2014 IEEE 38th Annual Computer Software and Applications Conference最新文献

筛选
英文 中文
Understanding and Measuring Nesting 理解和测量嵌套
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.37
H. Alrasheed, A. Melton
{"title":"Understanding and Measuring Nesting","authors":"H. Alrasheed, A. Melton","doi":"10.1109/COMPSAC.2014.37","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.37","url":null,"abstract":"Nesting is a fundamental and very commonly used programming construct. In many cases, the wise use of nesting contributes significantly to a programming team's elegantly designing a solution to a difficult problem. However, the ease with which nesting constructs may be created and the essentially unlimited depth and breadth to which they may exist also enable a programming team to create structures which may be extremely difficult to understand and maintain. In this paper, we examine nesting and nesting metrics. In particular, we discuss nesting and complexity, we give a new definition for the scope of a selection statement, we define simple and precise metrics for nesting depth and breadth, and we present a new nesting concept, the nesting tree.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115420993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GUIDiVa: Automated Discovery and Validation of State-Based GUI Invariants gudiva:基于状态的GUI不变量的自动发现和验证
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.93
Mohammad Ali Darvish Darab, Carl K. Chang
{"title":"GUIDiVa: Automated Discovery and Validation of State-Based GUI Invariants","authors":"Mohammad Ali Darvish Darab, Carl K. Chang","doi":"10.1109/COMPSAC.2014.93","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.93","url":null,"abstract":"Applications with a Graphical User Interface (GUI) front-end are ubiquitous, thus it is of great importance to assure the quality of such systems. Model-based GUI testing provides an effective mechanism for automated testing of applications with a GUI. However, most existing model-based GUI test generation techniques produce many infeasible (i.e., Broken) event sequences which are used as test cases. This happens primarily because they ignore behavioral specifications of the GUI under test. In this paper, we present an automated black box framework that reveals an important set of GUI invariants as state-based event constraints. GUIDiVa, an iterative algorithm at the core of our framework, enumerates all possible constraint violations as potential reasons of a test case failure, on the failed event of the infeasible test case. It further selects and adds the most promising constraints of each iteration to a final set based on our notion of constraint Validity Weight. The results of empirical studies on both seeded and nine non-trivial study subjects show that our framework is capable of capturing important aspects of GUI behavior, while considerably reducing the number of insfeasible test cases. Additionally, a human oracle is used to further validate the accuracy of the discovered constraints.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Specific Touch Gesture on Mobile Devices to Find Attractive Phrases in News Browsing 特定的触摸手势在移动设备上找到有吸引力的短语在新闻浏览
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.74
Shohe Ito, Takuya Yoshida, F. Harada, H. Shimakawa
{"title":"Specific Touch Gesture on Mobile Devices to Find Attractive Phrases in News Browsing","authors":"Shohe Ito, Takuya Yoshida, F. Harada, H. Shimakawa","doi":"10.1109/COMPSAC.2014.74","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.74","url":null,"abstract":"When smart phone users browse web news articles, they encounter attractive phrases by chance. At that time, they try to obtain information on the smart phones. In order to search the information of the attractive phrases on web pages, they have to manipulate the smart phones to search on the small screen. It causes stresses because of situations such as manipulation errors. Such stresses could be eliminated if the attractive phrases can be identified and be input automatically in order to recommend the web pages with the information of the attractive phrases. Because of the small screens of smart phones, users move the news article area displayed on the screens with touch gestures such as swipe. The history of touch gestures during browsing an article implies the position and the timing users have focused on in the article. This paper proposes a method to identify the areas where attractive phrases have appeared on news articles, in order to enable automatic identification of attractive phrases. We have achieved real-time identification by utilizing the history of touch gestures during a web news browsing. The proposed method shows the history of touch gestures by a gesture trail. It is a graph showing the time series of the vertical coordinate of the displayed article area. When users encounter attractive phrases, they take certain patterns of touch gestures to confirm or read carefully the neighborhood of the attractive phrases. Thus, in the proposed method, the news article area including an attractive phrase is detected by matching the gesture trail in a sliding time window with a pattern obtained by pre-training. We use slow-down and resting patterns approximated by quadratic functions with the parameters defined for individual users. Experiments to identify time windows of attractive phrases on gesture trails has revealed that the highest and the lowest precision ratios are 0.579 and 0.278, respectively.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133518772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment 有损多归环境下选择性重广播提高SCTP通信性能
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.78
Koki Okamoto, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, T. Yokohira
