首页 > 最新文献

Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003最新文献

英文 中文
A multi-agent software engineering environment for testing Web-based applications 用于测试基于web的应用程序的多代理软件工程环境
Qingning Huo, Hong Zhu, S. Greenwood
This paper presents an agent-based software environment for testing Web-based applications. The infrastructure of the system consists of a light weight agent platform that supports agent communication, an ontology of software testing that enables flexible integration of multiple agents, and a formalism using XML to represent both the basic and compound concepts of the ontology. Relations between testing concepts are defined and their properties are analysed. A number of agents are implemented to perform various tasks in testing Web-based applications. Broker agents use the ontology as a means of inferences to manage the knowledge about agents and assign each task to the most appropriate agent.
本文提出了一个基于代理的软件环境,用于测试基于web的应用程序。系统的基础设施包括支持代理通信的轻量级代理平台、支持灵活集成多个代理的软件测试本体和使用XML表示本体的基本概念和复合概念的形式化体系。定义了测试概念之间的关系,分析了测试概念的性质。实现了许多代理来执行测试基于web的应用程序中的各种任务。代理代理使用本体作为一种推理手段来管理关于代理的知识,并将每个任务分配给最合适的代理。
{"title":"A multi-agent software engineering environment for testing Web-based applications","authors":"Qingning Huo, Hong Zhu, S. Greenwood","doi":"10.1109/CMPSAC.2003.1245343","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245343","url":null,"abstract":"This paper presents an agent-based software environment for testing Web-based applications. The infrastructure of the system consists of a light weight agent platform that supports agent communication, an ontology of software testing that enables flexible integration of multiple agents, and a formalism using XML to represent both the basic and compound concepts of the ontology. Relations between testing concepts are defined and their properties are analysed. A number of agents are implemented to perform various tasks in testing Web-based applications. Broker agents use the ontology as a means of inferences to manage the knowledge about agents and assign each task to the most appropriate agent.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Sensitivity analysis of software reliability for component-based software applications 基于组件的软件应用软件可靠性敏感性分析
J. Lo, Chin-Yu Huang, S. Kuo, Michael R. Lyu
The parameters in these software reliability models are usually directly obtained from the field failure data. Due to the dynamic properties of the system and the insufficiency of the failure data, the accurate values of the parameters are hard to determine. Therefore, the sensitivity analysis is often used in this stage to deal with this problem. Sensitivity analysis provides a way to analyzing the impact of the different parameters. In order to assess the reliability of a component-based software, we propose a new approach to analyzing the reliability of the system, based on the reliabilities of the individual components and the architecture of the system. Furthermore, we present the sensitivity analysis on the reliability of a component-based software in order to determine which of the components affects the reliability of the system most. Finally, three general examples are evaluated to validate and show the effectiveness of the proposed approach.
这些软件可靠性模型中的参数通常直接从现场故障数据中获取。由于系统的动态性和故障数据的不足,难以确定参数的准确值。因此,在这一阶段往往采用敏感性分析来处理这一问题。灵敏度分析为分析不同参数的影响提供了一种方法。为了评估基于组件的软件的可靠性,我们提出了一种基于单个组件和系统体系结构的可靠性分析系统可靠性的新方法。此外,我们提出了基于组件的软件可靠性的敏感性分析,以确定哪些组件对系统的可靠性影响最大。最后,通过三个典型的算例验证了所提方法的有效性。
{"title":"Sensitivity analysis of software reliability for component-based software applications","authors":"J. Lo, Chin-Yu Huang, S. Kuo, Michael R. Lyu","doi":"10.1109/CMPSAC.2003.1245386","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245386","url":null,"abstract":"The parameters in these software reliability models are usually directly obtained from the field failure data. Due to the dynamic properties of the system and the insufficiency of the failure data, the accurate values of the parameters are hard to determine. Therefore, the sensitivity analysis is often used in this stage to deal with this problem. Sensitivity analysis provides a way to analyzing the impact of the different parameters. In order to assess the reliability of a component-based software, we propose a new approach to analyzing the reliability of the system, based on the reliabilities of the individual components and the architecture of the system. Furthermore, we present the sensitivity analysis on the reliability of a component-based software in order to determine which of the components affects the reliability of the system most. Finally, three general examples are evaluated to validate and show the effectiveness of the proposed approach.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130773011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A protection environment for administrators of Windows 2000/XP against malicious program attacks 为Windows 2000/XP系统管理员提供的保护环境,防止恶意程序的攻击
Adrian Spalka, M. Winandy
Malicious program attacks pose a serious threat to operating systems. If an operator can be tricked into running such a program its abilities to manipulate a system are unlimited. This work, which addresses Windows 2000/XP, is a part of our effort of creating a protected execution environment for applications with high security demands. We analyse attacks by malicious programs that manipulate systems components during their installation by an administrator. It turns out that most of these manipulations are likely to remain unnoticed by the human user. However, we show that the operating system's protection mechanisms can be used to prevent or detect all manipulations that can endanger our protected environment. We combine these mechanisms in a restricted shell, which the administrator should use for the execution of possibly untrustworthy programs.
