首页 > 最新文献

2014 IEEE 38th Annual Computer Software and Applications Conference最新文献

英文 中文
Transpacific Live Migration with Wide Area Distributed Storage 具有广域分布存储的跨太平洋活迁移
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.71
Ikuo Nakagawa, Koheix Ichikawa, T. Kondo, Yoshiaki Kitaguchi, Hiroki Kashiwazaki, S. Shimojo
In recent years, much attention has been paid to wide area distributed storages to backup data remotely and ensure that business processes can continue in terms of disaster recovery. In the 'distcloud' project, authors have been involved in the research of wide area distributed storage by clustering many computer resources located in geographically distributed areas, where the number of sites is more than 2 (N > 2). The storage supports a shared single POSIX file system so that LDLM (Long Distance Live Migration) of VMs (Virtual Machines) works well between multiple sites. We introduce the concept and basic architecture of the wide area distributed storage and its technical improvement for LDLM. We describe the result of our experiment, that is, 1) Nation Wide Live Migration (about 500 Km) in Japan, and 2) Transpacific Live Migration (over 24,000 Km). We show the technical benefit of the current implementation and discuss suitable applications and remaining issues for further research topics.
近年来,人们非常关注广域分布式存储,以远程备份数据并确保业务流程在灾难恢复方面可以继续进行。在“distcloud”项目中,作者参与了广域分布式存储的研究,通过聚集位于地理分布区域的许多计算机资源,其中站点数量超过2 (N > 2)。存储支持共享的单个POSIX文件系统,以便vm(虚拟机)的LDLM(长距离实时迁移)在多个站点之间工作良好。介绍了广域分布式存储的概念、基本架构及其在LDLM中的技术改进。我们描述了我们的实验结果,即1)日本全国范围内的活体迁移(约500公里),以及2)跨太平洋活体迁移(超过24,000公里)。我们展示了当前实现的技术优势,并讨论了合适的应用和进一步研究课题的剩余问题。
{"title":"Transpacific Live Migration with Wide Area Distributed Storage","authors":"Ikuo Nakagawa, Koheix Ichikawa, T. Kondo, Yoshiaki Kitaguchi, Hiroki Kashiwazaki, S. Shimojo","doi":"10.1109/COMPSAC.2014.71","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.71","url":null,"abstract":"In recent years, much attention has been paid to wide area distributed storages to backup data remotely and ensure that business processes can continue in terms of disaster recovery. In the 'distcloud' project, authors have been involved in the research of wide area distributed storage by clustering many computer resources located in geographically distributed areas, where the number of sites is more than 2 (N > 2). The storage supports a shared single POSIX file system so that LDLM (Long Distance Live Migration) of VMs (Virtual Machines) works well between multiple sites. We introduce the concept and basic architecture of the wide area distributed storage and its technical improvement for LDLM. We describe the result of our experiment, that is, 1) Nation Wide Live Migration (about 500 Km) in Japan, and 2) Transpacific Live Migration (over 24,000 Km). We show the technical benefit of the current implementation and discuss suitable applications and remaining issues for further research topics.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115559449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Eliciting Relations from Natural Language Requirements Documents Based on Linguistic and Statistical Analysis 基于语言学和统计分析的自然语言需求文档关系提取
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.27
Lin Liu, Tianying Li, Xiaoxi Kou
Requirements are usually presented as Natural Language based documents. In the conceptual modeling phase, requirements are collected from different stakeholders and analyzed by requirement engineers. However, the size of the requirements documents can become very large, and the modeling process is quite time consuming and resource consuming. In order to solve this problem, much has been written on the processing of requirements documents to yield conceptual models. In this paper, we proposed an approach for identifying and extracting relations in a range of requirements documents with three steps: text analysis, entity extraction and relation mapping. If the entities in the relation are quite close to each other, for example, in the strategic dependency relationship, we will define a set of linguistic patterns used for identifying relations and propose a matching algorithm of semantic automata to extract the relation. Based on this approach, we developed a system to automatically generate the strategic dependency model of i framework and the activity model from Chinese requirements documents. A series of experiments were conducted to evaluate the performance of the automated requirements analysis system. The results show that the system achieves high recall with a consistent improvement in precision, which demonstrates the applicability of our approach.
