2009 WRI World Congress on Software Engineering最新文献

筛选
英文 中文
A Self-Feedback Methodology of Domain Ontology Modeling 领域本体建模的自反馈方法
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.178
Ming Li, Fengkui Zang
{"title":"A Self-Feedback Methodology of Domain Ontology Modeling","authors":"Ming Li, Fengkui Zang","doi":"10.1109/WCSE.2009.178","DOIUrl":"https://doi.org/10.1109/WCSE.2009.178","url":null,"abstract":"Ontology has played more and more important roles in the computer science fields. However, there is no unified and effective method for ontology modeling until now. This paper presents a novel method for domain ontology modeling. Firstly, all kinds of ontology models are translated into ontology model described in Description Logics (DLs). Subsequently, erroneous information is fed back through reasoning on ontology in DLs. Finally, developers can amend ontology according to the feedback information. This process is repeated until the inconsistency of ontology is eliminated. Consequently, the above-mentioned methodology improves the accuracy and efficiency of domain ontology modeling. A concrete instance evidently demonstrates the effectiveness of research.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research of Enterprise Competition Information Intelligent Collecting System Based on Rough Set 基于粗糙集的企业竞争信息智能采集系统研究
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.348
Yang Kefei, Pan Yu, Huliang Bin, Pan Fang
{"title":"Research of Enterprise Competition Information Intelligent Collecting System Based on Rough Set","authors":"Yang Kefei, Pan Yu, Huliang Bin, Pan Fang","doi":"10.1109/WCSE.2009.348","DOIUrl":"https://doi.org/10.1109/WCSE.2009.348","url":null,"abstract":"According to the characteristics of incompleteness, contradictory and extensiveness of the enterprise competition information, rough set theory is used to guide the crawling of web spider, the gathering efficiency of enterprise completion collection is improved by similarity class expansion and attributes reduction based on discrimination. The achievement of this research has already been applied to the practical construction of information management center of an enterprise so as to offer strategic basis for operation decision of the enterprise.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123945647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NC-ERP Rapid Implementation in Sichuan Post-earthquake for Relief Material Management NC-ERP在四川地震后救灾物资管理中的快速实施
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.84
Wang Huifen, Cui. Lei
{"title":"NC-ERP Rapid Implementation in Sichuan Post-earthquake for Relief Material Management","authors":"Wang Huifen, Cui. Lei","doi":"10.1109/WCSE.2009.84","DOIUrl":"https://doi.org/10.1109/WCSE.2009.84","url":null,"abstract":"In earthquake relief, the broad effects of humanitarian relief include delivery medical material to victims. Scientific relief need quick response of logistics supply chain, which include tracking situational urgency at various locations such as lack of food and medical supplies. The paper introduced the rapid adoption of NC-ERP in Sichuan post-earthquake which was donated by UFIDA. With the rapid implementation methodology and emergency response management, Sichuan Ministry of Health had adopted the donated ERP suite named NC in 10 days. The key success factors of ERP in emergence response and under high risk are support of CEO, construction of project team and rapid involvement of technical consultants which are helpful to solve issues inherent in disaster response collaboration.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123961945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloning and Bioinformatics Analysis of an Endoglucanase 2 from Trichoderma reesei 里氏木霉内切葡聚糖酶2的克隆及生物信息学分析
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.175
Yanling Yang, Lihua Liu, Miao Diao, Zhiwei Lin, Wunian Guo, Shihua Wang
{"title":"Cloning and Bioinformatics Analysis of an Endoglucanase 2 from Trichoderma reesei","authors":"Yanling Yang, Lihua Liu, Miao Diao, Zhiwei Lin, Wunian Guo, Shihua Wang","doi":"10.1109/WCSE.2009.175","DOIUrl":"https://doi.org/10.1109/WCSE.2009.175","url":null,"abstract":"Trichoderma reesei CBS368, a strong endoglucanase 2 (EG 2) producing strain, was isolated in our laboratory. The DNA fragment encoding the EG 2 was cloned in pMD18-T and sequenced. In order to achieve its expression, the vector pET28a (+) and pET32a (+) were used as expression vector, and the recombinant EG 2 was successfully expressed in E. coli BL21 (DE3). Bioinformatic analysis was conducted using some online or offline services.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Optimization of Cooperative Bacterial Foraging 细菌协同觅食的优化研究
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.195
Y. Shao, Hanning Chen
{"title":"The Optimization of Cooperative Bacterial Foraging","authors":"Y. Shao, Hanning Chen","doi":"10.1109/WCSE.2009.195","DOIUrl":"https://doi.org/10.1109/WCSE.2009.195","url":null,"abstract":"Bacterial Foraging Optimization (BFO) is a novel optimization algorithm based on the social foraging behavior of E. coli bacteria. This paper presents a variation on the original BFO algorithm, namely the Cooperative Bacterial Foraging Optimization (CBFO), which significantly improve the original BFO in solving complex optimization problems. This significant improvement is achieved by applying two cooperative approaches to the original BFO, namely the serial heterogeneous cooperation on the implicit space decomposition level and the serial heterogeneous cooperation on the hybrid space decomposition level.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124712935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Model of Service Behavior Based on Petri Nets with Weights 基于权值Petri网的服务行为模型
