{"title":"A Secure Routing Scheme for DSR","authors":"T. Bouabana-Tebibel","doi":"10.1109/SSNE.2011.23","DOIUrl":"https://doi.org/10.1109/SSNE.2011.23","url":null,"abstract":"In this paper, we propose an approach based on one time passwords to secure the DSR protocol. The main concern of this work is to provide an efficient level of security for DSR keeping in mind as a main objective the minimization of the calculation cost. Some experimental results are presented to show the effectiveness of the proposed solution.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Catering Quality Evaluation Design for Service/Cloud Computing through Visualized Semantics Locating","authors":"Yucong Duan","doi":"10.1109/SSNE.2011.8","DOIUrl":"https://doi.org/10.1109/SSNE.2011.8","url":null,"abstract":"the era of servicecloud computing brings unprecedented request for quality evaluation. Existing quality evaluation usually relies on a set of organized quality properties. The organization of quality properties partially determines the quality of a quality model which usually relies on empirically accumulated knowledge and implicit understanding of the semantics relationships among quality properties. To ease building flexible, omnipresent and efficient quality evaluations which initially take the form of natural expressions, based on the hypotheses: (1) the existence of multiple semantics of a single concept/expression and (2) the existence of cognitive semantic distance among concepts, we propose an approach to support visualized and uniform semantics locating toward aiding organizing, manipulating and optimization of concepts of quality properties in a unified manner. Initial cases are illustrated.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extraction and Disambiguation of Name of Place from Tourism Blogs","authors":"Tetsuya Nakatoh, Chengjiu Yin, S. Hirokawa","doi":"10.1109/SSNE.2011.29","DOIUrl":"https://doi.org/10.1109/SSNE.2011.29","url":null,"abstract":"By development of the Internet in recent years, tourism portal sites and blog articles about tourism increased on WWW. Acquisition of various tourism information became easy. When gathering and classifying the information automatically from blog articles, it is not easy to decide automatically place names used as the key. In this paper, we propose a method of extracting place names from blog articles automatically. Moreover, we also tried disambiguation of a place name.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Tourism Data Using Double Ranking","authors":"S. Hirokawa, Jun Zeng","doi":"10.1109/SSNE.2011.28","DOIUrl":"https://doi.org/10.1109/SSNE.2011.28","url":null,"abstract":"The prompt discovery and mining of user's reputation, opinion and complaint are becoming a hot topic in the field of search engine for Blog and Twitter. This paper proposes \"Double Rank\" method to analyze the search result using two viewpoints, where the polarity degree of keywords in the search results are evaluated from the viewpoints. Most previous researches concern mainly in positive and negative evaluation as for the polarity degree. Two viewpoints are specified as the search condition in the present paper. The blog articles related to sightseeing are analyzed as case studies, where the characteristics and the sightseeing situation are compared for two prefectures.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125437222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Colony Optimization Based Service Flow Scheduling with Various QoS Requirements in Cloud Computing","authors":"Hui Liu, Dong Xu, Huai-kou Miao","doi":"10.1109/SSNE.2011.18","DOIUrl":"https://doi.org/10.1109/SSNE.2011.18","url":null,"abstract":"There are a mass of researches on the issue of scheduling in cloud computing, most of them, however, are bout workflow and job scheduling. There are fewer researches on service flow scheduling. Here we propose a model of service flow scheduling with various quality of service (QoS) requirements in cloud computing firstly, then we adopt the use of an ant colony optimization (ACO) algorithm to optimize service flow scheduling. In our model, we use default rate to describe the radio of cloud service provider breaking service level agreement (SLA), and also introduce an SLA monitoring module to monitor the running state of cloud services.