2010 IEEE 34th Annual Computer Software and Applications Conference Workshops最新文献

筛选
英文 中文
An Optimization Strategy for Evolutionary Testing Based on Cataclysm 基于大灾变的进化测试优化策略
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.69
M. Wang, Bixin Li, Zhengshan Wang, Xiaoyuan Xie
{"title":"An Optimization Strategy for Evolutionary Testing Based on Cataclysm","authors":"M. Wang, Bixin Li, Zhengshan Wang, Xiaoyuan Xie","doi":"10.1109/COMPSACW.2010.69","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.69","url":null,"abstract":"Evolutionary Testing (ET) is an effective test case generation technique which uses some meta-heuristic search algorithm, especially genetic algorithm, to generate test cases automatically. However, the prematurity of the population may decrease the performance of ET. To solve this problem, this paper presents a novel optimization strategy based on cataclysm. It monitors the diversity of population during the evolution process of ET. Once the prematurity is detected, it will use the operator, cataclysm, to recover the diversity of the population. The experimental results show that the proposed strategy can improve the performance of ET evidently.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Toward Cloud-Based Key Management for Outsourced Databases 面向外包数据库的云密钥管理
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.47
N. Bennani, E. Damiani, S. Cimato
{"title":"Toward Cloud-Based Key Management for Outsourced Databases","authors":"N. Bennani, E. Damiani, S. Cimato","doi":"10.1109/COMPSACW.2010.47","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.47","url":null,"abstract":"A major drawback of implementing Database-as-a-Service (DaaS) on untrusted servers is the complexity of key management required for handling revocation. In this paper we put forward the idea of using the cloud for decoupling the management of local, user-specific encryption keys from the one of role-specific protection keys, obtaining simple key management and revocation schemes.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131764052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Modeling Cyber-Physical Systems with Semantic Agents 用语义代理建模信息物理系统
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.13
Jing Lin, Sahra Sedigh Sarvestani, A. Miller
{"title":"Modeling Cyber-Physical Systems with Semantic Agents","authors":"Jing Lin, Sahra Sedigh Sarvestani, A. Miller","doi":"10.1109/COMPSACW.2010.13","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.13","url":null,"abstract":"The development of accurate models for cyber-physical systems (CPSs) is hampered by the complexity of these systems, fundamental differences in the operation of cyber and physical components, and significant interdependencies among these components. Agent-based modeling shows promise in overcoming these challenges, due to the flexibility of software agents as autonomous and intelligent decision-making components. Semantic agent systems are even more capable, as the structure they provide facilitates the extraction of meaningful content from the data provided to the software agents. In this paper, we present a multi-agent model for a CPS, where the semantic capabilities are underpinned by sensor networks that provide information about the physical operation to the cyber infrastructure. This model is used to represent the static structure and dynamic behavior of an intelligent water distribution network as a CPS case study.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133189444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods 基于层次聚类方法的隐私保护异常点检测
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.35
Ajay Challagalla, S. Dhiraj, D. Somayajulu, T. Mathew, Saurav Tiwari, Syed Sharique Ahmad
{"title":"Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods","authors":"Ajay Challagalla, S. Dhiraj, D. Somayajulu, T. Mathew, Saurav Tiwari, Syed Sharique Ahmad","doi":"10.1109/COMPSACW.2010.35","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.35","url":null,"abstract":"Data objects which do not comply with the general behavior or model of the data are called Outliers. Outlier Detection in databases has numerous applications such as fraud detection, customized marketing, and the search for terrorism. However, the use of Outlier Detection for various purposes has raised concerns about the violation of individual privacy. Therefore, Privacy Preserving Outlier Detection must ensure that privacy concerns are addressed and balanced, so that the data analyst can get the benefits of outlier detection without being thwarted by legal counter-measures by privacy advocates. In this paper, we propose a technique for detecting outliers while preserving privacy, using hierarchical clustering methods. We analyze our technique to quantify the privacy preserved by this method and also prove that reverse engineering the perturbed data is extremely difficult.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
MiRE4OWL: Mobile Rule Engine for OWL MiRE4OWL: OWL的移动规则引擎
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.62
Taehun Kim, Insuk Park, S. Hyun, Dongman Lee
{"title":"MiRE4OWL: Mobile Rule Engine for OWL","authors":"Taehun Kim, Insuk Park, S. Hyun, Dongman Lee","doi":"10.1109/COMPSACW.2010.62","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.62","url":null,"abstract":"Mobile user devices, such as smart phones have become the most popular high-end mobile devices far beyond just cellular communication devices. They will continue evolving toward being palm-top computers with the rapid development of wireless communications and platform technologies. This paper introduces our development of a semantic reasoner called MiRE4OWL to be installed onto the resource-limited mobile user devices to accommodate context-aware ubiquitous computing services. It is a data-log and rule-based inference engine which performs semantic reasoning operations over the application semantics represented in OWL-DL. The mobile rule engine that underlies MiRE4OWL achieves light-weight design to meet the resource constraints of the mobile devices and yet achieves better expressiveness than existing engines. The performance evaluation showed that the intended functionality and resource efficiency have been fulfilled.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"119 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols 使用加密协议的医疗保健数据的隐私保护分布式学习聚类
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.33
Ahmed M. Elmisery, Huaiguo Fu
