In this paper, we propose an approach based on one time passwords to secure the DSR protocol. The main concern of this work is to provide an efficient level of security for DSR keeping in mind as a main objective the minimization of the calculation cost. Some experimental results are presented to show the effectiveness of the proposed solution.
{"title":"A Secure Routing Scheme for DSR","authors":"T. Bouabana-Tebibel","doi":"10.1109/SSNE.2011.23","DOIUrl":"https://doi.org/10.1109/SSNE.2011.23","url":null,"abstract":"In this paper, we propose an approach based on one time passwords to secure the DSR protocol. The main concern of this work is to provide an efficient level of security for DSR keeping in mind as a main objective the minimization of the calculation cost. Some experimental results are presented to show the effectiveness of the proposed solution.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
the era of servicecloud computing brings unprecedented request for quality evaluation. Existing quality evaluation usually relies on a set of organized quality properties. The organization of quality properties partially determines the quality of a quality model which usually relies on empirically accumulated knowledge and implicit understanding of the semantics relationships among quality properties. To ease building flexible, omnipresent and efficient quality evaluations which initially take the form of natural expressions, based on the hypotheses: (1) the existence of multiple semantics of a single concept/expression and (2) the existence of cognitive semantic distance among concepts, we propose an approach to support visualized and uniform semantics locating toward aiding organizing, manipulating and optimization of concepts of quality properties in a unified manner. Initial cases are illustrated.
{"title":"Catering Quality Evaluation Design for Service/Cloud Computing through Visualized Semantics Locating","authors":"Yucong Duan","doi":"10.1109/SSNE.2011.8","DOIUrl":"https://doi.org/10.1109/SSNE.2011.8","url":null,"abstract":"the era of servicecloud computing brings unprecedented request for quality evaluation. Existing quality evaluation usually relies on a set of organized quality properties. The organization of quality properties partially determines the quality of a quality model which usually relies on empirically accumulated knowledge and implicit understanding of the semantics relationships among quality properties. To ease building flexible, omnipresent and efficient quality evaluations which initially take the form of natural expressions, based on the hypotheses: (1) the existence of multiple semantics of a single concept/expression and (2) the existence of cognitive semantic distance among concepts, we propose an approach to support visualized and uniform semantics locating toward aiding organizing, manipulating and optimization of concepts of quality properties in a unified manner. Initial cases are illustrated.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By development of the Internet in recent years, tourism portal sites and blog articles about tourism increased on WWW. Acquisition of various tourism information became easy. When gathering and classifying the information automatically from blog articles, it is not easy to decide automatically place names used as the key. In this paper, we propose a method of extracting place names from blog articles automatically. Moreover, we also tried disambiguation of a place name.
{"title":"Extraction and Disambiguation of Name of Place from Tourism Blogs","authors":"Tetsuya Nakatoh, Chengjiu Yin, S. Hirokawa","doi":"10.1109/SSNE.2011.29","DOIUrl":"https://doi.org/10.1109/SSNE.2011.29","url":null,"abstract":"By development of the Internet in recent years, tourism portal sites and blog articles about tourism increased on WWW. Acquisition of various tourism information became easy. When gathering and classifying the information automatically from blog articles, it is not easy to decide automatically place names used as the key. In this paper, we propose a method of extracting place names from blog articles automatically. Moreover, we also tried disambiguation of a place name.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The prompt discovery and mining of user's reputation, opinion and complaint are becoming a hot topic in the field of search engine for Blog and Twitter. This paper proposes "Double Rank" method to analyze the search result using two viewpoints, where the polarity degree of keywords in the search results are evaluated from the viewpoints. Most previous researches concern mainly in positive and negative evaluation as for the polarity degree. Two viewpoints are specified as the search condition in the present paper. The blog articles related to sightseeing are analyzed as case studies, where the characteristics and the sightseeing situation are compared for two prefectures.
{"title":"Comparison of Tourism Data Using Double Ranking","authors":"S. Hirokawa, Jun Zeng","doi":"10.1109/SSNE.2011.28","DOIUrl":"https://doi.org/10.1109/SSNE.2011.28","url":null,"abstract":"The prompt discovery and mining of user's reputation, opinion and complaint are becoming a hot topic in the field of search engine for Blog and Twitter. This paper proposes \"Double Rank\" method to analyze the search result using two viewpoints, where the polarity degree of keywords in the search results are evaluated from the viewpoints. Most previous researches concern mainly in positive and negative evaluation as for the polarity degree. Two viewpoints are specified as the search condition in the present paper. The blog articles related to sightseeing are analyzed as case studies, where the characteristics and the sightseeing situation are compared for two prefectures.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125437222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are a mass of researches on the issue of scheduling in cloud computing, most of them, however, are bout workflow and job scheduling. There are fewer researches on service flow scheduling. Here we propose a model of service flow scheduling with various quality of service (QoS) requirements in cloud computing firstly, then we adopt the use of an ant colony optimization (ACO) algorithm to optimize service flow scheduling. In our model, we use default rate to describe the radio of cloud service provider breaking service level agreement (SLA), and also introduce an SLA monitoring module to monitor the running state of cloud services.
