首页 > 最新文献

2016 Third International Conference on Trustworthy Systems and their Applications (TSA)最新文献

英文 中文
Applying Software Defined Methodologies to Software Computing 软件定义方法在软件计算中的应用
W. Chu, Chih-Hung Chang, Tse-Chuan Hsu, Yen-Hua Huang
Computing systems and services are now required to provide services with quality, intelligence, accuracy, adaptation, and effectiveness to satisfy the demands of users. Most of the existing systems are executed with fixed computing logic and rules without the flexibility and smartness to react the dynamic changes of computing situations and environment. Information technology is moving toward a new "software-defined" (SD) era that makes the software more "in command" of a greater range of devices and hardware systems for computing, storage, transmission, and networking. Software defined systems refer to a collection of enabling software technologies that are emerging in the information technology arena. Examples include Software Defined Networking (SDN), Software Defined Security (SDSec), Software Defined Data Center (SDDC), Software Defined Storage (SDS), and Software-Defined Radio (SDR). Considering their unique features, software development of these systems raises new challenges. In this paper, we plan to design and develop Software-defined Methodologies (SDM) which will be applied to software life cycle. With the support of SDM, we believe SD systems will contain the intelligent characteristics, such as security, reliability, QOS assurance, adaptability, low power consumption, situation awareness... etc.
计算系统和服务需要提供高质量、智能、准确、适应性和有效性的服务,以满足用户的需求。现有系统大多采用固定的计算逻辑和规则来执行,缺乏对计算情况和环境的动态变化做出反应的灵活性和智能性。信息技术正在走向一个新的“软件定义”(SD)时代,这个时代使得软件更多地“控制”用于计算、存储、传输和网络的更广泛的设备和硬件系统。软件定义系统是指在信息技术领域中出现的一组使能软件技术。例如SDN (Software Defined Networking)、SDSec (Software Defined Security)、SDDC (Software Defined Data Center)、SDS (Software Defined Storage)和SDR (Software Defined Radio)。考虑到它们的独特特性,这些系统的软件开发提出了新的挑战。在本文中,我们计划设计和开发将应用于软件生命周期的软件定义方法(SDM)。在SDM的支持下,我们相信SD系统将具有安全、可靠、QOS保证、适应性、低功耗、态势感知等智能特性。等。
{"title":"Applying Software Defined Methodologies to Software Computing","authors":"W. Chu, Chih-Hung Chang, Tse-Chuan Hsu, Yen-Hua Huang","doi":"10.1109/TSA.2016.15","DOIUrl":"https://doi.org/10.1109/TSA.2016.15","url":null,"abstract":"Computing systems and services are now required to provide services with quality, intelligence, accuracy, adaptation, and effectiveness to satisfy the demands of users. Most of the existing systems are executed with fixed computing logic and rules without the flexibility and smartness to react the dynamic changes of computing situations and environment. Information technology is moving toward a new \"software-defined\" (SD) era that makes the software more \"in command\" of a greater range of devices and hardware systems for computing, storage, transmission, and networking. Software defined systems refer to a collection of enabling software technologies that are emerging in the information technology arena. Examples include Software Defined Networking (SDN), Software Defined Security (SDSec), Software Defined Data Center (SDDC), Software Defined Storage (SDS), and Software-Defined Radio (SDR). Considering their unique features, software development of these systems raises new challenges. In this paper, we plan to design and develop Software-defined Methodologies (SDM) which will be applied to software life cycle. With the support of SDM, we believe SD systems will contain the intelligent characteristics, such as security, reliability, QOS assurance, adaptability, low power consumption, situation awareness... etc.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116732969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Architecture of OPAL for the Software Process Improvement in High Maturity Level 面向高成熟度软件过程改进的OPAL体系结构
Sidou Dong, Aihua Ren, Xin Wang
As an infrastructure of software enterprise management, organizational process asset library (OPAL) is vital essential to deploy and improve processes of software organizations. Not well managed and maintained OPAL will make more difficulties for software process improvement work. In order to do the process improvement work effectively, the paper proposes OPAL architecture for process improvements, especially for process improvements in high maturity level. This architecture has been used in an actual enterprise for high maturity level process improvement, and it has been illustrated that the architecture is easy for maintenance and extension. This architecture can furnish valuable practices for software enterprises to manage and maintain OPAL.
