2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)最新文献

筛选
英文 中文
On-Demand Barrier-Free Street View System Using Sensor Information from General-Purpose Wheelchair Users 使用通用轮椅使用者传感器信息的按需无障碍街景系统
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.279
Kenichi Arai, Takuya Tateishi, Toru Kobayashi, N. Sonehara
{"title":"On-Demand Barrier-Free Street View System Using Sensor Information from General-Purpose Wheelchair Users","authors":"Kenichi Arai, Takuya Tateishi, Toru Kobayashi, N. Sonehara","doi":"10.1109/COMPSAC.2017.279","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.279","url":null,"abstract":"There are many obstacles for wheelchair users outside. These items are not an issue for people without physical impairment, but are major obstacles for wheelchair users. Due to these obstacles, wheelchair users may feel anxiety besides familiar paths, leading to less desire to go outside. In this study, we propose a system for collecting social barrier-free information from the various sensors attached to general-purpose wheelchairs and constantly feeding back the latest barrier-free street view information to wheelchair users, that is to say an “on-demand barrier-free street view system.” With this system, wheelchair users can confirm safe routes using the street view; thus, their range of movement can be increased. Furthermore, shared road information is information that was gathered by wheelchair users; therefore, it is a verification that the path is actually passable with a wheelchair. It provides a feeling of security for wheelchair users to go out. In this paper, we show the results of an evaluation experiment using this system.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"50 1","pages":"348-353"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90709159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data-Oriented Instrumentation against Information Leakages of Android Applications 针对Android应用程序信息泄漏的面向数据的检测
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.97
Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma
{"title":"Data-Oriented Instrumentation against Information Leakages of Android Applications","authors":"Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma","doi":"10.1109/COMPSAC.2017.97","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.97","url":null,"abstract":"As one of the most prominent threat, information leakages usually take sensitive data from some private sources and improperly release the data through malicious or misused method invocations and intercommunications. As a countermeasure against this threat, a number of detection approaches have been developed based on static analysis, esp. taint analysis. But we still have not reached a satisfactory solution to the patching and mitigation against this threat. In this paper, we propose an approach to automatically instrument malicious Android applications with cryptographic primitives and data randomization. With the help of an off-the-shelf taint analyzer, we detect the parts of code that might leak private information. In order to mitigate these information leakages, the standard cipher transformations and randomization are used to enforce different security policies according to the positions of related information sinks and intermediate system calls along malicious flow paths. The evaluation on different benchmark suites and real-world applications demonstrates that our approach can avoid false positives and mitigate around 91% information leakages in real applications, with acceptable cost on analysis and instrumentations affordable by desktops.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"23 1","pages":"485-490"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73787226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using MDA to Automate the Integration of Virtual Platforms for System-Level Simulation 利用MDA自动化集成系统级仿真的虚拟平台
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.259
D. Perillo, M. Natale
{"title":"Using MDA to Automate the Integration of Virtual Platforms for System-Level Simulation","authors":"D. Perillo, M. Natale","doi":"10.1109/COMPSAC.2017.259","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.259","url":null,"abstract":"This paper presents the work performed at (removed for blind review) to automate the integration of virtual systems development (VSD) and simulation in its embedded software development process. The approach is based on a combination of metamodels, model transformations and design patterns, the SysML standard and the use of the open source Eclipse framework. The purpose is to derive all the design refinements, including the production code and the code used for simulation and verification from a single set of SysML models. Stereotypes and model transformations are defined to allow the integration of automatically generated interfaces and manually produced code implementing virtual platforms for the simulation of HW/SW heterogeneous systems on the SIMICS platform.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"30 1","pages":"268-277"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75186782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mediating Turf Battles! Prioritizing Shared Modules in Locating Multiple Features 调解地盘之争!共享模块在多特性定位中的优先级
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.167
Maaki Nakano, Kunihiro Noda, Shinpei Hayashi, Takashi Kobayashi
{"title":"Mediating Turf Battles! Prioritizing Shared Modules in Locating Multiple Features","authors":"Maaki Nakano, Kunihiro Noda, Shinpei Hayashi, Takashi Kobayashi","doi":"10.1109/COMPSAC.2017.167","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.167","url":null,"abstract":"Dynamic feature location techniques (DFLTs), which use execution profiles of scenarios that trigger a feature, are a promising approach to locating features in the source code. A sufficient set of scenarios is key to obtaining highly accurate results, however, its preparation is laborious and difficult in practice. In most cases, a scenario exercises not only the desired feature but also other features. We focus on the relationship between a module and multiple features that can be calculated with no extra scenarios, to improve the accuracy of locating the desired feature in the source code. In this paper, we propose a DFLT using the odds ratios of the multiple relationships between modules and features. We use the similarity coefficient, which is used in fault localization techniques, as a relationship. Our DFLT better orders shared modules compared with an existing DFLT. To reduce developer costs in our DFLT, we also propose a filtering technique that uses formal concept analysis. We evaluate our DFLT on the features of an open source software project with respect to developer costs and show that our DFLT outperforms the existing approach, the average cost of our DFLT is almost half that of the state-of-the-art DFLT.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"1 1","pages":"363-368"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73270299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Classification Oriented Spectrum Based Fault Localization 面向故障分类的基于谱的故障定位
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.125
Xiujing Liu, Yong Liu, Zheng Li, Ruilian Zhao
{"title":"Fault Classification Oriented Spectrum Based Fault Localization","authors":"Xiujing Liu, Yong Liu, Zheng Li, Ruilian Zhao","doi":"10.1109/COMPSAC.2017.125","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.125","url":null,"abstract":"The commonly-used software fault localization approaches mainly utilize test coverage information and test cases execution results to calculate the suspiciousness of each program entity to identify the location of faults, namely spectrum based software fault localization (SBFL). It had been argued that such techniques are not helpful in real debugging process, since the low accuracy of localization and few information provided to programmers. In this paper we consider the combination of statement based fault classification with the SBFL, aiming at increasing accuracy of fault localization and provide additional possible fault information to programmers. An improved technique, fault classification oriented SBFL (FC-SBFL), is proposed in this paper, in which the suspiciousness value is adjusted dynamically based on the probability of statement being faulty. Experimental results on real application programs show that FC-SBFL is more effective than SBFL to locate faults, and studies with Tarantula and OP2 show that more than 75% faults have been identified in a better effectiveness.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"39 1","pages":"256-261"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74902505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Empirical Comparison of Similarity Measures for Abstract Test Case Prioritization 抽象测试用例优先级相似度量的实证比较
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.271
Rubing Huang, Yunan Zhou, Weiwen Zong, D. Towey, Jinfu Chen
{"title":"An Empirical Comparison of Similarity Measures for Abstract Test Case Prioritization","authors":"Rubing Huang, Yunan Zhou, Weiwen Zong, D. Towey, Jinfu Chen","doi":"10.1109/COMPSAC.2017.271","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.271","url":null,"abstract":"Test case prioritization (TCP) attempts to order test cases such that those which are more important, according to some criterion or measurement, are executed earlier. TCP has been applied in many testing situations, including, for example, regression testing. An abstract test case (also called a model input) is an important type of test case, and has been widely used in practice, such as in configurable systems and software product lines. Similarity-based test case prioritization (STCP) has been proven to be cost-effective for abstract test cases (ATCs), but because there are many similarity measures which could be used to evaluate ATCs and to support STCP, we face the following question: How can we choose the similarity measure(s) for prioritizing ATCs that will deliver the most effective results? To address this, we studied fourteen measures and two popular STCP algorithms — local STCP (LSTCP), and global STCP (GSTCP). We also conducted an empirical study of five realworld programs, and investigated the efficacy of each similarity measure, according to the interaction coverage rate and fault detection rate. The results of these studies show that GSTCP outperforms LSTCP — in 61% to 84% of the cases, in terms of interaction coverage rates; and in 76% to 78% of the cases with respect to fault detection rates. Our studies also show that Overlap, the simplest similarity measure examined in this study, could obtain the overall best performance for LSTCP; and that Goodall3 has the best performance for GSTCP.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"371 1","pages":"3-12"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78444482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
xB+-Tree: Access-Pattern-Aware Cache-Line-Based Tree for Non-volatile Main Memory Architecture xB+-Tree:非易失性主存架构中基于访问模式的缓存行树
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.267
Li-Zheng Liang, Ming-Chang Yang, Yuan-Hao Chang, Tseng-Yi Chen, Shuo-Han Chen, H. Wei, W. Shih
