{"title":"Predicate Detection Modality and Semantics in Three Partially Synchronous Models","authors":"Chunbo Chu, M. Brockmeyer","doi":"10.1109/ICIS.2008.95","DOIUrl":"https://doi.org/10.1109/ICIS.2008.95","url":null,"abstract":"Predicate detection addresses the challenge of monitoring the state of a distributed system. This research is the first step to explore predicate detection with partial synchrony assumptions. We study the observability of computation and focus on predicate detection semantics in three partially synchronous models. A framework of the behavior of predicate detection is established in terms of partial synchrony, modalities permitted and the best detection semantics. This work forms a conceptualization of the problem space and leads to disciplined approaches to predicate detection in realistic systems by identifying the strongest possible semantics for each modality and partial synchrony assumption.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dukyun Nam, Junehawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim
{"title":"Research Process Support with Organizational Flow in e-Science","authors":"Dukyun Nam, Junehawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim","doi":"10.1109/ICIS.2008.76","DOIUrl":"https://doi.org/10.1109/ICIS.2008.76","url":null,"abstract":"To utilize an e-Science application service which is built on a grid computing environment efficiently, it is vital to develop technologies for integrating each e- Science application service into a workflow and to execute the workflow in a cooperative environment. In this paper, the required workflow in e-Science is analyzed using a conceptual scenario and categorized into three types of workflows: simulations, experiments, and collaborative work. Additionally, the workflow of the aerospace research community, an e-Science environment is shown. The necessary applications and functionalities for the required workflow are then proposed.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"186 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Changsun Shin, H. Yoe
{"title":"Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses","authors":"Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Changsun Shin, H. Yoe","doi":"10.1109/ICIS.2008.86","DOIUrl":"https://doi.org/10.1109/ICIS.2008.86","url":null,"abstract":"Recently, there are many researches to enable future ubiquitous environments based on wireless sensor network (WSN). Various sensing devices deployed in wireless sensor network collect meaningful data from physical environments and the data are delivered to neighbor node through radio interfaces for further processing. The representative application in WSN is a data collecting system, which monitors physical phenomena and gathers data around our life. In this system, sensor nodes can be considered as a kind of database and hosts connected to the Internet, in most cases, initiate some queries destined to WSN and collect query responses from WSN. In this study, the efficient use of limited energy efficiently for the WSN based large scale glass houses was researched. We designed an integration method which was based on WSN Gateway which integrated two different networks efficiently. To realize the proposed design, we implemented an efficient routing method and WSN Gateway in the wired and wireless integrated networks in ubiquitous glass houses.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115029347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics","authors":"Youngki Hong, Jongmoon Baik, In-Young Ko, Ho‐Jin Choi","doi":"10.1109/ICIS.2008.36","DOIUrl":"https://doi.org/10.1109/ICIS.2008.36","url":null,"abstract":"In software project management, there are three major factors to predict and control; size, effort, and quality. Much software engineering work has focused on these. When it comes to software quality, there are various possible quality characteristics of software, but in practice, quality management frequently revolves around defects, and delivered defect density has become the current de facto industry standard. Thus, research related to software quality has been focused on modeling residual defects in software in order to estimate software reliability. Currently, software engineering literature still does not have a complete defect prediction for a software product although much work has been performed to predict software quality. On the other side, the number of defects alone cannot be sufficient information to provide the basis for planning quality assurance activities and assessing them during execution. That is, for project management to be improved, we need to predict other possible information about software quality such as in-process defects, their types, and so on. In this paper, we propose a new approach for predicting the distribution of defects and their types based on project characteristics in the early phase. For this approach, the model for prediction was established using the curve-fitting method and regression analysis. The maximum likelihood estimation (MLE) was used in fitting the Weibull probability density function to the actual defect data, and regression analysis was used in identifying the relationship between the project characteristics and the Weibull parameters. The research model was validated by cross-validation.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122471517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks","authors":"H. Diwakar, A. Vaidya","doi":"10.1109/ICIS.2008.43","DOIUrl":"https://doi.org/10.1109/ICIS.2008.43","url":null,"abstract":"Banks in India have in recent times made extensive capital investments in centralized banking transaction solutions and service delivery technologies (SDTs) such as automated teller machines (ATMs). Such SDTs have been sparingly used mostly for cash withdrawals while the bulk of other transactions still continue to be branch centric. In order to selectively shift transactions to these SDTs, banks need to review existing branch transactions from a volume cost- benefit and timeliness perspective at a branch level (there is a wide variability in the nature of clientele and type of transactions at different branches). This calls for a through analysis of branch level customer transactions. We have carried out the above said analysis using ORACLE and ORACLE BI on a sample branch data of an Indian Bank and the results strongly indicate that a sizable set of transactions can definitely be shifted to SDTs.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu
