首页 > 最新文献

Proceedings of the Symposium on Applied Computing最新文献

英文 中文
On the significance of relationship directions in clustering algorithms for reverse engineering 关系方向在逆向工程聚类算法中的意义
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019782
David D. Jensen, Andreas Lundkvist, I. Hammouda
Software clustering is a common technique applied to simplify reverse engineered software models. These algorithms commonly classify similarity between nodes based on their relationships. However little research exists that discusses the importance of the direction of these relationships. In this paper we provide empirical data for how treating direction in entity relationships affect the recovery accuracy of hierarchical clustering algorithms. We test variations of a hierarchical clustering algorithm on several open source systems and compare their results, and conclude that relationship direction does not have a significant impact on recovery accuracy. As such, researchers may opt to implement hierarchical clustering algorithms using only one direction of relations instead of both, and still get similar results for less computational cost.
软件聚类是一种用于简化逆向工程软件模型的常用技术。这些算法通常根据节点之间的关系对节点之间的相似性进行分类。然而,很少有研究讨论这些关系方向的重要性。本文为实体关系中的方向处理如何影响分层聚类算法的恢复精度提供了经验数据。我们在几个开源系统上测试了一种分层聚类算法的变化,并比较了它们的结果,得出关系方向对恢复精度没有显著影响的结论。因此,研究人员可能会选择只使用一个方向的关系来实现分层聚类算法,而不是同时使用两个方向的关系,并且仍然可以以更少的计算成本获得相似的结果。
{"title":"On the significance of relationship directions in clustering algorithms for reverse engineering","authors":"David D. Jensen, Andreas Lundkvist, I. Hammouda","doi":"10.1145/3019612.3019782","DOIUrl":"https://doi.org/10.1145/3019612.3019782","url":null,"abstract":"Software clustering is a common technique applied to simplify reverse engineered software models. These algorithms commonly classify similarity between nodes based on their relationships. However little research exists that discusses the importance of the direction of these relationships. In this paper we provide empirical data for how treating direction in entity relationships affect the recovery accuracy of hierarchical clustering algorithms. We test variations of a hierarchical clustering algorithm on several open source systems and compare their results, and conclude that relationship direction does not have a significant impact on recovery accuracy. As such, researchers may opt to implement hierarchical clustering algorithms using only one direction of relations instead of both, and still get similar results for less computational cost.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90973753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Nonconformance between programs and contracts: a study on C#/code contracts open source systems 程序和契约之间的不一致性:c# /代码契约开源系统的研究
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019779
Alysson Milanez, Bianca Lima, José Ferreira, T. Massoni
Detecting nonconformances between contracts and code is critical in contract-based programs, although detection is only the first step in correction; one needs to pinpoint their causes. For example, a nonconformance may be due to a method precondition that is weaker than it should be, or maybe the program behavior breaks the corresponding contracts. Previous research on contract-based programs lacks evidence about the most frequent causes for nonconformances. Either, no previous work elaborate on the effort required for establishing a likely cause. In this work, from 63 automatically-detected nonconformances found in 12 open source C#/Code Contracts systems, we manually analyze their likely causes, among contract or code defects. We observe nonconformances are frequently due to the weakness of preconditions, or to programs failing to fulfill contracts that seem appropriate to the problem at hand, although most nonconformances cause failures at the exit of operations (postcondition and invariant nonconformances sum up to 35). We also report on the obstacles in determining a likely cause, in which context information about the affected program fragment is often relevant.
