2014 IEEE 38th Annual Computer Software and Applications Conference最新文献

筛选
英文 中文
Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration Files 构建预测器:在构建配置文件中更准确地预测错过的依赖项
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.12
Bo Zhou, Xin Xia, D. Lo, Xinyu Wang
{"title":"Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration Files","authors":"Bo Zhou, Xin Xia, D. Lo, Xinyu Wang","doi":"10.1109/COMPSAC.2014.12","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.12","url":null,"abstract":"Software build system (e.g., Make) plays an important role in compiling human-readable source code into an executable program. One feature of build system such as make-based system is that it would use a build configuration file (e.g., Make file) to record the dependencies among different target and source code files. However, sometimes important dependencies would be missed in a build configuration file, which would cause additional debugging effort to fix it. In this paper, we propose a novel algorithm named Build Predictor to mine the missed dependncies. We first analyze dependencies in a build configuration file (e.g., Make file), and establish a dependency graph which captures various dependencies in the build configuration file. Next, considering that a build configuration file is constructed based on the source code dependency relationship, we establish a code dependency graph (code graph). Build Predictor is a composite model, which combines both dependency graph and code graph, to achieve a high prediction performance. We collected 7 build configuration files from various open source projects, which are Zlib, putty, vim, Apache Portable Runtime (APR), memcached, nginx, and Tengine, to evaluate the effectiveness of our algorithm. The experiment results show that compared with the state-of-the-art link prediction algorithms used by Xia et al., our Build Predictor achieves the best performance in predicting the missed dependencies.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Software-as-a-Service Solution Implementation -- Data Migration Perspective 软件即服务解决方案实现——数据迁移视角
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.90
Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, A. Krishna
{"title":"Software-as-a-Service Solution Implementation -- Data Migration Perspective","authors":"Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, A. Krishna","doi":"10.1109/COMPSAC.2014.90","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.90","url":null,"abstract":"This paper presents a short case study on the implementation of SAP's cloud based solution SAP Business By Design (ByD) in one of the largest state department within Australia. Software as a Service (SaaS) has its own implementation challenges from data migration perspective. This paper provides brief detail of the data migration process followed including lessons learned during the migration activities.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Representation of Platform Feature-to-Requirement Traceability for Software Product Line Development 软件产品线开发中平台特性到需求可追溯性的形式化表示
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.29
Sungwon Kang, Jingyu Kim, Sungju Kang, S. Eom
{"title":"A Formal Representation of Platform Feature-to-Requirement Traceability for Software Product Line Development","authors":"Sungwon Kang, Jingyu Kim, Sungju Kang, S. Eom","doi":"10.1109/COMPSAC.2014.29","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.29","url":null,"abstract":"Traceability enables the developer to keep track of changes in software development artifacts. Compared to that of single product development, traceability management in software product line development is much more complicated as it has to deal with traceability of individual products through the commonality and variability of the families of products. However, the existing traceability research treated traceability for families of products in an ad-hoc way and did not adequately address the relationship between traceability of domain engineering artifacts and that of application engineering artifacts. In this paper, we develop a formal representation that represents traceability between features and requirements at platform level. Also we present a procedure for constructing platform traceability from the trace abilities of a family of products. The proposed traceability representation and construction can be used as a basis for automated management of software product line trace abilities and for traceability representation and construction between artifacts of other stages of software product line.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modelling Variability in Activity Diagrams for Mobile Business Applications 为移动业务应用程序建模活动图中的可变性
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.23
V. Kolokolov, S. Ruehl, Paul Baumann, Shaozhen Zhang, S. Verclas
{"title":"Modelling Variability in Activity Diagrams for Mobile Business Applications","authors":"V. Kolokolov, S. Ruehl, Paul Baumann, Shaozhen Zhang, S. Verclas","doi":"10.1109/COMPSAC.2014.23","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.23","url":null,"abstract":"Advances in development and deployment of mobile business applications (MBAs) based on the hybrid Web approach (hybrid MBAs) create new possibilities for enterprises to mobilize their business processes (BPs). Despite the fact that variability has a natural appearance in complex environments among different enterprises, current development tools for hybrid MBAs are lacking systematic support for variable features. We analyse in this paper the formation of hybrid MBAs' variable workflows on the BP-level by conducting an exploratory study within the context of a real-world, widespread BP instance. We also discuss quality assurance of domain activity diagrams (DADs), which document variability in BPs' workflows. Novel verification techniques for a structural analysis of DADs are highlighted.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121989819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improve User's Security Literacy by Experiencing Behavior of Pseudo Android Malware 通过体验伪Android恶意软件的行为,提高用户的安全素养