恶意程序攻击对操作系统构成严重威胁。如果操作员可以被骗去运行这样一个程序,那么它操纵系统的能力是无限的。这项针对Windows 2000/XP的工作是我们为具有高安全性要求的应用程序创建受保护的执行环境所做努力的一部分。我们分析恶意程序的攻击,这些程序在管理员安装系统组件期间操纵系统组件。事实证明,大多数这些操作很可能不会被人类用户注意到。然而,我们展示了操作系统的保护机制可以用来防止或检测所有可能危及我们受保护环境的操作。我们将这些机制组合在一个受限制的shell中,管理员应该使用它来执行可能不可信的程序。
{"title":"A protection environment for administrators of Windows 2000/XP against malicious program attacks","authors":"Adrian Spalka, M. Winandy","doi":"10.1109/CMPSAC.2003.1245336","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245336","url":null,"abstract":"Malicious program attacks pose a serious threat to operating systems. If an operator can be tricked into running such a program its abilities to manipulate a system are unlimited. This work, which addresses Windows 2000/XP, is a part of our effort of creating a protected execution environment for applications with high security demands. We analyse attacks by malicious programs that manipulate systems components during their installation by an administrator. It turns out that most of these manipulations are likely to remain unnoticed by the human user. However, we show that the operating system's protection mechanisms can be used to prevent or detect all manipulations that can endanger our protected environment. We combine these mechanisms in a restricted shell, which the administrator should use for the execution of possibly untrustworthy programs.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart debugging software architectural design in SDL SDL中的智能调试软件体系结构设计
W. E. Wong, T. Sugeta, Yu Qi, J. Maldonado
Statistical data show that it is much less expensive to correct software bugs at the early design stage rather than the late stage of the development process when the final system has already been implemented and integrated together. The use of slicing and execution histories as an aid in software debugging is well established for programming languages like C and C++; however, it is rarely applied in the field of software design specification. We propose a solution by applying the source code level technologies to debugging software designs represented in a high-level specification and description language such as SDL. More specifically, we extend execution slice-based heuristics from source code-based debugging to the software design specification level. Suspicious locations in an SDL specification are prioritized by their likelihood of containing faults. Locations with a higher priority should be examined first rather than those with a lower priority as the former are more likely to contain the faults. A debugging tool, SmartD/sub DSL/, with user-friendly interfaces was developed to support our method. An illustration is provided to demonstrate the feasibility of using our method to effectively debug an architectural design.
