{"title":"An Approach to Support and Partially Automate Requirements Engineering Activities","authors":"S.A. Fahmi, A. Ibrahim, Ho‐Jin Choi","doi":"10.1109/CIT.2008.WORKSHOPS.83","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.83","url":null,"abstract":"Requirements elicitation can be considered as one of the most critical and troublesome job while developing a system. Some of the requirements problems are incorrect fact, omission and inconsistency of data. Now a days, another problem is to get appointment with stakeholders for elicitation activities due to their busy schedule and mobility. Our proposed approach solves these problems by using a system that finds out unanswered part of requirements documents and generates questioners from those sections. These questions are answered by stakeholders through mobile devices and finally the system checks the answer data for consistency and then generates requirements documents that are complete and correct. We mentioned this approach partially automatic as an expert requirements analyst overall supervises the whole system.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"64 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Strategy for Attributes Selection in Cost-Sensitive Decision Trees Induction","authors":"Shichao Zhang, Li Liu, Xiaofeng Zhu, Chen Zhang","doi":"10.1109/CIT.2008.WORKSHOPS.51","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.51","url":null,"abstract":"Decision tree learning is one of the most widely used and practical methods for inductive inference. A fundamental issue in decision tree inductive learning is the attribute selection measure at each non-terminal node of the tree. However, existing literatures have not taken both classification ability and cost-sensitive into account well. In this paper, we present a new strategy for attributes selection, which is a trade-off method between attributes' information and cost-sensitive learning including misclassification costs and test costs with different units, for selecting splitting attributes in cost-sensitive decision trees induction. The experimental results show our method outperform than the existing methods, such as, information gain method, total costs methods, in terms of the decrease of misclassification costs with different missing rate and various costs in UCI datasets.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Performance Evaluation of Peer-to-Peer Internet Telephony Using SIP","authors":"B. Meyer, M. Portmann","doi":"10.1109/CIT.2008.WORKSHOPS.44","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.44","url":null,"abstract":"Peer-to-peer (P2P) systems have been shown to have excellent scalability and fault tolerance characteristics, mainly due to their distributed nature and the lack of a single point of failure. As a result, P2P technology has been proposed for a wide range of applications. Recently, a number of researchers proposed the use of P2P technology in the context of Voice over IP (VoIP) or Internet Telephony, in particular with the IETF's Session Initiation Protocol (SIP).By replacing the centralised components of the client/server based SIP protocol with a P2P system (P2P-SIP), a higher level of robustness and scalability can be achieved. However, this comes at the cost of a higher latency, which might negatively impact on the Quality of Service (QoS) due to increased delays in call establishment. In this paper, we provide a practical performance evaluation of a P2P-SIP system via extensive measurements on OpenDHT, a large scale, publicly accessible P2P system. The basis of this evaluation is formed by our own implementation of a P2P-SIP system, and standard, SIP-compliant client software. Our results confirm the feasibility of the P2P-SIP approach, since the cost in terms of increased delay in call setup time is quite moderate and well below the recommended value for traditional telephony defined by the Standardisation Sector of the International Telecommunication Union (ITU-T).","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121745793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Information Systems from DDoS Attack Using Multicore Methodology","authors":"Ashley Chonka, Wanlei Zhou, K. Knapp, Y. Xiang","doi":"10.1109/CIT.2008.WORKSHOPS.88","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.88","url":null,"abstract":"Previous work, in the area of defense systems has focused on developing a firewall like structure, in order to protect applications from attacks. The major drawback for implementing security in general, is that it affects the performance of the application they are trying to protect. In fact, most developers avoid implementing security at all. With the coming of new multicore systems, we might at last be able to minimize the performance issues that security places on applications. In our bodyguard framework we propose a new kind of defense that acts alongside, not in front, of applications. This means that performance issues that effect system applications are kept to a minimum, but at the same time still provide high grade security. Our experimental results demonstrate that a ten to fifteen percent speedup in performance is possible, with the potential of greater speedup.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Reasoning Using Contextual Graph","authors":"Tam V. Nguyen, Deokjai Choi","doi":"10.1109/CIT.2008.WORKSHOPS.96","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.96","url":null,"abstract":"Nowadays the combination of virtually free computation and ubiquitous environment has formed the new domain of pervasive computing. Context reasoning part in the context awareness seems to become one of the most important goals of that computing trend. Our approach comes from the behaviors of the context which depends on various aspects of the surrounding contexts. In this paper, we present a novel approach to model and reason context based on contextual graphs. We introduce the contextual graph in details and the context reasoning process for supporting ubiquitous computing. The contextual graph is expected to make it easier for developers to develop various applications with the need of context reasoning.