首页 > 最新文献

Proceedings of the Symposium on Applied Computing最新文献

英文 中文
An end-to-end voting-system based on bitcoin 基于比特币的端到端投票系统
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019841
Stefano Bistarelli, Marco Mantilacci, Paolo Santancini, Francesco Santini
In this work we re-adapt the Bitcoin e-payment system and propose it as a decentralised end-to-end voting platform (from voters to candidates). We describe the main architectural choices behind the implementation, which consists of the pre-voting, voting, and post-voting phases. The resulting implementation is completely decentralised: it is possible to directly cast a vote in the block-chain without any collecting intermediate-level. All the votes can be verified by anyone reading such a public ledger. We also exploit digital asset coins to directly keep track of votes (through the Open Asset Protocol), and we show the election cost for n voters.
在这项工作中,我们重新调整了比特币电子支付系统,并将其作为一个分散的端到端投票平台(从选民到候选人)。我们描述了实现背后的主要体系结构选择,它由投票前、投票和投票后阶段组成。由此产生的实现是完全去中心化的:可以直接在区块链中投票,而不需要任何中间收集层。所有的投票都可以被任何阅读这样一个公共分类账的人核实。我们还利用数字资产硬币直接跟踪投票(通过开放资产协议),并显示n个选民的选举成本。
{"title":"An end-to-end voting-system based on bitcoin","authors":"Stefano Bistarelli, Marco Mantilacci, Paolo Santancini, Francesco Santini","doi":"10.1145/3019612.3019841","DOIUrl":"https://doi.org/10.1145/3019612.3019841","url":null,"abstract":"In this work we re-adapt the Bitcoin e-payment system and propose it as a decentralised end-to-end voting platform (from voters to candidates). We describe the main architectural choices behind the implementation, which consists of the pre-voting, voting, and post-voting phases. The resulting implementation is completely decentralised: it is possible to directly cast a vote in the block-chain without any collecting intermediate-level. All the votes can be verified by anyone reading such a public ledger. We also exploit digital asset coins to directly keep track of votes (through the Open Asset Protocol), and we show the election cost for n voters.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83037564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Nonconformance between programs and contracts: a study on C#/code contracts open source systems 程序和契约之间的不一致性:c# /代码契约开源系统的研究
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019779
Alysson Milanez, Bianca Lima, José Ferreira, T. Massoni
Detecting nonconformances between contracts and code is critical in contract-based programs, although detection is only the first step in correction; one needs to pinpoint their causes. For example, a nonconformance may be due to a method precondition that is weaker than it should be, or maybe the program behavior breaks the corresponding contracts. Previous research on contract-based programs lacks evidence about the most frequent causes for nonconformances. Either, no previous work elaborate on the effort required for establishing a likely cause. In this work, from 63 automatically-detected nonconformances found in 12 open source C#/Code Contracts systems, we manually analyze their likely causes, among contract or code defects. We observe nonconformances are frequently due to the weakness of preconditions, or to programs failing to fulfill contracts that seem appropriate to the problem at hand, although most nonconformances cause failures at the exit of operations (postcondition and invariant nonconformances sum up to 35). We also report on the obstacles in determining a likely cause, in which context information about the affected program fragment is often relevant.
