Proceedings of the 3rd International Conference on Software Engineering and Information Management最新文献

筛选
英文 中文
A Novel Approach for Blog Feeds Recommendation Based on Meta-data 基于元数据的博客提要推荐新方法
Jaekwang Kim
{"title":"A Novel Approach for Blog Feeds Recommendation Based on Meta-data","authors":"Jaekwang Kim","doi":"10.1145/3378936.3378971","DOIUrl":"https://doi.org/10.1145/3378936.3378971","url":null,"abstract":"As the blogosphere continues to grow, finding good quality blog feeds has been very time consuming and requires much effort. So, recommending blog feeds, which handle topics close to user interests, can be useful. Recently, the number of bloggers who use the subscription services has been increasing. Subscription is a service using protocols like RSS and ATOM, which notify users when new entries are posted on the blogs that the users register for subscription. In this paper, we present an effective and efficient approach to recommending log feeds based on the subscription lists and meta-data of blogs. In order to find blogs that handle topics close to the blogs in subscription lists, we first model the topic of blogs by collecting and expanding tags in the blogs, and we then compare the topic models of blogs for recommendation. Also, the usefulness of blogs is an important factor. For choosing useful blogs, we adopt the update frequency and number of subscribers because useful blogs are the ones in which new entries will be frequently posted and to which many users will subscribe. In order to validate the proposed blog recommendation algorithm, experiments on real blog data have been conducted, and the results of experiments show that our blog feed recommendation can satisfy users who want to subscribe to blog feeds.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116064936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network FriendNet后门:识别对友好深度神经网络安全的后门攻击
Hyun Kwon, H. Yoon, Ki-Woong Park
{"title":"FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network","authors":"Hyun Kwon, H. Yoon, Ki-Woong Park","doi":"10.1145/3378936.3378938","DOIUrl":"https://doi.org/10.1145/3378936.3378938","url":null,"abstract":"Deep neural networks (DNNs) provide good performance in image recognition, speech recognition and pattern analysis. However, DNNs are vulnerable to backdoor attacks. Backdoor attacks allow attackers to proactively access training data of DNNs to train additional malicious data, including the specific trigger. In normal times, DNNs correctly classify the normal data, but the malicious data with the specific trigger trained by attackers can cause misclassification of DNNs. For example, if an attacker sets up a road sign that includes a specific trigger, an autonomous vehicle equipped with a DNN may misidentify the road sign and cause an accident. Thus, an attacker can use a backdoor attack to threaten the DNN at any time. However, this backdoor attack can be useful in certain situations, such as in military situations. Since there is a mixture of enemy and friendly force in the military situations, it is necessary to cause misclassification of the enemy equipment and classification of the friendly equipment. Therefore, it is necessary to make backdoor attacks that are correctly recognized by friendly equipment and misrecognized by the enemy equipment. In this paper, we propose a friendnet backdoor that is correctly recognized by friendly classifier and misclassified by the enemy classifier. This method additionally trains the friendly and enemy classifier with the proposed data, including the specific trigger that is correctly recognized by friendly classifier and misclassified by enemy classifier. We used MNIST and Fashion-MNIST as experimental datasets and Tensorflow as a machine learning library. Experimental results show that the proposed method in MNIST and Fashion-MNIST has 100% attack success rate of the enemy classifier and the 99.21% and 92.3% accuracy of the friendly classifier, respectively.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122939050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Moderating Effects of Mentoring in ERP Systems 导师制在ERP系统中的调节作用
Su-Tzu Hsieh
{"title":"The Moderating Effects of Mentoring in ERP Systems","authors":"Su-Tzu Hsieh","doi":"10.1145/3378936.3378944","DOIUrl":"https://doi.org/10.1145/3378936.3378944","url":null,"abstract":"A failure implementation of enterprise resource planning, ERP System can be a disaster for organizations, as the fee of a ERP system is sky-high. Furthermore, a familiar user of an ERP system is required an exhaustive business knowledge to analysis business operation flows to diagnose and solve business problems. These complex business analysis, diagnose and issues solving may require mentoring rather than training of a particular skill. There is, however, only very limited research addresses to the effects of mentoring on ERP system implementation. This paper argues that mentoring can play an important role of moderating in affecting user's perceived usefulness, satisfaction and intention to continue use.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Writing on Bulletin Board via Tor 通过Tor识别电子公告板上的文字