统计数据表明,在早期设计阶段纠正软件错误比在开发过程的后期,当最终系统已经实现并集成在一起时,要便宜得多。使用切片和执行历史作为软件调试的辅助,在C和c++等编程语言中已经很好地建立了;然而,它在软件设计规范领域的应用却很少。我们提出了一种解决方案,将源代码级技术应用于调试用高级规范和描述语言(如SDL)表示的软件设计。更具体地说,我们将基于执行片的启发式方法从基于源代码的调试扩展到软件设计规范级别。SDL规范中的可疑位置根据其包含错误的可能性来确定优先级。应该首先检查优先级较高的位置,而不是优先级较低的位置,因为前者更有可能包含故障。开发了具有用户友好界面的调试工具SmartD/sub DSL/来支持我们的方法。通过一个实例说明了使用我们的方法对架构设计进行有效调试的可行性。
{"title":"Smart debugging software architectural design in SDL","authors":"W. E. Wong, T. Sugeta, Yu Qi, J. Maldonado","doi":"10.1109/CMPSAC.2003.1245320","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245320","url":null,"abstract":"Statistical data show that it is much less expensive to correct software bugs at the early design stage rather than the late stage of the development process when the final system has already been implemented and integrated together. The use of slicing and execution histories as an aid in software debugging is well established for programming languages like C and C++; however, it is rarely applied in the field of software design specification. We propose a solution by applying the source code level technologies to debugging software designs represented in a high-level specification and description language such as SDL. More specifically, we extend execution slice-based heuristics from source code-based debugging to the software design specification level. Suspicious locations in an SDL specification are prioritized by their likelihood of containing faults. Locations with a higher priority should be examined first rather than those with a lower priority as the former are more likely to contain the faults. A debugging tool, SmartD/sub DSL/, with user-friendly interfaces was developed to support our method. An illustration is provided to demonstrate the feasibility of using our method to effectively debug an architectural design.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114835008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A variable strength interaction testing of components 一种变强度构件相互作用试验
M. B. Cohen, P. B. Gibbons, W. Mugridge, C. Colbourn, J. Collofello
Complete interaction testing of components is too costly in all but the smallest systems. Yet component interactions are likely to cause unexpected faults. Recently, design of experiment techniques have been applied to software testing to guarantee a minimum coverage of all t-way interactions across components. However, t is always fixed. This paper examines the need to vary the size of t in an individual test suite and defines a new object, the variable strength covering array that has this property. We present some computational methods to find variable strength arrays and provide initial bounds for a group of these objects.
除了最小的系统之外,所有组件的完整交互测试都过于昂贵。然而,组件交互很可能会导致意想不到的错误。最近,实验技术的设计已被应用于软件测试,以保证组件之间所有t-way交互的最小覆盖。然而,t总是固定的。本文研究了在单个测试套件中改变t大小的需要,并定义了一个新对象,即具有此属性的可变强度覆盖数组。我们提出了一些计算方法来寻找可变强度数组,并为一组这些对象提供初始边界。
{"title":"A variable strength interaction testing of components","authors":"M. B. Cohen, P. B. Gibbons, W. Mugridge, C. Colbourn, J. Collofello","doi":"10.1109/CMPSAC.2003.1245373","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245373","url":null,"abstract":"Complete interaction testing of components is too costly in all but the smallest systems. Yet component interactions are likely to cause unexpected faults. Recently, design of experiment techniques have been applied to software testing to guarantee a minimum coverage of all t-way interactions across components. However, t is always fixed. This paper examines the need to vary the size of t in an individual test suite and defines a new object, the variable strength covering array that has this property. We present some computational methods to find variable strength arrays and provide initial bounds for a group of these objects.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128254141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 126
VDM over PSP: a pilot course for VDM beginners to confirm its suitability for their development VDM在PSP:一个试点课程的VDM初学者,以确认其适合他们的发展
Hisayuki Suzumori, H. Kaiya, K. Kaijiri
Although formal methods seem to be useful, there is no clear way for beginners to know whether the methods are suitable for them and for their problem domain, before using the methods in practice. We propose a method to confirm the suitability of a formal method. The method is realized as a pilot course based on the PSP. A course mentioned in this paper is designed for a typical formal method, VDM. Our course also helps beginners of VDM to learn VDM gradually and naturally. During the course, they can confirm its suitability as follows; first, they practice several exercises for software development, while techniques of VDM are introduced gradually. Second, process data and product data of software development are recorded in each exercise. Third, by evaluating these data by several metrics, they can confirm the suitability of VDM for their work.