在基于合同的程序中,检测合同和代码之间的不一致是至关重要的,尽管检测只是纠正的第一步;人们需要查明其原因。例如,不一致可能是由于方法的先决条件比它应该的弱,或者可能是程序行为打破了相应的契约。先前对基于合同的项目的研究缺乏关于不符合的最常见原因的证据。或者,以前的工作没有详细说明建立一个可能的原因所需要的努力。在这项工作中,我们从12个开源c# /Code Contracts系统中发现的63个自动检测到的不符合项中,手动分析了它们在合同或代码缺陷中的可能原因。我们观察到,不一致经常是由于前提条件的弱点,或者程序未能履行似乎适合手头问题的契约,尽管大多数不一致导致了操作退出时的失败(后条件和不变不一致的总和为35)。我们还报告了确定可能原因的障碍,其中有关受影响的程序片段的上下文信息通常是相关的。
{"title":"Nonconformance between programs and contracts: a study on C#/code contracts open source systems","authors":"Alysson Milanez, Bianca Lima, José Ferreira, T. Massoni","doi":"10.1145/3019612.3019779","DOIUrl":"https://doi.org/10.1145/3019612.3019779","url":null,"abstract":"Detecting nonconformances between contracts and code is critical in contract-based programs, although detection is only the first step in correction; one needs to pinpoint their causes. For example, a nonconformance may be due to a method precondition that is weaker than it should be, or maybe the program behavior breaks the corresponding contracts. Previous research on contract-based programs lacks evidence about the most frequent causes for nonconformances. Either, no previous work elaborate on the effort required for establishing a likely cause. In this work, from 63 automatically-detected nonconformances found in 12 open source C#/Code Contracts systems, we manually analyze their likely causes, among contract or code defects. We observe nonconformances are frequently due to the weakness of preconditions, or to programs failing to fulfill contracts that seem appropriate to the problem at hand, although most nonconformances cause failures at the exit of operations (postcondition and invariant nonconformances sum up to 35). We also report on the obstacles in determining a likely cause, in which context information about the affected program fragment is often relevant.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83432496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging the adoption of electronic identities and electronic-signature solutions in Europe 利用欧洲采用的电子身份和电子签名解决方案
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019885
Alexander Marsalek, Thomas Zefferer, Florian Reimair, Ç. Karabat, Elif Ustundag Soykan
The concepts of electronic identity (eID) and electronic signature (e-Signature) are crucial enablers of e-government solutions in Europe. The present heterogeneity of national e-government infrastructures in Europe raises serious challenges. The country-specific nature of infrastructure components prevents an easy reuse of country-specific components in other countries. We propose a solution, that facilitates the deployment and integration or third-party components into existing national e-government infrastructures. We demonstrate the feasibility of our proposal by means of a concrete implementation. Evaluation results obtained are promising and show the proposed solution's potential to leverage the adoption of eID and e-Signature solutions in Europe.
电子身份的概念(宰牲节)和电子签名(电子)是电子政务解决方案在欧洲的重要推动者。目前欧洲国家电子政务基础设施的异质性提出了严峻的挑战。基础设施组件的国别特性阻碍了在其他国家轻松重用国别组件。我们提出了一个解决方案,该解决方案有助于将第三方组件部署和集成到现有的国家电子政务基础设施中。我们通过具体的实施来证明我们建议的可行性。获得的评估结果是有希望的,并显示了拟议的解决方案在欧洲利用电子身份和电子签名解决方案的潜力。
{"title":"Leveraging the adoption of electronic identities and electronic-signature solutions in Europe","authors":"Alexander Marsalek, Thomas Zefferer, Florian Reimair, Ç. Karabat, Elif Ustundag Soykan","doi":"10.1145/3019612.3019885","DOIUrl":"https://doi.org/10.1145/3019612.3019885","url":null,"abstract":"The concepts of electronic identity (eID) and electronic signature (e-Signature) are crucial enablers of e-government solutions in Europe. The present heterogeneity of national e-government infrastructures in Europe raises serious challenges. The country-specific nature of infrastructure components prevents an easy reuse of country-specific components in other countries. We propose a solution, that facilitates the deployment and integration or third-party components into existing national e-government infrastructures. We demonstrate the feasibility of our proposal by means of a concrete implementation. Evaluation results obtained are promising and show the proposed solution's potential to leverage the adoption of eID and e-Signature solutions in Europe.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74390877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hierarchical multi-label classification with chained neural networks 链式神经网络的分层多标签分类
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019664
Jonatas Wehrmann, Rodrigo C. Barros, S. N. D. Dôres, R. Cerri
In classification tasks, an object usually belongs to one class within a set of disjoint classes. In more complex tasks, an object can belong to more than one class, in what is conventionally termed multi-label classification. Moreover, there are cases in which the set of classes are organised in a hierarchical fashion, and an object must be associated to a single path in this hierarchy, defining the so-called hierarchical classification. Finally, in even more complex scenarios, the classes are organised in a hierarchical structure and the object can be associated to multiple paths of this hierarchy, defining the problem investigated in this article: hierarchical multi-label classification (HMC). We address a typical problem of HMC, which is protein function prediction, and for that we propose an approach that chains multiple neural networks, performing both local and global optimisation in order to provide the final prediction: one or multiple paths in the hierarchy of classes. We experiment with four variations of this chaining process, and we compare these strategies with the state-of-the-art HMC algorithms for protein function prediction, showing that our novel approach significantly outperforms these methods.
