... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing最新文献
{"title":"Image retrieval: Research and use in the information explosion","authors":"Masashi Inoue","doi":"10.2201/NIIPI.2009.6.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.2","url":null,"abstract":"We surveyed the current research on the retrieval and utilization of images. This paper provides an overview of the difficulties and possibilities of technological or technology-related research topics resulting from the huge amount of images currently available and highlights some of the important research topics. We looked at the ongoing research activities and analyzed them from four aspects, information access and organization technology, the computing infrastructure that enables access to large-scale image resources, issues in human-system interaction and human factors related to using images, and the social aspect of image media. On the technical side, we noticed that as the number of digital images increases, so does the importance of the accuracy and scalability in relation to the image retrieval. The accuracy and scalability are in fact needed to cope with the current explosion in digital images. On the social side, not so long ago, image retrieval technologies were only experimental tools or used by experts within a limited domain. However, now the general public has access to a wide range of digital images, which means that image retrieval technologies are being used by various users in a large diversity of social contexts. Thus, as we show in this paper, the accuracy and scalability are not the only important factors in the era of information explosion, but that researchers must also be concerned with the social aspects of these technologies.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"11 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75257561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takeshi Tsuchiya, Hiroaki Sawano, Marc Lihan, H. Yoshinaga, K. Koyanagi
{"title":"A distributed information retrieval manner based on the statistic information for ubiquitous services","authors":"Takeshi Tsuchiya, Hiroaki Sawano, Marc Lihan, H. Yoshinaga, K. Koyanagi","doi":"10.2201/NIIPI.2009.6.8","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.8","url":null,"abstract":"We propose and clarify the manner in which a distributed information retrieval (IR) is conducted using a Peer-to-Peer (P2P) technology that has approximately the same accuracy as a current index-integrated search engine with the statistical information calculated from the contents. We need to solve the following three problems to develop distributed IR services that use statistic information. The first one is the manner of the calculation of the statistic information from all the contents and then generating the manner of the indices using the collaboration among distributed peers (nodes). The second problem is the efficiency of the index distribution on the logical space collaborated by the peers which is named the MultipleRing. The last problem is having efficient IR strategies that are highly accurate. We discuss the relationship between the propagation time for generating the statistics information and the system scalability by using simulations and emulations to evaluate the results. Our proposed system is suitable for flexible IR services that use the content environment of small to mid-scale networks such as those in an office.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"12 1","pages":"63-77"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82118838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Buildingweb page collections efficiently exploiting local surrounding pages","authors":"Yuxin Wang, K. Oyama","doi":"10.2201/NIIPI.2009.6.4","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.4","url":null,"abstract":"This paper describes a method for building a high-quality web page collection with a reduced manual assessment cost that exploits local surrounding pages. Effectiveness of the method is shown through experiments using a researcher’s homepage as an example of the target categories. The method consists of two processes: rough filtering and accurate classification. In both processes, we introduce a logical page group structure concept that is represented by the relation between an entry page and its surrounding pages based on their connection type and relative URL directory level, and use the contents of local surrounding pages according to that concept. For the first process, we propose a very efficient method for comprehensively gathering all potential researchers’ homepages from the web using property-based keyword lists. Four kinds of page group models (PGMs) based on the page group structure were used for merging the keywords from the surrounding pages. Although a lot of noise pages are included if we use keywords in the surrounding pages without considering the page group structure, the experimental results show that our method can reduce the increase of noise pages to an allowable level and can gather a significant number of the positive pages that could not be gathered using a single-page-based method. For the second process, we propose composing a three-grade classifier using two base classifiers: precision-assured and recall-assured. It classifies the input to assured positive, assured negative, and uncertain pages, where the uncertain pages need a manual assessment, so that the collection quality required by an application can be assured. Each of the base classifiers is further composed of a surrounding page classifier (SC) and an entry page classifier (EC). The SC selects likely component pages and the EC classifies the entry pages using information from both the entry page and the likely component pages. An evident performance improvement of the base classifiers by the introduction of the SC is shown through experiments. Then, the reduction of the number of uncertain pages is evaluated and the effectiveness of the proposed method is shown.