Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)最新文献

筛选
英文 中文
Predicate Detection Modality and Semantics in Three Partially Synchronous Models 三种部分同步模型中的谓词检测模态和语义
Chunbo Chu, M. Brockmeyer
{"title":"Predicate Detection Modality and Semantics in Three Partially Synchronous Models","authors":"Chunbo Chu, M. Brockmeyer","doi":"10.1109/ICIS.2008.95","DOIUrl":"https://doi.org/10.1109/ICIS.2008.95","url":null,"abstract":"Predicate detection addresses the challenge of monitoring the state of a distributed system. This research is the first step to explore predicate detection with partial synchrony assumptions. We study the observability of computation and focus on predicate detection semantics in three partially synchronous models. A framework of the behavior of predicate detection is established in terms of partial synchrony, modalities permitted and the best detection semantics. This work forms a conceptualization of the problem space and leads to disciplined approaches to predicate detection in realistic systems by identifying the strongest possible semantics for each modality and partial synchrony assumption.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research Process Support with Organizational Flow in e-Science 基于组织流的电子科学研究过程支持
Dukyun Nam, Junehawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim
{"title":"Research Process Support with Organizational Flow in e-Science","authors":"Dukyun Nam, Junehawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim","doi":"10.1109/ICIS.2008.76","DOIUrl":"https://doi.org/10.1109/ICIS.2008.76","url":null,"abstract":"To utilize an e-Science application service which is built on a grid computing environment efficiently, it is vital to develop technologies for integrating each e- Science application service into a workflow and to execute the workflow in a cooperative environment. In this paper, the required workflow in e-Science is analyzed using a conceptual scenario and categorized into three types of workflows: simulations, experiments, and collaborative work. Additionally, the workflow of the aerospace research community, an e-Science environment is shown. The necessary applications and functionalities for the required workflow are then proposed.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"186 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses 无所不在的玻璃房屋无线传感器网络的设计与实现
Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Changsun Shin, H. Yoe
{"title":"Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses","authors":"Meong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Changsun Shin, H. Yoe","doi":"10.1109/ICIS.2008.86","DOIUrl":"https://doi.org/10.1109/ICIS.2008.86","url":null,"abstract":"Recently, there are many researches to enable future ubiquitous environments based on wireless sensor network (WSN). Various sensing devices deployed in wireless sensor network collect meaningful data from physical environments and the data are delivered to neighbor node through radio interfaces for further processing. The representative application in WSN is a data collecting system, which monitors physical phenomena and gathers data around our life. In this system, sensor nodes can be considered as a kind of database and hosts connected to the Internet, in most cases, initiate some queries destined to WSN and collect query responses from WSN. In this study, the efficient use of limited energy efficiently for the WSN based large scale glass houses was researched. We designed an integration method which was based on WSN Gateway which integrated two different networks efficiently. To realize the proposed design, we implemented an efficient routing method and WSN Gateway in the wired and wireless integrated networks in ubiquitous glass houses.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115029347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics 基于项目特征的增值预测缺陷类型分布模型
Youngki Hong, Jongmoon Baik, In-Young Ko, Ho‐Jin Choi
{"title":"A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics","authors":"Youngki Hong, Jongmoon Baik, In-Young Ko, Ho‐Jin Choi","doi":"10.1109/ICIS.2008.36","DOIUrl":"https://doi.org/10.1109/ICIS.2008.36","url":null,"abstract":"In software project management, there are three major factors to predict and control; size, effort, and quality. Much software engineering work has focused on these. When it comes to software quality, there are various possible quality characteristics of software, but in practice, quality management frequently revolves around defects, and delivered defect density has become the current de facto industry standard. Thus, research related to software quality has been focused on modeling residual defects in software in order to estimate software reliability. Currently, software engineering literature still does not have a complete defect prediction for a software product although much work has been performed to predict software quality. On the other side, the number of defects alone cannot be sufficient information to provide the basis for planning quality assurance activities and assessing them during execution. That is, for project management to be improved, we need to predict other possible information about software quality such as in-process defects, their types, and so on. In this paper, we propose a new approach for predicting the distribution of defects and their types based on project characteristics in the early phase. For this approach, the model for prediction was established using the curve-fitting method and regression analysis. The maximum likelihood estimation (MLE) was used in fitting the Weibull probability density function to the actual defect data, and regression analysis was used in identifying the relationship between the project characteristics and the Weibull parameters. The research model was validated by cross-validation.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122471517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Information Analysis for Enabling Optimal Utilization of  Service Delivery Channels in Indian Banks 印度银行服务交付渠道优化利用的信息分析
H. Diwakar, A. Vaidya
