{"title":"Identifying Core Objects for Trace Summarization Using Reference Relations and Access Analysis","authors":"Kunihiro Noda, Takashi Kobayashi, Tatsuya Toda, Noritoshi Atsumi","doi":"10.1109/COMPSAC.2017.142","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.142","url":null,"abstract":"Behaviors of an object-oriented system can be visualized as reverse-engineered sequence diagrams from execution traces. This approach is a valuable tool for program comprehension tasks. However, owing to the massiveness of information contained in an execution trace, a reverse-engineered sequence diagram is often afflicted by a scalability issue. To address this issue, we present in this paper a method for identifying core objects for trace summarization by reference relations and access analysis. We detect and eliminate temporary objects that are trivial for a system, and then estimate the importance of non-trivial objects. By grouping objects with a focus on highly important ones (i.e., core objects), we visualize the system's behavior in terms of intergroup interactions. Consequently, we obtain a readable size of a reverse-engineered sequence diagram containing the system's key behavior. We implemented our technique in our tool and evaluated it by using traces from open-source software systems. The results showed that our reverse-engineered sequence diagrams contained only less than 30 lifelines, whereas the original diagrams (no abstraction methods were applied) contained approximately 1,000 to 3,000 lifelines. Our proposed method achieved significant reduction of the horizontal size of the diagram and is expected to be a valuable tool for program comprehension.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"5 1","pages":"13-22"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74374279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Zhou, Jianqiang Li, Jijiang Yang, Qing Wang, W. Qiu, Shi Chen, Minhua Lu
{"title":"Identify Biological Modules and Hub MiRNAs for Oral Squamous Cell Carcinomas","authors":"D. Zhou, Jianqiang Li, Jijiang Yang, Qing Wang, W. Qiu, Shi Chen, Minhua Lu","doi":"10.1109/COMPSAC.2017.141","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.141","url":null,"abstract":"Oral squamous cell carcinomas (OSCC) is the most common head and neck cancer worldwide, with more than 300,000 new cases being diagnosed annually. Studies have shown that miRNAs are involved in the process of growth, differentiation, apoptosis, invasion and metastasis of OSCC tumor cells. How miRNAs work together to contribute to this process is still largely unknown. The goal of our study was to characterize the coexpression network of miRNAs and to identify the miRNA subnetworks (modules) that were significantly associated with the OSCC cancer status. We also searched hub miRNAs that might play a vital role in the development of OSCC. We applied the weighted gene co-expression network analysis (WGCNA) to the miRNA expression profile data from a paired design study contributed by Shiah et al. To account for the within-pair correlation, a linear mixed model (LMM) was constructed to test the associations of miRNA modules to cancer status. Two significant modules (turquoise module with 254 miRNAs and grey module with 309 miRNAs) were identified. The miRNA miR-let-7c was the hub miRNA in the turquoise module in terms of node degree. Finally, we used miRsystem to perform the target gene prediction and KEGG pathway enrichment analysis of miRNAs within the two modules. Interestingly, the two modules have similar sets of target genes so that the top 6 enriched KEGG pathways for the 2 modules were the same. Compared with the probe-wise test used by Shiah et al., we took the network approach and identified significant OSCC-associated miRNA modules, which could help uncover the mechanism that miRNAs interplay each other to contribute to OSCC.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"36 1","pages":"199-203"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82040449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GenLog: Accurate Log Template Discovery for Stripped X86 Binaries","authors":"Maosheng Zhang, Ying Zhao, Zengmingyu He","doi":"10.1109/COMPSAC.2017.137","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.137","url":null,"abstract":"Log analysis plays an important role for computer failure diagnosis. With the ever increasing size and complexity of logs, the task of analyzing logs has become cumbersome to carry out manually. For this reason, recent research has focused on automatic analysis techniques for large log files. However, log messages are texts with certain formats and it is very challenging for automatic analysis to understand the semantic meanings of log messages. The current state-of-the-art approaches depend on the quality of observed log messages or source code producing these log messages. In this paper, we propose a method GenLog that can extract log templates from stripped executables (neither source code nor debugging information need to be available). GenLog finds all log related functions in a binary through a combined bottom-up and top down slicing method, reconstructs the memory buffers where log messages were constructeStripped X86 Binaries d, and identifies components of log messages using data flow analysis and taint propagation analysis. GenLog can be used to analyze large binary code, and is suitable for commercial off-the-shelf (COTS) software or dynamic libraries. We evaluated GenLog on four X86 executables and one of them is Nginx. The experiments show that GenLog can identify the template for log messages in testing log files with a precision of 99.9%.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"24 1","pages":"337-346"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84365160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashalatha Kunnappilly, Alexandru Sorici, I. Awada, I. Mocanu, C. Seceleanu, A. Florea
