15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)最新文献

筛选
英文 中文
A source code plagiarism detecting method using alignment with abstract syntax tree elements 一个源代码剽窃检测方法,使用与抽象语法树元素对齐
Hiroshi Kikuchi, T. Goto, Mitsuo Wakatsuki, T. Nishino
{"title":"A source code plagiarism detecting method using alignment with abstract syntax tree elements","authors":"Hiroshi Kikuchi, T. Goto, Mitsuo Wakatsuki, T. Nishino","doi":"10.1109/SNPD.2014.6888733","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888733","url":null,"abstract":"Learning to program is an important subject in computer science courses. During programming exercises, plagiarism by copying and pasting can lead to problems for fair evaluation. Some methods of plagiarism detection are currently available, such as sim. However, because sim is easily influenced by changing the identifier or program statement order, it fails to do enough to support plagiarism detection. In this paper, we propose a plagiarism detection method which is not influenced by changing the identifier or program statement order. We also explain our method's capabilities by comparing it to the sim plagiarism detector. Furthermore, we reveal how our method successfully detects the presence of plagiarism.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Development of Leaving-bed Detection System to Prevent Midnight Prowl 防止午夜潜行的离床检测系统的研制
Y. Takahashi, Yuhki Kitazono, Shota Nakashima
{"title":"Development of Leaving-bed Detection System to Prevent Midnight Prowl","authors":"Y. Takahashi, Yuhki Kitazono, Shota Nakashima","doi":"10.1109/SNPD.2014.6888740","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888740","url":null,"abstract":"In this study, we developed Leaving-bed Detection System to Prevent Midnight Prowl and checked the operation of the system constructed. First, installed the camera on the ceiling, get depth information in the field of view, and also get background's depth information. The detection of human get up was performed by taking the difference between the depth and the current depth of the background. Converted into numeric depth information a distance from the camera to be retrieved as a string, and obtains the height of the object from the difference between them. Take a threshold value than the height that was acquired to detect anything more than a certain height, and also in after removing those narrow areas coordinates from the coordinates, and performs the tracking to obtain the center coordinates of the target. However, in view of the error occurring in the case of detecting a plurality of persons, human tracking is performed after the extraction of the target person by labeling process. We went from the center point when the track is interrupted the entry and exit detection.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"53 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communication 内存中的大数据:在内存数据库中使用分布式键值存储进行机器对机器通信的基准测试
M. Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi
{"title":"Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communication","authors":"M. Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi","doi":"10.1109/SNPD.2014.6888748","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888748","url":null,"abstract":"The Universal Communication Research Institute (UCRI), NICT conducts research and development on universal communication technologies: multi-lingual machine translation, spoken dialogue, information analysis and ultra-realistic interaction technologies, through which people can truly interconnect, anytime, anywhere, about any topic, and by any method, transcending the boundaries of language, culture, ability and distance. To enhance the universal communication technology, we are trying to develop a large-scale information infrastructure which collects and stores diverse information including huge volumes of web pages from the networks. The one of most important key technologies to realize a large-scaled information infrastructure is a distributed in memory database system. In this paper, we introduced a large-scale information infrastructure, mainly explaining a distributed in-memory database system “okuyama” which is a key technology on our project. We examined the I/O performance of the in memory storage, which verified whether if “okuyama” meet requirements for the infrastructure. Furthermore we give a blueprint of cluster systems on which the infrastructure will be constructed.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software ontology design to support organized open source software development 软件本体设计支持有组织的开源软件开发
Md. Mahfuzus Salam Khan, Md. Anwarus Salam Khan, T. Goto, T. Nishino, N. Debnath
{"title":"Software ontology design to support organized open source software development","authors":"Md. Mahfuzus Salam Khan, Md. Anwarus Salam Khan, T. Goto, T. Nishino, N. Debnath","doi":"10.1109/SNPD.2014.6888736","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888736","url":null,"abstract":"In the field of software engineering, a very old and important issue is how to understand the software. Understanding software means more than understanding the source code; it also refers to the other facts related to that particular software. Sometimes even experienced developers can be overwhelmed by a project's extensive development capabilities. In the development process, project leaders (PLs) have overall knowledge about the project and are keenly aware of its vision. Other members have only partial knowledge of the functions assigned to them. In this research, we propose a model to design ontology to support software comprehension and handle issues of knowledge management throughout the development process. By applying our methodology, understanding software and managing knowledge can become possible in a systematic way for open source and commercial projects. Furthermore, it will help beginners become more involved in a project and contribute to it in a productive way.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126363053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme 基于身份的无可信PKG代理签名方案和代理盲多重签名方案分析
Limin Sha
{"title":"Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme","authors":"Limin Sha","doi":"10.1109/SNPD.2014.6888700","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888700","url":null,"abstract":"This paper analyzes two proxy signature schemes' security, and proves that they exist loopholes. Xu's ID-based proxy signature scheme without trusted PKG is not safe, because there exists a security attack which original signer can tamper with the proxy warrant allayed with PKG.Hu's proxy blind multi-signature scheme also exists a security attack that the signature requester can tamper with the proxy warrant.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133795782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for mobile elearning (mLearning) with analytical decision model 基于分析决策模型的移动学习框架
Jahangir Dewan, M. Chowdhury
