2016 Third International Conference on Trustworthy Systems and their Applications (TSA)最新文献

筛选
英文 中文
Applying Software Defined Methodologies to Software Computing 软件定义方法在软件计算中的应用
W. Chu, Chih-Hung Chang, Tse-Chuan Hsu, Yen-Hua Huang
{"title":"Applying Software Defined Methodologies to Software Computing","authors":"W. Chu, Chih-Hung Chang, Tse-Chuan Hsu, Yen-Hua Huang","doi":"10.1109/TSA.2016.15","DOIUrl":"https://doi.org/10.1109/TSA.2016.15","url":null,"abstract":"Computing systems and services are now required to provide services with quality, intelligence, accuracy, adaptation, and effectiveness to satisfy the demands of users. Most of the existing systems are executed with fixed computing logic and rules without the flexibility and smartness to react the dynamic changes of computing situations and environment. Information technology is moving toward a new \"software-defined\" (SD) era that makes the software more \"in command\" of a greater range of devices and hardware systems for computing, storage, transmission, and networking. Software defined systems refer to a collection of enabling software technologies that are emerging in the information technology arena. Examples include Software Defined Networking (SDN), Software Defined Security (SDSec), Software Defined Data Center (SDDC), Software Defined Storage (SDS), and Software-Defined Radio (SDR). Considering their unique features, software development of these systems raises new challenges. In this paper, we plan to design and develop Software-defined Methodologies (SDM) which will be applied to software life cycle. With the support of SDM, we believe SD systems will contain the intelligent characteristics, such as security, reliability, QOS assurance, adaptability, low power consumption, situation awareness... etc.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116732969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Architecture of OPAL for the Software Process Improvement in High Maturity Level 面向高成熟度软件过程改进的OPAL体系结构
Sidou Dong, Aihua Ren, Xin Wang
{"title":"The Architecture of OPAL for the Software Process Improvement in High Maturity Level","authors":"Sidou Dong, Aihua Ren, Xin Wang","doi":"10.1109/TSA.2016.21","DOIUrl":"https://doi.org/10.1109/TSA.2016.21","url":null,"abstract":"As an infrastructure of software enterprise management, organizational process asset library (OPAL) is vital essential to deploy and improve processes of software organizations. Not well managed and maintained OPAL will make more difficulties for software process improvement work. In order to do the process improvement work effectively, the paper proposes OPAL architecture for process improvements, especially for process improvements in high maturity level. This architecture has been used in an actual enterprise for high maturity level process improvement, and it has been illustrated that the architecture is easy for maintenance and extension. This architecture can furnish valuable practices for software enterprises to manage and maintain OPAL.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics 数字取证中基于时空属性的证据固定方法
Yu Yang, C. Li, Guozi Sun
{"title":"A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics","authors":"Yu Yang, C. Li, Guozi Sun","doi":"10.1109/TSA.2016.30","DOIUrl":"https://doi.org/10.1109/TSA.2016.30","url":null,"abstract":"Digital evidence might be tampered in the process of digital forensics, which would reduce the credibility of the evidence. Considering the lack of reliability in traditional digital forensics, the authors introduce the idea of a time-space attribute-based evidence fixing method (TAEFM). It fixes digital evidence by generation hash code with fingerprint identification data, trusted time-stamp and e-signature. This system can enhance the credibility of digital evidence and verify whether and which part of evidence was tampered. The location of tampered evidence can be extending to the further forensics.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134619524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generalized Multiple-Valued Decision Diagram for Reliability Analysis of Fault-Tolerant Systems 容错系统可靠性分析的广义多值决策图
Jianwen Xiang, Siwei Zhou, Luyao Ye, Shengwu Xiong, W. E. Wong
