2011 IEEE 35th Annual Computer Software and Applications Conference Workshops最新文献

筛选
英文 中文
Analyzing the Digital Home's Quality of Service 分析数字家庭的服务质量
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.81
A. Chazalet, Sébastien Bolle, Serge Martin
{"title":"Analyzing the Digital Home's Quality of Service","authors":"A. Chazalet, Sébastien Bolle, Serge Martin","doi":"10.1109/COMPSACW.2011.81","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.81","url":null,"abstract":"Digital Home (DH) offers a lot of business opportunities. Therefore, DH is a place to be for industrialists such as Telecommunications Operators, Services Providers, Network, Devices and Consumer Electronics Manufacturers. DH raises many challenges about, among others, Management (i.e., Configuration and Deployment, Healing, Protection, and Optimization), Quality of Service (QoS), Home Automation, Opening to third-party services, and Green attitude. The work presented here focuses on the QoS challenge. It is conducted in a research project that focuses on the QoS maintenance of services offered to end-users via their DH. QoS maintenance requires QoS monitoring and analyzing mechanisms. As a consequence, we propose a QoS Monitoring and Analyzing enabler that uses the Service Level Checking approach (SLC) to analyze the DH's QoS with regard to services contracts (i.e., Service Level Agreement: SLA). SLC refers to issues and solutions related to the services compliance analyzing/checking w.r.t. their SLA. SLC takes as input monitoring information related to the services, and SLA contractualizing the services, it then analyzes these inputs and produces results about the services' compliance. In the DH context, a service can be an end-user or a software service, a network link, or a device. This paper presents our solution, named SLC4DH, which has been implemented and validated in our research project.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards an Engineering Approach to File Carver Construction 从工程的角度探讨文件刻录的构建
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.68
L. Aronson, J. V. D. Bos
{"title":"Towards an Engineering Approach to File Carver Construction","authors":"L. Aronson, J. V. D. Bos","doi":"10.1109/COMPSACW.2011.68","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.68","url":null,"abstract":"File carving is the process of recovering files without the help of (file system) storage metadata. A host of techniques exist to perform file carving, often used in several tools in varying combinations and implementations. This makes it difficult to determine what tool to use in specific investigations or when recovering files in a specific file format. We define recoverability as the set of software requirements for a file carver to recover files in a specified file format. This set can then be used to evaluate what tool to use or which technique to implement, based on external factors such as file format to recover, available time, engineering capacity and data set characteristics. File carving techniques are divided into two groups, format validation and file reconstruction. These groups refer to different parts of a file carver's implementation. Additionally, some techniques may be emphasized or omitted not only because of file format support for them, but based on performance effects that may result from applying them. We discuss a simplified variant of the GIF image file format as an example and show how a structured analysis of the format leads to design decisions for a file carver.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Software Reliability Model with Coxian Distribution of Length of Intervals between Errors Detection and Fixing Moments 基于误差检测与修正矩间隔长度的Coxian分布的软件可靠性模型
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.58
V. Bubnov, A. Khomonenko, Alexey V. Tyrva
{"title":"Software Reliability Model with Coxian Distribution of Length of Intervals between Errors Detection and Fixing Moments","authors":"V. Bubnov, A. Khomonenko, Alexey V. Tyrva","doi":"10.1109/COMPSACW.2011.58","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.58","url":null,"abstract":"The generalized software reliability model on the basis of non-stationary Markovian service system is proposed. Approximation by Coxian distribution allows investigating software reliability growth for any kinds of distribution (for example, Weibull, Gamma) of time between the moments of program errors detection and fixing. The model enables to forecast important software reliability characteristics, such as number of corrected errors, number of errors to be fixed, required debugging time, etc. The diagram of transitions between states of the generalized model and differential equations system are presented. The example of calculation with use of the offered model is considered, research of influence of Coxian distributions variation coefficients of duration of intervals between the error detection moments and error correction time distributions on values of look-ahead characteristics is executed.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122016033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Augmenting Cloud Requirements Engineering with Meta-Services 用元服务增强云需求工程
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.88
Rainer Schmidt
{"title":"Augmenting Cloud Requirements Engineering with Meta-Services","authors":"Rainer Schmidt","doi":"10.1109/COMPSACW.2011.88","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.88","url":null,"abstract":"Cloud-Computing has gained high attention in industry. Cloud-services provided by cloud-computing are spreading quickly in enterprises. One root for the success of Cloud-Computing is on-demand self-service. Therefore, to appropriately elicit the requirements for cloud-computing, it is not sufficient to define the cloud-services but also the associated automated management interactions implementing the on-demand self-service. To accomplish this task meta-services are introduced into requirements engineering.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Performance Guarantee Approach for Cloud Applications Based on Monitoring 基于监控的云应用性能保证方法
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.15
Jin Shao, Qianxiang Wang
{"title":"A Performance Guarantee Approach for Cloud Applications Based on Monitoring","authors":"Jin Shao, Qianxiang Wang","doi":"10.1109/COMPSACW.2011.15","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.15","url":null,"abstract":"Cloud computing, a paradigm shift that offer computing resources in a pay-as-you-go manner, is expected to minimize service operators' cost without sacrificing the performance of services. However, it is much harder to guarantee the performance of cloud applications due to the complex architecture of cloud, the interaction between co-deployed applications and the unpredictability of workload. Some research work has reported that existed cloud is not performing as satisfactorily as expected. How to guarantee the stable performance of cloud applications turns into a major concern of both the cloud providers and the service providers. In this paper, we present an approach to guarantee the performance of cloud applications based on a performance model. Extracted from actual runtime monitoring data using data mining techniques, the model can be leveraged to direct how to adjust the resource provision strategy under a given performance requirement. A monitoring framework is implemented for collecting runtime monitoring data on a real cloud which provides PaaS service.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132620613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Improving Query Suggestion for Digital Libraries 数字图书馆改进查询建议