虽然形式化方法似乎很有用,但是初学者在实际使用这些方法之前,并没有明确的方法来知道这些方法是否适合他们和他们的问题领域。我们提出了一种方法来确认形式化方法的适用性。该方法作为一个基于PSP的试点课程来实现。本文所提到的课程是针对典型的形式化方法VDM而设计的。我们的课程也帮助VDM初学者逐步自然地学习VDM。在课程中,他们可以确认其适用性如下:首先,他们进行了一些软件开发的练习,并逐步介绍了VDM的技术。其次,在每个练习中记录软件开发的过程数据和产品数据。第三,通过几个指标评估这些数据,他们可以确认VDM对他们工作的适用性。
{"title":"VDM over PSP: a pilot course for VDM beginners to confirm its suitability for their development","authors":"Hisayuki Suzumori, H. Kaiya, K. Kaijiri","doi":"10.1109/CMPSAC.2003.1245361","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245361","url":null,"abstract":"Although formal methods seem to be useful, there is no clear way for beginners to know whether the methods are suitable for them and for their problem domain, before using the methods in practice. We propose a method to confirm the suitability of a formal method. The method is realized as a pilot course based on the PSP. A course mentioned in this paper is designed for a typical formal method, VDM. Our course also helps beginners of VDM to learn VDM gradually and naturally. During the course, they can confirm its suitability as follows; first, they practice several exercises for software development, while techniques of VDM are introduced gradually. Second, process data and product data of software development are recorded in each exercise. Third, by evaluating these data by several metrics, they can confirm the suitability of VDM for their work.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134406858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information quality assessment of a yellow-pages location-based service 黄页定位服务的信息质量评估
A. Katasonov, Markku Sakkinen
The main problems in assessing the information quality of a particular kind of location-based service are described. Verifying the conformance of query results to the real world is identified as the most expensive problem. An approach from database quality assessment is adapted, by combining it with conventional software reliability testing, so that the verification can be replaced with two significantly easier test obligations. The resulting procedure should achieve a good compromise between the confidence level of the results and the testing effort. The approach seems also applicable to a broader range of systems.
描述了评估特定类型的基于位置的服务的信息质量的主要问题。验证查询结果与现实世界的一致性被认为是最昂贵的问题。通过将数据库质量评估与传统的软件可靠性测试相结合,采用了数据库质量评估的方法,这样验证就可以用两个明显更容易的测试义务来代替。由此产生的程序应该在结果的置信度和测试工作之间达到一个很好的折衷。这种方法似乎也适用于更广泛的系统。
{"title":"Information quality assessment of a yellow-pages location-based service","authors":"A. Katasonov, Markku Sakkinen","doi":"10.1109/CMPSAC.2003.1245360","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245360","url":null,"abstract":"The main problems in assessing the information quality of a particular kind of location-based service are described. Verifying the conformance of query results to the real world is identified as the most expensive problem. An approach from database quality assessment is adapted, by combining it with conventional software reliability testing, so that the verification can be replaced with two significantly easier test obligations. The resulting procedure should achieve a good compromise between the confidence level of the results and the testing effort. The approach seems also applicable to a broader range of systems.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134410961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Next generation application integration: challenges and new approaches 下一代应用程序集成:挑战和新方法
I. Gorton, D. Thurman, Judi R. Thomson
Integrating multiple heterogeneous data sources into applications is a time-consuming, costly and error-prone engineering task. Relatively mature technologies exist that make integration tractable from an engineering perspective. These technologies, however, have many limitations, and hence present opportunities for breakthrough research. This paper briefly describes some of these limitations, and enumerates a subset of the general open research problems. It then describes the Data Concierge research project and prototype that is attempting to provide solutions to some of these problems.