{"title":"A Generalized Multiple-Valued Decision Diagram for Reliability Analysis of Fault-Tolerant Systems","authors":"Jianwen Xiang, Siwei Zhou, Luyao Ye, Shengwu Xiong, W. E. Wong","doi":"10.1109/TSA.2016.16","DOIUrl":"https://doi.org/10.1109/TSA.2016.16","url":null,"abstract":"Binary Decision Diagrams (BDDs) and their extensions multiple-valued decision diagrams (MDDs) have been adapted for reliability analysis of fault tolerant systems. Particularly, the MDDs are used to solve traditional coverage models (CMs) where an uncovered component failure may lead to system failure without constraint. This paper presents a new family of decision diagrams, generalized multiple-valued decision diagrams (GMDDs) for the latest irrelevancy coverage model (ICM). In contrast to traditional CMs, the ICM can detect and isolate components whenever they become irrelevant due to the failures of other components, and thus an uncovered component failure can only lead to system failure with the constraint when the component is relevant. Compared with the traditional MDD approach, the GMDD can handle constrained uncovered component failures, and it can incorporate general imperfect fault coverage modelling, including the ICM and traditional CMs.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tracking Down Dynamic Feature Code Changes against Python Software Evolution 根据Python软件演进跟踪动态特性代码变更
Zhifei Chen, Wanwangying Ma, Wei Lin, Lin Chen, Baowen Xu
{"title":"Tracking Down Dynamic Feature Code Changes against Python Software Evolution","authors":"Zhifei Chen, Wanwangying Ma, Wei Lin, Lin Chen, Baowen Xu","doi":"10.1109/TSA.2016.19","DOIUrl":"https://doi.org/10.1109/TSA.2016.19","url":null,"abstract":"Python, a typical dynamic programming language, is increasingly used in many application domains. Dynamic features in Python allow developers to change the code at runtime. Some dynamic features such as dynamic type checking play an active part in maintenance activities, thus dynamic feature code is often changed to cater to software evolution. The aim of this paper is exploring and validating the characteristics of feature changes in Python. We collected change occurrences in 85 open-source projects and discovered the relationship between feature changes and bug-fix activities. Furthermore, we went into 358 change occurrences to explore the causes and behaviors of feature changes. The results show that: (1) dynamic features are increasingly used and the code is changeable; (2) most dynamic features may behave that feature code is more likely to be changed in bug-fix activities than non-bugfix activities; (3) dynamic feature code plays both positive and negative roles in maintenance activities. Our results provide useful guidance and insights for improving automatic program repair and refactoring tools.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121890438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Normalized-PSO and Its Application in Attribute Weighted Optimal Problem 归一化粒子群及其在属性加权最优问题中的应用
Jin Gou, Cheng Wang, Weihua Luo, Jin Gou
{"title":"The Normalized-PSO and Its Application in Attribute Weighted Optimal Problem","authors":"Jin Gou, Cheng Wang, Weihua Luo, Jin Gou","doi":"10.1109/TSA.2016.18","DOIUrl":"https://doi.org/10.1109/TSA.2016.18","url":null,"abstract":"Traditional PSO(Particle Swarm Optimization) algorithm has the problems of particle cross-border and premature convergence while solving the normalized constrained optimization problem. Our paper uses the attractor and spatial zoom method, and presented the normalized PSO algorithm. Secondly, each attribute is treated equally in the traditional classification algorithm, without considering the differences in attribute measure and contribution, which cause the problem of low classification accuracy. Our paper introduce the use of the normalized PSO algorithm to solve the optimal attribute normalized weighted distance. For example, in KNN classifier, leave-one-out experimental results with multiple UCI data sets show that the classification accuracy using normalization PSO algorithm to calculate normalized weighted distance is higher than using PSO algorithm and traditional none-attribute weighted classifiers.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliability Analysis of Drilling Mud Pump Pressure Cylinder Hydraulic System 钻井泥浆泵压力缸液压系统可靠性分析
Deliang Gu, Kuisheng Chen, Xinbo Qian, Congchang Zhan
{"title":"Reliability Analysis of Drilling Mud Pump Pressure Cylinder Hydraulic System","authors":"Deliang Gu, Kuisheng Chen, Xinbo Qian, Congchang Zhan","doi":"10.1109/TSA.2016.25","DOIUrl":"https://doi.org/10.1109/TSA.2016.25","url":null,"abstract":"The drilling pump is one of three major parts of a drilling rig, and is the key equipment of the drilling fluid circulation system. In this paper, the reliability of a ZCL-1600-type drilling mud pump pressure cylinder of the hydraulic system is carried on the thorough discussion. The reliability block diagram is established by qualitative analysis and quantitative calculation. Reliability assessment is calculated for the hydraulic system under a specific operation condition. Moreover, a mathematical model is established to optimize the maintenance interval for the hydraulic system by minimizing the maintenance cost. Finally, two case studies are illustrated to verify the reliability and maintenance model by simulation based on Matlab.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Performance Testing of Information System Based on Domestic CPU and OS 基于国产CPU和操作系统的信息系统性能测试研究
