2008 IEEE 8th International Conference on Computer and Information Technology Workshops最新文献

筛选
英文 中文
An Approach to Support and Partially Automate Requirements Engineering Activities 支持和部分自动化需求工程活动的方法
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.83
S.A. Fahmi, A. Ibrahim, Ho‐Jin Choi
{"title":"An Approach to Support and Partially Automate Requirements Engineering Activities","authors":"S.A. Fahmi, A. Ibrahim, Ho‐Jin Choi","doi":"10.1109/CIT.2008.WORKSHOPS.83","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.83","url":null,"abstract":"Requirements elicitation can be considered as one of the most critical and troublesome job while developing a system. Some of the requirements problems are incorrect fact, omission and inconsistency of data. Now a days, another problem is to get appointment with stakeholders for elicitation activities due to their busy schedule and mobility. Our proposed approach solves these problems by using a system that finds out unanswered part of requirements documents and generates questioners from those sections. These questions are answered by stakeholders through mobile devices and finally the system checks the answer data for consistency and then generates requirements documents that are complete and correct. We mentioned this approach partially automatic as an expert requirements analyst overall supervises the whole system.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"64 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Strategy for Attributes Selection in Cost-Sensitive Decision Trees Induction 成本敏感决策树归纳中属性选择策略
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.51
Shichao Zhang, Li Liu, Xiaofeng Zhu, Chen Zhang
{"title":"A Strategy for Attributes Selection in Cost-Sensitive Decision Trees Induction","authors":"Shichao Zhang, Li Liu, Xiaofeng Zhu, Chen Zhang","doi":"10.1109/CIT.2008.WORKSHOPS.51","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.51","url":null,"abstract":"Decision tree learning is one of the most widely used and practical methods for inductive inference. A fundamental issue in decision tree inductive learning is the attribute selection measure at each non-terminal node of the tree. However, existing literatures have not taken both classification ability and cost-sensitive into account well. In this paper, we present a new strategy for attributes selection, which is a trade-off method between attributes' information and cost-sensitive learning including misclassification costs and test costs with different units, for selecting splitting attributes in cost-sensitive decision trees induction. The experimental results show our method outperform than the existing methods, such as, information gain method, total costs methods, in terms of the decrease of misclassification costs with different missing rate and various costs in UCI datasets.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Practical Performance Evaluation of Peer-to-Peer Internet Telephony Using SIP 基于SIP的点对点网络电话实际性能评估
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.44
B. Meyer, M. Portmann
{"title":"Practical Performance Evaluation of Peer-to-Peer Internet Telephony Using SIP","authors":"B. Meyer, M. Portmann","doi":"10.1109/CIT.2008.WORKSHOPS.44","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.44","url":null,"abstract":"Peer-to-peer (P2P) systems have been shown to have excellent scalability and fault tolerance characteristics, mainly due to their distributed nature and the lack of a single point of failure. As a result, P2P technology has been proposed for a wide range of applications. Recently, a number of researchers proposed the use of P2P technology in the context of Voice over IP (VoIP) or Internet Telephony, in particular with the IETF's Session Initiation Protocol (SIP).By replacing the centralised components of the client/server based SIP protocol with a P2P system (P2P-SIP), a higher level of robustness and scalability can be achieved. However, this comes at the cost of a higher latency, which might negatively impact on the Quality of Service (QoS) due to increased delays in call establishment. In this paper, we provide a practical performance evaluation of a P2P-SIP system via extensive measurements on OpenDHT, a large scale, publicly accessible P2P system. The basis of this evaluation is formed by our own implementation of a P2P-SIP system, and standard, SIP-compliant client software. Our results confirm the feasibility of the P2P-SIP approach, since the cost in terms of increased delay in call setup time is quite moderate and well below the recommended value for traditional telephony defined by the Standardisation Sector of the International Telecommunication Union (ITU-T).","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121745793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Protecting Information Systems from DDoS Attack Using Multicore Methodology 利用多核方法保护信息系统免受DDoS攻击