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.92
Makoto Kato, Saeko Matsuura
{"title":"Improve User's Security Literacy by Experiencing Behavior of Pseudo Android Malware","authors":"Makoto Kato, Saeko Matsuura","doi":"10.1109/COMPSAC.2014.92","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.92","url":null,"abstract":"Recent years, Android malware which execute malicious attacks within the scope of permissions which was approved by user is increasing. Generally it is installed by user. Therefore user can avoid being infected with obvious malware by checking permissions which application requires. However many users install applications without checking permissions and get infected. Such Android malware have various kinds of threats, so user need to protect his assets by himself. In this paper we propose an educational method to improve user's security literacy by having experience of pseudo malware's behavior and recognize threats, risks, assets and relations between permissions and adverse actions.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extending the Theoretical Fault Localization Effectiveness Hierarchy with Empirical Results at Different Code Abstraction Levels 在不同代码抽象层次上用经验结果扩展理论故障定位有效性层次
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.24
C. M. Tang, W. Chan, Yuen-Tak Yu
{"title":"Extending the Theoretical Fault Localization Effectiveness Hierarchy with Empirical Results at Different Code Abstraction Levels","authors":"C. M. Tang, W. Chan, Yuen-Tak Yu","doi":"10.1109/COMPSAC.2014.24","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.24","url":null,"abstract":"Spectrum-based fault localization techniques are semi-automated program debugging techniques that address the bottleneck of finding suspicious program locations for diagnosis. They assess the fault suspiciousness of individual program locations based on the code coverage data achieved by executing the program under debugging over a test suite. A program location can be viewed at different abstraction levels, such as a statement in the source code or an instruction compiled from the source code. In general, a program location at one code abstraction level can be transformed into zero to more program locations at another abstraction level. Although programmers usually debug at the source code level, the code is actually executed at a lower level. It is unclear whether the same techniques applied at different code abstraction levels may achieve consistent results. In this paper, we study a suite of spectrum-based fault localization techniques at both the source and instruction code levels in the context of an existing theoretical hierarchy to assess whether their effectiveness is consistent across the two levels. Our study extends the theoretical hierarchy with empirically validated relationships across two code abstraction levels toward an integration of the theory and practice of fault localization.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Power-Saving Mechanism for IEEE 802.11 Clients in a Multicast Multimedia Streaming Network 组播多媒体流网络中IEEE 802.11客户端的节能机制
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.39
Yuta Morisawa, Y. Kawahara, T. Asami
{"title":"Power-Saving Mechanism for IEEE 802.11 Clients in a Multicast Multimedia Streaming Network","authors":"Yuta Morisawa, Y. Kawahara, T. Asami","doi":"10.1109/COMPSAC.2014.39","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.39","url":null,"abstract":"Wireless LAN multicast is a suitable mechanism for multimedia streaming because of its bandwidth efficiency. However, wireless multicast has several problems in terms of power efficiency. In this study, we analyze the power efficiency of multicast in IEEE 802.11 networks and show that multicast increases the power consumption of clients significantly irrespective of whether the clients join multicast groups or not. The main reason is that IP multicast packets are transferred as broadcast frames in IEEE 802.11 networks. To improve power efficiency, we propose a new multicast streaming mechanism. Our work is strongly motivated by Flexible Multicast Service (FMS), which is a new IEEE 802.11 standard. FMS permits access points (APs) to transmit multicast frames in more than one delivery traffic indication message (DTIM) interval, which allows clients to wake up at alternate DTIM intervals, rather than every DTIM. However, our analysis proved that FMS is not an optimal mechanism in terms of power efficiency. We propose a new mechanism that provides more power-efficient multicast multimedia streaming, without delay or throughput penalty. Our method focuses on how to reduce the number of unnecessary frames received by clients. The key idea is to stagger the transmission timing to let clients avoid receiving unnecessary frames. We evaluate the mechanism by comprehensive analysis and simulations. The results show that the mechanism achieves significant power savings in wireless LAN multicast networks.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114387550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Liquid Software Manifesto: The Era of Multiple Device Ownership and Its Implications for Software Architecture 液态软件宣言:多设备所有权的时代及其对软件架构的影响
