首页 > 最新文献

2013 IEEE 37th Annual Computer Software and Applications Conference Workshops最新文献

英文 中文
Privacy-Aware Community Sensing Using Randomized Response 基于随机响应的隐私感知社区感知
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.54
Shunsuke Aoki, M. Iwai, K. Sezaki
Community sensing is an emerging system which allows the increasing number of mobile phone users to share effectively minute statistical information collected by themselves. This system relies on participants' active contribution including intentional input data through mobile phone's applications, e.g. Facebook, Twitter and Linkdin. However, a number of privacy concerns will hinder the spread of community sensing applications. It is difficult for resource-constrained mobile phones to rely on complicated encryption scheme. We should prepare a privacy-preserving community sensing scheme with less computational-complexity. Moreover, an environment that is reassuring for participants to conduct community sensing is strongly required because the quality of the statistical data is depending on general users' active contribution. In this article, we suggest a privacy-preserving community sensing scheme for human-centric data such as profile information by using the combination of negative surveys and randomized response techniques. By using our method described in this paper, the server can reconstruct the probability distributions of the original distributions of sensed values without violating the privacy of users. Especially, we can protect sensitive information from malicious tracking attacks. We evaluated how this scheme can preserve the privacy while keeping the integrity of aggregated information.
社区感知是一种新兴的系统,它允许越来越多的移动电话用户有效地分享他们自己收集的微小统计信息。该系统依赖于参与者的积极贡献,包括通过手机应用程序(如Facebook, Twitter和Linkdin)有意输入数据。然而,一些隐私问题将阻碍社区传感应用的推广。资源受限的手机很难依赖复杂的加密方案。我们应该准备一种计算复杂度较低的保护隐私的社区感知方案。此外,由于统计数据的质量取决于一般用户的积极贡献,因此迫切需要一个让参与者安心进行社区感知的环境。在本文中,我们提出了一种基于负面调查和随机响应技术的隐私保护社区感知方案,用于以人为中心的数据,如个人资料信息。通过本文所述的方法,服务器可以在不侵犯用户隐私的情况下重建原始感知值分布的概率分布。特别是,我们可以保护敏感信息免受恶意跟踪攻击。我们评估了该方案如何在保持聚合信息完整性的同时保护隐私。
{"title":"Privacy-Aware Community Sensing Using Randomized Response","authors":"Shunsuke Aoki, M. Iwai, K. Sezaki","doi":"10.1109/COMPSACW.2013.54","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.54","url":null,"abstract":"Community sensing is an emerging system which allows the increasing number of mobile phone users to share effectively minute statistical information collected by themselves. This system relies on participants' active contribution including intentional input data through mobile phone's applications, e.g. Facebook, Twitter and Linkdin. However, a number of privacy concerns will hinder the spread of community sensing applications. It is difficult for resource-constrained mobile phones to rely on complicated encryption scheme. We should prepare a privacy-preserving community sensing scheme with less computational-complexity. Moreover, an environment that is reassuring for participants to conduct community sensing is strongly required because the quality of the statistical data is depending on general users' active contribution. In this article, we suggest a privacy-preserving community sensing scheme for human-centric data such as profile information by using the combination of negative surveys and randomized response techniques. By using our method described in this paper, the server can reconstruct the probability distributions of the original distributions of sensed values without violating the privacy of users. Especially, we can protect sensitive information from malicious tracking attacks. We evaluated how this scheme can preserve the privacy while keeping the integrity of aggregated information.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121663970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic Indexing and Creating Semantic Networks for Agricultural Science Papers in the Polish Language 波兰语农业科学论文的自动标引与语义网络建立
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.63
P. Wrzeciono, W. Karwowski
This paper presents an automatic indexing system, created on the basis of text analysis, which involves grouping words and reducing them to their dictionary form. The system, developed with the help of an inflection dictionary of the Polish language, is designed to store and retrieve scientific papers dedicated to agriculture. During the analysis, auxiliary words such as pronouns, conjunctions, etc. were omitted. The words which are not present in the inflection dictionary, were used to create a dictionary of new terms. The words stored in the dictionary of new terms were used for the extraction of agricultural terms, which then could be located in the AGROVOC thesaurus. For each of the analyzed papers, a set of concepts with assigned weights was created. For each of the stored scientific papers, an "artificial sentence" was generated. An "artificial sentence" was created on the basis of the frequency of occurrence of dictionary forms of a word appearing in the texts and the word's grammatical category. This "artificial sentence" as well as sets of terms were used to find relationships between the papers stored in the system. These dependencies are used in an algorithm of searching for articles matching a query. It was observed that the number of correct results depends on the number of words in the paper. If a work consisted of at least a thousand words, the probability of misdiagnosis of content was not higher than 5%. In the case of short texts, such as abstracts, the probability of misdiagnosis was much higher, approximately 23%. Results obtained in the presented system are more accurate than those obtained by standard search engines. This method can also be applied to other natural languages with extensive inflection systems. The presented solution is a continuation of the work carried out under a grant [N N310 038538].