需求通常以基于自然语言的文档形式呈现。在概念建模阶段,从不同的涉众那里收集需求,并由需求工程师进行分析。然而,需求文档的大小可能变得非常大,并且建模过程非常耗时和消耗资源。为了解决这个问题,已经写了很多关于需求文档处理的文章,以产生概念模型。在本文中,我们提出了一种在一系列需求文档中识别和提取关系的方法,分为三个步骤:文本分析、实体提取和关系映射。如果关系中的实体彼此非常接近,例如在战略依赖关系中,我们将定义一套用于识别关系的语言模式,并提出语义自动机的匹配算法来提取关系。在此基础上,我们开发了一个从中文需求文档中自动生成i框架的战略依赖模型和活动模型的系统。进行了一系列的实验来评估自动化需求分析系统的性能。结果表明,该系统具有较高的查全率,查准率持续提高,证明了该方法的适用性。
{"title":"Eliciting Relations from Natural Language Requirements Documents Based on Linguistic and Statistical Analysis","authors":"Lin Liu, Tianying Li, Xiaoxi Kou","doi":"10.1109/COMPSAC.2014.27","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.27","url":null,"abstract":"Requirements are usually presented as Natural Language based documents. In the conceptual modeling phase, requirements are collected from different stakeholders and analyzed by requirement engineers. However, the size of the requirements documents can become very large, and the modeling process is quite time consuming and resource consuming. In order to solve this problem, much has been written on the processing of requirements documents to yield conceptual models. In this paper, we proposed an approach for identifying and extracting relations in a range of requirements documents with three steps: text analysis, entity extraction and relation mapping. If the entities in the relation are quite close to each other, for example, in the strategic dependency relationship, we will define a set of linguistic patterns used for identifying relations and propose a matching algorithm of semantic automata to extract the relation. Based on this approach, we developed a system to automatically generate the strategic dependency model of i framework and the activity model from Chinese requirements documents. A series of experiments were conducted to evaluate the performance of the automated requirements analysis system. The results show that the system achieves high recall with a consistent improvement in precision, which demonstrates the applicability of our approach.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120927190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transformation from Activity Diagrams with Time Properties to Timed Coloured Petri Nets 具有时间性质的活动图到定时彩色Petri网的转换
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.36
Xuling Chang, Linpeng Huang, Jianpeng Hu, Chen Li, Bei Cao
The activity diagram is widely used for describing and understanding workflows, however, it lacks a formal semantics and cannot be manipulated by computer. In this paper, we present a transformation from UML activity diagrams with time properties to timed coloured petri nets (TCPNs) in a formal way. We extend the activity diagram with time properties and a formal model named extended activity hyper graph (EAH) is defined. By mapping this formal model to a clocked transition system (CTS), we define a weak semantics for it. A list of transformation rules are proposed to show how this can be transformed to a TCPN model. We partially prove the model equivalence of the two models. Finally, an example of Game Capture application is used to validate our approach.