在基于合同的程序中,检测合同和代码之间的不一致是至关重要的,尽管检测只是纠正的第一步;人们需要查明其原因。例如,不一致可能是由于方法的先决条件比它应该的弱,或者可能是程序行为打破了相应的契约。先前对基于合同的项目的研究缺乏关于不符合的最常见原因的证据。或者,以前的工作没有详细说明建立一个可能的原因所需要的努力。在这项工作中,我们从12个开源c# /Code Contracts系统中发现的63个自动检测到的不符合项中,手动分析了它们在合同或代码缺陷中的可能原因。我们观察到,不一致经常是由于前提条件的弱点,或者程序未能履行似乎适合手头问题的契约,尽管大多数不一致导致了操作退出时的失败(后条件和不变不一致的总和为35)。我们还报告了确定可能原因的障碍,其中有关受影响的程序片段的上下文信息通常是相关的。
{"title":"Nonconformance between programs and contracts: a study on C#/code contracts open source systems","authors":"Alysson Milanez, Bianca Lima, José Ferreira, T. Massoni","doi":"10.1145/3019612.3019779","DOIUrl":"https://doi.org/10.1145/3019612.3019779","url":null,"abstract":"Detecting nonconformances between contracts and code is critical in contract-based programs, although detection is only the first step in correction; one needs to pinpoint their causes. For example, a nonconformance may be due to a method precondition that is weaker than it should be, or maybe the program behavior breaks the corresponding contracts. Previous research on contract-based programs lacks evidence about the most frequent causes for nonconformances. Either, no previous work elaborate on the effort required for establishing a likely cause. In this work, from 63 automatically-detected nonconformances found in 12 open source C#/Code Contracts systems, we manually analyze their likely causes, among contract or code defects. We observe nonconformances are frequently due to the weakness of preconditions, or to programs failing to fulfill contracts that seem appropriate to the problem at hand, although most nonconformances cause failures at the exit of operations (postcondition and invariant nonconformances sum up to 35). We also report on the obstacles in determining a likely cause, in which context information about the affected program fragment is often relevant.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"5 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83432496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTA-MD: a model-driven approach for applying QoS attributes in the development of the IoT systems IoTA-MD:一种在物联网系统开发中应用QoS属性的模型驱动方法
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019800
Marcelo Pitanga Alves, Flávia Coimbra Delicato, Paulo F. Pires
This paper presents IoTA-MD, a model-driven approach to instantiate the IoT-A Reference Architecture and manage QoS attributes in the early stages of IoT system modeling. It uses the principle of Separation of Concerns (SoC) to address complexity issues of the IoT system development considering both vertical and horizontal perspectives. The horizontal SoC is addressed by handling quality attributes separately from the Domain and Information models. The vertical SoC is addressed by using MDA to design the system models with the appropriate abstraction level, and its transformation artifacts to refine such models from an abstraction level to other. Moreover, the IoTA-MD provides a modeling tool to facilitate the design/maintenance of the IoT-A models at the CIM and PIM levels.
本文提出了IoTA-MD,一种模型驱动的方法,用于在物联网系统建模的早期阶段实例化物联网a参考架构并管理QoS属性。它使用关注点分离(SoC)原则来解决考虑垂直和水平角度的物联网系统开发的复杂性问题。水平SoC是通过与领域和信息模型分开处理质量属性来解决的。垂直SoC是通过使用MDA来设计具有适当抽象级别的系统模型,以及它的转换工件来将这些模型从一个抽象级别细化到另一个抽象级别来解决的。此外,IoTA-MD还提供了一个建模工具,以促进CIM和PIM级别的IoT-A模型的设计/维护。
{"title":"IoTA-MD: a model-driven approach for applying QoS attributes in the development of the IoT systems","authors":"Marcelo Pitanga Alves, Flávia Coimbra Delicato, Paulo F. Pires","doi":"10.1145/3019612.3019800","DOIUrl":"https://doi.org/10.1145/3019612.3019800","url":null,"abstract":"This paper presents IoTA-MD, a model-driven approach to instantiate the IoT-A Reference Architecture and manage QoS attributes in the early stages of IoT system modeling. It uses the principle of Separation of Concerns (SoC) to address complexity issues of the IoT system development considering both vertical and horizontal perspectives. The horizontal SoC is addressed by handling quality attributes separately from the Domain and Information models. The vertical SoC is addressed by using MDA to design the system models with the appropriate abstraction level, and its transformation artifacts to refine such models from an abstraction level to other. Moreover, the IoTA-MD provides a modeling tool to facilitate the design/maintenance of the IoT-A models at the CIM and PIM levels.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hierarchical multi-label classification with chained neural networks 链式神经网络的分层多标签分类
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019664
Jonatas Wehrmann, Rodrigo C. Barros, S. N. D. Dôres, R. Cerri
In classification tasks, an object usually belongs to one class within a set of disjoint classes. In more complex tasks, an object can belong to more than one class, in what is conventionally termed multi-label classification. Moreover, there are cases in which the set of classes are organised in a hierarchical fashion, and an object must be associated to a single path in this hierarchy, defining the so-called hierarchical classification. Finally, in even more complex scenarios, the classes are organised in a hierarchical structure and the object can be associated to multiple paths of this hierarchy, defining the problem investigated in this article: hierarchical multi-label classification (HMC). We address a typical problem of HMC, which is protein function prediction, and for that we propose an approach that chains multiple neural networks, performing both local and global optimisation in order to provide the final prediction: one or multiple paths in the hierarchy of classes. We experiment with four variations of this chaining process, and we compare these strategies with the state-of-the-art HMC algorithms for protein function prediction, showing that our novel approach significantly outperforms these methods.