本文提出了一种基于文本分析的自动标引系统,该系统包括对单词进行分组并将其还原为词典形式。该系统是在波兰语词形变化词典的帮助下开发的,旨在存储和检索与农业有关的科学论文。在分析过程中,省略了代词、连词等助词。在词形变化词典中没有出现的单词,被用来创建一个新的术语词典。储存在新词词典中的词被用来提取农业术语,然后可以在AGROVOC同义词典中找到。对于每一篇被分析的论文,都创建了一组具有指定权重的概念。对于每一篇存储的科学论文,生成一个“人工句子”。一个“人工句子”是根据一个词在文本中出现的字典形式的频率和这个词的语法类别创建的。这个“人工句子”和一组术语被用来寻找存储在系统中的论文之间的关系。这些依赖关系用于搜索匹配查询的文章的算法中。我们观察到,正确结果的数量取决于论文中的单词数量。如果一部作品至少有一千字,那么内容误诊的概率不高于5%。对于诸如摘要之类的短文本,误诊的概率要高得多,约为23%。在本系统中获得的结果比标准搜索引擎获得的结果更准确。这种方法也可以应用于其他具有大量屈折系统的自然语言。提出的解决方案是在一项拨款[N N310 038538]下继续开展工作。
{"title":"Automatic Indexing and Creating Semantic Networks for Agricultural Science Papers in the Polish Language","authors":"P. Wrzeciono, W. Karwowski","doi":"10.1109/COMPSACW.2013.63","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.63","url":null,"abstract":"This paper presents an automatic indexing system, created on the basis of text analysis, which involves grouping words and reducing them to their dictionary form. The system, developed with the help of an inflection dictionary of the Polish language, is designed to store and retrieve scientific papers dedicated to agriculture. During the analysis, auxiliary words such as pronouns, conjunctions, etc. were omitted. The words which are not present in the inflection dictionary, were used to create a dictionary of new terms. The words stored in the dictionary of new terms were used for the extraction of agricultural terms, which then could be located in the AGROVOC thesaurus. For each of the analyzed papers, a set of concepts with assigned weights was created. For each of the stored scientific papers, an \"artificial sentence\" was generated. An \"artificial sentence\" was created on the basis of the frequency of occurrence of dictionary forms of a word appearing in the texts and the word's grammatical category. This \"artificial sentence\" as well as sets of terms were used to find relationships between the papers stored in the system. These dependencies are used in an algorithm of searching for articles matching a query. It was observed that the number of correct results depends on the number of words in the paper. If a work consisted of at least a thousand words, the probability of misdiagnosis of content was not higher than 5%. In the case of short texts, such as abstracts, the probability of misdiagnosis was much higher, approximately 23%. Results obtained in the presented system are more accurate than those obtained by standard search engines. This method can also be applied to other natural languages with extensive inflection systems. The presented solution is a continuation of the work carried out under a grant [N N310 038538].","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121837576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Method for Keeping Small Distance from Users to Servers during Failures by Link Protection 通过链路保护实现故障时用户与服务器之间保持较小距离的方法
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.119
Nao Maeda, H. Miwa
Large-volume contents distributed by a content delivery network (CDN) on the Internet increase load of content delivery servers and networks, which may degrade the quality of service. As a method to keep high quality service for CDN, some mirror servers providing the same content are located on a network and a request is navigated to one of the mirror servers. The network must offer connectivity between a user and servers with small distance even during link failures. In this paper, we address a network design method by protection of critical links whose failures significantly degrade the performance. The objective is to find the smallest number of the links to be protected so that a user can access servers with small increase of distance even if non-protected links fail. First, we formulate this problem and prove that it is NP-hard. Second, we present a polynomial-time algorithm to solve this problem when the number of simultaneously failed links is restricted to one. Furthermore, we evaluate the number of protected links of actual ISP network topologies by the algorithm and show the relationship between the number of protected links and the values of the parameters.