活动图被广泛用于描述和理解工作流,然而,它缺乏形式化的语义,不能被计算机操作。在本文中,我们以一种形式化的方式提出了从具有时间属性的UML活动图到定时彩色petri网(tcpn)的转换。将活动图扩展为具有时间属性的活动图,定义了一个形式化的扩展活动超图(EAH)模型。通过将这个形式化模型映射到一个时钟转换系统(CTS),我们为它定义了一个弱语义。提出了一个转换规则列表,以显示如何将其转换为TCPN模型。我们部分证明了这两个模型的模型等价性。最后,使用Game Capture应用程序的一个示例来验证我们的方法。
{"title":"Transformation from Activity Diagrams with Time Properties to Timed Coloured Petri Nets","authors":"Xuling Chang, Linpeng Huang, Jianpeng Hu, Chen Li, Bei Cao","doi":"10.1109/COMPSAC.2014.36","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.36","url":null,"abstract":"The activity diagram is widely used for describing and understanding workflows, however, it lacks a formal semantics and cannot be manipulated by computer. In this paper, we present a transformation from UML activity diagrams with time properties to timed coloured petri nets (TCPNs) in a formal way. We extend the activity diagram with time properties and a formal model named extended activity hyper graph (EAH) is defined. By mapping this formal model to a clocked transition system (CTS), we define a weak semantics for it. A list of transformation rules are proposed to show how this can be transformed to a TCPN model. We partially prove the model equivalence of the two models. Finally, an example of Game Capture application is used to validate our approach.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Runtime Verification Framework for Control System Simulation 控制系统仿真的运行时验证框架
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.14
S. Ciraci, J. Fuller, J. Daily, A. Makhmalbaf, D. Callahan
In a standard workflow for the validation of a control system, the control system is implemented as an extension to a simulator. Such simulators are complex software systems, and engineers may unknowingly violate constraints a simulator places on extensions. As such, errors may be introduced in the implementation of either the control system or the simulator leading to invalid simulation results. This paper presents a novel runtime verification approach for verifying control system implementations within simulators. The major contribution of the approach is the two-tier specification process. In the first tier, engineers model constraints using a domain-specific language tailored to modeling a controller's response to changes in its input. The language is high-level and effectively hides the implementation details of the simulator, allowing engineers to specify design-level constraints independent of low-level simulator interfaces. In the second tier, simulator developers provide mapping rules for mapping design-level constraints to the implementation of the simulator. Using the rules, an automated tool transforms the design-level specifications into simulator-specific runtime verification specifications and generates monitoring code which is injected into the implementation of the simulator. During simulation, these monitors observe the input and output variables of the control system and report changes to the verifier. The verifier checks whether these changes follow the constraints of the control system. We describe application of this approach to the verification of the constraints of an HVAC control system implemented with the power grid simulator Grid LAB-D.
在验证控制系统的标准工作流中,控制系统是作为模拟器的扩展来实现的。这样的模拟器是复杂的软件系统,工程师可能会在不知不觉中违反模拟器对扩展的约束。因此,在控制系统或模拟器的实现中可能引入错误,导致无效的仿真结果。本文提出了一种新的运行时验证方法,用于验证模拟器内控制系统的实现。该方法的主要贡献是两层规范流程。在第一层,工程师使用特定于领域的语言对约束进行建模,以对控制器对其输入变化的响应进行建模。该语言是高级的,有效地隐藏了模拟器的实现细节,允许工程师指定独立于低级模拟器接口的设计级约束。在第二层,模拟器开发人员提供映射规则,用于将设计级约束映射到模拟器的实现。使用这些规则,自动化工具将设计级规范转换为特定于模拟器的运行时验证规范,并生成注入到模拟器实现中的监控代码。在模拟过程中,这些监视器观察控制系统的输入和输出变量,并向验证者报告变化。验证者检查这些变更是否遵循控制系统的约束。我们描述了这种方法的应用,以验证电网模拟器grid LAB-D实现的HVAC控制系统的约束。
{"title":"A Runtime Verification Framework for Control System Simulation","authors":"S. Ciraci, J. Fuller, J. Daily, A. Makhmalbaf, D. Callahan","doi":"10.1109/COMPSAC.2014.14","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.14","url":null,"abstract":"In a standard workflow for the validation of a control system, the control system is implemented as an extension to a simulator. Such simulators are complex software systems, and engineers may unknowingly violate constraints a simulator places on extensions. As such, errors may be introduced in the implementation of either the control system or the simulator leading to invalid simulation results. This paper presents a novel runtime verification approach for verifying control system implementations within simulators. The major contribution of the approach is the two-tier specification process. In the first tier, engineers model constraints using a domain-specific language tailored to modeling a controller's response to changes in its input. The language is high-level and effectively hides the implementation details of the simulator, allowing engineers to specify design-level constraints independent of low-level simulator interfaces. In the second tier, simulator developers provide mapping rules for mapping design-level constraints to the implementation of the simulator. Using the rules, an automated tool transforms the design-level specifications into simulator-specific runtime verification specifications and generates monitoring code which is injected into the implementation of the simulator. During simulation, these monitors observe the input and output variables of the control system and report changes to the verifier. The verifier checks whether these changes follow the constraints of the control system. We describe application of this approach to the verification of the constraints of an HVAC control system implemented with the power grid simulator Grid LAB-D.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134327268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A QoS-Oriented Inter-cloud Federation Framework 面向qos的云间联合框架
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.51
M. Salama, Shawish Ahmed
Cloud federation allows individual cloud providers dynamically collaborate to offer services to their end-users with the Quality of Service (QoS) targets agreed in the Service Level Agreements (SLA). However, the current federated cloud models are not QoS-oriented or SLA-aware. This paper proposes a QoS-oriented federated cloud computing framework where multiple independent cloud providers can cooperate seamlessly to provide scalable QoS-assured services and discusses a high level architecture of the federation components. The distinct features of the proposed federation framework is its QoS-orientation that can trigger the on-demand resource provisioning across multiple providers, hence helping to maximize QoS targets and resources usage, eliminate SLA violations and enhance SLA formalization.