在分类任务中,一个对象通常属于一组互不关联的类中的一个类。在更复杂的任务中,一个对象可以属于多个类,这通常被称为多标签分类。此外,在某些情况下,类集以分层方式组织,并且必须将对象关联到该层次结构中的单个路径,从而定义了所谓的分层分类。最后,在更复杂的场景中,类以层次结构组织,对象可以与该层次结构的多条路径相关联,这就定义了本文研究的问题:层次多标签分类(HMC)。我们解决了HMC的一个典型问题,即蛋白质功能预测,为此我们提出了一种连接多个神经网络的方法,执行局部和全局优化,以提供最终预测:类层次结构中的一条或多条路径。我们实验了这种链化过程的四种变体,并将这些策略与最先进的蛋白质功能预测HMC算法进行了比较,结果表明我们的新方法明显优于这些方法。
{"title":"Hierarchical multi-label classification with chained neural networks","authors":"Jonatas Wehrmann, Rodrigo C. Barros, S. N. D. Dôres, R. Cerri","doi":"10.1145/3019612.3019664","DOIUrl":"https://doi.org/10.1145/3019612.3019664","url":null,"abstract":"In classification tasks, an object usually belongs to one class within a set of disjoint classes. In more complex tasks, an object can belong to more than one class, in what is conventionally termed multi-label classification. Moreover, there are cases in which the set of classes are organised in a hierarchical fashion, and an object must be associated to a single path in this hierarchy, defining the so-called hierarchical classification. Finally, in even more complex scenarios, the classes are organised in a hierarchical structure and the object can be associated to multiple paths of this hierarchy, defining the problem investigated in this article: hierarchical multi-label classification (HMC). We address a typical problem of HMC, which is protein function prediction, and for that we propose an approach that chains multiple neural networks, performing both local and global optimisation in order to provide the final prediction: one or multiple paths in the hierarchy of classes. We experiment with four variations of this chaining process, and we compare these strategies with the state-of-the-art HMC algorithms for protein function prediction, showing that our novel approach significantly outperforms these methods.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73484006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Inference of regulatory networks with MCMC sampler guided by mutual information 互信息引导下MCMC采样器调节网络的推理
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3022189
Nilzair M. Barreto, K. Machado, A. Werhli
Computationally efficient and exact inference of regulatory network topology is an open problem in System Biology. In this work we investigate the use of prior information about the network topology as a guide to a Markov Chain Monte Carlo sampler of network structures. The prior information is obtained from a coarser and faster network inference method, the Relevance Networks with Mutual Information scores. Moreover, the regulatory networks are represented by the Bayesian Networks model. The results show that the use of prior information drastically improves the convergence of the MCMC sampler. Therefore, the use of a more refined method is justified as it is likely to lead to more reliable results with less MCMC iterations.