{"title":"An Efficient Structural Index for Graph-Structured Data","authors":"Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu","doi":"10.1109/ICIS.2008.9","DOIUrl":"https://doi.org/10.1109/ICIS.2008.9","url":null,"abstract":"To speed up queries over XML and semi-structured data, a number of structural indexes have been proposed. The structural index is usually a labeled directed graph defined by partitioning nodes in the XML data graph into equivalence classes and storing equivalence classes as index nodes. On the basis of the Inter- Relevant Successive Trees (IRST), we propose an efficient adaptive structural index, IRST(k)-index. Compared with the previous indexes, such as the A(k)'-index, D(k)- index, and M(k)-index, our experiment results show that the IRST(k)-index performs more efficiently in terms of space consumption and query performance, while using significantly less construction time.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee
{"title":"Building a Service-Oriented Ontology for Wireless Sensor Networks","authors":"Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee","doi":"10.1109/ICIS.2008.100","DOIUrl":"https://doi.org/10.1109/ICIS.2008.100","url":null,"abstract":"Wireless sensor networks (WSNs) provide various environment data in the real-world, and also WSNss middleware is able to offer field data in real-time by user queries. For materialization of the future ubiquitous computing which enables networking with things at anytime, anywhere and any-devices, WSNs occupy the important position with RFID technologies, and it has evolved and advanced currently. This paper proposes a service-oriented sensor ontology which enables service-oriented services in future ubiquitous computing. Taking reuse of ontology into consideration, ServiceProperty, LocationProperty and PhysicalProperty classes were derived from Geography Markup Language (GML), Sensor Web Enablement(SWE), SensorML and Suggested Upper Merged Ontology(SUMO) and OntoSensor ontology, and its properties and constraints were also defined newly as service-oriented service. We presented the validation and consistency check of the proposed ontology using Protege 3.3.1 and RACER 1.9.0, respectively, and indicated the results of service query which used the SPARQL query language.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128233781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile GUI Testing Tool based on Image Flow","authors":"Oh-Hyun Kwon, Sun-myung Hwang","doi":"10.1109/ICIS.2008.54","DOIUrl":"https://doi.org/10.1109/ICIS.2008.54","url":null,"abstract":"GUI of mobile application software has been highlighted as elements in deciding whether or not success or failure of software itself. Since it becomes established as an important factor of software success, GUI test is required for the software success. But its test takes much efforts and time. Therefore, we propose a method and automatic tool for mobile GUI test.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128368007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps","authors":"Chao Dai, J. Pang, Rongcai Zhao, Xiaojun Ma","doi":"10.1109/ICIS.2008.18","DOIUrl":"https://doi.org/10.1109/ICIS.2008.18","url":null,"abstract":"With the application of information technology and network, malicious codes have become a main threat to the computer security. In order to avoid being analyzed statically, malicious codes resort to various obfuscation techniques to hide themselves. Conditional jumps obfuscation is just such a kind of technique. In this paper, we introduce four forms of conditional jumps obfuscation which could confuse both of the two commonly used disassembly algorithms. Their basic idea is that two elaborate constructed conditional jump instructions are semantically equivalent to one unconditional jump. We propose a modified algorithm to crack the obfuscation. And we implement our idea in our reverse analysis tool Radux (Reverse Analysis for Detecting Unsafe eXecutables). Last we compare the disassembly output of Radux with objdump and IDApro. Relevant tests show that our implementation is effective.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"93 40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-Based Classifying Traditional Chinese Calligraphic Images","authors":"Zhong Gao, Guanming Lu, Daquan Gu, Chun He","doi":"10.1109/ICIS.2008.59","DOIUrl":"https://doi.org/10.1109/ICIS.2008.59","url":null,"abstract":"As traditional Chinese calligraphic (TCC) occupies an important place in the life of modern Chinese, there are a lot of TCC images digitalized and exhibited on the Internet. However, effective classification in them is an imperative problem need to be addressed. The paper proposes a content-based classification scheme that represents the visual content of TCC images by a textural feature set. Four kinds of classifier implemented in the scheme learn the characteristics of fundamental TCC style, art movements and calligraphic artists. The experimental results show that the scheme is capable of classifying the TCC image based on calligraphic artists as well as art movements with an accuracy of greater than 85%.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}