Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.最新文献

筛选
英文 中文
Study on performance of IP-SWAN based on distributed NS-RAID 基于分布式NS-RAID的IP-SWAN性能研究
Baojiang Cui, Jun Liu, G. Wang, Jing Liu
{"title":"Study on performance of IP-SWAN based on distributed NS-RAID","authors":"Baojiang Cui, Jun Liu, G. Wang, Jing Liu","doi":"10.1109/CMPSAC.2004.1342896","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342896","url":null,"abstract":"Previous work on performance of network storage system has been mostly qualitative. This work proposes a quantitative analytical method based on closed queueing networks in order to analyze the performance bounds of IP-SWAN (storage wide area network) based on distributed network software RAID (NS-RAID). Experimental results show that testing results are within the bounds predicted by the performance analysis model and the bounds reflect the dynamic trend of the actual testing performance. Furthermore, the bottleneck and the potential bottleneck that affect the IP-SWAN performance can be derived from the performance analysis model. Meanwhile the model provides us with the criteria for distinguishing the key performance factors and non-key performance factors.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing context-sensitive middleware-based software applications 测试上下文敏感的基于中间件的软件应用程序
T. H. Tse, S. Yau, W. Chan, Heng Lu, T. Chen
{"title":"Testing context-sensitive middleware-based software applications","authors":"T. H. Tse, S. Yau, W. Chan, Heng Lu, T. Chen","doi":"10.1109/CMPSAC.2004.1342879","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342879","url":null,"abstract":"Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application. The components of such software communicate proactively among themselves according to the situational attributes of their environments, known as the \"contexts\". The actual process of accessing and updating the contexts lies with the middleware. The latter invokes the relevant local and remote operations whenever any context inscribed in the situation-aware interface is satisfied. Since the applications operate in a highly dynamic environment, the testing of context-sensitive software is challenging. Metamorphic testing is a property-based testing strategy. It recommends that, even if a test case does not reveal any failure, follow-up test cases should be further constructed from the original to check whether the software satisfies some necessary conditions of the problem to be implemented. This work proposes to use isotropic properties of contexts as metamorphic relations for testing context-sensitive software. For instance, distinct points on the same isotropic curve of contexts would entail comparable responses by the components. This notion of testing context relations is novel, robust, and intuitive to users.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
Self-adaptive software: cybernetic perspective and an application server supported framework 自适应软件:控制论的观点和应用服务器支持的框架
Junrong Shen, Qianxiang Wang, Hong Mei
{"title":"Self-adaptive software: cybernetic perspective and an application server supported framework","authors":"Junrong Shen, Qianxiang Wang, Hong Mei","doi":"10.1109/CMPSAC.2004.1342684","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342684","url":null,"abstract":"With emerging areas such as Web services, pervasive computing, wireless sensor networks and so on, self-adaptive software is becoming more and more important and topical. As a new emerging discipline, self-adaptive software has strong background in control theory. This work analyses the similarity between software self-adaptation technologies and control theory, and shows that self-adaptive software could be studied from software cybernetic perspective. Based on this standpoint, we also present three software adaptive models derived from open-loop control, feedback control and adaptive control. The application server based implementations of these three models are introduced.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"89 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113943930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Goal autonomous agent architecture 目标自主代理体系结构
Zhiqi Shen, R. Gay, Yuan Miao, C. Miao
{"title":"Goal autonomous agent architecture","authors":"Zhiqi Shen, R. Gay, Yuan Miao, C. Miao","doi":"10.1109/CMPSAC.2004.1342669","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342669","url":null,"abstract":"We present a goal autonomous agent model that supports both behavior autonomy and goal autonomy. Based on Goal Net, goal autonomous agents are not only able to choose the right action towards its current goal, but also able to reason the next goal to achieve towards its overall goal.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"54 7-8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Spatiotemporal helixes for modeling environmental data 用于环境数据建模的时空螺旋
Kristin Eickhorst, A. Croitoru, P. Agouris, A. Stefanidis
{"title":"Spatiotemporal helixes for modeling environmental data","authors":"Kristin Eickhorst, A. Croitoru, P. Agouris, A. Stefanidis","doi":"10.1109/CMPSAC.2004.1342696","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342696","url":null,"abstract":"Spatiotemporal helixes are a new method for modeling the changes an object experiences over time. They have the potential to be used as a predictive tool for geographical and biological applications. We present the formal foundations of these helixes and include experiments to demonstrate their usefulness when data collection is not optimal, such as when noise is present or when there is more than one object of interest present in a single video stream.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for software reliability model selection 一种软件可靠性模型选择方法
Ch. Ali Asad, M. Ullah, M. Rehman