调节网络拓扑的计算效率和精确推理是系统生物学中的一个开放性问题。在这项工作中,我们研究了使用网络拓扑的先验信息作为网络结构的马尔可夫链蒙特卡罗采样器的指南。先验信息是通过一种更粗糙、更快的网络推理方法获得的,即互信息评分的关联网络。此外,监管网络用贝叶斯网络模型表示。结果表明,先验信息的使用大大提高了MCMC采样器的收敛性。因此,使用更精细的方法是合理的,因为它可能以更少的MCMC迭代产生更可靠的结果。
{"title":"Inference of regulatory networks with MCMC sampler guided by mutual information","authors":"Nilzair M. Barreto, K. Machado, A. Werhli","doi":"10.1145/3019612.3022189","DOIUrl":"https://doi.org/10.1145/3019612.3022189","url":null,"abstract":"Computationally efficient and exact inference of regulatory network topology is an open problem in System Biology. In this work we investigate the use of prior information about the network topology as a guide to a Markov Chain Monte Carlo sampler of network structures. The prior information is obtained from a coarser and faster network inference method, the Relevance Networks with Mutual Information scores. Moreover, the regulatory networks are represented by the Bayesian Networks model. The results show that the use of prior information drastically improves the convergence of the MCMC sampler. Therefore, the use of a more refined method is justified as it is likely to lead to more reliable results with less MCMC iterations.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78749217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards trusted execution of multi-modal continuous authentication schemes 实现多模态连续身份验证方案的可信执行
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019652
Carlton Shepherd, Raja Naeem Akram, K. Markantonakis
The emergence of powerful, sensor-rich devices has led to the development of continuous authentication (CA) schemes using off-the-shelf hardware, where user behaviour is compared to past experience to produce an authentication decision with the aim of addressing challenges with traditional authentication schemes. Current CA proposals, however, have largely neglected adversaries present in a real-world deployment, namely the ubiquity of mal ware and software attacks. This has particular importance when a device cannot be trusted by a third-party, such as a corporation, that controls access to assets based on that decision. A software compromise, either on the scheme implementation or platform, may enable an adversary to modify authentication scores to alter the status of the device in reality, give insights into user behaviour, or gain unauthorised access to restricted assets. Hence, for the first time, we examine two standardised constructs that offer isolated and trusted execution - Secure Elements (SEs) and Trusted Execution Environments (TEEs) - even when an adversary has root-level privileges, and propose measures for providing trusted CA while retaining deployability. Based on these, we implement the first system for evaluating TEE-based CA on a consumer mobile device using Intel SGX, thus providing confidentiality, integrity and trust while removing the main platform from the TCB. We present an empirical evaluation of TEE-and non-TEE performance using methods proposed in related CA schemes. Our results indicate that trusted CA can be provided with no significant performance penalty, and may even offer performance benefits.
功能强大、传感器丰富的设备的出现导致了使用现成硬件的持续身份验证(CA)方案的发展,其中用户行为与过去的经验进行比较,以产生身份验证决策,目的是解决传统身份验证方案的挑战。然而,当前的CA提案在很大程度上忽略了现实部署中的对手,即无处不在的恶意软件和软件攻击。当设备不能被第三方(如公司)信任时,这一点尤为重要,因为第三方根据该决定控制对资产的访问。软件漏洞,无论是在方案实现上还是在平台上,都可能使攻击者修改身份验证分数,从而改变设备在现实中的状态,洞察用户行为,或获得对受限制资产的未经授权访问。因此,我们首次研究了两种提供隔离和可信执行的标准化结构——安全元素(se)和可信执行环境(tee)——即使攻击者具有根级特权,并提出了在保留可部署性的同时提供可信CA的措施。在此基础上,我们实现了第一个使用英特尔SGX在消费者移动设备上评估基于tee的CA的系统,从而在从TCB移除主平台的同时提供保密性、完整性和信任。我们使用相关CA方案中提出的方法对tee和非tee性能进行了实证评估。我们的结果表明,可以在没有显著性能损失的情况下提供可信CA,甚至可以提供性能优势。
{"title":"Towards trusted execution of multi-modal continuous authentication schemes","authors":"Carlton Shepherd, Raja Naeem Akram, K. Markantonakis","doi":"10.1145/3019612.3019652","DOIUrl":"https://doi.org/10.1145/3019612.3019652","url":null,"abstract":"The emergence of powerful, sensor-rich devices has led to the development of continuous authentication (CA) schemes using off-the-shelf hardware, where user behaviour is compared to past experience to produce an authentication decision with the aim of addressing challenges with traditional authentication schemes. Current CA proposals, however, have largely neglected adversaries present in a real-world deployment, namely the ubiquity of mal ware and software attacks. This has particular importance when a device cannot be trusted by a third-party, such as a corporation, that controls access to assets based on that decision. A software compromise, either on the scheme implementation or platform, may enable an adversary to modify authentication scores to alter the status of the device in reality, give insights into user behaviour, or gain unauthorised access to restricted assets. Hence, for the first time, we