{"title":"Solving Team Making Problem for Crowdsourcing with Evolutionary Strategy","authors":"Han Wang, Zhilei Ren, Xiaochen Li, He Jiang","doi":"10.1109/DSA.2018.00021","DOIUrl":"https://doi.org/10.1109/DSA.2018.00021","url":null,"abstract":"Crowdsourcing has become a popular service for requesters to integrate the human intelligence to complete software task. Since Crowdsourced Virtual Teams (CVT) are the foundation of the success of crowdsourcing tasks, previous studies have proposed various algorithms to solving CVT problem, including Alternating Variable Method (AVM), Hybrid Metaheuristic algorithm (ES-AVM), etc. However, there is still room for improvement in performance. In this study, we propose to apply Evolutionary Strategy algorithm with Self-Adaptation (ESSA) to help publishers identify ideal CVTs. ESSA is effective which leverages self-adaptation mechanism to search solutions. We experimentally evaluate ESSA with 6,000 random classic instances. ESSA achieves the state-of-the-art results. Due to the lack of open databases to construct instances, we additionally construct a dataset with 1,556 realistic instances for the CVT problem. Experimental results show that ESSA signi?cantly outperforms AVM and ES-AVM over 1,527 and 717 of the 1,556 realistic instances respectively.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Some Variants of the Anderson Array-Based Queuing Mutual Exclusion Protocol with Model Checking and Graphical Animations","authors":"Yati Phyo, K. Ogata","doi":"10.1109/DSA.2018.00030","DOIUrl":"https://doi.org/10.1109/DSA.2018.00030","url":null,"abstract":"We report on case studies in which some variants of Anderson Protocol, an array-based queuing mutual exclusion protocol, have been analyzed with Maude, a rewriting logic-based computer language equipped with many facilities, such as model checking ones, and SMGA, a state machine graphical animation tool. We demonstrate that graphical state images help human users grasp some characteristics owned by each state. We also demonstrate that the divide & conquer approach to liveness model checking under fairness makes it feasible to conduct a liveness model checking under fairness that cannot be otherwise completed in a reasonable amount of time.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Checking of the Suzuki-Kasami Distributed Mutual Exclusion Algorithm with SPIN","authors":"S. Sakamoto, K. Ogata","doi":"10.1109/DSA.2018.00031","DOIUrl":"https://doi.org/10.1109/DSA.2018.00031","url":null,"abstract":"We report on a case study in which we have model checked some properties for the Suzuki-Kasami distributed mutual exclusion algorithm with SPIN. In the case study, two different system specifications of the algorithm were written in PROMELA and compared by model checking some properties for the two system specifications with SPIN. We also compare SPIN and Maude (and also SAL) to make the characteristics of SPIN clear.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126513598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takahiro Ando, Bo Wang, K. Hisazumi, W. Kong, Akira Fukuda, Yasutaka Michiura, Keita Sakemi, M. Matsumoto
{"title":"Verification Model Translation Method toward Behavior Model for CAST","authors":"Takahiro Ando, Bo Wang, K. Hisazumi, W. Kong, Akira Fukuda, Yasutaka Michiura, Keita Sakemi, M. Matsumoto","doi":"10.1109/DSA.2018.00032","DOIUrl":"https://doi.org/10.1109/DSA.2018.00032","url":null,"abstract":"In this study, we think the feature of exhaustively verifying the process model of model checking is effective for Causal Analysis based on Systems-Theoretic Accident Model and Process (CAST), and discuss the introduction of the model checking technology in CAST. In particular, we propose a verification model translation method for behavior models which are created in the CAST process. Because the interaction between multiple components is important in CAST, our translation method translates plural related SysML state machine diagrams describing the components behavior to one verification model. The verification model is described in Promela language for SPIN model checker. In order to suppress the cost of the model checking, our translation method has the feature that the verification model to be generated is simple. Furthermore, it has the feature that the correspondence between the related behavior models and the verification model is understandable, and the efficiency of the confirmation of verification result can be improved. In addition, since it has the feature that the communication situation between each state machine is easy to check, it is expected to be utilized for CAST. In this paper, we describe the rules to translate the related SysML state machine diagrams to a simple verification model in Promela.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DSA 2018 Keynote Speech","authors":"","doi":"10.1109/dsa.2018.00012","DOIUrl":"https://doi.org/10.1109/dsa.2018.00012","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133926005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Jiang, Xiaoyan Wang, Huanqiang Xu, Hao Wang, Chao Zhang
{"title":"Nondeterministic Event Sequence Reduction for Android Applications","authors":"Bo Jiang, Xiaoyan Wang, Huanqiang Xu, Hao Wang, Chao Zhang","doi":"10.1109/DSA.2018.00026","DOIUrl":"https://doi.org/10.1109/DSA.2018.00026","url":null,"abstract":"Crowdsourced testing is also effective to expose errors within the applications under test. This is because crowdsourced testers can exercise the application in more realistic scenarios with input close to that of end users. However, when a fault is triggered, the corresponding input event sequence can be long and non-deterministic. This makes it hard to reproduce the failure efficiently, which is crucial for effective debugging. While traditional delta debugging techniques can effectively reduce the length of event sequence, it will not work well when such event sequence is non-deterministic during execution. In this work, we proposed to integrate the delta debugging technique with a deterministic replay tool to address this problem. The results show that our tool can effectively reduce non-deterministic event sequence with high successful rate. In contract, most of the non-deterministic event sequences cannot be reduced with traditional delta debugging techniques.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115574430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chairs of Co-Located Events with DSA 2018","authors":"","doi":"10.1109/dsa.2018.00010","DOIUrl":"https://doi.org/10.1109/dsa.2018.00010","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A GTS-Based Reliability Analysis Method for the Subsea Gas Boosting System","authors":"Jin-yong Yao, Zhiping Pang","doi":"10.1109/DSA.2018.00019","DOIUrl":"https://doi.org/10.1109/DSA.2018.00019","url":null,"abstract":"A subsea gas boosting system is a complex system with a variety of components and multiple working states, resulting in the difficulty in modeling. A new method based on guarded transition system (GTS) is proposed in this paper, to analyze the reliability of the subsea gas boosting system. First, by analyzing the structure and function of the system and classifying the components, the model is built to depict system. Then, the operation modes and phases of the system were analyzed to es-tablish the state transition chart accurately. On this base, the GTS model of the system with three operations modes was established to get the steady-state reliability indexes of the system. The GTS-based model is constructed from the subsea gas boosting structure, it is more suitable to establish the virtual operating mode.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Title Page i","authors":"","doi":"10.1109/dsa.2018.00001","DOIUrl":"https://doi.org/10.1109/dsa.2018.00001","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125367583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study on Online Review of Different Types of Hotel","authors":"Tianjiao Niu, Yu Ding, Jianzheng Yang","doi":"10.1109/DSA.2018.00022","DOIUrl":"https://doi.org/10.1109/DSA.2018.00022","url":null,"abstract":"With the widely acceptance of e-commerce, the consumer's use of online reviews after shopping on e-commerce platforms is getting more frequent. The online reviews attract a lot of attention from the researchers in recent years. However, most of the researches do not consider the difference on the type of data structure of online reviews and the types of hotel. To this end, this paper categorizes the online review into structured data type and unstructured data type, and comparatively analyzes the customer types, customer satisfaction and the online review data structure of different types of hotel accordingly. Natural language processing techniques are used to analyze the unstructured data, mainly comments in textual format. Key words from comments are extracted, and the levels of customer's concerns in the comments are calculated using term frequency-inverse document frequency (TF-IDF). The results show the difference on data characteristics of online review for different hotel types.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}