{"title":"A framework for mobile elearning (mLearning) with analytical decision model","authors":"Jahangir Dewan, M. Chowdhury","doi":"10.1109/SNPD.2014.6888702","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888702","url":null,"abstract":"Mobile eLearning (mLearning) can create a revolution in eLearning with the popularity of smart mobile devices and Application. However, contents are the king to make this revolution happen. Moreover, for an effective mLearning system, analytical aspects such as, quality of contents, quality of results, performance of learners, needs to be addressed. This paper presents a framework for personal mLearning. In this paper, we have used graph-based model called bipartite graph for content authentication and identification of the quality of results. Furthermore, we have used statistical estimation process for trustworthiness of weights in the bipartite graph using confidence interval and hypothesis test as analytical decision model tool.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122057850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The analysis method focusing on peaks of darkness for the impression evaluation method by space 该分析方法以暗峰为重点,为空间印象评价方法
Shunsuke Akai, T. Hochin, Hiroki Nomiya
{"title":"The analysis method focusing on peaks of darkness for the impression evaluation method by space","authors":"Shunsuke Akai, T. Hochin, Hiroki Nomiya","doi":"10.1109/SNPD.2014.6888721","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888721","url":null,"abstract":"This paper proposes an analysis method of the evaluation results obtained through the Impression Evaluation Method by Space (IEMS). The IEMS uses a plane containing impression words as the Kansei space. The impression of an object is specified by circling the areas matching the impression. The degree of matching the impression is expressed by painting color. As the impression words can be moved and/or added in the IEMS, it is difficult to analyze the evaluation results obtained from many subjects. The proposed analysis method focuses on the peaks of darkness. It is called the analysis method focusing on the peaks of darkness (abbr. AM_PD). By mapping the peaks of the darkness in each evaluation result to the same Kansei space, this method can analyze characteristic impressions. In this paper, the algorithm of extracting obvious peaks automatically is proposed toward realization of the AM_PD. The parameters of the AM_PD required to extract the obvious peaks are experimentally determined. This paper shows that the obvious peaks in the evaluation results can be extracted by using this algorithm.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing and implementing service framework for virtual agents in home network system 家庭网络系统中虚拟代理服务框架的设计与实现
Hiroyasu Horiuchi, S. Saiki, S. Matsumoto, Masahide Nakamura
{"title":"Designing and implementing service framework for virtual agents in home network system","authors":"Hiroyasu Horiuchi, S. Saiki, S. Matsumoto, Masahide Nakamura","doi":"10.1109/SNPD.2014.6888728","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888728","url":null,"abstract":"In order to achieve intuitive and easy operations for home network system (HNS), we have previously proposed user interface with virtual agent (called HNS virtual agent user interface, HNS-VAUI). The HNS-VAUI was implemented with MMDAgent toolkit. A user can operate appliances and services interactively through dialog with a virtual agent in a screen. However, the previous prototype heavily depends on MMDAgent, which causes a tight coupling between HNS operations and agent behaviors, and poor capability of using external information. To cope with the problem, this paper proposes a service-oriented framework that allows the HNS-VAUI to provide richer interaction. Specifically, we decompose the tightly-coupled system into two separate services: MMC Service and MSM service. The MMC service concentrates on controlling detailed behaviors of a virtual agent, whereas the MSM service defines logic of HNS operations and dialog with the agent with richer state machines. The two services are loosely coupled to enable more flexible and sophisticated dialog in the HNS-VAUI. The proposed framework is implemented in a real HNS environment. We also conduct a case study with practical service scenarios, to demonstrate effectiveness of the proposed framework.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Unbinds data and tasks to improving the Hadoop performance 解除数据和任务的绑定,以提高Hadoop性能
Kun Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang
{"title":"Unbinds data and tasks to improving the Hadoop performance","authors":"Kun Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang","doi":"10.1109/SNPD.2014.6888710","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888710","url":null,"abstract":"Hadoop is a popular framework that provides easy programming interface of parallel programs to process large scale of data on clusters of commodity machines. Data intensive programs are the important part running on the cluster especially in large scale machine learning algorithm which executes of the same program iteratively. In-memory cache of input data is an efficient way to speed up these data intensive programs. However, we cannot be able to load all the data in memory because of the limitation of memory capacity. So, the key challenge is how we can accurately know when data should be cached in memory and when it ought to be released. The other problem is that memory capacity may even not enough to hold the input data of the running program. This leads to there is some data cannot be cached in memory. Prefetching is an effective method for such situation. We provide a unbinding technology which do not put the programs and data binded together before the real computation start. With unbinding technology, Hadoop can get a better performance when using caching and prefetching technology. We provide a Hadoop framework with unbinding technology named unbinding-Hadoop which decide the map tasks' input data in the map starting up phase, not at the job submission phase. Prefetching as well can be used in unbinding-Hadoop and can get better performance compared with the programs without unbinding. Evaluations on this system show that unbinding-Hadoop reduces the execution time of jobs by 40.2% and 29.2% with WordCount programs and K-means algorithm.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130618985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis and acceleration of NTRU lattice-based cryptographic system 基于NTRU格的密码系统分析与加速
Tianyu Bai, Spencer Davis, Juanjuan Li, Hai Jiang
{"title":"Analysis and acceleration of NTRU lattice-based cryptographic system","authors":"Tianyu Bai, Spencer Davis, Juanjuan Li, Hai Jiang","doi":"10.1109/SNPD.2014.6888686","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888686","url":null,"abstract":"Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/decryption process. However, the big data problem has perplexed lattice based cryptographic systems with the slow processing speed. This paper intends to analyze one of the major lattice-based cryptographic systems, Nth-degree truncated polynomial ring (NTRU), and accelerate its execution with Graphic Processing Unit (GPU) for acceptable processing performance. Three strategies, including single GPU with zero copy, single GPU with data transfer, and multi-GPU versions are proposed. GPU computing techniques such as stream and zero copy are applied to overlap the computation and communication for possible speedup. Experimental results have demonstrated the effectiveness of GPU acceleration of NTRU. As the number of involved devices increases, better NTRU performance will be achieved.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132557417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信