云联合允许各个云提供商动态协作,以服务水平协议(SLA)中商定的服务质量(QoS)目标向其最终用户提供服务。然而,当前的联邦云模型并不面向qos或支持sla。本文提出了一个面向qos的联邦云计算框架,其中多个独立的云提供商可以无缝合作,提供可扩展的qos保证服务,并讨论了联邦组件的高级体系结构。所建议的联合框架的独特特点是它面向QoS,可以跨多个提供者触发按需资源供应,因此有助于最大化QoS目标和资源使用,消除SLA违反并增强SLA形式化。
{"title":"A QoS-Oriented Inter-cloud Federation Framework","authors":"M. Salama, Shawish Ahmed","doi":"10.1109/COMPSAC.2014.51","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.51","url":null,"abstract":"Cloud federation allows individual cloud providers dynamically collaborate to offer services to their end-users with the Quality of Service (QoS) targets agreed in the Service Level Agreements (SLA). However, the current federated cloud models are not QoS-oriented or SLA-aware. This paper proposes a QoS-oriented federated cloud computing framework where multiple independent cloud providers can cooperate seamlessly to provide scalable QoS-assured services and discusses a high level architecture of the federation components. The distinct features of the proposed federation framework is its QoS-orientation that can trigger the on-demand resource provisioning across multiple providers, hence helping to maximize QoS targets and resources usage, eliminate SLA violations and enhance SLA formalization.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Media Supported Workspaces in Agile Software Development: Doctoral Symposium Paper 敏捷软件开发中媒体支持的工作空间:博士研讨会论文
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.46
Florian Raith, Robert Lindermeier
The use of software tools has become a common practice in global software engineering to handle requirements and to exchange project status amongst distributed teams and stakeholders. In context of agile software development the replacement of paper-based media (e.g. Task Board) with software tools results in heavily decreased collaboration and transparency within agile teams. Since the number of agile projects in global context increases, it is necessary to find an adequate solution to share project status without influencing the underlying agile process in a negative way. The proposed research project investigates why the replacement of paper-based media has such strong influence on group work in agile teams. Thereby, the focus of research is on the agile Task Board as the most important example for paper-based media of agile workspaces. With help of these findings we will develop a conceptual and technical solution, based on optical tracking of a paper-based Task Board, to share project status amongst stakeholders. The paper introduces the current state of the art, corresponding research questions, the entire research methods and current progress of our research.
