首页 > 最新文献

2011 IEEE 2nd International Conference on Software Engineering and Service Science最新文献

英文 中文
Notice of RetractionA study of incentive mechanism to weaken bullwhip effect of supply chains 撤销通知削弱供应链牛鞭效应的激励机制研究
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982281
Weimin Ma, Wenwen Yue
Bullwhip effect increases instability of supply inventory management and leads to a high fluctuation in the demand of products. This article examines how information sharing reduces the bullwhip effect and then introduces the utility theory to design an incentive mechanism.
牛鞭效应增加了供应库存管理的不稳定性,导致产品需求的高度波动。本文考察了信息共享如何降低牛鞭效应,并引入效用理论设计激励机制。
{"title":"Notice of RetractionA study of incentive mechanism to weaken bullwhip effect of supply chains","authors":"Weimin Ma, Wenwen Yue","doi":"10.1109/ICSESS.2011.5982281","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982281","url":null,"abstract":"Bullwhip effect increases instability of supply inventory management and leads to a high fluctuation in the demand of products. This article examines how information sharing reduces the bullwhip effect and then introduces the utility theory to design an incentive mechanism.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114160676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effects of MAC protocols on the performance of wireless network coding MAC协议对无线网络编码性能的影响
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982371
Huanzhong Li, Wei Yang, Quanyou Feng, Wenhua Dou, Lianyong Dong
Network coding provides a powerful mechanism for improving performance of wireless networks. In this paper, we study the effects of MAC protocols on the performance of wireless network coding. To model the MAC protocols, we introduce the dummy topology graph (DTG) of a wireless network that can properly describe the broadcast property of wireless channels. Based on the DTG, we derive theoretical formulations for computing the end-to-end delay of flows using the theory of network calculus. Numerical results show that the fairness of the MAC protocols can help to improve the performance of wireless network coding.
网络编码为提高无线网络的性能提供了一种强大的机制。本文研究了MAC协议对无线网络编码性能的影响。为了对MAC协议进行建模,我们引入了一个虚拟的无线网络拓扑图(DTG),它可以很好地描述无线信道的广播特性。在DTG的基础上,利用网络演算理论推导了计算流的端到端延迟的理论公式。数值结果表明,MAC协议的公平性有助于提高无线网络编码的性能。
{"title":"Effects of MAC protocols on the performance of wireless network coding","authors":"Huanzhong Li, Wei Yang, Quanyou Feng, Wenhua Dou, Lianyong Dong","doi":"10.1109/ICSESS.2011.5982371","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982371","url":null,"abstract":"Network coding provides a powerful mechanism for improving performance of wireless networks. In this paper, we study the effects of MAC protocols on the performance of wireless network coding. To model the MAC protocols, we introduce the dummy topology graph (DTG) of a wireless network that can properly describe the broadcast property of wireless channels. Based on the DTG, we derive theoretical formulations for computing the end-to-end delay of flows using the theory of network calculus. Numerical results show that the fairness of the MAC protocols can help to improve the performance of wireless network coding.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122307047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved RBF network applied to short-term load forecasting 改进RBF网络在短期负荷预测中的应用
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982477
Niu Dong-xiao, Ji Ling, Tian Jie
From the practical application of short-term load forecasting, this article introduced the radial basis function network and use nearest neighbor clustering algorithm to determine the width of radial basis function, select the cluster centers and weights. The predicted results show that the method is faster and has higher precision.
本文从短期负荷预测的实际应用出发,介绍了径向基函数网络,并利用最近邻聚类算法确定径向基函数的宽度,选择聚类中心和权值。预测结果表明,该方法具有较快的速度和较高的精度。
{"title":"Improved RBF network applied to short-term load forecasting","authors":"Niu Dong-xiao, Ji Ling, Tian Jie","doi":"10.1109/ICSESS.2011.5982477","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982477","url":null,"abstract":"From the practical application of short-term load forecasting, this article introduced the radial basis function network and use nearest neighbor clustering algorithm to determine the width of radial basis function, select the cluster centers and weights. The predicted results show that the method is faster and has higher precision.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The design of a Chinese classic poetry wizard 设计一款中国古典诗词奇才
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982266
Hong-zuo Lin
The forms of Chinese classic poetry have been developed through thousands years of history and are still current in today's poetry society. A re-classification of the rhyming words, however, is necessary to keep the classic poetry up to date in the new settings of modern Chinese language. In order to maintain the continuation of the poetry forms, computing technology can be used to help the readers as well as poetry writers to check the compliance of poems in accordance to the forms and composite poems without the effort to learn the old grouping of rhyming words. This work will help revive Chinese classic poetry in modern society and promote its writability.
