CN104182235A - Software architecture system and design method used for solving sneak path of software - Google Patents

Software architecture system and design method used for solving sneak path of software Download PDF

Info

Publication number
CN104182235A
CN104182235A CN201410424481.9A CN201410424481A CN104182235A CN 104182235 A CN104182235 A CN 104182235A CN 201410424481 A CN201410424481 A CN 201410424481A CN 104182235 A CN104182235 A CN 104182235A
Authority
CN
China
Prior art keywords
function
software
controller
data
called
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410424481.9A
Other languages
Chinese (zh)
Other versions
CN104182235B (en
Inventor
康一梅
姚赟政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201410424481.9A priority Critical patent/CN104182235B/en
Publication of CN104182235A publication Critical patent/CN104182235A/en
Application granted granted Critical
Publication of CN104182235B publication Critical patent/CN104182235B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention provides a software architecture system and design method used for solving sneak path of software. The design mode of the architecture system is to divide a software system into an advocate tone function component module, a called function component module, a controller component module, an event component module and a data component module; the controller component module is added among all data interaction of a program, so that overall management of data between an event and the modules can be realized; the interior of the controller component module comprises a timer component, a function processing component and a function registering component, and the controller component module is used for controlling time for data interaction among the modules; if the data do not return within the required time, one fault datum is forced to return through the function processing component, and the calling process of the fault function is completed. The software architecture system and design method has the advantages that the components can be reused, prototype design is performed step by step, the components can be parallelly developed without mutual influence, most importantly, the problem about the sneak path is solved, and stability and robustness of the software are improved.

