首页 > 最新文献

2008 Advanced Software Engineering and Its Applications最新文献

英文 中文
Progress and Quality Modeling of Requirements Analysis Based on Chaos 基于混沌的需求分析过程与质量建模
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.22
Junwei Ge, Yiqiu Fang
It is important and difficult for us to know the progress and quality of requirements analysis. We introduce chaos and software requirements complexity to the description of requirements decomposing, and get a method which can help us to evaluate the progress and quality. The model shows that requirements decomposing procedure has its own regular pattern which we can describe in a equation and track in a trajectory. The requirements analysis process of a software system can be taken as normal if its trajectory coincide with the model. We may be able to predict the time we need to finish all requirements decomposition in advance based on the model. We apply the method in the requirements analysis of homephone service management system, and the initial results show that the method is useful in the evaluation of requirements decomposition.
了解需求分析的进度和质量对我们来说既重要又困难。将混沌和软件需求复杂性引入需求分解的描述中,得到了一种能够帮助我们评价需求分解的进度和质量的方法。模型表明,需求分解过程具有一定的规律,可以用方程来描述,用轨迹来跟踪。如果一个软件系统的需求分析过程的轨迹与模型一致,则可以认为它是正常的。我们可以根据模型提前预测完成所有需求分解所需的时间。将该方法应用于家庭电话业务管理系统的需求分析中,初步结果表明该方法可用于需求分解的评价。
{"title":"Progress and Quality Modeling of Requirements Analysis Based on Chaos","authors":"Junwei Ge, Yiqiu Fang","doi":"10.1109/ASEA.2008.22","DOIUrl":"https://doi.org/10.1109/ASEA.2008.22","url":null,"abstract":"It is important and difficult for us to know the progress and quality of requirements analysis. We introduce chaos and software requirements complexity to the description of requirements decomposing, and get a method which can help us to evaluate the progress and quality. The model shows that requirements decomposing procedure has its own regular pattern which we can describe in a equation and track in a trajectory. The requirements analysis process of a software system can be taken as normal if its trajectory coincide with the model. We may be able to predict the time we need to finish all requirements decomposition in advance based on the model. We apply the method in the requirements analysis of homephone service management system, and the initial results show that the method is useful in the evaluation of requirements decomposition.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Garbage Collection Schemes for Flash-Based Linux Swap System 基于flash的Linux交换系统垃圾收集方案研究
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.55
Sohyang Ko, Seonsoo Jun, Kiyong Kim, Yeonseung Ryu
NAND flash memory based SSDs (solid state disks) have become an alternative storage device for future computer systems. Legacy operating system functionalities like file system and virtual memory system should be carefully re-designed since flash memory cannot be overwritten unless erased in advance. In this paper, we study the performance of garbage collection schemes when flash memory is used as the Linux swap storage. We have collected swap I/O traces from Linux kernel and performed trace-driven simulation. We found that Linux swap system must be re-designed in order to use flash memory as swap storage.
基于NAND闪存的ssd(固态磁盘)已经成为未来计算机系统的一种替代存储设备。传统的操作系统功能,如文件系统和虚拟内存系统应该仔细地重新设计,因为闪存不能被覆盖,除非提前擦除。在本文中,我们研究了当闪存作为Linux交换存储时,垃圾收集方案的性能。我们收集了来自Linux内核的交换I/O跟踪,并进行了跟踪驱动模拟。我们发现Linux交换系统必须重新设计,以便使用闪存作为交换存储。
{"title":"Study on Garbage Collection Schemes for Flash-Based Linux Swap System","authors":"Sohyang Ko, Seonsoo Jun, Kiyong Kim, Yeonseung Ryu","doi":"10.1109/ASEA.2008.55","DOIUrl":"https://doi.org/10.1109/ASEA.2008.55","url":null,"abstract":"NAND flash memory based SSDs (solid state disks) have become an alternative storage device for future computer systems. Legacy operating system functionalities like file system and virtual memory system should be carefully re-designed since flash memory cannot be overwritten unless erased in advance. In this paper, we study the performance of garbage collection schemes when flash memory is used as the Linux swap storage. We have collected swap I/O traces from Linux kernel and performed trace-driven simulation. We found that Linux swap system must be re-designed in order to use flash memory as swap storage.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Factors Contribute to High Costs of Software Projects 导致软件项目高成本的因素
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.38
Jie Liu, Xiaobin Li
In the software industry, an unsuccessful software development project bears the characteristics that it would have fewer features, be late, and be over budget. We participated in a project that suffered all the three characteristics. Looking back, we realized that we have made many wrong decisions. This paper, serving as a case study, discusses these mistakes, especially the major ones that contributed to the failure. The hope is that readers can benefit from the lessons we have learned in their future software development projects and have a better chance to make right decisions in similar situations.
