首页 > 最新文献

2013 IEEE 37th Annual Computer Software and Applications Conference Workshops最新文献

英文 中文
An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment IPv6站点多归属环境下出站连接的最优路由选择机制
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.77
Takuya Yamaguchi, Yong Jin, N. Yamai, K. Okayama, Koki Okamoto, Motonori Nakamura
Recently, the Internet is widely used as a social basis and is not only providing many kinds of services but also offering these at high speed with high reliability. As one method for such a demand, multihoming technique, by which the inside network is connected with two or more ISPs (Internet Service Providers) and can use them properly according to network condition, attracts attention. In IPv6 site multihoming environment, multiple IP addresses are usually assigned to each host in the site. However, when a packet is sent from an inside node to outside, the packet has to go through a proper site-exit router in order to avoid ingress filtering. Therefore, especially, when communicating on the outbound connection initiated on an inside node, it is impossible to select a proper site-exit router since the source IP address is selected before initiating a connection. To solve this problem, we propose a route selection method for outbound connections. This method introduces a middleware into each inside node to establish a connection via each site-exit router simultaneously and then uses the first established connection. This middleware also introduces a kind of Network Address Translation (NAT) function to avoid ingress filtering. According to simulation experiments, we confirmed that the proposed method can select proper routes.
近年来,互联网作为一种社会基础得到了广泛的应用,不仅提供了多种服务,而且提供了高速、高可靠性的服务。作为满足这一需求的一种方法,多归属技术引起了人们的关注。多归属技术是指内部网络与两个或两个以上的互联网服务提供商(isp)连接,并能根据网络情况适当地使用它们。在IPv6站点多归属环境中,通常为站点内的每台主机分配多个IP地址。然而,当数据包从内部节点发送到外部时,数据包必须经过适当的站点出口路由器,以避免进入过滤。因此,特别是当在内部节点发起的出站连接上进行通信时,由于源IP地址是在发起连接之前选择的,因此不可能选择合适的站点出口路由器。为了解决这个问题,我们提出了一种出站连接的路由选择方法。该方法在每个内部节点中引入一个中间件,通过每个站点出口路由器同时建立连接,然后使用第一个建立的连接。该中间件还引入了一种网络地址转换(NAT)功能,以避免入口过滤。通过仿真实验,我们证实了该方法可以选择合适的路径。
{"title":"An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment","authors":"Takuya Yamaguchi, Yong Jin, N. Yamai, K. Okayama, Koki Okamoto, Motonori Nakamura","doi":"10.1109/COMPSACW.2013.77","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.77","url":null,"abstract":"Recently, the Internet is widely used as a social basis and is not only providing many kinds of services but also offering these at high speed with high reliability. As one method for such a demand, multihoming technique, by which the inside network is connected with two or more ISPs (Internet Service Providers) and can use them properly according to network condition, attracts attention. In IPv6 site multihoming environment, multiple IP addresses are usually assigned to each host in the site. However, when a packet is sent from an inside node to outside, the packet has to go through a proper site-exit router in order to avoid ingress filtering. Therefore, especially, when communicating on the outbound connection initiated on an inside node, it is impossible to select a proper site-exit router since the source IP address is selected before initiating a connection. To solve this problem, we propose a route selection method for outbound connections. This method introduces a middleware into each inside node to establish a connection via each site-exit router simultaneously and then uses the first established connection. This middleware also introduces a kind of Network Address Translation (NAT) function to avoid ingress filtering. According to simulation experiments, we confirmed that the proposed method can select proper routes.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114944334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Elevator Acceleration Sensing: Design and Estimation Recognition Algorithm Using Crowdsourcing 电梯加速度传感:基于众包的设计与估计识别算法
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.97
Tianhui Yang, K. Kaji, Nobuo Kawaguchi
In human activity sensing areas, we focus on elevator recognition using accelerometer. In this paper, our main challenge is to create an elevator acceleration recognition algorithm. In order to put this algorithm into real world use, This algorithm should be robust enough that can ignore the differences of the elevators, devices and subjects. To realize this aim, we build a crowdsourcing system which consists of an android application and a server. Android users can use this application to calculate elevator's moving distance. They can also upload elevators' accelerometer signals to the server, so we can get elevator acceleration data from all over the world. after publishing the system, we use the data we collected to build an elevator acceleration database. By using this database, we build a robust elevator recognition algorithm. we also use the features of elevators to distinguish them.