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.56
A. Taivalsaari, T. Mikkonen, Kari Systä
{"title":"Liquid Software Manifesto: The Era of Multiple Device Ownership and Its Implications for Software Architecture","authors":"A. Taivalsaari, T. Mikkonen, Kari Systä","doi":"10.1109/COMPSAC.2014.56","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.56","url":null,"abstract":"Today, the digital life of people in developed markets is dominated by PCs and smart phones. Yet, as successful as PCs and smart phones are, the dominant era of PCs and smart phones is about to come to an end. Device shipment trends indicate that the number of web-enabled devices other than PCs and smart phones will grow rapidly. In the near future, people will commonly use various types of internet-connected devices in their daily lives. Unlike today, no single device will dominate the user's digital life. The transition to a world of multiple device ownership is still rife with problems. Since devices are mostly standalone and only stay in sync in limited ways, the users will have to spend a lot of time managing them. These device management chores become much more tedious as the number of devices in a person's life increases. In this paper we look at the ongoing paradigm shift towards multiple device ownership and its implications for software architecture. We argue that the transition to multiple device ownership will eventually lead us to liquid software - an approach that will allow data and applications to seamlessly move between multiple devices and screens. The new era will imply significant changes in the development, deployment and use of software, opening up new opportunities in software engineering research as well.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Integrated Modular Avionics (IMA) Partition Scheduling with Conflict-Free I/O for Multicore Avionics Systems 多核航空电子系统集成模块化(IMA)无冲突I/O分区调度
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.54
Jung-Eun Kim, Man-Ki Yoon, Richard M. Bradford, L. Sha
{"title":"Integrated Modular Avionics (IMA) Partition Scheduling with Conflict-Free I/O for Multicore Avionics Systems","authors":"Jung-Eun Kim, Man-Ki Yoon, Richard M. Bradford, L. Sha","doi":"10.1109/COMPSAC.2014.54","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.54","url":null,"abstract":"The trend in the semiconductor industry toward multicore processors poses a significant challenge to many suppliers of safety-critical real-time embedded software. Having certified their systems for use on single-core processors, these companies may be forced to migrate their installed base of software onto multicore processors as single-core processors become harder to obtain. These companies naturally want to minimize the potentially high costs of recertifying their software for multicore processors. In support of this goal, we propose an approach to solving a fundamental problem in migrating legacy software applications to multicore systems, namely that of preventing conflicts among I/O transactions from applications residing on different cores. We formalize the problem as a partition scheduling problem that serializes I/O partitions. Although this problem is strongly NP-complete, we formulate it as a Constraint Programming (CP) problem. Since the CP approach scales poorly, we propose a heuristic algorithm that outperforms the CP approach in scalability.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Optimizing the Power Consumption of Mobile Networks Based on Traffic Prediction 基于流量预测的移动网络功耗优化
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.38
S. Dawoud, A. Uzun, Sebastian Göndör, Axel Küpper
{"title":"Optimizing the Power Consumption of Mobile Networks Based on Traffic Prediction","authors":"S. Dawoud, A. Uzun, Sebastian Göndör, Axel Küpper","doi":"10.1109/COMPSAC.2014.38","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.38","url":null,"abstract":"Nowadays, mobile networks approach a steady growth in traffic demand. As a result, mobile network providers continuously expand their network infrastructure mainly by installing more base stations. Currently, there is a huge number of base stations serving mobile users all over the world, and this number is expected to double in the coming few years, which leads to a larger wastage of energy during low demand times. Exploiting the possibility of turning off base stations at low demand times is one of the promising approaches for saving energy and reducing CO2 emissions. Here, an early and accurate estimation of the traffic is crucial for managing resources proactively. Therefore, in this paper, we introduce a Power Management System that applies a global provisioning policy to base stations for enabling network reconfigurations in terms of power efficiency. This system is based on a Hybrid Traffic Prediction Model that forecasts the workload of base stations by utilizing historic traffic traces. A simulator is implemented to evaluate the proposed management system, which is fed with real data provided by the Open Mobile Network project. The experimental results show the possibility of turning off 49% of the base stations at some times of the day without degrading the QoS.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129187915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信