在分类任务中,一个对象通常属于一组互不关联的类中的一个类。在更复杂的任务中,一个对象可以属于多个类,这通常被称为多标签分类。此外,在某些情况下,类集以分层方式组织,并且必须将对象关联到该层次结构中的单个路径,从而定义了所谓的分层分类。最后,在更复杂的场景中,类以层次结构组织,对象可以与该层次结构的多条路径相关联,这就定义了本文研究的问题:层次多标签分类(HMC)。我们解决了HMC的一个典型问题,即蛋白质功能预测,为此我们提出了一种连接多个神经网络的方法,执行局部和全局优化,以提供最终预测:类层次结构中的一条或多条路径。我们实验了这种链化过程的四种变体,并将这些策略与最先进的蛋白质功能预测HMC算法进行了比较,结果表明我们的新方法明显优于这些方法。
{"title":"Hierarchical multi-label classification with chained neural networks","authors":"Jonatas Wehrmann, Rodrigo C. Barros, S. N. D. Dôres, R. Cerri","doi":"10.1145/3019612.3019664","DOIUrl":"https://doi.org/10.1145/3019612.3019664","url":null,"abstract":"In classification tasks, an object usually belongs to one class within a set of disjoint classes. In more complex tasks, an object can belong to more than one class, in what is conventionally termed multi-label classification. Moreover, there are cases in which the set of classes are organised in a hierarchical fashion, and an object must be associated to a single path in this hierarchy, defining the so-called hierarchical classification. Finally, in even more complex scenarios, the classes are organised in a hierarchical structure and the object can be associated to multiple paths of this hierarchy, defining the problem investigated in this article: hierarchical multi-label classification (HMC). We address a typical problem of HMC, which is protein function prediction, and for that we propose an approach that chains multiple neural networks, performing both local and global optimisation in order to provide the final prediction: one or multiple paths in the hierarchy of classes. We experiment with four variations of this chaining process, and we compare these strategies with the state-of-the-art HMC algorithms for protein function prediction, showing that our novel approach significantly outperforms these methods.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73484006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Inference of regulatory networks with MCMC sampler guided by mutual information 互信息引导下MCMC采样器调节网络的推理
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3022189
Nilzair M. Barreto, K. Machado, A. Werhli
Computationally efficient and exact inference of regulatory network topology is an open problem in System Biology. In this work we investigate the use of prior information about the network topology as a guide to a Markov Chain Monte Carlo sampler of network structures. The prior information is obtained from a coarser and faster network inference method, the Relevance Networks with Mutual Information scores. Moreover, the regulatory networks are represented by the Bayesian Networks model. The results show that the use of prior information drastically improves the convergence of the MCMC sampler. Therefore, the use of a more refined method is justified as it is likely to lead to more reliable results with less MCMC iterations.