在人类活动感知领域,我们主要研究利用加速度计识别电梯。在本文中,我们的主要挑战是创建一个电梯加速度识别算法。为了将该算法应用于现实世界,该算法必须具有足够的鲁棒性,可以忽略电梯、设备和主体的差异。为了实现这一目标,我们构建了一个由android应用程序和服务器组成的众包系统。Android用户可以使用此应用程序计算电梯的移动距离。他们还可以将电梯的加速度计信号上传到服务器,这样我们就可以获得来自世界各地的电梯加速度数据。在系统发布后,我们利用收集到的数据建立了电梯加速度数据库。利用该数据库,建立了鲁棒的电梯识别算法。我们也用电梯的特点来区分它们。
{"title":"Elevator Acceleration Sensing: Design and Estimation Recognition Algorithm Using Crowdsourcing","authors":"Tianhui Yang, K. Kaji, Nobuo Kawaguchi","doi":"10.1109/COMPSACW.2013.97","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.97","url":null,"abstract":"In human activity sensing areas, we focus on elevator recognition using accelerometer. In this paper, our main challenge is to create an elevator acceleration recognition algorithm. In order to put this algorithm into real world use, This algorithm should be robust enough that can ignore the differences of the elevators, devices and subjects. To realize this aim, we build a crowdsourcing system which consists of an android application and a server. Android users can use this application to calculate elevator's moving distance. They can also upload elevators' accelerometer signals to the server, so we can get elevator acceleration data from all over the world. after publishing the system, we use the data we collected to build an elevator acceleration database. By using this database, we build a robust elevator recognition algorithm. we also use the features of elevators to distinguish them.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-constrained Routing Algorithm: A Networking Evaluation 多约束路由算法:一种网络评价
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.107
V. Nguyen, Thomas Begin, I. G. Lassous
IP networks may face issues to support the offered workload due to the increasing number of Internet users, the steady influx of new Internet applications, which require stringent QoS, and applications needing big data transmission. QoS routing can be viewed as an attractive approach to tackle this issue. However, most of the QoS routing solutions are not evaluated in a realistic framework. In this paper we propose a networking evaluation of multi-constrained routing to assess the potential benefit of QoS routing protocol. To do this, we converted a multi-constrained routing algorithm into a protocol, and implemented it in the simulator NS2. Our results indicate that if the monitoring tool of a network can not sustain frequent link-state announcements, the benefits coming from implementing a QoS routing are quite low. On the other hand, if the network is equipped with an adequate measurement tool, then QoS routing can be worth implementing, and the routing based only the available bandwidth at each link arises as the best option (no need to consider the end-to-end delay constraint, nor the loss rate constraint).
由于Internet用户数量的增加,新的Internet应用程序的不断涌入(这些应用程序要求严格的QoS)以及需要大数据传输的应用程序,IP网络可能面临支持所提供的工作负载的问题。QoS路由可以看作是解决这个问题的一种有吸引力的方法。然而,大多数QoS路由解决方案都没有在一个现实的框架中进行评估。在本文中,我们提出了一个多约束路由的网络评估,以评估QoS路由协议的潜在效益。为此,我们将多约束路由算法转换为协议,并在模拟器NS2中实现。我们的研究结果表明,如果网络的监控工具不能维持频繁的链路状态公告,那么实现QoS路由的好处是相当低的。另一方面,如果网络配备了适当的测量工具,那么QoS路由就值得实现,并且仅基于每条链路的可用带宽的路由就成为最佳选择(不需要考虑端到端延迟约束,也不需要考虑损失率约束)。
{"title":"Multi-constrained Routing Algorithm: A Networking Evaluation","authors":"V. Nguyen, Thomas Begin, I. G. Lassous","doi":"10.1109/COMPSACW.2013.107","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.107","url":null,"abstract":"IP networks may face issues to support the offered workload due to the increasing number of Internet users, the steady influx of new Internet applications, which require stringent QoS, and applications needing big data transmission. QoS routing can be viewed as an attractive approach to tackle this issue. However, most of the QoS routing solutions are not evaluated in a realistic framework. In this paper we propose a networking evaluation of multi-constrained routing to assess the potential benefit of QoS routing protocol. To do this, we converted a multi-constrained routing algorithm into a protocol, and implemented it in the simulator NS2. Our results indicate that if the monitoring tool of a network can not sustain frequent link-state announcements, the benefits coming from implementing a QoS routing are quite low. On the other hand, if the network is equipped with an adequate measurement tool, then QoS routing can be worth implementing, and the routing based only the available bandwidth at each link arises as the best option (no need to consider the end-to-end delay constraint, nor the loss rate constraint).","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Petri Net Based Model for Trustworthy Software Process Composition 基于Petri网的可信赖软件过程组合模型
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.37
Xuan Zhang, Tong Li, Zhongwen Xie, Fei Dai, Jinzhuo Liu
The growing demand for higher trustworthiness of software poses an unprecedented challenge to the software industry. Software is the outcome of the software process. Software trustworthiness is highly dependent on the software process. To combine the trustworthiness in the software process, we propose a formal method for trustworthy software process composition. In this method, trustworthy processes are specified by the trustworthiness requirements and compose into software process. The composite process satisfies both functional and non-functional requirements for the trustworthy software.
