首页 > 最新文献

2012 Ninth International Conference on Information Technology - New Generations最新文献

英文 中文
Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That? 使用基于逆向工程测试的模型生成更多测试:其中的意义在哪里?
T. Kanstrén, Éric Piel, H. Groß
Model-based testing is a process of generating tests for a test target based on a behavioral model. In many cases, suitable models do not exist and building these from scratch is a costly effort. A potential approach to bootstrap this process is to generate models with reverse-engineering methods. Potential sources of information for such models include user sessions, existing test cases, and field data. All of these can be seen as different forms of test data. However, using existing test cases as a basis to create a model for test generation raises the question of what is the benefit over the previously existing tests. This paper aims to answer this question by evaluating the benefits in terms of a practical case study.
基于模型的测试是基于行为模型为测试目标生成测试的过程。在许多情况下,不存在合适的模型,并且从头构建这些模型是一项代价高昂的工作。引导此过程的一个潜在方法是使用逆向工程方法生成模型。此类模型的潜在信息源包括用户会话、现有测试用例和字段数据。所有这些都可以看作是不同形式的测试数据。然而,使用现有的测试用例作为创建测试生成模型的基础,提出了一个问题,即相对于先前存在的测试,它的好处是什么。本文旨在回答这个问题,通过评估效益方面的实际案例研究。
{"title":"Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That?","authors":"T. Kanstrén, Éric Piel, H. Groß","doi":"10.1109/ITNG.2012.42","DOIUrl":"https://doi.org/10.1109/ITNG.2012.42","url":null,"abstract":"Model-based testing is a process of generating tests for a test target based on a behavioral model. In many cases, suitable models do not exist and building these from scratch is a costly effort. A potential approach to bootstrap this process is to generate models with reverse-engineering methods. Potential sources of information for such models include user sessions, existing test cases, and field data. All of these can be seen as different forms of test data. However, using existing test cases as a basis to create a model for test generation raises the question of what is the benefit over the previously existing tests. This paper aims to answer this question by evaluating the benefits in terms of a practical case study.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130826485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of a Countering Method to Social Bookmarking Pollution Based on Degree of Bookmark Similarity 基于书签相似度的社会书签污染防治方法性能评价
H. Hisamatsu, T. Hatanaka
Social Book marking (SBM) is one of the most widely used Web services. An SBM website displays and shares each user's bookmarks. The SBM service aggregates the number of users who bookmark a given Web page and provides useful information as a result of these aggregations. However, an increase in the popularity of the SBM service and in the number of the users of the SBM service results in an increase in the amount of SBM SPAM. In addition, the SBM service generates irrelevant information to many users because of the aggregation of a large number of bookmarks, we call this problem "SBM pollution." In this paper, we propose a method for countering the problem of SBM pollution based on the degree of bookmark similarity. The proposed method creates blacklists that contain lists of users having a high degree of bookmark similarity. Based on the created blacklists, the number of bookmarks of the Web pages influenced by SBM pollution is reduced. From the results of the performance evaluation, we show that our method reduces the number of bookmarks of most Web pages influenced by the SBM pollution to a great extent.