组织过程资产库(OPAL)作为软件企业管理的基础设施,对软件组织过程的部署和改进至关重要。管理和维护不好的OPAL会给软件过程改进工作带来更多的困难。为了有效地进行过程改进工作,本文提出了用于过程改进的OPAL体系结构,特别是用于高成熟度阶段的过程改进。该体系结构已在实际企业中用于高成熟度级别的过程改进,并且表明该体系结构易于维护和扩展。该体系结构可以为软件企业管理和维护OPAL提供有价值的实践。
{"title":"The Architecture of OPAL for the Software Process Improvement in High Maturity Level","authors":"Sidou Dong, Aihua Ren, Xin Wang","doi":"10.1109/TSA.2016.21","DOIUrl":"https://doi.org/10.1109/TSA.2016.21","url":null,"abstract":"As an infrastructure of software enterprise management, organizational process asset library (OPAL) is vital essential to deploy and improve processes of software organizations. Not well managed and maintained OPAL will make more difficulties for software process improvement work. In order to do the process improvement work effectively, the paper proposes OPAL architecture for process improvements, especially for process improvements in high maturity level. This architecture has been used in an actual enterprise for high maturity level process improvement, and it has been illustrated that the architecture is easy for maintenance and extension. This architecture can furnish valuable practices for software enterprises to manage and maintain OPAL.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics 数字取证中基于时空属性的证据固定方法
Yu Yang, C. Li, Guozi Sun
Digital evidence might be tampered in the process of digital forensics, which would reduce the credibility of the evidence. Considering the lack of reliability in traditional digital forensics, the authors introduce the idea of a time-space attribute-based evidence fixing method (TAEFM). It fixes digital evidence by generation hash code with fingerprint identification data, trusted time-stamp and e-signature. This system can enhance the credibility of digital evidence and verify whether and which part of evidence was tampered. The location of tampered evidence can be extending to the further forensics.
在数字取证过程中,数字证据可能会被篡改,从而降低证据的可信度。针对传统数字取证中可靠性不足的问题,提出了一种基于时空属性的证据固定方法。它通过生成带有指纹识别数据、可信时间戳和电子签名的哈希码来修复数字证据。该系统可以提高数字证据的可信度,验证证据是否被篡改,哪些部分被篡改。篡改证据的位置可以延伸到进一步的取证。
{"title":"A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics","authors":"Yu Yang, C. Li, Guozi Sun","doi":"10.1109/TSA.2016.30","DOIUrl":"https://doi.org/10.1109/TSA.2016.30","url":null,"abstract":"Digital evidence might be tampered in the process of digital forensics, which would reduce the credibility of the evidence. Considering the lack of reliability in traditional digital forensics, the authors introduce the idea of a time-space attribute-based evidence fixing method (TAEFM). It fixes digital evidence by generation hash code with fingerprint identification data, trusted time-stamp and e-signature. This system can enhance the credibility of digital evidence and verify whether and which part of evidence was tampered. The location of tampered evidence can be extending to the further forensics.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134619524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generalized Multiple-Valued Decision Diagram for Reliability Analysis of Fault-Tolerant Systems 容错系统可靠性分析的广义多值决策图
Jianwen Xiang, Siwei Zhou, Luyao Ye, Shengwu Xiong, W. E. Wong
Binary Decision Diagrams (BDDs) and their extensions multiple-valued decision diagrams (MDDs) have been adapted for reliability analysis of fault tolerant systems. Particularly, the MDDs are used to solve traditional coverage models (CMs) where an uncovered component failure may lead to system failure without constraint. This paper presents a new family of decision diagrams, generalized multiple-valued decision diagrams (GMDDs) for the latest irrelevancy coverage model (ICM). In contrast to traditional CMs, the ICM can detect and isolate components whenever they become irrelevant due to the failures of other components, and thus an uncovered component failure can only lead to system failure with the constraint when the component is relevant. Compared with the traditional MDD approach, the GMDD can handle constrained uncovered component failures, and it can incorporate general imperfect fault coverage modelling, including the ICM and traditional CMs.
