首页 > 最新文献

Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)最新文献

英文 中文
Reuse-based Methodology in Developing System-on-Chip (SoC) 基于重用的片上系统开发方法
Soo-Ho Chang, Soo Dong Kim
System-on-chip (SoC) plays a key role in building various embedded systems. With the advance of SoC technology, the complexity of SoC is sharply increasing. In addition, there is a great industry demand on technologies for producing reusable SoC components. However, conventional SoC approaches focus largely on designing the lower-level details of SoC at hardware level without going through model-level engineering. They also do not address the reusability issues of SoC. In this paper, we propose a solution framework for producing reusable SoC in a cost-effective way by adopting model-level engineering such as domain analysis, variability analysis, and component design. We first identify the three dimensions of reusing SoC, and analyze eight different cases of reusing SoC. Then, we present software engineering techniques that can be effectively utilized in developing reusing SoC. Finally, we define a methodology for a most demanding case. The key contribution of our research lies on three folds; identifying dimensions and feasible cases of reusing SoC, identifying effective software engineering techniques for developing reusable SoC, and defining a reuse-focused methodology of SoC
片上系统(SoC)在构建各种嵌入式系统中起着关键作用。随着SoC技术的发展,SoC的复杂性急剧增加。此外,对生产可重复使用SoC组件的技术有很大的行业需求。然而,传统的SoC方法主要集中在硬件级设计SoC的底层细节,而没有经过模型级工程。它们也没有解决SoC的可重用性问题。在本文中,我们提出了一个解决方案框架,通过采用模型级工程,如领域分析、可变性分析和组件设计,以经济有效的方式生产可重用的SoC。本文首先确定了SoC重用的三个维度,并分析了8种不同的SoC重用案例。然后,我们提出了可以有效地用于开发重用SoC的软件工程技术。最后,我们为最苛刻的情况定义了一种方法。我们研究的主要贡献在于三个方面;识别可重用SoC的维度和可行案例,识别开发可重用SoC的有效软件工程技术,并定义以重用为中心的SoC方法
{"title":"Reuse-based Methodology in Developing System-on-Chip (SoC)","authors":"Soo-Ho Chang, Soo Dong Kim","doi":"10.1109/SERA.2006.59","DOIUrl":"https://doi.org/10.1109/SERA.2006.59","url":null,"abstract":"System-on-chip (SoC) plays a key role in building various embedded systems. With the advance of SoC technology, the complexity of SoC is sharply increasing. In addition, there is a great industry demand on technologies for producing reusable SoC components. However, conventional SoC approaches focus largely on designing the lower-level details of SoC at hardware level without going through model-level engineering. They also do not address the reusability issues of SoC. In this paper, we propose a solution framework for producing reusable SoC in a cost-effective way by adopting model-level engineering such as domain analysis, variability analysis, and component design. We first identify the three dimensions of reusing SoC, and analyze eight different cases of reusing SoC. Then, we present software engineering techniques that can be effectively utilized in developing reusing SoC. Finally, we define a methodology for a most demanding case. The key contribution of our research lies on three folds; identifying dimensions and feasible cases of reusing SoC, identifying effective software engineering techniques for developing reusable SoC, and defining a reuse-focused methodology of SoC","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125272244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Comparison of Five Black-box Testing Methods for Object-Oriented Software 面向对象软件五种黑盒测试方法的比较
Kwang-Ik Seo, Eun-Man Choi
As the size of software is getting huge, it is difficult for testers to check out all parts of source code in white-box style during integration testing or system testing period. Therefore functional test methods based on requirements information are frequently used in system level test. There have been a lot of test methods based on requirement specification. Each method has a different approach to specify software requirements. Test engineer should consider those various aspects of approaches and select proper black-box testing method to be applied. This paper presents the empirical comparison of major black-box testing methods and shows the different results by applying them to test a certain software system. The result shows that black-box testing methods check different levels of code construct. Test planer should consider the combination for the efficient test methods which combine extended use case test method and OCL test method