Description

A kind of for solving software architecture system and the method for designing of software sneak path
Technical field
The present invention relates to a kind of DEPC (abbreviations of data Data, event Event, processing Process, tetra-English words of controller Controller) architecture management system and implementation method, specifically be a kind of software architecture system and method for designing of the data interaction between each module of program being carried out to global administration, this software architecture is independent of the actual realization of hardware cell function and controls; Belong to field of computer technology.
Background technology
Originally, people, in the selection that focuses on Data Structure and Algorithm of Software for Design, along with software systems scale is increasing, become increasingly complex, and the structure of whole system and specification seem more and more important.For large-scale complicated software system, overall system structure design and specification are compared with the algorithm calculating and the selection of data structure have obviously been become to much important.Since software systems are divided into number of modules first, between module, interact again, the whole attribute that combines, has just had architecture.
Before 20 century 70s, software development is designed to main with assembly routine.Because system scale is at that time less, so there is no the concept of software system structure.OO development approach started to rise and was progressively ripe to the mid-90 the eighties in 20 century.After the nineties in 20th century, enter into the software development phase based on member, this stage, software intensive exploitation adopted Component Technology and architecture technique centered by process, required the software of developing to possess very strong adaptivity, interoperability, expansibility and reusability.The appearance of software architecture, makes the software division of labor at all levels clear and definite, non-interference.Having there is variation in the demand of certain level, just only need to change the code in equivalent layer, can not have influence on code in other layer.
Yet the architecture mode that real-time software is conventional mainly contains traditional poll architecture, function queue architecture, AM/BAM (interruption) architecture and the layered architecture based on operating system.The architectures such as MVC, SOA that the application software of moving on personal computer and server at present adopts are not suitable for real-time software.Most of real-time softwares only have less man-machine interaction, even there is no man-machine interaction, can regard man-machine interaction as event.In real-time software, there is a large amount of events, these events event that not necessarily man-machine interaction produces, the circulation of all these events meeting control programs, such as interruption, and many events occur often at random, this event is easy to cause program sneak path.
As far back as the eighties in 20th century, people have taken up the analysis and research to software sneak path.Sneak path refers to some potential path in software systems, and they belong to not in calculated path, is that people do not wish to occur.Sneak path always exists, because subsystem design personnel lack the overall point of view of total system or the behavior of some carelessness, logical problem while having some to be Software for Design, also have some data interactions to be difficult to by look-ahead, even also have some sneak paths because electromagnetic interference (EMI) or other factors cause.
Cause a lot of because have of software sneak path, here can be for an example that may produce software sneak path.At present in real-time software design, to the processing of interrupting normally according to its priority, the interruption that priority is high can be seized system resource, and this is to the state of the processing procedure being preempted, preserve, the processing procedure that has continued to be suspended after interruption is finished dealing with.But these all need developer to go one by one to process, many times may occur not preserving and be preempted the state of processing procedure or preserve imperfect.Be as shown in Figure 1 one due to the sneak path interrupt producing, if reckon without this situation during design, probably routine call is not returned.The appearance meeting of sneak path problem carries out many imprevisions and the uncontrollable factor brought to program.If sneak path is not done to necessary processing program is in service, bring huge risk will to whole software project engineering.
If add one deck control member layer between the member that likely produces data interaction, carry out overall situation supervision, be used for avoiding the generation of above-mentioned situation, the sneak path problem occurring in can effectively carrying out program is processed, in controller member, add timer function simultaneously, can avoid program to carry out and occur unlimited situation about waiting for, the time that in Ye Neng real-time software, constraint program is carried out.
At home and abroad there is no at present the pertinent literature report of the sneak path problem occurring in settlement procedure operational process.
Summary of the invention
The technology of the present invention solution: overcome the deficiencies in the prior art, a kind of DEPC architecture management system and implementation method are provided, the sneak path problem occurring in settlement procedure operational process; Can be applied in real-time software and non real-time software; The programming language using while not being limited to development sequence; Can represent public high-level abstract of system; Contribute to incremental prototype; Support member concurrent development, and be independent of each other.
The technology of the present invention solution: 1, a kind of for solving the software architecture system of software sneak path, it is characterized in that when software development, software is divided into homophony function member, called function member, event member, data members and controller member five parts; Wherein:
Homophony function member, realizes the power function that invoke user defines, and the function information that needs are called is given controller member and processed;
Called function member, realizes and processes the concrete data processing of correspondence system and process, and by controller member, is called, and then result is returned to controller member;
Event member, realizes all events that may occur in correspondence system of processing, and as interruption or interconnection network etc., by controller member, is called, and then result is returned to controller member;
Controller member, realization manages and controls the data interaction that may occur in program, the module information that homophony function will call is given controller member, controller member is when calling concrete called function, utilize timer to carry out timing to the implementation of called function, if program is not normally returned within the time of expection, force disconnect executive process, returns to an abnormal data; The another one function of controller member is to need the function registration that controller is controlled to enter function information list;
Data members, provides the member of visit data structure, file, database definition and storage data-interface.
Software systems are divided into data (Data), event (Event), processing (Process), four parts of controller (Controller), and wherein processing is divided into homophony processing and is adjusted two kinds of situations of processing.
Sneak path refers to some potential path in software systems, and they belong to not in calculated path, is not wish to occur.The appearance meeting of sneak path problem carries out many imprevisions and the uncontrollable factor brought to program.If sneak path is not done to necessary processing program is in service, bring huge risk will to whole software project engineering.
Due to many-sided reason, sneak path be always present in software system data mutual in.Add one deck controller components layer, carry out overall situation supervision, be used for avoiding the generation of above-mentioned situation, the sneak path problem occurring in can effectively carrying out program is processed, in controller member, add timer function simultaneously, can effectively avoid occurring in program execution the situation of unlimited wait, the time that in Ye Neng real-time software, constraint program is carried out.
Controller member is the core component in DEPC architecture mode, and it is monitored current event, state, data, provides that corresponding mechanism coordination event is corresponding, state is hung up, data are preserved, and preserves correct path and carries out, and block the execution of sneak path.
