5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)最新文献

筛选
英文 中文
Efficient User Support with DACS Scheme DACS方案的高效用户支持
Kazuya Odagiri, Rihito Yaegashi, M. Tadauchi, N. Ishii
{"title":"Efficient User Support with DACS Scheme","authors":"Kazuya Odagiri, Rihito Yaegashi, M. Tadauchi, N. Ishii","doi":"10.1109/SERA.2007.82","DOIUrl":"https://doi.org/10.1109/SERA.2007.82","url":null,"abstract":"When operation and management in the university network are performed, various problems occur. As one of those problems, user support problems in the network are often shown. As an example, support at the time of changing setups of a client computer by a user, is described. In this case, it take trouble very much for a system administrator because it is often necessary to support individual users, respectively. As another example, it is necessary to take some measure for annoying communication to other users. In this case, much time and effort are spent to specify where the client with annoying communication is under the management by DHCP service. To simplify user supports such as those cases, a new user support by DACS (destination addressing control system) scheme, which is an efficient scheme for the network operation and management in university network, is examined.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Simulation Testing Platform of Ad Hoc Network Ad Hoc网络仿真测试平台
Huang Xuyong, Miao Shihong, L. Pei
{"title":"A Simulation Testing Platform of Ad Hoc Network","authors":"Huang Xuyong, Miao Shihong, L. Pei","doi":"10.1109/SERA.2007.29","DOIUrl":"https://doi.org/10.1109/SERA.2007.29","url":null,"abstract":"For the requirement of QoS (reliability, delay etc) in power system, performance of ad hoc networks should be testified by experiments. Till recently, performances of ad hoc network are mostly tested by simulation software, such as NS, OPNET etc. But a lot of practical factors can't be taken into account in simulation software. For example, obstacles, electromagnetic interferences, and so on. Utilized NDIS (network driver interface specification) intermediate driver and Passthru architecture, a simulation testing platform of wireless ad hoc networks is presented. The characteristic and the application prospects of the platform are introduced finally.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114666342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408 根据ISO/IEC 15504和ISO/IEC 15408标准,分析过程改进中安全要求项目的优先级
Eun-Ser Lee, Haeng-Kon Kim, Sun-myoung Hwang
{"title":"Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408","authors":"Eun-Ser Lee, Haeng-Kon Kim, Sun-myoung Hwang","doi":"10.1109/SERA.2007.54","DOIUrl":"https://doi.org/10.1109/SERA.2007.54","url":null,"abstract":"A software process can be characterized as the ISO/IEC 15504. A common process framework is established by defining a small number of framework activities that are applicable to all software projects, regardless of their size or complexity. There are many risk items of the project development that cause the process maturity level occurring in the quality problems during process management and project progress. This paper designs the opportunity tree that management of security requirement the current domain and their problems solution as well. And this paper reference ISO/IEC 15504 and ISO/IEC 15408 as the international standard. In this paper, we propose a security requirement handing based approach considering security when developing system.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rigorous Vertical Software System Testing In IDE 在IDE中严格的垂直软件系统测试
Kwang-Ik Seo, Eun-Man Choi
{"title":"Rigorous Vertical Software System Testing In IDE","authors":"Kwang-Ik Seo, Eun-Man Choi","doi":"10.1109/SERA.2007.114","DOIUrl":"https://doi.org/10.1109/SERA.2007.114","url":null,"abstract":"As the size of software is getting huge, a cost for development is also increasing in a test stage as well as a development stage. To reduce the increasing cost, we need various engineering approaches in every development stage of software development life cycle. This paper researches a vertical test method which connects a system test level and a integration test level in a test stage by using UML. We study traceability between system test cases, integration test cases, and source code and a method to curtail expenses during communications between developers and test engineers.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Communication of Business's and Software Engineers 商业和软件工程师的沟通
D. Dupuis, R. Lee, Haeng-Kon Kim
{"title":"Communication of Business's and Software Engineers","authors":"D. Dupuis, R. Lee, Haeng-Kon Kim","doi":"10.1109/SERA.2007.64","DOIUrl":"https://doi.org/10.1109/SERA.2007.64","url":null,"abstract":"Communications for the purpose of creating useful software are imperative. Techniques need to be in place to facilitate the flow of correct information from the requestor, and the creator. Without this the software will be of little use and discarded before it should be. In this paper we will present a systematic way to creating a question and answer flow of information. Details of the difference are between using the question and answer system and not will be reported in various ways. Our results will show the increase in efficiency of software creation by having fewer changes later in the project and improved usefulness to the end user.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123984853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Self-Organizing Clusters for Routing Algorithm by Diffusing an Interest in Wireless Sensor Networks 基于兴趣扩散的自组织簇无线传感器网络路由算法
Sangjoon Jung