{"title":"A Novel Integrated Architecture for Ambient Assisted Living Systems","authors":"Ashalatha Kunnappilly, Alexandru Sorici, I. Awada, I. Mocanu, C. Seceleanu, A. Florea","doi":"10.1109/COMPSAC.2017.28","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.28","url":null,"abstract":"The increase in life expectancy and the slumping birth rates across the world result in lengthening the average age of the society. Therefore, we are in need of techniques that will assist the elderly in their daily life, while preventing their social isolation. The recent developments in Ambient Intelligence and Information and Communication Technologies have facilitated a technological revolution in the field of Ambient Assisted Living. At present, there are many technologies on the market that support the independent life of older adults, requiring less assistance from family and caregivers, yet most of them offer isolated services, such as health monitoring, reminders etc, moreover none of current solutions incorporates the integration of various functionalities and user preferences or are formally analyzed for their functionality and quality-of-service attributes, a much needed endeavor in order to ensure safe mitigations of potential critical scenarios. In this paper, we propose a novel architectural solution that integrates necessary functions of an AAL system seamlessly, based on user preferences. To enable the first level of the architecture's analysis, we model our system in Architecture Analysis and Design Language, and carry out its simulation for analyzing the end-to-end data-flow latency, resource budgets and system safety.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"2 1","pages":"465-472"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80422747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peng Li, Lei Liu, Jing Xu, Hongji Yang, Liying Yuan, Chenkai Guo, Xiujuan Ji
{"title":"Application of Hidden Markov Model in SQL Injection Detection","authors":"Peng Li, Lei Liu, Jing Xu, Hongji Yang, Liying Yuan, Chenkai Guo, Xiujuan Ji","doi":"10.1109/COMPSAC.2017.64","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.64","url":null,"abstract":"Due to the increasing complexity of web and client application's structure, security problem has become more and more critical. Among all the threats reported, SQL Injection Attacks (SQLIAs) have always been top-ranked in recent years, and network logs, which are very important for the detection of SQLIA, are often utilized to analyze the user's attacking behaviors. However, the collection of network logs is often compromised due to the growing complexity of network structure, leading to a great challenge to the log-based SQLIA detection. In view of this, this paper proposes a novel approach to the detection of SQLIA based on log analyzing with Hidden Markov Model (HMM), combined with statistical characteristic and feature matching. At first, we build browsing behavior models of attackers and legal users. Furthermore, we use HMM to restore user's browsing procedure from the customised user logs. Finally, the method detects SQLIAs by analyzing the behavior of users in reality, without requiring sensitive information submitted by users. Our experiments show that the proposed method can detect possible SQLIAs and identify malicious users effectively, and has higher accuracy in comparison with the Kmeans method.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"24 1","pages":"578-583"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81415740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State-Based Tests Suites Automatic Generation Tool (STAGE-1)","authors":"H. Khalil, Y. Labiche","doi":"10.1109/COMPSAC.2017.221","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.221","url":null,"abstract":"State diagrams are widely used to model software artifacts, making state-based testing an interesting research topic. When conducting research on state-based testing for evaluating different testing criteria, often there is a need to devise numerous test suites in a systematic way according to selection criteria such as all-edges, all-transition-pairs, or the transition tree (W-method). Moreover, one also needs to satisfy each criterion in as many ways as possible to account for possible stochastic phenomena within each criterion. The main issue is then: how to automate the generation of as many, or even all, the different test suites for each criterion? This paper presents the first part of a framework, an automation tool chain that generates test trees from a state machine diagram, extracts test cases from the generated trees, and composes a test suite from each generated tree. This tool is the first to generate all possible distinctive trees using depth and breadth first graph traversal algorithms. The tool chain should be of interest to researchers in state-based testing as well as practitioners who are interested in alternative adequate test suites especially for comparing the effectiveness of the different test suites satisfying one criterion and the effectiveness of the other different criteria.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"30 1","pages":"357-362"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78861585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualization Method Using Probe Bicycle to Analyze Bicycle Rider’s Control Behavior","authors":"R. Takahashi, Kazuki Miki, S. Kaneda","doi":"10.1109/COMPSAC.2017.263","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.263","url":null,"abstract":"A bicycle is a useful vehicle in our daily lives, and requires characteristic techniques such as steering control at a constant speed. Since bicycles are commonly used like cars, analyzing their operating condition is essential. Nevertheless, there is little previous research that has succeeded in designing a low-cost method to analyze the operating condition. In the current study, we present a more reasonable model of the visualization of bicycle control behavior using two-dimensional (2-D) plots. In the model, four steps are taken: 1) acquire sensor information from the bicycle, 2) calculate the movement trajectory of the front and rear wheels using the bicycle equations, 3) derive the rotation center, and 4) extract the 2-D plots. As a result, it was possible to visually anticipate 1) a rider's control from the curvature center and trajectory of the front-wheel and 2) the actual behavior and its quality from the rear-wheel. Since it requires accurate speed, steering angle, and body tilt angle to calculate the movement trajectory, we designed a special probe bicycle that could directly obtain these parameters. By using this probe bicycle, four points were clarified. 