N. Yoshiura, Kaichiro Iida
{"title":"Identification of Writing on Bulletin Board via Tor","authors":"N. Yoshiura, Kaichiro Iida","doi":"10.1145/3378936.3378967","DOIUrl":"https://doi.org/10.1145/3378936.3378967","url":null,"abstract":"In recent years, awareness of protection of personal information has been increased, and anonymous communication that enables communication with hiding personal information attracts attention. Tor (The Onion Router) realizes anonymous communication most widely, but this anonymization is used for crime. This paper aims to identify users who maliciously write to the Internet bulletin board using Tor. This paper proposes a method of detecting Tor packet of writing on bulletin board. This method captures Tor packets and decides whether the packets is used for writing on bulletin board by using fingerprint. This paper implements the method and experiments to evaluates the method. The result of experiments shows that identification of writing on bulletin websites which use usual CGI programs is not successful at high probability and that modifying CGI programs is useful for identification of writing on bulletin websites. The result also shows that identification of writing on bulletin websites is difficult if users write on bulletin websites and access other websites such as streaming websites.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Capital and Their Affect in Service Quality Dimensions 人力资本及其对服务质量维度的影响
Mariam Ibrahim Hamood Al-Karaawi, Azhara Aziz jasim alobeidi, M. Zuhaira
{"title":"Human Capital and Their Affect in Service Quality Dimensions","authors":"Mariam Ibrahim Hamood Al-Karaawi, Azhara Aziz jasim alobeidi, M. Zuhaira","doi":"10.1145/3378936.3378959","DOIUrl":"https://doi.org/10.1145/3378936.3378959","url":null,"abstract":"The purpose of this study is to investigate the effect of human capital components on quality of educational service through its dimensions. questionnaire were used to extract the components of human capital (HC) that affect the service quality dimensions. These results were then tested using program SPSS, EXCEL. Each components of HC was then tested on the service quality (SQ) using correlation, regression coefficient. The analysis yielded five HC components, which were termed as Knowledge, Experience, skill, Innovation and Talent. It was found that all Knowledge, Experience, skill, Innovation and job-related talent significantly positively predict the SQ. The study offered experiential data to support the contention that university should develop and engage capabilities of lecturers to enhance the quality of educational service.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124779299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Conflict Prediction during Collaborative Software Development: A step-before Continuous Integration 协同软件开发中的持续冲突预测:持续集成前的一个步骤
R. Arora, Anand Wani, Ankur Vineet, Bhavik Dhandhalya, Yashvardhan Sharma, S. Goel
{"title":"Continuous Conflict Prediction during Collaborative Software Development: A step-before Continuous Integration","authors":"R. Arora, Anand Wani, Ankur Vineet, Bhavik Dhandhalya, Yashvardhan Sharma, S. Goel","doi":"10.1145/3378936.3378951","DOIUrl":"https://doi.org/10.1145/3378936.3378951","url":null,"abstract":"Concurrent activities of collaborative developers over shared project repositories might lead to direct and indirect conflicts. Software Configuration Management systems are designed to capture direct or merge conflicts which arise due to concurrent editing of same shared artifact. However, inconsistencies caused owing to indirect conflicts which arise because of concurrent editing of related artifacts might enter the codebase, since SCM systems have limited capabilities to capture these. Although, Continuous Integration process which is deployed to build the entire codebase with every commit, is quite effective in capturing several type of inconsistencies. However, still few categories of behavioral semantic inconsistencies might evade the build process and penetrate into codebase. In this paper, we propose the Continuous Conflict Prediction Framework which describes a cyclic, real-time, continuous process for conflict prediction which is executed during the process of code creation by collaborative developers. This framework entails a critical conflict-prediction and awareness-generation process which helps in capturing conflicts during development process itself and hence minimizes the number of conflicts entering the project codebase. The proposed framework is realized through implementation of the tool named Collaboration Over GitHub.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-Government Inter-Organizational Integration: Types and Success Factors 电子政务组织间整合:类型与成功因素
Mieke Eka Putri, D. I. Sensuse, M. Mishbah, P. Prima