二值决策图(bdd)及其扩展多值决策图(mdd)已被用于容错系统的可靠性分析。特别是,mdd用于解决传统的覆盖模型(CMs),其中未覆盖的组件故障可能导致没有约束的系统故障。本文针对最新的不相关覆盖模型(ICM)提出了一类新的决策图——广义多值决策图(gmdd)。与传统的CMs相比,ICM可以在组件由于其他组件的故障而变得无关时检测和隔离组件,因此,未发现的组件故障仅在组件相关时才会导致系统故障。与传统的MDD方法相比,GMDD方法可以处理受约束的未覆盖组件故障,并且可以结合一般的不完全故障覆盖模型,包括ICM和传统的CMs。
{"title":"A Generalized Multiple-Valued Decision Diagram for Reliability Analysis of Fault-Tolerant Systems","authors":"Jianwen Xiang, Siwei Zhou, Luyao Ye, Shengwu Xiong, W. E. Wong","doi":"10.1109/TSA.2016.16","DOIUrl":"https://doi.org/10.1109/TSA.2016.16","url":null,"abstract":"Binary Decision Diagrams (BDDs) and their extensions multiple-valued decision diagrams (MDDs) have been adapted for reliability analysis of fault tolerant systems. Particularly, the MDDs are used to solve traditional coverage models (CMs) where an uncovered component failure may lead to system failure without constraint. This paper presents a new family of decision diagrams, generalized multiple-valued decision diagrams (GMDDs) for the latest irrelevancy coverage model (ICM). In contrast to traditional CMs, the ICM can detect and isolate components whenever they become irrelevant due to the failures of other components, and thus an uncovered component failure can only lead to system failure with the constraint when the component is relevant. Compared with the traditional MDD approach, the GMDD can handle constrained uncovered component failures, and it can incorporate general imperfect fault coverage modelling, including the ICM and traditional CMs.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tracking Down Dynamic Feature Code Changes against Python Software Evolution 根据Python软件演进跟踪动态特性代码变更
Zhifei Chen, Wanwangying Ma, Wei Lin, Lin Chen, Baowen Xu
Python, a typical dynamic programming language, is increasingly used in many application domains. Dynamic features in Python allow developers to change the code at runtime. Some dynamic features such as dynamic type checking play an active part in maintenance activities, thus dynamic feature code is often changed to cater to software evolution. The aim of this paper is exploring and validating the characteristics of feature changes in Python. We collected change occurrences in 85 open-source projects and discovered the relationship between feature changes and bug-fix activities. Furthermore, we went into 358 change occurrences to explore the causes and behaviors of feature changes. The results show that: (1) dynamic features are increasingly used and the code is changeable; (2) most dynamic features may behave that feature code is more likely to be changed in bug-fix activities than non-bugfix activities; (3) dynamic feature code plays both positive and negative roles in maintenance activities. Our results provide useful guidance and insights for improving automatic program repair and refactoring tools.
Python是一种典型的动态编程语言,越来越多地应用于许多应用领域。Python中的动态特性允许开发人员在运行时更改代码。一些动态特性(如动态类型检查)在维护活动中起着积极的作用,因此动态特性代码经常被更改以适应软件的发展。本文的目的是探索和验证Python中特性变化的特征。我们收集了85个开源项目中发生的变更,并发现了特性变更和bug修复活动之间的关系。此外,我们深入研究了358个变化事件,以探讨特征变化的原因和行为。结果表明:(1)动态特征的使用越来越多,编码变化较大;(2)大多数动态特性可能表现为特性代码在bug修复活动中比在非bug修复活动中更有可能被更改;(3)动态特征代码在维护活动中既有积极作用,也有消极作用。我们的结果为改进自动程序修复和重构工具提供了有用的指导和见解。
{"title":"Tracking Down Dynamic Feature Code Changes against Python Software Evolution","authors":"Zhifei Chen, Wanwangying Ma, Wei Lin, Lin Chen, Baowen Xu","doi":"10.1109/TSA.2016.19","DOIUrl":"https://doi.org/10.1109/TSA.2016.19","url":null,"abstract":"Python, a typical dynamic programming language, is increasingly used in many application domains. Dynamic features in Python allow developers to change the code at runtime. Some dynamic features such as dynamic type checking play an active part in maintenance activities, thus dynamic feature code is often changed to cater to software evolution. The aim of this paper is exploring and validating the characteristics of feature changes in Python. We collected change occurrences in 85 open-source projects and discovered the relationship between feature changes and bug-fix activities. Furthermore, we went into 358 change occurrences to explore the causes and behaviors of feature changes. The results show that: (1) dynamic features are increasingly used and the code is changeable; (2) most dynamic features may behave that feature code is more likely to be changed in bug-fix activities than non-bugfix activities; (3) dynamic feature code plays both positive and negative roles in maintenance activities. Our results provide useful guidance and insights for improving automatic program repair and refactoring tools.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121890438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Normalized-PSO and Its Application in Attribute Weighted Optimal Problem 归一化粒子群及其在属性加权最优问题中的应用
Jin Gou, Cheng Wang, Weihua Luo, Jin Gou
Traditional PSO(Particle Swarm Optimization) algorithm has the problems of particle cross-border and premature convergence while solving the normalized constrained optimization problem. Our paper uses the attractor and spatial zoom method, and presented the normalized PSO algorithm. Secondly, each attribute is treated equally in the traditional classification algorithm, without considering the differences in attribute measure and contribution, which cause the problem of low classification accuracy. Our paper introduce the use of the normalized PSO algorithm to solve the optimal attribute normalized weighted distance. For example, in KNN classifier, leave-one-out experimental results with multiple UCI data sets show that the classification accuracy using normalization PSO algorithm to calculate normalized weighted distance is higher than using PSO algorithm and traditional none-attribute weighted classifiers.
