首页 > 最新文献

2013 IEEE 37th Annual Computer Software and Applications Conference Workshops最新文献

英文 中文
Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination 电子邮件中url域名注册日期检索系统,提高垃圾邮件识别率
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.79
Masayuki Matsuoka, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, Masato Minda
In recent years, many spam mails intending for ``One-click fraud" or ``Phishing" have been sent to many unspecified e-mail users. As one anti-spam technology, URL Blacklist based on the URLs in the spam mails is well used. However, spammers have been avoiding this technique by getting many new domains, using them only in a few spam mails, and throwing them away. In this paper, we focus on the domain registration date related to the URLs in the messages in order to improve the discrimination accuracy of spam mails. Thus, we address design and implementation of the domain registration date retrieval system which obtains domain lists from some Top Level Domain registries and records registration dates for each domain in the lists. With this system, we can retrieve the registration date of a domain by DNS.
近年来,不少滥发“一键诈骗”或“网络钓鱼”的垃圾邮件被发送给许多未指明的电子邮件用户。基于垃圾邮件中的URL地址的URL黑名单作为一种反垃圾邮件技术,得到了很好的应用。然而,垃圾邮件发送者通过获得许多新域名,只在少数垃圾邮件中使用它们,然后扔掉它们来避免这种技术。为了提高垃圾邮件的识别准确率,本文重点研究了邮件中url相关的域名注册日期。因此,我们解决了域名注册日期检索系统的设计和实现,该系统从一些顶级域名注册中心获取域名列表,并记录列表中每个域名的注册日期。利用该系统,我们可以通过DNS检索域名的注册日期。
{"title":"Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination","authors":"Masayuki Matsuoka, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, Masato Minda","doi":"10.1109/COMPSACW.2013.79","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.79","url":null,"abstract":"In recent years, many spam mails intending for ``One-click fraud\" or ``Phishing\" have been sent to many unspecified e-mail users. As one anti-spam technology, URL Blacklist based on the URLs in the spam mails is well used. However, spammers have been avoiding this technique by getting many new domains, using them only in a few spam mails, and throwing them away. In this paper, we focus on the domain registration date related to the URLs in the messages in order to improve the discrimination accuracy of spam mails. Thus, we address design and implementation of the domain registration date retrieval system which obtains domain lists from some Top Level Domain registries and records registration dates for each domain in the lists. With this system, we can retrieve the registration date of a domain by DNS.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Integrated Formal Model for Context-Aware Systems 上下文感知系统的集成形式化模型
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.40
Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, A. Helal
Context-aware applications should consider the devices and networks engaged in the systems, as well as the complex control and data structures in the applications. This makes it not so straightforward to understand applications and to achieve the quality of applications, without well-defined formal model adequate to the intended goals. In this paper, we propose a formal model for context aware system, which provides device behaviors with temporal features, enriched with commonly used categorization of context. Thus this model enables integrated management of the interconnected devices with context information for a context-aware system, so as to be employed for the critical purposes like safety enhancement.
上下文感知应用程序应该考虑系统中使用的设备和网络,以及应用程序中的复杂控制和数据结构。这使得理解应用程序和实现应用程序质量变得不那么简单,因为没有足够好的定义的正式模型来实现预期的目标。在本文中,我们提出了一个形式化的上下文感知系统模型,该模型提供了具有时间特征的设备行为,丰富了常用的上下文分类。因此,该模型可以对具有上下文信息的互联设备进行集成管理,以实现上下文感知系统,从而用于增强安全性等关键目的。
{"title":"An Integrated Formal Model for Context-Aware Systems","authors":"Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, A. Helal","doi":"10.1109/COMPSACW.2013.40","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.40","url":null,"abstract":"Context-aware applications should consider the devices and networks engaged in the systems, as well as the complex control and data structures in the applications. This makes it not so straightforward to understand applications and to achieve the quality of applications, without well-defined formal model adequate to the intended goals. In this paper, we propose a formal model for context aware system, which provides device behaviors with temporal features, enriched with commonly used categorization of context. Thus this model enables integrated management of the interconnected devices with context information for a context-aware system, so as to be employed for the critical purposes like safety enhancement.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis 基于用户行为数据分析的在线服务需求理解
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.8
Qing Zhou, Lin Liu
User behavioural data provides important cue for deficiencies in the current software design, and points for improvement in future design. Today's web based software services providers could collect different kinds of service usage data, which is a good source of information which can help developers better understand user's behaviours. This paper takes the example of the evolution of an online dictionary services, explores answers for questions such as: what are the key indicators with regard to the quality of software product design and service content, and how to enhance new product success by understandings obtained from user behavioural data analysis. In this paper, we first summarise the possible types of web log data that can be collected so far, Then we introduce a user behaviour model generated for the dictionary domain based on user behavioural data analysis, then we discuss how data collection function shall co-evolve with the online services, and how specific data analysis approaches such as mining algorithms and statistical functions can help generate interesting analysis results of value to design decision makers.
