2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

筛选
英文 中文
On the Performance of End-to-End Routing in Complex Networks with Intermittent Links 断续链路复杂网络中端到端路由性能研究
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-100
Michikazu Ohnishi, Chuta Minamiguchi, H. Ohsaki
{"title":"On the Performance of End-to-End Routing in Complex Networks with Intermittent Links","authors":"Michikazu Ohnishi, Chuta Minamiguchi, H. Ohsaki","doi":"10.1109/COMPSAC48688.2020.0-100","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-100","url":null,"abstract":"Emergence of IoT (Internet of Things) applications poses challenges on the networking infrastructure since those applications must accommodate a large number of end nodes (e.g., smart sensor devices), and the communication among those nodes are unreliable. In the last decade, DTN (Delay/Disruption-Tolerant Networking) has been actively studied by many researchers, which aims to provide efficient and reliable end-to-end communication in environments where end-to-end paths can not be reliably established. In DTN re-search, superiority and inferiority of several classes of routing mechanisms have been clarified. However, it is still an open question how effectively or ineffectively end-to-end routing performs in networks with moderately intermittent communication links. In this paper, we therefore address the following research questions: (1) does end-to-end routing perform effectively in a large-scale network with many nodes, each of which is connected with a few other nodes via intermittent communication links? (2) how is the average end-to-end message delivery delay affected by the degree (i.e., the total number of incoming and outgoing links) of source and destination nodes? To answer the above research questions, we analytically derive the average message delivery delay with end-to-end routing on a complex network with an arbitrary degree distribution.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AI and ML-Driving and Exponentiating Sustainable and Quantifiable Digital Transformation. 人工智能和机器学习驱动和指数可持续和可量化的数字化转型。
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-227
C. Naseeb
{"title":"AI and ML-Driving and Exponentiating Sustainable and Quantifiable Digital Transformation.","authors":"C. Naseeb","doi":"10.1109/COMPSAC48688.2020.0-227","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-227","url":null,"abstract":"AI is a major transforming technology impacting every sector of life. AI is not a force to deprive humans and take over the control, rather a real enabler and lever for digital transformation. The former view aligns with Hollywood movies, and need to be undressed with the latter, which is realistic and becoming tangible over time as more organizations, and communities are leveraging AI's potential. Developing a practical understanding of AI, its capabilities, the challenges, and opportunities that it brings is fundamental to get the maximum out of its envisaged potential. The objective of this paper is to highlight how technology and industry have developed, discuss the role of AI in driving intelligent transformation concentrating on an applicable understanding of AI and related technologies. We introduce a new conceptual framework: AI's multi-dimensional role, to highlight its transformative power in multiple aspects. We also introduce an AI based Information and Model Governance Framework.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dagbase: A Decentralized Database Platform Using DAG-Based Consensus Dagbase:使用基于dag的共识的去中心化数据库平台
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-164
Yepeng Ding, Hiroyuki Sato
{"title":"Dagbase: A Decentralized Database Platform Using DAG-Based Consensus","authors":"Yepeng Ding, Hiroyuki Sato","doi":"10.1109/COMPSAC48688.2020.0-164","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-164","url":null,"abstract":"As the infrastructure to provide support for distributed database management systems, the distributed database platform is very important to unify the management of data distributed in intricate environments. However, a traditional distributed database platform with centralized entities faces diverse and serious threats when the central entity is compromised. Consensus mechanisms in distributed ledger technology (DLT) can enhance the capability of defending threats by decentralizing the platform, but the efficiency and cost of consensus mechanisms in classic blockchain techniques are notable issues. In this paper, we propose a novel decentralized database platform, named Dagbase, with the support of an efficient and cost-effective consensus mechanism that uses the directed acyclic graph (DAG) as the structure. Dagbase decentralizes the management and distributes data to prevent threats in untrustworthy environments, which gains benefits from recent DLT. The performance of near-native data reading and high-efficiency data writing is ensured by a layered architecture and DAG-based consensus. Furthermore, we ensure flexibility by decoupling the consensus mechanism from the architecture. Dagbase is also easy-to-use and can be integrated with mainstream database products seamlessly on account of great interoperability. The implementation demonstrates our work and the security and performance analysis are enforced for evaluation.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Study on Bottleneck Bandwidth Estimation Based on Acknowledge Reception on TCP BBR TCP BBR中基于确认接收的瓶颈带宽估计研究
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-117
Kanon Sasaki, Saneyasu Yamaguchi
{"title":"A Study on Bottleneck Bandwidth Estimation Based on Acknowledge Reception on TCP BBR","authors":"Kanon Sasaki, Saneyasu Yamaguchi","doi":"10.1109/COMPSAC48688.2020.0-117","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-117","url":null,"abstract":"In 2016, a novel TCP (Transmission Control Protocol) congestion control algorithm TCP BBR was proposed. Several papers on TCP fairness including TCP BBR have been published. In our previous work, we showed that the throughput of TCP BBR was significantly low at the beginning of connections. In this paper, we reveal the reason for this TCP BBR's severe throughput based on its behavior.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department 一种评估业务流程可靠性的方法,该方法反映了每个部门的交易文档检查
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00047
Takafumi Komoto, K. Futatsugi, Nobukazu Yoshioka
{"title":"A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department","authors":"Takafumi Komoto, K. Futatsugi, Nobukazu Yoshioka","doi":"10.1109/COMPSAC48688.2020.00047","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00047","url":null,"abstract":"An assessment method is proposed to classify the reliability of business processes related to transactions into those with a high and low risk of inconsistency according to the checking status of transaction documents (such as an order form, a delivery slip, an invoice, a receipt). We show a method for objectively examining the reliability of business processes without relying solely on expert knowledge and experience. In practice, however, some departments in a company can be expected to execute transaction documents checking reliably, while others may not be able to. To cope with this, the method is extended so that assessment can be performed by reflecting the certainty of transaction documents checking for each department. Transaction documents checking for departments outside the company and outsourced departments can be excluded (such as a low-level department), and the risk of inconsistency in transaction documents can then be determined, thus improving the practicality of the assessment method.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Smart Cyber-Human System to Support Mental Well-Being through Social Engagement 通过社会参与支持心理健康的智能网络-人类系统
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-134
A. J. Majumder, Jack Wilson Dedmondt, Sean Jones, Amir A. Asif
{"title":"A Smart Cyber-Human System to Support Mental Well-Being through Social Engagement","authors":"A. J. Majumder, Jack Wilson Dedmondt, Sean Jones, Amir A. Asif","doi":"10.1109/COMPSAC48688.2020.0-134","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-134","url":null,"abstract":"The widespread adoption of wearable devices and social media is generating population-scale data about people's behavior as situated in their everyday lives. In this paper, an embedded Cyber-Human System (CHS) is used to monitor a person's mental health via physiological, behavioral, and social data. These three data streams will then be relayed to an application used by a professional within the medical industry, to allow remote monitoring of the user's mental health without the uncertainty that face-to-face interviews can introduce. Experimentation and verification have been conducted on a group of test subjects with different test scenarios including a happy, sad, angry, and neutral state of being. We propose to use physiological data to predict a person's emotional state using a machine learning classification algorithm. The proposed system can distinguish between the different emotional states with an accuracy of 92.9%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132243867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comprehensive Review of Collaborative Network Attacks in MANET MANET协同网络攻击研究综述
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-36
Olufemi Fasunlade, Shikun Zhou, D. Sanders
{"title":"Comprehensive Review of Collaborative Network Attacks in MANET","authors":"Olufemi Fasunlade, Shikun Zhou, D. Sanders","doi":"10.1109/COMPSAC48688.2020.00-36","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-36","url":null,"abstract":"This paper considers multiple network attacks in a Mobile Ad hoc Network (MANET). MANET is a type of network that does not require any infrastructure for nodes to communicate with each other. The general assumption in MANET is that each node is a trusted node. However, due to its lack of infrastructure and dynamic topology, the MANET is exposed to network layer attacks. In this paper, some of the network layer attacks such as the black hole attack, worm hole attack and gray hole attack are discussed. Frequent multiple network attacks are highlighted, and the identification of collaborative network attacks is discussed. There are several symptoms and observations in a network that signal the presence of an attack and some of the symptoms of these attacks will be highlighted. Finally, an analysis of existing multiple network attacks will be discussed, and the identification of prospective multiple network attacks is considered.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Method to Mask Dynamic Content Areas Based on Positional Relationship of Screen Elements for Visual Regression Testing 视觉回归测试中基于屏幕元素位置关系的动态内容区域掩码方法