examine two standardised constructs that offer isolated and trusted execution - Secure Elements (SEs) and Trusted Execution Environments (TEEs) - even when an adversary has root-level privileges, and propose measures for providing trusted CA while retaining deployability. Based on these, we implement the first system for evaluating TEE-based CA on a consumer mobile device using Intel SGX, thus providing confidentiality, integrity and trust while removing the main platform from the TCB. We present an empirical evaluation of TEE-and non-TEE performance using methods proposed in related CA schemes. Our results indicate that trusted CA can be provided with no significant performance penalty, and may even offer performance benefits.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"175 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76992309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Hiding debuggers from malware with apate 用apate隐藏恶意软件的调试器
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019791
Hao Shi, J. Mirkovic
Malware analysis uses debuggers to understand and manipulate the behaviors of stripped binaries. To circumvent analysis, malware applies a variety of anti-debugging techniques, such as self-modifying, checking for or removing breakpoints, hijacking keyboard and mouse events, escaping the debugger, etc. Most state-of-the-art debuggers are vulnerable to these anti-debugging techniques. In this paper, we first systematically analyze the spectrum of possible anti-debugging techniques and compile a list of 79 attack vectors. We then propose a framework, called Apate, which detects and defeats each of these attack vectors, by performing: (1) just-in-time disassembling based on single-stepping, (2) careful monitoring of the debuggee's execution and, when needed, modification of the debuggee's states to hide the debugger's presence. We implement Apate as an extension to WinDbg and extensively evaluate it using five different datasets, with known and new malware samples. Apate outperforms other debugger-hiding technologies by a wide margin, addressing 58+--465+ more attack vectors.
恶意软件分析使用调试器来理解和操纵剥离二进制文件的行为。为了规避分析,恶意软件应用各种反调试技术,如自我修改、检查或删除断点、劫持键盘和鼠标事件、转义调试器等。大多数最先进的调试器都容易受到这些反调试技术的攻击。在本文中,我们首先系统地分析了可能的反调试技术的频谱,并编制了79个攻击向量的列表。然后,我们提出了一个名为Apate的框架,它通过执行:(1)基于单步的实时反汇编,(2)仔细监视被调试程序的执行,并在需要时修改被调试程序的状态以隐藏调试器的存在,来检测并击败这些攻击向量。我们将Apate作为WinDbg的扩展来实现,并使用五种不同的数据集,以及已知的和新的恶意软件样本对其进行了广泛的评估。Apate比其他隐藏调试器的技术性能要好得多,可以处理58+- 465+的攻击向量。
{"title":"Hiding debuggers from malware with apate","authors":"Hao Shi, J. Mirkovic","doi":"10.1145/3019612.3019791","DOIUrl":"https://doi.org/10.1145/3019612.3019791","url":null,"abstract":"Malware analysis uses debuggers to understand and manipulate the behaviors of stripped binaries. To circumvent analysis, malware applies a variety of anti-debugging techniques, such as self-modifying, checking for or removing breakpoints, hijacking keyboard and mouse events, escaping the debugger, etc. Most state-of-the-art debuggers are vulnerable to these anti-debugging techniques. In this paper, we first systematically analyze the spectrum of possible anti-debugging techniques and compile a list of 79 attack vectors. We then propose a framework, called Apate, which detects and defeats each of these attack vectors, by performing: (1) just-in-time disassembling based on single-stepping, (2) careful monitoring of the debuggee's execution and, when needed, modification of the debuggee's states to hide the debugger's presence. We implement Apate as an extension to WinDbg and extensively evaluate it using five different datasets, with known and new malware samples. Apate outperforms other debugger-hiding technologies by a wide margin, addressing 58+--465+ more attack vectors.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88221778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A smart MobiWeb mashup trip planner tool 一个智能MobiWeb混搭旅行计划工具
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019917
Marwa Boulakbech, Nizar Messai, Yacine Sam, T. Devogele
A wide range of Mobile Web-based applications are nowadays being built and proposed as mashup applications. Their aim is to be intuitive enough to be easily created by end-users directly selecting interactive elements, content and functionalities from existing resources, without requiring any technical skills. We propose in this article a Mobile Web Trip Planner Tool that mashups heterogeneous online travel information provided from multiple Restful Web services to recommend custom visit plans. This application takes into account tourist preferences (type of stay, interest) and constraints (duration, budget, locomotion modality). Moreover, it considers real-time events (e.g., weather data or temporary unavailability of a touristic site) to adapt proposed schedules.
