{"title":"Discussing of factory pattern in embroidery CAD","authors":"Dongqing Wu, L. Lu, Fengjian Yang, Chaolong Zhang","doi":"10.1109/ICSESS.2010.5552414","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552414","url":null,"abstract":"In embroidery CAD, embroidery module is one of the parts which are badly affected by requirements changes. Factory pattern provides a suitable solution to decouple client from server. In traditional factory pattern, since it was restricted by language, coupling degree between factory and other modules remains high. To cope with the problem, the paper presents a new factory pattern under reflection mechanism. New pattern could completely decouple embroidery module from other modules. The idea also offers an instructive idea for other traditional design pattern to innovate with the help of reflection mechanism.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126281828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionVirtual reality technology in simulation trainning system of important person security guard","authors":"Wu Xiaowei","doi":"10.1109/ICSESS.2010.5552281","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552281","url":null,"abstract":"Important person security guard tactical training has characteristics of the role function, the cooperation of team, the practicality. The simulation training system based on virtual reality took the experience type teaching method as the instruction, and can meet requirements of the important person security guard tactical training. This article introduced functions of the simulation system and the technology realization, explained the question and the solution occurring in interaction using EON. The system realized interaction through simulation tree and logical relation windows, made the color change through Script function expansion. The case in the end explained the process of using simulation system and the good effect which occurring in the training.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127595421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A logic-based frame for knowledge reasoning in real-time security analysis","authors":"Chaoming Li, K. Wang","doi":"10.1109/ICSESS.2010.5552302","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552302","url":null,"abstract":"Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasible for current large network systems. In this paper, we present a frame to model and specify the knowledge of attacker with partial observations. Firstly, we combine CTMCs and interpretation system as basic model. Then, a logic is defined to specify the knowledge for agents in the stochastic model. Further, we discuss the properties under different assumption for the model and agent. Finally, we present the model checking algorithms with a particular assumption and apply the frame to model the knowledge of attacker in intrusion-tolerant system.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on macro-quality evaluation index system","authors":"Li Zhao, Wang Lizhi, Tian Wu","doi":"10.1109/ICSESS.2010.5552277","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552277","url":null,"abstract":"Confronting frequently-happened regional and systematic safety accidents of product quality, to consolidate macro-quality analysis and evaluation has been hot issues concerned by both the government and society. In this paper, conceptual model of macro-quality is built with the dimensions of quality compliance, quality applicability and quality externality. Macro-quality evaluation index and evaluation method is also explored, which is expected to provide reference and advice for improving macro-quality management.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123388126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On methods of designing smartphone interface","authors":"Zhang Linghao, Liu Ying","doi":"10.1109/ICSESS.2010.5552288","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552288","url":null,"abstract":"The cognition, operation and experiencing of the software interface of smartphone has attracted more and more attention as the smartphone featured with surpassing the traditional-functioned featurephones turns out to be the future trend. This paper discusses the differences between smartphones and featurephones, new features of the software interface of smartphones, such as functions, size of its screen, multi-touch and intelligent sensing technology, and some peculiarities of software interface of smartphone, such as its property of being sensed or understood, efficiency and artistic quality, etc… Based on the above discussions, it proposes that the scene models and information frameworks should be constructed on the demands of users and they should be expressed by symbols. Furthermore, it discusses concrete methods of diverse design of the overall presentation of interface signs, visual style, and specific operation, etc.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"681 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The realization of video mixing edit method based on DES","authors":"Zhengang Wei, G. Wang, Xiaoping Yuan","doi":"10.1109/ICSESS.2010.5552347","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552347","url":null,"abstract":"To get the video clips we need from the vast videos, it is necessary to seek an efficient method for video editing and combining. But there is much difficulty in nonlinear editing for videos such as MPEG-2 format. This paper proposes a method to edit multiple format videos including MPEG, AVI, WMV, VOB by DES technology. And we address an algorithm to realize the cancellation and recovery function of video cut points. The program can edit timeline flexibly, preview the video clips that are added to the timeline on real-time and combine them to one special format video.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130753803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Short-term prediction of Shanghai composite index based on SVM","authors":"Xiaoyun Wang, Limin Lin","doi":"10.1109/ICSESS.2010.5552390","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552390","url":null,"abstract":"Technical indicators are very important tools in the analysis of securities investment. Closing prices and volume of business are basic index, and they compose many complex technical index. In this paper, we represent the daily closing prices and daily volume of business as input vector, and construct 9 projects according different input vector. After 9 contrast experiments with support vector machines, we find that daily closing prices and daily volume of business have 3 days of time validity in predicting future stock price.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131022942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Queueing models based performance evaluation approach for Video On Demand back office system","authors":"Shuliang Zheng, Liang Zhang","doi":"10.1109/ICSESS.2010.5552438","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552438","url":null,"abstract":"Since queueing is a common behavior in computer systems, analysis of queueing models become a mature theory that is widely applied in performance evaluation. In our work, a queueing model based approach is used to manage the performance attributes of a Video On Demand (VOD) back office system, which has been deployed and put into service on a province-scale cable TV network. Extracted from Software Performance Engineering (SPE) methodology, the approach is more compact and efficient due to its two phases evaluation processes, which are design evaluation used to estimate performance measures for the analysis of design improvement and deployment evaluation used to to determine the hardware requirements for the establishment of high QoS. As a significant research and practice, the approach can be used in any development processes of complex software systems, which have same features of collaboration, distribution and third-party integration as our VOD back office system.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video steganography using motion vector and linear block codes","authors":"Feng Pan, Li Xiang, Xiaoyuan Yang, Yao Guo","doi":"10.1109/ICSESS.2010.5552283","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552283","url":null,"abstract":"A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 compressing. Linear block codes has been used to reducing the modification rate of the motion vectors. The proposed steganographic scheme is not only has lowly computational complexity, but also has highly imperceptible to human being. Furthermore, the secret information can be extracted directly without using the original video sequences. Experiments are designed to prove the feasibility of the proposed method. Experimental results show that our proposed scheme can embed large amounts of information and can maintain good video quality as well.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126839544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework of on-line office document processing tool based on Xforms","authors":"K. Fan, Ning Li, Qian Wu, Xin Liu","doi":"10.1109/ICSESS.2010.5552421","DOIUrl":"https://doi.org/10.1109/ICSESS.2010.5552421","url":null,"abstract":"Oocmnent processing has the characteristics of MVC. By using MVC pattern, a document processing system can be divided into the roles of model, view and controller. This article proposes a framework of office document processing based on MVC and XForms and discusses the key technologies of on-line office document processing system, as well as how to recognize and separate model, view and controller for document processing. As the result, an on-line office document processing tool is implemented.","PeriodicalId":264630,"journal":{"name":"2010 IEEE International Conference on Software Engineering and Service Sciences","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126924716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}