2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

筛选
英文 中文
Software reliability case development method based on software reliability characteristic model and measures of defect control 基于软件可靠性特征模型和缺陷控制措施的软件可靠性用例开发方法
L. Yuhua, Lu Min-yan, X. Biao
{"title":"Software reliability case development method based on software reliability characteristic model and measures of defect control","authors":"L. Yuhua, Lu Min-yan, X. Biao","doi":"10.1109/ICSESS.2016.7883004","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883004","url":null,"abstract":"For high reliability software, mission critical system software and embedded system software, to demonstrate convincingly and validly that the software satisfies the reliability requirements is one of the most challenging issues. In this paper, we present a method for developing software reliability case based on software reliability characteristic model and measures of defect control. Three software reliability argument patterns are proposed. As a case study, we take the load control software to demonstrate how a software reliability case can be generated using the proposed method and corresponding argument patterns.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on building trustworthy software system by self-adaptation 基于自适应构建可信软件系统的研究
Shan Tang, Liping Li, Xiaolin Cao
{"title":"Research on building trustworthy software system by self-adaptation","authors":"Shan Tang, Liping Li, Xiaolin Cao","doi":"10.1109/ICSESS.2016.7883250","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883250","url":null,"abstract":"The execution context of today's software systems changes continually, which makes systems have to cope with changing environments while at the same time facing high non-functional requirements such as flexibility and dependability. Runtime adaptation technology can modify behaviors and structures in response to changes in the system itself or in its environment and thus improve dependability at run time. This leads to a more flexible and effective way to build dependable software system. However, current works address adaptation often remain a neglected gap between the architecture model and the system state. To solve this problem, we present a systematic process that covers requirements modeling, architecture and system modeling of trustworthy software based on a runtime self-adaptation perspective.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134175807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security risk assessment method of website based on threat analysis combined with AHP and entropy weight 基于威胁分析的AHP与熵权相结合的网站安全风险评估方法
Zhiquan Lai, Yongjun Shen, Guidong Zhang
{"title":"A security risk assessment method of website based on threat analysis combined with AHP and entropy weight","authors":"Zhiquan Lai, Yongjun Shen, Guidong Zhang","doi":"10.1109/ICSESS.2016.7883113","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883113","url":null,"abstract":"In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective. This paper gives the calculation model of the method and the main procedures of risk assessment. Finally, take a website as an example to verify the rationality and effectiveness of this method.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Image retrieval using two-dimensional inverted index and semantic attributes 基于二维倒排索引和语义属性的图像检索
Wang Lei, Guoqiang Xiao
{"title":"Image retrieval using two-dimensional inverted index and semantic attributes","authors":"Wang Lei, Guoqiang Xiao","doi":"10.1109/ICSESS.2016.7883159","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883159","url":null,"abstract":"Most of the current image retrieval systems for large scale database rely on the Bag-of-Words (BoW) representation and inverted index. We analyze these systems and find that the retrieval performance is largely determined by the discriminative ability of their inverted indexes. This motivates us to combine SIFT and local color features into a two-dimensional inverted index (TD-II). Each dimension of TD-II corresponds to one kind of features, so the precision of visual match is enhanced. After constructing the TD-II of local features, we introduce a semantic-aware co-indexing algorithm which utilizes 1000 semantic attributes to insert similar images to the initial set of TD-II. Embedding semantic attributes into TD-II is totally off-line and effectively enhances the retrieval performance of TD-II. Experimental results demonstrate the competitive performance of our method, comparing with recent retrieval methods on two benchmark datasets, i.e., Ukbench and Holidays.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130959046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Link inference in the presense of load balancing 在负载均衡的情况下进行链路推理
Shaolei Wang, Lei Zhang, Chaojing Tang
{"title":"Link inference in the presense of load balancing","authors":"Shaolei Wang, Lei Zhang, Chaojing Tang","doi":"10.1109/ICSESS.2016.7883010","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883010","url":null,"abstract":"In this paper, the problem of false traceroute links caused by load balancing is analysed and formulated. To solve this problem, the authors proposed a novel reliable assumption called the Last Link Assumption based on a fact that neglected by most researchers. The limitations of proposed assumption is analysed and presented. Then, the authors proposed an effective probing algorithm called the Last Link Inference Algorithm based on the proposed assumption. After that, the effectiveness of proposed algorithm for link inference in the presence of symmetric and asymmetric per-packet load balancing is demonstrated by comparing the topology measurement results of experimental networks with classic traceroute and Paris traceroute. The support rate of proposed algorithm in the Internet environment could reach 87.5% according to our topology measurement experiment.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simultaneous Support Vector selection and parameter optimization using Support Vector Machines for sentiment classification 基于支持向量机的情感分类支持向量选择和参数优化
Ye Fei