用户行为数据为当前软件设计的不足提供了重要线索,并为未来的设计提供了改进点。今天基于web的软件服务提供商可以收集不同类型的服务使用数据,这是一个很好的信息来源,可以帮助开发人员更好地了解用户的行为。本文以在线词典服务的演变为例,探讨了以下问题的答案:软件产品设计和服务内容质量的关键指标是什么,以及如何通过用户行为数据分析获得的理解来提高新产品的成功。本文首先总结了目前可以收集到的网络日志数据的可能类型,然后介绍了基于用户行为数据分析为字典域生成的用户行为模型,然后讨论了数据收集功能如何与在线服务协同发展,以及具体的数据分析方法如挖掘算法和统计函数如何帮助生成对设计决策者有价值的有趣的分析结果。
{"title":"Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis","authors":"Qing Zhou, Lin Liu","doi":"10.1109/COMPSACW.2013.8","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.8","url":null,"abstract":"User behavioural data provides important cue for deficiencies in the current software design, and points for improvement in future design. Today's web based software services providers could collect different kinds of service usage data, which is a good source of information which can help developers better understand user's behaviours. This paper takes the example of the evolution of an online dictionary services, explores answers for questions such as: what are the key indicators with regard to the quality of software product design and service content, and how to enhance new product success by understandings obtained from user behavioural data analysis. In this paper, we first summarise the possible types of web log data that can be collected so far, Then we introduce a user behaviour model generated for the dictionary domain based on user behavioural data analysis, then we discuss how data collection function shall co-evolve with the online services, and how specific data analysis approaches such as mining algorithms and statistical functions can help generate interesting analysis results of value to design decision makers.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiagent System for Priority-Based Load Shedding in Microgrid 基于优先级的微电网减载多智能体系统
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.133
T. Kato, Hideyuki Takahashi, K. Sasai, Yujin Lim, Hak-Man Kim, G. Kitagata, Tetsuo Kinoshita
The electricity consumption in the world is constantly increasing, and our lives become more and more dependent on electricity. There are several new paradigms proposed in the field of power grid. In Japan, especially after the Great East Japan Earthquake in March 2011, the new power system paradigms are expected to be more resilient to survive several difficulties during a disaster situation. In this paper, we focus on microgrid and propose a new multiagent-based load shedding scheme and multiagent architecture to realize the resilient power grid. We developed a prototype system to evaluate our scheme, and performed an evaluation of our proposals. The result of the evaluation shows the effectiveness of our proposals, despite of the physical uncertainty.