Li Dong, Xiong Jing, Yang Chunhui
{"title":"Study of Performance Testing of Information System Based on Domestic CPU and OS","authors":"Li Dong, Xiong Jing, Yang Chunhui","doi":"10.1109/TSA.2016.27","DOIUrl":"https://doi.org/10.1109/TSA.2016.27","url":null,"abstract":"In order to evaluate the performance of of information system based on domestic CPU and OS, through the introduction of the background of basic hardware and software based on domestic, we expound the domestic information system performance testing principle and method, according to the testing results of existing mature commercial performance testing tool LoadRunner can not reflect the user experience of time, and can not be directly used for testing the information system which based on domestic CPU/OS, this paper put forward the two kinds of testing schemes that base on user experience of LoadRunner and JMeter domestic information system performance test, and test two kinds of improved schemes, through the comparison of the test data and the user experience time of the two schemes, the variance of the test scheme based on JMeter is smaller than LoadRunner test scheme 70.49%. The results show that the test results of the JMeter scheme are more close to the user experience than LoadRunner.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach 在点对点流系统中对抗污染攻击:一种动态声誉管理方法
Shiyu Wang, Kun Lu, Mingchu Li, Qilong Zhen, Xiaoyu Che
{"title":"Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach","authors":"Shiyu Wang, Kun Lu, Mingchu Li, Qilong Zhen, Xiaoyu Che","doi":"10.1109/TSA.2016.14","DOIUrl":"https://doi.org/10.1109/TSA.2016.14","url":null,"abstract":"P2P streaming systems are popular applications on internet. However, due to the open nature, P2P streaming systems are vulnerable to malicious attacks, especially data pollution attacks. Reputation-based mechanisms are most effective mechanisms to defend data pollution attacks in P2P streaming systems. In this paper, we propose a dynamic reputation management. In our proposed mechanism, a peer's reputation consists of direct and indirect trust. The confidence factor is used to determine the weight of direct trust. We introduce Gompertz Function to adjust the confidence factor, the more interactions, the larger weight of direct trust value is. Besides, to lower the complexity of calculating indirect trust, we introduce threedegree of separation, which only includes neighbors within three degrees while calculating indirect trust. Simulation results show that our proposed reputation management scheme can effectively separate malicious peers, reduce the dissemination of polluted data chunks and defend various kinds of data pollution attacks.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129591250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Separation of Concerns in Analysis of Artifact Anomalies within Workflow Models 工作流模型中工件异常分析中的关注点分离
Feng-Jian Wang, Tennyson Lu, Hwai-Jung Hsu
{"title":"Separation of Concerns in Analysis of Artifact Anomalies within Workflow Models","authors":"Feng-Jian Wang, Tennyson Lu, Hwai-Jung Hsu","doi":"10.1109/TSA.2016.11","DOIUrl":"https://doi.org/10.1109/TSA.2016.11","url":null,"abstract":"Workflows which realize parts of business goals in a particular order automate the business processes within enterprises. To guarantee the correctness of workflow execution, analyses on structural integrity of workflows are essential. However, comparing to the sequential activities, the activities executed in orders, the anomalies caused by parallel activities are far more complicated for analysis. Therefore, separation of concerns among sequential and parallel issues while doing analysis can reduce the complexity among analysis time and human recognition. In this paper, we propose an innovative methodology considering sequential and parallel issues separately within workflow models to detect anomalies in a given workflow. As a result, the cost for anomaly detection is lowered and the complexity for human recognition of the anomaly issues is reduced.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131097765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信