{"title":"A Graphical Hierarchical CPS Architecture","authors":"Shizhong Wang, Yuanrui Zhang, Zhihua Yang, Yixiang Chen","doi":"10.1109/ISSSR.2016.024","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.024","url":null,"abstract":"Cyber-Physical System (CPS, shortly) is a fusion systems of computing and physical processes. It is a highly integration of computation, communication and control in the framework of networked embedded system. In this paper, we analyze the concept and feature of CPS and propose a graphical hierarchical architecture for CPS. It is a graphic network structure within the same layer and a hierarchical tree structure among the layers. Then, we give several classical cases such as internet of vehicles, space-air-ground integrated networks and wireless sensor nets to address this new CPS architecture available. Finally, we use the interactive model between the vehicle and the smart traffic light as an example of model building, and analyze the spatio-temporal consistence of the interactive units in term with the simulation tool based on the STeC language.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121649690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Runnan Zhang, Gang Liu, Xinran Yuan, Shaomin Ji, Guofang Zhang
{"title":"A New Intrusion Detection Mechanism in SELinux","authors":"Runnan Zhang, Gang Liu, Xinran Yuan, Shaomin Ji, Guofang Zhang","doi":"10.1109/ISSSR.2016.018","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.018","url":null,"abstract":"A new intrusion detection mechanism in SELinux based on dual-Markov chain and triggered by critical system calls is put forward in this paper. The mechanism integrates access control with intrusion detection by Linux Security Module (LSM) in SELinux and considers both the global behaviour characteristics and local behaviour characteristics. Theoretical analysis and experimental results show that the mechanism we propose is able to integrate access control with intrusion detection effectively and gets a preferable efficiency of intrusion detection, thus enhancing embedded system security.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Validation and Exploration of a New Kind of Synchronization in Linux","authors":"Fangfang Zhu, Yucong Chen, Jianqiang Wang, Gaofeng Zhang, Qingguo Zhou","doi":"10.1109/ISSSR.2016.023","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.023","url":null,"abstract":"PWCS (Probabilistic Write / Copy-Select) is a new kind of lock-free synchronization mechanism with wait-free characteristics proposed by Nicholas Mc Guire at the 13th real-time Linux workshop, which utilizes the inherent randomness of the modern computer systems. It aims at addressing the multi-reader - single-writer problem in Linux. Based on the original label-based PWCS, we propose a hash-based prototype including two type instances as checksum and CRC (Cyclic Redundancy Check). The key difference between the two prototypes is how to determine the consistency of the data objects. We also implement seqlock (sequential lock) in user space to compare PWCS with RCU (Read-Copy-Update), rwlock (readers-writer lock) and seqlock. The method we used to analyze and validate the high performance of PWCS is also new.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126969443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Structure-Oriented Regression Test Path Generation","authors":"Yanlin Li, Junwei Du, Q. Hu, Xiuqing Liu","doi":"10.1109/ISSSR.2016.015","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.015","url":null,"abstract":"With the spread of Internet application, the software products need update quickly to adapt the dynamic application environments and diverse business requirement. How to efficiently select the regression test cases based on existing test cases set directly affect the evolution quality of software products. Basic paths coverage is a popular structure-oriented test way in academia and industry. A method to analyze the possible execution path of software components affected by update version based on program slicing method is proposed in this paper. Some matching pattern criterions are put forward and they can incrementally extend the test cases that fail to match. The structure-oriented regression test paths can be easily obtained from these matching pattern criterions. Moreover, the automatic generation of regression test path can be achieved in the process of software product evolution. An example is also presented to show the generation of regression test path in the level of source codes.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"31 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun-Ping Qin, Qing-xu Deng, Yun T. Wu, Haibin Tong, Xianli Su
{"title":"Indoor WSN Region Localization Based on Time Window Statistics","authors":"Jun-Ping Qin, Qing-xu Deng, Yun T. Wu, Haibin Tong, Xianli Su","doi":"10.1109/ISSSR.2016.019","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.019","url":null,"abstract":"In recent years, indoor localization is getting more and more attention. The uncertainty of data commonly exists due to the inaccuracy of measurement instrument and the irregularity (multipath, diffraction and obstacle) of wireless signal transmission model in indoor environment. This uncertainty will affect positioning precision. In order to solve such issue, a distributed localization algorithm RLTWS (Region Localization Based on Time Window Statistics) is proposed based on pattern matching principles. RLTWS is a two phase algorithm. First, an unknown node can determine its own sub-region by means of RSSI probability distribution Second, its position in sub-region can be calculated more accurately on the basis of optimal reference node. The distributed algorithm can make full use of the calculating capability of nodes and greatly reduce the amount of network traffic. The field experiments show that more stable position information is achieved compared with traditional methods and that outliers are reduced effectively, as long as the time window matches the sub-region accurately.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130930558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiao Kang, Cangzhog Yuan, Xin Wei, Yanhua Gao, Lei Wang