Described homophony function member need to comprise program principal function, the power function of the namely entrance function of program, and other user oneself definition.
Described controller member needs inclusion function processing components, timer assembly and component registration.Wherein component registration is for depositing the function information (comprising function name, function parameter list, function return type) that needs function processing components to process; Timer assembly is according to the clock of program institute application system platform, and the time that certain thread is moved is carried out timing; Function processing components is by the function information of importing into according to homophony function, from function list, find called function information, then set up two threads, a thread is used for carrying out called function, and another thread carries out timing working time for the called function to carrying out.
For solving a Software Architecture Design Method for software sneak path, performing step is as follows:
(1) program development personnel, when set up item engineering, set up controller (Controller), data processing (DataProcessing), event handling (DataProcessing), four files of power function (Functions) or bag under project directory;
(2) in power function bag, write principal function and other main called function;
(3) in data processing bag, write for accessing database, related function that database data is operated;
(4) in event handling bag, write the event functions that may occur for realizing all programs such as interrupt operation, network data communication operation;
(5) in controller bag, need to write timer function, function processing function and function registration function, while writing timer function, need to write according to the clock module of institute's application system, current time of reading system first when timer is started working, during program operation, do not stop to obtain up-to-date system time, subtract each other and can obtain the time that program has been moved with the start time, if exceed the schedule time, will force to finish called function process, and return to wrong numerical value; Function registration function need to be constructed one for depositing the storage space of function information, can be a file, a data structure or a table etc., and the function information of depositing comprises function name, function return value, function parameter list; Function is processed function need to realize the function of searching called function from function list, find after function information, can set up two processes, a process is used for carrying out called function, and a process is carried out timing for carrying out timer to the time of called function operation;
(6) can, at controller, event handling, data processing, power function with under first class catalogue, set up resource and header file catalogue, for depositing the header file information of picture, audio and video resources and function.
The present invention's advantage is compared with prior art:
(1) the invention provides the most basic a kind of DEPC architecture frame, for programmer, it is better understood and is applied, the more important thing is that programmer is when developing software, can use the global design thought of DEPC architecture.For different application scenarioss, DEPC architecture can be carried out suitable expansion and adjustment.
(2) range of application of the present invention is wider, the programming language using while not being limited to development sequence, and can be applied in real-time software and non real-time software.Controller member mainly contains two effects, and the one, the data between member are carried out to global administration, the 2nd, to controling effectively the working time of program.The present invention also provides a kind of basic controller member implementation.Due in different application scenarioss, software is also not quite similar to the specific requirement of controller.Such as different soft projects is different to tolerable working time of its each task process and service requirement; In non real-time software, not that each task needs to process by controller member, as long as registration needs the mission function of controlling to get final product etc.So controller member is also relatively to revise and to adjust according to different situations.
(3) the present invention can effectively solve the sneak path problem occurring in software running process.In current software development, also there is no a kind of effective solution for software sneak path, the design of DEPC can be described as and made up this blank.Use DEPC software architecture to come design software effectively to the sneak path occurring in software running process, to process, can greatly improve like this safety and reliability of software integral body.
(4) the invention provides a kind of software architecture that contributes to incremental prototype.When software development, hierarchical design can be analyzed project, and by project by constructing prototype by execution model.From two aspects, contribute to carrying out smoothly of development activities, the one, can be in the clearly potential system performance problems of the commitment of software life-cycle; The 2nd, at the commitment of software life-cycle, just can obtain an executable system.These two aspects all will reduce the potential risk of project development.
(5) the present invention can represent public high-level abstract of system.Most of related personnel of system can form unified understanding using it as setting up a basis of understanding mutually, mutually exchanges.The constraint condition that DEPC software architecture is clear and definite realizes system, by meeting the described structural design decision of architecture and be divided into the member of regulation, mutual in prescribed way.So the deviser of DEPC software configuration needs not be algorithm designer or is proficient in programming language, only needs the overall trade-off problem of emphasis taking into account system; And the developer of member develops under the given constraint of architecture.Such design, makes homophony member, is adjusted member, control member, event member and data members logically to keep relative independentability, thereby make the logical organization of whole system more clear, can improve maintainability and the expansibility of system and software.
Accompanying drawing explanation
Fig. 1 is for interrupting producing the situation of sneak path;
Fig. 2 is DEPC architecture management system construction drawing of the present invention, has reflected the mode of carrying out data interaction between each member;
Fig. 3 is the relation between timer assembly, processing function assembly, registration function assembly and homophony function assembly and the called function assembly in middle controller member of the present invention.The data interaction direction that the direction of arrow expresses possibility and exists, function registration list represents file or the data structure of storage function information;
Fig. 4 is the component registration workflow in middle controller member of the present invention, after a function is realized, if need to carry out overall control to it, need to utilize registration function to register it, then registration function deposits the function information (function name, function parameter, function return value) of registration in function list in;
Fig. 5 is the processing components workflow in middle controller member of the present invention, when the called function of homophony function call, processing components can be searched function from registration function list, then create two processes, one for carrying out called function, and another is for calling timer timing, whether the execution of the called function of judgement surpasss the expectation the time, and result is returned the most at last;
Fig. 6 shows the timer assembly workflow in controller member.Timing bench starts timing after receiving the order of function processing components timing, and whether determining program has exceeded the time of predetermining working time simultaneously, if exceed the time, pressure is returned to a misdata;
Fig. 7 shows the workflow diagram of image acquisition subsystem in the face identification system based on 3G network;
Fig. 8 shows the workflow diagram of recognition subsystem in the face identification system based on 3G network.
Embodiment