人们对软件可靠性的要求越来越高,对软件行业提出了前所未有的挑战。软件是软件过程的结果。软件的可信度高度依赖于软件过程。为了结合软件过程中的可信度,提出了一种形式化的可信软件过程组合方法。在该方法中,可信赖过程由可信赖需求指定并组成软件过程。复合过程同时满足可信赖软件的功能和非功能需求。
{"title":"A Petri Net Based Model for Trustworthy Software Process Composition","authors":"Xuan Zhang, Tong Li, Zhongwen Xie, Fei Dai, Jinzhuo Liu","doi":"10.1109/COMPSACW.2013.37","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.37","url":null,"abstract":"The growing demand for higher trustworthiness of software poses an unprecedented challenge to the software industry. Software is the outcome of the software process. Software trustworthiness is highly dependent on the software process. To combine the trustworthiness in the software process, we propose a formal method for trustworthy software process composition. In this method, trustworthy processes are specified by the trustworthiness requirements and compose into software process. The composite process satisfies both functional and non-functional requirements for the trustworthy software.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124460072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaining Industrial Confidence for the Introduction of Domain-Specific Languages 获得引入领域特定语言的行业信心
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.83
A. Mooij, J. Hooman, R. Albers
Domain-Specific Languages (DSLs) receive attention as the possible next abstraction step in programming. Despite the benefits of using DSLs, in the industry there is also some reluctance against their introduction in product development. We address a number of issues that are important to gain industrial confidence for the introduction of DSLs. These include the available tools, the quality of generated code, and the incorporation in the industrial workflow. Our observations are based on an industrial study project at Philips Healthcare, especially concerning the development of a DSL for collision prevention. We also relate our experiences to the literature.
领域特定语言(dsl)作为编程中可能的下一个抽象步骤而受到关注。尽管使用dsl有好处,但在行业中也有一些人不愿意在产品开发中引入dsl。我们解决了一些重要的问题,以获得行业对引入dsl的信心。这些因素包括可用的工具、生成代码的质量,以及在工业工作流中的整合。我们的观察结果基于飞利浦医疗保健公司的一个工业研究项目,特别是关于防止碰撞的DSL的开发。我们也把自己的经历和文学联系起来。
{"title":"Gaining Industrial Confidence for the Introduction of Domain-Specific Languages","authors":"A. Mooij, J. Hooman, R. Albers","doi":"10.1109/COMPSACW.2013.83","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.83","url":null,"abstract":"Domain-Specific Languages (DSLs) receive attention as the possible next abstraction step in programming. Despite the benefits of using DSLs, in the industry there is also some reluctance against their introduction in product development. We address a number of issues that are important to gain industrial confidence for the introduction of DSLs. These include the available tools, the quality of generated code, and the incorporation in the industrial workflow. Our observations are based on an industrial study project at Philips Healthcare, especially concerning the development of a DSL for collision prevention. We also relate our experiences to the literature.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124478354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
On the Use of Congestion Information for Rerouting in the Disaster Evacuation Guidance Using Opportunistic Communication 基于机会通信的灾害疏散引导中拥塞信息在重路由中的应用
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.75
A. Fujihara, H. Miwa
In recent years studies on disaster evacuation guidance effective against situations of large-scale urban disasters have been undertaken. Recently we have proposed the disaster evacuation guidance using opportunistic communication where evacuees collect disaster information of the locations of impassable and congested roads in their smartphones by themselves and share it with each other opportunistically by short-range wireless communication between nearby smartphones in order to not only navigate crowds of evacuees to refuges, but also rapidly aggregate the disaster information in real time. The proposed guidance was valid in evacuation scenarios under the condition that the mobile communication is disabled by disaster. We numerically showed by simulating a simple mathematical model that the guidance effectively shortened evacuation time of the evacuees. Since the crowds of evacuees simultaneously rush to refuge areas in the evacuation, on the other hand, the emergence of congestion by evacuees is inevitable and the evacuation time could be seriously delayed by the congestion. In this paper we investigate effects of the use of congestion information on the evacuation time by switching a detour evacuation route around congested roads. We introduce three simple algorithms to divert the route and numerically compare their performances using a new stochastic congestion model. In consequence we find that the use of congestion information has less impact on the evacuation time than that of the information of impassable roads, and also that slower route switching decision coming around congested roads is worse in the performance because evacuees tend to be sandwiched between some congested areas and are forced to go back and forth in vain by repeated evacuation route changes.
