{"title":"Adaptive random testing with CG constraint","authors":"F. Chan, K. P. Chan, T. Chen, S. Yiu","doi":"10.1109/CMPSAC.2004.1342685","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342685","url":null,"abstract":"We introduce a C.G. constraint on adaptive random testing (ART) for programs with numerical input. One rationale behind adaptive random testing is to have the test candidates to be as widespread over the input domain as possible. However, the computation may be quite expensive in some cases. The C.G. constraint is introduced to maintain the widespreadness while reducing the computation requirement in terms of number of distance measures. Three variations of C.G. constraints and their performance when compared with ART are discussed.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134236591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing curriculum - software engineering: its impacts on professional software engineering education","authors":"T. H. Tse","doi":"10.1109/CMPSAC.2004.1342824","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342824","url":null,"abstract":"The Software Engineering volume by the IEEE Computer Society/ACM Joint Task Force on Computing Curricula, otherwise known as the Computing Curriculum - Software Engineering (CCSE), has been finalized and approved. This work comments on the impacts of the volume on professional software engineering education.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient distributed intrusion detection scheme","authors":"Thomas Holz","doi":"10.1109/CMPSAC.2004.1342666","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342666","url":null,"abstract":"In general, intrusion detection systems are accurate and comfortable instruments for securing computer and network resources. But one of the great unsolved problems of deploying such systems in real-life environments is the low efficiency, especially in the context of applying the host-based attack identification paradigm. In this paper, a new approach for overcoming the efficiency problem is presented: HEIDI (high-efficient intrusion detection infrastructure). By this approach, flexible and efficiency-oriented modules and mechanisms are combined to obtain a distributed intrusion detection scheme.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure and fully private borda voting protocol with universal verifiability","authors":"Changjie Wang, Ho-fung Leung","doi":"10.1109/CMPSAC.2004.1342832","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342832","url":null,"abstract":"Extensive studies have been made on electronic voting in the last twenty years, and many schemes have been proposed, in which both security and effectiveness have been improved. However, most available secure vote schemes mainly focused on the simple \"one man, one vote\" plurality protocol. In this paper, we address the security issues of the Borda voting protocol, another important social decision protocol, in which a voter can rank the candidates by assigning them different points. In this paper, we propose a secure Borda voting scheme that guarantees full privacy protection of the voters as well as universal verifiability and weak robustness. Instead of assuming existence of trusted or semi-trusted authorities as in other secure voting schemes, we employ homomorphic ElGamal encryption in our scheme and distribute the private key among all voters to achieve full privacy protection of voters. In such a way, all voters jointly compute the outcome of the election without revealing any further information of voters' individual preferences. An analysis of the protocol against the security requirements shows that the new protocol achieves full privacy protection, public verifiability, weak robustness, in addition to others addressed by other protocols reported in the literature","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A view-based control flow metric","authors":"S. Gossens, M. D. Cin","doi":"10.1109/CMPSAC.2004.1342661","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342661","url":null,"abstract":"We present a new metric for control flow path sets based on a control flow abstraction technique and evaluate the concept in a study of a large set of artificially generated programs, using a special model of fault detection ability.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of software defects fix effort using neural networks","authors":"Hui Zeng, D. Rine","doi":"10.1109/CMPSAC.2004.1342658","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342658","url":null,"abstract":"Software defects fix effort is an important software development process metric that plays a critical role in software quality assurance. People usually like to apply parametric effort estimation techniques using historical lines of code and function points data to estimate effort of defects fixes. However, these techniques are neither efficient nor effective for a new different kind of project's fixing defects when code will be written within the context of a different project or organization. In this paper, we present a solution for estimating software defect fix effort using self-organizing neural networks.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuk Ying Chung, Yong Sun, Penghao Wang, Xiaoming Chen
{"title":"A new e-shopping system using high performance custom computers","authors":"Yuk Ying Chung, Yong Sun, Penghao Wang, Xiaoming Chen","doi":"10.1109/CMPSAC.2004.1342673","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342673","url":null,"abstract":"The current e-shopping systems only provide the pictures and price lists of all items for shoppers to browse and make the purchase request through Internet. This kind of shopping is very boring and the shoppers cannot enjoy it. In this project, we propose a new concept of e-shopping that provides customers the perception of physical shopping. The e-shop will be constructed directly from and coexisted with a physical shop. Customers can navigate in a physical shop rather than only browse pictures and price lists. Customers will perceive the presence of other shoppers around and have the feeling of inside the physical shop without physically presence in a shop. This new e-shopping system can allow multiple customers's to navigate within the physical shop, to select goods and make their requests to buy them.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128519241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hai Jin, Hanhua Chen, Jing Chen, Ping Kuang, Li Qi, Deqing Zou
{"title":"Real-time strategy and practice in service grid","authors":"Hai Jin, Hanhua Chen, Jing Chen, Ping Kuang, Li Qi, Deqing Zou","doi":"10.1109/CMPSAC.2004.1342821","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342821","url":null,"abstract":"The emerging service grids bring together various distributed application-level services to a 'market' for clients to request and enable the integration of services across distributed, heterogeneous, dynamic virtual organizations. However, there are a number of applications with the requirement of time constraints. We propose a real-time strategy in service grid architecture. We also extend the OGSI grid service semantics for fault-tolerance. The real-time and fault-tolerant strategies seem efficient through experiments","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Services-oriented dynamic reconfiguration framework for dependable distributed computing","authors":"W. Tsai, Weiwei Song, R. Paul, Z. Cao, H. Huang","doi":"10.1109/CMPSAC.2004.1342894","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342894","url":null,"abstract":"Recently service-oriented architecture (SOA) has received significant attention and one reason is that it is potentially survivable as services are located, bound, and executed at runtime over the Internet. However, this is not enough for dependable computing because the system must also be able to reconfigure once a system failure or overload is detected, and this reconfiguration must be done in real-time at runtime with minimum disruption to the current operation. This work presents reconfiguration requirements for building dependable SOA, and proposes a dynamic reconfiguration framework based on distributed monitoring, synchronization, and runtime verification with distributed agents.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chin-Yu Huang, Chu-Ti Lin, S. Kuo, Michael R. Lyu, C. Sue
{"title":"Software reliability growth models incorporating fault dependency with various debugging time lags","authors":"Chin-Yu Huang, Chu-Ti Lin, S. Kuo, Michael R. Lyu, C. Sue","doi":"10.1109/CMPSAC.2004.1342826","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342826","url":null,"abstract":"Software reliability is defined as the probability of failure-free software operation for a specified period of time in a specified environment. Over the past 30 years, many software reliability growth models (SRGMs) have been proposed and most SRGMs assume that detected faults are immediately corrected. Actually, this assumption may not be realistic in practice. In this paper we first give a review of fault detection and correction processes in software reliability modeling. Furthermore, we show how several existing SRGMs based on NHPP models can be derived by applying the time-dependent delay function. On the other hand, it is generally observed that mutually independent software faults are on different program paths. Sometimes mutually dependent faults can be removed if and only if the leading faults were removed. Therefore, here we incorporate the ideas of fault dependency and time-dependent delay function into software reliability growth modeling. Some new SRGMs are proposed and several numerical examples are included to illustrate the results. Experimental results show that the proposed framework to incorporate both fault dependency and time-dependent delay function for SRGMs has a fairly accurate prediction capability","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}