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.421
Yanbin Peng, Zhijun Zheng, Jian Xiang, Ji Gao, Jie-Qing Ai, Zhenyu Lu, Xueqin Jiang
{"title":"A Model of Service Behavior Based on Petri Nets with Weights","authors":"Yanbin Peng, Zhijun Zheng, Jian Xiang, Ji Gao, Jie-Qing Ai, Zhenyu Lu, Xueqin Jiang","doi":"10.1109/WCSE.2009.421","DOIUrl":"https://doi.org/10.1109/WCSE.2009.421","url":null,"abstract":"Service composition technology promises a new solution to an age-old problem: how to implement complex, large scale, cross-enterprise business application. However, we must ensure the compatibility between component services in composite service. Current research works in this field only concern semantics compatibility of service interface, yet ignoring the compatibility of service behavior. Therefore, this paper proposes a model of service behavior based on Petri-nets with weight. Based on the novel model, a method is proposed to verify and compute service behavior compatibility.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124854820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Application of Fuzzy Comprehensive Evaluation to Quantify Design Space 模糊综合评价在设计空间量化中的应用
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.48
Yuping She
{"title":"The Application of Fuzzy Comprehensive Evaluation to Quantify Design Space","authors":"Yuping She","doi":"10.1109/WCSE.2009.48","DOIUrl":"https://doi.org/10.1109/WCSE.2009.48","url":null,"abstract":"During the conceptual phase of a building design, major design space decisions that have the greatest influence on build ability of a project are taken. Quality function deployment (QFD) is an integrated decision-making methodology that can assure and improve the alignment of elements of design and construction processes with the requirements customers. Taking the existence of uncertainty in the early design into account, we present a fuzzy comprehensive evaluation-based approach to quantify design space, and using degree of similarity (or measure of similarity) and principle of choosing nearest (or principle of selecting near) to choose the best design from the alternatives at the early phase of design.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Determination of Branch Correlations in Software Testing 软件测试中分支相关性的自动确定
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.328
D. Gong, Xiangjuan Yao, Min Xia
{"title":"Automatic Determination of Branch Correlations in Software Testing","authors":"D. Gong, Xiangjuan Yao, Min Xia","doi":"10.1109/WCSE.2009.328","DOIUrl":"https://doi.org/10.1109/WCSE.2009.328","url":null,"abstract":"Path-oriented testing is an important aspect of software testing. A challenging problem with path-oriented test data generation is the existence of infeasible paths. Timely detecting these infeasible paths can not only save test sources but also improve test efficiency. It is an effective method to detect infeasible paths by branch correlations. In this paper, we propose a method to automatically determine branch correlations in software testing. Firstly, we give a theorem to determine the true-true correlation, true-false correlation, false-true correlation, and false-false correlation based on the probabilities of the conditional distribution corresponding to different branches’ outcome (i.e. true or false). We then estimate these values of the probabilities by the maximum likelihood estimation. Finally, we apply the proposed method to determine the branch correlations of two typical programs, and the results show that the proposed method can accurately determine the branch correlations of different conditional statements. Our achievement provides an effective and automatic method to detect infeasible paths, which has great significance in improving the efficiency of software testing.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Security Check in Visual Studio C/C++ Compiler 增强Visual Studio C/ c++编译器的安全检查
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.44
Yongdong Wu
{"title":"Enhancing Security Check in Visual Studio C/C++ Compiler","authors":"Yongdong Wu","doi":"10.1109/WCSE.2009.44","DOIUrl":"https://doi.org/10.1109/WCSE.2009.44","url":null,"abstract":"Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"24 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Recognition of Human Actions Using Motion Capture Data and Support Vector Machine 基于动作捕捉数据和支持向量机的人体动作识别
2009 WRI World Congress on Software Engineering Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.354
Jung-Ying Wang, Hahn-Ming Lee
{"title":"Recognition of Human Actions Using Motion Capture Data and Support Vector Machine","authors":"Jung-Ying Wang, Hahn-Ming Lee","doi":"10.1109/WCSE.2009.354","DOIUrl":"https://doi.org/10.1109/WCSE.2009.354","url":null,"abstract":"This paper presents a human action recognition system based on motion capture features and support vector machine (SVM). We use 43 optical markers distributing on body and extremities to track the movement of human actions. In our system 21 different types of action are recognized. Applying SVM for the recognition of human action the overall prediction accuracy achieves to 84.1% when using the three-fold cross validation on the training set. Another purpose of this study is to find out which skeleton points are important for human action recognition. The experimental results show that the skeleton points of head, hands and feet are the most important features for recognition of human actions.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127871005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信