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"12 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84383071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilization of external knowledge for personal name disambiguation","authors":"Q. Vu, A. Takasu, J. Adachi","doi":"10.2201/NIIPI.2009.6.3","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.3","url":null,"abstract":"The amount of information on the World Wide Web (WWW) is increasing at an explosive rate, and the role of computer systems in processing such a huge amount of data has become crucial. In this paper, we focus on the name disambiguation problem when searching for people, because information about people is an important part of the web and improvements to personal information may benefit many web citizens. The name ambiguity problem occurs frequently when searching for people, because a name may be shared by several people. In this research, we use external knowledge while solving this problem, so that we can analyze information in web documents more easily. We collect web directories and use the latent Dirichlet allocation method to extract latent topics from web directories. The extracted topics are used to modify the search result documents so that important contexts that help to discriminate people can be recognized more easily. We carried out experiments with real web documents and verified the advantages of our approach over other disambiguation approaches that use the vector space model and named entity recognition methods.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"101 1","pages":"15"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86776178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ishizaka, Masashi Iwai, Masato Gokan, H. Ohba, Ryosuke Sakaguchi
{"title":"Development of the Shinshu University Online System of General Academic Resources (SOAR)","authors":"K. Ishizaka, Masashi Iwai, Masato Gokan, H. Ohba, Ryosuke Sakaguchi","doi":"10.2201/NIIPI.2008.5.11","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.11","url":null,"abstract":"This paper discusses the development of the Shinshu University Online System of General Academic Resources (SOAR). As a participant in the 2006–2007 Cyber Science Infrastructure (CSI) development project of the National Institute of Informatics (NII), Shinshu University is seeking to develop SOAR as an integrated academic resource system. In addition to developing an environment for providing access to the latest academic resources within the university, SOAR is intended to promulgate university research results and research activities, both within Japan and around the world, to a broad audience. Specifically, this system achieves mutual coordination by linking e-journals and the Web of Science to the researcher directory and the institutional repository – two system cornerstones. SOAR can be regarded as a potential model for future academic-resource systems. Although the Institutional Repository (SOAR-IR) was developed using existing software, the Researcher Directory (SOARRD) is a new system based on XML technology.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"24 1","pages":"137-151"},"PeriodicalIF":0.0,"publicationDate":"2008-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73338477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nobukazu Yoshioka, H. Washizaki, Katsuhisa Maruyama
{"title":"A survey on security patterns","authors":"Nobukazu Yoshioka, H. Washizaki, Katsuhisa Maruyama","doi":"10.2201/NIIPI.2008.5.5","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.5","url":null,"abstract":"Security has become an important topic for many software systems. Security patterns are reusable solutions to security problems. Although many security patterns and techniques for using them have been proposed, it is still difficult to adapt security patterns to each phase of software development. This paper provides a survey of approaches to security patterns. As a result of classifying these approaches, a direction for the integration and future research topics is illustrated.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"AES-14 1","pages":"35-48"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84545156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards robust self-managed systems","authors":"J. Kramer, J. Magee","doi":"10.2201/NIIPI.2008.5.1","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.1","url":null,"abstract":"Software is pervasive. It plays a part in every aspect of our lives, forming a significant part of every automated system or tool that we use, from washing machines to healthcare systems. Like the washing machine, some of these applications are simple, selfcontained devices; however the majority are far more complex. They are generally distributed systems which rely on interacting, distributed subsystems of software components to perform their function. They are expected to interact with users with changing needs and with other systems with unreliable service provision. The challenge is to provide these software systems in such a way that they are robust in the presence of major issues such as change and complexity. Change is inherent, both in the changing needs of users and in the changes which take place in the operational environment of the system. Hence it is essential that our systems can adapt as necessary to continue to achieve their goals. Change is also induced by failures or the unavailability of parts of the system. It