近年来开展了针对大规模城市灾害情况的灾害疏散指导研究。最近,我们提出了利用机会通信的灾害疏散指导,疏散人员通过自己的智能手机收集无法通行和拥堵道路位置的灾害信息,并通过附近智能手机之间的短距离无线通信机会地相互分享,不仅可以将疏散人群引导到避难所,还可以快速实时汇总灾害信息。该指南适用于灾害导致移动通信中断的疏散场景。通过模拟一个简单的数学模型,数值证明了导引有效地缩短了疏散人员的疏散时间。另一方面,由于疏散人群在疏散过程中同时涌向避难区域,疏散人员拥堵的出现是不可避免的,拥堵会严重耽误疏散时间。在本文中,我们研究了拥堵信息的使用对疏散时间的影响,通过在拥挤的道路上切换绕行疏散路线。我们介绍了三种简单的改道算法,并使用一种新的随机拥塞模型对它们的性能进行了数值比较。因此,我们发现使用拥堵信息对疏散时间的影响小于使用不可通行道路信息对疏散时间的影响,并且在拥堵道路周围进行缓慢的路线切换决策的性能更差,因为疏散人员容易被夹在一些拥堵区域之间,并且由于反复更换疏散路线而被迫来回无效。
{"title":"On the Use of Congestion Information for Rerouting in the Disaster Evacuation Guidance Using Opportunistic Communication","authors":"A. Fujihara, H. Miwa","doi":"10.1109/COMPSACW.2013.75","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.75","url":null,"abstract":"In recent years studies on disaster evacuation guidance effective against situations of large-scale urban disasters have been undertaken. Recently we have proposed the disaster evacuation guidance using opportunistic communication where evacuees collect disaster information of the locations of impassable and congested roads in their smartphones by themselves and share it with each other opportunistically by short-range wireless communication between nearby smartphones in order to not only navigate crowds of evacuees to refuges, but also rapidly aggregate the disaster information in real time. The proposed guidance was valid in evacuation scenarios under the condition that the mobile communication is disabled by disaster. We numerically showed by simulating a simple mathematical model that the guidance effectively shortened evacuation time of the evacuees. Since the crowds of evacuees simultaneously rush to refuge areas in the evacuation, on the other hand, the emergence of congestion by evacuees is inevitable and the evacuation time could be seriously delayed by the congestion. In this paper we investigate effects of the use of congestion information on the evacuation time by switching a detour evacuation route around congested roads. We introduce three simple algorithms to divert the route and numerically compare their performances using a new stochastic congestion model. In consequence we find that the use of congestion information has less impact on the evacuation time than that of the information of impassable roads, and also that slower route switching decision coming around congested roads is worse in the performance because evacuees tend to be sandwiched between some congested areas and are forced to go back and forth in vain by repeated evacuation route changes.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Certifiable Development Process for Information Processing in the Measurement Domain on the Base of 3W-Models 基于3w模型的测量领域信息处理可认证开发过程
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.121
I. Gushchina, W. Fengler, Jirka Ciemala, Detlef Streitferdt
The paper presents a certifiable development process applicable to hardware and software development for information processing in the measurement domain, especially the dynamic weighing technology. Thereby it is based on the developments of prototypes for new and predecessor systems and product stages. Particular attention is paid to the possibility of calibration.
