首页 > 最新文献

2009 International Conference on Computational Intelligence and Software Engineering最新文献

英文 中文
Wood Image Retrieval Using SIFT Descriptor 基于SIFT描述符的木材图像检索
Shaoli Huang, C. Cai, Yang Zhang
In this paper, we propose a new representation and matching scheme for wood image retrieval using Scale Invariant Feature Transformation (SIFT). We extract SIFT feature points in scale space and perform matching based on the texture information around the feature points using SIFT feature operator. This scheme can be appended to most existing wood image retrieval systems and improve their retrieval accuracy and efficiency. Experimental results demonstrate that the performance of this scheme is efficient and stable enough for wood image retrieval technique.
本文提出了一种基于尺度不变特征变换(SIFT)的木材图像检索方法。在尺度空间中提取SIFT特征点,利用SIFT特征算子根据特征点周围的纹理信息进行匹配。该方案可以附加到现有的大多数木材图像检索系统中,提高其检索精度和效率。实验结果表明,该方法对木材图像检索技术具有较高的效率和稳定性。
{"title":"Wood Image Retrieval Using SIFT Descriptor","authors":"Shaoli Huang, C. Cai, Yang Zhang","doi":"10.1109/CISE.2009.5365099","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365099","url":null,"abstract":"In this paper, we propose a new representation and matching scheme for wood image retrieval using Scale Invariant Feature Transformation (SIFT). We extract SIFT feature points in scale space and perform matching based on the texture information around the feature points using SIFT feature operator. This scheme can be appended to most existing wood image retrieval systems and improve their retrieval accuracy and efficiency. Experimental results demonstrate that the performance of this scheme is efficient and stable enough for wood image retrieval technique.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Application of Gray-Prediction Theory in the Software Defects Management 灰色预测理论在软件缺陷管理中的应用
Dianqin Zhu, Zhongyuan Wu
zhu dianqin wu zhongyuan (school of management,TianJin polytechnic university,TianJin,China.300387) Abstract:Software defects are the parts of software products that software development company have to face. How to deal with them suitably is very important for software company’s survival. This article will use the collecting data of software defects. Then, according to GM (1, 1), which is the core theory of the Gary-prediction, establish the prediction model. Finally, we gain the prediction values. The results show that software company can improve software quality, control development process and allocate resources effectively.
(天津工业大学管理学院,天津300387)摘要:软件缺陷是软件开发公司在开发软件产品时必须面对的问题。如何恰当地处理这些问题,对软件公司的生存至关重要。本文将使用软件缺陷的收集数据。然后,根据加里预测的核心理论GM(1,1),建立预测模型。最后,我们得到了预测值。结果表明,软件公司可以有效地提高软件质量、控制开发过程和配置资源。
{"title":"The Application of Gray-Prediction Theory in the Software Defects Management","authors":"Dianqin Zhu, Zhongyuan Wu","doi":"10.1109/CISE.2009.5366957","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366957","url":null,"abstract":"zhu dianqin wu zhongyuan (school of management,TianJin polytechnic university,TianJin,China.300387) Abstract:Software defects are the parts of software products that software development company have to face. How to deal with them suitably is very important for software company’s survival. This article will use the collecting data of software defects. Then, according to GM (1, 1), which is the core theory of the Gary-prediction, establish the prediction model. Finally, we gain the prediction values. The results show that software company can improve software quality, control development process and allocate resources effectively.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Process Algebra for Web Servers with Timed-Priority Executing Policy 具有定时优先级执行策略的Web服务器进程代数
Guang Zheng, Xifu Li, Lian Li, Jinzhao Wu
Web servers providing services are widely used in Internet. The behaviors of web servers can be expressed by actions equipped with parameters of time and priority. However, process algebras nowadays cannot specify the behaviors of web server with different groups of clients with priorities and time limitations. We present a process algebra with timed-priority executing policy that can specify the behaviors of web server, with its actions equipped with parameters of time and priority.
