2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)最新文献

筛选
英文 中文
Interest ACK: A Fast Packet Loss Detection Mechanism for Content-Centric Networking 兴趣ACK:一种面向内容中心网络的快速丢包检测机制
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.154
Tsuyoshi Yabuuchi, Ryo Nakamura, H. Ohsaki
{"title":"Interest ACK: A Fast Packet Loss Detection Mechanism for Content-Centric Networking","authors":"Tsuyoshi Yabuuchi, Ryo Nakamura, H. Ohsaki","doi":"10.1109/COMPSAC.2017.154","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.154","url":null,"abstract":"Recently, Content-Centric Networking (CCN) has been extensively studied by networking researchers as one of the promising network architectures for realizing information-centric networks. CCN adopts a fundamentally different communication paradigm from that of the conventional Internet Protocol (IP). Therefore, advanced transport protocols developed for IP cannot be directly used in CCN. In this paper, we propose a packet loss detection mechanism called Interest ACKnowledgement (ACK). Interest ACKs provides information on the history of successful Interest packet receptions at a repository (i.e., content provider), this information is conveyed to the corresponding entity (i.e., content consumer) via the header of Data packets. Interest ACKs enable the entity to quickly and accurately detect Interest and Data packet losses in the network. We conduct simulations to investigate the effectiveness of Interest ACKs in a rather simple network topology. Our results show that Interest ACKs are effective for improving the adaptability, stability, and fairness of CCN with window-based flow control and that packet losses at the repository can be reduced by 10%–20%.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"71 1","pages":"13-18"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85916585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition 在安全接口组合中加强基于广义细化的不干扰
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.118
Cong Sun, Ning Xi, Jianfeng Ma
{"title":"Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition","authors":"Cong Sun, Ning Xi, Jianfeng Ma","doi":"10.1109/COMPSAC.2017.118","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.118","url":null,"abstract":"Information flow security has been considered as a critical requirement on complicated component-based software. The recent efforts on the compositional information flow analyses were limited on the expressiveness of security lattice and the efficiency of compositional enforcement. Extending these approaches to support more general security lattices is usually nontrivial because the compositionality of information flow security properties should be properly treated. In this work, we present a new extension of interface automaton. On this interface structure, we propose two refinement-based security properties, adaptable to any finite security lattice. For each property, we present and prove the security condition that ensures the property to be preserved under composition. Furthermore, we implement the refinement algorithms and the security condition decision procedure. We demonstrate the usability and efficiency of our approach with in-depth case studies. The evaluation results show that our compositional enforcement can effectively reduce the verification cost compared with global verification on composite system.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"41 1","pages":"586-595"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86246598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incremental Learning from Multi-level Monitoring Data and Its Application to Component Based Software Engineering 多级监控数据的增量学习及其在构件软件工程中的应用
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/compsac.2017.148
S. Taherizadeh, V. Stankovski
{"title":"Incremental Learning from Multi-level Monitoring Data and Its Application to Component Based Software Engineering","authors":"S. Taherizadeh, V. Stankovski","doi":"10.1109/compsac.2017.148","DOIUrl":"https://doi.org/10.1109/compsac.2017.148","url":null,"abstract":"Many new Internet of Things (IoT) applications such a disaster early warning systems, video-streaming, automated driving and similar, are increasingly being built by using advanced component based software engineering approaches. Software components can include various executable images, such as container or Virtual Machine images, scripts and others. Achieving adequate Quality of Service (QoS) for such applications is still a challenging issue due to runtime variations in running conditions intrinsic to the cloud, edge and fog environments. These types of systems should therefore be continuously monitored and hence adapted at various levels including infrastructure, container and application levels. In this work, we present an adaptation method using a new Incremental Learning approach based on Multi-Level Monitoring data. The method dynamically generates a set of rules representing a performance prediction model that allow us to find potential performance bottlenecks and then propose suitable application adaptation actions. Adaptation possibilities in this work include (1) live-migration of application components (such as containers) from the current infrastructure to another one with different characteristics, such as CPU, memory, disk or bandwidth capacity, and (2) dynamic horizontal or vertical scaling of container-based application instances to offer better fitted resource capacities.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"29 1","pages":"378-383"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80067411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cloud Adapted Workflow e-Assessment System: Cloud-AWAS 云适应工作流电子评估系统:Cloud- awas
