2009 WRI World Congress on Software Engineering最新文献

筛选
英文 中文
LACM: The Design of an Application Code Maintenance Tool Based on Linux 基于Linux的应用程序代码维护工具的设计
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.408
Tao Jiang, Yong Shen, Hongwei Kang, WenYun Zheng
{"title":"LACM: The Design of an Application Code Maintenance Tool Based on Linux","authors":"Tao Jiang, Yong Shen, Hongwei Kang, WenYun Zheng","doi":"10.1109/WCSE.2009.408","DOIUrl":"https://doi.org/10.1109/WCSE.2009.408","url":null,"abstract":"The often changing needs of users will certainly leadto many modifications of code. Due to lack of CASE tool onLinux platform, it is difficult to maintain and modify Linuxapplication code. After analyzing current CASE tools, on basis of several technologies such as lexical analysis, visual development and persistent object, we design LACM (Linux Application Code Maintenance Tool): a lightweight application code maintenance tool based on Linux driven by database with functions of code recognition, document management and code modification, to adapt to the changing needs of users. We implement parts of functions of LACM in this paper by using Delphi for Linux.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129295195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing and Building of a Hong Lou Meng Chinese-English Parallel Corpus and its Web-Based Query System 红楼梦汉英平行语料库的设计与构建及其基于web的查询系统
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.343
Zequan Liu, Ying Yuan, Chaopeng Liu
{"title":"Designing and Building of a Hong Lou Meng Chinese-English Parallel Corpus and its Web-Based Query System","authors":"Zequan Liu, Ying Yuan, Chaopeng Liu","doi":"10.1109/WCSE.2009.343","DOIUrl":"https://doi.org/10.1109/WCSE.2009.343","url":null,"abstract":"In this paper, an introduction of the designing and building of a Hong Lou Meng Chinese-English parallel corpus and its web-based query system was given in the first place and then the algorithms in the construction of the parallel corpus which contained one source text in Chinese and three target texts in English were analyzed in detail. As an indispensable step in the establishment of the parallel corpus and its web-based query system, database building was investigated elaborately. The building of this Chinese-English parallel corpus and its web-based query system was believed to eventually facilitate translation studies and other relevant linguistic and cultural disciplines on a systematical and comprehensive level.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128477338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Analog on Dynamic Variation of the Karst Water and the Prediction for Spewing Tendency of Springs in Jinan 济南市岩溶水动态变化的神经网络模拟及泉水喷涌趋势预测
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.131
Xuequn Chen, Fulin Li, Ye Liu, Chengshan Yan, Lin Lin
{"title":"Neural Network Analog on Dynamic Variation of the Karst Water and the Prediction for Spewing Tendency of Springs in Jinan","authors":"Xuequn Chen, Fulin Li, Ye Liu, Chengshan Yan, Lin Lin","doi":"10.1109/WCSE.2009.131","DOIUrl":"https://doi.org/10.1109/WCSE.2009.131","url":null,"abstract":"Considering the factors that affect the karst water level, the improved Neural Network Model has been applied to construct the random model that analogs the dynamic change of karst water. The accuracy of our analog has been greatly improved compared with that of multi-line recurrence model; moreover, BP model has strong functions of study, fault tolerance and association. In a word, BP model is an effective tool to predict the dynamic change of karst water. In addition, the spewing tendency of springs in Jinan is analyzed based on our prediction results in this paper.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues 对等网络中的安全移动代理系统:基于几个安全问题的安全机制综述
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.426
D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti
{"title":"Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues","authors":"D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti","doi":"10.1109/WCSE.2009.426","DOIUrl":"https://doi.org/10.1109/WCSE.2009.426","url":null,"abstract":"Peer-to-peer(P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobile agents in accessing, processing event securing data. In P2P, giving permission to client who could accessed data is needed to reduced client’s worrying of prevent any stealing private data. Under this assumption, in this paper, we address the problem of protecting mobile agent system in P2P networks. Some approaches of security mechanisms and techniques are then discussed.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129886609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Software Change Propagation Using Simulation 软件变更传播的仿真评估
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.22
Lin Li, Guanqun Qian, Li Zhang
{"title":"Evaluation of Software Change Propagation Using Simulation","authors":"Lin Li, Guanqun Qian, Li Zhang","doi":"10.1109/WCSE.2009.22","DOIUrl":"https://doi.org/10.1109/WCSE.2009.22","url":null,"abstract":"Software changes are inevitable in the process of software evolution. And software change propagation intensely increases the difficulty of software maintenance. The approach of simulated analysis is introduced to the research on software change propagation. The software change propagation model construction and related software metric indicators are presented. And the software change propagation evaluation approach based on simulation is proposed, which can be used to evaluate the design quality of software system in an arbitrary level of abstraction. The proposed software change propagation model has been implemented in the NetLogo simulation platform that can automatically analyze the software quality of a given system. The proposed systematic approach has been evaluated by some samples, which indicate the simplicity and rationality of our approach.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Some Properties of Algebraic Structures of RSA-like Systems 类rsa系统代数结构的一些性质
