{"title":"LACM: The Design of an Application Code Maintenance Tool Based on Linux","authors":"Tao Jiang, Yong Shen, Hongwei Kang, WenYun Zheng","doi":"10.1109/WCSE.2009.408","DOIUrl":"https://doi.org/10.1109/WCSE.2009.408","url":null,"abstract":"The often changing needs of users will certainly leadto many modifications of code. Due to lack of CASE tool onLinux platform, it is difficult to maintain and modify Linuxapplication code. After analyzing current CASE tools, on basis of several technologies such as lexical analysis, visual development and persistent object, we design LACM (Linux Application Code Maintenance Tool): a lightweight application code maintenance tool based on Linux driven by database with functions of code recognition, document management and code modification, to adapt to the changing needs of users. We implement parts of functions of LACM in this paper by using Delphi for Linux.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129295195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and Building of a Hong Lou Meng Chinese-English Parallel Corpus and its Web-Based Query System","authors":"Zequan Liu, Ying Yuan, Chaopeng Liu","doi":"10.1109/WCSE.2009.343","DOIUrl":"https://doi.org/10.1109/WCSE.2009.343","url":null,"abstract":"In this paper, an introduction of the designing and building of a Hong Lou Meng Chinese-English parallel corpus and its web-based query system was given in the first place and then the algorithms in the construction of the parallel corpus which contained one source text in Chinese and three target texts in English were analyzed in detail. As an indispensable step in the establishment of the parallel corpus and its web-based query system, database building was investigated elaborately. The building of this Chinese-English parallel corpus and its web-based query system was believed to eventually facilitate translation studies and other relevant linguistic and cultural disciplines on a systematical and comprehensive level.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128477338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuequn Chen, Fulin Li, Ye Liu, Chengshan Yan, Lin Lin
{"title":"Neural Network Analog on Dynamic Variation of the Karst Water and the Prediction for Spewing Tendency of Springs in Jinan","authors":"Xuequn Chen, Fulin Li, Ye Liu, Chengshan Yan, Lin Lin","doi":"10.1109/WCSE.2009.131","DOIUrl":"https://doi.org/10.1109/WCSE.2009.131","url":null,"abstract":"Considering the factors that affect the karst water level, the improved Neural Network Model has been applied to construct the random model that analogs the dynamic change of karst water. The accuracy of our analog has been greatly improved compared with that of multi-line recurrence model; moreover, BP model has strong functions of study, fault tolerance and association. In a word, BP model is an effective tool to predict the dynamic change of karst water. In addition, the spewing tendency of springs in Jinan is analyzed based on our prediction results in this paper.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti
{"title":"Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues","authors":"D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti","doi":"10.1109/WCSE.2009.426","DOIUrl":"https://doi.org/10.1109/WCSE.2009.426","url":null,"abstract":"Peer-to-peer(P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobile agents in accessing, processing event securing data. In P2P, giving permission to client who could accessed data is needed to reduced client’s worrying of prevent any stealing private data. Under this assumption, in this paper, we address the problem of protecting mobile agent system in P2P networks. Some approaches of security mechanisms and techniques are then discussed.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129886609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Software Change Propagation Using Simulation","authors":"Lin Li, Guanqun Qian, Li Zhang","doi":"10.1109/WCSE.2009.22","DOIUrl":"https://doi.org/10.1109/WCSE.2009.22","url":null,"abstract":"Software changes are inevitable in the process of software evolution. And software change propagation intensely increases the difficulty of software maintenance. The approach of simulated analysis is introduced to the research on software change propagation. The software change propagation model construction and related software metric indicators are presented. And the software change propagation evaluation approach based on simulation is proposed, which can be used to evaluate the design quality of software system in an arbitrary level of abstraction. The proposed software change propagation model has been implemented in the NetLogo simulation platform that can automatically analyze the software quality of a given system. The proposed systematic approach has been evaluated by some samples, which indicate the simplicity and rationality of our approach.