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Minerror of the pn-Periodic Sequences","authors":"Zhihua Niu, Danfeng Guo, Mingjun Xin","doi":"10.1109/SSNE.2011.24","DOIUrl":"https://doi.org/10.1109/SSNE.2011.24","url":null,"abstract":"To ensure the security of the data during transmission, the data should be encrypted by a key stream sequence which should be strong enough with good randomness and unpredictability. Cryptographically strong sequences should not only have a large linear complexity, but also the change of a few terms should not cause a significant decrease of the linear complexity. This requirement leads to the theory of the stability of linear complexity. K-error linear complexity reflects the stability of the linear complexity properly. In this paper, by analyzing the relationship between the linear complexity and the k-error linear complexity of pn - periodic sequence, we studied the upper bound of minerror, i.e. the minimum value k for which the k-error linear complexity is strictly less than the linear complexity. Here p is an odd prime, and q is a prime and a primitive root (mod p2 ).","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Technology Convergence for Industry in Korea","authors":"B. Kang","doi":"10.1109/SSNE.2011.14","DOIUrl":"https://doi.org/10.1109/SSNE.2011.14","url":null,"abstract":"In this paper, we summarized the technologies of great promise related with information technology by reference to the reports issued by popular research institutes or organizations in the inside and outside of country. We clssified those technologies by the fields of study in information technology, contents technology, biotechnology, nanotechnology, green technology, manufacture technology, service technology, robot technology, and human technology. And then we introduced the research direction of information technology convergence for industry in the Republic of Korea.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposal of Middle-Agent Based Framework for Innovating a Business Model","authors":"H. Nakagawa, A. Nagai, Takayuki Ito","doi":"10.1109/SSNE.2011.26","DOIUrl":"https://doi.org/10.1109/SSNE.2011.26","url":null,"abstract":"In this paper, with a middle-agent based framework, we can expect to figure out a business model that is focused on distributors for win-win cooperation and collaboration by revealing the effect, the influence, and the requirement for consensus in cooperation and collaboration. Cooperation and collaboration help companies collect such resources as technologies, knowledge, information, and funds as well as creating new businesses and developing new products. Distributors can create good cooperation and collaboration by mediating between manufacturing and user companies. We give an example of the collaborative development of new products where a distributor mediated between maker and user companies. Application Specific Standard Product (ASSP), which is an LSI for specific applications, is attracting attention. To develop an ASSP, both semiconductor and user companies must agree on the functions that the ASSP has and how many ASSPs must be considered without disclosing secret information. In this paper, We modeled distributors in a collaborative development and implemented a tool for an agent-based simulation, in which we imagined a market where a product is developed, sold, and bought. We investigated the role of middle agents, distributors and how they affect the market. In addition, we proposed a framework for examining a new business model.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"29 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128298921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NFR Modeling Approaches","authors":"M. Iqbal","doi":"10.1109/SSNE.2011.11","DOIUrl":"https://doi.org/10.1109/SSNE.2011.11","url":null,"abstract":"Non-functional requirements (NFRs) are one of the major concerns in system requirement engineering. NFRs must be considered for a successful software project and thus modeling of NFRs is of equal importance. Unfortunately, most of the available literature is focused on modeling of functional requirements and comparatively less effort is done on modeling of non-functional requirements. In this paper we have conducted a literature survey to find the different approaches available to model non-functional requirements and concluded (on the basis of a quality criterion) that which approach is better than others for this purpose.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shopping Mall System with Image Retrieval Based on UML","authors":"Yan Ha, BoYoun Kim","doi":"10.1109/SSNE.2011.22","DOIUrl":"https://doi.org/10.1109/SSNE.2011.22","url":null,"abstract":"This paper proposes a service which searches goods by images and finds a shopping mall site that offers referral services. In the service, images are obtained in various types. For image management, it will be modeled using UML Diagram. Unlike other existing sites, the service applied sites have special advantages in:1) Using sketch accessories which enable users to draw pictures.2) Support functions that search various types of images by pattern and shape.In addition to features which were mentioned above, we aim to link individuals and shopping mall sites by improved information searching techniques, ultimately providing a space that realizes user's sympathy and trust. Our goal is making a space which offers following services. When a user draws image of goods that the user is looking for, the website proposes similar looking goods and links to a shopping mall site that sells proposed goods, eventually leading user's searching to sales.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}