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.000-1
Yuu Adachi, Haruto Tanno, Yu Yoshimura
{"title":"A Method to Mask Dynamic Content Areas Based on Positional Relationship of Screen Elements for Visual Regression Testing","authors":"Yuu Adachi, Haruto Tanno, Yu Yoshimura","doi":"10.1109/COMPSAC48688.2020.000-1","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.000-1","url":null,"abstract":"There are areas on an application screen where the content changes every time the screen is displayed such as advertisements and news articles (hereafter, dynamic content areas). When there are dynamic content areas, many differences in false positive are detected in Visual Regression Testing. Such differences due to dynamic content areas prevent the tester from efficiently checking the important differences. Therefore, specifying a dynamic content area as a masked area and excluding it from the comparison area is effective for reducing the human effort required to confirm these differences. We propose a method of accurately specifying the area to be masked based on the relative positional relationship of multiple screen elements and excluding dynamic content areas from the comparison area.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Agent Program in an IoT System to Recommend Plans of Activities to Minimize Childhood Obesity 物联网系统中的代理程序推荐活动计划以减少儿童肥胖
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-181
Lucas Vieira Alves, Rodrigo Teixeira de Melo, L. Costa, C. Rocha, Eriko Araujo, G. Campos, J. Souza
{"title":"An Agent Program in an IoT System to Recommend Plans of Activities to Minimize Childhood Obesity","authors":"Lucas Vieira Alves, Rodrigo Teixeira de Melo, L. Costa, C. Rocha, Eriko Araujo, G. Campos, J. Souza","doi":"10.1109/COMPSAC48688.2020.0-181","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-181","url":null,"abstract":"Overweight and obesity in children is a recognized worldwide epidemic. They are associated with several current and future chronic diseases. OCARIoT is a joint EU-Brazil joint that aims to develop a sophisticated, noninvasive, unobtrusive, personalized IoT system to detect and normalize the behaviors that put a child at risk of developing obesity or eating disorders. In a recent written work, we proposed the design of an agent-based approach to recommend individual physical and food-related activities, based on data collected from wearable devices. In this paper, we present the design of an expanded approach that, in addition to recommendations for individual activities, should recommend activity plans, i.e., sequences of activities organized to minimize childhood obesity. The first results with the extended version were very promising. During the experiments, the selected individual activities and sequences of activities organized by the approach proved to be effective in conducting children, with different profiles and initial states, to the desired states of various attributes associated with childhood obesity.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an Architecture for Customizable Drones 迈向可定制无人机的架构
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00019
Mahmoud Hussein, R. Nouacer
{"title":"Towards an Architecture for Customizable Drones","authors":"Mahmoud Hussein, R. Nouacer","doi":"10.1109/COMPSAC48688.2020.00019","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00019","url":null,"abstract":"Drones/UAVs are able to carry out air operations which are difficult to be performed by manned aircrafts. In addition, their use brings significant economic savings and environmental benefits, while reducing risks to human life. However, current generation of embedded drone architectures consist of loosely coupled sub-systems that run in dedicated monolithic platforms. Therefore, this approach reaches its limits when the demand of autonomy increases and when the weight, volume, and power consumption of the dedicated sub-systems encounter the drone restrictions. To overcome these limitations, we, in this paper, propose a modular architectural approach inspired from the very famous three-layered architecture within the mobile robots' domain. Our architecture separates the different system's concerns into three layers: control, flight management, and planning. Thus, each architecture layer can be evolved/customized separately without affecting the other layers. To ensure the applicability of our architecture, we have applied it to a drone system used for a rescue scenario.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信