Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wang Huaimin is active.

Publication


Featured researches published by Wang Huaimin.


Science in China Series F: Information Sciences | 2006

Internet-based virtual computing environment(iVCE):Concepts and architecture

Lu Xicheng; Wang Huaimin; Wang Ji

Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper presents a novel approach for the construction of the Internet-based Virtual Computing Environment (iVCE), whose significant mechanisms are on-demand aggregation and autonomic collaboration. The iVCE is built on the open infrastructure of the Internet and provides harmonious, transparent and integrated services for end-users and applications. The concept of iVCE is presented and its architectural framework is described by introducing three core concepts, i.e., autonomic element, virtual commonwealth and virtual executor. Then the connotations, functions and related key technologies of each components of the architecture are deeply analyzed with a case study, iVCE for Memory.


international multi conference on computing in global information technology | 2007

Research and Implementation of Design Pattern-Oriented Model Transformation

Wang Xue-Bin; Wu Quanyuan; Wang Huaimin; Shi Dianxi

Design pattern describes a repeatedly presenting issue during software designing, as well the solution to it. Applying design pattern enables developers to reuse it to solve a specified designing issue. Applying and maintaining design pattern in models is a duplicating work. In order to automatically apply design patterns in models, we propose a design pattern oriented model transformation approach. In this paper, we designed a set of atom mappings and pattern mappings, as well the combination of them, the model transformation code template. Such a template can generate XSLT based model transformation code, and enable automatically applying design pattern in software models. A case study is provided to demonstrate our approach.


Scientia Sinica Informationis | 2014

Research on network-based large-scale collaborative development and evolution of trustworthy software

Wang Huaimin; Yin Gang; Xie Bing; Liu Xudong; Wei Jun; Liu JiangNing

With the coming of the Internet era, great changes have taken place in the development models, runtime environments and providing styles of software. Being an open and collaborative working environment, Internet gives birth to mechanisms for successful crowd-based and collaborative creation, which have had profound impacts on development and application of software. How to combine these mechanisms with industrial approaches for trustworthy software production, and to improve the development efficiency and quality of software, are new challenging issues of software technologies in Internet era. This paper proposes a new approach for trustworthy software development based on the crowd wisdom, namely Crowd-based Method, which centers on crowd collaboration, resource sharing, runtime monitoring and trustworthiness analysis, to support the transformation from creative software works to mature software products, and supports the evolution of software. Firstly, an evidence-based concept model of trustworthy software is proposed, which classifies the data generated at the stages of software development, sharing and application as three kinds of trustworthiness evidence of software, and constructs a new process model for software evolution. Secondly, a service model for collaborative development and evolution of trustworthy software is proposed, which supports: (1) the socialized software development deeply combining the software creation and production; (2) the open and ranked trustworthy software resource sharing; and (3) the evaluation of software trustworthiness based on mass data analysis. Finally, with the background of the highly trustworthy software production tools and integrated environment (Trustie), this paper expounds the key technologies, development environments and application practices for the proposed Crowd-based Method.


international conference on pervasive computing | 2010

CBD: A Counter-Based Detection Method for VMM in Hardware Virtualization Technology

Ning Jian; Wang Huaimin; Guo Shize; Liu Bo

VMM detection technology plays increasingly vital role in the detection of malicious codes which hide themselves inside the VMM. However, the adoption of hardware virtualization technology has led to the failure of those traditional detection methods which mainly focus their attention on logic, resources and timing discrepancies between physical hardware and virtualized hardware. Based on this, a novel counter-based detection (CBD) method is proposed in this paper. It establishes a benchmark thread in the user mode while counting the number of privileged instructions’ execution times. The VMM’s presence is detected by the discrepancy between the actual execution times and theoretic execution times of the privileged instruction. Evaluation test shows that this method is feasible for the detection of both Normal and Anti-time VMM and is currently free of specific anti-detection methods.