传统的粒子群优化算法在求解归一化约束优化问题时存在粒子跨界和过早收敛的问题。本文采用吸引子和空间缩放方法,提出了归一化粒子群算法。其次,传统的分类算法对每个属性都一视同仁,没有考虑属性测度和贡献的差异,导致分类精度不高的问题。本文介绍了利用归一化粒子群算法求解最优属性归一化加权距离的方法。例如,在KNN分类器中,多个UCI数据集的留一实验结果表明,使用归一化PSO算法计算归一化加权距离的分类精度高于使用PSO算法和传统的无属性加权分类器。
{"title":"The Normalized-PSO and Its Application in Attribute Weighted Optimal Problem","authors":"Jin Gou, Cheng Wang, Weihua Luo, Jin Gou","doi":"10.1109/TSA.2016.18","DOIUrl":"https://doi.org/10.1109/TSA.2016.18","url":null,"abstract":"Traditional PSO(Particle Swarm Optimization) algorithm has the problems of particle cross-border and premature convergence while solving the normalized constrained optimization problem. Our paper uses the attractor and spatial zoom method, and presented the normalized PSO algorithm. Secondly, each attribute is treated equally in the traditional classification algorithm, without considering the differences in attribute measure and contribution, which cause the problem of low classification accuracy. Our paper introduce the use of the normalized PSO algorithm to solve the optimal attribute normalized weighted distance. For example, in KNN classifier, leave-one-out experimental results with multiple UCI data sets show that the classification accuracy using normalization PSO algorithm to calculate normalized weighted distance is higher than using PSO algorithm and traditional none-attribute weighted classifiers.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliability Analysis of Drilling Mud Pump Pressure Cylinder Hydraulic System 钻井泥浆泵压力缸液压系统可靠性分析
Deliang Gu, Kuisheng Chen, Xinbo Qian, Congchang Zhan
The drilling pump is one of three major parts of a drilling rig, and is the key equipment of the drilling fluid circulation system. In this paper, the reliability of a ZCL-1600-type drilling mud pump pressure cylinder of the hydraulic system is carried on the thorough discussion. The reliability block diagram is established by qualitative analysis and quantitative calculation. Reliability assessment is calculated for the hydraulic system under a specific operation condition. Moreover, a mathematical model is established to optimize the maintenance interval for the hydraulic system by minimizing the maintenance cost. Finally, two case studies are illustrated to verify the reliability and maintenance model by simulation based on Matlab.