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.88
Ashley Chonka, Wanlei Zhou, K. Knapp, Y. Xiang
{"title":"Protecting Information Systems from DDoS Attack Using Multicore Methodology","authors":"Ashley Chonka, Wanlei Zhou, K. Knapp, Y. Xiang","doi":"10.1109/CIT.2008.WORKSHOPS.88","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.88","url":null,"abstract":"Previous work, in the area of defense systems has focused on developing a firewall like structure, in order to protect applications from attacks. The major drawback for implementing security in general, is that it affects the performance of the application they are trying to protect. In fact, most developers avoid implementing security at all. With the coming of new multicore systems, we might at last be able to minimize the performance issues that security places on applications. In our bodyguard framework we propose a new kind of defense that acts alongside, not in front, of applications. This means that performance issues that effect system applications are kept to a minimum, but at the same time still provide high grade security. Our experimental results demonstrate that a ten to fifteen percent speedup in performance is possible, with the potential of greater speedup.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Context Reasoning Using Contextual Graph 使用上下文图进行上下文推理
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.96
Tam V. Nguyen, Deokjai Choi
{"title":"Context Reasoning Using Contextual Graph","authors":"Tam V. Nguyen, Deokjai Choi","doi":"10.1109/CIT.2008.WORKSHOPS.96","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.96","url":null,"abstract":"Nowadays the combination of virtually free computation and ubiquitous environment has formed the new domain of pervasive computing. Context reasoning part in the context awareness seems to become one of the most important goals of that computing trend. Our approach comes from the behaviors of the context which depends on various aspects of the surrounding contexts. In this paper, we present a novel approach to model and reason context based on contextual graphs. We introduce the contextual graph in details and the context reasoning process for supporting ubiquitous computing. The contextual graph is expected to make it easier for developers to develop various applications with the need of context reasoning.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127726830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Trusted Aspect Composition 迈向可信方面组合
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.39
Chengwan He, Zheng Li, K. He
{"title":"Towards Trusted Aspect Composition","authors":"Chengwan He, Zheng Li, K. He","doi":"10.1109/CIT.2008.WORKSHOPS.39","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.39","url":null,"abstract":"Aspect composition in the aspect-oriented software may lead to the structural conflict and behavioral conflict, which are two key issues must be solved in the trusted aspect-oriented software development. The paper introduces an approach to solve the problems of the structural conflict in the architecture level, based on the reflection mechanism, and brings forward an approach based on the concepts of design by contract and behavioral subtyping to achieve the automatic detection of the behavioral conflict at runtime.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
From Good to Bad Ones: Making Spam Detection Easier 从好的到坏的:使垃圾邮件检测更容易
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.49
Li Zhao, Qiancheng Jiang, Yan Zhang
{"title":"From Good to Bad Ones: Making Spam Detection Easier","authors":"Li Zhao, Qiancheng Jiang, Yan Zhang","doi":"10.1109/CIT.2008.WORKSHOPS.49","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.49","url":null,"abstract":"Previous researches of the anti-spamming have proved that results can be greatly improved when bad seeds are used together with good ones. However, how to select bad seeds efficiently is a big challenge. In this paper we discuss how to select bad seeds based on good seeds selection. The experiments running on over 13M Web pages show that our method is practical and time-saving. Moreover, the selected bad seeds can enhance the performance of a good seed set on effectively filtering out spam from normal pages.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":" 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hierarchical Integer Pixel and Adaptive Fractional Pixel Motion Estimation 分层整数像素和自适应分数像素运动估计
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.99
H. Yoon, HyeSuk Kim, Miyoung Kim, Lai Nga, Gueesang Lee