在软件行业中,一个不成功的软件开发项目具有以下特征:功能较少、开发时间较晚、超出预算。我们参与了一个具有所有这三个特征的项目。回顾过去,我们意识到我们做了许多错误的决定。本文作为一个案例,讨论了这些错误,特别是导致失败的主要错误。希望读者可以从我们在他们未来的软件开发项目中学到的经验教训中受益,并且在类似的情况下有更好的机会做出正确的决定。
{"title":"Factors Contribute to High Costs of Software Projects","authors":"Jie Liu, Xiaobin Li","doi":"10.1109/ASEA.2008.38","DOIUrl":"https://doi.org/10.1109/ASEA.2008.38","url":null,"abstract":"In the software industry, an unsuccessful software development project bears the characteristics that it would have fewer features, be late, and be over budget. We participated in a project that suffered all the three characteristics. Looking back, we realized that we have made many wrong decisions. This paper, serving as a case study, discusses these mistakes, especially the major ones that contributed to the failure. The hope is that readers can benefit from the lessons we have learned in their future software development projects and have a better chance to make right decisions in similar situations.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Dynamic Impact Analysis Approach for Object-Oriented Programs 面向对象程序的动态影响分析方法
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.62
Lulu Huang, Yeong-Tae Song
Dynamic impact analysis produces more precise results than static impact analysis [1]. However, existing dynamic impact analysis techniques [2,3,4] do not consider the differences of object-oriented (OO) programs from procedural programs. We introduced a dynamic impact analysis approach [5] for OO programs that considers the unique features of OO programs compared to procedural ones and the dependency relationships of OO runtime program entities. In this paper, we present the further improved approach with the ability to identify runtime OO inheritance relationships. Furthermore, we present the implementation of our approach - a tool named Javatrade dynamic impact analyzer (JDIA) that can perform dynamic impact analysis for Java programs residing in a local or a remote Java virtual machine (JVM). Empirical studies of JDIA are presented to show that our approach produces more precise results than the existing dynamic impact analysis techniques by performing dependency analysis.
动态冲击分析的结果比静态冲击分析更为精确[1]。然而,现有的动态影响分析技术[2,3,4]并没有考虑面向对象(OO)程序与过程性程序的区别。我们为面向对象程序引入了一种动态影响分析方法[5],该方法考虑了面向对象程序相对于过程程序的独特特性以及面向对象运行时程序实体之间的依赖关系。在本文中,我们提出了进一步改进的方法,该方法具有识别运行时OO继承关系的能力。此外,我们还介绍了我们的方法的实现——一个名为Javatrade动态影响分析器(JDIA)的工具,它可以对驻留在本地或远程Java虚拟机(JVM)中的Java程序执行动态影响分析。JDIA的实证研究表明,通过执行依赖分析,我们的方法比现有的动态影响分析技术产生更精确的结果。
{"title":"A Dynamic Impact Analysis Approach for Object-Oriented Programs","authors":"Lulu Huang, Yeong-Tae Song","doi":"10.1109/ASEA.2008.62","DOIUrl":"https://doi.org/10.1109/ASEA.2008.62","url":null,"abstract":"Dynamic impact analysis produces more precise results than static impact analysis [1]. However, existing dynamic impact analysis techniques [2,3,4] do not consider the differences of object-oriented (OO) programs from procedural programs. We introduced a dynamic impact analysis approach [5] for OO programs that considers the unique features of OO programs compared to procedural ones and the dependency relationships of OO runtime program entities. In this paper, we present the further improved approach with the ability to identify runtime OO inheritance relationships. Furthermore, we present the implementation of our approach - a tool named Javatrade dynamic impact analyzer (JDIA) that can perform dynamic impact analysis for Java programs residing in a local or a remote Java virtual machine (JVM). Empirical studies of JDIA are presented to show that our approach produces more precise results than the existing dynamic impact analysis techniques by performing dependency analysis.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115044822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Development of the Retargetable Tool Suite for Embedded Software 嵌入式软件可重定向工具套件的开发
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.10
K. Kwangman
In order to construct the most suitable embedded software development environment, we design and implements the Retargetable Tool Suite for Embedded Software (RTS-ES) composed of target code generator, low power/energy optimizer, system simulator and debugger through the proposed Embedded Processor Description Language (EPDL).
为了构建最适合的嵌入式软件开发环境,我们通过提出的嵌入式处理器描述语言(embedded Processor Description Language, EPDL)设计并实现了由目标代码生成器、低功耗优化器、系统模拟器和调试器组成的嵌入式软件可重定向工具套件(RTS-ES)。
{"title":"Development of the Retargetable Tool Suite for Embedded Software","authors":"K. Kwangman","doi":"10.1109/ASEA.2008.10","DOIUrl":"https://doi.org/10.1109/ASEA.2008.10","url":null,"abstract":"In order to construct the most suitable embedded software development environment, we design and implements the Retargetable Tool Suite for Embedded Software (RTS-ES) composed of target code generator, low power/energy optimizer, system simulator and debugger through the proposed Embedded Processor Description Language (EPDL).","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Three Dimensional Node Deployment for Sensor Network 传感器网络的三维节点部署
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.63
I. Choi, Jin Seok Park, Kyeong-hyo Lee, Byeong-Kyun Oh
A low-power sensor node in WSN requires minimum consumption of energy. It is essential to establish key to reduce the effect when the sensor node is revealed. This paper propose the protocol of pairwise key establishment between sensor node. The proposed method increases the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency than the plane allocation. This paper discusses the key management for secure communication between sensor nodes after sensor allocation. We propose the protocol of pairwise key establishment scheme using bivariate polynomial based on cluster in order to safety against attack by revealing of node. The proposed method guarantee the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency.
