Proceedings of the 2020 9th International Conference on Software and Computer Applications最新文献

筛选
英文 中文
PoCo
Daniel L. Ferguson, Yan Albright, Daniel Lomsak, Tyler Hanks, K. Orr, Jay Ligatti
{"title":"PoCo","authors":"Daniel L. Ferguson, Yan Albright, Daniel Lomsak, Tyler Hanks, K. Orr, Jay Ligatti","doi":"10.1145/3384544.3384585","DOIUrl":"https://doi.org/10.1145/3384544.3384585","url":null,"abstract":"Existing security-policy-specification languages allow users to specify obligations, but challenges remain in the composition of complex obligations, including effective approaches for resolving conflicts between policies and obligations and allowing policies to react to other obligations. This paper presents PoCo, a policy-specification language and enforcement system for the principled composition of atomic-obligation policies. PoCo enables policies to interact meaningfully with other policies' obligations, thus preventing unexpected and insecure behaviors that can arise from partially executed obligations or obligations that execute actions in violation of other policies.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122450322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploiting Deep Neural Networks for Intention Mining 利用深度神经网络进行意向挖掘
Anam Habib, Nosheen Jelani, A. Khattak, Saima Akbar, M. Asghar
{"title":"Exploiting Deep Neural Networks for Intention Mining","authors":"Anam Habib, Nosheen Jelani, A. Khattak, Saima Akbar, M. Asghar","doi":"10.1145/3384544.3384607","DOIUrl":"https://doi.org/10.1145/3384544.3384607","url":null,"abstract":"In the current era of digital media, people are greatly interested to express themselves on online interaction which produces a huge amount of data. The user generated content may contain user's emotions, opinions, daily events and specially their intent or motive behind their communication. Intention identification/mining of user's reviews, that is whether a user review contains intent or not, from social media network, is an emerging area and is in great demand in various fields like online advertising, improving customer services and decision making. Until now, a lot of work has been performed by researchers on user intention identification using machine learning approaches. However, it is demanded to focus on deep neural network methods. In this research work, we have conducted experimentation on intention dataset using a deep learning method namely CNN+BILSTM. The results exhibit that the proposed model efficiently performed identification of intention sentences in user generated text with a 90% accuracy.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115130476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accuracy Improvement of Human Tracking in Aerial Images Using Error Correction Based on Color Information 基于颜色信息的误差校正提高航拍图像中人的跟踪精度
R. Aoki, T. Oki, R. Miyamoto
{"title":"Accuracy Improvement of Human Tracking in Aerial Images Using Error Correction Based on Color Information","authors":"R. Aoki, T. Oki, R. Miyamoto","doi":"10.1145/3384544.3384599","DOIUrl":"https://doi.org/10.1145/3384544.3384599","url":null,"abstract":"The authors are trying to construct a real-time vital sensing system during exercise where humans wearing sensor nodes move quickly and their density becomes sometimes higher. In this case, existing multi-hop networking using RSSI or GPS to gather vital signs exercisers may not work appropriately. To solve this problem, the authors are proposing image-assisted routing (shortly IAR) that estimates the locations of sensor nodes by image processing. This paper proposes a tracking scheme with error correction based on color information, which is indispensable for IAR. Experimental results using actual images taken from a UAV showed that the proposed scheme achieved accurate tracking using only simple operations without sophisticated state estimation and computationally exhaustive deep learning: MT reached 100% by the proposed scheme.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic Based Vitamin Deficiency Monitoring System 基于语义的维生素缺乏监测系统
O. Omotosho, Yetunde Akinwale, A. Idris
{"title":"Semantic Based Vitamin Deficiency Monitoring System","authors":"O. Omotosho, Yetunde Akinwale, A. Idris","doi":"10.1145/3384544.3384598","DOIUrl":"https://doi.org/10.1145/3384544.3384598","url":null,"abstract":"Vitamins play major roles in safeguarding the wellbeing of every individual. The basis of high incidence of morbidity and mortality, in the human race is mostly characterized by vitamin deficiency, which has been traced to great level of ignorance among others. Information requires a medium and a major source of it in this advent of advancement in technology is the web. Currently, the web is majorly syntactic and the keyword based search result is characterized by ambiguous contents, only readable by humans. Such challenge is eminent in vitamin domain related information searches, posed with several human readable web pages, of which a lot time is spent jogging on the diffused web contents for most relevant information. Based on this, vitamin consumption has been restricted to just a few, while the body system weeps over the deficiencies, resulting in one ailment to the other. This work takes into consideration the benefits advantage of the ongoing web evolution of adding semantics to Web resources and the available tools. As such is implemented with the use of ontology (VIDEMO), a knowledge representation formalism, which allows machine readable descriptions to be added to the vitamin domain concepts or data. This enables a semantic search with precise and accurate results through the developed web application.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129160401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reliability Automatic Assessment Framework of Open Source Software Based on JIRA 基于JIRA的开源软件可靠性自动评估框架