社会图书标记(SBM)是使用最广泛的Web服务之一。SBM网站显示并共享每个用户的书签。SBM服务聚合为给定Web页面添加书签的用户数量,并根据这些聚合提供有用的信息。然而,随着SBM服务的普及和SBM服务用户数量的增加,导致SBM垃圾邮件的数量增加。此外,由于大量书签的聚集,SBM服务对很多用户产生了不相关的信息,我们称这种问题为“SBM污染”。本文提出了一种基于书签相似度的SBM污染处理方法。提出的方法创建黑名单,其中包含书签高度相似的用户列表。根据创建的黑名单,减少受SBM污染影响的网页的书签数量。从性能评估结果来看,我们的方法在很大程度上减少了受SBM污染影响的大多数网页的书签数量。
{"title":"Performance Evaluation of a Countering Method to Social Bookmarking Pollution Based on Degree of Bookmark Similarity","authors":"H. Hisamatsu, T. Hatanaka","doi":"10.1109/ITNG.2012.144","DOIUrl":"https://doi.org/10.1109/ITNG.2012.144","url":null,"abstract":"Social Book marking (SBM) is one of the most widely used Web services. An SBM website displays and shares each user's bookmarks. The SBM service aggregates the number of users who bookmark a given Web page and provides useful information as a result of these aggregations. However, an increase in the popularity of the SBM service and in the number of the users of the SBM service results in an increase in the amount of SBM SPAM. In addition, the SBM service generates irrelevant information to many users because of the aggregation of a large number of bookmarks, we call this problem \"SBM pollution.\" In this paper, we propose a method for countering the problem of SBM pollution based on the degree of bookmark similarity. The proposed method creates blacklists that contain lists of users having a high degree of bookmark similarity. Based on the created blacklists, the number of bookmarks of the Web pages influenced by SBM pollution is reduced. From the results of the performance evaluation, we show that our method reduces the number of bookmarks of most Web pages influenced by the SBM pollution to a great extent.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Model-Based Design 探索基于模型的设计
Devon M. Simmonds, Mark Lanter, Lyle Scott, A. Young, Selin Benli, A. Herrmann
Many universities are taking advantage of distance education technology in order to provide more learning opportunities for students. This paper describes the design of an interactive classroom environment called White Board. For ease of navigability and access to instructional material, the software is designed with multiple windows and tabs in the basic user interface. The design enables users to access all course data without having to navigate away from the homepage. Windows are updated individually to avoid refreshing the whole page when changing tabs or loading material. Principles of design, results and future directions are presented.
许多大学正在利用远程教育技术为学生提供更多的学习机会。本文介绍了一个名为白板的交互式课堂环境的设计。为了便于导航和访问教学材料,该软件在基本用户界面上设计了多个窗口和选项卡。该设计使用户无需离开主页就可以访问所有课程数据。Windows是单独更新的,以避免在更改选项卡或加载材料时刷新整个页面。介绍了设计原理、结果和未来发展方向。
{"title":"Exploring Model-Based Design","authors":"Devon M. Simmonds, Mark Lanter, Lyle Scott, A. Young, Selin Benli, A. Herrmann","doi":"10.1109/ITNG.2012.156","DOIUrl":"https://doi.org/10.1109/ITNG.2012.156","url":null,"abstract":"Many universities are taking advantage of distance education technology in order to provide more learning opportunities for students. This paper describes the design of an interactive classroom environment called White Board. For ease of navigability and access to instructional material, the software is designed with multiple windows and tabs in the basic user interface. The design enables users to access all course data without having to navigate away from the homepage. Windows are updated individually to avoid refreshing the whole page when changing tabs or loading material. Principles of design, results and future directions are presented.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Annotating Resources in Sequence Diagrams for Testing Web Security 在序列图中标注资源用于测试Web安全性
Weifeng Xu, Lin Deng, Qing Zheng
Both legitimate users and attackers use web resources to realize their goals. These goals are either desired or malicious in terms of the role of the users. This paper presents a novel approach for testing web security by focusing on the web resources used/exploited by both legitimate users and attackers.
合法用户和攻击者都使用web资源来实现他们的目的。就用户的角色而言,这些目标要么是期望的,要么是恶意的。本文提出了一种新的方法,通过关注合法用户和攻击者使用/利用的web资源来测试web安全性。
{"title":"Annotating Resources in Sequence Diagrams for Testing Web Security","authors":"Weifeng Xu, Lin Deng, Qing Zheng","doi":"10.1109/ITNG.2012.78","DOIUrl":"https://doi.org/10.1109/ITNG.2012.78","url":null,"abstract":"Both legitimate users and attackers use web resources to realize their goals. These goals are either desired or malicious in terms of the role of the users. This paper presents a novel approach for testing web security by focusing on the web resources used/exploited by both legitimate users and attackers.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116387449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless Networks 现实无线网络中基于地理聚类的覆盖图平面化
Emi Mathews
Geographic routing based on greedy forwarding at node level and planar graph routing at overlay level is more efficient than both being performed at node level, especially when topology changes frequently. Overlay graphs based on geographic clusters constructed for wireless networks, modeled as 2D graphs, are generally nonplanar and planar graph routing applied on such overlay graphs may fail. Existing planarization algorithms create planar overlay graphs, when the network graphs obey assumptions like Unit Disk Graph (UDG) property. However, in real wireless networks due to radio range irregularities they fail to create connected planar graphs for connected network graphs. We propose a new planarization algorithm for overlay graphs based on the localized link removal and addition based planarization algorithm. Theoretical analysis shows that planarized graphs created by our algorithm are always planar and connected for connected UDG modeled networks. Evaluation of our algorithm on Log Normal Shadowing model, a realistic wireless model, shows that our algorithm creates connected networks in almost all simulations. Moreover, the probability of getting planar graphs is really high compared to the existing planarization algorithms.