1) At turning, the bicycle rider sets a target turning center, which is the center of turning. 2) An I-shaped rotation center trajectory appears when the bicycle is going straight, and a V-shaped rotation center locus appears when turning. 3) The distribution trend of the curvature center differs greatly between the front and rear wheels. 4) The quality of turn can be evaluated by the distribution trend. The 2-D plots enabled us to observe the quality of the rider's control like an X-ray.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"40 3 1","pages":"360-365"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82842813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Standardizing the Crowdsourcing of Healthcare Data Using Modular Ontologies","authors":"Hengyi Hu, L. Kerschberg","doi":"10.1109/COMPSAC.2017.220","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.220","url":null,"abstract":"Crowdsourcing data is an essential part of information collection in healthcare. Patient data serves as the foundation for creating healthcare policy, creating new pharmaceuticals, and determining treatment. In this paper, we propose a novel conceptual method of standardizing and classifying the crowdsourcing of healthcare data using modular ontologies, authoritative medical ontologies (AMOs) and other sources. A modular ontology can be constructed to guide data collection for specific aspects of an illness. We will examine this conceptual approach for patients of depression. This will be done by finding association rules in a pre-existing National Institutes of Mental Health (NIMH)'s study on Sequenced Treatment Alternatives to Relieve Depression (STAR*D) patient dataset, and standardized medical terminology found in the Medical Dictionary for Regulatory Activities Terminology (MedDRA) ontology. We will also use classification knowledge from Diagnostic and Statistical Manual of Mental Disorders (DSM-5). Our conceptual method will ensure that newly crowdsourced data can be used to confirm and improve upon the accuracy of previously known symptom associations.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"1 1","pages":"107-112"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86497941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Test-First Programming: Assessment and Solutions","authors":"Marcello Missiroli, Daniel Russo, P. Ciancarini","doi":"10.1109/COMPSAC.2017.229","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.229","url":null,"abstract":"Developing high quality software is a major industry concern, since programs that \"just work\" may not be suitable to contemporary technological challenges. Agile practices, such as Test-First development (TFD), may help in this direction. However, in our experience this technique is introduced late (if ever), when programmers' habits are already set and difficult to change. Early exposure to TFD in formal education could be an answer to that, but putting the principle into practice poses unexpected challenges. In this work we examine the short-and long-term impact of young programmers' exposure to TFD, highlighting its limits and proposing a reinforced teaching approach.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"37 1","pages":"420-425"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88038847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elena Baralis, Luca Cagliero, L. Farinetti, M. Mezzalama, Enrico Venuto
{"title":"Experimental Validation of a Massive Educational Service in a Blended Learning Environment","authors":"Elena Baralis, Luca Cagliero, L. Farinetti, M. Mezzalama, Enrico Venuto","doi":"10.1109/COMPSAC.2017.123","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.123","url":null,"abstract":"New information and communication technologies offer today many opportunities to improve the quality of educational services in universities and in particular they allow to design and implement innovative learning models. This paper describes and validates our university blended learning model, and specifically the massive educational video service that we offer to our students since 2010. In these years, we have gathered a huge amount of detailed data about the students' access to the service, and the paper describes a number of analyses that we carried out with these data. The common goal was to find out experimentally whether the main objectives of the educational video service we had in our mind when we designed it, namely appreciation, effectiveness and flexibility, were reflected by the users' behavior. We analyzed how many students used the service, for how many courses, and how many videos they accessed within a course (appreciation of the service). We analyzed the correlation between the use of the service and the performance of the students in terms of successful examination rate and average mark (effectiveness of the service). Finally, by using data mining techniques we profiled users according to their behavior while accessing the educational video service. We found out six different patterns that reflect different uses of the services matching different learning goals (flexibility of the service). The results of these analyses show the quality of the proposed blended learning model and the coherency of its implementation with respect to the design goals.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"16 1","pages":"381-390"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87975827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}