{"title":"Ant Colony Optimization Based Service Flow Scheduling with Various QoS Requirements in Cloud Computing","authors":"Hui Liu, Dong Xu, Huai-kou Miao","doi":"10.1109/SSNE.2011.18","DOIUrl":"https://doi.org/10.1109/SSNE.2011.18","url":null,"abstract":"There are a mass of researches on the issue of scheduling in cloud computing, most of them, however, are bout workflow and job scheduling. There are fewer researches on service flow scheduling. Here we propose a model of service flow scheduling with various quality of service (QoS) requirements in cloud computing firstly, then we adopt the use of an ant colony optimization (ACO) algorithm to optimize service flow scheduling. In our model, we use default rate to describe the radio of cloud service provider breaking service level agreement (SLA), and also introduce an SLA monitoring module to monitor the running state of cloud services.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To ensure the security of the data during transmission, the data should be encrypted by a key stream sequence which should be strong enough with good randomness and unpredictability. Cryptographically strong sequences should not only have a large linear complexity, but also the change of a few terms should not cause a significant decrease of the linear complexity. This requirement leads to the theory of the stability of linear complexity. K-error linear complexity reflects the stability of the linear complexity properly. In this paper, by analyzing the relationship between the linear complexity and the k-error linear complexity of pn - periodic sequence, we studied the upper bound of minerror, i.e. the minimum value k for which the k-error linear complexity is strictly less than the linear complexity. Here p is an odd prime, and q is a prime and a primitive root (mod p2 ).
{"title":"Analysis of the Minerror of the pn-Periodic Sequences","authors":"Zhihua Niu, Danfeng Guo, Mingjun Xin","doi":"10.1109/SSNE.2011.24","DOIUrl":"https://doi.org/10.1109/SSNE.2011.24","url":null,"abstract":"To ensure the security of the data during transmission, the data should be encrypted by a key stream sequence which should be strong enough with good randomness and unpredictability. Cryptographically strong sequences should not only have a large linear complexity, but also the change of a few terms should not cause a significant decrease of the linear complexity. This requirement leads to the theory of the stability of linear complexity. K-error linear complexity reflects the stability of the linear complexity properly. In this paper, by analyzing the relationship between the linear complexity and the k-error linear complexity of pn - periodic sequence, we studied the upper bound of minerror, i.e. the minimum value k for which the k-error linear complexity is strictly less than the linear complexity. Here p is an odd prime, and q is a prime and a primitive root (mod p2 ).","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we summarized the technologies of great promise related with information technology by reference to the reports issued by popular research institutes or organizations in the inside and outside of country. We clssified those technologies by the fields of study in information technology, contents technology, biotechnology, nanotechnology, green technology, manufacture technology, service technology, robot technology, and human technology. And then we introduced the research direction of information technology convergence for industry in the Republic of Korea.
{"title":"Information Technology Convergence for Industry in Korea","authors":"B. Kang","doi":"10.1109/SSNE.2011.14","DOIUrl":"https://doi.org/10.1109/SSNE.2011.14","url":null,"abstract":"In this paper, we summarized the technologies of great promise related with information technology by reference to the reports issued by popular research institutes or organizations in the inside and outside of country. We clssified those technologies by the fields of study in information technology, contents technology, biotechnology, nanotechnology, green technology, manufacture technology, service technology, robot technology, and human technology. And then we introduced the research direction of information technology convergence for industry in the Republic of Korea.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, with a middle-agent based framework, we can expect to figure out a business model that is focused on distributors for win-win cooperation and collaboration by revealing the effect, the influence, and the requirement for consensus in cooperation and collaboration. Cooperation and collaboration help companies collect such resources as technologies, knowledge, information, and funds as well as creating new businesses and developing new products. Distributors can create good cooperation and collaboration by mediating between manufacturing and user companies. We give an example of the collaborative development of new products where a distributor mediated between maker and user companies. Application Specific Standard Product (ASSP), which is an LSI for specific applications, is attracting attention. To develop an ASSP, both semiconductor and user companies must agree on the functions that the ASSP has and how many ASSPs must be considered without disclosing secret information. In this paper, We modeled distributors in a collaborative development and implemented a tool for an agent-based simulation, in which we imagined a market where a product is developed, sold, and bought. We investigated the role of middle agents, distributors and how they affect the market. In addition, we proposed a framework for examining a new business model.