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.86
Fahima Hajjej, Y. Hlaoui, Leila Jemni Ben Ayed
{"title":"Cloud Adapted Workflow e-Assessment System: Cloud-AWAS","authors":"Fahima Hajjej, Y. Hlaoui, Leila Jemni Ben Ayed","doi":"10.1109/COMPSAC.2017.86","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.86","url":null,"abstract":"In this paper, we present an approach to adapt the e-assessment workflow by considering learner's profiles. We have started by creating a learner profile ontology based on extraction data from e-assessment activities, file log and personal information. Then, we have defined three adaptation actions: Add Activity, Edit Activity and Delete Activity, applied on the workflow assessment and using information extracted from learner profile ontology instances. Each action is applied according to conditions. After that, we present some results of the empirical evaluation of our system.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"158 1","pages":"438-447"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76816503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the EATA 2017 Co-Chairs 2017年EATA联合主席致辞
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.293
A. Hurson, Hiroyuki Sato
{"title":"Message from the EATA 2017 Co-Chairs","authors":"A. Hurson, Hiroyuki Sato","doi":"10.1109/COMPSAC.2017.293","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.293","url":null,"abstract":"EATA introduction","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"93 1","pages":"887-887"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83883569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semantic Extraction and Sentimental Assessment of Risk Factors (SESARF): An NLP Approach for Precision Medicine: A Medical Decision Support Tool for Early Diagnosis from Clinical Notes 语义提取和风险因素情感评估(SESARF):精准医学的NLP方法:从临床记录中进行早期诊断的医疗决策支持工具
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.34
S. Sabra, Khalid Mahmood, Mazen Alobaidi
{"title":"A Semantic Extraction and Sentimental Assessment of Risk Factors (SESARF): An NLP Approach for Precision Medicine: A Medical Decision Support Tool for Early Diagnosis from Clinical Notes","authors":"S. Sabra, Khalid Mahmood, Mazen Alobaidi","doi":"10.1109/COMPSAC.2017.34","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.34","url":null,"abstract":"Clinical notes contain information that is crucial for the diagnosis process. However, it is usually not properly manually analyzed due to the tremendous efforts and time it takes. Hence, an automated approach is eagerly needed to maximize clinical knowledge management and reduce cost. In this paper, we propose a framework SESARF: a Semantic Extractor to identify hidden risk factors in clinical notes and a Sentimental Analyzer to assess the severity levels associated with the identified Risk Factors. This tool can be customized to any disease using Linked Open Data (LOD) by selecting a specific disease and collecting its risk factors list from medical ontologies. The extracted knowledge can serve two purposes: 1) a feature vector is prepared, for any classifier in machine learning, containing risk factors and their weights based on our semantic enrichment and sentimental analyzer and 2) a proper comparison of the extracted information with wearable body sensors that can alert any major changes in a patient's health status to personalize treatment.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"234 1","pages":"131-136"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88385730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combining Neutron and OpenDaylight for Management of Networking 结合Neutron和OpenDaylight实现网络管理
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.89
Lu Wang, H. Ruan, Hua Li, Qi Liu
{"title":"Combining Neutron and OpenDaylight for Management of Networking","authors":"Lu Wang, H. Ruan, Hua Li, Qi Liu","doi":"10.1109/COMPSAC.2017.89","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.89","url":null,"abstract":"Its obviously that OpenStack provides the biggest Cloud Computing platform. However the virtualization network service of Neutron, one module of OpenStack for network management, it can only realize simple management of networking, and Neutron which is based on SDN spirit also has defects in complexity of operation, more or less the uncontrollability of Neutron flows. The SDN paradigm is a perfect choice for vendors to deeply and quickly solve the difficulties of networking management. OpenDaylight is the largest open source SDN controller, with centralized control of network which brings great benefit for user's experience. In this paper, at first we define the requirement format for users and automatically deploy the basic network and services, and we conclude the universal framework and procedure of combining Neutron and OpenDaylight, and then we introduce our effort that applying plugins to create network by combining Neutron and OpenDaylight, what's more we solve the problem that controllability of Neutron flow and isolation of network with OpenDaylight. Finally, with the urgent requirement of small enterprise or campus, we realize the automatic deployment of services which deeply reduce the time of deployment and configuration.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"53 1","pages":"457-462"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91534322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SNS Agency Robot for Elderly People Using External Cloud-Based Services 使用外部云服务的SNS老年人代理机器人