现在,大量基于web的移动应用程序被构建并作为mashup应用程序提出。它们的目标是足够直观,以便最终用户可以直接从现有资源中选择交互元素、内容和功能,而不需要任何技术技能。在本文中,我们提出了一个移动Web旅行计划工具,它将来自多个rest式Web服务提供的异构在线旅行信息混搭在一起,以推荐定制的旅行计划。该应用程序考虑了游客的偏好(逗留类型、兴趣)和限制(持续时间、预算、移动方式)。此外,它考虑实时事件(例如,天气数据或旅游地点暂时不可用)以适应拟议的时间表。
{"title":"A smart MobiWeb mashup trip planner tool","authors":"Marwa Boulakbech, Nizar Messai, Yacine Sam, T. Devogele","doi":"10.1145/3019612.3019917","DOIUrl":"https://doi.org/10.1145/3019612.3019917","url":null,"abstract":"A wide range of Mobile Web-based applications are nowadays being built and proposed as mashup applications. Their aim is to be intuitive enough to be easily created by end-users directly selecting interactive elements, content and functionalities from existing resources, without requiring any technical skills. We propose in this article a Mobile Web Trip Planner Tool that mashups heterogeneous online travel information provided from multiple Restful Web services to recommend custom visit plans. This application takes into account tourist preferences (type of stay, interest) and constraints (duration, budget, locomotion modality). Moreover, it considers real-time events (e.g., weather data or temporary unavailability of a touristic site) to adapt proposed schedules.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88655136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next generation JDBC database drivers for performance, transparent caching, load balancing, and scale-out 下一代JDBC数据库驱动程序的性能、透明缓存、负载平衡和横向扩展
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019870
R. Lawrence, Erik Brandsberg, R. Lee
Despite having a significant impact on overall data system performance, database drivers connecting the application to the database system have not innovated at the same pace as the database systems themselves. This work describes a database driver designed for the requirements of cloud-based systems requiring flexibility, high availability, scaling, and performance. The unique contribution is a rule-based query routing system that supports real-time configurations and optimizations without requiring any changes to the application code or database system. With the increasing migration of applications and databases to the cloud as well as different database technologies such as NoSQL systems, this flexibility allows application owners to optimize and migrate legacy applications to exploit the advantages of new database technologies. Experimental results demonstrate how queries cached by the driver can improve query response times by an order of magnitude and reduce the overall load on the database system by up to 50+.