钻井泵是钻机的三大部件之一,是钻井液循环系统的关键设备。本文对zcl -1600型钻井泥浆泵压力缸液压系统的可靠性进行了深入的探讨。通过定性分析和定量计算,建立了可靠性框图。对液压系统在特定工况下的可靠性进行了计算。在此基础上,建立了以最小化维修成本为目标的液压系统维修间隔优化数学模型。最后,通过两个实例验证了基于Matlab的可靠性和维护模型的仿真。
{"title":"Reliability Analysis of Drilling Mud Pump Pressure Cylinder Hydraulic System","authors":"Deliang Gu, Kuisheng Chen, Xinbo Qian, Congchang Zhan","doi":"10.1109/TSA.2016.25","DOIUrl":"https://doi.org/10.1109/TSA.2016.25","url":null,"abstract":"The drilling pump is one of three major parts of a drilling rig, and is the key equipment of the drilling fluid circulation system. In this paper, the reliability of a ZCL-1600-type drilling mud pump pressure cylinder of the hydraulic system is carried on the thorough discussion. The reliability block diagram is established by qualitative analysis and quantitative calculation. Reliability assessment is calculated for the hydraulic system under a specific operation condition. Moreover, a mathematical model is established to optimize the maintenance interval for the hydraulic system by minimizing the maintenance cost. Finally, two case studies are illustrated to verify the reliability and maintenance model by simulation based on Matlab.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Performance Testing of Information System Based on Domestic CPU and OS 基于国产CPU和操作系统的信息系统性能测试研究
Li Dong, Xiong Jing, Yang Chunhui
In order to evaluate the performance of of information system based on domestic CPU and OS, through the introduction of the background of basic hardware and software based on domestic, we expound the domestic information system performance testing principle and method, according to the testing results of existing mature commercial performance testing tool LoadRunner can not reflect the user experience of time, and can not be directly used for testing the information system which based on domestic CPU/OS, this paper put forward the two kinds of testing schemes that base on user experience of LoadRunner and JMeter domestic information system performance test, and test two kinds of improved schemes, through the comparison of the test data and the user experience time of the two schemes, the variance of the test scheme based on JMeter is smaller than LoadRunner test scheme 70.49%. The results show that the test results of the JMeter scheme are more close to the user experience than LoadRunner.
为了评估基于国产CPU和操作系统的信息系统的性能,通过介绍基于国产的基本软硬件的背景,阐述了国产信息系统性能测试的原理和方法,根据现有成熟商用性能测试工具LoadRunner的测试结果不能反映时间的用户体验,由于不能直接用于测试基于国产CPU/OS的信息系统,本文提出了基于用户体验的两种测试方案LoadRunner和JMeter国产信息系统性能测试,并对两种改进方案进行了测试,通过对比两种方案的测试数据和用户体验时间,基于JMeter的测试方案的方差比基于LoadRunner的测试方案小70.49%。结果表明,JMeter方案的测试结果比LoadRunner方案更接近用户体验。
{"title":"Study of Performance Testing of Information System Based on Domestic CPU and OS","authors":"Li Dong, Xiong Jing, Yang Chunhui","doi":"10.1109/TSA.2016.27","DOIUrl":"https://doi.org/10.1109/TSA.2016.27","url":null,"abstract":"In order to evaluate the performance of of information system based on domestic CPU and OS, through the introduction of the background of basic hardware and software based on domestic, we expound the domestic information system performance testing principle and method, according to the testing results of existing mature commercial performance testing tool LoadRunner can not reflect the user experience of time, and can not be directly used for testing the information system which based on domestic CPU/OS, this paper put forward the two kinds of testing schemes that base on user experience of LoadRunner and JMeter domestic information system performance test, and test two kinds of improved schemes, through the comparison of the test data and the user experience time of the two schemes, the variance of the test scheme based on JMeter is smaller than LoadRunner test scheme 70.49%. The results show that the test results of the JMeter scheme are more close to the user experience than LoadRunner.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach 在点对点流系统中对抗污染攻击:一种动态声誉管理方法
Shiyu Wang, Kun Lu, Mingchu Li, Qilong Zhen, Xiaoyu Che
P2P streaming systems are popular applications on internet. However, due to the open nature, P2P streaming systems are vulnerable to malicious attacks, especially data pollution attacks. Reputation-based mechanisms are most effective mechanisms to defend data pollution attacks in P2P streaming systems. In this paper, we propose a dynamic reputation management. In our proposed mechanism, a peer's reputation consists of direct and indirect trust. The confidence factor is used to determine the weight of direct trust. We introduce Gompertz Function to adjust the confidence factor, the more interactions, the larger weight of direct trust value is. Besides, to lower the complexity of calculating indirect trust, we introduce threedegree of separation, which only includes neighbors within three degrees while calculating indirect trust. Simulation results show that our proposed reputation management scheme can effectively separate malicious peers, reduce the dissemination of polluted data chunks and defend various kinds of data pollution attacks.
