Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.最新文献

筛选
英文 中文
Study on performance of IP-SWAN based on distributed NS-RAID 基于分布式NS-RAID的IP-SWAN性能研究
Baojiang Cui, Jun Liu, G. Wang, Jing Liu
{"title":"Study on performance of IP-SWAN based on distributed NS-RAID","authors":"Baojiang Cui, Jun Liu, G. Wang, Jing Liu","doi":"10.1109/CMPSAC.2004.1342896","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342896","url":null,"abstract":"Previous work on performance of network storage system has been mostly qualitative. This work proposes a quantitative analytical method based on closed queueing networks in order to analyze the performance bounds of IP-SWAN (storage wide area network) based on distributed network software RAID (NS-RAID). Experimental results show that testing results are within the bounds predicted by the performance analysis model and the bounds reflect the dynamic trend of the actual testing performance. Furthermore, the bottleneck and the potential bottleneck that affect the IP-SWAN performance can be derived from the performance analysis model. Meanwhile the model provides us with the criteria for distinguishing the key performance factors and non-key performance factors.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing context-sensitive middleware-based software applications 测试上下文敏感的基于中间件的软件应用程序
T. H. Tse, S. Yau, W. Chan, Heng Lu, T. Chen
{"title":"Testing context-sensitive middleware-based software applications","authors":"T. H. Tse, S. Yau, W. Chan, Heng Lu, T. Chen","doi":"10.1109/CMPSAC.2004.1342879","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342879","url":null,"abstract":"Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application. The components of such software communicate proactively among themselves according to the situational attributes of their environments, known as the \"contexts\". The actual process of accessing and updating the contexts lies with the middleware. The latter invokes the relevant local and remote operations whenever any context inscribed in the situation-aware interface is satisfied. Since the applications operate in a highly dynamic environment, the testing of context-sensitive software is challenging. Metamorphic testing is a property-based testing strategy. It recommends that, even if a test case does not reveal any failure, follow-up test cases should be further constructed from the original to check whether the software satisfies some necessary conditions of the problem to be implemented. This work proposes to use isotropic properties of contexts as metamorphic relations for testing context-sensitive software. For instance, distinct points on the same isotropic curve of contexts would entail comparable responses by the components. This notion of testing context relations is novel, robust, and intuitive to users.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
Self-adaptive software: cybernetic perspective and an application server supported framework 自适应软件:控制论的观点和应用服务器支持的框架
Junrong Shen, Qianxiang Wang, Hong Mei
{"title":"Self-adaptive software: cybernetic perspective and an application server supported framework","authors":"Junrong Shen, Qianxiang Wang, Hong Mei","doi":"10.1109/CMPSAC.2004.1342684","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342684","url":null,"abstract":"With emerging areas such as Web services, pervasive computing, wireless sensor networks and so on, self-adaptive software is becoming more and more important and topical. As a new emerging discipline, self-adaptive software has strong background in control theory. This work analyses the similarity between software self-adaptation technologies and control theory, and shows that self-adaptive software could be studied from software cybernetic perspective. Based on this standpoint, we also present three software adaptive models derived from open-loop control, feedback control and adaptive control. The application server based implementations of these three models are introduced.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"89 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113943930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Goal autonomous agent architecture 目标自主代理体系结构
Zhiqi Shen, R. Gay, Yuan Miao, C. Miao
{"title":"Goal autonomous agent architecture","authors":"Zhiqi Shen, R. Gay, Yuan Miao, C. Miao","doi":"10.1109/CMPSAC.2004.1342669","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342669","url":null,"abstract":"We present a goal autonomous agent model that supports both behavior autonomy and goal autonomy. Based on Goal Net, goal autonomous agents are not only able to choose the right action towards its current goal, but also able to reason the next goal to achieve towards its overall goal.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"54 7-8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Lessons learned from the practice of mobile health application development 从移动医疗应用程序开发实践中获得的经验教训
Robert Yu, Hui Yu
{"title":"Lessons learned from the practice of mobile health application development","authors":"Robert Yu, Hui Yu","doi":"10.1109/CMPSAC.2004.1342675","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342675","url":null,"abstract":"This fast abstract briefly discusses lessons learned in terms of how to overcome limitations of PDA devices, effectively capture requirements for mobile health application development and effectively reengineer a desktop application on PDA. The limitation of PDA devices includes: (1) small screen size, which limits text-based data entry, reporting and browsing; (2) limited storage space and slow processing, which requires effective and efficient coding generation; (3) security limitations and inadequate third party application support, which poses challenge for application development. The corresponding strategies addressing the above challenges are: (1) providing check box, radio button, drop down list, text field, combo box based data entry and minimize text-based data entry, such as text area; (2) allocating as much as possible data storage, communication and computation tasks to the desktop system and minimize the function PDA component needs to handle, store data in file instead of database on PDA; (3) carefully selecting the device and implementation platform that supports development. To maximize the usability of PDA-based health application, the solution to be implemented on PDA ideally should be data management tasks with minimum text-based data entry and high frequency of recording. Challenges and solutions for software reengineering from desktop system to PDA-based application is outlined based on one application developed for World Health Organisation. In this example, the complex task of communication among PDA-based application, desktop system and the existent desktop application EpiData is effectively handled through the utilisation of XML files. A dynamic tool 'Questionnaire Designer' provides a completely dynamic user interface generation tool that could easily be handled by end user. The design idea for this application sets up a model for mobile health application with adequate flexibility of handling changing data management needs of end users.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129153838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Web application bypass testing Web应用程序绕过测试