尽管对整体数据系统性能有重大影响,但是连接应用程序到数据库系统的数据库驱动程序并没有像数据库系统本身那样创新。这项工作描述了一个数据库驱动程序,它是为需要灵活性、高可用性、可伸缩性和性能的基于云的系统的需求而设计的。唯一的贡献是一个基于规则的查询路由系统,它支持实时配置和优化,而不需要对应用程序代码或数据库系统进行任何更改。随着越来越多的应用程序和数据库迁移到云以及不同的数据库技术(如NoSQL系统),这种灵活性允许应用程序所有者优化和迁移遗留应用程序,以利用新数据库技术的优势。实验结果表明,驱动程序缓存的查询可以将查询响应时间提高一个数量级,并将数据库系统的总体负载减少50%以上。
{"title":"Next generation JDBC database drivers for performance, transparent caching, load balancing, and scale-out","authors":"R. Lawrence, Erik Brandsberg, R. Lee","doi":"10.1145/3019612.3019870","DOIUrl":"https://doi.org/10.1145/3019612.3019870","url":null,"abstract":"Despite having a significant impact on overall data system performance, database drivers connecting the application to the database system have not innovated at the same pace as the database systems themselves. This work describes a database driver designed for the requirements of cloud-based systems requiring flexibility, high availability, scaling, and performance. The unique contribution is a rule-based query routing system that supports real-time configurations and optimizations without requiring any changes to the application code or database system. With the increasing migration of applications and databases to the cloud as well as different database technologies such as NoSQL systems, this flexibility allows application owners to optimize and migrate legacy applications to exploit the advantages of new database technologies. Experimental results demonstrate how queries cached by the driver can improve query response times by an order of magnitude and reduce the overall load on the database system by up to 50+.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"862 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88661063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
HyViDE: a framework for virtual data center network embedding HyViDE:虚拟数据中心网络嵌入框架
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019629
M. Gilesh, S. D. M. Kumar, L. Jacob
Cloud computing technologies have matured enough that the service providers are compelled to migrate their services to virtualized infrastructure in cloud data centers. However, moving the computation and network to shared physical infrastructure poses a multitude of questions, both for service providers and for data center owners. In this work, we propose HyViDE - a framework for optimal placement of multiple virtual data center networks on a physical data center network. HyViDE preselects a subset of virtual data center network requests and uses a hybrid strategy for embedding them on the physical data center. Coordinated static and dynamic embedding algorithms are used in this hybrid framework to minimize the rejection of requests and fulfill QoS demands of the embedded networks. HyViDE can employ suitable static and dynamic strategies to meet the objectives of data center owners and customers. Experimental evaluation of our algorithms on HyViDE shows that, the acceptance rate is high with faster servicing of requests.
云计算技术已经足够成熟,服务提供商不得不将其服务迁移到云数据中心的虚拟化基础设施中。然而,将计算和网络转移到共享的物理基础设施会给服务提供商和数据中心所有者带来许多问题。在这项工作中,我们提出了HyViDE -一个在物理数据中心网络上优化放置多个虚拟数据中心网络的框架。HyViDE预先选择虚拟数据中心网络请求的子集,并使用混合策略将它们嵌入到物理数据中心。该混合框架采用了静态和动态的协调嵌入算法,最大限度地减少了请求的拒绝,满足了嵌入式网络的QoS要求。HyViDE可以采用合适的静态和动态策略来满足数据中心所有者和客户的目标。在HyViDE上的实验评估表明,我们的算法具有较高的接受率和更快的请求服务速度。
{"title":"HyViDE: a framework for virtual data center network embedding","authors":"M. Gilesh, S. D. M. Kumar, L. Jacob","doi":"10.1145/3019612.3019629","DOIUrl":"https://doi.org/10.1145/3019612.3019629","url":null,"abstract":"Cloud computing technologies have matured enough that the service providers are compelled to migrate their services to virtualized infrastructure in cloud data centers. However, moving the computation and network to shared physical infrastructure poses a multitude of questions, both for service providers and for data center owners. In this work, we propose HyViDE - a framework for optimal placement of multiple virtual data center networks on a physical data center network. HyViDE preselects a subset of virtual data center network requests and uses a hybrid strategy for embedding them on the physical data center. Coordinated static and dynamic embedding algorithms are used in this hybrid framework to minimize the rejection of requests and fulfill QoS demands of the embedded networks. HyViDE can employ suitable static and dynamic strategies to meet the objectives of data center owners and customers. Experimental evaluation of our algorithms on HyViDE shows that, the acceptance rate is high with faster servicing of requests.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84947603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the Symposium on Applied Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1