{"title":"Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment","authors":"Koki Okamoto, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, T. Yokohira","doi":"10.1109/COMPSAC.2014.78","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.78","url":null,"abstract":"In recent years, with proliferation of smart phones and tablet PCs, speedup of wireless LAN communication is required for dealing with increase of traffic in wireless networks. However, transmission speed through a wireless network often slows down in comparison with that through a wired network since packets of wireless networks frequently drop due to the influence of surrounding environment such as electromagnetic noise. In this paper, we propose a method to mitigate the impacts caused by packet loss by virtue of SCTP bicasting in lossy multihoming environment with two or more wireless networks. This method bicasts not all packets but only important packets concerning retransmission for efficiency since bicasting all packets would cause congestion. We also implemented a prototype system based on the proposed method. According to the result of performance evaluation experiment, we confirmed the effectiveness of the proposed method by the fact that the prototype system performed faster transmission than normal SCTP transmission even in high packet loss rate environment.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Preservation Using Servers for Predictable Execution and Integration 使用服务器实现可预测的执行和集成的性能保持
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.42
R. Inam
{"title":"Performance Preservation Using Servers for Predictable Execution and Integration","authors":"R. Inam","doi":"10.1109/COMPSAC.2014.42","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.42","url":null,"abstract":"In real-time embedded systems the components and components integration must satisfy both functional correctness and extra-functional correctness, such as satisfying timing properties. Deploying multiple real-time components on a physical node poses timing problems in components's integration. These timing problems during integration further effect predictability and reusability of real-time components. We propose a novel concept of runnable virtual node (RVN) whose interaction with the environment is bounded both by a functional and a temporal interface, and the validity of its internal temporal behaviour is preserved when integrated with other components or when reused in a new environment. Our realization of RVN exploits the latest techniques for hierarchical scheduling framework to achieve temporal isolation, and the principles from component-based software-engineering to achieve functional isolation. Proof-of-concept case studies executed on an AVR based 32-bit micro-controller demonstrates the preserving of real-time properties within components for predictable integration and reusability in a new environment without altering its temporal behaviour in both hierarchical scheduling and RVN contexts. We also take a step ahead towards expanding the performance preserving servers' concept for multicore platform on which the scheduling of real-time tasks is inherently unpredictable due to the contention for shared physical memory and caches. It results in proposing and implementation of a novel type of server, called Multi-Resource Server (MRS) which controls the access to both CPU and memory bandwidth resources such that the execution of real-time tasks become predictable. The MRS provides temporal isolation both between tasks running on the same core, as well as, between tasks running on different cores. Further, we provide the schedulability analysis for MRS to provide predictable performance when composing multiple components on a shared multi-core platform.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports 基于主题模型和Bug报告多特征的半自动Bug分类和严重性预测
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.16
Geunseok Yang, Zhang Tao, Byungjeong Lee
{"title":"Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports","authors":"Geunseok Yang, Zhang Tao, Byungjeong Lee","doi":"10.1109/COMPSAC.2014.16","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.16","url":null,"abstract":"Bug fixing is an essential activity in the software maintenance, because most of the software systems have unavoidable defects. When new bugs are submitted, triagers have to find and assign appropriate developers to fix the bugs. However, if the bugs are at first assigned to inappropriate developers, they may later have to be reassigned to other developers. That increases the time and cost for fixing bugs. Therefore, finding appropriate developers becomes a key to bug resolution. When triagers assign a new bug report, it is necessary to decide how quickly the bug report should be addressed. Thus, the bug severity is an important factor in bug fixing. In this paper, we propose a novel method for the bug triage and bug severity prediction. First, we extract topic(s) from historical bug reports in the bug repository and find bug reports related to each topic. When a new bug report arrives, we decide the topic(s) to which the report belongs. Then we utilize multi-feature to identify corresponding reports that have the same multi-feature (e.g., Component, product, priority and severity) with the new bug report. Thus, given a new bug report, we are able to recommend the most appropriate developer to fix each bug and predict its severity. To evaluate our approach, we not only measured the effectiveness of our study by using about 30,000 golden bug reports extracted from three open source projects (Eclipse, Mozilla, and Net beans), but also compared some related studies. The results show that our approach is likely to effectively recommend the appropriate developer to fix the given bug and predict its severity.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122516058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
Preserving Location-Related Privacy Collaboratively in Geo-social Networks 在地理社交网络中协同保护位置相关隐私
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.94
Lin Zhang, Mingxuan Yuan, Yao Guo, Xiangqun Chen, Lei Chen
{"title":"Preserving Location-Related Privacy Collaboratively in Geo-social Networks","authors":"Lin Zhang, Mingxuan Yuan, Yao Guo, Xiangqun Chen, Lei Chen","doi":"10.1109/COMPSAC.2014.94","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.94","url":null,"abstract":"The emerging geo-social networks bring us attractive location-based services as well as serious location-related privacy threats. Location information of users in geo-social networks might be revealed by friends carelessly, or deduced by users curiously or even maliciously. In order to avoid location leakages, we propose collaborative privacy management in geo-social networks. Users specify and broadcast their preferences on location-related privacies in advance, so that potential leakages can be reported automatically when new resources arrive. If necessary, the associated spatial and/or temporal information of resources will be tweaked according to the privacy preferences of involving users, so that \"old\" leakages can be eliminated while ensuring that \"new\" ones are not introduced. We design algorithms for such tweaks and construct experiments on a simulated dataset to demonstrate their usability and applicability.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125133383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expiration Timer Control Method for QoS-Aware Packet Chunking qos感知分组的过期定时器控制方法
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.49
Hiroki Yanaga, Daiki Nobayashi, T. Ikenaga
{"title":"Expiration Timer Control Method for QoS-Aware Packet Chunking","authors":"Hiroki Yanaga, Daiki Nobayashi, T. Ikenaga","doi":"10.1109/COMPSAC.2014.49","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.49","url":null,"abstract":"Development of machine-to-machine communication technologies encourages an increasing amount of mobile traffic by smart phones, cellular phones, and various sensors. This traffic consists of small packets in order to minimize the influence of frame dropping in a data link layer. However, it is necessary to reduce the number of packets flowing into the core network to chunk packets, while satisfying the application requirement of users. In this paper, we propose the expiration timer control method for QoS-aware packet chunking. Our proposed scheme achieves a decrease in the number of packets flowing into the core network while satisfying the QoS of users by adjusting the waiting time for packet chunking depending on the condition of the core network. In this paper, we evaluate the proposed scheme by performing simulations and show that our proposed scheme achieves not only a decrease in packet flow into the core network but also the maintenance of QoS requirement for applications.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Discriminative Model for Duplication Detection on Bug Reports with Cluster Weighting 基于聚类加权的Bug报告重复检测改进判别模型
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.18
Meng-Jie Lin, Cheng-Zen Yang
{"title":"An Improved Discriminative Model for Duplication Detection on Bug Reports with Cluster Weighting","authors":"Meng-Jie Lin, Cheng-Zen Yang","doi":"10.1109/COMPSAC.2014.18","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.18","url":null,"abstract":"Processing bug reports plays an important role for software maintenance. Recently, the issue of detecting duplicate bug reports has been noticed due to their considerable appearances. In the past, many NLP-based detection schemes have been proposed. However, the cluster-level correlation relationships are not extensively considered in the past studies. In this paper, we present an improved detection scheme using cluster weighting to enhance the detection performance of a previous SVM-based method. We have conducted empirical studies with three open source software projects, Apache, ArgoUML, and SVN. Compared with the original SVM-based method, the proposed SVM-TC scheme can achieve 2.83-16.32% improvements of the top-5 recall rates in three projects.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132688923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Model-and-Code Consistency Checking 模型和代码一致性检查
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.91
Markus Riedl-Ehrenleitner, Andreas Demuth, Alexander Egyed
{"title":"Towards Model-and-Code Consistency Checking","authors":"Markus Riedl-Ehrenleitner, Andreas Demuth, Alexander Egyed","doi":"10.1109/COMPSAC.2014.91","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.91","url":null,"abstract":"In model-driven engineering, design models allow for efficient designing without considering implementation details. Still, it is crucial that design models and source code are in sync. Unfortunately, both artifacts do evolve frequently and concurrently which causes them to drift apart over time. Even though technologies such as model-to-code transformations are commonly employed to keep design models and source code synchronized, those technologies typically still require unguided, manual adaptations. Hence, they do not effectively prevent inconsistencies from being introduced. In this paper, we outline a novel approach for checking consistency between design models and source code. Our approach aims at detecting inconsistencies instantly and informing developers about a project's consistency status live during development.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132729959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信