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Properties of Algebraic Structures of RSA-like Systems","authors":"Baodian Wei, Fangguo Zhang, Xiaofeng Chen, Haibo Tian","doi":"10.1109/WCSE.2009.249","DOIUrl":"https://doi.org/10.1109/WCSE.2009.249","url":null,"abstract":"The algebraic structure Z_n^* , with n being a product of safe primes, is widely used in RSA-like cryptosystems. We have investigated some properties of this kind of structure. Isomorphic structures are presented to represent elements of Z_n^* in a unique way. They also help to determine the form and the number of possible subgroups, to find, in a deterministic rather than probabilistic manner, the elements of any possible orders. The properties of quadratic and high degree residues are analyzed in detail, as well.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Existence of Multi-secret Sharing Schemes Based on Random Walks on Graphs","authors":"Xiaomin Zha, Y. Sang, Jiwen Zen, Jun Xu","doi":"10.1109/WCSE.2009.294","DOIUrl":"https://doi.org/10.1109/WCSE.2009.294","url":null,"abstract":"A multi-secret sharing scheme is the extension of a secretsharing scheme to the case in which there are many secrets need to be shared, and each secret may with different qualified subsets of participants. We study multi-secret sharing schemes based on random walks on graphs. Since many problems of secret sharing can be seen as having structure of the graphs. Different access structures corresponding to different walks for a graph with n vertices can be defined. So considering multi-secret sharing scheme based on random walks on graphs is meaningful. We prove that there exists multi-secret sharing schemes based on random walks on graphs by studying monotone span programs computing monotone Boolean function and secret sharing schemes realizing these classes of access structure.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Fuzzy-Event Driven Simulator","authors":"X. Xing, Shu-fang Xie, Q. Cheng, Yong Ge","doi":"10.1109/WCSE.2009.476","DOIUrl":"https://doi.org/10.1109/WCSE.2009.476","url":null,"abstract":"Inter dependencies among infrastructure elements are intertwined and complicated. Understanding cascading effects because of direct or indirect interdependencies is critical and necessary for the effective response and management of social resources, especially in a disaster or emergency. Modelling cascading processes has attracted more and more concerns and become an emerging interdisciplinary field of study. This paper, from the view of software engineering, introduces a fuzzy-event driven algorithm, designs the modular prototype structure and domain object models of one fuzzy-event driven simulator to model cascading processes among entities, and also specifies multithreading implementation strategy and development environment. Finally, an example is included as an illustration as well. This study can help people understand potential cascading effects, and eventually find out the vulnerable components for decision-analysis.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"os-39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Determined Key Distribution Scheme Using Quantum Teleportation","authors":"Xiaoyu Li, Nianqing Wan, Dexi Zhang","doi":"10.1109/WCSE.2009.52","DOIUrl":"https://doi.org/10.1109/WCSE.2009.52","url":null,"abstract":"In this paper we provide a quantum determined key distribution protocol using quantum telportation. Unlike the previous protocols which produce a random string in the key distribution process as the key, in our protocol the two parties can share a predetermined binary string as the key with the help of quantum teleportation. The principles of quantum mechanics guarantees that no other people can get the key. So the protocol is unconditionally secure.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Resource Distribution of the Edonkey","authors":"Qi Wu, Xingshu Chen, Wenxian Wang, Q. Lv","doi":"10.1109/WCSE.2009.37","DOIUrl":"https://doi.org/10.1109/WCSE.2009.37","url":null,"abstract":"The eDonkey servers implement a number of protective mechanisms against observation and attacks in order to maintain stability of eDonkey network. we introduce a new crawling technique which can breakthrough these restrictions to gather information. On the basis of the technique, we collect data from the edonkey network by using an experimental client. Based on collected information, the paper analyze the data from the edonkey network and summarize the server distribution characteristics and the distribution characteristics of shared files.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}