Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)最新文献

筛选
英文 中文
Lessons Learned from Implementing WS-Coordination and WS-AtomicTransaction 实现WS-Coordination和WS-AtomicTransaction的经验教训
I. Neto, F. Reverbel
{"title":"Lessons Learned from Implementing WS-Coordination and WS-AtomicTransaction","authors":"I. Neto, F. Reverbel","doi":"10.1109/ICIS.2008.75","DOIUrl":"https://doi.org/10.1109/ICIS.2008.75","url":null,"abstract":"This paper presents the design and implementation of a transaction service that complies with the WS-Coordination and WS-AtomicTransaction standards. Such service builds upon XActor, a distributed transaction manager that supports an open-ended set of transports, and enhances it with full support for atomic transactions over Web services. The paper summarizes the main lessons we learned from implementing those standards. It also identifies weaknesses in the WS-AtomicTransaction specification and presents advice for implementors of any systems based upon WS-Coordination.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generating Algorithms plus Loop Invariants by Formal Derivation 通过形式推导生成加循环不变量的算法
Haihe Shi, Dawei Du, Jinyun Xue
{"title":"Generating Algorithms plus Loop Invariants by Formal Derivation","authors":"Haihe Shi, Dawei Du, Jinyun Xue","doi":"10.1109/ICIS.2008.34","DOIUrl":"https://doi.org/10.1109/ICIS.2008.34","url":null,"abstract":"We advocate a mechanical derivation approach for developing provably correct algorithmic programs. The paper presents our new formal methods and techniques for generating algorithms plus loop invariants. Through our methods and techniques, the ideas behind MergeSort algorithm is revealed naturally from a formal specification, and then its loop invariant and nonrecursive algorithmic solution are generated mechanically. Furthermore, instead of fresh formal derivation, the Insertion Sort is easily achieved based on the derivation of MergeSort. By means of our tools their executable language programs can be generated automatically. Therefore mathematical knowledge required by formal development process is reduced substantially and the confidence in the resultant code is increased.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Data Flow Testing of Classes through Design by Contract 通过契约式设计增强类的数据流测试
Y. Singh, A. Saha
{"title":"Enhancing Data Flow Testing of Classes through Design by Contract","authors":"Y. Singh, A. Saha","doi":"10.1109/ICIS.2008.70","DOIUrl":"https://doi.org/10.1109/ICIS.2008.70","url":null,"abstract":"Design by contract (DbC) is a methodology to construct quality software. DbC associates the contract specification (pre and postconditions of methods of class and class invariant) with the design of a class. In this paper, we combine dataflow testing and Design by Contract to develop a testing technique called \"Data flow testing using Contract\". In this technique a class flow graph is generated from the contract specification of the class and then conventional data flow testing is applied to find the test cases. The advantage of using contract specification is that: it is executable and hence a method in a test case is only executed if its precondition and class invariant are satisfied. If they are not satisfied then it leads to an infeasible sequence. Also, if after executing a method its postcondition is not satisfied then it leads to implementation error in the method. We also compare the testing of a DbC class with a conventional class and find that the number of du pairs is reduced in a DbC class because some of the conditions in conventional class become the part of the precondition in a DbC class.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132370984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Effort-Based Approach to Measure Completeness of an Entity-Relationship Model 基于努力度量实体-关系模型完备性的方法
T. Hussain, M. Awais
{"title":"An Effort-Based Approach to Measure Completeness of an Entity-Relationship Model","authors":"T. Hussain, M. Awais","doi":"10.1109/ICIS.2008.108","DOIUrl":"https://doi.org/10.1109/ICIS.2008.108","url":null,"abstract":"For developing good quality information systems, the need of developing good quality conceptual models cannot be over emphasized. Completeness is an important characteristic that determines the quality of a conceptual model. To measure completeness, metrics called Completeness Index (CI) and Fuzzy Completeness Index (FCI) have been proposed in research. These metrics correspond to the extent functional dependencies are represented in a conceptual model, hi this paper, we propose an approach that takes into account the effort required to make a conceptual model complete. The higher the effort, the less is the degree of completeness. A metric Effort-based Completeness Index ECI is proposed accordingly. Although metrics previously