Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.最新文献

筛选
英文 中文
Adaptive random testing with CG constraint 具有CG约束的自适应随机测试
F. Chan, K. P. Chan, T. Chen, S. Yiu
{"title":"Adaptive random testing with CG constraint","authors":"F. Chan, K. P. Chan, T. Chen, S. Yiu","doi":"10.1109/CMPSAC.2004.1342685","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342685","url":null,"abstract":"We introduce a C.G. constraint on adaptive random testing (ART) for programs with numerical input. One rationale behind adaptive random testing is to have the test candidates to be as widespread over the input domain as possible. However, the computation may be quite expensive in some cases. The C.G. constraint is introduced to maintain the widespreadness while reducing the computation requirement in terms of number of distance measures. Three variations of C.G. constraints and their performance when compared with ART are discussed.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134236591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Computing curriculum - software engineering: its impacts on professional software engineering education 计算机课程-软件工程:对软件工程专业教育的影响
T. H. Tse
{"title":"Computing curriculum - software engineering: its impacts on professional software engineering education","authors":"T. H. Tse","doi":"10.1109/CMPSAC.2004.1342824","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342824","url":null,"abstract":"The Software Engineering volume by the IEEE Computer Society/ACM Joint Task Force on Computing Curricula, otherwise known as the Computing Curriculum - Software Engineering (CCSE), has been finalized and approved. This work comments on the impacts of the volume on professional software engineering education.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient distributed intrusion detection scheme 一种高效的分布式入侵检测方案
Thomas Holz
{"title":"An efficient distributed intrusion detection scheme","authors":"Thomas Holz","doi":"10.1109/CMPSAC.2004.1342666","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342666","url":null,"abstract":"In general, intrusion detection systems are accurate and comfortable instruments for securing computer and network resources. But one of the great unsolved problems of deploying such systems in real-life environments is the low efficiency, especially in the context of applying the host-based attack identification paradigm. In this paper, a new approach for overcoming the efficiency problem is presented: HEIDI (high-efficient intrusion detection infrastructure). By this approach, flexible and efficiency-oriented modules and mechanisms are combined to obtain a distributed intrusion detection scheme.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A secure and fully private borda voting protocol with universal verifiability 具有普遍可验证性的安全且完全私有的边界投票协议
Changjie Wang, Ho-fung Leung
{"title":"A secure and fully private borda voting protocol with universal verifiability","authors":"Changjie Wang, Ho-fung Leung","doi":"10.1109/CMPSAC.2004.1342832","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342832","url":null,"abstract":"Extensive studies have been made on electronic voting in the last twenty years, and many schemes have been proposed, in which both security and effectiveness have been improved. However, most available secure vote schemes mainly focused on the simple \"one man, one vote\" plurality protocol. In this paper, we address the security issues of the Borda voting protocol, another important social decision protocol, in which a voter can rank the candidates by assigning them different points. In this paper, we propose a secure Borda voting scheme that guarantees full privacy protection of the voters as well as universal verifiability and weak robustness. Instead of assuming existence of trusted or semi-trusted authorities as in other secure voting schemes, we employ homomorphic ElGamal encryption in our scheme and distribute the private key among all voters to achieve full privacy protection of voters. In such a way, all voters jointly compute the outcome of the election without revealing any further information of voters' individual preferences. An analysis of the protocol against the security requirements shows that the new protocol achieves full privacy protection, public verifiability, weak robustness, in addition to others addressed by other protocols reported in the literature","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A view-based control flow metric 基于视图的控制流度量
S. Gossens, M. D. Cin
{"title":"A view-based control flow metric","authors":"S. Gossens, M. D. Cin","doi":"10.1109/CMPSAC.2004.1342661","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342661","url":null,"abstract":"We present a new metric for control flow path sets based on a control flow abstraction technique and evaluate the concept in a study of a large set of artificially generated programs, using a special model of fault detection ability.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimation of software defects fix effort using neural networks 用神经网络估计软件缺陷修复的工作量
Hui Zeng, D. Rine
{"title":"Estimation of software defects fix effort using neural networks","authors":"Hui Zeng, D. Rine","doi":"10.1109/CMPSAC.2004.1342658","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342658","url":null,"abstract":"Software defects fix effort is an important software development process metric that plays a critical role in software quality assurance. People usually like to apply parametric effort estimation techniques using historical lines of code and function points data to estimate effort of defects fixes. However, these techniques are neither efficient nor effective for a new different kind of project's fixing defects when code will be written within the context of a different project or organization. In this paper, we present a solution for estimating software defect fix effort using self-organizing neural networks.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A new e-shopping system using high performance custom computers 使用高性能定制计算机的新型电子购物系统