世界上的用电量在不断增加,我们的生活越来越依赖电。在电网领域提出了几种新的模式。在日本,特别是在2011年3月的东日本大地震之后,新的电力系统模式预计将更具弹性,能够在灾害情况下度过一些困难。本文以微电网为研究对象,提出了一种新的基于多智能体的减载方案和多智能体体系结构来实现弹性电网。我们开发了一个原型系统来评估我们的方案,并对我们的建议进行了评估。尽管存在物理上的不确定性,但评估结果表明我们的建议是有效的。
{"title":"Multiagent System for Priority-Based Load Shedding in Microgrid","authors":"T. Kato, Hideyuki Takahashi, K. Sasai, Yujin Lim, Hak-Man Kim, G. Kitagata, Tetsuo Kinoshita","doi":"10.1109/COMPSACW.2013.133","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.133","url":null,"abstract":"The electricity consumption in the world is constantly increasing, and our lives become more and more dependent on electricity. There are several new paradigms proposed in the field of power grid. In Japan, especially after the Great East Japan Earthquake in March 2011, the new power system paradigms are expected to be more resilient to survive several difficulties during a disaster situation. In this paper, we focus on microgrid and propose a new multiagent-based load shedding scheme and multiagent architecture to realize the resilient power grid. We developed a prototype system to evaluate our scheme, and performed an evaluation of our proposals. The result of the evaluation shows the effectiveness of our proposals, despite of the physical uncertainty.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions 通过表达和执行设计决策来交付可靠的可重用组件
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.113
Andrea Calvagna, E. Tramontana
A component is usually complemented with guidelines expressing its proper use, e.g. the appropriate order of calls that clients should conform to. During reuse, clients could easily alter such an order, and this could result in reused components that become unreliable, since architectural guidelines have not been honoured. Sometimes architectural guidelines are simply unknown, hence whether components are misused by clients is uncertain. This paper proposes an approach to document the architectural guidelines that client classes should comply with when reusing a component. We empower component developers to provide such guidelines, conveying design decisions, along with the code of components in such a way to be apt to automatic checks. Then, clients compliance with architectural guidelines of reused components can be automatically checked by an aspect-based tool. As a result, proper usage of reused components can be ensured, and in turn the behaviour of components should be correct. This strengthen the reliability of the resulting system. Especially for continuous evolution, having automatic conformance checks is paramount for obtaining the correct behaviour of reused components.
组件通常附有说明其正确使用的指导方针,例如客户端应遵守的适当调用顺序。在重用期间,客户端可以很容易地改变这样的顺序,这可能导致重用的组件变得不可靠,因为架构指导方针没有得到遵守。有时候,架构指导方针是未知的,因此组件是否被客户滥用是不确定的。本文提出了一种方法来记录客户机类在重用组件时应该遵守的体系结构指导方针。我们授权组件开发人员提供这样的指导方针,以一种易于自动检查的方式传达设计决策和组件代码。然后,客户端对重用组件的体系结构指导方针的遵从性可以由基于方面的工具自动检查。因此,可以确保重用组件的正确使用,反过来组件的行为也应该是正确的。这加强了最终系统的可靠性。特别是对于持续发展,拥有自动一致性检查对于获得重用组件的正确行为是至关重要的。
{"title":"Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions","authors":"Andrea Calvagna, E. Tramontana","doi":"10.1109/COMPSACW.2013.113","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.113","url":null,"abstract":"A component is usually complemented with guidelines expressing its proper use, e.g. the appropriate order of calls that clients should conform to. During reuse, clients could easily alter such an order, and this could result in reused components that become unreliable, since architectural guidelines have not been honoured. Sometimes architectural guidelines are simply unknown, hence whether components are misused by clients is uncertain. This paper proposes an approach to document the architectural guidelines that client classes should comply with when reusing a component. We empower component developers to provide such guidelines, conveying design decisions, along with the code of components in such a way to be apt to automatic checks. Then, clients compliance with architectural guidelines of reused components can be automatically checked by an aspect-based tool. As a result, proper usage of reused components can be ensured, and in turn the behaviour of components should be correct. This strengthen the reliability of the resulting system. Especially for continuous evolution, having automatic conformance checks is paramount for obtaining the correct behaviour of reused components.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An UML Behavior Diagram Based Automatic Testing Approach 基于UML行为图的自动测试方法
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.116
Chih-Hung Chang, Chih-Wei Lu, W. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai
In the process of software development, software testing is a huge project, and most of the software functionality testing is complex and repetitive, should to spend a lot of cost and manpower. Therefore, you can save a lot of manpower and costs, avoid human error and improve software quality if we can achieve automated testing. In the software development process, the application of model-driven developments has grown wider recently. The main concept is to fetch all of the significant properties referring to system design, and use formal or semi-formal model to describe system in different levels of abstraction. In this paper, we apply a tool based on high level Petri Net model of automated testing -- MISTA [1](Model based Integration and System Testing Automation) to automated generate test code for system. In this paper, through capture the information of the state machine diagram describes the behavior of the system in the Unified Modeling Language. Through the eXtensible Markup Language automation converted to High Level Petri Net test model, and then using automated test code generating software MISTA generation test cases and test code of system to achieve automated testing, and save the software required for testing a large number of human costs, and the software development process from design architecture to the software testing for a bridging.