Qian Wang, Wei Zhang, Jianhui Jiang, Long Li
{"title":"A Reliability Automatic Assessment Framework of Open Source Software Based on JIRA","authors":"Qian Wang, Wei Zhang, Jianhui Jiang, Long Li","doi":"10.1145/3384544.3384554","DOIUrl":"https://doi.org/10.1145/3384544.3384554","url":null,"abstract":"In recent years, more and more companies have moved from closed source software development to open source software (OSS) development. The reliability assessment of OSS has become an important issue. However, due to the lack of a standardized development process and uncertain number of participating developers, it is hard to measure the reliability of OSS compared to closed source software. This paper proposes a framework for reliability automatic assessment of OSS based on JIRA. It contains the failure data acquisition module, the reliability modeling module, and the reliability attribute analysis module. The proposed framework is applied on popular OSS Kafka to assess its reliability. The experimental results are compared with previous work related to OSS reliability assessment and show that the proposed framework is good for the reliability assessment of OSS.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129225990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoTDePT IoTDePT
Ekkachan Rattanalerdnusorn, Montida Pattaranantakul, Phithak Thaenkaew, C. Vorakulpipat
{"title":"IoTDePT","authors":"Ekkachan Rattanalerdnusorn, Montida Pattaranantakul, Phithak Thaenkaew, C. Vorakulpipat","doi":"10.1145/3384544.3384579","DOIUrl":"https://doi.org/10.1145/3384544.3384579","url":null,"abstract":"Internet of Things (IoT) has an ever increasing impact on today's society. It has penetrated all aspects of human life that utilize smart solutions and serves as an ecosystem. IoT provides inexpensive way to interconnects various things and objects together towards delivering smarter services, e.g., smart home applications, smart cities, and smart cars. Meanwhile, however, cyber attacks have also increased along with all these developments. Due to resource constraints, IoT-enabled devices are considered as a potential major victim vulnerable to exploitation by attackers that can setup an IoT botnet and launch a large scale cyber attack, e.g., DDoS attacks. When such attacks occur, it is an extremely difficult task to track down or trace back the root cause. It is also a challenging task to identify where the attacks happened, for example, in which location the anomalies are located (i.e., the compromised IoT devices). To address this issue, the paper presents IoTDePT -- a framework of threat detection and identification that aims to detect and identify malware threats in an IoT environment at a fine-grained level. Clearly, detecting the malware threats and pinpointing the exact geographical locations of the compromised IoT devices that propagated the threats. Two potential use cases of darknet have been exemplified to illustrate the usage of our proposal. The preliminary results show that the proposed approach can successfully detect the malware threats, while achieving accuracy in pinpointing a compromised device's location.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Meta-Model for Automated Black-Box Testing of Visualization Based Software Applications 基于可视化的软件应用程序自动黑盒测试的元模型
Syed Muhammad Husnain Kazmi, F. Azam, Muhammad Waseem Anwar, B. Maqbool
{"title":"A Meta-Model for Automated Black-Box Testing of Visualization Based Software Applications","authors":"Syed Muhammad Husnain Kazmi, F. Azam, Muhammad Waseem Anwar, B. Maqbool","doi":"10.1145/3384544.3384548","DOIUrl":"https://doi.org/10.1145/3384544.3384548","url":null,"abstract":"Visualization of data is a new field that is increasingly gaining popularity in both scholastic and modern conditions. The need of data visualization in market is increasing day by day for the management of big companies which have massive data related to their business operations. For effective and properly analyzed data visualizations involved the formulas to calculate the results or for analyzing and filtering the data on any required basis. The more data, formulas and complex information is involved in the creation of a visualization, the more it is difficult to test or evaluate the correctness of that visualization for and software tester. It is difficult for testers to look into different modules for every single test, as it is a time consuming process. In past, most of the research work is done only on creation of test cases for visuals or interactive diagrams (Visualizations). Therefore, in this paper a hybrid approach (combination of both manual and automation testing) is proposed to provide automated black-box testing of Visualizations on the basis of configurations (settings), rules (business logics), used library, transformation and information provided for the transformation of data into visuals. The output of proposed approach provides results of testing for each test-case as a report. For the validation of this approach, a case study of Supply Chain domain problem is taken into consideration.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Systematic Literature Review for Software Portability Measurement: Preliminary Results 软件可移植性测量的系统文献综述:初步结果