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.216
Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai
{"title":"SNS Agency Robot for Elderly People Using External Cloud-Based Services","authors":"Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai","doi":"10.1109/COMPSAC.2017.216","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.216","url":null,"abstract":"We propose a SNS Agency Robot that can be used for the interactive communication between elderly people and younger generation via existing Social Networking Service (SNS). This robot system has been implemented on a cloud service and a single board computer embedded in a human-type robot, which is equipped with a microphone, camera, speaker, sensors, and network access function, so that elderly people can transmit and receive information by voice via SNS without using smartphones. We employed LINE that is a proprietary application for instant communications on electronic devices such as smartphones. In LINE, we need to select a message destination address before sending messages. On the other hand, our proposed robot is basically operated by voice due to realizing the simple user interface. Therefore, we proposed a message exchange learning-type destination estimation method that enables elderly people not to express a message destination address explicitly. We developed the prototype system including the message exchange learning-type destination estimation method. Then, we confirmed the effectiveness of the message destination estimation through the demonstration experiment at the house for the elderly with the care service.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"32 1","pages":"908-913"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87213768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New Strategies for Selecting Reuse Candidates on Automated Program Repair 自动程序修复中选择重用候选项的新策略
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.175
Akito Tanikado, Haruki Yokoyama, Masahiro Yamamoto, S. Sumi, Yoshiki Higo, S. Kusumoto
{"title":"New Strategies for Selecting Reuse Candidates on Automated Program Repair","authors":"Akito Tanikado, Haruki Yokoyama, Masahiro Yamamoto, S. Sumi, Yoshiki Higo, S. Kusumoto","doi":"10.1109/COMPSAC.2017.175","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.175","url":null,"abstract":"Automated program repair (in short, APR) is a truly desired technique because it can reduce debugging costs drastically. A well-known technique in APR is a reuse-based approach, which inserts existing program statements in a given program to suspicious code for an exposed bug. Some reports show the reuse-based approach was able to fix many bugs in open source software. However, the existing approach often takes very long time to fix bugs. Its main factor is that so many variant programs are generated by insertions and so many test cases are executed for the variant programs before a fixed program is generated. In order to shorten fixing time with the reuse-based approach, a fixed program must be generated much more efficiently. In this paper, we propose two strategies to generate a fixed program more efficiently. We also implement the two strategies and confirm that there are real bugs which the two strategies contribute to shortening fixing time.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"4 1","pages":"266-267"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91100048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Approach to Proving Proof Obligation of Hybrid Event B Based on Differential Invariants 基于微分不变量的混合事件B证明义务的证明方法
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-01 DOI: 10.1109/COMPSAC.2017.52
Jie Liu, Jing Liu, Miaomiao Zhang, Haiying Sun, Xiaohong Chen, Dehui Du, Mingsong Chen
{"title":"An Approach to Proving Proof Obligation of Hybrid Event B Based on Differential Invariants","authors":"Jie Liu, Jing Liu, Miaomiao Zhang, Haiying Sun, Xiaohong Chen, Dehui Du, Mingsong Chen","doi":"10.1109/COMPSAC.2017.52","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.52","url":null,"abstract":"For modelling hybrid systems, we have extended Event B based on its framework with the differential event. The differential event describes continuous behaviors of hybrid systems by differential equations and evolution constraint, whose proof obligations provide dynamical properties of a model. In order to ensure the safety and reliability of a model, proof obligations should be proved. It is difficult to prove proof obligation in state space, because there is no a complete method to solve differential equations in the field of mathematics. Thus we proposed an approach to proving proof obligation based on differential invariants. It is to avoid uncontrollable computation on solving differential equation. The main result is that we prove some theorems for proving proof obligations involving differential events within the framework of refinement calculus. Lastly, through the case of the Train Control System, we further show that the approach is well suited.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"6 1","pages":"138-143"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88711060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信