提供服务的Web服务器在Internet中得到了广泛的应用。web服务器的行为可以用带有时间和优先级参数的动作来表示。然而,目前的进程代数不能指定具有优先级和时间限制的不同客户端组的web服务器的行为。我们提出了一种具有时间优先级执行策略的进程代数,它可以指定web服务器的行为,并为其行为配备时间和优先级参数。
{"title":"Process Algebra for Web Servers with Timed-Priority Executing Policy","authors":"Guang Zheng, Xifu Li, Lian Li, Jinzhao Wu","doi":"10.1109/CISE.2009.5367013","DOIUrl":"https://doi.org/10.1109/CISE.2009.5367013","url":null,"abstract":"Web servers providing services are widely used in Internet. The behaviors of web servers can be expressed by actions equipped with parameters of time and priority. However, process algebras nowadays cannot specify the behaviors of web server with different groups of clients with priorities and time limitations. We present a process algebra with timed-priority executing policy that can specify the behaviors of web server, with its actions equipped with parameters of time and priority.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116667168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research and Implement of Serial RapidIO Based on Mul-DSP 基于多dsp的串行快速输出的研究与实现
Juan Zhang, Hai-Bing Su, Qin-Zhang Wu
In order to sovle an intra-system interface for chip-to-chip and board-to-board communications and meet the explosive demand for higher bandwidth and more efficient signal processing and data transmission in typical enbeded system,there is an active demand that adopting a new system interconnect technology to ensure that bus performance continues to increase. The RapidIO is proposed in the paper. Up to 10Gb/s of bandwith,low latency and low power meet the demand on the performance of rapid developing communication technologies. The paper introduces the basic principle,inner architechture and the key technique of the RapidIO , research its application and based on DSP TMS320C6455. It shows the design of RapidIO transmission between different DSP. The paper gives the flow of the software design.The experiment results show that the read and write operation can stably work at 3.125Gb/s per channel between different DSP.The rate is up to 275MB/s when the baud rate is 3.125Gbps.
为了解决片对片和板对板通信的系统内接口,满足典型嵌入式系统对更高带宽和更高效的信号处理和数据传输的爆炸性需求,采用新的系统互连技术来保证总线性能的不断提高是一种积极的需求。本文提出了RapidIO。高达10Gb/s的带宽、低时延和低功耗满足了快速发展的通信技术对性能的需求。本文介绍了RapidIO的基本原理、内部结构和关键技术,研究了基于DSP TMS320C6455的RapidIO的应用。介绍了不同DSP之间的RapidIO传输设计。文中给出了软件设计流程。实验结果表明,不同DSP之间的读写操作可以稳定地以每通道3.125Gb/s的速度工作。波特率为3.125Gbps时,最大传输速率为275MB/s。
{"title":"Research and Implement of Serial RapidIO Based on Mul-DSP","authors":"Juan Zhang, Hai-Bing Su, Qin-Zhang Wu","doi":"10.1109/CISE.2009.5366060","DOIUrl":"https://doi.org/10.1109/CISE.2009.5366060","url":null,"abstract":"In order to sovle an intra-system interface for chip-to-chip and board-to-board communications and meet the explosive demand for higher bandwidth and more efficient signal processing and data transmission in typical enbeded system,there is an active demand that adopting a new system interconnect technology to ensure that bus performance continues to increase. The RapidIO is proposed in the paper. Up to 10Gb/s of bandwith,low latency and low power meet the demand on the performance of rapid developing communication technologies. The paper introduces the basic principle,inner architechture and the key technique of the RapidIO , research its application and based on DSP TMS320C6455. It shows the design of RapidIO transmission between different DSP. The paper gives the flow of the software design.The experiment results show that the read and write operation can stably work at 3.125Gb/s per channel between different DSP.The rate is up to 275MB/s when the baud rate is 3.125Gbps.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116692872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Improved CURD Clustering Algorithm Based on Quotient Space 基于商空间的改进CURD聚类算法
Xiaomin Zhao, Bin Lu
As the data size increases, the efficiency of algorithm and the clustering quality draw more attraction. CURD (clustering using references and density) is a fast clustering algorithm based on reference and density, which can discover clusters with arbitrary shape and has the linear times complexity. However, it still has some shortcomings such as: the efficiency to deal with the high-dimensional data is uncertain, the noise processing is not ideal, besides the number of the clustering results may not satisfy the requirement of the users. According to these deficiencies, this paper introduces a new method to propose the high-dimensional data with information entropy technology and quotient space theory. Additionally it disposes the noise date in two stages. Finally, some improvement are given on the step of sorting the reference points by quotient space theory to produce multi-level clustering results so as to meet the different needs of customers. Experiments show that the improved algorithm not only improves the quality of the clustering algorithm but also maintains the high efficiency.