在全球软件工程中,使用软件工具来处理需求和在分布的团队和涉众之间交换项目状态已经成为一种常见的做法。在敏捷软件开发的背景下,用软件工具代替纸质媒体(例如Task Board)会导致敏捷团队内部协作和透明度的严重降低。由于全球范围内敏捷项目的数量不断增加,因此有必要找到一种适当的解决方案来共享项目状态,而不会以负面的方式影响潜在的敏捷过程。拟议的研究项目调查了为什么纸质媒体的替代对敏捷团队中的小组工作有如此强烈的影响。因此,研究的重点是敏捷任务板,它是敏捷工作空间中基于纸质媒体的最重要的例子。在这些发现的帮助下,我们将开发一个概念和技术解决方案,基于基于纸张的任务板的光学跟踪,在利益相关者之间共享项目状态。本文介绍了目前的研究现状、相应的研究问题、整个研究方法以及目前的研究进展。
{"title":"Media Supported Workspaces in Agile Software Development: Doctoral Symposium Paper","authors":"Florian Raith, Robert Lindermeier","doi":"10.1109/COMPSAC.2014.46","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.46","url":null,"abstract":"The use of software tools has become a common practice in global software engineering to handle requirements and to exchange project status amongst distributed teams and stakeholders. In context of agile software development the replacement of paper-based media (e.g. Task Board) with software tools results in heavily decreased collaboration and transparency within agile teams. Since the number of agile projects in global context increases, it is necessary to find an adequate solution to share project status without influencing the underlying agile process in a negative way. The proposed research project investigates why the replacement of paper-based media has such strong influence on group work in agile teams. Thereby, the focus of research is on the agile Task Board as the most important example for paper-based media of agile workspaces. With help of these findings we will develop a conceptual and technical solution, based on optical tracking of a paper-based Task Board, to share project status amongst stakeholders. The paper introduces the current state of the art, corresponding research questions, the entire research methods and current progress of our research.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Faceted Bug Report Search with Topic Model 面错误报告搜索与主题模型
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.19
K. Liu, Hee Beng Kuan Tan
During bug reporting, The same bugs could be repeatedly reported. As a result, extra time could be spent on bug triaging and fixing. In order to reduce redundant effort, it is important to provide bug reporters with the ability to search for previously reported bugs efficiently and accurately. The existing bug tracking systems are using relatively simple ranking functions, which often produce unsatisfactory results. In this paper, we apply Ranking SVM, a Learning to Rank technique to construct a ranking model for accurate bug report search. Based on the search results, a topic model is used to cluster the bug reports into multiple facets. Each facet contains similar bug reports of the same topic. Users and testers can locate relevant bugs more efficiently through a simple query. We perform evaluations on more than 16,340 Eclipse and Mozilla bug reports. The evaluation results show that the proposed approach can achieve better search results than the existing search functions.
在bug报告过程中,相同的bug可以被重复报告。因此,可以将额外的时间花在错误分类和修复上。为了减少冗余的工作,为bug报告者提供高效、准确地搜索先前报告的bug的能力是很重要的。现有的bug跟踪系统使用的是相对简单的排序功能,结果往往不令人满意。在本文中,我们运用排序支持向量机,一种学习排序技术来构建一个排序模型,用于准确的bug报告搜索。基于搜索结果,使用主题模型将bug报告聚类到多个方面。每个方面都包含相同主题的类似错误报告。用户和测试人员可以通过一个简单的查询更有效地定位相关的bug。我们对超过16,340个Eclipse和Mozilla bug报告执行评估。评价结果表明,与现有的搜索函数相比,该方法可以获得更好的搜索结果。
{"title":"Faceted Bug Report Search with Topic Model","authors":"K. Liu, Hee Beng Kuan Tan","doi":"10.1109/COMPSAC.2014.19","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.19","url":null,"abstract":"During bug reporting, The same bugs could be repeatedly reported. As a result, extra time could be spent on bug triaging and fixing. In order to reduce redundant effort, it is important to provide bug reporters with the ability to search for previously reported bugs efficiently and accurately. The existing bug tracking systems are using relatively simple ranking functions, which often produce unsatisfactory results. In this paper, we apply Ranking SVM, a Learning to Rank technique to construct a ranking model for accurate bug report search. Based on the search results, a topic model is used to cluster the bug reports into multiple facets. Each facet contains similar bug reports of the same topic. Users and testers can locate relevant bugs more efficiently through a simple query. We perform evaluations on more than 16,340 Eclipse and Mozilla bug reports. The evaluation results show that the proposed approach can achieve better search results than the existing search functions.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127855770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors 多传感器网络应用流量行为异常检测系统
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.85
Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Y. Hori
For a computer network in the era of big data, we discuss a behavioral anomaly detection system which makes it possible to analyze and immediately detect anomaly traffic behavior. Many sensor devices connect to the network and tend to generate their application traffic at quite a low communication rate. In order to observe necessary traffic information for traffic analysis in a short time, the monitoring system integrates traffic statistics of flows sent from devices which are considered to generate the same application. It detects anomaly traffic behavior on the basis of application analysis using NMF(Non-Negative Matrix Factorization).