调节网络拓扑的计算效率和精确推理是系统生物学中的一个开放性问题。在这项工作中,我们研究了使用网络拓扑的先验信息作为网络结构的马尔可夫链蒙特卡罗采样器的指南。先验信息是通过一种更粗糙、更快的网络推理方法获得的,即互信息评分的关联网络。此外,监管网络用贝叶斯网络模型表示。结果表明,先验信息的使用大大提高了MCMC采样器的收敛性。因此,使用更精细的方法是合理的,因为它可能以更少的MCMC迭代产生更可靠的结果。
{"title":"Inference of regulatory networks with MCMC sampler guided by mutual information","authors":"Nilzair M. Barreto, K. Machado, A. Werhli","doi":"10.1145/3019612.3022189","DOIUrl":"https://doi.org/10.1145/3019612.3022189","url":null,"abstract":"Computationally efficient and exact inference of regulatory network topology is an open problem in System Biology. In this work we investigate the use of prior information about the network topology as a guide to a Markov Chain Monte Carlo sampler of network structures. The prior information is obtained from a coarser and faster network inference method, the Relevance Networks with Mutual Information scores. Moreover, the regulatory networks are represented by the Bayesian Networks model. The results show that the use of prior information drastically improves the convergence of the MCMC sampler. Therefore, the use of a more refined method is justified as it is likely to lead to more reliable results with less MCMC iterations.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78749217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards trusted execution of multi-modal continuous authentication schemes 实现多模态连续身份验证方案的可信执行
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019652
Carlton Shepherd, Raja Naeem Akram, K. Markantonakis
The emergence of powerful, sensor-rich devices has led to the development of continuous authentication (CA) schemes using off-the-shelf hardware, where user behaviour is compared to past experience to produce an authentication decision with the aim of addressing challenges with traditional authentication schemes. Current CA proposals, however, have largely neglected adversaries present in a real-world deployment, namely the ubiquity of mal ware and software attacks. This has particular importance when a device cannot be trusted by a third-party, such as a corporation, that controls access to assets based on that decision. A software compromise, either on the scheme implementation or platform, may enable an adversary to modify authentication scores to alter the status of the device in reality, give insights into user behaviour, or gain unauthorised access to restricted assets. Hence, for the first time, we examine two standardised constructs that offer isolated and trusted execution - Secure Elements (SEs) and Trusted Execution Environments (TEEs) - even when an adversary has root-level privileges, and propose measures for providing trusted CA while retaining deployability. Based on these, we implement the first system for evaluating TEE-based CA on a consumer mobile device using Intel SGX, thus providing confidentiality, integrity and trust while removing the main platform from the TCB. We present an empirical evaluation of TEE-and non-TEE performance using methods proposed in related CA schemes. Our results indicate that trusted CA can be provided with no significant performance penalty, and may even offer performance benefits.
功能强大、传感器丰富的设备的出现导致了使用现成硬件的持续身份验证(CA)方案的发展,其中用户行为与过去的经验进行比较,以产生身份验证决策,目的是解决传统身份验证方案的挑战。然而,当前的CA提案在很大程度上忽略了现实部署中的对手,即无处不在的恶意软件和软件攻击。当设备不能被第三方(如公司)信任时,这一点尤为重要,因为第三方根据该决定控制对资产的访问。软件漏洞,无论是在方案实现上还是在平台上,都可能使攻击者修改身份验证分数,从而改变设备在现实中的状态,洞察用户行为,或获得对受限制资产的未经授权访问。因此,我们首次研究了两种提供隔离和可信执行的标准化结构——安全元素(se)和可信执行环境(tee)——即使攻击者具有根级特权,并提出了在保留可部署性的同时提供可信CA的措施。在此基础上,我们实现了第一个使用英特尔SGX在消费者移动设备上评估基于tee的CA的系统,从而在从TCB移除主平台的同时提供保密性、完整性和信任。我们使用相关CA方案中提出的方法对tee和非tee性能进行了实证评估。我们的结果表明,可以在没有显著性能损失的情况下提供可信CA,甚至可以提供性能优势。
{"title":"Towards trusted execution of multi-modal continuous authentication schemes","authors":"Carlton Shepherd, Raja Naeem Akram, K. Markantonakis","doi":"10.1145/3019612.3019652","DOIUrl":"https://doi.org/10.1145/3019612.3019652","url":null,"abstract":"The emergence of powerful, sensor-rich devices has led to the development of continuous authentication (CA) schemes using off-the-shelf hardware, where user behaviour is compared to past experience to produce an authentication decision with the aim of addressing challenges with traditional authentication schemes. Current CA proposals, however, have largely neglected adversaries present in a real-world deployment, namely the ubiquity of mal ware and software attacks. This has particular importance when a device cannot be trusted by a third-party, such as a corporation, that controls access to assets based on that decision. A software compromise, either on the scheme implementation or platform, may enable an adversary to modify authentication scores to alter the status of the device in reality, give insights into user behaviour, or gain unauthorised access to restricted assets. Hence, for