China Communications | 2013

Resource allocation with dynamic substrate network in data centre networks

Li Xiaoling; Wang Huaimin; Ding Bo; Li Xiaoyong; Liu Hui

The resource allocation problem in data centre networks refers to a map of the workloads provided by the cloud users/tenants to the Substrate Network (SN) which are provided by the cloud providers. Existing studies consider the dynamic arrival and departure of the workloads, while the dynamics of the substrate are ignored. In this paper, we first propose the resource allocation with the dynamic SN, and denote it as GraphMap-DS. Then, we propose an efficient mapping algorithm for GraphMap-DS. The performance of the proposed algorithm is evaluated by performing simulation experiments. Our results show that the proposed algorithm can effectively solve the GraphMap-DS.


robotics and applications | 2012

CBD-OSGi: A distributed OSGi middleware

Wu Yuanli; Yang Hongqiao; Wang Hui; Wang Huaimin

As OSGi technology has been widely used in distributed environment such as pervasive computing and enterprise computing these years, standard centralized OSGi specification needs to be extended to support distributed processing. For the deficiencies of existing works in this domain, this paper proposes a CORBA-based distributed OSGi model, which aims at non-invasiveness, generality and interoperation. Based on this model, this paper designs and implements an OSGi distributed extension middleware - CBD-OSGi, which supports the remote service invocation capability with CORBA dynamic invocation and Java reflection technology. It can deploy the central OSGi applications into distributed environment transparently while keeping the service-oriented programming model and lightweight feature of OSGi. Furthermore, CBD-OSGi supports the interoperation between OSGi and CORBA applications and also has performance advantages over existing projects.


pacific rim international symposium on dependable computing | 2005

Research on control flags-based weighted authentication trustworthiness model

Wang Lunwei; He Lianyue; Liao Xiangke; Wang Huaimin

In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication trustworthiness model. The model firstly calculates the trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the users authentication trustworthiness under multiple authentication rules. By comparing users authentication trustworthiness with system access trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.


international conference on information security | 2004

AT-PAM: an authentication trustworthiness-based PAM

Wang Lunwei; Liao Xiangke; Wang Huaimin

In order to demonstrate the uncertainties in authentication system and the importance of different authentication mechanisms, this paper imports the uncertainty reasoning in expert system field, puts forwards the authentication trustworthiness factor model, then, this paper associates the authentication trustworthiness with PAM framework, puts forwards the authentication trustworthiness-based PAM (AT-PAM) framework. By authentication trustworthiness computing in AT-PAM framework, the framework gives the user his authentication trustworthiness. By comparing this value with the system logging trustworthiness threshold, the framework gives the final authentication decision. The framework keeps the advantages of PAM framework, solves the uncertainty problem in authentication system, and gives finegrained authentication control.


Archive | 2018

Cloud Robotics: A Distributed Computing View

Wang Huaimin; Ding Bo; Jie Xu

As an interdiscipline of distributed computing and robots, cloud robotics concerns augmenting robot capabilities by connecting them to the powerful backend cloud computing infrastructure. It is a field of great potential, and most recent discussions on this topic are from the point of view of robotics. In this paper, we discuss this field mainly from the aspect of distributed and cloud computing, i.e., “what distributed computing technologies can contribute to cloud robotics?” and “what challenges does cloud robotics bring to distributed computing?” This paper also presents our early experience towards a cloud robotic software infrastructure which is based on the newly-emerged edge computing model and supports the direct deployment of existing ROS (Robot Operating System) packages.


international conference on distributed computing systems workshops | 2017

JCLedger: A Blockchain Based Distributed Ledger for JointCloud Computing

Fu Xiang; Wang Huaimin; Shi Peichang; Fu Yingwei; Wang Yijie

With the development of Economic Globalization, traditional single-cloud providers can not meet the needs of the explosive, global, diverse cloud services. JointCloud aims at empowering the cooperation among multiple Cloud Service Providers (CSP) to provide cross-cloud services. Our work in this paper is mainly focused on the accounting technology for JointCloud computing and we propose the JCLedger — a blockchain based distributed ledger. A new participant CCP (Cryptocurrency Provider) is introduced into the JointCloud collaboration environment to provide the cryptocurrency transferred. We have a detailed description of JCLedger model. We further analyze the four most important mechanisms for JCLedger and provide basic perspectives for in-depth analysis. Finally, we discuss the innovations of JCLedger and our future work in this field.

Collaboration


Dive into the Wang Huaimin's collaboration.

Top Co-Authors

Avatar

Yin Gang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Shi Dianxi

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Ding Bo

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Liu Hui

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Shi Peichang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Tao

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Liao Xiangke

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Lunwei

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Li Xiaoling

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Li Xiaoyong

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge