2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)最新文献

筛选
英文 中文
A Situation-Centric Approach to Identifying New User Intentions Using the MTL Method 使用MTL方法识别新用户意图的情境中心方法
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.36
Jingwei Yang, Carl K. Chang, Ming Hua
{"title":"A Situation-Centric Approach to Identifying New User Intentions Using the MTL Method","authors":"Jingwei Yang, Carl K. Chang, Ming Hua","doi":"10.1109/COMPSAC.2017.36","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.36","url":null,"abstract":"Human factors have been increasingly recognized as one of the major driving forces of requirement changes. We believe that the requirements elicitation (RE) process should largely embrace human-centered perspectives, and this paper focuses on changing human intentions and desires over time. To support software evolution due to requirement changes, Situ framework has been proposed to model and detect human intentions by inferring their desires through monitoring environmental and human behavioral contexts prior to or after system deployment. Researchers have reported that Situ is able to infer users' desires with high accuracy using the Conditional Random Fields method. However, manual analysis is still needed for new intention identification and new requirements elicitation. This work attempts to find a computable way to identify users' new intentions with minimal help from human oracle. We discuss the feasibility of implementing the concept of DIKW (Data, Information, Knowledge, Wisdom) to bridge the gap between user behavioral & contextual data and requirements, and propose a situation-centric approach using the Multi-strategy, Task-adaptive Learning (MTL) method. A case study shows that the proposed approach is able to identify users' new intentions, and is especially effective to capture alternatives of low-level task.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"12 1","pages":"347-356"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81053862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Intelligent Tracking System: Application to Acute Respiratory Tract Infection (TrackARTI) 智能跟踪系统在急性呼吸道感染中的应用
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.58
Duygu Çelik Ertugrul, Atilla Elçi, Y. Bi̇ti̇ri̇m
{"title":"An Intelligent Tracking System: Application to Acute Respiratory Tract Infection (TrackARTI)","authors":"Duygu Çelik Ertugrul, Atilla Elçi, Y. Bi̇ti̇ri̇m","doi":"10.1109/COMPSAC.2017.58","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.58","url":null,"abstract":"This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to maximize the quality of life of the child patients and decrease parental anxiety by keeping the child under control during monitoring stage and achieve a proper distant diagnose by the patient's clinician. This is possible with the designs of intelligent M-Health systems that can be used for diagnosing and monitoring the child patients away from hospitals by presenting the instant medical data to their registered doctors. Intelligent M-Health systems require strong knowledge management technology and ease of extension to provide information from additional medical tools. With the contribution of intelligent M-Health systems, it is possible to infer new facts from the certain gathered medical data during examination from child patients. This article mentions an intelligent and easy medical data gathering system that can be used by pediatricians or parents any time. In addition, the system has its own inferencing mechanism that involves two main steps, inferencing on image processing and Semantic Web rule knowledge base.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"9 1","pages":"137-142"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88664600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cardinality Counting Circuit for Real-Time Abnormal Traffic Detection 用于实时异常流量检测的基数计数电路
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.81
Shuji Sannomiya, Akira Sato, K. Yoshida, H. Nishikawa
{"title":"Cardinality Counting Circuit for Real-Time Abnormal Traffic Detection","authors":"Shuji Sannomiya, Akira Sato, K. Yoshida, H. Nishikawa","doi":"10.1109/COMPSAC.2017.81","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.81","url":null,"abstract":"To resist the growth of abnormal traffic such as P2P, DDoS and Internet worms, this paper discusses a circuit design to realize real-time abnormal traffic detection from broadband networks. Real-time counting of cardinality is the key of the circuit. Although our previous study showed the effectiveness of cardinality counting to detect various abnormal traffic, the slowness of DRAM access prevented us from actually deploying the cardinality counting into backbone network. This paper shows that the use of self-timed pipeline circuit can realize a cardinality counting circuit that can handle up-to 100 Gbps networks by hiding the DRAM access latency.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"74 1","pages":"505-510"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80618473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Finding Extract Method Refactoring Opportunities by Analyzing Development History 通过分析开发历史发现提取方法重构的机会
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.129
Ayaka Imazato, Yoshiki Higo, Keisuke Hotta, S. Kusumoto
{"title":"Finding Extract Method Refactoring Opportunities by Analyzing Development History","authors":"Ayaka Imazato, Yoshiki Higo, Keisuke Hotta, S. Kusumoto","doi":"10.1109/COMPSAC.2017.129","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.129","url":null,"abstract":"Refactoring is an important technique to improve maintainability of software, and developers often use this technique during a development process. Before now, researchers have proposed some techniques finding refactoring opportunities for developers. Finding refactoring opportunities means identifying locations to be refactored. However, there are no specific criteria for developers to determine where they should refactor because the criteria differ from project to project and from developer to developer. In this study, we propose a technique to find refactoring opportunities in source code by using machine learning techniques. Machine learning techniques enable to flexibly find refactoring opportunities by the characteristics of target projects and developers. Our proposed technique learns information on the features of refactorings conducted in the past. Then, based on this information, it suggests some refactorings on given the source code to developers. We investigated three research questions with five open source projects. As a result, we confirmed that the proposed technique was able to find refactorings with high accuracy.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"2 1","pages":"190-195"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88132511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Feature Representation Extraction Method of Hotel Reviews Using Co-occurrence Restriction and Dependency Graph 基于共现约束和依赖图的酒店评论特征表示提取方法
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.126
Koji Tanaka, Koichi Tsujii, T. Ikoma, Akiyuki Sekiguchi, K. Tsuda
{"title":"Feature Representation Extraction Method of Hotel Reviews Using Co-occurrence Restriction and Dependency Graph","authors":"Koji Tanaka, Koichi Tsujii, T. Ikoma, Akiyuki Sekiguchi, K. Tsuda","doi":"10.1109/COMPSAC.2017.126","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.126","url":null,"abstract":"Hotel reviews posted on accommodation reservation websites are thought to be valuable information for selecting hotel accommodations and also expected to be used for marketing. Since hotel reviews are various in their expressions, it was necessary to make a thesaurus to obtain useful feature representations. Preparing a thesaurus, however, has problems such that it is laborious and requires occasional revisions. In addition, it is necessary to determine subjects of evaluation in advance and set up synonyms for them. Thus, the analysis of subjects not under consideration becomes difficult. In the present study, we first graphed impression comments using co-occurrence restrictions and dependency structures and then extracted feature representations by clustering the graphs. This enabled us to extract feature representations on evaluation from the impression comments in hotel reviews without setting up subjects of evaluation in advance and a thesaurus.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"52 1","pages":"619-624"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85306592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Cost Efficient Framework for Cloud-Based Machine Learning 基于云的机器学习自适应成本效益框架
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.42
Rezvan Pakdel, J. Herbert
{"title":"Adaptive Cost Efficient Framework for Cloud-Based Machine Learning","authors":"Rezvan Pakdel, J. Herbert","doi":"10.1109/COMPSAC.2017.42","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.42","url":null,"abstract":"Machine learning is an increasingly important form of cognitive computing, making progress in several application areas. Machine learning often involves big data sets and is computationally challenging, requiring efficient use of resources. The use of cloud computing as the platform for machine learning offers advantages of scalability and efficient use of hardware. It may, however, be difficult to provision appropriate cost-effective resources for a machine learning task. Our experiments have shown that there can be radical differences between different datasets and different algorithms on the same dataset. The cloud-based machine learning framework presented here aims to provide multiple levels of efficient use of resources and uses a high-level cost model to deal with overall cost-efficiency with respect to cloud service providers. The cost model allows evaluation of trade-offs and supports the choice of appropriate provider resources based on user-defined criteria. A user may choose to prioritize performance, prioritize cost or specify a cost-performance balance. An Amazon AWS cost model for instances is used to illustrate the practical benefits of using the approach - it is seen that large savings can be made by employing this job-specific monitoring and cost-performance analysis. The method can provide all the information for a comparison across different cloud service providers as well as comparisons across the Amazon AWS offerings.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"1 1","pages":"155-160"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89772755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Similarity-Based Approach to Recognizing Voice-Based Task Goals in Self-Adaptive Systems 基于相似性的自适应系统语音任务目标识别方法
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.35
Xiaobing Zhang, Qiliang Yang, Jianchun Xing, Deshuai Han, Ying Chen
{"title":"A Similarity-Based Approach to Recognizing Voice-Based Task Goals in Self-Adaptive Systems","authors":"Xiaobing Zhang, Qiliang Yang, Jianchun Xing, Deshuai Han, Ying Chen","doi":"10.1109/COMPSAC.2017.35","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.35","url":null,"abstract":"With the development of the natural language processing (NLP) technologies, users tend to directly input their goals via natural language to a task system. Thus, how to input informal voice-based task goals to self-adaptive systems (SASs) has become a challenge issue. Our previously proposed framework V-SFSA (voice-driven software fuzzy self-adaptation) can realize to input voice-based task goals to SAS. However, it still suffers from low efficiency of recognition. In this paper, in order to improve on our previous V-SFSA framework, we propose a similarity-based NLP approach to recognizing the voice-based task goals in SASs. It uses the verb of the raw voice inputs to preselect the semantic relevant commands, and then to compute the similarity between the preselected commands and predefined featured commands in a SAS. The command with the highest similarity score is accepted as the intended goals to drive a SAS. We establish the improved V-SFSA, and implement the algorithm of similarity-based fuzzy adaptation. In addition, we construct a prototype to conduct a case study. The result shows that our approach is effective.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"116 1","pages":"536-542"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89411951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Integrated Authentication Using Passwordless Authentication Method 基于无密码认证方法的集成认证研究
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.198
Michitomo Morii, Hiroki Tanioka, K. Ohira, M. Sano, Yosuke Seki, Kenji Matsuura, T. Ueta
{"title":"Research on Integrated Authentication Using Passwordless Authentication Method","authors":"Michitomo Morii, Hiroki Tanioka, K. Ohira, M. Sano, Yosuke Seki, Kenji Matsuura, T. Ueta","doi":"10.1109/COMPSAC.2017.198","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.198","url":null,"abstract":"Currently, authentication methods using ID and password are widely used and fulfilled central roles in various information systems and services. Our university also uses ID and password for authentication of most services. However, passwords have various problems such as reuse, phishing and leakage. This research is a practical experiment in order to implement an integrated authentication system without password. Shibboleth is introduced to our university, providing capabilities of web single sign-on and attribute exchange framework for organizational services. The Fast IDentity Online (FIDO) is adopted into Shibboleth as an external authentication, to realize passwordless authentication. Furthermore, we held a feasibility test of an integrated authentication system without password, and considered problems of the passwordless authentication method using FIDO.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"95 1","pages":"682-685"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77923914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Executable Domain-Specific Modelling Based on Domain Spaces 基于领域空间的可执行领域特定建模
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.122
Qing Duan, Junhui Liu, Dong-dai Zhou, Feng Yu, Hongji Yang
{"title":"Executable Domain-Specific Modelling Based on Domain Spaces","authors":"Qing Duan, Junhui Liu, Dong-dai Zhou, Feng Yu, Hongji Yang","doi":"10.1109/COMPSAC.2017.122","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.122","url":null,"abstract":"Domain-specific modelling is used to construct and realise the different application models upon the same specific domain for software reuse. The paper integrates domain-specific modelling and web service techniques with model-driven development, and proposes a unified approach named SODSMI (Service Oriented executable Domain-Specific Modelling and Implementation) to build the executable domain-specific model so as to achieve the target of model-driven development and reuse. The approach is organised by domain space, which is employed as the elementary unit of the domain-specific modelling and implementation framework. It makes software reuse at the domain level, realises the reuse of domain knowledge, and openly extends the range and scale of domain-specific model and its implementation.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"18 1","pages":"451-456"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78239542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Requirements Reuse by Implementing Traceability in Agile Development 通过在敏捷开发中实现可追溯性实现需求重用
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.250
R. Elamin, Rasha Osman
{"title":"Towards Requirements Reuse by Implementing Traceability in Agile Development","authors":"R. Elamin, Rasha Osman","doi":"10.1109/COMPSAC.2017.250","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.250","url":null,"abstract":"Requirements reusability within agile development improves software quality and team productivity. One method to implement requirements reusability is traceability, in which relations and dependencies between requirements and artifacts are identified and linked. In this paper, we propose a semiautomated methodology to implement traceability in the agile development process in order to achieve requirements reusability. The main feature of our methodology is the coupling of semi-automated semantic trace generation with the outputs of the agile development process, thus facilitating requirements and artifact reuse. In contrast to previous work, this methodology is specifically designed for practical agile processes and artifacts. Our methodology will be implemented as a component within an existing open source agile tool in order to have minimal impact on the development process. This paper fills a current gap in the area of requirements reusability through traceability and contributes to the limited existing work in agile traceability methodologies.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"13 1","pages":"431-436"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74740102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信