在软件开发过程中,软件测试是一项庞大的工程,而且大多数软件功能测试是复杂和重复的,应该花费大量的成本和人力。因此,如果我们能够实现自动化测试,您可以节省大量的人力和成本,避免人为错误并提高软件质量。在软件开发过程中,模型驱动开发的应用越来越广泛。其主要概念是获取所有涉及系统设计的重要属性,并使用形式化或半形式化模型在不同的抽象层次上描述系统。本文采用基于高级Petri网模型的自动化测试工具——MISTA[1](基于模型的集成和系统测试自动化)来自动生成系统的测试代码。本文通过捕获状态机图的信息,用统一建模语言描述系统的行为。通过可扩展标记语言自动化转换为高水平Petri网测试模型,然后利用自动化测试代码生成软件MISTA生成测试用例和系统测试代码,实现自动化测试,节省了软件测试所需的大量人力成本,并为软件开发过程从设计架构到软件测试搭建了一座桥梁。
{"title":"An UML Behavior Diagram Based Automatic Testing Approach","authors":"Chih-Hung Chang, Chih-Wei Lu, W. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai","doi":"10.1109/COMPSACW.2013.116","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.116","url":null,"abstract":"In the process of software development, software testing is a huge project, and most of the software functionality testing is complex and repetitive, should to spend a lot of cost and manpower. Therefore, you can save a lot of manpower and costs, avoid human error and improve software quality if we can achieve automated testing. In the software development process, the application of model-driven developments has grown wider recently. The main concept is to fetch all of the significant properties referring to system design, and use formal or semi-formal model to describe system in different levels of abstraction. In this paper, we apply a tool based on high level Petri Net model of automated testing -- MISTA [1](Model based Integration and System Testing Automation) to automated generate test code for system. In this paper, through capture the information of the state machine diagram describes the behavior of the system in the Unified Modeling Language. Through the eXtensible Markup Language automation converted to High Level Petri Net test model, and then using automated test code generating software MISTA generation test cases and test code of system to achieve automated testing, and save the software required for testing a large number of human costs, and the software development process from design architecture to the software testing for a bridging.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model 恶意模型中保护隐私的两方k-均值聚类
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.53
Rahena Akhter, Rownak Jahan Chowdhury, K. Emura, T. Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacy-preserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
在数据挖掘中,聚类是一种众所周知且有用的技术。最强大和最常用的技术之一是k-means聚类。近年来,不同研究人员提出的基于密码学的隐私保护方案大多是半诚实模型,参与方始终遵循协议。这个模型在许多情况下是现实的。但是,考虑到恶意模型,提供更强大的解决方案对于许多实际应用更有用,因为它试图使用加密工具保护协议免受任意恶意行为的侵害。在本文中,我们提出了一种新的协议,用于在恶意模型中保护隐私的两方k-means聚类。我们采用了阈值同态加密和非交互式零知识协议,根据真实/理想世界范式构建了我们的协议。
{"title":"Privacy-Preserving Two-Party k-Means Clustering in Malicious Model","authors":"Rahena Akhter, Rownak Jahan Chowdhury, K. Emura, T. Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat","doi":"10.1109/COMPSACW.2013.53","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.53","url":null,"abstract":"In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacy-preserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134094912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Analyzing Distribution of Implicit Semantic Information in Web Services Web服务中隐含语义信息的分布分析
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.122
Xiaocao Hu, Zhiyong Feng, Shizhan Chen
Semantic annotation for Web services represents an important approach that transforms Web services into Semantic Web services. This paper analyzes the distribution of implicit semantic information to enhance the understanding about Web services. After quantifying implicit semantic information in Web services, the PCA methodology is utilized for obtaining principal components of implicit semantic information. The experiment conducted on 11836 WSDL documentations shows that almost 97 percent of implicit semantic information is distributed in inputs and outputs. Thus, the evaluation of how much implicit semantic information can be described by semantic annotation is offered.