the first time, we examine two standardised constructs that offer isolated and trusted execution - Secure Elements (SEs) and Trusted Execution Environments (TEEs) - even when an adversary has root-level privileges, and propose measures for providing trusted CA while retaining deployability. Based on these, we implement the first system for evaluating TEE-based CA on a consumer mobile device using Intel SGX, thus providing confidentiality, integrity and trust while removing the main platform from the TCB. We present an empirical evaluation of TEE-and non-TEE performance using methods proposed in related CA schemes. Our results indicate that trusted CA can be provided with no significant performance penalty, and may even offer performance benefits.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76992309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Hiding debuggers from malware with apate 用apate隐藏恶意软件的调试器
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019791
Hao Shi, J. Mirkovic
Malware analysis uses debuggers to understand and manipulate the behaviors of stripped binaries. To circumvent analysis, malware applies a variety of anti-debugging techniques, such as self-modifying, checking for or removing breakpoints, hijacking keyboard and mouse events, escaping the debugger, etc. Most state-of-the-art debuggers are vulnerable to these anti-debugging techniques. In this paper, we first systematically analyze the spectrum of possible anti-debugging techniques and compile a list of 79 attack vectors. We then propose a framework, called Apate, which detects and defeats each of these attack vectors, by performing: (1) just-in-time disassembling based on single-stepping, (2) careful monitoring of the debuggee's execution and, when needed, modification of the debuggee's states to hide the debugger's presence. We implement Apate as an extension to WinDbg and extensively evaluate it using five different datasets, with known and new malware samples. Apate outperforms other debugger-hiding technologies by a wide margin, addressing 58+--465+ more attack vectors.
恶意软件分析使用调试器来理解和操纵剥离二进制文件的行为。为了规避分析,恶意软件应用各种反调试技术,如自我修改、检查或删除断点、劫持键盘和鼠标事件、转义调试器等。大多数最先进的调试器都容易受到这些反调试技术的攻击。在本文中,我们首先系统地分析了可能的反调试技术的频谱,并编制了79个攻击向量的列表。然后,我们提出了一个名为Apate的框架,它通过执行:(1)基于单步的实时反汇编,(2)仔细监视被调试程序的执行,并在需要时修改被调试程序的状态以隐藏调试器的存在,来检测并击败这些攻击向量。我们将Apate作为WinDbg的扩展来实现,并使用五种不同的数据集,以及已知的和新的恶意软件样本对其进行了广泛的评估。Apate比其他隐藏调试器的技术性能要好得多,可以处理58+- 465+的攻击向量。
{"title":"Hiding debuggers from malware with apate","authors":"Hao Shi, J. Mirkovic","doi":"10.1145/3019612.3019791","DOIUrl":"https://doi.org/10.1145/3019612.3019791","url":null,"abstract":"Malware analysis uses debuggers to understand and manipulate the behaviors of stripped binaries. To circumvent analysis, malware applies a variety of anti-debugging techniques, such as self-modifying, checking for or removing breakpoints, hijacking keyboard and mouse events, escaping the debugger, etc. Most state-of-the-art debuggers are vulnerable to these anti-debugging techniques. In this paper, we first systematically analyze the spectrum of possible anti-debugging techniques and compile a list of 79 attack vectors. We then propose a framework, called Apate, which detects and defeats each of these attack vectors, by performing: (1) just-in-time disassembling based on single-stepping, (2) careful monitoring of the debuggee's execution and, when needed, modification of the debuggee's states to hide the debugger's presence. We implement Apate as an extension to WinDbg and extensively evaluate it using five different datasets, with known and new malware samples. Apate outperforms other debugger-hiding technologies by a wide margin, addressing 58+--465+ more attack vectors.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88221778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A smart MobiWeb mashup trip planner tool 一个智能MobiWeb混搭旅行计划工具
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019917
Marwa Boulakbech, Nizar Messai, Yacine Sam, T. Devogele
A wide range of Mobile Web-based applications are nowadays being built and proposed as mashup applications. Their aim is to be intuitive enough to be easily created by end-users directly selecting interactive elements, content and functionalities from existing resources, without requiring any technical skills. We propose in this article a Mobile Web Trip Planner Tool that mashups heterogeneous online travel information provided from multiple Restful Web services to recommend custom visit plans. This application takes into account tourist preferences (type of stay, interest) and constraints (duration, budget, locomotion modality). Moreover, it considers real-time events (e.g., weather data or temporary unavailability of a touristic site) to adapt proposed schedules.
现在,大量基于web的移动应用程序被构建并作为mashup应用程序提出。它们的目标是足够直观,以便最终用户可以直接从现有资源中选择交互元素、内容和功能,而不需要任何技术技能。在本文中,我们提出了一个移动Web旅行计划工具,它将来自多个rest式Web服务提供的异构在线旅行信息混搭在一起,以推荐定制的旅行计划。该应用程序考虑了游客的偏好(逗留类型、兴趣)和限制(持续时间、预算、移动方式)。此外,它考虑实时事件(例如,天气数据或旅游地点暂时不可用)以适应拟议的时间表。
{"title":"A smart MobiWeb mashup trip planner tool","authors":"Marwa Boulakbech, Nizar Messai, Yacine Sam, T. Devogele","doi":"10.1145/3019612.3019917","DOIUrl":"https://doi.org/10.1145/3019612.3019917","url":null,"abstract":"A wide range of Mobile Web-based applications are nowadays being built and proposed as mashup applications. Their aim is to be intuitive enough to be easily created by end-users directly selecting interactive elements, content and functionalities from existing resources, without requiring any technical skills. We propose in this article a Mobile Web Trip Planner Tool that mashups heterogeneous online travel information provided from multiple Restful Web services to recommend custom visit plans. This application takes into account tourist preferences (type of stay, interest) and constraints (duration, budget, locomotion modality). Moreover, it considers real-time events (e.g., weather data or temporary unavailability of a touristic site) to adapt proposed schedules.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88655136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next generation JDBC database drivers for performance, transparent caching, load balancing, and scale-out 下一代JDBC数据库驱动程序的性能、透明缓存、负载平衡和横向扩展
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019870
R. Lawrence, Erik Brandsberg, R. Lee
Despite having a significant impact on overall data system performance, database drivers connecting the application to the database system have not innovated at the same pace as the database systems themselves. This work describes a database driver designed for the requirements of cloud-based systems requiring flexibility, high availability, scaling, and performance. The unique contribution is a rule-based query routing system that supports real-time configurations and optimizations without requiring any changes to the application code or database system. With the increasing migration of applications and databases to the cloud as well as different database technologies such as NoSQL systems, this flexibility allows application owners to optimize and migrate legacy applications to exploit the advantages of new database technologies. Experimental results demonstrate how queries cached by the driver can improve query response times by an order of magnitude and reduce the overall load on the database system by up to 50+.
尽管对整体数据系统性能有重大影响,但是连接应用程序到数据库系统的数据库驱动程序并没有像数据库系统本身那样创新。这项工作描述了一个数据库驱动程序,它是为需要灵活性、高可用性、可伸缩性和性能的基于云的系统的需求而设计的。唯一的贡献是一个基于规则的查询路由系统,它支持实时配置和优化,而不需要对应用程序代码或数据库系统进行任何更改。随着越来越多的应用程序和数据库迁移到云以及不同的数据库技术(如NoSQL系统),这种灵活性允许应用程序所有者优化和迁移遗留应用程序,以利用新数据库技术的优势。实验结果表明,驱动程序缓存的查询可以将查询响应时间提高一个数量级,并将数据库系统的总体负载减少50%以上。
{"title":"Next generation JDBC database drivers for performance, transparent caching, load balancing, and scale-out","authors":"R. Lawrence, Erik Brandsberg, R. Lee","doi":"10.1145/3019612.3019870","DOIUrl":"https://doi.org/10.1145/3019612.3019870","url":null,"abstract":"Despite having a significant impact on overall data system performance, database drivers connecting the application to the database system have not innovated at the same pace as the database systems themselves. This work describes a database driver designed for the requirements of cloud-based systems requiring flexibility, high availability, scaling, and performance. The unique contribution is a rule-based query routing system that supports real-time configurations and optimizations without requiring any changes to the application code or database system. With the increasing migration of applications and databases to the cloud as well as different database technologies such as NoSQL systems, this flexibility allows application owners to optimize and migrate legacy applications to exploit the advantages of new database technologies. Experimental results demonstrate how queries cached by the driver can improve query response times by an order of magnitude and reduce the overall load on the database system by up to 50+.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88661063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
HyViDE: a framework for virtual data center network embedding HyViDE:虚拟数据中心网络嵌入框架
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019629
M. Gilesh, S. D. M. Kumar, L. Jacob
Cloud computing technologies have matured enough that the service providers are compelled to migrate their services to virtualized infrastructure in cloud data centers. However, moving the computation and network to shared physical infrastructure poses a multitude of questions, both for service providers and for data center owners. In this work, we propose HyViDE - a framework for optimal placement of multiple virtual data center networks on a physical data center network. HyViDE preselects a subset of virtual data center network requests and uses a hybrid strategy for embedding them on the physical data center. Coordinated static and dynamic embedding algorithms are used in this hybrid framework to minimize the rejection of requests and fulfill QoS demands of the embedded networks. HyViDE can employ suitable static and dynamic strategies to meet the objectives of data center owners and customers. Experimental evaluation of our algorithms on HyViDE shows that, the acceptance rate is high with faster servicing of requests.
云计算技术已经足够成熟,服务提供商不得不将其服务迁移到云数据中心的虚拟化基础设施中。然而,将计算和网络转移到共享的物理基础设施会给服务提供商和数据中心所有者带来许多问题。在这项工作中,我们提出了HyViDE -一个在物理数据中心网络上优化放置多个虚拟数据中心网络的框架。HyViDE预先选择虚拟数据中心网络请求的子集,并使用混合策略将它们嵌入到物理数据中心。该混合框架采用了静态和动态的协调嵌入算法,最大限度地减少了请求的拒绝,满足了嵌入式网络的QoS要求。HyViDE可以采用合适的静态和动态策略来满足数据中心所有者和客户的目标。在HyViDE上的实验评估表明,我们的算法具有较高的接受率和更快的请求服务速度。
{"title":"HyViDE: a framework for virtual data center network embedding","authors":"M. Gilesh, S. D. M. Kumar, L. Jacob","doi":"10.1145/3019612.3019629","DOIUrl":"https://doi.org/10.1145/3019612.3019629","url":null,"abstract":"Cloud computing technologies have matured enough that the service providers are compelled to migrate their services to virtualized infrastructure in cloud data centers. However, moving the computation and network to shared physical infrastructure poses a multitude of questions, both for service providers and for data center owners. In this work, we propose HyViDE - a framework for optimal placement of multiple virtual data center networks on a physical data center network. HyViDE preselects a subset of virtual data center network requests and uses a hybrid strategy for embedding them on the physical data center. Coordinated static and dynamic embedding algorithms are used in this hybrid framework to minimize the rejection of requests and fulfill QoS demands of the embedded networks. HyViDE can employ suitable static and dynamic strategies to meet the objectives of data center owners and customers. Experimental evaluation of our algorithms on HyViDE shows that, the acceptance rate is high with faster servicing of requests.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84947603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the Symposium on Applied Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1