{"title":"xB+-Tree: Access-Pattern-Aware Cache-Line-Based Tree for Non-volatile Main Memory Architecture","authors":"Li-Zheng Liang, Ming-Chang Yang, Yuan-Hao Chang, Tseng-Yi Chen, Shuo-Han Chen, H. Wei, W. Shih","doi":"10.1109/COMPSAC.2017.267","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.267","url":null,"abstract":"Non-volatile memory (NVM) has widely participated in the evolution of the next-generation memory architecture by way of being the substitution of the main memory. To cope with the problem of asymmetric read/write speeds of NVM, several excellent researches have been proposed to reduce the number of writes to the NVM-based main memory. Nevertheless, most of these existing approaches do not take the cache-line-based access behavior between the processor and the main memory into consideration. Thus, in order to essentially improve the access performance of the NVM-based memory architecture, this work aims to optimize the cache-line-based access performance over the NVM-based memory architecture based on the special access patterns in many popular internet of things (IoT) and in-memory database applications. Our experiments based on the well-known Gem5 full system simulator reveal that, compared to other existing representative approaches, the proposed design can effectively reduce the total execution time of insertion by 20.92~55.20% and improve the execution time of query by 2.06~23.36%.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"68 1","pages":"483-491"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79917605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Claimsware: A Claims-Based Middleware for Securing IoT Services 索赔软件:用于保护物联网服务的基于索赔的中间件
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.85
Vathalloor Merin George, Q. Mahmoud
{"title":"Claimsware: A Claims-Based Middleware for Securing IoT Services","authors":"Vathalloor Merin George, Q. Mahmoud","doi":"10.1109/COMPSAC.2017.85","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.85","url":null,"abstract":"The Internet of Things (IoT) is the ever-growing network of physical devices with IP addresses for Internet connectivity. Due to its ubiquitous nature and distributed architecture which includes devices, applications and humans, it presents a complex structure for security. Also, the incorporation of thousands of heterogeneous IoT devices with different characteristics into a single network creates the risk of security threats and privacy. This is where a middleware becomes significant. Middleware provides the platform services for various devices with different protocols to communicate with ease and provides all the functions intended for a particular task. Hosting these tasks as Microservices simplifies the job of an application developer. In this paper, we introduce Claimsware – a claims-based middleware for securing IoT services that are implemented as Microservices. The implemented prototype is evaluated in a local area network and in the cloud to test the feasibility of the framework. Performance results show the overhead of claims in local network and cloud.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"10 1","pages":"649-654"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79144745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Detecting Sex Offenders in Social Networks 对社交网络中性犯罪者的侦查
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.249
Sai K. Vallapu, T. Gamage
{"title":"Towards Detecting Sex Offenders in Social Networks","authors":"Sai K. Vallapu, T. Gamage","doi":"10.1109/COMPSAC.2017.249","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.249","url":null,"abstract":"This paper presents some preliminary work on detecting sex offenders who might register in social networks under assumed identities using data mining, string matching, and weight-biased scoring.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"10 1","pages":"113-118"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80992770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality Assessment of Interaction Techniques in Immersive Virtual Environments Using Physiological Measures 沉浸式虚拟环境中使用生理测量的交互技术质量评估
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.196
Rafael Rieder, C. H. Kristensen, M. Pinho
{"title":"Quality Assessment of Interaction Techniques in Immersive Virtual Environments Using Physiological Measures","authors":"Rafael Rieder, C. H. Kristensen, M. Pinho","doi":"10.1109/COMPSAC.2017.196","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.196","url":null,"abstract":"This paper presents a new methodology for quality assessment of interaction techniques in immersive virtual environments, based on the study of the relationships between physiological measures and usability metrics using multivariate data analysis. Our methodology defines a testing protocol, a normalization procedure and statistical techniques, considering the use of physiological measures during the evaluation process. A case study comparison between two 3D interaction techniques (ray-casting and HOMER) shows promising results, pointing to heart rate variability, as measured by the NN50 parameter, as a potential index of task performance. Besides, this study also shows that heart rate (HR) and skin conductance (SC) measures reflect the user's task performance during the interaction process. Despite these results, this work reveals that physiological measures still cannot be considered as substitutes of evaluation metrics for 3D interfaces, but may be useful in the interpretation and understanding process of them. Discussions also indicate the further studies are needed to establish guidelines for evaluation processes based on well-defined associations between human behaviors and human actions realized in 3D user interfaces.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"39 1","pages":"109-117"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84099888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信