2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)最新文献

筛选
英文 中文
Research on Judicial Data Standard 司法数据标准研究
Zemin Qin, Tieke He, Hao Lian, Yuanhan Tian, Jia Liu
{"title":"Research on Judicial Data Standard","authors":"Zemin Qin, Tieke He, Hao Lian, Yuanhan Tian, Jia Liu","doi":"10.1109/QRS-C.2018.00042","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00042","url":null,"abstract":"Judicial system will enter the information network era. Corresponding data standard in this field is urgently needed. This paper studies the formulation of judicial data standards from the definition of data requirements, the generation of data lists, the development of data standards, the approval of data standards, and the standards of data utilization. This standard can be used as the basis of the judicial data warehouse, increasing data consistency and availability of data for the judicial data system.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tag Recommendation for Cultural Resources 文化资源标签推荐
Zhiwen Lei, Yi Yang, Weixing Huang, Jian Wang
{"title":"Tag Recommendation for Cultural Resources","authors":"Zhiwen Lei, Yi Yang, Weixing Huang, Jian Wang","doi":"10.1109/QRS-C.2018.00100","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00100","url":null,"abstract":"We propose a new tag recommendation method for the public digit cultural resources we collected in related program. We use LDA and Word2Vec to preprocess the resource and tag, map them to different vector space respectively. After that, we calculate the relevance of each resource and all tags by using Deep Structured Semantic Model. Lastly, range the result of calculation and treat the top N tags as the extended tags of a resource. Result show the good performance of our tag recommendation method.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122146321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guide Fuzzing with Multi-Factor Potential Analysis 用多因素潜力分析指导模糊测试
Luhang Xu, Wei Dong, Liangze Yin, Qiuxi Zhong
{"title":"Guide Fuzzing with Multi-Factor Potential Analysis","authors":"Luhang Xu, Wei Dong, Liangze Yin, Qiuxi Zhong","doi":"10.1109/QRS-C.2018.00087","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00087","url":null,"abstract":"Fuzzing is a popular technique for software vulnerability mining. Although the state-of-the-art fuzzers combine many popular technologies to overcome the shortcomings of fuzzing, it leaves a lot to be desired. Symbolic execution can help fuzzer to generate effective input, but it brings heavy loads. Other technologies are difficult to support fuzzing to accurately generate inputs that satisfy constraints. Therefore, we propose Multi-Factor Potential Analysis (MPA), a new search strategy that enables fuzzing to traverse more paths based on symbolic execution. The goal of its search process is to find an unexplored path, in symbolic execution, which is easy to solve and has distinguished contribution to the growth rate of path coverage. Moreover, it also takes into account the high-risk functions contained in the path. Tinker-MPA, a tool that implements MPA strategy, is implemented. It traverses more paths in a limited time than the other state-of-the-art fuzzing tools such as AFL and Tinker on DARPA CGC benchmark. Besides, the vulnerability mining of Tinker-MPA is more efficient.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122265857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Recommender System for Digital Cultural Resources 数字文化资源个性化推荐系统
Shufeng Ye, Yi Yang, Weixing Huang, Jian Wang
{"title":"Personalized Recommender System for Digital Cultural Resources","authors":"Shufeng Ye, Yi Yang, Weixing Huang, Jian Wang","doi":"10.1109/QRS-C.2018.00099","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00099","url":null,"abstract":"Public digital cultural resources have the characteristics of large amount, complicated classification, and strong homogeneity. It is difficult for users to efficiently find resources of real interest in massive resources. It is a key technology to solve the above problems that personalized recommendation can capture user's interest and actively recommend favorite resources. This paper addresses the problem of high sparseness of user cultural behavior data and the rapid changes in user cultural interest encountered in the traditional collaborative filtering approach in the public digital culture sharing service. Based on the characteristics of the semantic analysis of public digital cultural resources and the characteristics of the recommended algorithm, two optimization methods for collaborative filtering recommendation are proposed. The effectiveness of the proposed method to solve the above problems is verified by experiments.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Component Reliability Evaluation Method Based on Characteristic Parameters 基于特征参数的软件构件可靠性评估方法
Renya He, Longli Tang, Xinyu Han, W. He, Zehui Zhao
{"title":"Software Component Reliability Evaluation Method Based on Characteristic Parameters","authors":"Renya He, Longli Tang, Xinyu Han, W. He, Zehui Zhao","doi":"10.1109/QRS-C.2018.00051","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00051","url":null,"abstract":"This paper presents a software component reliability evaluation method based on the characteristic parameters which are obtained in software development process. These characteristic parameters depend on the properties, purpose and development process characteristics of the software. They are divided into two categories: inherent characteristics and development process characteristics. According to the data collected in our warship component software testing practice, we can gradually optimize the parameters of the prediction model of the ROME laboratory, and then find out the factors which affect the structural reliability. This method can be widely used in evaluating software component reliability.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130347683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault Localization: Analyzing Covering Arrays Given Prior Information 故障定位:基于先验信息的覆盖阵列分析
