2013 IEEE 37th Annual Computer Software and Applications Conference Workshops最新文献

筛选
英文 中文
Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination 电子邮件中url域名注册日期检索系统,提高垃圾邮件识别率
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.79
Masayuki Matsuoka, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, Masato Minda
{"title":"Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination","authors":"Masayuki Matsuoka, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, Masato Minda","doi":"10.1109/COMPSACW.2013.79","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.79","url":null,"abstract":"In recent years, many spam mails intending for ``One-click fraud\" or ``Phishing\" have been sent to many unspecified e-mail users. As one anti-spam technology, URL Blacklist based on the URLs in the spam mails is well used. However, spammers have been avoiding this technique by getting many new domains, using them only in a few spam mails, and throwing them away. In this paper, we focus on the domain registration date related to the URLs in the messages in order to improve the discrimination accuracy of spam mails. Thus, we address design and implementation of the domain registration date retrieval system which obtains domain lists from some Top Level Domain registries and records registration dates for each domain in the lists. With this system, we can retrieve the registration date of a domain by DNS.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Integrated Formal Model for Context-Aware Systems 上下文感知系统的集成形式化模型
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.40
Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, A. Helal
{"title":"An Integrated Formal Model for Context-Aware Systems","authors":"Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, A. Helal","doi":"10.1109/COMPSACW.2013.40","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.40","url":null,"abstract":"Context-aware applications should consider the devices and networks engaged in the systems, as well as the complex control and data structures in the applications. This makes it not so straightforward to understand applications and to achieve the quality of applications, without well-defined formal model adequate to the intended goals. In this paper, we propose a formal model for context aware system, which provides device behaviors with temporal features, enriched with commonly used categorization of context. Thus this model enables integrated management of the interconnected devices with context information for a context-aware system, so as to be employed for the critical purposes like safety enhancement.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis 基于用户行为数据分析的在线服务需求理解
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.8
Qing Zhou, Lin Liu
{"title":"Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis","authors":"Qing Zhou, Lin Liu","doi":"10.1109/COMPSACW.2013.8","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.8","url":null,"abstract":"User behavioural data provides important cue for deficiencies in the current software design, and points for improvement in future design. Today's web based software services providers could collect different kinds of service usage data, which is a good source of information which can help developers better understand user's behaviours. This paper takes the example of the evolution of an online dictionary services, explores answers for questions such as: what are the key indicators with regard to the quality of software product design and service content, and how to enhance new product success by understandings obtained from user behavioural data analysis. In this paper, we first summarise the possible types of web log data that can be collected so far, Then we introduce a user behaviour model generated for the dictionary domain based on user behavioural data analysis, then we discuss how data collection function shall co-evolve with the online services, and how specific data analysis approaches such as mining algorithms and statistical functions can help generate interesting analysis results of value to design decision makers.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiagent System for Priority-Based Load Shedding in Microgrid 基于优先级的微电网减载多智能体系统
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.133
T. Kato, Hideyuki Takahashi, K. Sasai, Yujin Lim, Hak-Man Kim, G. Kitagata, Tetsuo Kinoshita
{"title":"Multiagent System for Priority-Based Load Shedding in Microgrid","authors":"T. Kato, Hideyuki Takahashi, K. Sasai, Yujin Lim, Hak-Man Kim, G. Kitagata, Tetsuo Kinoshita","doi":"10.1109/COMPSACW.2013.133","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.133","url":null,"abstract":"The electricity consumption in the world is constantly increasing, and our lives become more and more dependent on electricity. There are several new paradigms proposed in the field of power grid. In Japan, especially after the Great East Japan Earthquake in March 2011, the new power system paradigms are expected to be more resilient to survive several difficulties during a disaster situation. In this paper, we focus on microgrid and propose a new multiagent-based load shedding scheme and multiagent architecture to realize the resilient power grid. We developed a prototype system to evaluate our scheme, and performed an evaluation of our proposals. The result of the evaluation shows the effectiveness of our proposals, despite of the physical uncertainty.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions 通过表达和执行设计决策来交付可靠的可重用组件
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.113
Andrea Calvagna, E. Tramontana
{"title":"Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions","authors":"Andrea Calvagna, E. Tramontana","doi":"10.1109/COMPSACW.2013.113","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.113","url":null,"abstract":"A component is usually complemented with guidelines expressing its proper use, e.g. the appropriate order of calls that clients should conform to. During reuse, clients could easily alter such an order, and this could result in reused components that become unreliable, since architectural guidelines have not been honoured. Sometimes architectural guidelines are simply unknown, hence whether components are misused by clients is uncertain. This paper proposes an approach to document the architectural guidelines that client classes should comply with when reusing a component. We empower component developers to provide such guidelines, conveying design decisions, along with the code of components in such a way to be apt to automatic checks. Then, clients compliance with architectural guidelines of reused components can be automatically checked by an aspect-based tool. As a result, proper usage of reused components can be ensured, and in turn the behaviour of components should be correct. This strengthen the reliability of the resulting system. Especially for continuous evolution, having automatic conformance checks is paramount for obtaining the correct behaviour of reused components.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An UML Behavior Diagram Based Automatic Testing Approach 基于UML行为图的自动测试方法
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.116
Chih-Hung Chang, Chih-Wei Lu, W. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai
{"title":"An UML Behavior Diagram Based Automatic Testing Approach","authors":"Chih-Hung Chang, Chih-Wei Lu, W. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai","doi":"10.1109/COMPSACW.2013.116","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.116","url":null,"abstract":"In the process of software development, software testing is a huge project, and most of the software functionality testing is complex and repetitive, should to spend a lot of cost and manpower. Therefore, you can save a lot of manpower and costs, avoid human error and improve software quality if we can achieve automated testing. In the software development process, the application of model-driven developments has grown wider recently. The main concept is to fetch all of the significant properties referring to system design, and use formal or semi-formal model to describe system in different levels of abstraction. In this paper, we apply a tool based on high level Petri Net model of automated testing -- MISTA [1](Model based Integration and System Testing Automation) to automated generate test code for system. In this paper, through capture the information of the state machine diagram describes the behavior of the system in the Unified Modeling Language. Through the eXtensible Markup Language automation converted to High Level Petri Net test model, and then using automated test code generating software MISTA generation test cases and test code of system to achieve automated testing, and save the software required for testing a large number of human costs, and the software development process from design architecture to the software testing for a bridging.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model 恶意模型中保护隐私的两方k-均值聚类
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.53
Rahena Akhter, Rownak Jahan Chowdhury, K. Emura, T. Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat
{"title":"Privacy-Preserving Two-Party k-Means Clustering in Malicious Model","authors":"Rahena Akhter, Rownak Jahan Chowdhury, K. Emura, T. Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat","doi":"10.1109/COMPSACW.2013.53","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.53","url":null,"abstract":"In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacy-preserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134094912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Analyzing Distribution of Implicit Semantic Information in Web Services Web服务中隐含语义信息的分布分析
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.122
Xiaocao Hu, Zhiyong Feng, Shizhan Chen
{"title":"Analyzing Distribution of Implicit Semantic Information in Web Services","authors":"Xiaocao Hu, Zhiyong Feng, Shizhan Chen","doi":"10.1109/COMPSACW.2013.122","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.122","url":null,"abstract":"Semantic annotation for Web services represents an important approach that transforms Web services into Semantic Web services. This paper analyzes the distribution of implicit semantic information to enhance the understanding about Web services. After quantifying implicit semantic information in Web services, the PCA methodology is utilized for obtaining principal components of implicit semantic information. The experiment conducted on 11836 WSDL documentations shows that almost 97 percent of implicit semantic information is distributed in inputs and outputs. Thus, the evaluation of how much implicit semantic information can be described by semantic annotation is offered.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"224 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information 基于实时状态和/或统计信息的IP移动通信质量网络选择标准的考虑
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.76
Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, N. Hayashi, R. Aibara
{"title":"Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information","authors":"Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, N. Hayashi, R. Aibara","doi":"10.1109/COMPSACW.2013.76","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.76","url":null,"abstract":"In IP mobility communications, handoff is one of critical points degrading mobile communications quality. To solve this problem, many network selection methods have been proposed. We also proposed a network selection method in handoff and multi-homing to improve IP mobility communications quality. To select the best network interface or communication medium, it is required to obtain QoS criteria such as transmission delay time and packet loss ratio. The mobile node itself may measure real-time network status to obtain the criteria, or the mobile node may obtain statistical information stored in any database on the Internet. Though the criteria collection way affects much on network selection, it is not discussed in detail in the existing research. The purpose of this paper is to consider the difference types of network selection criteria from the viewpoint of effects on IP mobility communications quality. For this purpose, we first designed and implemented two prototype systems to obtain the different types of the criteria. One is a function to measure real-time network status in a mobile node itself. The other one is to obtain the stored statistical information in the database on the Internet. Next, we compare the two kinds of criteria by some field experiments. For the experiments, we also implemented a prototype system using both functions in our proposed IP mobility architecture. Through the experimental evaluations, we showed quantitative comparison of two types of network selection criteria by satisfaction ratio of QoS required by some applications.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Architectural Design of a Job Management System Leveraging Software Defined Network 利用软件定义网络的作业管理系统的体系结构设计
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.108
Yasuhiro Watashiba, S. Date, H. Abe, Koheix Ichikawa, Hiroaki Yamanaka, Eiji Kawai, H. Takemura
{"title":"An Architectural Design of a Job Management System Leveraging Software Defined Network","authors":"Yasuhiro Watashiba, S. Date, H. Abe, Koheix Ichikawa, Hiroaki Yamanaka, Eiji Kawai, H. Takemura","doi":"10.1109/COMPSACW.2013.108","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.108","url":null,"abstract":"Whether to be able to efficiently utilize the interconnect in a cluster system is a key factor in deciding the computational performance especially for a class of jobs that require intensive communications between processes. However, most of Job Management Systems (JMSs), which are deployed on cluster systems for load-balancing, do not have any mechanism that takes the pattern and requirements of communication occurred in a job into consideration, regardless of potential large impact on its performance. In this research, we explore a novel JMS that can assign computing resources to jobs submitted to the JMS from a standpoint of efficient use of both network and processor resource. More technically, in this paper, a JMS that integrates the network programming functionality of OpenFlow as Software Defined Network is proposed and discussed towards better and more efficient allocation of computing and network resources.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信