is therefore necessary to envisage dynamically changing configurations of software components so as to adapt to the current situation. Dynamic change, which occurs while the system is operational, requires that the system evolves dynamically, and that the adaptation occurs at run-time. Complexity requires that we use rigorous techniques to design, build and analyse our software and thereby avoid unnecessary design flaws. This implies the need for analytical techniques which cope with changing goals and the changing compositions of adaptive software. Since the complexity and response times required by the changes may not permit human intervention, we must plan for automated management of change. The systems themselves must be capable of determining","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"65 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91172063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rehák, M. Pechoucek, Karel Bartos, Martin Grill, Pavel Čeleda, Vojtech Krmicek
{"title":"CAMNEP: An intrusion detection system for high-speed networks","authors":"M. Rehák, M. Pechoucek, Karel Bartos, Martin Grill, Pavel Čeleda, Vojtech Krmicek","doi":"10.2201/NIIPI.2008.5.7","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.7","url":null,"abstract":"The presented research aims to detect malicious traffic in high\u0000speed networks by means of correlated anomaly detection\u0000methods. In order to acquire the real-time traffic statistics\u0000in NetFlow format, we deploy transparent inline probes based on\u0000FPGA elements. They provide traffic statistics to the\u0000agent-based detection layer, where each agent uses a specific\u0000anomaly detection method to detect anomalies and describe the\u0000flows in its extended trust model. The agents share the anomaly\u0000assessments of individual network flows that are used as an\u0000input for the agents trust models. The trustfulness values of\u0000individual flows from all agents are combined to estimate their\u0000maliciousness. The estimate of trust is subsequently used to\u0000filter out the most significant events that are reported to\u0000network operators for further analysis. We argue that the use\u0000of trust model for integration of several anomaly detection\u0000methods and efficient representation of history data shall\u0000reduce the high rate of false positives (legitimate traffic\u0000classified as malicious) which limits the effectiveness of\u0000current intrusion detection systems.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"10 1","pages":"65"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73271235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security software engineering in wireless sensor networks","authors":"E. Platon, Y. Sei","doi":"10.2201/NIIPI.2008.5.6","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.6","url":null,"abstract":"Th ee ngineering of security is an essential discipline in software engineering. It requires one to embrace a holistic approach, as any weakness along the engineering process of the system may lead to future security breaches. It is in general difficult to achieve and becomes particularly acute in wireless sensor networks, owing to the stringent limitations in communication an dc omputational power. We survey the current state of the art on this topic and set forth issues that require further study. The analysis of current work covers general security issues of wireless sensor network research and discusse st he present achievements for engineering security with regards to earlier surveys in this domain. We also cover security capabilities of major implementation platforms, namely TinyOS and Sun SPOT TM ,a ndpresent available and required mechanisms that will become essential for software engineers.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"42 1","pages":"49"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74261570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special issue: The future of software engineering for security and privacy","authors":"S. Honiden, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.2","url":null,"abstract":"The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving overall systems security. This special issue provides a forum for discussing research directions in software engineering for developing secure systems more effectively. It comprises seven papers that underwent one or more cycles of anonymous peer review and revision. The first paper on “PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application”, by Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri, presents an automated tool to support users and providers of information systems, to help them understand the threats and the requirements of these systems. The paper focuses on Java mobile code applications. The second paper on “Curriculum Design and Methodologies for Security Requirements Analysis”, by Kenji Taguchi and Yasuyuki Tahara, describes the authors’ Security Requirements Analysis educational course, part of the Top SE project, to teach the students how to find and fix security defects in software, as early as possible in the systems development life cycle. The third paper on “A Survey on Security Patterns”, by Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama, surveys existing approaches to establishing security patterns, which are reusable solutions to security problems, and illustrates a direction for the integration of patterns into the development life cycle. The fourth paper on “Software Security Engineer-","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"1 1","pages":"5-6"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77963211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}