随着数据量的增加,算法的效率和聚类质量越来越吸引人。CURD (clustering using reference and density)是一种基于参考和密度的快速聚类算法,可以发现任意形状的聚类,具有线性时间复杂度。然而,它仍然存在一些缺点,如:处理高维数据的效率不确定,噪声处理不理想,以及聚类结果的数量可能不能满足用户的要求。针对这些不足,本文提出了一种利用信息熵技术和商空间理论提出高维数据的新方法。此外,还分两个阶段对噪声数据进行处理。最后,利用商空间理论对参考点排序步骤进行改进,得到多级聚类结果,以满足客户的不同需求。实验表明,改进后的算法不仅提高了聚类算法的质量,而且保持了较高的效率。
{"title":"An Improved CURD Clustering Algorithm Based on Quotient Space","authors":"Xiaomin Zhao, Bin Lu","doi":"10.1109/CISE.2009.5364188","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364188","url":null,"abstract":"As the data size increases, the efficiency of algorithm and the clustering quality draw more attraction. CURD (clustering using references and density) is a fast clustering algorithm based on reference and density, which can discover clusters with arbitrary shape and has the linear times complexity. However, it still has some shortcomings such as: the efficiency to deal with the high-dimensional data is uncertain, the noise processing is not ideal, besides the number of the clustering results may not satisfy the requirement of the users. According to these deficiencies, this paper introduces a new method to propose the high-dimensional data with information entropy technology and quotient space theory. Additionally it disposes the noise date in two stages. Finally, some improvement are given on the step of sorting the reference points by quotient space theory to produce multi-level clustering results so as to meet the different needs of customers. Experiments show that the improved algorithm not only improves the quality of the clustering algorithm but also maintains the high efficiency.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117135992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduce Satisfy Policies into Semaphore in WRK 在WRK信号量中引入满足策略
Xudong Li, Chunxia Zhang, Xing Lin, Shuguang Lin
This paper describes an improved semaphore with policies in Windows operating system. We introduce policies to help operating system kernel select next process (or thread) in the waiting list queue to satisfy. The paper present five policies: first in first out (FIFO), first in last out (FILO), highest priority first out (HPFO), lowest priority first out (LPFO) and Random. We discuss the design and implement of semaphore with policies in Windows Research Kernel (WRK), and the results are the same as expected.
本文介绍了一种改进的带有策略的Windows操作系统信号量。我们引入一些策略来帮助操作系统内核在等待列表队列中选择下一个进程(或线程)来满足。本文提出了五种策略:先进先出(FIFO)、先进后出(FILO)、最高优先级先出(HPFO)、最低优先级先出(LPFO)和随机。在Windows Research Kernel (WRK)中讨论了带有策略的信号量的设计和实现,结果与预期的一致。
{"title":"Introduce Satisfy Policies into Semaphore in WRK","authors":"Xudong Li, Chunxia Zhang, Xing Lin, Shuguang Lin","doi":"10.1109/CISE.2009.5364135","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364135","url":null,"abstract":"This paper describes an improved semaphore with policies in Windows operating system. We introduce policies to help operating system kernel select next process (or thread) in the waiting list queue to satisfy. The paper present five policies: first in first out (FIFO), first in last out (FILO), highest priority first out (HPFO), lowest priority first out (LPFO) and Random. We discuss the design and implement of semaphore with policies in Windows Research Kernel (WRK), and the results are the same as expected.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117190875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method of Detecting Program Plagiarism Based on Variable Dependence 一种基于变量依赖的程序抄袭检测方法
Hong Yang, Lina Hong, Rong Chen, Yaqing Liu
Program similarity means how similar comparable programs are by the computer-assisted analysis, with the aim to find equivalent code fragments. In this paper, we propose a semantic approach to detect program plagiarism by the computation of program similarity based on variable dependence. To do so, we compute dependence over program variables, find a variable mapping which maps a variable in a program to its counterpart in another program, then convert a program with the mapping into a version with can be compared in textual manner with another program, and thus compute the similarity of programs. An experiment is given to show the effectiveness of this method. Keywords-Program Plagiarism Detection; Similarity; Variable Dependence; Metrics
程序相似度是指通过计算机辅助分析可比较程序的相似程度,目的是找到等效的代码片段。本文提出了一种基于变量依赖计算程序相似度的语义方法来检测程序抄袭。为此,我们计算对程序变量的依赖性,找到将程序中的变量映射到另一个程序中的对应变量的变量映射,然后将具有该映射的程序转换为可以以文本方式与另一个程序进行比较的版本,从而计算程序的相似性。通过实验验证了该方法的有效性。关键词:节目抄袭检测;相似之处;变量的依赖;指标