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127726830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Trusted Aspect Composition","authors":"Chengwan He, Zheng Li, K. He","doi":"10.1109/CIT.2008.WORKSHOPS.39","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.39","url":null,"abstract":"Aspect composition in the aspect-oriented software may lead to the structural conflict and behavioral conflict, which are two key issues must be solved in the trusted aspect-oriented software development. The paper introduces an approach to solve the problems of the structural conflict in the architecture level, based on the reflection mechanism, and brings forward an approach based on the concepts of design by contract and behavioral subtyping to achieve the automatic detection of the behavioral conflict at runtime.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Good to Bad Ones: Making Spam Detection Easier","authors":"Li Zhao, Qiancheng Jiang, Yan Zhang","doi":"10.1109/CIT.2008.WORKSHOPS.49","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.49","url":null,"abstract":"Previous researches of the anti-spamming have proved that results can be greatly improved when bad seeds are used together with good ones. However, how to select bad seeds efficiently is a big challenge. In this paper we discuss how to select bad seeds based on good seeds selection. The experiments running on over 13M Web pages show that our method is practical and time-saving. Moreover, the selected bad seeds can enhance the performance of a good seed set on effectively filtering out spam from normal pages.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":" 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Yoon, HyeSuk Kim, Miyoung Kim, Lai Nga, Gueesang Lee
{"title":"Hierarchical Integer Pixel and Adaptive Fractional Pixel Motion Estimation","authors":"H. Yoon, HyeSuk Kim, Miyoung Kim, Lai Nga, Gueesang Lee","doi":"10.1109/CIT.2008.WORKSHOPS.99","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.99","url":null,"abstract":"Motion estimation (ME) plays an important role in digital video compression, since it can significantly affect the image quality, the encoding speed and the compression ratio. ME is very computationally demanding part of the encoder. To reduce computational complexity and to maintain the good image quality, integer pixel and fractional pixel ME methods are proposed in this paper. For integer pixel ME, a hierarchical search strategy is proposed. This strategy method consists of symmetrical cross search pattern, multi square grid pattern, large and small diamond search patterns. To reduce the computational time and not to fall into the local minimum, these search patterns place search points symmetrically and evenly in the overall search area. After integer pixel ME, the adaptive fractional pixel ME method is performed. This fractional pixel ME method decides the search pattern adaptively according to the block size. Experimental results show that the speedup improvement of the proposed method over unsymmetrical cross multi hexagon grid search (UMHexagonS) and full search (FS) can be about 1.2~ 5.2 times faster. Compared to image quality of FS, the proposed method shows an average PSNR drop of 0.01 dB while showing an average PSNR gain of 0.02 dB in comparison to that of UMHexagonS.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126032968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cover Selection Steganography Method Based on Similarity of Image Blocks","authors":"H. Sajedi, M. Jamzad","doi":"10.1109/CIT.2008.WORKSHOPS.34","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.34","url":null,"abstract":"An advantage of steganography, as opposed to other information hiding techniques, is that the embedder can select a cover image that results in the least detectable stego image. In a previously proposed method, a technique based on block texture similarity was introduced where blocks of cover image were replaced with the similar secret image blocks; then indices of secret image blocks were stored in cover image. In this method, the blocks of secret image are compared with blocks of a set of cover images and the image with most similar blocks to those of the secret image is selected as the best candidate to carry the secret image. Using appropriate features for comparing image blocks, guaranties higher quality of stego images and consequently, allows for higher embedding capacity, less delectability and, enhanced security. Based on this idea, in this paper, an adaptive cover selection steganography method is proposed, that uses statistical features of image blocks and their neighborhood. Using the block neighborhood information, we prevent appearing virtual edges in the sides and corners of the replaced blocks. Our method is examined with feature based and wavelet based steganalysis algorithms. The results prove the effectiveness and benefits of the proposed method.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Intelligent Video Surveillance","authors":"F. Ekpar","doi":"10.1109/CIT.2008.WORKSHOPS.112","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.112","url":null,"abstract":"This paper presents a framework for intelligent video surveillance. Robust distortion correction and rendering algorithms permit the system to support a wide range of video stream sources, including 360-degree panoramic video systems, and to facilitate the substitution of video stream sources, leading to increased scalability. Adaptive object detection, classification and tracking algorithms are employed in a progressive training configuration that allows the system to learn from previous mistakes and to improve performance with increased use. Multiple video stream sources can be combined with arbitrarily shaped overlay surfaces designed to overlay spatially resolved and localized detected and tracked objects on global / local maps such as Global Positioning System (GPS)-enabled maps of the monitored scene for vastly improved situational awareness. Another unique feature of the system is the incorporation of bi-directional communication between the overlay surfaces and the rest of the system via the control unit that enables the use of the localized objects displayed on the overlay surfaces to control the acquisition of higher resolution video corresponding to the region containing the objects in the monitored scene.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132967746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}