Yuk Ying Chung, Yong Sun, Penghao Wang, Xiaoming Chen
{"title":"A new e-shopping system using high performance custom computers","authors":"Yuk Ying Chung, Yong Sun, Penghao Wang, Xiaoming Chen","doi":"10.1109/CMPSAC.2004.1342673","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342673","url":null,"abstract":"The current e-shopping systems only provide the pictures and price lists of all items for shoppers to browse and make the purchase request through Internet. This kind of shopping is very boring and the shoppers cannot enjoy it. In this project, we propose a new concept of e-shopping that provides customers the perception of physical shopping. The e-shop will be constructed directly from and coexisted with a physical shop. Customers can navigate in a physical shop rather than only browse pictures and price lists. Customers will perceive the presence of other shoppers around and have the feeling of inside the physical shop without physically presence in a shop. This new e-shopping system can allow multiple customers's to navigate within the physical shop, to select goods and make their requests to buy them.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128519241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time strategy and practice in service grid 服务网格的实时策略与实践
Hai Jin, Hanhua Chen, Jing Chen, Ping Kuang, Li Qi, Deqing Zou
{"title":"Real-time strategy and practice in service grid","authors":"Hai Jin, Hanhua Chen, Jing Chen, Ping Kuang, Li Qi, Deqing Zou","doi":"10.1109/CMPSAC.2004.1342821","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342821","url":null,"abstract":"The emerging service grids bring together various distributed application-level services to a 'market' for clients to request and enable the integration of services across distributed, heterogeneous, dynamic virtual organizations. However, there are a number of applications with the requirement of time constraints. We propose a real-time strategy in service grid architecture. We also extend the OGSI grid service semantics for fault-tolerance. The real-time and fault-tolerant strategies seem efficient through experiments","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Services-oriented dynamic reconfiguration framework for dependable distributed computing 面向服务的可靠分布式计算动态重构框架
W. Tsai, Weiwei Song, R. Paul, Z. Cao, H. Huang
{"title":"Services-oriented dynamic reconfiguration framework for dependable distributed computing","authors":"W. Tsai, Weiwei Song, R. Paul, Z. Cao, H. Huang","doi":"10.1109/CMPSAC.2004.1342894","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342894","url":null,"abstract":"Recently service-oriented architecture (SOA) has received significant attention and one reason is that it is potentially survivable as services are located, bound, and executed at runtime over the Internet. However, this is not enough for dependable computing because the system must also be able to reconfigure once a system failure or overload is detected, and this reconfiguration must be done in real-time at runtime with minimum disruption to the current operation. This work presents reconfiguration requirements for building dependable SOA, and proposes a dynamic reconfiguration framework based on distributed monitoring, synchronization, and runtime verification with distributed agents.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Software reliability growth models incorporating fault dependency with various debugging time lags 包含故障依赖和各种调试滞后时间的软件可靠性增长模型
Chin-Yu Huang, Chu-Ti Lin, S. Kuo, Michael R. Lyu, C. Sue
{"title":"Software reliability growth models incorporating fault dependency with various debugging time lags","authors":"Chin-Yu Huang, Chu-Ti Lin, S. Kuo, Michael R. Lyu, C. Sue","doi":"10.1109/CMPSAC.2004.1342826","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342826","url":null,"abstract":"Software reliability is defined as the probability of failure-free software operation for a specified period of time in a specified environment. Over the past 30 years, many software reliability growth models (SRGMs) have been proposed and most SRGMs assume that detected faults are immediately corrected. Actually, this assumption may not be realistic in practice. In this paper we first give a review of fault detection and correction processes in software reliability modeling. Furthermore, we show how several existing SRGMs based on NHPP models can be derived by applying the time-dependent delay function. On the other hand, it is generally observed that mutually independent software faults are on different program paths. Sometimes mutually dependent faults can be removed if and only if the leading faults were removed. Therefore, here we incorporate the ideas of fault dependency and time-dependent delay function into software reliability growth modeling. Some new SRGMs are proposed and several numerical examples are included to illustrate the results. Experimental results show that the proposed framework to incorporate both fault dependency and time-dependent delay function for SRGMs has a fairly accurate prediction capability","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信