中国古典诗歌的形式经过数千年的历史发展,在今天的诗歌社会中仍然存在。然而,为了在现代汉语的新环境中保持经典诗歌的时代性,有必要对押韵词进行重新分类。为了保持诗歌形式的延续,可以使用计算技术来帮助读者和诗歌作者根据形式和组合诗歌来检查诗歌的符合性,而不必努力学习旧的押韵词分组。这项工作将有助于复兴中国古典诗歌在现代社会,提高其可写性。
{"title":"The design of a Chinese classic poetry wizard","authors":"Hong-zuo Lin","doi":"10.1109/ICSESS.2011.5982266","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982266","url":null,"abstract":"The forms of Chinese classic poetry have been developed through thousands years of history and are still current in today's poetry society. A re-classification of the rhyming words, however, is necessary to keep the classic poetry up to date in the new settings of modern Chinese language. In order to maintain the continuation of the poetry forms, computing technology can be used to help the readers as well as poetry writers to check the compliance of poems in accordance to the forms and composite poems without the effort to learn the old grouping of rhyming words. This work will help revive Chinese classic poetry in modern society and promote its writability.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122970629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An adaptive symbol mapping on 8-ary constellation for BICM-ID BICM-ID的8星星座自适应符号映射
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982283
Liu Na, L. Jianping, Cai Chaoshi
Bit-interleaved coded modulation with iterative decoding (BICM-ID) is a spectral efficient coding technique. The technique is therefore very attractive for next generation of wireless communication. It has been shown that when interleaver and error-control code are fixed, symbol mapping which defined by the signal constellation and the bit labeling has a critical influence on the error performance of BICM-ID. An improved mapping which combines two QPSK with different radius can achieve excellent performance under high SNR but has adverse property at low SNR. This paper presents an adaptive symbol mapping scheme which respectively employs Gray and the improved mapping at different SNR regions to improve the performance at low SNR. Simulation results confirm that the adaptive mapping scheme can not only gets excellent performance at high SNR, but also outperforms the performance under low SNR of the improved mapping and be similar with Gray.
比特交织编码调制迭代译码(BICM-ID)是一种频谱高效编码技术。因此,该技术对下一代无线通信非常有吸引力。研究表明,当交织器和错控码固定时,由信号星座和位标记定义的符号映射对BICM-ID的误码性能有重要影响。将两个半径不同的QPSK组合在一起的改进映射在高信噪比下具有良好的性能,但在低信噪比下性能较差。本文提出了一种自适应符号映射方案,分别在不同信噪比区域采用灰度和改进的映射,以提高低信噪比下的性能。仿真结果表明,该自适应映射方案不仅能在高信噪比下获得优异的性能,而且优于改进后的映射方案在低信噪比下的性能。
{"title":"An adaptive symbol mapping on 8-ary constellation for BICM-ID","authors":"Liu Na, L. Jianping, Cai Chaoshi","doi":"10.1109/ICSESS.2011.5982283","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982283","url":null,"abstract":"Bit-interleaved coded modulation with iterative decoding (BICM-ID) is a spectral efficient coding technique. The technique is therefore very attractive for next generation of wireless communication. It has been shown that when interleaver and error-control code are fixed, symbol mapping which defined by the signal constellation and the bit labeling has a critical influence on the error performance of BICM-ID. An improved mapping which combines two QPSK with different radius can achieve excellent performance under high SNR but has adverse property at low SNR. This paper presents an adaptive symbol mapping scheme which respectively employs Gray and the improved mapping at different SNR regions to improve the performance at low SNR. Simulation results confirm that the adaptive mapping scheme can not only gets excellent performance at high SNR, but also outperforms the performance under low SNR of the improved mapping and be similar with Gray.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131238343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved static program slicing algorithm using stack trace 一种改进的使用堆栈跟踪的静态程序切片算法
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982378
Hongchang Zhang, Shujuan Jiang, Rong Jin
In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.