{"title":"Simultaneous Support Vector selection and parameter optimization using Support Vector Machines for sentiment classification","authors":"Ye Fei","doi":"10.1109/ICSESS.2016.7883015","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883015","url":null,"abstract":"Sentiment classification is widely used in some areas, such as product reviews, movie reviews, and micro-blogging reviews. Sentiment classification method is mainly bag of words model, Naive Bayes and Support Vector Machine. In recent years, the machine learning method represented by support vector machine (SVM) is widely used in the field of sentiment classification. There are more and more experiments show that support vector machine (SVM) performs better than the traditional bag of words model in the field of sentiment classification. However, more researches mainly focus on semantic analysis and feature extraction on sentiment, but also did not consider the case of sample imbalance. The purpose of this study was to test the feasibility of sentiment classification based on the genetic algorithm to optimize SVM model. Genetic algorithm is an optimization algorithm, which often used for selecting the feature subset and the optimization of the SVM parameters. This paper presents a novel optimization method, which select the optimal support vector subset by genetic algorithm and optimize SVM parameters. We construct the experiment show that the proposed method has improved significantly on sentiment classification than the traditional SVM modeling capabilities.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132141703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A kind of semi-supervised classifying method research for power transformer fault diagnosis 一种用于电力变压器故障诊断的半监督分类方法研究
Siping Chen
{"title":"A kind of semi-supervised classifying method research for power transformer fault diagnosis","authors":"Siping Chen","doi":"10.1109/ICSESS.2016.7883238","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883238","url":null,"abstract":"Dissolved gas analysis is one of the most common techniques to detect the faults in the power transformers. Most of existing diagnosis method will need large amount of labeled data sets to construct classifier, while normally ignoring without unlabeled data sets. This paper presents a power transformer fault diagnosis method which based on semi-supervised classifying. In Its learning process, the semi-supervised classifying method can simultaneously use labeled data sets and unlabeled data sets to acquire more information so that make better learning effect. A semi-supervised classifying (SSC) method adopting fuzzy nearest neighborhood label propagation (FNNLP-SSC)is adopted to diagnose the fault of power transformer, in the meantime, the proposed method, based on the similarity connections between a sample and its K nearest data, classifies the unlabeled data by making the labels propagate from the labeled data to unlabeled data. The experiments indicate that method of this paper has been proposed has higher fault diagnosis accuracy compared with C-means (FCM) algorithm and the three ratio method IEC. Also, it verifies the effectiveness and feasibility of the proposed method in the transformer fault diagnosis.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization WIFI indoor positioning KNN algorithm location-based fingerprint 优化WIFI室内定位KNN算法定位指纹
Xingbin Ge, Zhiyi Qu
{"title":"Optimization WIFI indoor positioning KNN algorithm location-based fingerprint","authors":"Xingbin Ge, Zhiyi Qu","doi":"10.1109/ICSESS.2016.7883033","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883033","url":null,"abstract":"Location-based services have been deep into all aspects of life and it provides a convenient and efficient service experience for people. Currently, technology is relatively mature and widely used in the outdoor positioning. By contrast, for indoor positioning, although there are a lot of hot technology, but they are mostly insufficient lead to it is hard to popularize. So how to improve the popularity of indoor positioning in the case of improve the positioning accuracy has became a hot research topoc. This paper analyzes and studies several typical fingerprint localization algorithm, including NN, KNN and WKNN, and then propose an algorithmic improvement program, it introduces signal propagation model, finds and narrows the K-gon.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"292 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114095654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Requirements change management based on object-oriented software engineering with unified modeling language 基于面向对象软件工程的需求变更管理,采用统一的建模语言
Jessada Tomyim, A. Pohthong
{"title":"Requirements change management based on object-oriented software engineering with unified modeling language","authors":"Jessada Tomyim, A. Pohthong","doi":"10.1109/ICSESS.2016.7883005","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883005","url":null,"abstract":"User requirements for software development are getting more complicated and are changing all the time. Not only should the requirements engineering process be well-organized but requirements change management should also be effective, especially for complex systems. However, the software engineering methodology employed can also make requirements change difficult to manage. Object-oriented software engineering using unified modeling language (UML) describes software systems by providing multiple views and diagrams. Therefore, software development with UML needs effective requirements change management. This study proposed a requirements change management model for object-oriented methodology with UML. In order to demonstrate the proposed model, business models from the selected case study, Mission Hospital Phuket, were chosen as the user requirements for the prototype system. Two aspects of the proposed system's performance were evaluated in the research laboratory: (1) users' expectation and (2) users' satisfaction.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134024168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A study on the power consumption of using cryptography algorithms in mobile devices 在移动设备中使用加密算法的功耗研究
Jiehong Wu, Ilia Detchenkov, Yang Cao
{"title":"A study on the power consumption of using cryptography algorithms in mobile devices","authors":"Jiehong Wu, Ilia Detchenkov, Yang Cao","doi":"10.1109/ICSESS.2016.7883224","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883224","url":null,"abstract":"Mobile Ad Hoc network is rapidly developing research area, one of the open question in this area is secure data inside the network. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of three of the common encryption algorithms: AES, Blowfish, and GOST. A comparison has been conducted for those encryption algorithms at different sizes of data blocks. Key expansion time and encryption/decryption speed was measured. Simulation results are given to demonstrate the effectiveness of each algorithm.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信