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.249
Baodian Wei, Fangguo Zhang, Xiaofeng Chen, Haibo Tian
{"title":"Some Properties of Algebraic Structures of RSA-like Systems","authors":"Baodian Wei, Fangguo Zhang, Xiaofeng Chen, Haibo Tian","doi":"10.1109/WCSE.2009.249","DOIUrl":"https://doi.org/10.1109/WCSE.2009.249","url":null,"abstract":"The algebraic structure Z_n^* , with n being a product of safe primes, is widely used in RSA-like cryptosystems. We have investigated some properties of this kind of structure. Isomorphic structures are presented to represent elements of Z_n^* in a unique way. They also help to determine the form and the number of possible subgroups, to find, in a deterministic rather than probabilistic manner, the elements of any possible orders. The properties of quadratic and high degree residues are analyzed in detail, as well.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Existence of Multi-secret Sharing Schemes Based on Random Walks on Graphs 基于图上随机游动的多秘密共享方案的存在性
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.294
Xiaomin Zha, Y. Sang, Jiwen Zen, Jun Xu
{"title":"The Existence of Multi-secret Sharing Schemes Based on Random Walks on Graphs","authors":"Xiaomin Zha, Y. Sang, Jiwen Zen, Jun Xu","doi":"10.1109/WCSE.2009.294","DOIUrl":"https://doi.org/10.1109/WCSE.2009.294","url":null,"abstract":"A multi-secret sharing scheme is the extension of a secretsharing scheme to the case in which there are many secrets need to be shared, and each secret may with different qualified subsets of participants. We study multi-secret sharing schemes based on random walks on graphs. Since many problems of secret sharing can be seen as having structure of the graphs. Different access structures corresponding to different walks for a graph with n vertices can be defined. So considering multi-secret sharing scheme based on random walks on graphs is meaningful. We prove that there exists multi-secret sharing schemes based on random walks on graphs by studying monotone span programs computing monotone Boolean function and secret sharing schemes realizing these classes of access structure.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Fuzzy-Event Driven Simulator 模糊事件驱动模拟器的设计与实现
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.476
X. Xing, Shu-fang Xie, Q. Cheng, Yong Ge
{"title":"Design and Implementation of a Fuzzy-Event Driven Simulator","authors":"X. Xing, Shu-fang Xie, Q. Cheng, Yong Ge","doi":"10.1109/WCSE.2009.476","DOIUrl":"https://doi.org/10.1109/WCSE.2009.476","url":null,"abstract":"Inter dependencies among infrastructure elements are intertwined and complicated. Understanding cascading effects because of direct or indirect interdependencies is critical and necessary for the effective response and management of social resources, especially in a disaster or emergency. Modelling cascading processes has attracted more and more concerns and become an emerging interdisciplinary field of study. This paper, from the view of software engineering, introduces a fuzzy-event driven algorithm, designs the modular prototype structure and domain object models of one fuzzy-event driven simulator to model cascading processes among entities, and also specifies multithreading implementation strategy and development environment. Finally, an example is included as an illustration as well. This study can help people understand potential cascading effects, and eventually find out the vulnerable components for decision-analysis.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"os-39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum Determined Key Distribution Scheme Using Quantum Teleportation 基于量子隐形传态的量子确定密钥分配方案
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.52
Xiaoyu Li, Nianqing Wan, Dexi Zhang
{"title":"Quantum Determined Key Distribution Scheme Using Quantum Teleportation","authors":"Xiaoyu Li, Nianqing Wan, Dexi Zhang","doi":"10.1109/WCSE.2009.52","DOIUrl":"https://doi.org/10.1109/WCSE.2009.52","url":null,"abstract":"In this paper we provide a quantum determined key distribution protocol using quantum telportation. Unlike the previous protocols which produce a random string in the key distribution process as the key, in our protocol the two parties can share a predetermined binary string as the key with the help of quantum teleportation. The principles of quantum mechanics guarantees that no other people can get the key. So the protocol is unconditionally secure.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on Resource Distribution of the Edonkey 驴资源分布的研究
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.37
Qi Wu, Xingshu Chen, Wenxian Wang, Q. Lv
{"title":"A Study on Resource Distribution of the Edonkey","authors":"Qi Wu, Xingshu Chen, Wenxian Wang, Q. Lv","doi":"10.1109/WCSE.2009.37","DOIUrl":"https://doi.org/10.1109/WCSE.2009.37","url":null,"abstract":"The eDonkey servers implement a number of protective mechanisms against observation and attacks in order to maintain stability of eDonkey network. we introduce a new crawling technique which can breakthrough these restrictions to gather information. On the basis of the technique, we collect data from the edonkey network by using an experimental client. Based on collected information, the paper analyze the data from the edonkey network and summarize the server distribution characteristics and the distribution characteristics of shared files.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信