{"title":"Hierarchical Integer Pixel and Adaptive Fractional Pixel Motion Estimation","authors":"H. Yoon, HyeSuk Kim, Miyoung Kim, Lai Nga, Gueesang Lee","doi":"10.1109/CIT.2008.WORKSHOPS.99","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.99","url":null,"abstract":"Motion estimation (ME) plays an important role in digital video compression, since it can significantly affect the image quality, the encoding speed and the compression ratio. ME is very computationally demanding part of the encoder. To reduce computational complexity and to maintain the good image quality, integer pixel and fractional pixel ME methods are proposed in this paper. For integer pixel ME, a hierarchical search strategy is proposed. This strategy method consists of symmetrical cross search pattern, multi square grid pattern, large and small diamond search patterns. To reduce the computational time and not to fall into the local minimum, these search patterns place search points symmetrically and evenly in the overall search area. After integer pixel ME, the adaptive fractional pixel ME method is performed. This fractional pixel ME method decides the search pattern adaptively according to the block size. Experimental results show that the speedup improvement of the proposed method over unsymmetrical cross multi hexagon grid search (UMHexagonS) and full search (FS) can be about 1.2~ 5.2 times faster. Compared to image quality of FS, the proposed method shows an average PSNR drop of 0.01 dB while showing an average PSNR gain of 0.02 dB in comparison to that of UMHexagonS.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126032968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cover Selection Steganography Method Based on Similarity of Image Blocks 基于图像块相似性的封面选择隐写方法
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.34
H. Sajedi, M. Jamzad
{"title":"Cover Selection Steganography Method Based on Similarity of Image Blocks","authors":"H. Sajedi, M. Jamzad","doi":"10.1109/CIT.2008.WORKSHOPS.34","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.34","url":null,"abstract":"An advantage of steganography, as opposed to other information hiding techniques, is that the embedder can select a cover image that results in the least detectable stego image. In a previously proposed method, a technique based on block texture similarity was introduced where blocks of cover image were replaced with the similar secret image blocks; then indices of secret image blocks were stored in cover image. In this method, the blocks of secret image are compared with blocks of a set of cover images and the image with most similar blocks to those of the secret image is selected as the best candidate to carry the secret image. Using appropriate features for comparing image blocks, guaranties higher quality of stego images and consequently, allows for higher embedding capacity, less delectability and, enhanced security. Based on this idea, in this paper, an adaptive cover selection steganography method is proposed, that uses statistical features of image blocks and their neighborhood. Using the block neighborhood information, we prevent appearing virtual edges in the sides and corners of the replaced blocks. Our method is examined with feature based and wavelet based steganalysis algorithms. The results prove the effectiveness and benefits of the proposed method.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A Framework for Intelligent Video Surveillance 一种智能视频监控框架
2008 IEEE 8th International Conference on Computer and Information Technology Workshops Pub Date : 2008-07-08 DOI: 10.1109/CIT.2008.WORKSHOPS.112
F. Ekpar
{"title":"A Framework for Intelligent Video Surveillance","authors":"F. Ekpar","doi":"10.1109/CIT.2008.WORKSHOPS.112","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.112","url":null,"abstract":"This paper presents a framework for intelligent video surveillance. Robust distortion correction and rendering algorithms permit the system to support a wide range of video stream sources, including 360-degree panoramic video systems, and to facilitate the substitution of video stream sources, leading to increased scalability. Adaptive object detection, classification and tracking algorithms are employed in a progressive training configuration that allows the system to learn from previous mistakes and to improve performance with increased use. Multiple video stream sources can be combined with arbitrarily shaped overlay surfaces designed to overlay spatially resolved and localized detected and tracked objects on global / local maps such as Global Positioning System (GPS)-enabled maps of the monitored scene for vastly improved situational awareness. Another unique feature of the system is the incorporation of bi-directional communication between the overlay surfaces and the rest of the system via the control unit that enables the use of the localized objects displayed on the overlay surfaces to control the acquisition of higher resolution video corresponding to the region containing the objects in the monitored scene.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132967746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信