proposed have an implicit relationship with the required effort, ECI provides the basis to explicitly relate completeness with the effort. Also, the method of computing ECI is simpler. In the proposed approach, first the effort based upon number of changes required to introduce a functional dependency in a given model is computed. Then the total effort for all functional dependencies in the problem domain determines ECI. hi this paper, ECI is calculated for different conceptual models and compared with corresponding CI and FCI values. It is illustrated that the proposed approach can easily be applied to practical problems in which alternative designs of the same problem are to be compared objectively in order to identify the one having better quality.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Coordination Behavioral Structure: A Web Services Coordination Model in Dynamic Environment 协调行为结构:动态环境下的Web服务协调模型
Yongwang Zhao, Dian-fu Ma, Min Liu, C. Hu
{"title":"Coordination Behavioral Structure: A Web Services Coordination Model in Dynamic Environment","authors":"Yongwang Zhao, Dian-fu Ma, Min Liu, C. Hu","doi":"10.1109/ICIS.2008.11","DOIUrl":"https://doi.org/10.1109/ICIS.2008.11","url":null,"abstract":"The ability to describe the coordinative behavior of interacting Web services is key aspect in the development of next generation Internet software systems. In this paper, a layered architecture for coordination system is introduced. Based on coordination structure that presents the basic architecture of coordination system, we propose a Web services coordination model, Coordination Behavioral Structure (CBS), which formalize the services interactions and their relationships. CBS expresses the coordinative behaviors of a coordination structure. CBS graph constructed by relationships of interactions using basic and extended compositors is proposed for visual description of coordination behaviors. For illustrating CBS, an example and CBS of basic coordination structures are presented.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones 基于多信息素的动态蚁群算法优化
Ya-mei Xia, Jun-Liang Chen, Xiang-wu Meng
{"title":"On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones","authors":"Ya-mei Xia, Jun-Liang Chen, Xiang-wu Meng","doi":"10.1109/ICIS.2008.112","DOIUrl":"https://doi.org/10.1109/ICIS.2008.112","url":null,"abstract":"In this paper, an algorithm DACO (dynamic ant colony optimization algorithm based on multi- pheromones) is put forward to apply to the dynamics of web services state and QoS in service composition optimization. In order to denote users' needs more accurately, this algorithm sets multiple pheromones. The DACO is also improved based on experiment in order to make it better and faster converge to optimization value. Simulation experiment in this paper shows that the DACO is more effective than Ant Colony Algorithm and a Genetic Algorithm applied to services composition.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"104 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117292301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Email Categorization Using (2+1)-Tier Classification Algorithms 电子邮件分类使用(2+1)-层分类算法
M. Islam, Wanlei Zhou, M. Chowdhury
{"title":"Email Categorization Using (2+1)-Tier Classification Algorithms","authors":"M. Islam, Wanlei Zhou, M. Chowdhury","doi":"10.1109/ICIS.2008.96","DOIUrl":"https://doi.org/10.1109/ICIS.2008.96","url":null,"abstract":"In this paper we have proposed a spam filtering technique using (2+1)-tier classification approach. The main focus of this paper is to reduce the false positive (FP) rate which is considered as an important research issue in spam filtering. In our approach, firstly the email message will classify using first two tier classifiers and the outputs will appear to the analyzer. The analyzer will check the labeling of the output emails and send to the corresponding mailboxes based on labeling, for the case of identical prediction. If there are any misclassifications occurred by first two tier classifiers then tier-3 classifier will invoked by the analyzer and the tier-3 will take final decision. This technique reduced the analyzing complexity of our previous work. It has also been shown that the proposed technique gives better performance in terms of reducing false positive as well as better accuracy.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134139524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Negotiation Mechanism for Agent-Based Lecture Allocation Systems 基于agent的课堂分配系统协商机制研究
Yoshihito Saito, T. Fujimoto, T. Matsuo