Hamza Ghandorh, Abdulfattah Noorwali, A. B. Nassif, Luiz Fernando Capretz, R. Eagleson
{"title":"A Systematic Literature Review for Software Portability Measurement: Preliminary Results","authors":"Hamza Ghandorh, Abdulfattah Noorwali, A. B. Nassif, Luiz Fernando Capretz, R. Eagleson","doi":"10.1145/3384544.3384569","DOIUrl":"https://doi.org/10.1145/3384544.3384569","url":null,"abstract":"Software developers agree that software portability is a desirable attribute for their software quality. Software portability is mostly acquired by ad-hoc techniques when trying to port existing products. There is a lack of unified measuring approach of software portability in most computing platforms. This paper presents preliminary results of a systematic literature review, conducted to collect evidence on measuring software portability. The evidence was gathered from selected studies and based on a set of meaningful and focused questions. 49 studies of these were selected for data extraction performed against the research questions. We provide an overview of usedproposed measurement metrics of software portability. Our results suggested that there are scattered efforts to understand measurement of software portability, and no census has been achieved.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Static Code Analysis Using Refinement Types based on Design by Contract 使用基于契约式设计的细化类型的静态代码分析
K. Ishii, S. Nishizaki
{"title":"Static Code Analysis Using Refinement Types based on Design by Contract","authors":"K. Ishii, S. Nishizaki","doi":"10.1145/3384544.3384587","DOIUrl":"https://doi.org/10.1145/3384544.3384587","url":null,"abstract":"Design by Contract is a programming methodology by which it is possible to annotate program codes with contracts in order to increase the safety of the program. The contracts represent the speci-fication of the software and are categorized into three groups: pre-condition, post-condition, and invariant. The idea of Design by Contract provides the correctness of a program code, satisfying that the caller of each procedure assumes the responsibility for the pre-condition and the callee assumes the responsibility for the post-condition. Findler et al. proposed a formal system based on the typed lambda calculus in which contracts are verified dynamically, that is, in run-time. Flanagan et al. introduced a formal system in which both static and dynamic checking of contracts are possible. In their system, it is possible to represent a contract as static, typing information using refinement type and dependent type. In our paper, we introduce the typed lambda calculus with dependent type and refinement type in the style of Flanagan and study a static analysis in the calculus. The static analysis provides refining of contracts and code optimization based on the contracts. We implement the analyzer using an SMT (Satisfiability Modulo Theory) server.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131071000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geospatial Data Sharing: Preliminary Studies on Issues and Challenges in Natural Disaster Management 地理空间数据共享:自然灾害管理中的问题与挑战初探
Mageshwari Valachamy, S. Sahibuddin, Noor Azurati Ahmad, Nur Azaliah Abu Bakar
{"title":"Geospatial Data Sharing: Preliminary Studies on Issues and Challenges in Natural Disaster Management","authors":"Mageshwari Valachamy, S. Sahibuddin, Noor Azurati Ahmad, Nur Azaliah Abu Bakar","doi":"10.1145/3384544.3384596","DOIUrl":"https://doi.org/10.1145/3384544.3384596","url":null,"abstract":"The rapid development of information technology has led to the demand for the latest, precise and easy to understand data. Data especially geospatial data is becoming increasingly crucial in all types of planning and decision making. Geospatial data sharing can be categorized into different disciplines such as public safety, disaster management, transportation, traffic control, tracking, health, environment, natural resources, mining, agriculture, utilities and many more. Whether as a way of distribution or retrieval of data, geospatial data has become an essential component of government GIS operations. Despite the prominence of this activity and its centrality to the day-to-day function of many government systems, the geospatial data sharing is still given less attention in the field of natural disaster management. Preliminary information is gathered from Literature Reviews (LR) and unstructured interviews with experts to seek information in depth. Thirteen (13) issues and challenges of geospatial data sharing in Malaysia Public Sector (MPS) for natural disaster management have been identified.","PeriodicalId":200246,"journal":{"name":"Proceedings of the 2020 9th International Conference on Software and Computer Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131374534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信