特别是在拓扑结构频繁变化的情况下,节点级贪婪转发的地理路由和覆盖级平面图路由的效率都高于节点级。基于地理聚类为无线网络构建的覆盖图,建模为二维图,通常是非平面的,在这种覆盖图上应用平面图路由可能会失败。现有的平面化算法在网络图服从单位磁盘图(Unit Disk Graph, UDG)等属性的前提下,生成平面叠加图。然而,在实际的无线网络中,由于无线电范围的不规则性,它们不能为连通的网络图创建连通的平面图。提出了一种基于局部链路去除和加法的叠加图平面化算法。理论分析表明,对于连通的UDG模型网络,我们的算法生成的平面化图始终是平面且连通的。我们的算法在对数正态阴影模型(一个真实的无线模型)上的评估表明,我们的算法在几乎所有的模拟中都能创建连接网络。而且,与现有的平面化算法相比,得到平面图的概率非常高。
{"title":"Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless Networks","authors":"Emi Mathews","doi":"10.1109/ITNG.2012.22","DOIUrl":"https://doi.org/10.1109/ITNG.2012.22","url":null,"abstract":"Geographic routing based on greedy forwarding at node level and planar graph routing at overlay level is more efficient than both being performed at node level, especially when topology changes frequently. Overlay graphs based on geographic clusters constructed for wireless networks, modeled as 2D graphs, are generally nonplanar and planar graph routing applied on such overlay graphs may fail. Existing planarization algorithms create planar overlay graphs, when the network graphs obey assumptions like Unit Disk Graph (UDG) property. However, in real wireless networks due to radio range irregularities they fail to create connected planar graphs for connected network graphs. We propose a new planarization algorithm for overlay graphs based on the localized link removal and addition based planarization algorithm. Theoretical analysis shows that planarized graphs created by our algorithm are always planar and connected for connected UDG modeled networks. Evaluation of our algorithm on Log Normal Shadowing model, a realistic wireless model, shows that our algorithm creates connected networks in almost all simulations. Moreover, the probability of getting planar graphs is really high compared to the existing planarization algorithms.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121416062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Constraint-Driven Business Object Model for Service-Based Business Processes 基于服务的业务流程的约束驱动业务对象模型
F. Zulkernine, P. Bertoli, M. Pistore, A. Friesen, J. Lemcke, Bernhard Thimmel, O. Geisau
Business today is increasingly becoming service-driven. A service represents either a part of or a complete business process, which in turn depicts the life cycle of a Business Object (BO). A number of actions constrained by a set of business policies cause the BO to transit from an initial state to a final state during its life cycle. The constraints would vary for different customized business processes. To engineer reliable service based systems it is crucial to verify the reachability of the desired final states of the BO model against a given set of constraints. We propose the formal specification of a constraint-driven BO model, and thereby, present a verification tool to validate the life cycle of the BO model given a set of constraints. The core object and its constraint-driven life cycle are modeled separately for flexibility and customizability. We also define a language specification to represent our BO model and the business goals. The specification is automatically interpreted by our verification tool, which outputs a graphical view of the life cycle and a textual report of the validation results.
