2014 IEEE 38th Annual Computer Software and Applications Conference最新文献

筛选
英文 中文
How to Generate Realistic Network Traffic? 如何生成真实的网络流量?
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.40
Antoine Varet, N. Larrieu
{"title":"How to Generate Realistic Network Traffic?","authors":"Antoine Varet, N. Larrieu","doi":"10.1109/COMPSAC.2014.40","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.40","url":null,"abstract":"Network engineers and designers need additional tools to generate network traffic in order to test and evaluate, for instance, application performances or network provisioning. In such a context, traffic characteristics are the most important part of the work. Indeed, it is quite easy to generate traffic, but it is more difficult to produce traffic which can exhibit real characteristics such as the ones you can observe through the Internet. With the lack of adequate tools to generate data flows with \"realistic behaviors\" at the network or transport level, we needed to develop our tool entitled \"Sources On Off\". The emphasis of this article is on presenting this tool, explaining how we implemented it and outlining the methodology it follows to produce traffic with realistic characteristics.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Efficient Caching and Incrementalization of Object Queries on Collections in Programming Codes 编程代码中集合对象查询的高效缓存和增量化
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.31
Venkata Krishna Suhas Nerella, S. Madria, T. Weigert
{"title":"Efficient Caching and Incrementalization of Object Queries on Collections in Programming Codes","authors":"Venkata Krishna Suhas Nerella, S. Madria, T. Weigert","doi":"10.1109/COMPSAC.2014.31","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.31","url":null,"abstract":"Object oriented programming languages raised the level of abstraction by incorporating first class query constructs explicitly into program codes. These query constructs allow programmers to express operations over collections as object queries. They also provide optimal query execution, utilizing query optimization strategies from the database domain. However, when a query is repeated in the program, it is executed as a new query. Existing approaches, however, such as Java Query Language (JQL), which caches such query constructs on collections have high run time overhead. Therefore, this paper presents an approach to reduce the run time execution of programs involving explicit queries by caching the results of repeated queries while incrementally maintaining the cached results. We performed the pattern matching of both queries and updates at compile time. We propose several cache heuristics that determine not only which queries to cache but also when to stop the incremental maintenance of cached query results. We also propose a method for the incremental maintenance of cached results of queries by handling different types of update operations such as addition, removal of objects from the collections and field value modifications of the object states. We incorporated cache replacement policies that replace the queries from the cache when the cache size is full. Our experimental results demonstrate that our approaches of caching and incrementalization have reduced execution times for the programs with object queries on collections when compared with earlier approaches such as JQL.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Online Feedback Controlled Message Compression 自适应在线反馈控制消息压缩
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.79
Marcus Jägemar, Sigrid Eldh, Andreas Ermedahl, B. Lisper
{"title":"Adaptive Online Feedback Controlled Message Compression","authors":"Marcus Jägemar, Sigrid Eldh, Andreas Ermedahl, B. Lisper","doi":"10.1109/COMPSAC.2014.79","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.79","url":null,"abstract":"Communication is a vital part of computer systems today. One current problem is that computational capacity is growing faster than the bandwidth of interconnected computers. Maximising performance is a key objective for industries, both on new and existing software systems, which further extends the need for more powerful systems at the cost of additional communication. Our contribution is to let the system selectively choose the best compression algorithm from a set of available algorithms if it provides a better overall system performance. The online selection mechanism can adapt to a changing environment such as temporary network congestion or a change of message content while still selecting the optimal algorithm. Additionally, is autonomous and does not require any human intervention making it suitable for large-scale systems. We have implemented and evaluated this autonomous selection and compression mechanism in an initial trial situation as a proof of concept. The message round trip time were decreased by 7.1%, while still providing ample computational resources for other co-existing services.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122635138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Pattern Based Approach for Automatic Business Process Specialization 基于模式的自动业务流程专门化方法
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.13
Abderrahmane Leshob, H. Mili, A. Boubaker
{"title":"A Pattern Based Approach for Automatic Business Process Specialization","authors":"Abderrahmane Leshob, H. Mili, A. Boubaker","doi":"10.1109/COMPSAC.2014.13","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.13","url":null,"abstract":"Organizations build information systems to support their business processes. Some of these business processes are industry or organization-specific, but most are common to many industries and are used as is, modulo a few modifications. Our work tries to capitalize on these similarities to develop a methodology and tools that help business analysts generate organization-specific process models from a catalog of generic business processes. We developed a framework for representing and classifying business processes that supports process variability management by, 1) navigating a repository of generic processes, and 2) automatically generating new process variants around key process variation points. We use business patterns from the Resource Event Agent ontology to identify variation points, and to codify the model transformations inherent in the generation of the process variants. We developed a prototype, showing the computational feasibility of the approach, and validated the relevance of the variation points, and the correctness of corresponding transformations in the context of ERP key processes, showing the conceptual soundness of the approach.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116631600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quantifying the Characteristics of Java Programs That May Influence Symbolic Execution from a Test Data Generation Perspective 从测试数据生成的角度量化可能影响符号执行的Java程序的特征
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.26
M. Eler, A. T. Endo, Vinicius H. S. Durelli