R. Lekivetz, Joseph Morgan
{"title":"Fault Localization: Analyzing Covering Arrays Given Prior Information","authors":"R. Lekivetz, Joseph Morgan","doi":"10.1109/QRS-C.2018.00033","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00033","url":null,"abstract":"Covering arrays are being increasingly used as a tool to determine test cases for testing complex engineered systems. The primary appeal of using covering arrays for this purpose is that they are an efficient way to construct test cases that are effective at precipitating failures that are due to the combination of several inputs. However, when failures occur, determining the inputs that triggered the failures is usually a time consuming task. In this article we present a method that allows a test engineer to efficiently analyze the outcomes of a set of test cases by making use of prior knowledge about the system under test. This analysis provides a ranking of input combinations that potentially triggered the failures.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132240185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Full Digital Simulation Testing of Networked Embedded Software 网络化嵌入式软件的全数字仿真测试
Feng Gao, Fei Deng, Yuanqiang Yan, Chunlei Li
{"title":"Full Digital Simulation Testing of Networked Embedded Software","authors":"Feng Gao, Fei Deng, Yuanqiang Yan, Chunlei Li","doi":"10.1109/QRS-C.2018.00022","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00022","url":null,"abstract":"Software testing is an important means to ensure and improve the quality of software. In this paper, aiming at the problems of complex networked embedded software testing environment and low level of automated testing, this paper designs a digital simulation test system based on distributed network architecture. The system adopts the design concept of \"hierarchical\" + \"distributed\", supports multi-node distributed collaborative simulation, complex test logic design, automated test and convenient test environment. The application results show that this system has the advantages of convenient test environment, fast simulation speed and high efficiency of automatic test, which solves the problems of complex networked embedded software test environment, low efficiency of automated test and heavy dependence of test and experiment on hardware environment.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117291231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page iii 第三页标题
{"title":"Title Page iii","authors":"","doi":"10.1109/qrs-c.2018.00002","DOIUrl":"https://doi.org/10.1109/qrs-c.2018.00002","url":null,"abstract":"","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Case Study: Adaptive Test Automation for Testing an Adaptive Hadoop Resource Manager 案例研究:用于测试自适应Hadoop资源管理器的自适应测试自动化
Benedikt Eberhardinger, Hella Ponsar, Gerald Siegert, W. Reif
{"title":"Case Study: Adaptive Test Automation for Testing an Adaptive Hadoop Resource Manager","authors":"Benedikt Eberhardinger, Hella Ponsar, Gerald Siegert, W. Reif","doi":"10.1109/QRS-C.2018.00092","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00092","url":null,"abstract":"Coping with adaptive software systems is one of the key challenges testing is currently faced with. In our previous work, we proposed to enable the test system itself to be adaptive to the system under test as a solution. The adaptation is built up on the concepts of a self-aware test automation enabling to use this information to sequence, instantiate, or update the test suite to the current situation. In our test framework the modeling language S# allows to use a run-time model to do so in a model-based testing approach. In this paper, we demonstrate how our concepts of adaptive, self-aware test automation are applied to a real world scenario: testing an adaptive resource manager of Hadoop. We show the steps necessary to implement the approach and discuss our experiences in this case study paper.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"123 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133713213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Metamorphic Testing of Image Region Growth Programs in Image Processing Applications 图像区域增长程序在图像处理中的变形测试应用
Chao Jiang, Song Huang, Zhan-wei Hui
{"title":"Metamorphic Testing of Image Region Growth Programs in Image Processing Applications","authors":"Chao Jiang, Song Huang, Zhan-wei Hui","doi":"10.1109/QRS-C.2018.00026","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00026","url":null,"abstract":"Image region growth is one of the most important functions in image processing applications. However, due to the uncertainty of operation and large volume of data, it is difficult to obtain the test oracle of image region growth program. In order to alleviate the test oracle problem, this paper applied the metamorphic testing method into image region growth program testing and proposed a series of metamorphic relations by analyzing the geometric properties, numerical calculation features and specific implementation characteristics of the algorithm. The effectiveness of the identified metamorphic relations in eliminating different types of mutations is verified through case studies. The experimental results show that this method can effectively solve the test oracle problem of image region growth program.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信