The simple words that below comprises term, initialism and abbreviation, will contribute to understand the detailed description of the following examples, but these details is not meant to limit the present invention.Those skilled in the art obviously can put into practice the present invention in departing from other embodiment of these details.For example, although be to describe the present invention with the embodiment of the face identification system based on 3G network, the present invention also can be applied in and comprise arbitrarily in real-time software and non real-time software.
Term " comprises " and " comprising " and derivative thereof represent non-limiting comprising; Term "or" is inclusive, mean and/or; Phrase " with ... be associated " can represent to comprise with " associated " and derivative thereof, be included, interconnect with it, comprise, involved, be attached thereto, be coupled with it, can communicate by letter with it, cooperate with it, interweave, side by side, approach, be limited to, have, have its character etc.; " member " is the reusable software module of software-oriented architectural framework.Member (component) is reusable software composition, can be used to construct other software, and member is commonly referred to as packed object class, class tree and some functional modules in the present invention; " assembly " refers to the simplified package to data and method; " DEPC " refers to the abbreviation of data (Data), event (Event), processing (Process), four English words of controller (Controller)." 3G network " refers to the circuit of the 3G (Third Generation) Moblie technology of using the honeycomb mobile communication technology of supporting high speed data transfer and the communication network that equipment laying forms.
In order to verify the validity of DEPC architecture Design pattern, we have adopted and have used the present invention and realize a face identification system based on 3G network without two kinds of modes of the present invention.As shown in Figure 7 and Figure 8, reflected from top to bottom the main flow process of the face identification system based on 3G network, this system consists of image capturing system and two subsystems of recognition system.Image capturing system is only responsible for gathering people's face data, then the people's face data that collect is transferred to recognition system by 3G network.Recognition system receives after original image information, image information is carried out to analyzing and processing, extract after people's the feature such as face, eyes, nose, mouth, eyebrow, with the image in database, compare, judge whether to have corresponding people's face information, finally object information is sent it back to image acquisition end by 3G network again.Image acquisition termination shows result by display screen after receiving return message.
In this system, one has four key nodes.Be respectively that judging whether in image capturing system starts image acquisition and wait for receiving feedback information, the wait in face identification system receives the view data collecting and from face database, mates face characteristic data.
When user starts to carry out image acquisition, need manual triggers to interrupt (as touching the button), tell image capturing system to start acquisition of image data.After data acquisition, by mobile Internet, information is passed to face identification system.Face identification system need to ceaselessly be waited for reception view data.When having new view data to need recognition system to receive, be also the mode of interrupting by triggering, tell recognition system to start to receive data.We can see, exist a lot of labile factors in this system.By common non-DEPC software architecture, realize after this system, when the quick continuous triggering collection image of user interrupts, there is situation about crashing in program, shows that program has entered sneak path sometimes.When the timing of 3G swinging of signal, also can cause the problem of system wait overlong time.
While adopting DEPC architecture to design this system, the event that we trigger interruption by user is divided into event member, the face database that will access is divided into data members, other function calls are followed successively by homophony member and are adjusted member, finally also between these members, have increased control member and have controlled for the overall situation.Like this, user triggers interruption at every turn, all can be processed by control member, and the generation of sneak path has effectively been avoided in such design.During access face database, need calling data member, avoid other users directly database to be conducted interviews, security has had very high lifting.When image capturing system and face identification system carry out communication by 3G network, control member can carry out timer supervision, if network communication has exceeded official hour requirement, control member can be forced return message reminder-data to send overtime or data to send unsuccessfully.
Figure 7 shows that the process flow diagram of video acquisition subsystem.When realizing acquisition subsystem, whole code is distributed in controller, power function, three bags of event.In controller bag, deposited and processed function, timer function, registration function and function information table; Principal function, image acquisition function in power function bag, have been deposited; In event bag, deposit button and interrupted processing function, network service function.
Before system operation, need image acquisition function, button interruption processing function and network service function to register, as shown in Figure 4, realize after image acquisition function, button interruption processing function and network service function, their function name, parameter list and rreturn value type information need to be left in function information table.When user wants to gather image, by triggering and interrupt processing function by physical button, interrupt as shown in Figure 3 processing function notification controller and need to call image acquisition function, controller finds called function information from function information list, then the function in controller is processed function call image acquisition function as shown in Figure 5, starts timer to carrying out timing the working time of called function simultaneously.After being collected image, by network service function, send the image information getting to recognition of face subsystem.In the process of function call, all need to process by the processing function in controller member, processing function can call timer function the execution time of function is calculated and controlled, and the words that exceed as shown in Figure 6 the time return to pressure to misdata.
Figure 8 shows that the process flow diagram of recognition of face subsystem.When realizing recognition of face subsystem, whole code is distributed in controller, power function, event and four bags of data.In controller bag, deposited and processed function, timer function, registration function; Principal function, feature extraction function, aspect ratio in power function bag, have been deposited to function, result feedback function; In event bag, deposited network service function; In packet, deposited visit data built-in function.
Before system operation, need feature extraction function, aspect ratio to register function, result feedback function, network service function, visit data built-in function, as shown in Figure 4, realization character extract function, aspect ratio to function, result feedback function, network service function, visit data built-in function after, their function name, parameter list and rreturn value type information need to be left in function information table.When recognition of face subsystem receives after new image data, notification controller need to call feature extraction function as shown in Figure 3, controller finds called function information from function information list, then the function in controller is processed function call feature extraction function and will the data that collect be carried out to face characteristic extraction and calculating as shown in Figure 5, starts timer to carrying out timing the working time of called function simultaneously.Then call aspect ratio to function, everyone the face data in accessing database, have judged whether matched data, then the data after comparison are returned to acquisition subsystem.In the process of function call, all need to process by the processing function in controller member, processing function can call as shown in Figure 6 timer function the execution time of function is calculated and controlled, such as if time and the time that surpasss the expectation lasting time of network service that accessing database is carried out return to pressure to misdata, do not surpass the expectation the time, will return to correct data.
By the checking of actual items, while finding to adopt DEPC software architecture coding, the travelling speed of program can decline a little to some extent, but the stability of entire system and reliability but have huge lifting.