{"title":"A Method of Detecting Program Plagiarism Based on Variable Dependence","authors":"Hong Yang, Lina Hong, Rong Chen, Yaqing Liu","doi":"10.1109/CISE.2009.5365846","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365846","url":null,"abstract":"Program similarity means how similar comparable programs are by the computer-assisted analysis, with the aim to find equivalent code fragments. In this paper, we propose a semantic approach to detect program plagiarism by the computation of program similarity based on variable dependence. To do so, we compute dependence over program variables, find a variable mapping which maps a variable in a program to its counterpart in another program, then convert a program with the mapping into a version with can be compared in textual manner with another program, and thus compute the similarity of programs. An experiment is given to show the effectiveness of this method. Keywords-Program Plagiarism Detection; Similarity; Variable Dependence; Metrics","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117286527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improvement for Congestion Control Algorithms under DDoS Attacks DDoS攻击下拥塞控制算法的改进
Haina Hu, Lin Yao
DDoS flows that do not cut down their sending rates after their packets are dropped will hog the buffer space at routers and deprive all other flows of their fair share of bandwidth. Based on the network behavior, this paper studies the defense mechanism of DDoS from the aspect of congestion control. And in the simulation environment of DDoS, this paper studies the RED (Random Early Detection) algorithm that is a congestion control strategy based on routers. Simulation results show that RED provides little protection from high bandwidth flows that take much wide bandwidth, which can result in extreme unfairness among per-flow. Based on the viewpoint, we put forward further improvement for the mechanism of congestion control based on routers. KeywordsDDoS; Random Early Detection; Congestion Control; NS
如果DDoS流在丢包后不降低其发送速率,则会占用路由器的缓冲空间,并剥夺所有其他流的公平带宽份额。本文基于网络行为,从拥塞控制的角度研究了DDoS的防御机制。在DDoS仿真环境下,研究了基于路由器的拥塞控制策略RED (Random Early Detection,随机早期检测)算法。仿真结果表明,对于占用大量带宽的高带宽流,RED提供的保护很少,这可能导致每个流之间的极度不公平。在此基础上,提出了基于路由器的拥塞控制机制的进一步改进。KeywordsDDoS;随机早期检测;拥塞控制;NS
{"title":"Improvement for Congestion Control Algorithms under DDoS Attacks","authors":"Haina Hu, Lin Yao","doi":"10.1109/CISE.2009.5365324","DOIUrl":"https://doi.org/10.1109/CISE.2009.5365324","url":null,"abstract":"DDoS flows that do not cut down their sending rates after their packets are dropped will hog the buffer space at routers and deprive all other flows of their fair share of bandwidth. Based on the network behavior, this paper studies the defense mechanism of DDoS from the aspect of congestion control. And in the simulation environment of DDoS, this paper studies the RED (Random Early Detection) algorithm that is a congestion control strategy based on routers. Simulation results show that RED provides little protection from high bandwidth flows that take much wide bandwidth, which can result in extreme unfairness among per-flow. Based on the viewpoint, we put forward further improvement for the mechanism of congestion control based on routers. KeywordsDDoS; Random Early Detection; Congestion Control; NS","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120987363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamically Discovering Functional Likely Program Invariants Based on Relational Database Theory 基于关系数据库理论动态发现函数似然程序不变量
Xiao-Hua Yang, Jie Liu, Tonglan Yu, Yang Luo, Qunyan Wu
Dynamic likely program invariant detection technology is an available instrument for discovering contract from large program in non-formal description. It is of benefit to contract technology exerting more influence on program quality assurance. Since the research of invariant detection technology has just started that the rough detection usually use hypothesis verification approach which relies on the experience of the detector and his degree of understanding of the detected program so that there is serious lack of accuracy and efficiency. This paper tempts to divide the invariants into two kinds that one is called functional invariant and the other is non-functional type based on relational data theory before starting the invariant detection. The paper focuses on the approach of detecting functional likely invariant, which accomplish detecting existence of them by discovering functional dependence set of the program variable at first and then detecting the forms of the existent invariants after deducing the function dependence set. Experiments demonstrate that this approach not only solves the problems of blind detection to improve the efficiency but also reduces the possibility of missing important functional invariants compared with the traditional hypothesis verification approach such as Daikon.