本文提出了一种可验证的开发流程,适用于测量领域信息处理的硬件和软件开发,特别是动态称重技术。因此,它是基于新系统和前身系统和产品阶段的原型开发。特别注意的是校准的可能性。
{"title":"Certifiable Development Process for Information Processing in the Measurement Domain on the Base of 3W-Models","authors":"I. Gushchina, W. Fengler, Jirka Ciemala, Detlef Streitferdt","doi":"10.1109/COMPSACW.2013.121","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.121","url":null,"abstract":"The paper presents a certifiable development process applicable to hardware and software development for information processing in the measurement domain, especially the dynamic weighing technology. Thereby it is based on the developments of prototypes for new and predecessor systems and product stages. Particular attention is paid to the possibility of calibration.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Software Based on Windows NDIS Filter Drivers 基于Windows NDIS过滤驱动的安全软件
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.36
Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen
We present a new security software based on the NDIS filter drivers at Windows desktop computer, which focuses on filtering and dropping packets according to the snort rules released by security communities (such as Snort or Emerging Threats). TWIDS is an application designed based on the middleware of the Windows® OS, it can identify the application process that transfer packets. TWIDS can process a large number of malicious IP address in the database that it can check and drop packets effectively and improve the network security on Windows® desktop computer by using Snort related protective resources. Thus, it provides a security solution that can help to reduce the investments for network gateway and can be used by common users who used for eliminating the botnet and malware traffic. TWIDS is shared in the downloads section of the Openfoundry.org website, and it will against the spread of botnets and malware.
我们提出了一种基于Windows桌面计算机上的NDIS过滤器驱动程序的新安全软件,它的重点是根据安全社区发布的snort规则(如snort或新兴威胁)过滤和丢弃数据包。TWIDS是基于Windows®操作系统中间件设计的应用程序,它可以识别传输数据包的应用程序进程。TWIDS可以对数据库中大量的恶意IP地址进行处理,有效地检查和丢弃报文,利用Snort相关的防护资源,提高Windows®桌面计算机的网络安全性。因此,它提供了一种安全解决方案,可以帮助减少网络网关的投资,并可用于消除僵尸网络和恶意软件流量的普通用户。TWIDS在openfoundy.org网站的下载部分共享,它将防止僵尸网络和恶意软件的传播。
{"title":"Security Software Based on Windows NDIS Filter Drivers","authors":"Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen","doi":"10.1109/COMPSACW.2013.36","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.36","url":null,"abstract":"We present a new security software based on the NDIS filter drivers at Windows desktop computer, which focuses on filtering and dropping packets according to the snort rules released by security communities (such as Snort or Emerging Threats). TWIDS is an application designed based on the middleware of the Windows® OS, it can identify the application process that transfer packets. TWIDS can process a large number of malicious IP address in the database that it can check and drop packets effectively and improve the network security on Windows® desktop computer by using Snort related protective resources. Thus, it provides a security solution that can help to reduce the investments for network gateway and can be used by common users who used for eliminating the botnet and malware traffic. TWIDS is shared in the downloads section of the Openfoundry.org website, and it will against the spread of botnets and malware.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128651248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Partitioning Decision Process for Embedded Hardware and Software Deployment 嵌入式软硬件部署的分区决策过程
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.131
Gaetana Sapienza, T. Seceleanu, I. Crnkovic
Many types of embedded systems applications are implemented as a combination of software and hardware. For such systems the mapping of the application units into hardware and software, i.e. the partitioning process, is a key phase of the design. Although there exist techniques for partitioning, the entire process, in particular in relation to different application requirements and project constraints, is not properly supported. This leads to several unplanned iterations, redesigns and interruptions due to uncontrolled dependencies between hardware and software parts. In order to overcome these problems, we provide a design process that enables the partitioning based on a multiple criteria decision analysis in a late design phase. We illustrate the proposed approach and provide a proof-of concept on an industrial case study to validate the approach applicability.