Claims (4)

1. for solving a software architecture system for software sneak path, it is characterized in that: when software development, software is divided into homophony function member, called function member, event member, data members and controller member five parts; Wherein:
Homophony function member, realizes the power function that invoke user defines, and the function information that needs are called is given controller member and processed;
Called function member, realizes and processes the concrete data processing of correspondence system and process, and by controller member, is called, and then result is returned to controller member;
Event member, realizes and processes all events that may occur in correspondence system, comprises and interrupting or interconnection network, by controller member, is called, and then result is returned to controller member;
Controller member, realization manages and controls the data interaction that may occur in program, the module information that homophony function will call is given controller member, controller member is when calling concrete called function, utilize timer to carry out timing to the implementation of called function, if program is not normally returned within the time of expection, force disconnect executive process, returns to an abnormal data; The another one function of controller member is to need the function registration that controller is controlled to enter function information list;
Data members, provides the member of visit data structure, file, database definition and storage data-interface.
2. according to claim 1 for solving the software architecture system of software sneak path, it is characterized in that: described homophony function member need to comprise program principal function, the power function of the namely entrance function of program, and other user oneself definition.
3. according to claim 1 for solving the software architecture system of software sneak path, it is characterized in that: described controller member inclusion function processing components, timer assembly and component registration, wherein component registration is for depositing the function information that needs function processing components to process, and described function information comprises function name, function parameter list, function return type; Timer assembly is according to the clock of program institute application system platform, and the time that certain thread is moved is carried out timing; Function processing components is by the function information of importing into according to homophony function, from function list, find called function information, then set up two threads, a thread is used for carrying out called function, and another thread carries out timing working time for the called function to carrying out.
4. for solving a Software Architecture Design Method for software sneak path, it is characterized in that: performing step is as follows:
(1) program development personnel, when set up item engineering, set up controller (Controller), data processing (DataProcessing), event handling (DataProcessing), four files of power function (Functions) or bag under project directory;
(2) in power function bag, write principal function and other main called function;
(3) in data processing bag, write for accessing database, related function that database data is operated;
(4) in event handling bag, write the event functions that may occur for realizing all programs such as interrupt operation, network data communication operation;
(5) in controller bag, need to write timer function, function processing function and function registration function, while writing timer function, need to write according to the clock module of institute's application system, current time of reading system first when timer is started working, during program operation, do not stop to obtain up-to-date system time, subtract each other and obtain the time that program has been moved with the start time, if exceed the schedule time, will force to finish called function process, and return to wrong numerical value; Function registration function need to be constructed one for depositing the storage space of function information, can be a file, a data structure or a table, and the function information of depositing comprises function name, function return value, function parameter list; Function is processed function need to realize the function of searching called function from function list, find after function information, can set up two processes, a process is used for carrying out called function, and a process is carried out timing for carrying out timer to the time of called function operation;
(6) can, at controller, event handling, data processing, power function with under first class catalogue, set up resource and header file catalogue, for depositing the header file information of picture, audio and video resources and function.
CN201410424481.9A 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software Active CN104182235B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410424481.9A CN104182235B (en) 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410424481.9A CN104182235B (en) 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software