动态似然程序不变量检测技术是一种从大型程序的非形式化描述中发现契约的有效手段。合同技术在节目质量保证中发挥更大的作用是有益的。由于不变检测技术的研究刚刚起步,粗糙检测通常采用假设验证的方法,这种方法依赖于检测器的经验和对被检测程序的理解程度,因此准确性和效率严重不足。在进行不变量检测之前,本文试图根据关系数据理论将不变量分为两类,一类是泛函不变量,另一类是非泛函不变量。本文重点研究了泛函似不变量的检测方法,该方法通过先发现程序变量的函数依赖集,再推导出函数依赖集,检测存在不变量的形式,从而实现对似不变量是否存在的检测。实验表明,与传统的假设验证方法(如Daikon)相比,该方法不仅解决了盲目检测的问题,提高了效率,而且减少了遗漏重要功能不变量的可能性。
{"title":"Dynamically Discovering Functional Likely Program Invariants Based on Relational Database Theory","authors":"Xiao-Hua Yang, Jie Liu, Tonglan Yu, Yang Luo, Qunyan Wu","doi":"10.1109/CISE.2009.5364452","DOIUrl":"https://doi.org/10.1109/CISE.2009.5364452","url":null,"abstract":"Dynamic likely program invariant detection technology is an available instrument for discovering contract from large program in non-formal description. It is of benefit to contract technology exerting more influence on program quality assurance. Since the research of invariant detection technology has just started that the rough detection usually use hypothesis verification approach which relies on the experience of the detector and his degree of understanding of the detected program so that there is serious lack of accuracy and efficiency. This paper tempts to divide the invariants into two kinds that one is called functional invariant and the other is non-functional type based on relational data theory before starting the invariant detection. The paper focuses on the approach of detecting functional likely invariant, which accomplish detecting existence of them by discovering functional dependence set of the program variable at first and then detecting the forms of the existent invariants after deducing the function dependence set. Experiments demonstrate that this approach not only solves the problems of blind detection to improve the efficiency but also reduces the possibility of missing important functional invariants compared with the traditional hypothesis verification approach such as Daikon.","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121001676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LSBA Based Security Verification in MCC MCC中基于LSBA的安全验证
Zhenhao Li, Xiaojuan Zheng, Yonglong Wei
This paper presents a new way to verify whether a behavior model of code satisfies a security policy in the model- carrying code(MCC) approach for safe execution of untrusted code. This new verification method based on a new kind of model called logic semantic based automata(LSBA). Logic semantic based pushdown automata(LSBPDA)is to model safety-related behaviors of codes unknown to a user and logic semantic based finite states automata(LSBFSA)is to model security policies of users. Verification is done by checking wether the language of the LSBPDA model of a policy and the language of the LSBFSA model of untrusted code intersect. This new method is formal in nature and suitable for automation of the verification step in MCC method. Index Terms—MCC, safety of mobile code, formal method, safety model verification
本文提出了一种验证代码行为模型是否满足安全策略的新方法,用于安全执行不受信任的代码。这种新的验证方法基于一种新的模型——基于逻辑语义的自动机(LSBA)。基于逻辑语义的下推自动机(LSBPDA)是对用户未知代码的安全相关行为进行建模,基于逻辑语义的有限状态自动机(LSBFSA)是对用户的安全策略进行建模。验证是通过检查策略的LSBPDA模型的语言和不可信代码的LSBFSA模型的语言是否相交来完成的。该方法具有形式化的特点,适合于MCC方法中验证步骤的自动化。索引术语- mcc,移动代码安全,形式化方法,安全模型验证
{"title":"LSBA Based Security Verification in MCC","authors":"Zhenhao Li, Xiaojuan Zheng, Yonglong Wei","doi":"10.1109/CISE.2009.5362528","DOIUrl":"https://doi.org/10.1109/CISE.2009.5362528","url":null,"abstract":"This paper presents a new way to verify whether a behavior model of code satisfies a security policy in the model- carrying code(MCC) approach for safe execution of untrusted code. This new verification method based on a new kind of model called logic semantic based automata(LSBA). Logic semantic based pushdown automata(LSBPDA)is to model safety-related behaviors of codes unknown to a user and logic semantic based finite states automata(LSBFSA)is to model security policies of users. Verification is done by checking wether the language of the LSBPDA model of a policy and the language of the LSBFSA model of untrusted code intersect. This new method is formal in nature and suitable for automation of the verification step in MCC method. Index Terms—MCC, safety of mobile code, formal method, safety model verification","PeriodicalId":135441,"journal":{"name":"2009 International Conference on Computational Intelligence and Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Conference on Computational Intelligence and Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1