Wang Xiaolin

Work place: School of Computer Science & Technology, Shandong University, Jinan, P. R .China

E-mail:

Website:

Research Interests:

Biography

Author Articles
Statistical Analysis on Curriculum of the National Model School of Software Engineering

By Zhang Gang Wang Xiaolin

DOI: https://doi.org/10.5815/ijeme.2012.08.02, Pub. Date: 29 Aug. 2012

This paper analyzes the curriculum referred to the software engineering undergraduate programs of 31 software schools in the 36 national model schools of software engineering (NMSSE) and analyzes the distribution of the courses. The result shows that the core courses offered by NMSSE cover the core courses released by the teaching guidance committee of computer science and technology of higher school under the Ministry of Education (TGC) and the optional courses are not consistent in the programs of NMSSE. The analysis result can be severed as a resource for improving programs and changing the curriculum in software engineering at the undergraduate level. Also it can provide the references for revising the professional norms.

[...] Read more.
An Initiative Mechanism of Safe-guarding the Codes of Migrating Instance in Migrating Workflow Based on Danger Theory

By Li Baohui Han Fangxi Wang Xiaolin

DOI: https://doi.org/10.5815/ijeme.2012.06.12, Pub. Date: 29 Jun. 2012

The mobility of Migrating Instance(MI) brings many risks to the migrating workflow system. Especially, the codes of MI face the risk of being maliciously manipulated by the hostile working places. This paper presents an initiative mechanism of safe-guarding the codes of MI based on danger theory: for MI consists of several modules in order to complete relative tasks, MI will detect whether the block MI determines to run changed before executing. If there are some changes, MI will then perceive whether the changes dangerous; if dangerous, appropriate measures will be taken to amend the damaged codes and then obfuscate them lest this module will be attacked easily again. This mechanism improves the efficiency of MI compared with other mechanism, and makes MI avoid temporary attacks, which are illustrated with the experimental results at the end of this paper.

[...] Read more.
Other Articles