Publications (2)

Publication Number Publication Date
CN104182235A true CN104182235A (en) 2014-12-03
CN104182235B CN104182235B (en) 2017-04-12

Family

ID=51963314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410424481.9A Active CN104182235B (en) 2014-08-26 2014-08-26 Software architecture system and design method used for solving sneak path of software

Country Status (1)

Country Link
CN (1) CN104182235B (en)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833455B (en) * 2010-05-13 2012-10-10 北京大学 Code splitting method for converting traditional software into rich client software
CN102331733A (en) * 2010-07-14 2012-01-25 中国科学院沈阳计算技术研究所有限公司 Numerical control system logic controller on basis of system on programmable chip and implementing method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖杰浩: "基于Hibernate和Struts的J2EE应用开发研究", 《开发与应用》 *

Also Published As

Publication number Publication date
CN104182235B (en) 2017-04-12

Similar Documents

Publication Publication Date Title
US7805482B2 (en) Method of correlating events in data packet streams
CN100507856C (en) Methods and apparatus for detecting deadlock in multithreading programs
CN103064690B (en) A kind of Development Framework based on Android operation system and the method for execution thereof
US8863131B2 (en) Transaction load reduction for process completion
CN111400326A (en) Smart city data management system and method thereof
CN109033109B (en) Data processing method and system
CN109189826A (en) A kind of government affairs service system based on big data
CN109302321A (en) Server, business demand processing system, method and monitoring system
WO2021233167A1 (en) Transaction processing method and apparatus, computer device, and storage medium
CN102034152A (en) SOA (Service Oriented Architecture) based heterogeneous software system data integration method and system
Gabrel et al. Optimal and automatic transactional web service composition with dependency graph and 0-1 linear programming
CN103049264A (en) Method for controlling business system by dynamic modeling of state machine
CN107239563A (en) Public feelings information dynamic monitoring and controlling method
US20150324482A1 (en) Network graph generation method and decision-making assistance system
Debreceni et al. Property-based locking in collaborative modeling
CN105912740A (en) CAE distributed cooperative work method based on cloud calculation
CN110807587B (en) Flow model security verification method and device
CN100547967C (en) Mesh operation supervisor and grid job management method
El Fallah-Seghrouchni et al. A formal study of interactions in multi-agent systems
CN107704473A (en) A kind of data processing method and device
CN104182235A (en) Software architecture system and design method used for solving sneak path of software
Balko et al. In-memory business process management
CN110109973A (en) A kind of cloud computing system data processing method
CN108764607A (en) User month data reinspection method, apparatus, equipment and storage medium
Zhang Enhancing Data Processing on Clouds with Hadoop/HBase

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant