Weiqi Chen, Kang Liu, Lijun Su, Mei Liu, Z. Hao, Yong Hu, Xiangzhou Zhang
{"title":"Discovering Many-to-One Causality in Software Project Risk Analysis","authors":"Weiqi Chen, Kang Liu, Lijun Su, Mei Liu, Z. Hao, Yong Hu, Xiangzhou Zhang","doi":"10.1109/3PGCIC.2014.133","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.133","url":null,"abstract":"Many risk factors affect software development and risk management has become one of the major activities in software development. Discovering causal directions among risk factors and project performance are important support for risk management. The Additive Noise Model (ANM) is an effective algorithm for discovering the direction on one-to-one causalities, but ineffective on many-to-one causalities which are frequent in software project risk analysis (SPRA) process. Thus we proposed a modified ANM with Conditional Probability Table (ANMCPT) to discover the causal direction among risk factors and project performance. The experimental results show our proposed algorithm is effective to discover the many-to-one causalities in SPRM on 498 collected software project data, and it performs better than other algorithms in the prediction with discovered causes of project performance, such as logistic regression, C4.5, Naïve Bayes, and general BNs. This study firstly presents an approach using ANM for many-to-one causality discovery in SPRA and then proves that it is an effective algorithm for analyzing the risk in software project.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?","authors":"Yonglin Sun, Yongjun Wang, Xiaobin Wang","doi":"10.1109/3PGCIC.2014.125","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.125","url":null,"abstract":"Mobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile security app's loyalty, or who can determine a given mobile security app is not a hypocritical thief? Thus, it is very necessary to establish a supervision mechanism to restrict mobile security app for user's privacy, but there isn't any technique to supervise the behavior of security apps till now. We summarized the security scenario of android smart phone from five aspects, and proposed a Competitive Supervision Mechanism and three theoretical supportive techniques to supervise mobile security app for user's security concern.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strain Sensitizing of High-Sensitivity SAW Sensor Based on FBG","authors":"Zhang Wei","doi":"10.1109/3PGCIC.2014.63","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.63","url":null,"abstract":"We propose FBG (fiber Bragg grating) based optical fiber sensors for detecting pipeline leakage in oil and gas transportation systems. By placing a sensor on each end of a pipe, the velocity and position of the pipeline leakage can be detected through a series of calculations on the correlation analysis, the time difference, and the characteristics of surface waves. We improve the sensitivity and the accuracy of positioning for the FBG based optical fiber sensors by enhancing the FBG strain response sensitivity.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OpenSSL HeartBleed: Security Management of Implements of Basic Protocols","authors":"Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng","doi":"10.1109/3PGCIC.2014.148","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.148","url":null,"abstract":"With the rapid development of information technology, information security management is ever more important. OpenSSL security incident told us, there's distinct disadvantages of security management of current hierarchical structure, the software and hardware facilities are necessary to enforce security management on their implements of crucial basic protocols, in order to ease the security threats against the facilities in a certain extent. This article expounded cross-layer security management and enumerated 5 contributory factors for the core problems that management facing to.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Decision Support System Using Two-Level Classifier for Smart Grid","authors":"Huajun Chen, Hang Yang, Aidong Xu, Cai Yuan","doi":"10.1109/3PGCIC.2014.35","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.35","url":null,"abstract":"Today, big data is not only the data scenario with large volume, but also high-speed and changing all the time. Such data streams commonly exist in Smart Grid facilities. Decision tree as one of the most widely-used analysis methods, has been applied in the decision support system for smart grid. This paper proposes a two-level classifier combining cache-based classifier and incremental decision tree learning, instead of the tree inductions using Hoeffding bound. The simulation result shows that the proposed approach has better accuracy. The combined method can handle high-speed data streams collected from power grid units.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Nested Schema of HBase for Migration from SQL","authors":"Gansen Zhao, Libo Li, Zijing Li, Qiaoying Lin","doi":"10.1109/3PGCIC.2014.127","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.127","url":null,"abstract":"With the development of web application, the demand of query performance and expansion becomes increasingly necessary. Relational database seems hardly handling with this, more and more applications choose migrating to NoSQL database such as HBase. The features of high reliability, high performance, column-oriented storage, high scalability, and real-time read and write, won favor from public. In this paper, we use two concepts Nested and Multiple Nested to describe join keys reference relationship between tables in relational database. Because HBase only support the column family nest the column qualifier, it is hard to deal with the situation of Multiple Nested after data migration from relational database meanwhile ensure high query performance in transformed HBase. We propose a novel HBase schema for migrating from relational database to HBase, which supports multiple nested. With this schema in HBase, query only once on one table for any query is needed to get the data, and query efficiency has been greatly improved, especially for join query. Additionally, index migration is available in this scheme, which supports faster query. Finally, this paper proposes a mapping algorithm to find column name corresponding to attribute in relational database.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121888348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jorge Miguel, S. Caballé, F. Xhafa, Josep Prieto, L. Barolli
{"title":"A Collective Intelligence Approach for Building Student's Trustworthiness Profile in Online Learning","authors":"Jorge Miguel, S. Caballé, F. Xhafa, Josep Prieto, L. Barolli","doi":"10.1109/3PGCIC.2014.132","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.132","url":null,"abstract":"Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which has become one of the most influencing learning paradigms. In this context, e-Learning stakeholders, are increasingly demanding new requirements, among them, information security is considered as a critical factor involved in on-line collaborative processes. Information security determines the accurate development of learning activities, especially when a group of students carries out on-line assessment, which conducts to grades or certificates, in these cases, IS is an essential issue that has to be considered. To date, even most advances security technological solutions have drawbacks that impede the development of overall security e-Learning frameworks. For this reason, this paper suggests enhancing technological security models with functional approaches, namely, we propose a functional security model based on trustworthiness and collective intelligence. Both of these topics are closely related to on-line collaborative learning and on-line assessment models. Therefore, the main goal of this paper is to discover how security can be enhanced with trustworthiness in an on-line collaborative learning scenario through the study of the collective intelligence processes that occur on on-line assessment activities. To this end, a peer-to-peer public student's profile model, based on trustworthiness is proposed, and the main collective intelligence processes involved in the collaborative on-line assessments activities, are presented.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125423283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}