随着软件规模的日益庞大,在集成测试或系统测试阶段,测试人员很难以白盒的方式检出源代码的所有部分。因此,基于需求信息的功能测试方法在系统级测试中被频繁使用。有很多基于需求规范的测试方法。每种方法都有不同的方法来指定软件需求。测试工程师应该考虑这些方法的各个方面,并选择合适的黑盒测试方法。本文对主要的黑盒测试方法进行了实证比较,并通过对某软件系统的测试,给出了不同的测试结果。结果表明,黑盒测试方法可以检查不同层次的代码结构。测试规划者应该考虑将扩展用例测试方法和OCL测试方法相结合的高效测试方法
{"title":"Comparison of Five Black-box Testing Methods for Object-Oriented Software","authors":"Kwang-Ik Seo, Eun-Man Choi","doi":"10.1109/SERA.2006.22","DOIUrl":"https://doi.org/10.1109/SERA.2006.22","url":null,"abstract":"As the size of software is getting huge, it is difficult for testers to check out all parts of source code in white-box style during integration testing or system testing period. Therefore functional test methods based on requirements information are frequently used in system level test. There have been a lot of test methods based on requirement specification. Each method has a different approach to specify software requirements. Test engineer should consider those various aspects of approaches and select proper black-box testing method to be applied. This paper presents the empirical comparison of major black-box testing methods and shows the different results by applying them to test a certain software system. The result shows that black-box testing methods check different levels of code construct. Test planer should consider the combination for the efficient test methods which combine extended use case test method and OCL test method","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Studies on Project Management Models for Embedded Software Development Projects 嵌入式软件开发项目管理模型研究
Toyoshiro Nakashima, K. Iwata, Yoshiyuki Anan, N. Ishii
In a corporation or the division of a corporation where software is being developed, it is becoming very important to develop software efficiently while guaranteeing the quality, limiting the cost, and maintaining the development schedule. Therefore, the corporation and the division of the corporation that develop software are implementing various improvement methods, including process improvement. In this study we have analyzed data from a software development project and studied how to determine which software development project will fail because it takes more manpower that originally estimated. In addition, we have implemented project-management support tools by combining the project-monitoring and managing tools that are already in use. We have also developed a new model that uses the statistical method, by reviewing the tools that are already used to estimate manpower for new projects
在开发软件的公司或公司部门中,在保证质量、限制成本和保持开发进度的同时高效地开发软件变得非常重要。因此,公司和开发软件的公司部门正在实施各种改进方法,包括过程改进。在这项研究中,我们分析了来自软件开发项目的数据,并研究了如何确定哪个软件开发项目将失败,因为它需要比最初估计的更多的人力。此外,我们已经通过结合已经在使用的项目监控和管理工具实现了项目管理支持工具。我们也发展了一个使用统计方法的新模型,通过回顾已经用于估计新项目人力的工具
{"title":"Studies on Project Management Models for Embedded Software Development Projects","authors":"Toyoshiro Nakashima, K. Iwata, Yoshiyuki Anan, N. Ishii","doi":"10.1109/SERA.2006.64","DOIUrl":"https://doi.org/10.1109/SERA.2006.64","url":null,"abstract":"In a corporation or the division of a corporation where software is being developed, it is becoming very important to develop software efficiently while guaranteeing the quality, limiting the cost, and maintaining the development schedule. Therefore, the corporation and the division of the corporation that develop software are implementing various improvement methods, including process improvement. In this study we have analyzed data from a software development project and studied how to determine which software development project will fail because it takes more manpower that originally estimated. In addition, we have implemented project-management support tools by combining the project-monitoring and managing tools that are already in use. We have also developed a new model that uses the statistical method, by reviewing the tools that are already used to estimate manpower for new projects","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127023916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Active Intelligent Service Offer System Addition Environment variable and Local variable 主动智能服务提供系统增加环境变量和局部变量
Kyung-Sang Sung, H. Oh
It has been highlighted and spread that the cutting edge system and intelligence home system raised from dramatic development of IT technology. Through the progressed application of home networking tech. and diverse multi-media, there are plenty of efforts to pursue the realization of human convenience. As a home networking services is on the increase, so is the demand for context-aware services, utilizing a profile of users as well as various context information, a sensor, and other environmental information in order to recognize a pattern of users' activities. And more enhanced services that can analyze users' pattern of behaviors and reflect individual tendency in the service should be offered so that users can obtain the information they want much faster. Thus, an intellectual control model is discussed, which can offer active service based on a pattern of users' behaviors, in order to suggest a device that predicts users' activities and operates in a more intelligent way
随着It技术的迅猛发展而产生的尖端系统和智能家居系统已经得到了重视和传播。通过家庭网络技术和多样化多媒体的不断应用,人们努力追求实现人性化的便利。随着家庭网络服务的增加,对上下文感知服务的需求也在增加,利用用户的个人资料以及各种上下文信息、传感器和其他环境信息来识别用户活动的模式。并且应该提供更多的增强服务,可以分析用户的行为模式,反映服务中的个人倾向,让用户能够更快地获得他们想要的信息。因此,本文讨论了一种智能控制模型,该模型可以基于用户行为模式提供主动服务,从而提出一种能够预测用户活动并以更智能的方式运行的设备
{"title":"Active Intelligent Service Offer System Addition Environment variable and Local variable","authors":"Kyung-Sang Sung, H. Oh","doi":"10.1109/SERA.2006.9","DOIUrl":"https://doi.org/10.1109/SERA.2006.9","url":null,"abstract":"It has been highlighted and spread that the cutting edge system and intelligence home system raised from dramatic development of IT technology. Through the progressed application of home networking tech. and diverse multi-media, there are plenty of efforts to pursue the realization of human convenience. As a home networking services is on the increase, so is the demand for context-aware services, utilizing a profile of users as well as various context information, a sensor, and other environmental information in order to recognize a pattern of users' activities. And more enhanced services that can analyze users' pattern of behaviors and reflect individual tendency in the service should be offered so that users can obtain the information they want much faster. Thus, an intellectual control model is discussed, which can offer active service based on a pattern of users' behaviors, in order to suggest a device that predicts users' activities and operates in a more intelligent way","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying a Goal-Oriented Method for Hazard Analysis: A Case Study 应用目标导向方法进行危害分析:个案研究
Sam Supakkul, L. Chung
Traceability between hazards and countermeasures is important for hazard analysis to give confidence and help justify whether relevant hazards have been considered and sufficiently mitigated. However, use case modeling, the current de facto standard technique for requirements elicitation lacks negative modeling constructs for representing hazards. This paper presents a case study to apply a goal-oriented method for car security related hazard analysis where hazards are represented as operationalizations with negative contribution toward system non-functional requirements (NFRs). In turn, countermeasures are represented as operationalizations with negative contribution toward the respective hazards to negate their negative effect on the NFRs. The study finds that using the goal-oriented approach is most suitable for risk-driven applications, but also compatible and complementary to other applications
危害与对策之间的可追溯性对于危害分析非常重要,它可以提供信心,并有助于证明是否已考虑并充分减轻了相关危害。然而,用例建模,当前需求引出的事实标准技术缺乏表示危险的负面建模构造。本文提出了一个应用目标导向方法进行汽车安全相关危害分析的案例研究,其中危害被表示为对系统非功能需求(NFRs)有负面贡献的操作化。反过来,对策被表示为对各自危害具有负贡献的操作,以抵消其对自然保护区的负面影响。研究发现,使用面向目标的方法最适合于风险驱动的应用,但也与其他应用兼容和互补