P2P流媒体系统是互联网上的热门应用。然而,由于P2P流媒体系统的开放性,它很容易受到恶意攻击,尤其是数据污染攻击。基于声誉的机制是P2P流系统中防御数据污染攻击最有效的机制。本文提出了一种动态的声誉管理方法。在我们提出的机制中,同行的声誉包括直接信任和间接信任。信任因子用于确定直接信任的权重。引入Gompertz函数对信任因子进行调整,相互作用越多,直接信任值的权重越大。此外,为了降低间接信任计算的复杂性,我们引入了三度分离,在计算间接信任时只包括三度内的邻居。仿真结果表明,所提出的信誉管理方案能够有效分离恶意节点,减少污染数据块的传播,防御各种数据污染攻击。
{"title":"Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach","authors":"Shiyu Wang, Kun Lu, Mingchu Li, Qilong Zhen, Xiaoyu Che","doi":"10.1109/TSA.2016.14","DOIUrl":"https://doi.org/10.1109/TSA.2016.14","url":null,"abstract":"P2P streaming systems are popular applications on internet. However, due to the open nature, P2P streaming systems are vulnerable to malicious attacks, especially data pollution attacks. Reputation-based mechanisms are most effective mechanisms to defend data pollution attacks in P2P streaming systems. In this paper, we propose a dynamic reputation management. In our proposed mechanism, a peer's reputation consists of direct and indirect trust. The confidence factor is used to determine the weight of direct trust. We introduce Gompertz Function to adjust the confidence factor, the more interactions, the larger weight of direct trust value is. Besides, to lower the complexity of calculating indirect trust, we introduce threedegree of separation, which only includes neighbors within three degrees while calculating indirect trust. Simulation results show that our proposed reputation management scheme can effectively separate malicious peers, reduce the dissemination of polluted data chunks and defend various kinds of data pollution attacks.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129591250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Separation of Concerns in Analysis of Artifact Anomalies within Workflow Models 工作流模型中工件异常分析中的关注点分离
Feng-Jian Wang, Tennyson Lu, Hwai-Jung Hsu
Workflows which realize parts of business goals in a particular order automate the business processes within enterprises. To guarantee the correctness of workflow execution, analyses on structural integrity of workflows are essential. However, comparing to the sequential activities, the activities executed in orders, the anomalies caused by parallel activities are far more complicated for analysis. Therefore, separation of concerns among sequential and parallel issues while doing analysis can reduce the complexity among analysis time and human recognition. In this paper, we propose an innovative methodology considering sequential and parallel issues separately within workflow models to detect anomalies in a given workflow. As a result, the cost for anomaly detection is lowered and the complexity for human recognition of the anomaly issues is reduced.
以特定顺序实现部分业务目标的工作流使企业内的业务流程自动化。为了保证工作流执行的正确性,必须对工作流的结构完整性进行分析。然而,与顺序活动(按顺序执行的活动)相比,并行活动引起的异常要复杂得多,难以分析。因此,在进行分析时分离顺序和并行问题之间的关注点可以减少分析时间和人类识别之间的复杂性。在本文中,我们提出了一种创新的方法,在工作流模型中分别考虑顺序和并行问题来检测给定工作流中的异常。从而降低了异常检测的成本,降低了人类识别异常问题的复杂性。
{"title":"Separation of Concerns in Analysis of Artifact Anomalies within Workflow Models","authors":"Feng-Jian Wang, Tennyson Lu, Hwai-Jung Hsu","doi":"10.1109/TSA.2016.11","DOIUrl":"https://doi.org/10.1109/TSA.2016.11","url":null,"abstract":"Workflows which realize parts of business goals in a particular order automate the business processes within enterprises. To guarantee the correctness of workflow execution, analyses on structural integrity of workflows are essential. However, comparing to the sequential activities, the activities executed in orders, the anomalies caused by parallel activities are far more complicated for analysis. Therefore, separation of concerns among sequential and parallel issues while doing analysis can reduce the complexity among analysis time and human recognition. In this paper, we propose an innovative methodology considering sequential and parallel issues separately within workflow models to detect anomalies in a given workflow. As a result, the cost for anomaly detection is lowered and the complexity for human recognition of the anomaly issues is reduced.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131097765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2016 Third International Conference on Trustworthy Systems and their Applications (TSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1