{"title":"A User-Level Approach for ARINC 653 Temporal Partitioning in seL4","authors":"Qiao Kang, Cangzhog Yuan, Xin Wei, Yanhua Gao, Lei Wang","doi":"10.1109/ISSSR.2016.025","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.025","url":null,"abstract":"ARINC 653 provides a strong isolation mechanism for safety computing fields, such as aircrafts. seL4, a 3rd generation microkernel, was formally verified for its functional correctness and provides a desirable code base for partitioning operating systems. But there is a long way from seL4 to partitioning. We take the first step and focus on the temporal aspect, i.e., implementing a partitioned scheduler based on seL4. However, seL4 implements a stiff scheduler inside the kernel, which conflicts with the genera principles(eg. ARINC 653 standard) of temporal partitioning. To address this problem, we propose a user-mode approach. We also elaborate performance of our scheduler.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"240 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Speed Homework Data Collecting System under K-12 Education Circumstance","authors":"Qingcheng Li, Heng-hua Cao, Haoqiang Yan, Ye Lu","doi":"10.1109/ISSSR.2016.022","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.022","url":null,"abstract":"With the development of new technologies for data mining and analyzing, many industries are using big data technologies to conduct development of the industry. In education, online resources serve big data analyzing. However, in an offline situation, homework is a key factor that reflecting education qualities. Under K-12 education circumstance, students subimit their handwritten homework through paper. In this manner, the value of homework can be easily ignored due to lacking of methods and tools for recording. Inspired by using high speed scanner to input examination paper into computers, we design a high-speed photographic apparatus based homework record system. In this system we propose a scenario-driven homework submission scheme, which provides high speed homework collection service. For each homework we design a corresponding description file including page information and question information for further data analysis. By using the system, a student can record one piece of homework into a digital image within two seconds. The system meets the demands of daily use.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133266992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Software Trustworthiness Measurement Based on Validation","authors":"H. Tao, Jie Zhao","doi":"10.1109/ISSSR.2016.011","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.011","url":null,"abstract":"Validation is critical to the success of the measurement of software trustworthiness. A large number of software trustworthiness measures are proposed, however, most of them are not validated from theory. Therefore, they lack theoretical foundation and will induce unnecessary cost and useless calculation. In this paper, we bring measurement theory into the software trustworthiness measurement, construct a source code oriented software trustworthiness measure based on extensive structure in the measurement theory and validate the developed measure by use of axiomatic approaches. Compared with some software trustworthiness measures that are already presented, this measure can evaluate software trustworthiness better from theory.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132008196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jihu Zhang, Xiaochuan Jing, Wei Zhang, Haipeng Wang, Yunwei Dong
{"title":"Improve the Quality of ARC Systems Based on the Metamorphic Testing","authors":"Jihu Zhang, Xiaochuan Jing, Wei Zhang, Haipeng Wang, Yunwei Dong","doi":"10.1109/ISSSR.2016.029","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.029","url":null,"abstract":"In order to improve the quality of Activity Recognition Chain (ARC) systems, an effective testing approach is required to evaluate the functionalities of their major components, especially for two kernel components, the segmentation and recognition components. Both of them largely utilize the machine learning algorithms to achieve the detection and recognition of activity correctly. The probabilistic nature of the machine learning algorithms present severe challenge to the testing for the ARC systems. The article adopts a MT (metamorphic testing) methodology to address this topic. We analyze the MR (metamorphic relation) between the results of segmentation and recognition components. Based on this kind of MR, we propose a two-stage MT based approach for the testing of ARC systems, which exploits the association fact between segmentation and recognition, and then performs the MT testing on them respectively in sequence. This approach is able to deal with the specific issues in ARC systems testing, and provides a general method for systems testing with probabilistic nature.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Investigation of Essential Topics on Software Fault-Proneness Prediction","authors":"Shou-Yu Lee, Dong Li, Yihao Li","doi":"10.1109/ISSSR.2016.016","DOIUrl":"https://doi.org/10.1109/ISSSR.2016.016","url":null,"abstract":"Understanding critical aspects of software fault-proneness prediction contributes significantly to building effective fault-proneness prediction models. This paper conducts an investigation of essential topics in this area, including techniques for evaluating the effectiveness of fault-proneness prediction models, issues of concerns when building the prediction models, as well as findings shared by the academic community. It is our hope that this investigation will aid researchers in further studying and contributing to software fault-proneness prediction.","PeriodicalId":257409,"journal":{"name":"2016 International Symposium on System and Software Reliability (ISSSR)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123586709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}