Web服务的语义注释是将Web服务转换为语义Web服务的重要方法。本文分析了隐含语义信息的分布,以增强对Web服务的理解。在对Web服务中的隐式语义信息进行量化后,利用主成分分析方法获得隐式语义信息的主成分。对11836个WSDL文档进行的实验表明,几乎97%的隐式语义信息分布在输入和输出中。从而对语义标注可以描述多少隐式语义信息进行了评价。
{"title":"Analyzing Distribution of Implicit Semantic Information in Web Services","authors":"Xiaocao Hu, Zhiyong Feng, Shizhan Chen","doi":"10.1109/COMPSACW.2013.122","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.122","url":null,"abstract":"Semantic annotation for Web services represents an important approach that transforms Web services into Semantic Web services. This paper analyzes the distribution of implicit semantic information to enhance the understanding about Web services. After quantifying implicit semantic information in Web services, the PCA methodology is utilized for obtaining principal components of implicit semantic information. The experiment conducted on 11836 WSDL documentations shows that almost 97 percent of implicit semantic information is distributed in inputs and outputs. Thus, the evaluation of how much implicit semantic information can be described by semantic annotation is offered.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"224 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information 基于实时状态和/或统计信息的IP移动通信质量网络选择标准的考虑
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.76
Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, N. Hayashi, R. Aibara
In IP mobility communications, handoff is one of critical points degrading mobile communications quality. To solve this problem, many network selection methods have been proposed. We also proposed a network selection method in handoff and multi-homing to improve IP mobility communications quality. To select the best network interface or communication medium, it is required to obtain QoS criteria such as transmission delay time and packet loss ratio. The mobile node itself may measure real-time network status to obtain the criteria, or the mobile node may obtain statistical information stored in any database on the Internet. Though the criteria collection way affects much on network selection, it is not discussed in detail in the existing research. The purpose of this paper is to consider the difference types of network selection criteria from the viewpoint of effects on IP mobility communications quality. For this purpose, we first designed and implemented two prototype systems to obtain the different types of the criteria. One is a function to measure real-time network status in a mobile node itself. The other one is to obtain the stored statistical information in the database on the Internet. Next, we compare the two kinds of criteria by some field experiments. For the experiments, we also implemented a prototype system using both functions in our proposed IP mobility architecture. Through the experimental evaluations, we showed quantitative comparison of two types of network selection criteria by satisfaction ratio of QoS required by some applications.
