5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)最新文献

筛选
英文 中文
SAT based Verification Tool for Labeled Transition System 基于SAT的标签转换系统验证工具
S. Park, Gihwon Kwon
{"title":"SAT based Verification Tool for Labeled Transition System","authors":"S. Park, Gihwon Kwon","doi":"10.1109/SERA.2007.117","DOIUrl":"https://doi.org/10.1109/SERA.2007.117","url":null,"abstract":"Multi-threaded Java programming such as an internet server program is difficult, because it is hard to detect subtle errors within multi-threading. LTSA is a too/for modeling and analyzing for catching some kinds of thread bugs, but still there remains scalability problem to deal with bigger applications. In this paper, we introduce a SAT based verification tool for Labeled Transition System and we explain LTS semantics and their CNF encoding. To verify large model, we focus our attention on efficient encoding for given model. In our tool, the property to be checked is expressed by either LTS or LTL formula based on Fluent. In order to solve a problem, LTSs and property are represented with CNF formulae, the input format to SAT-solver.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126866360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PostB: The Post-condition Extension onto the B-Method 后置条件在b方法上的扩展
Shuaiqiang Wang, Ying Li, Guodong Huang
{"title":"PostB: The Post-condition Extension onto the B-Method","authors":"Shuaiqiang Wang, Ying Li, Guodong Huang","doi":"10.1109/SERA.2007.107","DOIUrl":"https://doi.org/10.1109/SERA.2007.107","url":null,"abstract":"In the traditional B-method, operations are designed only by pre-conditions and a series of substitutions, and it works well. However, with the appearance and development of the modeling by the integration of semi-formal methods (especially UML) and formal methods, the condition changes. Without the formal notations interrelated to the post-condition, B-method cannot be embedded into UML models conveniently and flexibly in order to exert all its powers to describe systems exactly. This conditions indeed limit the adoption of B, and it is really necessary to extend the correlative definitions and properties. Therefore, this paper proposes the PostB, the extension referred to the formal notations of the post-condition to the B method, as well as the extended set-theorem models and proof obligations referred to it.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of ebXML Message Transaction supported on a Security and Reliability for Effective e-Business 基于安全可靠性的ebXML消息事务的实现,以实现有效的电子商务
Changryul Jung, B. Sudhakar, Sungkeun Lee, Jin-Gwang Koh
{"title":"Implementation of ebXML Message Transaction supported on a Security and Reliability for Effective e-Business","authors":"Changryul Jung, B. Sudhakar, Sungkeun Lee, Jin-Gwang Koh","doi":"10.1109/SERA.2007.95","DOIUrl":"https://doi.org/10.1109/SERA.2007.95","url":null,"abstract":"In this paper, we propose the development strategy of message transaction system in electronic business to business system with consideration of security. B2B must be designed to transfer electronic data between business and business in completely secured and reliable form. For the purpose of secured and reliable transaction of electronic data, we propose the complete framework . Also, we provide message system for communication and transaction for E-business, and provide message test set through the development strategy for interoperability of message. The message test set is a data class modeling of ebXML MSH(message service handler) which supports message test set to ebXML message transaction of e-business. Finally, we implemented the message processing system through SMTP Mail transaction into ebMSH for the ebXML Message Test-Set for message service transaction after database relationship.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TODD: Test-Oriented Development and Debugging 托德:面向测试的开发和调试
Oliver Dagenais, D. Deugo
{"title":"TODD: Test-Oriented Development and Debugging","authors":"Oliver Dagenais, D. Deugo","doi":"10.1109/SERA.2007.127","DOIUrl":"https://doi.org/10.1109/SERA.2007.127","url":null,"abstract":"The benefits of test-driven development (TDD) can be appealing to many seeking to reduce the amount of time spent on a software project, but not all projects can implement the TDD methodology fully. A technique similar to TDD - test oriented development - is introduced and a prototype software implementation in the form of an eclipse plug-in is presented to support the adoption of this more pragmatic approach by developers to help them write high quality software.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New Developments on Recurrent Neural Networks Training 递归神经网络训练的新进展
Suwat Pattamavorakun, Suwarin Pattamavorakun
{"title":"New Developments on Recurrent Neural Networks Training","authors":"Suwat Pattamavorakun, Suwarin Pattamavorakun","doi":"10.1109/SERA.2007.102","DOIUrl":"https://doi.org/10.1109/SERA.2007.102","url":null,"abstract":"A new algorithm is proposed for improving the convergence of recurrent neural networks. This algorithm is obtained by combining the methods of weight update of Atiya-Parlos algorithm (the algorithm find the direction of weight change by approximation), and Y-N algorithm technique (the algorithm estimate fictitious target signals of hidden nodes to update hidden weight separately from output weights), and then by adding the error self-recurrent (ESR) network to improve the error functions (to speed up the convergence and not sensitive to initial weight by calculating the errors from output unit and then these errors are fed back for determining weight updates of output unit nodes). The results showed that both fully RNN and partially RNNs on some selected and the proposed algorithm could forecast the daily flow data quite satisfactorily.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XML Auto-Transformation System for Ubiquitous Port using RFID Technology 基于RFID技术的泛在端口XML自动转换系统
Jaehong Ahn, Kyeongrim Ahn, Kyoungrog Yi, Jin-Wook Chung