针对大数据时代的计算机网络,讨论了一种行为异常检测系统,使异常流量行为分析和即时检测成为可能。许多传感器设备连接到网络,并倾向于以相当低的通信速率生成其应用程序流量。为了在短时间内观察到流量分析所需的流量信息,监控系统将被认为产生同一应用的设备发出的流量统计信息进行整合。该方法采用非负矩阵分解(Non-Negative Matrix Factorization, NMF)方法,在应用分析的基础上检测异常流量行为。
{"title":"Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors","authors":"Akira Nagata, Kohei Kotera, Katsuichi Nakamura, Y. Hori","doi":"10.1109/COMPSAC.2014.85","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.85","url":null,"abstract":"For a computer network in the era of big data, we discuss a behavioral anomaly detection system which makes it possible to analyze and immediately detect anomaly traffic behavior. Many sensor devices connect to the network and tend to generate their application traffic at quite a low communication rate. In order to observe necessary traffic information for traffic analysis in a short time, the monitoring system integrates traffic statistics of flows sent from devices which are considered to generate the same application. It detects anomaly traffic behavior on the basis of application analysis using NMF(Non-Negative Matrix Factorization).","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131273980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semi-supervised Approach to Software Defect Prediction 软件缺陷预测的半监督方法
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.65
Huihua Lu, B. Cukic, M. Culp
Accurate detection of software components that need to be exposed to additional verification and validation offers the path to high quality products while minimizing non essential software assurance expenditures. In this type of quality modeling we assume that software modules with known fault content developed in similar environment are available. Supervised learning algorithms are the traditional methods of choice for training on existing modules. The models are then used to predict fault content for newly developed software components prior to product release. However, one needs to realize that establishing whether a module contains a fault or not, only to be used for model training, can be expensive. The basic idea behind semi-supervised learning is to learn from a small number of software modules with known fault content and supplement model training with modules for which the fault information is not available, thus reducing the overall cost of quality assurance. In this study, we investigate the performance of semi-supervised learning for software fault prediction. A preprocessing strategy, multidimensional scaling, is embedded in the approach to reduce the dimensional complexity of software metrics used for prediction. Our results show that the dimension-reduction with semi-supervised learning algorithm preforms significantly better than one of the best performing supervised learning algorithm - random forest - in situations when few modules with known fault content are available. We compare our results with the published benchmarks and clearly demonstrate performance benefits.
对需要进行额外验证和确认的软件组件的准确检测为获得高质量的产品提供了途径,同时最大限度地减少了不必要的软件保证支出。在这种类型的质量建模中,我们假设在类似环境中开发的具有已知故障内容的软件模块是可用的。监督学习算法是在现有模块上进行训练的传统方法。然后,这些模型用于在产品发布之前预测新开发的软件组件的故障内容。然而,需要认识到,建立一个模块是否包含故障,仅用于模型训练,可能是昂贵的。半监督学习的基本思想是,从少数已知故障内容的软件模块中学习,并用无法获得故障信息的模块补充模型训练,从而降低质量保证的总体成本。在这项研究中,我们研究了半监督学习在软件故障预测中的性能。一种预处理策略,多维缩放,被嵌入到方法中,以减少用于预测的软件度量的维度复杂性。我们的研究结果表明,在已知故障内容的模块很少的情况下,半监督学习算法的降维效果明显优于性能最好的监督学习算法之一——随机森林。我们将结果与发布的基准测试进行比较,并清楚地展示性能优势。
{"title":"A Semi-supervised Approach to Software Defect Prediction","authors":"Huihua Lu, B. Cukic, M. Culp","doi":"10.1109/COMPSAC.2014.65","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.65","url":null,"abstract":"Accurate detection of software components that need to be exposed to additional verification and validation offers the path to high quality products while minimizing non essential software assurance expenditures. In this type of quality modeling we assume that software modules with known fault content developed in similar environment are available. Supervised learning algorithms are the traditional methods of choice for training on existing modules. The models are then used to predict fault content for newly developed software components prior to product release. However, one needs to realize that establishing whether a module contains a fault or not, only to be used for model training, can be expensive. The basic idea