{"title":"E-Government Inter-Organizational Integration: Types and Success Factors","authors":"Mieke Eka Putri, D. I. Sensuse, M. Mishbah, P. Prima","doi":"10.1145/3378936.3378955","DOIUrl":"https://doi.org/10.1145/3378936.3378955","url":null,"abstract":"The rapid development of ICT in Indonesia encourages governments to implement e-government for supporting their services so they can improve their service delivery, strengthen accountability, and increase transparency. Unfortunately, there is a major drawback regarding the implementation of e-government. One of the drawbacks is that most organizations develop silos online services. This condition reflects a lack of e-government inter-organizational integrations. E-government integration among organizations or agencies is necessary to promote a more efficient process, accurate information, and seamless services, which are the objectives of the e-government itself. E-government integration is a complicated process as stakeholders need to consider and plan several factors to make it successful. This study identified the types of e-government inter-organizational integrations through a systematic literature review using the Kitchenham method. The study reveals the success factors which need to be concerned to implement e-government successfully. This study can be used as a reference by stakeholders to initiate an implementation of e-government inter-organizational integration.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114939837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey of Swarm Intelligence Algorithms 群智能算法综述
Suganya Selvaraj, Eunmi Choi
{"title":"Survey of Swarm Intelligence Algorithms","authors":"Suganya Selvaraj, Eunmi Choi","doi":"10.1145/3378936.3378977","DOIUrl":"https://doi.org/10.1145/3378936.3378977","url":null,"abstract":"Swarm Intelligence (SI) is an AI technique that has the collective behavior of a decentralized, self-organized system. SI has more advantages such as scalability, adaptability, collective robustness and individual simplicity and also has the ability to solve complex problems. Besides, SI algorithms also have few issues in time-critical applications, parameter tuning, and stagnation. SI algorithms need to be studied more to overcome these kinds of issues. In this paper, we studied a few popular algorithms in detail to identify important control parameters and randomized distribution. We also studied and summarized the performance comparison of SI algorithms in different applications.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116992141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Scaling Agile Software Development Approach in Government Organization in New Zealand 在新西兰政府机构中扩展敏捷软件开发方法
Dipendra Ghimire, S. Charters, S. Gibbs
{"title":"Scaling Agile Software Development Approach in Government Organization in New Zealand","authors":"Dipendra Ghimire, S. Charters, S. Gibbs","doi":"10.1145/3378936.3378945","DOIUrl":"https://doi.org/10.1145/3378936.3378945","url":null,"abstract":"Agile methods are based on an iterative and incremental cycles of development where requirements and solutions are developed through collaboration and coordination between cross-functional teams and their customer. Agile software development focuses on flexibility, allowing changes in requirements to occur during the software development process. The use of Agile software development is increasing in both the private and public sectors. However, there is little knowledge about the use of Agile in the public sector. This paper presents important factors such as communication, transparency, feedback, product owner engagement, confidence and organization culture that contribute to the outcome of Agile Software development projects in public sector organisations. This study compares the main challenges in the public and the private sector. Transparency and Product Owner engagement were found to be the main difference in the challenges in the public and private sectors.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"48 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120975289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Study on Determining Household Poverty Status: SVM Based Classification Model 家庭贫困状况判定研究:基于SVM的分类模型
Maricel P. Naviamos, Jasmin D. Niguidula
{"title":"A Study on Determining Household Poverty Status: SVM Based Classification Model","authors":"Maricel P. Naviamos, Jasmin D. Niguidula","doi":"10.1145/3378936.3378969","DOIUrl":"https://doi.org/10.1145/3378936.3378969","url":null,"abstract":"Poverty is the normal challenge faced by the worldwide community. The human society has never ceased to fight against poverty. This research study focuses on determining significant attributes that can be utilized to distinguish poor and non-poor household units. At least one selected community in the Philippines is utilized to validate and test the model for Classification using Support Vector Machine (SVM) algorithm. To check the accuracy and evaluate the model 80% of the total poor and non-poor households are used as a training set and the remaining 20% as a testing set to minimize the impact of disparities and determine whether the model's classifications are correct. Accuracy, Precision, Recall and F1-Score are likewise done to interpret and gauge the performance of the SVM algorithm for the binary classification model in which the outcome indicates 88.64% precise.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128328043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信