内容分发网络CDN (content delivery network)在Internet上分发的大量内容增加了内容分发服务器和网络的负载,可能会降低服务质量。作为保持CDN高质量服务的一种方法,一些提供相同内容的镜像服务器位于网络上,请求被导航到其中一个镜像服务器。网络必须在用户和服务器之间提供小距离的连接,即使在链路故障期间。在本文中,我们提出了一种通过保护关键链路的网络设计方法,这些链路的故障会显著降低网络性能。目标是找到要保护的链路的最小数量,以便即使非保护的链路失败,用户也可以以较小的距离增加访问服务器。首先,我们提出了这个问题,并证明了它是np困难的。其次,我们提出了一个多项式时间算法来解决这个问题,当同时失效的链路数量被限制为一个。利用该算法对实际ISP网络拓扑的保护链路数进行了评估,并给出了保护链路数与参数值之间的关系。
{"title":"Method for Keeping Small Distance from Users to Servers during Failures by Link Protection","authors":"Nao Maeda, H. Miwa","doi":"10.1109/COMPSACW.2013.119","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.119","url":null,"abstract":"Large-volume contents distributed by a content delivery network (CDN) on the Internet increase load of content delivery servers and networks, which may degrade the quality of service. As a method to keep high quality service for CDN, some mirror servers providing the same content are located on a network and a request is navigated to one of the mirror servers. The network must offer connectivity between a user and servers with small distance even during link failures. In this paper, we address a network design method by protection of critical links whose failures significantly degrade the performance. The objective is to find the smallest number of the links to be protected so that a user can access servers with small increase of distance even if non-protected links fail. First, we formulate this problem and prove that it is NP-hard. Second, we present a polynomial-time algorithm to solve this problem when the number of simultaneously failed links is restricted to one. Furthermore, we evaluate the number of protected links of actual ISP network topologies by the algorithm and show the relationship between the number of protected links and the values of the parameters.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121939453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Unified Vulnerability Assessment with Open Data 面向开放数据的统一脆弱性评估
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.34
Akihito Nakamura
Continuous and comprehensive vulnerability management is a difficult task for administrators. The difficulties are not because of a lack of tools, but because they are designed without service-oriented architecture viewpoint and there is insufficient trustworthy machine-readable input data. This paper presents a service-oriented architecture for vulnerability assessment systems based on the open security standards and related contents. If the functions are provided as a service, various kinds of security applications can be interoperated and integrated in loosely-coupled way. We also studied the effectiveness of the available public data for automated vulnerability assessment. Despite the large amount of efforts that goes toward describing machine-readable assessment test in conformity to the OVAL standard, the evaluation result proves inadequate for comprehensive vulnerability assessment. Only about 12% of all the known vulnerabilities are covered by existing OVAL tests, while some popular client applications in the Top 30 with most unique vulnerabilities are covered more than 90%.
持续、全面的漏洞管理对管理员来说是一项艰巨的任务。困难并不是因为缺乏工具,而是因为它们在设计时没有考虑面向服务的体系结构观点,而且缺乏可信的机器可读输入数据。提出了一种基于开放安全标准及相关内容的面向服务的漏洞评估体系结构。如果将这些功能作为服务提供,那么各种安全应用程序可以以松耦合的方式进行互操作和集成。我们还研究了用于自动脆弱性评估的可用公共数据的有效性。尽管在描述符合OVAL标准的机读评估测试方面做了大量的工作,但评估结果不足以进行全面的脆弱性评估。现有OVAL测试只覆盖了所有已知漏洞的12%,而前30名中最独特漏洞的一些流行客户端应用程序覆盖了90%以上。
{"title":"Towards Unified Vulnerability Assessment with Open Data","authors":"Akihito Nakamura","doi":"10.1109/COMPSACW.2013.34","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.34","url":null,"abstract":"Continuous and comprehensive vulnerability management is a difficult task for administrators. The difficulties are not because of a lack of tools, but because they are designed without service-oriented architecture viewpoint and there is insufficient trustworthy machine-readable input data. This paper presents a service-oriented architecture for vulnerability assessment systems based on the open security standards and related contents. If the functions are provided as a service, various kinds of security applications can be interoperated and integrated in loosely-coupled way. We also studied the effectiveness of the available public data for automated vulnerability assessment. Despite the large amount of efforts that goes toward describing machine-readable assessment test in conformity to the OVAL standard, the evaluation result proves inadequate for comprehensive vulnerability assessment. Only about 12% of all the known vulnerabilities are covered by existing OVAL tests, while some popular client applications in the Top 30 with most unique vulnerabilities are covered more than 90%.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Implementation of a Novel Weighted Shortest Path Algorithm for Maze Solving Robots 一种新型加权最短路径算法的设计与实现
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.49
Behnam Rahnama, Makbule Canan Ozdemir, Y. Kiran, Atilla Elçi
This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover it. Each agent solves a part of the maze and updates the shared memory so that other robots also benefit from each other's' discovery. Finding of the destination cell by an agent helps others to interconnect their discovered paths to the one ending with the destination cell. The proposed shortest path algorithm considers the cost for not only coordinate distance but also number of turns and moves required to traverse the path. The Shortest Path algorithm is compared against various available maze solving algorithms including Flood-Fill, Modified Flood-Fill and ALCKEF. The presented algorithm can be used also as an additional layer to enhance the available methods at second and subsequent runs.