今天的商业日益成为服务驱动的。服务代表业务流程的一部分或完整的业务流程,而业务流程又描述了业务对象(BO)的生命周期。受一组业务策略约束的许多操作导致BO在其生命周期中从初始状态过渡到最终状态。对于不同的定制业务流程,约束条件会有所不同。为了设计可靠的基于服务的系统,根据给定的一组约束来验证BO模型的期望最终状态的可达性是至关重要的。我们提出了约束驱动的BO模型的形式化规范,从而提供了一个验证工具来验证给定一组约束的BO模型的生命周期。为了灵活性和可定制性,对核心对象及其约束驱动的生命周期分别建模。我们还定义了一个语言规范来表示我们的BO模型和业务目标。规范由我们的验证工具自动解释,它输出生命周期的图形视图和验证结果的文本报告。
{"title":"A Constraint-Driven Business Object Model for Service-Based Business Processes","authors":"F. Zulkernine, P. Bertoli, M. Pistore, A. Friesen, J. Lemcke, Bernhard Thimmel, O. Geisau","doi":"10.1109/ITNG.2012.170","DOIUrl":"https://doi.org/10.1109/ITNG.2012.170","url":null,"abstract":"Business today is increasingly becoming service-driven. A service represents either a part of or a complete business process, which in turn depicts the life cycle of a Business Object (BO). A number of actions constrained by a set of business policies cause the BO to transit from an initial state to a final state during its life cycle. The constraints would vary for different customized business processes. To engineer reliable service based systems it is crucial to verify the reachability of the desired final states of the BO model against a given set of constraints. We propose the formal specification of a constraint-driven BO model, and thereby, present a verification tool to validate the life cycle of the BO model given a set of constraints. The core object and its constraint-driven life cycle are modeled separately for flexibility and customizability. We also define a language specification to represent our BO model and the business goals. The specification is automatically interpreted by our verification tool, which outputs a graphical view of the life cycle and a textual report of the validation results.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"55 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120920415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Region of Interest Localization of Cardiac Structure from Cine MRI Images 基于MRI影像的心脏结构感兴趣区域定位
Marwa M. A. Hadhoud, M. Eladawy, A. Seddik
In this paper, we present a new method for localizing the position of the heart from Cine MRI images. This method depends on calculating the summation of the difference between images of a specific slice that we work on it, then applying thresholding on the resulting image to get the region of interest. To validate our method, we compare between our results and results of another method used in localizing the position of the heart which depends on the standard deviation. We worked on images of 14 different patients, come from STACOM database. We achieved by this method good results in determining the position of the heart. This method has different advantages like: it works on different contrast images, fast, and fully automatic.
本文提出了一种利用MRI图像定位心脏位置的新方法。该方法依赖于计算我们处理的特定切片的图像之间的差的总和,然后对结果图像应用阈值以获得感兴趣的区域。为了验证我们的方法,我们将我们的结果与另一种用于定位心脏位置的方法的结果进行比较,这取决于标准偏差。我们研究了来自STACOM数据库的14位不同患者的图像。我们用这种方法在确定心脏位置方面取得了很好的效果。该方法具有以下优点:适用于不同对比度的图像,速度快,全自动。
{"title":"Region of Interest Localization of Cardiac Structure from Cine MRI Images","authors":"Marwa M. A. Hadhoud, M. Eladawy, A. Seddik","doi":"10.1109/ITNG.2012.10","DOIUrl":"https://doi.org/10.1109/ITNG.2012.10","url":null,"abstract":"In this paper, we present a new method for localizing the position of the heart from Cine MRI images. This method depends on calculating the summation of the difference between images of a specific slice that we work on it, then applying thresholding on the resulting image to get the region of interest. To validate our method, we compare between our results and results of another method used in localizing the position of the heart which depends on the standard deviation. We worked on images of 14 different patients, come from STACOM database. We achieved by this method good results in determining the position of the heart. This method has different advantages like: it works on different contrast images, fast, and fully automatic.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Social Networks to Improve the Performance of a Service Desk 使用社交网络来提高服务台的性能
J. M. Gonçalves, Rejane Pereira da Silva Gonçalves
This paper take a closer look at the aspects of the actual implementation, dissemination and use of social networks to obtain as a result of increased quality and improving service to customers of a Service Desk in a generic service desk of a hypothetical data center.