为了提高静态程序切片定位导致异常的错误的准确性,提出了一种利用异常发生时存储的堆栈跟踪的新方法。建议的方法包括三个步骤。首先,它使用堆栈跟踪来推断执行跟踪,并找出那些从未执行过的方法和语句。然后,在构建系统依赖图时,这些未执行的方法将被忽略。最后,采用改进的程序切片算法进行精确切片。我们通过使用开源项目Ant报告的四个bug对我们的新方法进行了实证研究。结果表明,使用我们的方法,切片平均比使用一般静态程序切片算法少8%。
{"title":"An improved static program slicing algorithm using stack trace","authors":"Hongchang Zhang, Shujuan Jiang, Rong Jin","doi":"10.1109/ICSESS.2011.5982378","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982378","url":null,"abstract":"In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122899949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance evaluation of UDP-based high-speed transport protocols 基于udp的高速传输协议性能评价
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982257
Zhaojuan Yue, Yongmao Ren, Jun Li
The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.
高速长途网络的出现促进了各种电子科学应用的发展。传统的TCP协议由于其保守的AIMD (Additive Increase multiplative reduction)拥塞控制算法和慢启动策略而不适用于高带宽延迟的产品网络。本文主要介绍了四种典型的基于udp的高速传输协议(RUBDP、Tsunami、UDT和PA-UDP)。通过端到端传输模式的实验平台,评估了文件大小、丢包率和RTT对四种协议性能的影响。并对传输多个并行流时的协议内公平性和协议间公平性进行了评价。结果表明:PA-UDP协议具有最佳的传输性能;UDT协议是最方便的,因为它不需要用户设置初始发送速率、缓冲区大小等参数。
{"title":"Performance evaluation of UDP-based high-speed transport protocols","authors":"Zhaojuan Yue, Yongmao Ren, Jun Li","doi":"10.1109/ICSESS.2011.5982257","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982257","url":null,"abstract":"The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
UART interface design based on DM642 video surveillance system and wireless network module 基于DM642视频监控系统与无线网络模块的UART接口设计
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982357
Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li
TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.
TMS320DM642(DM642)是一款应用广泛的数字媒体DSP芯片。由于没有提供通用异步接收/发送器(UART),因此难以与其他UART设备进行通信,特别是在无线视频监控系统中。本文采用片上多通道缓冲串口(McBSP)和增强型直接存储器访问(EDMA)实现了基于DM642和无线通信模块LC6311的UART功能。详细讨论了McBSP的初始化和收发过程中的数据编解码。该方法可实现DM642与LC6311之间的通信,程序流程简单,无需其他器件。它丰富了DM642的接口功能,为无线视频监控系统提供了一种新的接口设计。
{"title":"UART interface design based on DM642 video surveillance system and wireless network module","authors":"Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li","doi":"10.1109/ICSESS.2011.5982357","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982357","url":null,"abstract":"TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BS-SVM multi-classification model in the application of consumer goods BS-SVM多分类模型在消费品中的应用
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982240
Quanhui Jia, Lieli Liu
Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.
消费品质量安全问题已经引起了相关领域学者的广泛关注,本课题以消费品质量安全问题为主题,根据案例的特点,提出了一种基于特征空间相对可分性的分层支持向量机分类算法,解决了现有算法分类性能低、误分类率高的问题。二叉搜索树的权重是样本的可分性,通过选择一组训练样本来确定类别的顺序来构建SVM分类器并最终形成二叉分类的大间隔多值SVM分类器树。仿真结果表明,该方法具有较快的测试速度、较为完善的分类精度和较好的泛化性能。
{"title":"BS-SVM multi-classification model in the application of consumer goods","authors":"Quanhui Jia, Lieli Liu","doi":"10.1109/ICSESS.2011.5982240","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982240","url":null,"abstract":"Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the technology of concealing the character of binary codes based on equal transposition 基于等转置的二进制码特征隐藏技术研究
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982482
Feng Tian, Youwei Zhang, Dengwei Ma
The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.
二进制码的隐藏是信息安全领域的一项关键技术。通过对该技术的深入研究,不仅可以为恶意代码的检测提供理论支持,而且可以对网络攻击技术的发展起到促进作用。将等换位技术与二进制码的字符隐藏技术相结合,通过对二进制码的等换位技术的研究,达到字符隐藏的目的。同时,经过相关测试,我们构建了一个在字符隐藏方面发挥良好作用的原型系统。
{"title":"Research on the technology of concealing the character of binary codes based on equal transposition","authors":"Feng Tian, Youwei Zhang, Dengwei Ma","doi":"10.1109/ICSESS.2011.5982482","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982482","url":null,"abstract":"The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE 2nd International Conference on Software Engineering and Service Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1