本文研究了多智能体环境下迷宫发现最短路径算法的设计与实现。机器人代理在一开始并不知道迷宫,他们在发现迷宫的过程中学习。每个智能体解决迷宫的一部分,并更新共享内存,这样其他机器人也能从彼此的发现中受益。一个代理查找目标单元可以帮助其他代理将它们发现的路径连接到以目标单元结束的路径。提出的最短路径算法不仅考虑了坐标距离的代价,而且考虑了遍历路径所需的转弯次数和移动次数。将最短路径算法与各种可用的迷宫求解算法进行了比较,包括Flood-Fill、Modified Flood-Fill和ALCKEF。所提出的算法也可以用作附加层,以增强第二次和后续运行时的可用方法。
{"title":"Design and Implementation of a Novel Weighted Shortest Path Algorithm for Maze Solving Robots","authors":"Behnam Rahnama, Makbule Canan Ozdemir, Y. Kiran, Atilla Elçi","doi":"10.1109/COMPSACW.2013.49","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.49","url":null,"abstract":"This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover it. Each agent solves a part of the maze and updates the shared memory so that other robots also benefit from each other's' discovery. Finding of the destination cell by an agent helps others to interconnect their discovered paths to the one ending with the destination cell. The proposed shortest path algorithm considers the cost for not only coordinate distance but also number of turns and moves required to traverse the path. The Shortest Path algorithm is compared against various available maze solving algorithms including Flood-Fill, Modified Flood-Fill and ALCKEF. The presented algorithm can be used also as an additional layer to enhance the available methods at second and subsequent runs.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Three-Dimensional Approach to Evolving Software 演化软件的三维方法
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.92
S. Zheng, Hongji Yang
Computing paradigms are becoming ubiquitous and complex in computing tasks, as a computing environment is changing from one dimension to three dimensions to reflect computing tasks changing from scientific computing to ubiquitous computing. By the same principle, software evolution approach should also be a three-dimensional one. Hence a three-dimensional evolution approach is proposed by addressing the relationships among software functions, software qualities and software models. Experiments were carried out to prove the proposed concept, which projects a number of concluding remarks for this study.
随着计算环境从一维向三维的转变,以反映计算任务从科学计算向泛在计算的转变,计算范式在计算任务中变得泛在化和复杂化。根据同样的原则,软件进化方法也应该是三维的。在此基础上,提出了一种三维演化方法,解决了软件功能、软件质量和软件模型之间的关系。实验进行,以证明提出的概念,其中项目的一些结论性意见,为本研究。
{"title":"A Three-Dimensional Approach to Evolving Software","authors":"S. Zheng, Hongji Yang","doi":"10.1109/COMPSACW.2013.92","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.92","url":null,"abstract":"Computing paradigms are becoming ubiquitous and complex in computing tasks, as a computing environment is changing from one dimension to three dimensions to reflect computing tasks changing from scientific computing to ubiquitous computing. By the same principle, software evolution approach should also be a three-dimensional one. Hence a three-dimensional evolution approach is proposed by addressing the relationships among software functions, software qualities and software models. Experiments were carried out to prove the proposed concept, which projects a number of concluding remarks for this study.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128935841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Security and Domain Ontologies for Security Requirements Analysis 使用安全和领域本体进行安全需求分析
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.124
Amina Souag, C. Salinesi, I. Comyn-Wattiau, H. Mouratidis
Recent research has argued about the importance of considering security during Requirements Engineering (RE) stage. Literature also emphasizes the importance of using ontologies to facilitate requirements elicitation. Ontologies are known to be rich sources of knowledge, and, being structured and equipped with reasoning features, they form a powerful tool to handle requirements. We believe that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering (SRE) efficiently. Indeed, security ontologies only focus on technical and domain independent aspects of security. Therefore, one can hypothesize that domain knowledge is needed too. Our question is "how to combine the use of security ontologies and domain ontologies to guide requirements elicitation efficiently and effectively?" We propose a method that exploits both types of ontologies dynamically through a collection of heuristic production rules. We demonstrate that the combined use of security ontologies with domain ontologies to guide SR elicitation is more effective than just relying on security ontologies. This paper presents our method and reports a preliminary evaluation conducted through critical analysis by experts. The evaluation shows that the method provides a good balance between the genericity with respect to the ontologies (which do not need to be selected in advance), and the specificity of the elicited requirements with respect to the domain at hand.