{"title":"A New Negotiation Mechanism for Agent-Based Lecture Allocation Systems","authors":"Yoshihito Saito, T. Fujimoto, T. Matsuo","doi":"10.1109/ICIS.2008.107","DOIUrl":"https://doi.org/10.1109/ICIS.2008.107","url":null,"abstract":"Elective subject is one of important issues as education program in University. Students can declare their preferences directly by selecting it. In most of university, to allocate elective subjects to the students, university staffs poll students the lectures they want to take. However, due to the limitation of time and number of staffs, the hearing investigation includes the reason and the intention in which students select the lectures. Some students sometimes take a lecture for their career, for academical interest, and for assimilation of knowledge. However, some students might take the lecture following the crowd and take the lecture as Mickey Mouse. The latter case is undesirable for the higher education. To solve the problem, in this paper, we propose a new multi-step lecture allocation method based on students preferences and university intentions. Our protocol has three steps. (1) University warns students who must take a certain lecture to graduate and get a license. (2) Using students preferences, lectures are allocated. (3) Students exchange lectures to increase their intentions and utilities. Our protocol realizes the high performance of allocation compared with brute force algorithm and reducing computational costs compared with optimizations.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-Line Network Reachability Analysis Using Forward Information Base Emulation 基于前向信息库仿真的在线网络可达性分析
Young Dae Kim, C. Hwang, Jae-Hyoung Yoo
{"title":"On-Line Network Reachability Analysis Using Forward Information Base Emulation","authors":"Young Dae Kim, C. Hwang, Jae-Hyoung Yoo","doi":"10.1109/ICIS.2008.85","DOIUrl":"https://doi.org/10.1109/ICIS.2008.85","url":null,"abstract":"This paper presents a new approach of routing protocol management as a first step towards the conception of on-line network reachability analysis. Each individual router has an FIB (forwarding information base), which is a table containing the information required to forward IP packets, which is used for packet delivery. At a minimum, FIB contains the interface identifier and the next hop information for each reachable destination. If it is possible to emulate the FIBs of on-line routers in service, network reachability could be simulated in real time. 'A destination is reachable' indicates that the FIB lookup from its source to the destination is successful. This simulation will make it unnecessary to model FIBs and a lookup mechanism, or to analyze the routing information filtering. In this paper, a mean of FIB emulation and network reachability simulation through the analysis of routing information are shown. This method is valuable, both for network users and operators.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114434930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Agent Based Architecture for Secure Access from Multiple Hospitals 基于代理的多医院安全访问体系结构
S. Yoo, Jun Choe, Do Yoon Kim
{"title":"Agent Based Architecture for Secure Access from Multiple Hospitals","authors":"S. Yoo, Jun Choe, Do Yoon Kim","doi":"10.1109/ICIS.2008.12","DOIUrl":"https://doi.org/10.1109/ICIS.2008.12","url":null,"abstract":"Internet-based health data exchange, which is particularly useful for the management of cooperative health care and life time health care records, requires the use of a common format to allow access to heterogeneous reservoirs scattered at different hospitals, as well as protection from intrusion and piracy. However, the unified management of multiple reservoirs is difficult to achieve, due to the different policies operated by different hospitals and the heterogeneous format of their information reservoirs. In this paper, we propose a multi-agent based secure architecture which can be used to retrieve healthcare information in a common format through the internet from multiple heterogeneous reservoirs. The proposed system is organized in the form of a 4-tier architecture, consisting of the client application, access control central agent, local access control agent and hospital information system, involving distributed processing with multiple matching agents connected to heterogeneous reservoirs and one flexible master controller to unify the different formats and different hospital policies, thus providing a secure common format and simplifying the problem of reservoir maintenance, including the addition, removal and modification of reservoirs. The combination of XML and RABC provides an efficient means of reservoir management, allowing for access control, a common format for information exchange, device independent display for diverse display resolutions of terminal devices, user identification for authentication, digital signature for data integrity, and selective encryption for protecting confidential health information.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信