{"title":"XML Auto-Transformation System for Ubiquitous Port using RFID Technology","authors":"Jaehong Ahn, Kyeongrim Ahn, Kyoungrog Yi, Jin-Wook Chung","doi":"10.1109/SERA.2007.136","DOIUrl":"https://doi.org/10.1109/SERA.2007.136","url":null,"abstract":"Ubiquitous business means to improve the business service and to create new business model under the environment which computing object is applied to real life and we can freely connect to network. As the related technology develops, the need of u-Business is rising in e-Business. Business formalities which are electronically processed through EDI or bar code, such as stock management, terminal gate management, container management, changes to the formalities using RFID. These formalities receive the sent input data through RDIF chip and antenna from RFID middleware, and transfer that data to server. In this paper, we propose the XML agent that transfers the input data to server and transfers the sent data from server to RFID middleware. The basic data form used at the proposed system is XML and the proposed system supports the converting functionality. The Converting functionality is to translate the received text to XML or XML to text. To provide the converting functionality, it is possible to migrate with various RFID antennas and middleware regardless of vendor. It also is able to migrate with the various information models as providing interface with server.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Rank-based Image Transformation Scheme using Entropy Coding in Gray-Level Images 一种有效的基于秩的灰度图像熵编码变换方法
Eun-Cheon Lim, Choon-Bo Shim, Kang-Soo You
{"title":"An Efficient Rank-based Image Transformation Scheme using Entropy Coding in Gray-Level Images","authors":"Eun-Cheon Lim, Choon-Bo Shim, Kang-Soo You","doi":"10.1109/SERA.2007.44","DOIUrl":"https://doi.org/10.1109/SERA.2007.44","url":null,"abstract":"In this paper, we propose a rank-based image transformation scheme which is a pre-processing method for enabling more efficient compression of gray-level images by entropy encoder. For this, before we do entropy encoding on a stream of gray-level values in an image, the proposed method counts co-occurrence frequencies for neighboring pixel values. Then, it replaces each gray value with particularly ordered numbers based on the co-occurrence frequencies. Finally, the ordered number are transmitted to an entropy encoder. The pre-processing step enhances the statistical characteristic of the image transformation and thus improves the performance of entropy coding considerably. The result from our simulation using 8 bits gray-scale images shows that the proposed method can reduce bit rate by up to 37.85% compared with existing plain entropy coders.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122921131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits 美国和韩国对计算机安全认知的实证评估:以Rootkits为重点
H. Hwang
{"title":"An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits","authors":"H. Hwang","doi":"10.1109/SERA.2007.46","DOIUrl":"https://doi.org/10.1109/SERA.2007.46","url":null,"abstract":"The surveys were conducted from 400 students of five Korea and three U.S. universities to compare their knowledge and experience with various forms of malware.They provide an empirical assessment of the cross-cultural similarities and differences between students in the two countries. The variables examined include knowledge of computer viruses, spyware, and rootkits as well as perceptions of the damage that can result from various computer malware.While the two groups are similar with respect to their relative familiarity of rootkits compared with that of spyware and viruses, and in terms of how they perceive the malware knowledge of their peers, they exhibit significant differences in self-reported perceptions of rootkit familiarity. U.S. students report higher levels for all tested malware types, including the fictional \"Trilobyte\" virus. These comparisons reveal that little is known about rootkits today. However, there is hope for an accelerated rootkit awareness because of the rapid assimilation of Spyware knowledge in recent years.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Interaction Web Model 人机交互Web模型
M. Shafi, A. M. Zaidi, Abdur Rehman
{"title":"Human Interaction Web Model","authors":"M. Shafi, A. M. Zaidi, Abdur Rehman","doi":"10.1109/SERA.2007.90","DOIUrl":"https://doi.org/10.1109/SERA.2007.90","url":null,"abstract":"In today's customer-centric marketplace, live customer support has quickly become an essential tool that personalizes the Internet shopping experience and ensures customers a positive outcome. This paper proposes a new working model for provision of live online support services called the human interaction Web model (HIWM). The model is designed in such a way to ensure global deployment by the websites and at the same time encourage users to avail live support services while they are online. HIWM design proposes to make live support functionality independent of the Website by incorporating it within future version of the browsers and using it through proposed HIWM protocols. These proposed protocols will directly communicate with the Website support infrastructure i.e. call center. User interface for the proposed model is incorporated in the standard browser navigation tool bar which will be used for every Website on which the user avails live support services.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dead Code Elimination in CTOC CTOC中的死代码消除
Ki-Tae Kim, Je-Min Kim, Weon-Hee Yoo
{"title":"Dead Code Elimination in CTOC","authors":"Ki-Tae Kim, Je-Min Kim, Weon-Hee Yoo","doi":"10.1109/SERA.2007.69","DOIUrl":"https://doi.org/10.1109/SERA.2007.69","url":null,"abstract":"Although the Java bytecode has numerous advantages, there are also shortcomings such as slow execution speed and difficulty in analysis. Therefore, in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. In order to statically determine the value and type, CTOC uses the SSA Form which separates the variable according to assignment. Also, it uses a tree form for statements. But, due to insertion of the Phi-function in the process of conversion into the SSA Form, the number of nodes increased. This paper shows the dead code elimination to obtain a more optimized code in SSA Form. We add new live field in each node and achieve dead code elimination in tree structures.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信