将多个异构数据源集成到应用程序中是一项耗时、昂贵且容易出错的工程任务。从工程的角度来看,相对成熟的技术使集成易于处理。然而,这些技术有许多局限性,因此为突破性研究提供了机会。本文简要描述了其中的一些限制,并列举了一般开放研究问题的一个子集。然后介绍了Data Concierge研究项目和原型,该项目试图为其中一些问题提供解决方案。
{"title":"Next generation application integration: challenges and new approaches","authors":"I. Gorton, D. Thurman, Judi R. Thomson","doi":"10.1109/CMPSAC.2003.1245398","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245398","url":null,"abstract":"Integrating multiple heterogeneous data sources into applications is a time-consuming, costly and error-prone engineering task. Relatively mature technologies exist that make integration tractable from an engineering perspective. These technologies, however, have many limitations, and hence present opportunities for breakthrough research. This paper briefly describes some of these limitations, and enumerates a subset of the general open research problems. It then describes the Data Concierge research project and prototype that is attempting to provide solutions to some of these problems.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Intelligent Web topics search using early detection and data analysis 使用早期检测和数据分析的智能Web主题搜索
Ching-Cheng Lee, Yixin Yang
Topic-specific search engines that offer users relevant topics as search results have recently been developed. However, these topic-specific search engines require intensive human efforts to build and maintain. In addition, they visit many irrelevant pages. In our project, we propose a new approach for Web topics search. First, we do early detection for "candidate topics" while extracting words from the HTML text. Secondly, we perform data analysis on the appearance information such as appearance times and places for candidate topics. By these two techniques, we can reduce candidate topics' crawling times and computing cost. Analysis of the results and the comparisons with related research will be made to demonstrate the effectiveness of our approach.
最近开发了特定于主题的搜索引擎,为用户提供相关主题作为搜索结果。然而,这些特定于主题的搜索引擎需要大量的人力来构建和维护。此外,他们访问了许多不相关的页面。在我们的项目中,我们提出了一种新的Web主题搜索方法。首先,我们在从HTML文本中提取单词时对“候选主题”进行早期检测。其次,对候选话题的出现时间、地点等出现信息进行数据分析。通过这两种技术,我们可以减少候选主题的爬行时间和计算成本。本文将对结果进行分析,并与相关研究进行比较,以证明本文方法的有效性。
{"title":"Intelligent Web topics search using early detection and data analysis","authors":"Ching-Cheng Lee, Yixin Yang","doi":"10.1109/CMPSAC.2003.1245399","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245399","url":null,"abstract":"Topic-specific search engines that offer users relevant topics as search results have recently been developed. However, these topic-specific search engines require intensive human efforts to build and maintain. In addition, they visit many irrelevant pages. In our project, we propose a new approach for Web topics search. First, we do early detection for \"candidate topics\" while extracting words from the HTML text. Secondly, we perform data analysis on the appearance information such as appearance times and places for candidate topics. By these two techniques, we can reduce candidate topics' crawling times and computing cost. Analysis of the results and the comparisons with related research will be made to demonstrate the effectiveness of our approach.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Testing the suitability of Markov chains as Web usage models 测试马尔可夫链作为Web使用模型的适用性
Zhao Li, J. Tian
Markov chains have been used to model Web usages and served as the basis for statistical testing, performance evaluation, and reliability analysis. However, most of such applications of Markov chains were carried out without answering the question: "Can Web usage be accurately modeled by Markov chains?" In this paper, we propose a set of tests, which are easy to perform based on information about Web link usage frequencies gathered from Web server logs, to answer this question. We applied this approach to our university's Web site, and our results indicate that Markov chains can provide fairly accurate models of Web usages.
马尔可夫链已被用于为Web使用建模,并作为统计测试、性能评估和可靠性分析的基础。然而,大多数马尔可夫链的应用都没有回答这个问题:“Web使用可以通过马尔可夫链精确地建模吗?”在本文中,我们提出了一组易于执行的测试,这些测试基于从Web服务器日志中收集的有关Web链接使用频率的信息来回答这个问题。我们将这种方法应用于我们大学的Web站点,结果表明马尔可夫链可以提供相当准确的Web使用模型。
{"title":"Testing the suitability of Markov chains as Web usage models","authors":"Zhao Li, J. Tian","doi":"10.1109/CMPSAC.2003.1245365","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245365","url":null,"abstract":"Markov chains have been used to model Web usages and served as the basis for statistical testing, performance evaluation, and reliability analysis. However, most of such applications of Markov chains were carried out without answering the question: \"Can Web usage be accurately modeled by Markov chains?\" In this paper, we propose a set of tests, which are easy to perform based on information about Web link usage frequencies gathered from Web server logs, to answer this question. We applied this approach to our university's Web site, and our results indicate that Markov chains can provide fairly accurate models of Web usages.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125489067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
期刊
Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1