y X, Gu B, et al. An approach to measure and grading software trust for spacecraft software (in Chinese). Sci Sin Tech, 2015, 45: 221-228 Google Scholar

[4] Nguyen T P K, Beugin J, Marais J. Method for evaluating an extended fault tree to analyse the dependability of complex systems: application to a satellite-based railway system. Reliab Eng Syst Safe, 2015, 133: 300-313 CrossRef Google Scholar

[5] Mo Y C. A multiple-valued decision-diagram-based approach to solve dynamic fault trees. IEEE Trans Reliab, 2014, 63: 81-93 CrossRef Google Scholar

[6] Catelani M, Ciani L, Venzi M. Sensitivity analysis with MC simulation for the failure rate evaluation and reliability assessment. Measurement, 2015, 74: 150-158 CrossRef Google Scholar

[7] Xu M, Zhang L, Jansen D N, et al. Multiphase until formulas over Markov reward models: an algebraic approach. Theor Comput Sci, 2016, 611: 116-135 CrossRef Google Scholar

[8] Zhu J X. A trustworthy software designing approach and credibility evaluation. Appl Mecha Mater, 2014, 513: 602-605 Google Scholar

[9] Alexander P, Pike L, Loscocco P, et al. Model checking distributed mandatory access control policies. ACM Trans Inf Syst Secur (TISSEC), 2015, 18: 6-605 Google Scholar

[10] Hu J, Lin C, Li X, et al. Scalability of control planes for software defined networks: modeling and evaluation. In: Proceedings of IEEE 22nd International Symposium of Quality of Service (IWQoS), Hong Kong, 2014. 147--152. Google Scholar

[11] Chen Y, Huang J, Lin C. Partial selection: an efficient approach for QoS-aware web service composition. In: Proceedings of IEEE International Conference on Web Services (ICWS), Anchorage, 2014. 1--8. Google Scholar

[12] Lin C, Chen Y, Huang J, et al. A survey on models and solutions of multi-objective optimization for QoS in services computing. Chinese J Comput, 2015, 38: 1907-1923 Google Scholar

[13] Bard J F. Practical Bilevel Optimization: Algorithms and Applications. Berlin: Springer Science Business Media, 2013. Google Scholar

[14] Jiang M, Meng Z, Shen R, et al. A quadratic objective penalty function for bilevel programming. J Syst Sci Complex, 2014, 27: 327-337 CrossRef Google Scholar

[15] Zhou A, Jin Y, Zhang Q. A population prediction strategy for evolutionary dynamic multiobjective optimization. IEEE Trans Cybernet, 2014, 44: 40-53 CrossRef Google Scholar

[16] Wu Y, Jin Y, Liu X. A directed search strategy for evolutionary dynamic multiobjective optimization. Soft Comput, 2015, 19: 3221-3235 CrossRef Google Scholar

[17] Lin Q, Chen J. A novel micro-population immune multiobjective optimization algorithm. Comput Oper Res, 2013, 40: 1590-1601 CrossRef Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1