在IP移动通信中,切换是影响移动通信质量的关键问题之一。为了解决这一问题,人们提出了许多网络选择方法。为了提高IP移动通信质量,提出了一种切换和多归的网络选择方法。为了选择最佳的网络接口或通信介质,需要获得传输延迟时间、丢包率等QoS标准。所述移动节点本身可测量实时网络状态以获得标准,或所述移动节点可获得存储在Internet上任何数据库中的统计信息。虽然标准收集方式对网络选择的影响很大,但在现有的研究中并没有详细讨论。本文的目的是从对IP移动通信质量影响的角度考虑不同类型的网络选择标准。为此,我们首先设计并实现了两个原型系统,以获得不同类型的标准。一个是测量移动节点本身的实时网络状态的功能。另一种是获取Internet上数据库中存储的统计信息。然后,通过现场试验对两种判据进行了比较。对于实验,我们还在我们提出的IP移动架构中实现了一个使用这两个功能的原型系统。通过实验评估,我们通过对某些应用所需QoS的满意度对两种网络选择标准进行了定量比较。
{"title":"Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information","authors":"Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, N. Hayashi, R. Aibara","doi":"10.1109/COMPSACW.2013.76","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.76","url":null,"abstract":"In IP mobility communications, handoff is one of critical points degrading mobile communications quality. To solve this problem, many network selection methods have been proposed. We also proposed a network selection method in handoff and multi-homing to improve IP mobility communications quality. To select the best network interface or communication medium, it is required to obtain QoS criteria such as transmission delay time and packet loss ratio. The mobile node itself may measure real-time network status to obtain the criteria, or the mobile node may obtain statistical information stored in any database on the Internet. Though the criteria collection way affects much on network selection, it is not discussed in detail in the existing research. The purpose of this paper is to consider the difference types of network selection criteria from the viewpoint of effects on IP mobility communications quality. For this purpose, we first designed and implemented two prototype systems to obtain the different types of the criteria. One is a function to measure real-time network status in a mobile node itself. The other one is to obtain the stored statistical information in the database on the Internet. Next, we compare the two kinds of criteria by some field experiments. For the experiments, we also implemented a prototype system using both functions in our proposed IP mobility architecture. Through the experimental evaluations, we showed quantitative comparison of two types of network selection criteria by satisfaction ratio of QoS required by some applications.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Architectural Design of a Job Management System Leveraging Software Defined Network 利用软件定义网络的作业管理系统的体系结构设计
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.108
Yasuhiro Watashiba, S. Date, H. Abe, Koheix Ichikawa, Hiroaki Yamanaka, Eiji Kawai, H. Takemura
Whether to be able to efficiently utilize the interconnect in a cluster system is a key factor in deciding the computational performance especially for a class of jobs that require intensive communications between processes. However, most of Job Management Systems (JMSs), which are deployed on cluster systems for load-balancing, do not have any mechanism that takes the pattern and requirements of communication occurred in a job into consideration, regardless of potential large impact on its performance. In this research, we explore a novel JMS that can assign computing resources to jobs submitted to the JMS from a standpoint of efficient use of both network and processor resource. More technically, in this paper, a JMS that integrates the network programming functionality of OpenFlow as Software Defined Network is proposed and discussed towards better and more efficient allocation of computing and network resources.
是否能够有效地利用集群系统中的互连是决定计算性能的关键因素,特别是对于一类需要在进程之间进行密集通信的作业。然而,大多数部署在集群系统上以实现负载平衡的作业管理系统(Job Management system, jms)没有任何机制来考虑作业中发生的通信模式和需求,而不考虑对其性能可能产生的巨大影响。在本研究中,我们探索了一种新的JMS,它可以从有效使用网络和处理器资源的角度将计算资源分配给提交给JMS的作业。在技术上,本文提出并讨论了一种JMS,它集成了OpenFlow作为软件定义网络的网络编程功能,从而更好、更有效地分配计算和网络资源。
{"title":"An Architectural Design of a Job Management System Leveraging Software Defined Network","authors":"Yasuhiro Watashiba, S. Date, H. Abe, Koheix Ichikawa, Hiroaki Yamanaka, Eiji Kawai, H. Takemura","doi":"10.1109/COMPSACW.2013.108","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.108","url":null,"abstract":"Whether to be able to efficiently utilize the interconnect in a cluster system is a key factor in deciding the computational performance especially for a class of jobs that require intensive communications between processes. However, most of Job Management Systems (JMSs), which are deployed on cluster systems for load-balancing, do not have any mechanism that takes the pattern and requirements of communication occurred in a job into consideration, regardless of potential large impact on its performance. In this research, we explore a novel JMS that can assign computing resources to jobs submitted to the JMS from a standpoint of efficient use of both network and processor resource. More technically, in this paper, a JMS that integrates the network programming functionality of OpenFlow as Software Defined Network is proposed and discussed towards better and more efficient allocation of computing and network resources.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1