{"title":"Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols","authors":"Ahmed M. Elmisery, Huaiguo Fu","doi":"10.1109/COMPSACW.2010.33","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.33","url":null,"abstract":"Data mining is the process of knowledge discovery in databases (centralized or distributed); it consists of different tasks associated with them different algorithms. Nowadays the scenario of one centralized database that maintains all the data is difficult to achieve due to different reasons including physical, geographical restrictions and size of the data itself. One approach to solve this problem is distributed databases where different parities have horizontal or vertical partitions of the data. The data is normally maintained by more than one organization, each of which aims at keeping its information stored in the databases private, thus, privacy-preserving techniques and protocols are designed to perform data mining on distributed data when privacy is highly concerned. Cluster analysis is a frequently used data mining task which aims at decomposing or partitioning a usually multivariate data set into groups such that the data objects in one group are the most similar to each other. It has an important role in different fields such as bio-informatics, marketing, machine learning, limate and healthcare. In this paper we introduce a novel clustering algorithm that was designed with the goal of enabling a privacy preserving version of it, along with sub-protocols for secure computations, to handle the clustering of vertically partitioned data among different healthcare data providers.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116251415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Natural Language Watermarking Based on Syntactic Displacement and Morphological Division 基于句法位移和形态划分的自然语言水印
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.37
Mi-Young Kim, Osmar R Zaiane, R. Goebel
{"title":"Natural Language Watermarking Based on Syntactic Displacement and Morphological Division","authors":"Mi-Young Kim, Osmar R Zaiane, R. Goebel","doi":"10.1109/COMPSACW.2010.37","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.37","url":null,"abstract":"This paper explores a method for Korean text watermarking based on a linguistic analysis scheme using morphemic and syntactic analysis. In this scheme, a predicate nominal is separated into its nominal and its predicate, and syntactic adverbial is displaced. Korean, as an agglutinative language, provides a good basis for this morpheme-based natural language watermarking because a word consists of several morphemes. A Korean word usually consists of a content morpheme and a function morpheme. However, a predicate nominal is an exception, having two content morphemes—nominal and predicate--and one function morpheme. So, we can divide a predicate nominal into a nominal and a predicate. In addition, we also perform syntax-based watermarking. We displace syntactic adverbials using the characteristic that most languages permit displacement of syntactic adverbials within its clause. Combining these morphemic and syntactic characteristics, we propose a method of language watermarking based on syntactic displacement and morphological division. To make our system more secure, we also include a sentence weight value and encode the weight value with a watermark bit. Our watermarking method doesn’t change the meaning of the most marked sentences, and it also ensures the naturalness of the sentences. From the experimental results, we show that the rate of unnatural sentences of marked text is reasonable, and the watermarking capacity is better than previous systems. The coverage of marked sentences is also reasonable. Experimental results also show that the marked text retains the same style, and also has the same information without semantic distortion.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments SecureCloud:迈向云计算环境的综合安全框架
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.74
Hassan Takabi, J. Joshi, Gail-Joon Ahn
{"title":"SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments","authors":"Hassan Takabi, J. Joshi, Gail-Joon Ahn","doi":"10.1109/COMPSACW.2010.74","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.74","url":null,"abstract":"Cloud computing has recently gained tremendous momentum but still is in its infancy. It has the potential for significant cost reduction and the increased operating efficiencies in computing. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper, we propose a comprehensive security framework for cloud computing environments. We also discuss challenges, existing solutions, approaches, and future work needed to provide a trustworthy cloud computing environment.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125938538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
The Framework of Medical Simulation Education and Evaluation System for Supporting SaaS 支持SaaS的医学模拟教育与评估系统框架
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.26
Jian Shang, Jijiang Yang, Qing Wang, Hui Pan
{"title":"The Framework of Medical Simulation Education and Evaluation System for Supporting SaaS","authors":"Jian Shang, Jijiang Yang, Qing Wang, Hui Pan","doi":"10.1109/COMPSACW.2010.26","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.26","url":null,"abstract":"Medical Simulation is becoming more and more important training mode for hospitals. How to evaluate training effects is an interesting topic in a medical simulation training center. This paper tries to introduce a framework of Medical Simulation Education and Evaluation System (MSEES). After identifying its problems, an improved MSEES for supporting SaaS is given. The improved MSEES is rule-based. By using rules engine technology, it can separate business rules from system code so that tutors can customize the rules independently and update it dynamically. This can greatly increases the flexibility and maintainability of MSEES.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Testing: Far from Steady State 性能测试:远离稳定状态
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.66
R. Mansharamani, Amol Khanapurkar, Benny Mathew, R. Subramanyan
{"title":"Performance Testing: Far from Steady State","authors":"R. Mansharamani, Amol Khanapurkar, Benny Mathew, R. Subramanyan","doi":"10.1109/COMPSACW.2010.66","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.66","url":null,"abstract":"The dot com era ushered in a number of industry standard load testing tools. While there is no doubt that these tools have helped improve the quality of IT systems, performance testing in the IT industry is far from steady state. There are still severe gaps between performance test results and production systems performance in IT projects. This paper proposes a number of areas where performance testing needs to improve radically, several of which can be incorporated in to load testing tools. Examples are also provided of simple analytics during single user performance testing to demonstrate the effectiveness of this extra but necessary step in the testing process.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"106 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信