许多类型的嵌入式系统应用程序是作为软件和硬件的组合来实现的。对于这样的系统,将应用程序单元映射到硬件和软件中,即分区过程,是设计的关键阶段。尽管存在用于划分的技术,但是整个过程,特别是与不同的应用程序需求和项目约束相关的过程,并没有得到适当的支持。由于硬件和软件部分之间不受控制的依赖关系,这会导致一些计划外的迭代、重新设计和中断。为了克服这些问题,我们提供了一个设计过程,该过程支持在后期设计阶段基于多标准决策分析进行划分。我们举例说明了所提出的方法,并提供了一个工业案例研究的概念验证,以验证该方法的适用性。
{"title":"Partitioning Decision Process for Embedded Hardware and Software Deployment","authors":"Gaetana Sapienza, T. Seceleanu, I. Crnkovic","doi":"10.1109/COMPSACW.2013.131","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.131","url":null,"abstract":"Many types of embedded systems applications are implemented as a combination of software and hardware. For such systems the mapping of the application units into hardware and software, i.e. the partitioning process, is a key phase of the design. Although there exist techniques for partitioning, the entire process, in particular in relation to different application requirements and project constraints, is not properly supported. This leads to several unplanned iterations, redesigns and interruptions due to uncontrolled dependencies between hardware and software parts. In order to overcome these problems, we provide a design process that enables the partitioning based on a multiple criteria decision analysis in a late design phase. We illustrate the proposed approach and provide a proof-of concept on an industrial case study to validate the approach applicability.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"47 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
System Evolution for Unknown Context through Multi-action Evaluation 基于多动作评价的未知环境下的系统演化
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.43
Asanga Nimalasena, V. Getov
Context-aware computing has been attracting growing attention in recent years. Generally, there are several ways for a context-aware system to select a course of action for a particular context change. One way is for the system developers to encompass all possible context changes in the domain knowledge. Then, the system matches a context change to that in the domain knowledge and chooses the corresponding action. Other methods include system inferences and adaptive learning whereby the system executes one action and evaluates the outcome and self-adapts/self-learns based on that. However, there are situations where a system encounters unknown contexts. In such cases, instead of one action being implemented and evaluated, multiple actions could be implemented concurrently. This parallel evaluation of actions could quicken the evolution time taken to select the best action suited to unknown context compared to the iterative approach. This paper proposes a framework for context-aware systems that finds the best action for unknown context through multi-action evaluation and self-adaptation. In a case study, we show how our multi-action evaluation system can be implemented for a hypothetical hotelier who uses the name-your-own-price mechanism to sell his perishable inventory.
近年来,上下文感知计算吸引了越来越多的关注。通常,上下文感知系统有几种方法可以为特定的上下文更改选择行动方案。一种方法是系统开发人员在领域知识中包含所有可能的上下文更改。然后,系统将上下文更改与领域知识中的上下文更改进行匹配,并选择相应的操作。其他方法包括系统推理和自适应学习,即系统执行一个动作并评估结果,并在此基础上自我适应/自我学习。然而,在某些情况下,系统会遇到未知的上下文。在这种情况下,可以并发地实现多个操作,而不是实现和评估一个操作。与迭代方法相比,这种行动的并行评估可以加快选择适合未知环境的最佳行动所花费的进化时间。本文提出了一种情境感知系统框架,该系统通过多动作评估和自适应来寻找未知情境下的最佳动作。在一个案例研究中,我们展示了如何为一个假设的酒店经营者实施我们的多行动评估系统,该经营者使用自己定价的机制来销售他的易腐库存。
{"title":"System Evolution for Unknown Context through Multi-action Evaluation","authors":"Asanga Nimalasena, V. Getov","doi":"10.1109/COMPSACW.2013.43","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.43","url":null,"abstract":"Context-aware computing has been attracting growing attention in recent years. Generally, there are several ways for a context-aware system to select a course of action for a particular context change. One way is for the system developers to encompass all possible context changes in the domain knowledge. Then, the system matches a context change to that in the domain knowledge and chooses the corresponding action. Other methods include system inferences and adaptive learning whereby the system executes one action and evaluates the outcome and self-adapts/self-learns based on that. However, there are situations where a system encounters unknown contexts. In such cases, instead of one action being implemented and evaluated, multiple actions could be implemented concurrently. This parallel evaluation of actions could quicken the evolution time taken to select the best action suited to unknown context compared to the iterative approach. This paper proposes a framework for context-aware systems that finds the best action for unknown context through multi-action evaluation and self-adaptation. In a case study, we show how our multi-action evaluation system can be implemented for a hypothetical hotelier who uses the name-your-own-price mechanism to sell his perishable inventory.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1