behind semi-supervised learning is to learn from a small number of software modules with known fault content and supplement model training with modules for which the fault information is not available, thus reducing the overall cost of quality assurance. In this study, we investigate the performance of semi-supervised learning for software fault prediction. A preprocessing strategy, multidimensional scaling, is embedded in the approach to reduce the dimensional complexity of software metrics used for prediction. Our results show that the dimension-reduction with semi-supervised learning algorithm preforms significantly better than one of the best performing supervised learning algorithm - random forest - in situations when few modules with known fault content are available. We compare our results with the published benchmarks and clearly demonstrate performance benefits.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
JavaScript: The Used Parts JavaScript:使用过的部分
Pub Date : 2014-07-21 DOI: 10.1109/COMPSAC.2014.69
S. Gude, M. Hafiz, Allen Wirfs-Brock
We performed an empirical study to understand how different language features are used by JavaScript developers in practice, with the goal of using this information to assist future extensions of JavaScript. We inspected more than one million unique scripts (over 80 million lines of code) from various sources: JavaScript programs in the wild collected by a spider, (supposedly) better JavaScript programs collected from the top 100 URLs from the Alex a list, JavaScript programs with new language features used in Firefox Add-ons, widely used JavaScript libraries, and Node.js applications. Our corpus is larger and more diversified than those in prior studies. We also performed a study on 45 JavaScript developers to understand the reasons behind some of their language feature choices. Our study shows that there is a wide-spread confusion about newly introduced JavaScript features, a continuing misuse of existing problematic features, and a surprising lack of adoption of object-oriented features. Understanding JavaScript programming practices will assist many stakeholders: tool developers can analyze the requirements of better tools and more responsive IDEs and programmers can learn about the used (and the good) parts of JavaScript.
我们进行了一项实证研究,以了解JavaScript开发人员在实践中如何使用不同的语言特性,目的是使用这些信息来帮助JavaScript的未来扩展。我们检查了来自不同来源的超过100万个独特的脚本(超过8000万行代码):由蜘蛛收集的野外JavaScript程序,(据说)从alexa列表的前100个url中收集的更好的JavaScript程序,Firefox插件中使用的具有新语言特性的JavaScript程序,广泛使用的JavaScript库和Node.js应用程序。我们的语料库比以前的研究更大,更多样化。我们还对45名JavaScript开发人员进行了一项研究,以了解他们选择某些语言特性背后的原因。我们的研究表明,对新引入的JavaScript特性存在广泛的混淆,对现有有问题的特性的持续滥用,以及对面向对象特性的采用令人惊讶地缺乏。了解JavaScript编程实践将帮助许多利益相关者:工具开发人员可以分析更好的工具和响应更快的ide的需求,程序员可以了解JavaScript的常用(和好的)部分。
{"title":"JavaScript: The Used Parts","authors":"S. Gude, M. Hafiz, Allen Wirfs-Brock","doi":"10.1109/COMPSAC.2014.69","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.69","url":null,"abstract":"We performed an empirical study to understand how different language features are used by JavaScript developers in practice, with the goal of using this information to assist future extensions of JavaScript. We inspected more than one million unique scripts (over 80 million lines of code) from various sources: JavaScript programs in the wild collected by a spider, (supposedly) better JavaScript programs collected from the top 100 URLs from the Alex a list, JavaScript programs with new language features used in Firefox Add-ons, widely used JavaScript libraries, and Node.js applications. Our corpus is larger and more diversified than those in prior studies. We also performed a study on 45 JavaScript developers to understand the reasons behind some of their language feature choices. Our study shows that there is a wide-spread confusion about newly introduced JavaScript features, a continuing misuse of existing problematic features, and a surprising lack of adoption of object-oriented features. Understanding JavaScript programming practices will assist many stakeholders: tool developers can analyze the requirements of better tools and more responsive IDEs and programmers can learn about the used (and the good) parts of JavaScript.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 38th Annual Computer Software and Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1