2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)最新文献

筛选
英文 中文
Formal verification of security protocols using Spin 使用Spin对安全协议进行正式验证
Shengbo Chen, Hao Fu, Huai-kou Miao
{"title":"Formal verification of security protocols using Spin","authors":"Shengbo Chen, Hao Fu, Huai-kou Miao","doi":"10.1109/ICIS.2016.7550830","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550830","url":null,"abstract":"Security protocols are the key to ensure network security. In the context of the state of the art, so many methods have been developed to analyze the security properties of security protocols, such as Ban logic, theorem proving and model checking etc. This paper used model checking method to formally verify security protocols because of its high degree of automation, briefness and effectiveness. The model checker Spin with sound algorithm design has an extraordinary ability of checking and a good support for LTL. This paper studied the use of Spin on security protocols, and proposed a more effective intruder model to formally verify the security properties of security protocols, such as authentication. The method in this paper decreased the number of model states by a wide margin, and avoided the state space explosion effectively. This paper exampled NSPK protocol and DS protocol, and good experimental results were shown.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Model-driven approach for self-aware pervasive systems 自我意识普及系统的模型驱动方法
Eva Gerbert-Gaillard, Stéphanie Chollet, P. Lalanda
{"title":"Model-driven approach for self-aware pervasive systems","authors":"Eva Gerbert-Gaillard, Stéphanie Chollet, P. Lalanda","doi":"10.1109/ICIS.2016.7550870","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550870","url":null,"abstract":"Pervasive computing vision considers the growing concentration of small computers merged into everyday objects to enhance environment with added-value services. In this vision computing systems are numerous, heterogeneous, and dynamic, yet seamlessly integrated. The complexity of pervasive environments can lead to conflicts between systems, but it can also be a strength if systems manage to collaborate. They need to understand and reason about their objectives, capabilities and environment. This paper investigates the definition and the relevancy of self-awareness for leveraging collaboration in pervasive environment, with a model-driven approach.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verifying OSEK/VDX applications: An optimized SMT-based bounded model checking approach 验证OSEK/VDX应用程序:优化的基于smt的有界模型检查方法
Haitao Zhang, Zhuo Cheng, Cong Tian, Y. Lu, Guoqiang Li
{"title":"Verifying OSEK/VDX applications: An optimized SMT-based bounded model checking approach","authors":"Haitao Zhang, Zhuo Cheng, Cong Tian, Y. Lu, Guoqiang Li","doi":"10.1109/ICIS.2016.7550826","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550826","url":null,"abstract":"OSEK/VDX, a standard of automobile OS, has been widely adopted by many manufacturers to design and implement a vehicle-mounted OS. Currently, with increasing functionalities in vehicles, more and more complex applications are developed based on the OSEK/VDX OS. However, how to ensure the reliability of developed applications is becoming a challenge for developers. Based on our previous work, in this paper we present an efficient approach to verify the developed OSEK/VDX applications. In the presented approach, SMT-based bounded model checking technique is used to carry out verification in order to handle complex applications. Moreover, a series of optimization strategies are proposed and employed to improve the checking capability of our approach. We have implemented a tool according to the proposed approach and conducted many experiments. The experiment results show that our approach is capable of checking the safety property of large-scale OSEK/VDX applications. We also compared our approach with existing checking method, the comparison results indicate that our approach is an efficient and powerful technique in verifying OSEK/VDX applications.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124558329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new chaos-based image cipher using a hash function 使用哈希函数的新的基于混沌的图像密码
Chong Fu, O. Bian, Hui-yan Jiang, L. Ge, Hong-feng Ma
{"title":"A new chaos-based image cipher using a hash function","authors":"Chong Fu, O. Bian, Hui-yan Jiang, L. Ge, Hong-feng Ma","doi":"10.1109/ICIS.2016.7550789","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550789","url":null,"abstract":"This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined by the Murmur2 hash value of the original image. Owing to the avalanche property of hash functions, completely different shuffled images will be produced even if there is a tiny difference between the original ones, and it helps accelerate the diffusion process. Experimental results indicate that the proposed scheme requires only one and two cipher cycles to achieve an acceptable and a satisfactory diffusion properties, respectively, whereas two and three cipher cycles are needed by typical schemes to achieve the same properties. Thorough security analysis is carried out, and the results demonstrate the satisfactory security of the proposed scheme.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Toward connected personal healthcare: Keynote address 迈向互联个人医疗:主题演讲
Yeong-Tae Song
{"title":"Toward connected personal healthcare: Keynote address","authors":"Yeong-Tae Song","doi":"10.1109/ICIS.2016.7550724","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550724","url":null,"abstract":"Modern healthcare systems are still struggling to provide patient-centered healthcare instead of clinician-centered, as it is essential to implement major aspects of modern healthcare such as continuity of care, evidence-based treatment and more importantly preventing medical mistakes. In order to implement patient-centered, it is necessary to collect all the relevant clinical /non-clinical data for each patient and make those available at the time of needs. However, such task requires lots of personal effort and the coordination from the care givers so it is not being done properly. In this talk, Ill present medical sensor and cloud based personal clinical data collection, analysis, and patient education based on the collected data. The collection of such clinical data will be stored in the personal health record system and make it available for query and update so it can be helpful in making important medical decisions. Ill also discuss about the barriers in personal health record adoption and how to lift such barriers so patient-centered healthcare may be possible.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131888017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model-driven development of web applications using AngularJS framework 一个使用AngularJS框架的模型驱动的web应用开发