{"title":"Quantifying the Characteristics of Java Programs That May Influence Symbolic Execution from a Test Data Generation Perspective","authors":"M. Eler, A. T. Endo, Vinicius H. S. Durelli","doi":"10.1109/COMPSAC.2014.26","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.26","url":null,"abstract":"Testing plays a key role in assessing the quality of a software product. During testing, a program is run in hopes of finding faults. As exhaustive testing is seldom possible, specific testing criteria have been proposed to help testers to devise test cases that cover the most relevant faulty scenarios. Manually creating test cases that satisfy these criteria is time consuming, error prone, and unwieldy. Symbolic execution has been used as an effective way of automatically generating test data that meets those criteria. Although this technique has been used for over three decades, several challenges remain, such as path explosion, precision of floating-point data, constraints with complex expressions, and dependency of external libraries. In this paper, we explore a sample of 100 open source Java projects in order to analyze characteristics that are relevant to generate test data using symbolic execution. The results provide valuable insight into how researchers and practitioners can tailor symbolic execution techniques and tools to better suit the needs of different Java applications.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Predicting Release Time Based on Generalized Software Reliability Model (GSRM) 基于广义软件可靠性模型的发布时间预测
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.86
Kiyoshi Honda, H. Washizaki, Y. Fukazawa
{"title":"Predicting Release Time Based on Generalized Software Reliability Model (GSRM)","authors":"Kiyoshi Honda, H. Washizaki, Y. Fukazawa","doi":"10.1109/COMPSAC.2014.86","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.86","url":null,"abstract":"Development environments have changed drastically, development periods are shorter than ever and the number of team members has increased. Especially in open source software (OSS), a large number of developers contribute to OSS. OSS has difficulties in predicting or deciding when it will be released. In order to assess recent software developments, we proposed a generalized software reliability model (GSRM) based on a stochastic process, and compared GSRM with other models. In this paper, we focus on the release dates of OSS and the growth of faults (issues).","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132504319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis 使用静态-动态混合分析审计缓冲区溢出漏洞
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.62
Bindu Padmanabhuni, Hee Beng Kuan Tan
{"title":"Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis","authors":"Bindu Padmanabhuni, Hee Beng Kuan Tan","doi":"10.1109/COMPSAC.2014.62","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.62","url":null,"abstract":"Despite being studied for more than two decades buffer overflow vulnerabilities are still frequently reported in programs. In this paper, we propose a hybrid approach that combines static and dynamic program analysis to audit buffer overflows. Using simple rules, test data are generated to automatically confirm some of the vulnerabilities through dynamic analysis and the remaining cases are predicted by mining static code attributes. Confirmed cases can be directly fixed without further verification whereas predicted cases need to be manually reviewed to confirm existence of vulnerabilities. Since our approach combines the strengths of static and dynamic analyses, it results in an overall accuracy improvement. In our evaluation of approach using the standard benchmark suite, our classifiers achieved a recall over 92% and precision greater than 81%. The dynamic analysis component confirmed 51% of known vulnerabilities along with reporting 2 new bugs, thereby reducing by half, otherwise needed manual auditing effort.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131929196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected? Android恶意软件的取证分析——恶意软件是如何编写的,如何被检测到?
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.61
Kevin Allix, Quentin Jérôme, Tegawendé F. Bissyandé, Jacques Klein, R. State, Yves Le Traon
{"title":"A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected?","authors":"Kevin Allix, Quentin Jérôme, Tegawendé F. Bissyandé, Jacques Klein, R. State, Yves Le Traon","doi":"10.1109/COMPSAC.2014.61","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.61","url":null,"abstract":"We consider in this paper the analysis of a large set of malware and benign applications from the Android ecosystem. Although a large body of research work has dealt with Android malware over the last years, none has addressed it from a forensic point of view. After collecting over 500,000 applications from user markets and research repositories, we perform an analysis that yields precious insights on the writing process of Android malware. This study also explores some strange artifacts in the datasets, and the divergent capabilities of state-of-the-art antivirus to recognize/define malware. We further highlight some major weak usage and misunderstanding of Android security by the criminal community and show some patterns in their operational flow. Finally, using insights from this analysis, we build a naive malware detection scheme that could complement existing anti virus software.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Information Orchestration System for Closing the Information Retrieval Capability Gap 缩小信息检索能力差距的信息编排系统
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.52
Toru Kobayashi
{"title":"Information Orchestration System for Closing the Information Retrieval Capability Gap","authors":"Toru Kobayashi","doi":"10.1109/COMPSAC.2014.52","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.52","url":null,"abstract":"This paper proposes an \"Information Orchestration System\" that enables the closing of the information retrieval capability gap. In this proposed system, users can automatically pull up relevant information one after another just by tapping the desired information listed on screen devices. Users can also simultaneously distribute relevant information to different screen devices around users by tapping or motion operation. In this way, this proposed system realizes information orchestration in a way just like conducting a symphony orchestra.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125071510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model 基于场景的压缩C4.5模型软件缺陷预测方法
2014 IEEE 38th Annual Computer Software and Applications Conference Pub Date : 2014-07-01 DOI: 10.1109/COMPSAC.2014.64
Biwen Li, Beijun Shen, Jun Wang, Yuting Chen, Zhang Tao, Jinshuang Wang
{"title":"A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model","authors":"Biwen Li, Beijun Shen, Jun Wang, Yuting Chen, Zhang Tao, Jinshuang Wang","doi":"10.1109/COMPSAC.2014.64","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.64","url":null,"abstract":"Defect prediction approaches use software metrics and fault data to learn which software properties are associated with what kinds of software faults in programs. One trend of existing techniques is to predict the software defects in a program construct (file, class, method, and so on) rather than in a specific function scenario, while the latter is important for assessing software quality and tracking the defects in software functionalities. However, it still remains a challenge in that how a functional scenario is derived and how a defect prediction technique should be applied to a scenario. In this paper, we propose a scenario-based approach to defect prediction using compressed C4.5 model. The essential idea of this approach is to use a k-medoids algorithm to cluster functions followed by deriving functional scenarios, and then to use the C4.5 model to predict the fault in the scenarios. We have also conducted an experiment to evaluate the scenario-based approach and compared it with a file-based prediction approach. The experimental results show that the scenario-based approach provides with high performance by reducing the size of the decision tree by 52.65% on average and also slightly increasing the accuracy.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"750 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信