最近的研究讨论了在需求工程(RE)阶段考虑安全性的重要性。文献还强调了使用本体论促进需求提取的重要性。众所周知,本体是丰富的知识来源,并且,通过结构化和配备推理功能,它们形成了处理需求的强大工具。我们认为安全是一个多方面的问题,单一的安全本体不足以有效地指导安全工程(SRE)。事实上,安全本体只关注安全的技术和领域无关的方面。因此,可以假设也需要领域知识。我们的问题是“如何结合安全本体论和领域本体论的使用,以高效和有效地指导需求提取?”我们提出了一种方法,通过一组启发式产生规则动态地利用这两种类型的本体。我们证明,结合使用安全本体和领域本体来指导SR激发比仅仅依赖安全本体更有效。本文介绍了我们的方法,并报告了通过专家批判性分析进行的初步评估。评估表明,该方法在本体的通用性(不需要提前选择)和引出的需求的特殊性之间提供了很好的平衡。
{"title":"Using Security and Domain Ontologies for Security Requirements Analysis","authors":"Amina Souag, C. Salinesi, I. Comyn-Wattiau, H. Mouratidis","doi":"10.1109/COMPSACW.2013.124","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.124","url":null,"abstract":"Recent research has argued about the importance of considering security during Requirements Engineering (RE) stage. Literature also emphasizes the importance of using ontologies to facilitate requirements elicitation. Ontologies are known to be rich sources of knowledge, and, being structured and equipped with reasoning features, they form a powerful tool to handle requirements. We believe that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering (SRE) efficiently. Indeed, security ontologies only focus on technical and domain independent aspects of security. Therefore, one can hypothesize that domain knowledge is needed too. Our question is \"how to combine the use of security ontologies and domain ontologies to guide requirements elicitation efficiently and effectively?\" We propose a method that exploits both types of ontologies dynamically through a collection of heuristic production rules. We demonstrate that the combined use of security ontologies with domain ontologies to guide SR elicitation is more effective than just relying on security ontologies. This paper presents our method and reports a preliminary evaluation conducted through critical analysis by experts. The evaluation shows that the method provides a good balance between the genericity with respect to the ontologies (which do not need to be selected in advance), and the specificity of the elicited requirements with respect to the domain at hand.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132441459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Packet Classification Using Multi-iteration RFC 基于多迭代RFC的包分类
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.87
Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang
Packet Classification is an enabling technique for the future Internet by classifying incoming packets into forwarding classes to fulfill different service requirements. It is necessary for IP routers to provide network security and differentiated services. Recursive Flow Classification (RFC) is a notable high-speed scheme for packet classification. However, it may incur high memory consumption in generating the pre-computed cross-product tables. In this paper, we propose a new scheme to reduce the memory consumption by partitioning a rule database into several subsets. The rules of each subset are stored in an independent RFC data structure to significantly alleviate overall memory consumption. We also present several refinements for these RFC data structures to significantly improve the search speed. The experimental results show that our scheme dramatically improves the storage performance of RFC.