{"title":"An approach for software reliability model selection","authors":"Ch. Ali Asad, M. Ullah, M. Rehman","doi":"10.1109/CMPSAC.2004.1342891","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342891","url":null,"abstract":"Software reliability models are used for the estimation and prediction of software reliability. Selection of a software reliability model for use in a particular case has been an area of interest for researchers in the field of software reliability. Tools and techniques for software reliability model selection found in the literature cannot be used with a high level of confidence as they use a limited number of model selection criteria. In this paper, we have classified software reliability models according to software development life cycle (SDLC) phases. We have identified and defined a number of criteria (with importance level) for software reliability model selection. We have proposed an algorithm based on these criteria for the selection of software reliability models along with an example. This algorithm can be used in different phases of SDLC and applies to various classes of software reliability models.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Design of a CIL connector to SPIN 一种用于SPIN的CIL连接器的设计
Yongjian Li, Rui Xue
{"title":"Design of a CIL connector to SPIN","authors":"Yongjian Li, Rui Xue","doi":"10.1142/S0218194008003568","DOIUrl":"https://doi.org/10.1142/S0218194008003568","url":null,"abstract":"The CAPSL Integrated Protocol Environment effort aims at providing an intuitive and expressive language for specifying authentication and key distribution protocols and supporting interfaces to various analysis tools. The CAPSL Intermediate Language CIL has been designed with the emphasis on simplifying translators from CIL to other analysis tools. In this paper we describe the design of a CIL-to-Spin connector. We describe how CIL concepts are translated into Spin and propose a general method to model the behaviors of honest principals and the intruder. Based on the method, a prototype connector has been implemented in Gentle, which can automatically translate CIL specification to promela code and LTL formula, thus greatly simplifying the modelling and analysis process","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123598598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOWAC: a service-oriented workflow access control model SOWAC:面向服务的工作流访问控制模型
W. Xu, Jun Wei, Yu Liu, Jing Li
{"title":"SOWAC: a service-oriented workflow access control model","authors":"W. Xu, Jun Wei, Yu Liu, Jing Li","doi":"10.1109/CMPSAC.2004.1342816","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342816","url":null,"abstract":"Workflow access control is the fundamental issue in workflow security. With the development of enterprise globalization and the constant re-engineering and optimizing of enterprise business, the organization becomes more dynamic and its business process is frequently changing. As a result, workflow access control turns more complicated and entails a comparatively operational mechanism. To solve the problem, in view of decoupling workflow access control model from workflow model, we propose a service-oriented workflow access control (SOWAC) model in this paper. In the SOWAC model, service is the abstraction of a task and the unit for applying access control. We present the elements of the SOWAC model and illustrate the enforcement of SOWAC with an example workflow. Then the dynamic separation of duty for the SOWAC model is proposed based on the authorization history of services. By applying SOWAC in a real workflow management system, we show that the SOWAC model is practical and effective.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
eXtreme Programming (XP) as a 'minimum' software process: a grounded theory 作为“最小”软件过程的极限编程(XP):一个有根据的理论
G. Coleman
{"title":"eXtreme Programming (XP) as a 'minimum' software process: a grounded theory","authors":"G. Coleman","doi":"10.1109/CMPSAC.2004.1342663","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342663","url":null,"abstract":"Companies engaged in software production are deploying a variety of process models to support their product development activity. Whilst most are tailoring existing process models for use in their specific environments, many have begun to use eXtreme Programming (XP) to achieve their development objectives. This study illustrates how XP is being used as a \"good enough\" or \"minimum\" process by software product companies.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122489040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A grid service-based engineering computation architecture 基于网格服务的工程计算体系结构
Changqin Huang, Deren Chen, Hualiang Hu
{"title":"A grid service-based engineering computation architecture","authors":"Changqin Huang, Deren Chen, Hualiang Hu","doi":"10.1109/CMPSAC.2004.1342652","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342652","url":null,"abstract":"Grid computing is becoming a new computing infrastructure for large-scale scientific computation and cooperative work. The Globus toolkit is the most popular grid environment and de facto grid standard, and it has adopted OGSA architecture to provide applications with grid service level. This study focuses on the requirement for scientists in engineering computation field and narrows the gap between grid service and the engineering community. The engineering computation architecture supplies the users with a visual application development and deployment environment for engineering computation. The whole is characterized by grid service. At the same time, QoS driven user-centric scheduling, community-based efficient authorization and flexible task management are designed and implemented.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信