{"title":"Information Analysis for Enabling Optimal Utilization of  Service Delivery Channels in Indian Banks","authors":"H. Diwakar, A. Vaidya","doi":"10.1109/ICIS.2008.43","DOIUrl":"https://doi.org/10.1109/ICIS.2008.43","url":null,"abstract":"Banks in India have in recent times made extensive capital investments in centralized banking transaction solutions and service delivery technologies (SDTs) such as automated teller machines (ATMs). Such SDTs have been sparingly used mostly for cash withdrawals while the bulk of other transactions still continue to be branch centric. In order to selectively shift transactions to these SDTs, banks need to review existing branch transactions from a volume cost- benefit and timeliness perspective at a branch level (there is a wide variability in the nature of clientele and type of transactions at different branches). This calls for a through analysis of branch level customer transactions. We have carried out the above said analysis using ORACLE and ORACLE BI on a sample branch data of an Indian Bank and the results strongly indicate that a sizable set of transactions can definitely be shifted to SDTs.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient Structural Index for Graph-Structured Data 图结构数据的高效结构索引
Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu
{"title":"An Efficient Structural Index for Graph-Structured Data","authors":"Yingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu","doi":"10.1109/ICIS.2008.9","DOIUrl":"https://doi.org/10.1109/ICIS.2008.9","url":null,"abstract":"To speed up queries over XML and semi-structured data, a number of structural indexes have been proposed. The structural index is usually a labeled directed graph defined by partitioning nodes in the XML data graph into equivalence classes and storing equivalence classes as index nodes. On the basis of the Inter- Relevant Successive Trees (IRST), we propose an efficient adaptive structural index, IRST(k)-index. Compared with the previous indexes, such as the A(k)'-index, D(k)- index, and M(k)-index, our experiment results show that the IRST(k)-index performs more efficiently in terms of space consumption and query performance, while using significantly less construction time.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Service-Oriented Ontology for Wireless Sensor Networks 面向服务的无线传感器网络本体构建
Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee
{"title":"Building a Service-Oriented Ontology for Wireless Sensor Networks","authors":"Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee","doi":"10.1109/ICIS.2008.100","DOIUrl":"https://doi.org/10.1109/ICIS.2008.100","url":null,"abstract":"Wireless sensor networks (WSNs) provide various environment data in the real-world, and also WSNss middleware is able to offer field data in real-time by user queries. For materialization of the future ubiquitous computing which enables networking with things at anytime, anywhere and any-devices, WSNs occupy the important position with RFID technologies, and it has evolved and advanced currently. This paper proposes a service-oriented sensor ontology which enables service-oriented services in future ubiquitous computing. Taking reuse of ontology into consideration, ServiceProperty, LocationProperty and PhysicalProperty classes were derived from Geography Markup Language (GML), Sensor Web Enablement(SWE), SensorML and Suggested Upper Merged Ontology(SUMO) and OntoSensor ontology, and its properties and constraints were also defined newly as service-oriented service. We presented the validation and consistency check of the proposed ontology using Protege 3.3.1 and RACER 1.9.0, respectively, and indicated the results of service query which used the SPARQL query language.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128233781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Mobile GUI Testing Tool based on Image Flow 基于图像流的移动GUI测试工具
Oh-Hyun Kwon, Sun-myung Hwang
{"title":"Mobile GUI Testing Tool based on Image Flow","authors":"Oh-Hyun Kwon, Sun-myung Hwang","doi":"10.1109/ICIS.2008.54","DOIUrl":"https://doi.org/10.1109/ICIS.2008.54","url":null,"abstract":"GUI of mobile application software has been highlighted as elements in deciding whether or not success or failure of software itself. Since it becomes established as an important factor of software success, GUI test is required for the software success. But its test takes much efforts and time. Therefore, we propose a method and automatic tool for mobile GUI test.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128368007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps 针对条件跳转混淆的恶意代码反汇编的静态分析
Chao Dai, J. Pang, Rongcai Zhao, Xiaojun Ma
{"title":"Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps","authors":"Chao Dai, J. Pang, Rongcai Zhao, Xiaojun Ma","doi":"10.1109/ICIS.2008.18","DOIUrl":"https://doi.org/10.1109/ICIS.2008.18","url":null,"abstract":"With the application of information technology and network, malicious codes have become a main threat to the computer security. In order to avoid being analyzed statically, malicious codes resort to various obfuscation techniques to hide themselves. Conditional jumps obfuscation is just such a kind of technique. In this paper, we introduce four forms of conditional jumps obfuscation which could confuse both of the two commonly used disassembly algorithms. Their basic idea is that two elaborate constructed conditional jump instructions are semantically equivalent to one unconditional jump. We propose a modified algorithm to crack the obfuscation. And we implement our idea in our reverse analysis tool Radux (Reverse Analysis for Detecting Unsafe eXecutables). Last we compare the disassembly output of Radux with objdump and IDApro. Relevant tests show that our implementation is effective.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"93 40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Content-Based Classifying Traditional Chinese Calligraphic Images 基于内容的中国传统书法图像分类
Zhong Gao, Guanming Lu, Daquan Gu, Chun He
{"title":"Content-Based Classifying Traditional Chinese Calligraphic Images","authors":"Zhong Gao, Guanming Lu, Daquan Gu, Chun He","doi":"10.1109/ICIS.2008.59","DOIUrl":"https://doi.org/10.1109/ICIS.2008.59","url":null,"abstract":"As traditional Chinese calligraphic (TCC) occupies an important place in the life of modern Chinese, there are a lot of TCC images digitalized and exhibited on the Internet. However, effective classification in them is an imperative problem need to be addressed. The paper proposes a content-based classification scheme that represents the visual content of TCC images by a textural feature set. Four kinds of classifier implemented in the scheme learn the characteristics of fundamental TCC style, art movements and calligraphic artists. The experimental results show that the scheme is capable of classifying the TCC image based on calligraphic artists as well as art movements with an accuracy of greater than 85%.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信