本文仔细研究了实际实施、传播和使用社交网络的各个方面,从而在假设的数据中心的通用服务台中获得提高质量和改进服务的结果。
{"title":"Using Social Networks to Improve the Performance of a Service Desk","authors":"J. M. Gonçalves, Rejane Pereira da Silva Gonçalves","doi":"10.1109/ITNG.2012.74","DOIUrl":"https://doi.org/10.1109/ITNG.2012.74","url":null,"abstract":"This paper take a closer look at the aspects of the actual implementation, dissemination and use of social networks to obtain as a result of increased quality and improving service to customers of a Service Desk in a generic service desk of a hypothetical data center.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Scheduling Algorithm for Downloading Data from RSU Using Multicast Technique 基于组播技术的RSU数据下载调度算法
S. Sahebgharani, M. Shahverdy
Vehicular ad-hoc network (VANET) is a technology for building a robust ad-hoc network between mobile vehicles as well as, between vehicles and roadside unit (RSU). Data communication on the roads is becoming further interesting, as the number of vehicles equipped with computing technologies and wireless communication devices increase. In this paper we study the vehicle - RSU communication. It is noticeable that vehicles request various data from RSU but however urgent requests should have higher priority to be served. Some vehicles may ask for the same data, if we can postpone some requested data and multicast it before the deadlines, several requests may be served through a single multicast. We propose a scheduling algorithm to download data from RSU using multicast technique in order to serve multiple requests, regarding the priority of data. Simulation result indicates that method the proposed method can provide desirable performance and higher quality of service.
车辆自组织网络(VANET)是一种在移动车辆之间以及车辆与路边单元(RSU)之间建立健壮的自组织网络的技术。随着配备计算机技术和无线通信设备的车辆数量的增加,道路上的数据通信正变得越来越有趣。本文主要研究了车辆与RSU之间的通信。值得注意的是,车辆从RSU请求各种数据,但是紧急请求应该具有更高的优先级。有些车辆可能会请求相同的数据,如果我们可以延迟一些请求的数据并在截止日期之前进行多播,则可以通过单个多播来服务多个请求。考虑到数据的优先级,我们提出了一种利用组播技术从RSU下载数据以服务多个请求的调度算法。仿真结果表明,该方法能提供较好的性能和较高的服务质量。
{"title":"A Scheduling Algorithm for Downloading Data from RSU Using Multicast Technique","authors":"S. Sahebgharani, M. Shahverdy","doi":"10.1109/ITNG.2012.59","DOIUrl":"https://doi.org/10.1109/ITNG.2012.59","url":null,"abstract":"Vehicular ad-hoc network (VANET) is a technology for building a robust ad-hoc network between mobile vehicles as well as, between vehicles and roadside unit (RSU). Data communication on the roads is becoming further interesting, as the number of vehicles equipped with computing technologies and wireless communication devices increase. In this paper we study the vehicle - RSU communication. It is noticeable that vehicles request various data from RSU but however urgent requests should have higher priority to be served. Some vehicles may ask for the same data, if we can postpone some requested data and multicast it before the deadlines, several requests may be served through a single multicast. We propose a scheduling algorithm to download data from RSU using multicast technique in order to serve multiple requests, regarding the priority of data. Simulation result indicates that method the proposed method can provide desirable performance and higher quality of service.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Watermarking XML Structures Using Multi-valued Dependencies 使用多值依赖项对XML结构进行水印
J. U. Quevedo-Torrero, G. Erickson
This article examines the basic concepts and offers an analysis of the strengths and weaknesses of common XML watermarking methods. It presents a notational system to describe XML documents and its structures. Then, this notation is used to describe multi-valued dependencies in XML documents and its properties. These concepts are used to present a framework to watermark XML documents using multi-valued dependencies. It also offers suggestions on where future research would benefit in this area.
本文研究了基本概念,并分析了常用XML水印方法的优缺点。它提出了一个描述XML文档及其结构的符号系统。然后,该符号用于描述XML文档及其属性中的多值依赖项。这些概念用于提供一个框架,以使用多值依赖项为XML文档添加水印。它还就该领域未来的研究将在何处受益提出了建议。
{"title":"Watermarking XML Structures Using Multi-valued Dependencies","authors":"J. U. Quevedo-Torrero, G. Erickson","doi":"10.1109/ITNG.2012.120","DOIUrl":"https://doi.org/10.1109/ITNG.2012.120","url":null,"abstract":"This article examines the basic concepts and offers an analysis of the strengths and weaknesses of common XML watermarking methods. It presents a notational system to describe XML documents and its structures. Then, this notation is used to describe multi-valued dependencies in XML documents and its properties. These concepts are used to present a framework to watermark XML documents using multi-valued dependencies. It also offers suggestions on where future research would benefit in this area.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 Ninth International Conference on Information Technology - New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1