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.78
Lemen Chao, Yong Zhang, Chunxiao Xing
{"title":"Improving Query Suggestion for Digital Libraries","authors":"Lemen Chao, Yong Zhang, Chunxiao Xing","doi":"10.1109/COMPSACW.2011.78","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.78","url":null,"abstract":"The users of a digital library often have difficulty in formulating query expression that could represent his or her information requirements exactly. Query suggestion can provide some recommended query expression and help the user build a proper expression. Query suggestion for digital libraries requires higher precision ratio and novelty ratio than that of web search engines. Based on case studies, we found that there are four main types of query suggestion within digital library environments, namely spelling suggestion, hot keyword suggestion, personalized suggestion and semantic suggestion. These approaches are, however, hardly to ensure high precision ratio and novelty ratio expected by digital library users to date. The paper proposed an improved query suggestion approach for digital library and its main advantages lie in computing semantic relations, finding hot concepts and ranking candidate concepts. Semantic similarity between user's input and a candidate keyword is calculated by Relative Information Loss (RIL). Hot keywords are indentified by a new algorithm, which involving clicked time, novelty clicked time, result record number, novelty result record. The rank degree of a keyword is evaluated by its RIL and hot degree. Finally, a software component that takes advantage of DBpedia Ontology, Jena, Ajax and SPARQL in align with these new improvements is developed and deployed on a digital library named iDLib. Better user experience with our new query suggestion software component proves the feasibility and efficiency of the improvement.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131901491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stateflow to Extended Finite Automata Translation 状态流到扩展有限自动机的转换
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.11
Meng Li, Ratnesh Kumar
{"title":"Stateflow to Extended Finite Automata Translation","authors":"Meng Li, Ratnesh Kumar","doi":"10.1109/COMPSACW.2011.11","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.11","url":null,"abstract":"State flow, a graphical interface tool for Matlab, is a common choice for design of event-driven software and systems. In order for their offline analysis (testing/verification) or online analysis (monitoring), the State flow model must be converted to a form that is amenable to formal analysis. In this paper, we present a systematic method, which translates State flow into a formal model, called Input/Output Extended Finite Automata (I/O-EFA). The translation method treats each state of the State flow model as an atomic module, and applies composition/refinement rules for each feature (such as state-hierarchy, local events) recursively to obtain the entire model. The size of the translated model is linear in the size of the State flow chart. Our translation method is sound and complete in the sense that it preserves the discrete behaviors as observed at the sample times. Further, the translation method has been implemented in a Matlab tool, which outputs the translated I/O-EFA model that can itself be simulated in Matlab.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"681 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Model-Based Scheduling Analysis for Software Projects 基于模型的软件项目调度分析
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.57
F. Padberg, D. Weiss
{"title":"Model-Based Scheduling Analysis for Software Projects","authors":"F. Padberg, D. Weiss","doi":"10.1109/COMPSACW.2011.57","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.57","url":null,"abstract":"We show how to compute optimal policies for the scheduling of software development projects under uncertainty. Our approach is based on a stochastic scheduling model that explicitly captures the strong feedback between the tasks in software development (\"ripple effects\"). We apply reinforcement learning to the optimization problem. For a selected sample project, we compute the optimal policy, simulate the project, and analyze the task assignments that are made by the optimal policy. From the analysis of the simulated schedules, we derive tentative, generic scheduling guidelines. The guidelines prioritize certain tasks based on the characteristics of the software architecture, and assign tasks according to the past performance of the developers.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Code Injection Attacks in Internet Explorer Internet Explorer中的代码注入攻击检测
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.25
Blake Anderson, Daniel Quist, T. Lane
{"title":"Detecting Code Injection Attacks in Internet Explorer","authors":"Blake Anderson, Daniel Quist, T. Lane","doi":"10.1109/COMPSACW.2011.25","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.25","url":null,"abstract":"Code injection vulnerabilities are a major threat to Internet security. The ability for a malicious website to install malware on a host using these vulnerabilities without its knowledge is particularly menacing. In this paper, we approach this problem from a new perspective by constructing a Markov chain graph from the system calls Internet Explorer executes and then modeling this graph over time. We apply a Gaussian process change-point algorithm to detect code injection attacks. To show the efficacy of this approach, we collect a novel dataset of system call traces of 6 code injection attacks using 3 distinct exploits against the Internet Explorer browser. Our algorithm was able to detect all of the code injection attacks with a limited number of false positives.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115360830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interoperable Spatial Information System Architecture Based on Ubiqiutous ID Infrastructure 基于泛在ID基础设施的互操作空间信息系统架构
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops Pub Date : 2011-07-18 DOI: 10.1109/COMPSACW.2011.79
Shinsuke Kobayashi, Y. Shigesada, N. Koshizuka, K. Sakamura
{"title":"Interoperable Spatial Information System Architecture Based on Ubiqiutous ID Infrastructure","authors":"Shinsuke Kobayashi, Y. Shigesada, N. Koshizuka, K. Sakamura","doi":"10.1109/COMPSACW.2011.79","DOIUrl":"https://doi.org/10.1109/COMPSACW.2011.79","url":null,"abstract":"We propose a novel spatial information system architecture based on ucode, which is a unique identifier. The model includes not only outdoor location but also indoor location such as room and elevator, utilizing geographic identifier. In our system architecture, we propose Web-based APIs for both of outdoor and indoor spatial information in order to mush it up with existing web and mobile applications. We realized a smart phone application using our location-aware architecture in the evaluation. From the result, we showed that our system gave seamless outdoor and indoor spatial information.","PeriodicalId":301896,"journal":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference Workshops","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115504004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信