{"title":"Applying a Goal-Oriented Method for Hazard Analysis: A Case Study","authors":"Sam Supakkul, L. Chung","doi":"10.1109/SERA.2006.16","DOIUrl":"https://doi.org/10.1109/SERA.2006.16","url":null,"abstract":"Traceability between hazards and countermeasures is important for hazard analysis to give confidence and help justify whether relevant hazards have been considered and sufficiently mitigated. However, use case modeling, the current de facto standard technique for requirements elicitation lacks negative modeling constructs for representing hazards. This paper presents a case study to apply a goal-oriented method for car security related hazard analysis where hazards are represented as operationalizations with negative contribution toward system non-functional requirements (NFRs). In turn, countermeasures are represented as operationalizations with negative contribution toward the respective hazards to negate their negative effect on the NFRs. The study finds that using the goal-oriented approach is most suitable for risk-driven applications, but also compatible and complementary to other applications","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid Prediction Model for improving Reliability in Self-Healing System 提高自愈系统可靠性的混合预测模型
Giljong Yoo, Jeongmin Park, Eunseok Lee
In ubiquitous environments, which involve an even greater number of computing devices, with more informal modes of operation, this type of problem have rather serious consequences. In order to solve these problems when they arise, effective reliable systems are required. Also, system management is changing from a conventional central administration, to autonomic computing. However, most existing research focuses on healing after a problem has already occurred. In order to solve this problem, a prediction model is required to recognize operating environments and predict error occurrence. In this paper, a hybrid prediction model through four algorithms supporting self-healing in autonomic computing is proposed. This prediction model adopts a selective healing model, according to system situations for self-diagnosing and prediction of problems using four algorithms. In this paper, a hybrid prediction model is adopted to evaluate the proposed model in a self-healing system. In addition, prediction is compared with existing research and the effectiveness is demonstrated by experiment
在无所不在的环境中,涉及更多数量的计算设备,具有更非正式的操作模式,这类问题会产生相当严重的后果。为了在这些问题出现时解决它们,需要有效可靠的系统。此外,系统管理正在从传统的中央管理转变为自主计算。然而,大多数现有的研究都集中在问题发生后的治疗上。为了解决这一问题,需要一个预测模型来识别操作环境并预测错误的发生。本文提出了一种支持自主计算中自愈的四种算法混合预测模型。该预测模型采用选择性愈合模型,根据系统情况采用四种算法对问题进行自诊断和预测。本文采用一种混合预测模型对自愈系统模型进行了评价。最后,将预测结果与已有研究结果进行了比较,并通过实验验证了预测结果的有效性
{"title":"Hybrid Prediction Model for improving Reliability in Self-Healing System","authors":"Giljong Yoo, Jeongmin Park, Eunseok Lee","doi":"10.1109/SERA.2006.40","DOIUrl":"https://doi.org/10.1109/SERA.2006.40","url":null,"abstract":"In ubiquitous environments, which involve an even greater number of computing devices, with more informal modes of operation, this type of problem have rather serious consequences. In order to solve these problems when they arise, effective reliable systems are required. Also, system management is changing from a conventional central administration, to autonomic computing. However, most existing research focuses on healing after a problem has already occurred. In order to solve this problem, a prediction model is required to recognize operating environments and predict error occurrence. In this paper, a hybrid prediction model through four algorithms supporting self-healing in autonomic computing is proposed. This prediction model adopts a selective healing model, according to system situations for self-diagnosing and prediction of problems using four algorithms. In this paper, a hybrid prediction model is adopted to evaluate the proposed model in a self-healing system. In addition, prediction is compared with existing research and the effectiveness is demonstrated by experiment","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient Load Balancing Method for Mobile Applicable iSCSI-based Remote Storage Service 移动应用iscsi远程存储业务的高效负载均衡方法
J. Kang, Wonil Choi, Myong-Soon Park
Mobile appliances are getting used in many areas. The explosive growth of the mobile appliance markets and requests of a lot of demands in mobile-related services lead many researches to apply for wired network environment services to mobile appliances. However, there are too many restrictions like connection failures to apply service that requires large scales of multimedia data, or services that require block unit I/O like large scale database to mobile devices. Using fail-over channel for the error recovery without any consideration of load processing status in each connection leads inefficient usage in wireless networks then it makes the quality of whole remote storage service down. In this paper, we propose an efficient load balancing method for iSCSI-based remote storage system to efficiently distribute data to valid connections when the established connection is failed in large scale data transmission of mobile applicant which supports multi-connection
许多领域都在使用移动设备。移动设备市场的爆炸式增长和移动相关业务的大量需求使得许多研究将有线网络环境服务应用于移动设备。然而,有太多的限制,比如连接失败,无法应用需要大规模多媒体数据的服务,或者需要块单元I/O(如大规模数据库)的服务到移动设备。使用故障转移通道进行错误恢复而不考虑每个连接的负载处理状态,导致无线网络的使用效率低下,从而降低整个远程存储服务的质量。本文提出了一种基于iscsi的远程存储系统的高效负载均衡方法,在支持多连接的移动应用程序的大规模数据传输中,当建立的连接失败时,能够有效地将数据分发到有效的连接上
{"title":"Efficient Load Balancing Method for Mobile Applicable iSCSI-based Remote Storage Service","authors":"J. Kang, Wonil Choi, Myong-Soon Park","doi":"10.1109/SERA.2006.31","DOIUrl":"https://doi.org/10.1109/SERA.2006.31","url":null,"abstract":"Mobile appliances are getting used in many areas. The explosive growth of the mobile appliance markets and requests of a lot of demands in mobile-related services lead many researches to apply for wired network environment services to mobile appliances. However, there are too many restrictions like connection failures to apply service that requires large scales of multimedia data, or services that require block unit I/O like large scale database to mobile devices. Using fail-over channel for the error recovery without any consideration of load processing status in each connection leads inefficient usage in wireless networks then it makes the quality of whole remote storage service down. In this paper, we propose an efficient load balancing method for iSCSI-based remote storage system to efficiently distribute data to valid connections when the established connection is failed in large scale data transmission of mobile applicant which supports multi-connection","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framework for Application-Independent Semantic Management for Ubiquitous Computing Environment 泛在计算环境下与应用无关的语义管理框架
Dongwon Jeong, Yixin Jing, Jinhyung Kim, D. Baik
This paper proposes a semantic management framework providing the ubiquitous application field-independent interoperability. The goal of the proposed framework is to provide a consistent and independent semantic usability to ubiquitous applications. The proposed framework uses the merits of the metadata registry that has been developed for exchanging and sharing between databases by ISO/IEC JTC 1/SC 32. The proposed framework allows application field free semantic management and enables the practical and ideal ubiquitous application development
本文提出了一个语义管理框架,提供了无处不在的应用领域无关的互操作性。提出的框架的目标是为无处不在的应用程序提供一致和独立的语义可用性。提议的框架利用了ISO/IEC JTC 1/SC 32为在数据库之间交换和共享而开发的元数据注册表的优点。该框架允许对应用领域进行自由的语义管理,实现了实用、理想的泛在应用开发
{"title":"A Framework for Application-Independent Semantic Management for Ubiquitous Computing Environment","authors":"Dongwon Jeong, Yixin Jing, Jinhyung Kim, D. Baik","doi":"10.1109/SERA.2006.3","DOIUrl":"https://doi.org/10.1109/SERA.2006.3","url":null,"abstract":"This paper proposes a semantic management framework providing the ubiquitous application field-independent interoperability. The goal of the proposed framework is to provide a consistent and independent semantic usability to ubiquitous applications. The proposed framework uses the merits of the metadata registry that has been developed for exchanging and sharing between databases by ISO/IEC JTC 1/SC 32. The proposed framework allows application field free semantic management and enables the practical and ideal ubiquitous application development","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Rule-based Security Engine for XML Web Services 基于规则的XML Web服务安全引擎的设计与实现
Priyanka Vasudevan, Lan Yang