本文在基于中间代理的框架下,通过揭示合作与协作的效果、影响和共识要求,期望得出一个以经销商为中心的合作与协作共赢的商业模式。合作与协作有助于企业收集技术、知识、信息、资金等资源,创造新业务、开发新产品。分销商可以通过在制造公司和用户公司之间的中介,创造良好的合作和协作。我们给出了一个新产品协同开发的例子,其中分销商在制造商和用户公司之间进行中介。ASSP (Application Specific Standard Product)是一种针对特定应用的大规模集成电路产品。为了开发ASSP,半导体公司和用户公司必须在不泄露机密信息的情况下,就ASSP的功能和ASSP的数量达成一致。在本文中,我们在协作开发中对分销商进行建模,并实现了一个基于代理的仿真工具,在该工具中,我们想象了一个产品被开发、销售和购买的市场。我们调查了中间代理商、分销商的作用以及他们如何影响市场。此外,我们还提出了一个检查新业务模式的框架。
{"title":"A Proposal of Middle-Agent Based Framework for Innovating a Business Model","authors":"H. Nakagawa, A. Nagai, Takayuki Ito","doi":"10.1109/SSNE.2011.26","DOIUrl":"https://doi.org/10.1109/SSNE.2011.26","url":null,"abstract":"In this paper, with a middle-agent based framework, we can expect to figure out a business model that is focused on distributors for win-win cooperation and collaboration by revealing the effect, the influence, and the requirement for consensus in cooperation and collaboration. Cooperation and collaboration help companies collect such resources as technologies, knowledge, information, and funds as well as creating new businesses and developing new products. Distributors can create good cooperation and collaboration by mediating between manufacturing and user companies. We give an example of the collaborative development of new products where a distributor mediated between maker and user companies. Application Specific Standard Product (ASSP), which is an LSI for specific applications, is attracting attention. To develop an ASSP, both semiconductor and user companies must agree on the functions that the ASSP has and how many ASSPs must be considered without disclosing secret information. In this paper, We modeled distributors in a collaborative development and implemented a tool for an agent-based simulation, in which we imagined a market where a product is developed, sold, and bought. We investigated the role of middle agents, distributors and how they affect the market. In addition, we proposed a framework for examining a new business model.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"29 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128298921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Non-functional requirements (NFRs) are one of the major concerns in system requirement engineering. NFRs must be considered for a successful software project and thus modeling of NFRs is of equal importance. Unfortunately, most of the available literature is focused on modeling of functional requirements and comparatively less effort is done on modeling of non-functional requirements. In this paper we have conducted a literature survey to find the different approaches available to model non-functional requirements and concluded (on the basis of a quality criterion) that which approach is better than others for this purpose.
{"title":"NFR Modeling Approaches","authors":"M. Iqbal","doi":"10.1109/SSNE.2011.11","DOIUrl":"https://doi.org/10.1109/SSNE.2011.11","url":null,"abstract":"Non-functional requirements (NFRs) are one of the major concerns in system requirement engineering. NFRs must be considered for a successful software project and thus modeling of NFRs is of equal importance. Unfortunately, most of the available literature is focused on modeling of functional requirements and comparatively less effort is done on modeling of non-functional requirements. In this paper we have conducted a literature survey to find the different approaches available to model non-functional requirements and concluded (on the basis of a quality criterion) that which approach is better than others for this purpose.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a service which searches goods by images and finds a shopping mall site that offers referral services. In the service, images are obtained in various types. For image management, it will be modeled using UML Diagram. Unlike other existing sites, the service applied sites have special advantages in:1) Using sketch accessories which enable users to draw pictures.2) Support functions that search various types of images by pattern and shape.In addition to features which were mentioned above, we aim to link individuals and shopping mall sites by improved information searching techniques, ultimately providing a space that realizes user's sympathy and trust. Our goal is making a space which offers following services. When a user draws image of goods that the user is looking for, the website proposes similar looking goods and links to a shopping mall site that sells proposed goods, eventually leading user's searching to sales.
{"title":"Shopping Mall System with Image Retrieval Based on UML","authors":"Yan Ha, BoYoun Kim","doi":"10.1109/SSNE.2011.22","DOIUrl":"https://doi.org/10.1109/SSNE.2011.22","url":null,"abstract":"This paper proposes a service which searches goods by images and finds a shopping mall site that offers referral services. In the service, images are obtained in various types. For image management, it will be modeled using UML Diagram. Unlike other existing sites, the service applied sites have special advantages in:1) Using sketch accessories which enable users to draw pictures.2) Support functions that search various types of images by pattern and shape.In addition to features which were mentioned above, we aim to link individuals and shopping mall sites by improved information searching techniques, ultimately providing a space that realizes user's sympathy and trust. Our goal is making a space which offers following services. When a user draws image of goods that the user is looking for, the website proposes similar looking goods and links to a shopping mall site that sells proposed goods, eventually leading user's searching to sales.","PeriodicalId":131008,"journal":{"name":"2011 First ACIS International Symposium on Software and Network Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}