Wutthichai Chansuwath, T. Senivongse
{"title":"A model-driven development of web applications using AngularJS framework","authors":"Wutthichai Chansuwath, T. Senivongse","doi":"10.1109/ICIS.2016.7550838","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550838","url":null,"abstract":"AngularJS is one of the widely used frameworks for modern single-page web application development which is designed to support dynamic views in the applications. To further assist AngularJS developers, this research proposes how the concept of model-driven development can be applied to AngularJS-based development. We propose a UML profile for AngularJS for building a model of an AngularJS web application, and a set of transformations that transform the model into a code template. The developer can then fill in the template to make a complete workable web application. Also, a transformation tool is developed to assist in constructing the code template. Using a case study application, the evaluation in terms of transformation rate shows that the automatically generated code covers 87% of the complete code of the case study, which means it could greatly help reduce development time.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131551662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Indoor environment sensing service in smart city using autonomous sensor box 基于自主传感器箱的智慧城市室内环境传感服务
Seiji Sakakibara, S. Saiki, Masahide Nakamura, S. Matsumoto
{"title":"Indoor environment sensing service in smart city using autonomous sensor box","authors":"Seiji Sakakibara, S. Saiki, Masahide Nakamura, S. Matsumoto","doi":"10.1109/ICIS.2016.7550871","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550871","url":null,"abstract":"To realize indoor environmental sensing, which is a key technology of providing smart services in smart city, with low cost, our research group has proposed a small IoT device named sensor box. In the previous sensor box, however, it is difficult to deploy for the smart city with some problems. In this paper, we propose an indoor environment sensing service using autonomous sensor box to adapt the previous sensor box for the smart city. To confirm the effectiveness of proposed service, we deploy autonomous sensor boxes on practical indoor environments.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"58 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
New fault tolerant strategy of wireless sensor network 无线传感器网络容错新策略
Afef Ghabri, Leila Horchani, Monia Bellalouna
{"title":"New fault tolerant strategy of wireless sensor network","authors":"Afef Ghabri, Leila Horchani, Monia Bellalouna","doi":"10.1109/ICIS.2016.7550733","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550733","url":null,"abstract":"The wireless sensor network is enormously used in a random way in different environments to execute diverse applications and tasks. Because of its sensitivity, various research projects have been conducted with the aim of finding solutions in the presence of failures. New versions of K-means And Traveling Salesman Problem based mobility protocol, based on K-means clustering and the approximate solution for Traveling Salesman Problem by using the simple local search algorithm “2-Opt”, have been proposed in order to obtain real time solutions once the problem is disturbed by the breakdowns of some nodes. In this paper, we aim to use a new strategy by implementing algorithms employed for probabilistic combinatorial optimization problems resolution, such as exact methods. We propose then a new strategy that navigates the mobile sink to go through the cluster centers according to the optimized path by the implementation of an exact resolution of this problem using the “branch and bound” technique. Simulation results have demonstrated that although this exact solution is very expensive, it can be so interesting when the risk of sensor breakdowns becomes considerable and the number of cluster centers will be reduced, and that it outperforms the original solution of K-means And Traveling Salesman Problem based mobility protocol in terms of quality despite the increase in complexity.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132266428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Refinement from service economics planning to ubiquitous services implementation 从服务经济规划到无处不在的服务实现的细化
Yucong Duan, Q. Duan, Gongzhu Hu, Xiaobing Sun
{"title":"Refinement from service economics planning to ubiquitous services implementation","authors":"Yucong Duan, Q. Duan, Gongzhu Hu, Xiaobing Sun","doi":"10.1109/ICIS.2016.7550909","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550909","url":null,"abstract":"Service Economics has been successfully proposed and implemented for promoting the macro service market especially in Global value chains which however does not provide guidance and integrate directly with the IT side implementation. Therefore there leaves a gap of the refinement from the strategic business planning to ubiquitous services implementation in the API (Application Program Interface) economy. Recently Gio Wiederhold attributed this gap to the knowledge difference between economists and the IT professionals and proposed to solve it from the IT side. As an instance of this guidance in the practice of Value Driven Design, we proposed a systemic formalization from the value calculation to the design quality measurement which binds the modification and change on the design artifacts with the business value strategy through a framework of managed quality properties in a service design process.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132336717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effective algorithms for video shot and scene boundaries detection 视频镜头和场景边界检测的有效算法
Yi Huo, Yanfeng Wang, Haihe Hu
{"title":"Effective algorithms for video shot and scene boundaries detection","authors":"Yi Huo, Yanfeng Wang, Haihe Hu","doi":"10.1109/ICIS.2016.7550913","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550913","url":null,"abstract":"Video cataloging is the main technology of video management and reuse. It helps to quickly and accurately query tapes or films and improves work efficiency greatly. However, current cataloging is performed manually because existing computer-aided cataloging system can't achieve expected accuracy and speed. In this paper, it proposes an algorithm to control video structure analysis process cleverly. For video shot boundary detection, it put forwards Poisson model based inter-frame difference histogram to generate threshold. For video scene boundary detection, it raises variable-length sliding window to control detection process. It dynamically adjusts the length of sliding window to avoid too much or too little scene segmentations. Experiments for video shot and scene boundary detection show its efficiency in increasing detection accuracy.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信