A. Offutt, Ye Wu, Xiaochen Du, Hong Huang
{"title":"Web application bypass testing","authors":"A. Offutt, Ye Wu, Xiaochen Du, Hong Huang","doi":"10.1109/CMPSAC.2004.1342687","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342687","url":null,"abstract":"Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and strings, check the length of strings, and to ensure that strings do not contain invalid characters. Input validation testing (IVT) is particularly important for software that has a heavy reliance on user inputs, including Web applications. A common technique in Web applications is to perform input validation on the client by using HTML attributes and scripting languages such as JavaScript. An insidious problem with performing input validation on the client is that end users have the ability to bypass this validation. Bypass testing is a unique and novel way to create test cases that is available only because of the unusual mix of client-server, HTML GUI, and JavaScript technologies that are used in Web applications. This workshop paper presents the issues and concerns that allow bypass testing, the preliminary concepts behind the technique, and some early results on applying it. How effective and useful bypass testing can be in testing Web applications is determined through ongoing research and automation.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131582967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A decision-making model for intelligent agent with internal state 具有内部状态的智能体决策模型
Shan-li Hu, Hai-Yan Wu
{"title":"A decision-making model for intelligent agent with internal state","authors":"Shan-li Hu, Hai-Yan Wu","doi":"10.1109/CMPSAC.2004.1342668","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342668","url":null,"abstract":"Russell and Subramanian considered decision-making model of agent as an function, which maps environment sequence or percept to action. This depiction can't represent the effects of internal state of intelligent agent to action selection. Wooldridge considered internal state as basic condition of representing an intelligent agent. But in his decision-making model, action can affect internal state merely through changing environment. Thus, the internal state isn't suitable for including mental state of intelligent agents. Therefore, We put forward two decision-making models for intelligent agents with internal state. In these two models, the action of agents not only can affect environment, then affect the internal state of agents through the percept of environment, but also can directly affect the internal state itself. This depiction of internal state is fit to include the mental state of agent, thus provide a suitable model for the decision-making of intelligent agents.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spatiotemporal helixes for modeling environmental data 用于环境数据建模的时空螺旋
Kristin Eickhorst, A. Croitoru, P. Agouris, A. Stefanidis
{"title":"Spatiotemporal helixes for modeling environmental data","authors":"Kristin Eickhorst, A. Croitoru, P. Agouris, A. Stefanidis","doi":"10.1109/CMPSAC.2004.1342696","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342696","url":null,"abstract":"Spatiotemporal helixes are a new method for modeling the changes an object experiences over time. They have the potential to be used as a predictive tool for geographical and biological applications. We present the formal foundations of these helixes and include experiments to demonstrate their usefulness when data collection is not optimal, such as when noise is present or when there is more than one object of interest present in a single video stream.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a CIL connector to SPIN 一种用于SPIN的CIL连接器的设计
Yongjian Li, Rui Xue
{"title":"Design of a CIL connector to SPIN","authors":"Yongjian Li, Rui Xue","doi":"10.1142/S0218194008003568","DOIUrl":"https://doi.org/10.1142/S0218194008003568","url":null,"abstract":"The CAPSL Integrated Protocol Environment effort aims at providing an intuitive and expressive language for specifying authentication and key distribution protocols and supporting interfaces to various analysis tools. The CAPSL Intermediate Language CIL has been designed with the emphasis on simplifying translators from CIL to other analysis tools. In this paper we describe the design of a CIL-to-Spin connector. We describe how CIL concepts are translated into Spin and propose a general method to model the behaviors of honest principals and the intruder. Based on the method, a prototype connector has been implemented in Gentle, which can automatically translate CIL specification to promela code and LTL formula, thus greatly simplifying the modelling and analysis process","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123598598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOWAC: a service-oriented workflow access control model SOWAC:面向服务的工作流访问控制模型
W. Xu, Jun Wei, Yu Liu, Jing Li
{"title":"SOWAC: a service-oriented workflow access control model","authors":"W. Xu, Jun Wei, Yu Liu, Jing Li","doi":"10.1109/CMPSAC.2004.1342816","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342816","url":null,"abstract":"Workflow access control is the fundamental issue in workflow security. With the development of enterprise globalization and the constant re-engineering and optimizing of enterprise business, the organization becomes more dynamic and its business process is frequently changing. As a result, workflow access control turns more complicated and entails a comparatively operational mechanism. To solve the problem, in view of decoupling workflow access control model from workflow model, we propose a service-oriented workflow access control (SOWAC) model in this paper. In the SOWAC model, service is the abstraction of a task and the unit for applying access control. We present the elements of the SOWAC model and illustrate the enforcement of SOWAC with an example workflow. Then the dynamic separation of duty for the SOWAC model is proposed based on the authorization history of services. By applying SOWAC in a real workflow management system, we show that the SOWAC model is practical and effective.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书