2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing最新文献

筛选
英文 中文
Discovering Many-to-One Causality in Software Project Risk Analysis 发现软件项目风险分析中的多对一因果关系
Weiqi Chen, Kang Liu, Lijun Su, Mei Liu, Z. Hao, Yong Hu, Xiangzhou Zhang
{"title":"Discovering Many-to-One Causality in Software Project Risk Analysis","authors":"Weiqi Chen, Kang Liu, Lijun Su, Mei Liu, Z. Hao, Yong Hu, Xiangzhou Zhang","doi":"10.1109/3PGCIC.2014.133","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.133","url":null,"abstract":"Many risk factors affect software development and risk management has become one of the major activities in software development. Discovering causal directions among risk factors and project performance are important support for risk management. The Additive Noise Model (ANM) is an effective algorithm for discovering the direction on one-to-one causalities, but ineffective on many-to-one causalities which are frequent in software project risk analysis (SPRA) process. Thus we proposed a modified ANM with Conditional Probability Table (ANMCPT) to discover the causal direction among risk factors and project performance. The experimental results show our proposed algorithm is effective to discover the many-to-one causalities in SPRM on 498 collected software project data, and it performs better than other algorithms in the prediction with discovered causes of project performance, such as logistic regression, C4.5, Naïve Bayes, and general BNs. This study firstly presents an approach using ANM for many-to-one causality discovery in SPRA and then proves that it is an effective algorithm for analyzing the risk in software project.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves? 移动安全应用:忠诚的守卫还是虚伪的小偷?
Yonglin Sun, Yongjun Wang, Xiaobin Wang
{"title":"Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?","authors":"Yonglin Sun, Yongjun Wang, Xiaobin Wang","doi":"10.1109/3PGCIC.2014.125","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.125","url":null,"abstract":"Mobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile security app's loyalty, or who can determine a given mobile security app is not a hypocritical thief? Thus, it is very necessary to establish a supervision mechanism to restrict mobile security app for user's privacy, but there isn't any technique to supervise the behavior of security apps till now. We summarized the security scenario of android smart phone from five aspects, and proposed a Competitive Supervision Mechanism and three theoretical supportive techniques to supervise mobile security app for user's security concern.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strain Sensitizing of High-Sensitivity SAW Sensor Based on FBG 基于光纤光栅的高灵敏度SAW传感器应变敏化研究
Zhang Wei
{"title":"Strain Sensitizing of High-Sensitivity SAW Sensor Based on FBG","authors":"Zhang Wei","doi":"10.1109/3PGCIC.2014.63","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.63","url":null,"abstract":"We propose FBG (fiber Bragg grating) based optical fiber sensors for detecting pipeline leakage in oil and gas transportation systems. By placing a sensor on each end of a pipe, the velocity and position of the pipeline leakage can be detected through a series of calculations on the correlation analysis, the time difference, and the characteristics of surface waves. We improve the sensitivity and the accuracy of positioning for the FBG based optical fiber sensors by enhancing the FBG strain response sensitivity.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols OpenSSL HeartBleed:基本协议实现的安全管理
Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng
{"title":"OpenSSL HeartBleed: Security Management of Implements of Basic Protocols","authors":"Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng","doi":"10.1109/3PGCIC.2014.148","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.148","url":null,"abstract":"With the rapid development of information technology, information security management is ever more important. OpenSSL security incident told us, there's distinct disadvantages of security management of current hierarchical structure, the software and hardware facilities are necessary to enforce security management on their implements of crucial basic protocols, in order to ease the security threats against the facilities in a certain extent. This article expounded cross-layer security management and enumerated 5 contributory factors for the core problems that management facing to.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Decision Support System Using Two-Level Classifier for Smart Grid 基于两级分类器的智能电网决策支持系统
Huajun Chen, Hang Yang, Aidong Xu, Cai Yuan
{"title":"A Decision Support System Using Two-Level Classifier for Smart Grid","authors":"Huajun Chen, Hang Yang, Aidong Xu, Cai Yuan","doi":"10.1109/3PGCIC.2014.35","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.35","url":null,"abstract":"Today, big data is not only the data scenario with large volume, but also high-speed and changing all the time. Such data streams commonly exist in Smart Grid facilities. Decision tree as one of the most widely-used analysis methods, has been applied in the decision support system for smart grid. This paper proposes a two-level classifier combining cache-based classifier and incremental decision tree learning, instead of the tree inductions using Hoeffding bound. The simulation result shows that the proposed approach has better accuracy. The combined method can handle high-speed data streams collected from power grid units.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiple Nested Schema of HBase for Migration from SQL 从SQL迁移的HBase多嵌套模式
Gansen Zhao, Libo Li, Zijing Li, Qiaoying Lin
{"title":"Multiple Nested Schema of HBase for Migration from SQL","authors":"Gansen Zhao, Libo Li, Zijing Li, Qiaoying Lin","doi":"10.1109/3PGCIC.2014.127","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.127","url":null,"abstract":"With the development of web application, the demand of query performance and expansion becomes increasingly necessary. Relational database seems hardly handling with this, more and more applications choose migrating to NoSQL database such as HBase. The features of high reliability, high performance, column-oriented storage, high scalability, and real-time read and write, won favor from public. In this paper, we use two concepts Nested and Multiple Nested to describe join keys reference relationship between tables in relational database. Because HBase only support the column family nest the column qualifier, it is hard to deal with the situation of Multiple Nested after data migration from relational database meanwhile ensure high query performance in transformed HBase. We propose a novel HBase schema for migrating from relational database to HBase, which supports multiple nested. With this schema in HBase, query only once on one table for any query is needed to get the data, and query efficiency has been greatly improved, especially for join query. Additionally, index migration is available in this scheme, which supports faster query. Finally, this paper proposes a mapping algorithm to find column name corresponding to attribute in relational database.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121888348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Collective Intelligence Approach for Building Student's Trustworthiness Profile in Online Learning 构建在线学习学生诚信档案的集体智慧方法
Jorge Miguel, S. Caballé, F. Xhafa, Josep Prieto, L. Barolli
{"title":"A Collective Intelligence Approach for Building Student's Trustworthiness Profile in Online Learning","authors":"Jorge Miguel, S. Caballé, F. Xhafa, Josep Prieto, L. Barolli","doi":"10.1109/3PGCIC.2014.132","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.132","url":null,"abstract":"Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which has become one of the most influencing learning paradigms. In this context, e-Learning stakeholders, are increasingly demanding new requirements, among them, information security is considered as a critical factor involved in on-line collaborative processes. Information security determines the accurate development of learning activities, especially when a group of students carries out on-line assessment, which conducts to grades or certificates, in these cases, IS is an essential issue that has to be considered. To date, even most advances security technological solutions have drawbacks that impede the development of overall security e-Learning frameworks. For this reason, this paper suggests enhancing technological security models with functional approaches, namely, we propose a functional security model based on trustworthiness and collective intelligence. Both of these topics are closely related to on-line collaborative learning and on-line assessment models. Therefore, the main goal of this paper is to discover how security can be enhanced with trustworthiness in an on-line collaborative learning scenario through the study of the collective intelligence processes that occur on on-line assessment activities. To this end, a peer-to-peer public student's profile model, based on trustworthiness is proposed, and the main collective intelligence processes involved in the collaborative on-line assessments activities, are presented.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125423283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信