Web services are software systems that enable applications serving various functions through the Web. Extensible markup language (XML) is used in the integration of applications which makes data sharing and communication within applications easier and uniform. Security is an important aspect of Web services. Securing XML data is critical to the success of any Web based applications or Web services. In this research work we have designed and implemented a single-point rule-based security engine for Apache Axis. Apache Axis is an open source Web services development and deployment platform. By doing this we reuse the same security engine for more than one Web service so that applications need not to implement separate security logic. The security engine provides support for authentication, authorization, decryption and signature verification. A test application is also implemented to validate the design and implementation of the rule-based security engine
Web服务是使应用程序能够通过Web提供各种功能的软件系统。可扩展标记语言(XML)用于应用程序的集成,它使应用程序内部的数据共享和通信更加容易和统一。安全性是Web服务的一个重要方面。保护XML数据对于任何基于Web的应用程序或Web服务的成功都至关重要。在这项研究工作中,我们为Apache Axis设计并实现了一个基于单点规则的安全引擎。Apache Axis是一个开源的Web服务开发和部署平台。通过这样做,我们可以为多个Web服务重用相同的安全引擎,这样应用程序就不需要实现单独的安全逻辑。安全引擎提供鉴权、授权、解密和签名验证的支持。还实现了一个测试应用程序来验证基于规则的安全引擎的设计和实现
{"title":"Design and Implementation of a Rule-based Security Engine for XML Web Services","authors":"Priyanka Vasudevan, Lan Yang","doi":"10.1109/SERA.2006.25","DOIUrl":"https://doi.org/10.1109/SERA.2006.25","url":null,"abstract":"Web services are software systems that enable applications serving various functions through the Web. Extensible markup language (XML) is used in the integration of applications which makes data sharing and communication within applications easier and uniform. Security is an important aspect of Web services. Securing XML data is critical to the success of any Web based applications or Web services. In this research work we have designed and implemented a single-point rule-based security engine for Apache Axis. Apache Axis is an open source Web services development and deployment platform. By doing this we reuse the same security engine for more than one Web service so that applications need not to implement separate security logic. The security engine provides support for authentication, authorization, decryption and signature verification. A test application is also implemented to validate the design and implementation of the rule-based security engine","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122147592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
2D Direct LDA Algorithm for Face Recognition 二维直接LDA人脸识别算法
Dong-uk Cho, U. Chang, Bong-hyun Kim, Se Hwan Lee, Younglae Bae, Soo Cheol Ha
A new low-dimensional feature representation technique is presented in this paper. Linear discriminant analysis is a popular feature extraction method. However, in the case of high dimensional data, the computational difficulty and the small sample size problem are often encountered. In order to solve these problems, we propose two dimensional direct LDA algorithm named 2D-DLDA, which directly extracts the image scatter matrix from 2D image and uses direct LDA algorithm for face recognition. The ORL face database is used to evaluate the performance of the proposed method. The experimental results indicate that the performance of the proposed method is superior to DLDA
提出了一种新的低维特征表示方法。线性判别分析是一种常用的特征提取方法。然而,在高维数据的情况下,经常会遇到计算困难和小样本量问题。为了解决这些问题,我们提出二维直接LDA算法2D- dlda,直接从二维图像中提取图像散点矩阵,使用直接LDA算法进行人脸识别。利用ORL人脸数据库对所提方法的性能进行了评价。实验结果表明,该方法的性能优于DLDA
{"title":"2D Direct LDA Algorithm for Face Recognition","authors":"Dong-uk Cho, U. Chang, Bong-hyun Kim, Se Hwan Lee, Younglae Bae, Soo Cheol Ha","doi":"10.1109/SERA.2006.1","DOIUrl":"https://doi.org/10.1109/SERA.2006.1","url":null,"abstract":"A new low-dimensional feature representation technique is presented in this paper. Linear discriminant analysis is a popular feature extraction method. However, in the case of high dimensional data, the computational difficulty and the small sample size problem are often encountered. In order to solve these problems, we propose two dimensional direct LDA algorithm named 2D-DLDA, which directly extracts the image scatter matrix from 2D image and uses direct LDA algorithm for face recognition. The ORL face database is used to evaluate the performance of the proposed method. The experimental results indicate that the performance of the proposed method is superior to DLDA","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"65 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1