报文分类是一种面向未来互联网的技术,它将进入的报文分为转发类,以满足不同的业务需求。IP路由器需要提供网络安全和差异化服务。递归流分类(RFC)是一种值得关注的高速分组分类方案。但是,在生成预先计算的交叉积表时可能会消耗大量内存。本文提出了一种通过将规则数据库划分为多个子集来减少内存消耗的新方案。每个子集的规则存储在一个独立的RFC数据结构中,以显著减少总体内存消耗。我们还对这些RFC数据结构进行了一些改进,以显著提高搜索速度。实验结果表明,该方案显著提高了RFC的存储性能。
{"title":"Packet Classification Using Multi-iteration RFC","authors":"Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang","doi":"10.1109/COMPSACW.2013.87","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.87","url":null,"abstract":"Packet Classification is an enabling technique for the future Internet by classifying incoming packets into forwarding classes to fulfill different service requirements. It is necessary for IP routers to provide network security and differentiated services. Recursive Flow Classification (RFC) is a notable high-speed scheme for packet classification. However, it may incur high memory consumption in generating the pre-computed cross-product tables. In this paper, we propose a new scheme to reduce the memory consumption by partitioning a rule database into several subsets. The rules of each subset are stored in an independent RFC data structure to significantly alleviate overall memory consumption. We also present several refinements for these RFC data structures to significantly improve the search speed. The experimental results show that our scheme dramatically improves the storage performance of RFC.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133348947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UBI-Tree: Indexing Method for Schema-Less Search UBI-Tree:无模式搜索的索引方法
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.58
Yutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Hajime Matsumura
We propose an indexing method called UBI-Tree for improving the efficiency of a new type of data search called schema-less search. Schema-less search is a multi-dimensional range search from a wide variety of data, such as sensor data, collected through participatory sensing. Such data have different types and number of dimensions because a participant uses various devices. Therefore, applications must search for their target data within the sensor data in a cross-schema manner. UBI-Tree is a tree-structured index based on R-Tree. The insert algorithm classifies various data into nodes according to newly introduced scores to estimate the inefficiency of classification. The score can uniformly represent the difference in the types of dimensions between data as well as the difference in dimension values. By classifying data that have a similar dimension set into the same node, UBI-Tree suppresses the curse of dimensionality and makes schema-less searches efficient. The validity of UBI-Tree was evaluated through experiments.
我们提出了一种称为UBI-Tree的索引方法,以提高一种称为无模式搜索的新型数据搜索的效率。无模式搜索是对通过参与式感知收集的各种数据(如传感器数据)进行多维范围搜索。由于参与者使用不同的设备,这些数据具有不同的类型和维度数量。因此,应用程序必须以跨模式的方式在传感器数据中搜索它们的目标数据。UBI-Tree是基于R-Tree的树结构索引。插入算法根据新引入的分数将各种数据分类到节点中,以估计分类的低效率。分数可以统一地表示数据之间维度类型的差异以及维度值的差异。通过将具有相似维度集的数据分类到同一节点,UBI-Tree抑制了维度的诅咒,并使无模式搜索变得高效。通过实验对UBI-Tree的有效性进行了评价。
{"title":"UBI-Tree: Indexing Method for Schema-Less Search","authors":"Yutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Hajime Matsumura","doi":"10.1109/COMPSACW.2013.58","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.58","url":null,"abstract":"We propose an indexing method called UBI-Tree for improving the efficiency of a new type of data search called schema-less search. Schema-less search is a multi-dimensional range search from a wide variety of data, such as sensor data, collected through participatory sensing. Such data have different types and number of dimensions because a participant uses various devices. Therefore, applications must search for their target data within the sensor data in a cross-schema manner. UBI-Tree is a tree-structured index based on R-Tree. The insert algorithm classifies various data into nodes according to newly introduced scores to estimate the inefficiency of classification. The score can uniformly represent the difference in the types of dimensions between data as well as the difference in dimension values. By classifying data that have a similar dimension set into the same node, UBI-Tree suppresses the curse of dimensionality and makes schema-less searches efficient. The validity of UBI-Tree was evaluated through experiments.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128945836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Forecasting Reading Anxiety to Promote Reading Performance Based on Annotation Behavior 基于标注行为的阅读焦虑预测促进阅读成绩
Pub Date : 2013-07-22 DOI: 10.1109/COMPSACW.2013.132
Tingda Lu, Mi Lin, Chih-Ming Chen, Jhih-Hao Wu
To reduce effectively the reading anxiety of learners while reading English articles, a C4.5 decision tree, a widely used data mining technique, was used to develop a personalized reading anxiety prediction model (PRAPM) based on individual learners' reading annotation behavior in a collaborative digital reading annotation system. In addition to forecasting immediately the reading anxiety levels of learners, the proposed PRAPM can be used to identify the key factors that cause reading anxiety based on the fired prediction rules determined by the developed decision tree. By understanding these key factors that cause reading anxiety, instructors can apply reading strategies to reduce reading anxiety, thus promoting English-language reading performance. To assess whether the proposed PRAPM can assist instructors in reducing the reading anxiety of learners, this study applies the quasi-experimental method to compare the learning performance of three learning groups, which are supported by a collaborative digital reading annotation system with different learning mechanisms to reduce reading anxiety. The control group, experimental group A and experimental group B conducted the same English reading activity. However, each group was given a collaborative digital reading annotation system with individual annotations, cooperative annotations, and cooperative annotation with the instructor's support to reduce reading anxiety by proposed PRAPM. Experimental results indicate that the average correct prediction rate of the proposed PRAPM in identifying the reading anxiety levels of learners was as high as 70%. The online instructor who applied reading assistive strategies based on the mining factors that affect reading anxiety from the proposed PRAPM can significantly reduce the reading anxiety of male learners in the experimental group B, showing that gender difference existed, and the online instructor's interaction with the male learners of the experimental group B indeed helped reduce the reading anxiety.