{"title":"Self-Organizing Clusters for Routing Algorithm by Diffusing an Interest in Wireless Sensor Networks","authors":"Sangjoon Jung","doi":"10.1109/SERA.2007.118","DOIUrl":"https://doi.org/10.1109/SERA.2007.118","url":null,"abstract":"Traditional clustering methods have been investigated to enhance network manageability and to provide routing or multicasting scalability, since single-tier networks cause a specified node or router node to overload with too much data aggregation. We introduce a clustering strategy and self-organizing scheme for cluster-based wireless sensor networks, while maintaining the merits of a clustering approach. This scheme is a clustering method to configure cluster by diffusing an interest from a sink node. When a sink node diffuses an interest, every node decides which node is elected as a cluster head or intermediary node by sending and receiving messages. The first node receiving an interest is elected to become a cluster head and sends an advertisement message to the other nodes. Then another node receiving the advertisement message reports an acknowledgement message to the cluster head. The cluster head gathers information about cluster members and then organizes a cluster. The second node receiving first an advertisement message from the cluster head is elected as an intermediary node. When the node diffuses the interest, it is elected to be an intermediary node. The third node receiving an interest from the intermediary node can be elected to be another cluster head. The mechanism should continue to organize clusters until covering the whole network. Based on diffusing an interest, every node can participate in clusters and reports to a cluster head when receiving or sensing tasks.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web Service Security model Using CBD Architecture 使用CBD架构的Web服务安全模型
Eun-Ju Park, Haeng-Kon Kim, R. Lee
{"title":"Web Service Security model Using CBD Architecture","authors":"Eun-Ju Park, Haeng-Kon Kim, R. Lee","doi":"10.1109/SERA.2007.135","DOIUrl":"https://doi.org/10.1109/SERA.2007.135","url":null,"abstract":"A Web services is programmable application logic accessible using standard Internet protocols. Web services combine the best aspects of component based development and the Web. like components, Web services represent black-box functionality that can be reused without knowing about how the service is implemented. Unlike current component technologies, Web services are not accessed via object-model-specific protocol. In this paper, we suggest the architecture development modeling and the Web integration architecture to develop Web service-security that is embodied in supplier on service oriented architecture (SOA). We also describe the various possibilities with which the components may be integrated well with applications have been explored and well-exposed using Web services. This paper focuses on integrating component based architecture modeling and Web services to enable the development and usage of facade and backside components through the Web by dynamically creating Web services-security for the functionalities of the components.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Internet Query Language based on Intuitionistic Linear Logic 基于直觉线性逻辑的Internet查询语言
Keehang Kwon, Jaewoo Kim, Jang-Wu Jo
{"title":"An Internet Query Language based on Intuitionistic Linear Logic","authors":"Keehang Kwon, Jaewoo Kim, Jang-Wu Jo","doi":"10.1109/SERA.2007.50","DOIUrl":"https://doi.org/10.1109/SERA.2007.50","url":null,"abstract":"We propose an Internet query language based on intuitionistic linear logic. This language extends regular expressions with linear implications and additive (classical) conjunctions. To be precise, it allows goals of the form D -o G and G1&G2 where D is a text and G is a goal. The first goal is intended to be solved by adding D to the current text and then solving G. This goal is flexible in controlling the current text dynamically. The second goal is intended to be solved by solving both G1 and G2 from the current text. This goal is particularly useful for internet search.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network Management 基于UPnP的wbem网络分布式故障发现与服务违规处理
S. Tursunova, Young-Tak Kim
{"title":"UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network Management","authors":"S. Tursunova, Young-Tak Kim","doi":"10.1109/SERA.2007.131","DOIUrl":"https://doi.org/10.1109/SERA.2007.131","url":null,"abstract":"Fast fault recovery depends on immediate detection of occurred fault. In some case, it is rather difficult to determine the cause of a fault in order to provide fast fault restoration/isolation. Also, service level fault, such as service level agreement (SLA) violation may not be due to physical device failure. This paper explores in detail the aspects of service level fault detection. We present the design and implementation of service level fault detection mechanism with SLA in WBEM-based inter AS traffic engineering (TE). We changed existing service location protocol (SLP) based service discovery mechanism to universal plug and play (UPnP) based one, and extended existing providers with new UPnP Provider which has not been supported by OpenPegasus WBEM. We also designed DMTF MOF (managed object format) for service discovery for SLA management in order to handle service violation. UPnP event notification mechanism, service violation handling, and C++ based provider implementation on OpenPegasus WBEM for inter-AS TE is explained in detail.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation and Application of MVFs in Coverage for Coverage-Based NHPP SRGM Frameworks 基于覆盖的NHPP SRGM框架中MVFs的覆盖评估与应用
T. Fujiwara, Joong-Yang Park, Jae-Heung Park
{"title":"Evaluation and Application of MVFs in Coverage for Coverage-Based NHPP SRGM Frameworks","authors":"T. Fujiwara, Joong-Yang Park, Jae-Heung Park","doi":"10.1109/SERA.2007.85","DOIUrl":"https://doi.org/10.1109/SERA.2007.85","url":null,"abstract":"Many non-homogeneous Poisson process software reliability growth models are characterized by their mean value functions. Mean value functions of coverage-based models are usually obtained as composite functions of the coverage growth function and the function relating the number of detected faults to the coverage. This paper performs empirical evaluation of the relationships between the number of detected faults and the coverage embedded in the coverage- based software reliability growth models. It is also illustrated that integration of well-performing coverage growth functions and relationships between the number of detected faults and the coverage produces well-performing mean value functions.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130808777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信