为了有效降低学习者在阅读英语文章时的阅读焦虑,在协作式数字阅读标注系统中,采用C4.5决策树这一广泛应用的数据挖掘技术,基于学习者个人的阅读标注行为,建立了个性化的阅读焦虑预测模型(PRAPM)。本文提出的PRAPM除了可以直接预测学习者的阅读焦虑水平外,还可以根据所开发的决策树确定的预测规则来识别导致阅读焦虑的关键因素。通过了解这些导致阅读焦虑的关键因素,教师可以运用阅读策略来减少阅读焦虑,从而提高英语阅读成绩。为了评估PRAPM是否能够帮助教师减少学习者的阅读焦虑,本研究采用准实验方法,比较了在不同学习机制的协作式数字阅读注释系统支持下的三个学习小组的学习表现。对照组、实验A组和实验B组进行相同的英语阅读活动。然而,每个小组都获得了一个协作式数字阅读注释系统,该系统包括个人注释、合作注释和导师支持的合作注释,以通过提出的PRAPM减少阅读焦虑。实验结果表明,所提出的PRAPM识别学习者阅读焦虑水平的平均正确率高达70%。采用基于PRAPM中影响阅读焦虑因素挖掘的阅读辅助策略的在线教师可以显著降低实验组B男性学习者的阅读焦虑,表明存在性别差异,并且在线教师与实验组B男性学习者的互动确实有助于降低阅读焦虑。
{"title":"Forecasting Reading Anxiety to Promote Reading Performance Based on Annotation Behavior","authors":"Tingda Lu, Mi Lin, Chih-Ming Chen, Jhih-Hao Wu","doi":"10.1109/COMPSACW.2013.132","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.132","url":null,"abstract":"To reduce effectively the reading anxiety of learners while reading English articles, a C4.5 decision tree, a widely used data mining technique, was used to develop a personalized reading anxiety prediction model (PRAPM) based on individual learners' reading annotation behavior in a collaborative digital reading annotation system. In addition to forecasting immediately the reading anxiety levels of learners, the proposed PRAPM can be used to identify the key factors that cause reading anxiety based on the fired prediction rules determined by the developed decision tree. By understanding these key factors that cause reading anxiety, instructors can apply reading strategies to reduce reading anxiety, thus promoting English-language reading performance. To assess whether the proposed PRAPM can assist instructors in reducing the reading anxiety of learners, this study applies the quasi-experimental method to compare the learning performance of three learning groups, which are supported by a collaborative digital reading annotation system with different learning mechanisms to reduce reading anxiety. The control group, experimental group A and experimental group B conducted the same English reading activity. However, each group was given a collaborative digital reading annotation system with individual annotations, cooperative annotations, and cooperative annotation with the instructor's support to reduce reading anxiety by proposed PRAPM. Experimental results indicate that the average correct prediction rate of the proposed PRAPM in identifying the reading anxiety levels of learners was as high as 70%. The online instructor who applied reading assistive strategies based on the mining factors that affect reading anxiety from the proposed PRAPM can significantly reduce the reading anxiety of male learners in the experimental group B, showing that gender difference existed, and the online instructor's interaction with the male learners of the experimental group B indeed helped reduce the reading anxiety.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117292195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1