在无线传感器网络中,低功耗传感器节点需要最小的能量消耗。为了减少传感器节点暴露时的影响,必须建立密钥。本文提出了传感器节点间的密钥配对建立协议。该方法通过对网络进行三维聚类,提高了网络的可用性,与平面分配相比,具有更少的路径数量和更高的能量效率。本文讨论了传感器分配后传感器节点间安全通信的密钥管理问题。为了防止节点泄露攻击,提出了基于聚类的二元多项式配对密钥建立方案。该方法通过对网络进行三维聚类来保证网络的可用性,具有路径数量少、能效高的优点。
{"title":"The Three Dimensional Node Deployment for Sensor Network","authors":"I. Choi, Jin Seok Park, Kyeong-hyo Lee, Byeong-Kyun Oh","doi":"10.1109/ASEA.2008.63","DOIUrl":"https://doi.org/10.1109/ASEA.2008.63","url":null,"abstract":"A low-power sensor node in WSN requires minimum consumption of energy. It is essential to establish key to reduce the effect when the sensor node is revealed. This paper propose the protocol of pairwise key establishment between sensor node. The proposed method increases the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency than the plane allocation. This paper discusses the key management for secure communication between sensor nodes after sensor allocation. We propose the protocol of pairwise key establishment scheme using bivariate polynomial based on cluster in order to safety against attack by revealing of node. The proposed method guarantee the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UML Modeling for the Workflow Engine Using Wf-XML Resource 使用Wf-XML资源的工作流引擎UML建模
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.50
Hyejin Jeong, Myung-Ju Shin, Yong-Sung Kim
A series of business processes, based on Wf-XML, executing cooperatively and sharing information among customers, suppliers and business partners are used in electronic commerce. Wf-XML (Workflow-XML) is an asynchronous Web service protocol. A language defining XML-based protocol is suggested for the mutual linkage of the workflow engine. In this paper, the model is proposed to model the UML diagram on the resource model provided in Wf-XML to link different workflow engines. It facilitates understanding workflow for links and cooperation between enterprises.
电子商务中使用了一系列基于Wf-XML的业务流程,它们在客户、供应商和业务伙伴之间协同执行和共享信息。Wf-XML(工作流- xml)是一个异步Web服务协议。提出了一种定义基于xml协议的语言,用于工作流引擎的相互链接。本文提出了基于Wf-XML提供的资源模型对UML图进行建模的模型,以连接不同的工作流引擎。它有助于理解企业之间的联系和合作的工作流程。
{"title":"UML Modeling for the Workflow Engine Using Wf-XML Resource","authors":"Hyejin Jeong, Myung-Ju Shin, Yong-Sung Kim","doi":"10.1109/ASEA.2008.50","DOIUrl":"https://doi.org/10.1109/ASEA.2008.50","url":null,"abstract":"A series of business processes, based on Wf-XML, executing cooperatively and sharing information among customers, suppliers and business partners are used in electronic commerce. Wf-XML (Workflow-XML) is an asynchronous Web service protocol. A language defining XML-based protocol is suggested for the mutual linkage of the workflow engine. In this paper, the model is proposed to model the UML diagram on the resource model provided in Wf-XML to link different workflow engines. It facilitates understanding workflow for links and cooperation between enterprises.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CAWET: A Tool of Context-Aware Workflow with Hand-Held Devices CAWET:手持设备的上下文感知工作流工具
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.44
Peng Li, Yongyun Cho, Jaeyoung Choi
Hand-held devices are rapidly becoming a common technology at work, school, and play. The technologies related with hand-held devices have widely applied to the areas of ubiquitous computing or embedded computing. In recent years, context-aware computing is rapidly developing and can bring important benefits such as interaction with computation by explicit acts of communication and implicit context. In this paper, we present CAWET (Context-Aware Workflow Editor Tool), a context-aware, adaptive and personalized development tool that can edit userpsilas current context information in ubiquitous computing environment through hand-held devices. In order to enhance the support offered by hand-held devices to users, enhanced convenience, more services and functionalities will be added into an initial workflow scenario without interfering workflow services. CAWET architecture provides context-aware information by using uWDL document as the context, which is not only used to express context data but also relation information among services into the fields of its nodes. The suggested CAWET uses an algorithm for context comparison between context sub-tree and userpsilas situation information. The algorithm selects a context that has values and types entirely equal to those of the userpsilas contexts.
手持设备正迅速成为工作、学习和娱乐中的一种常见技术。手持设备相关技术已广泛应用于普适计算或嵌入式计算领域。近年来,上下文感知计算得到了迅速发展,并通过显式通信行为和隐式上下文带来了与计算交互等重要好处。在本文中,我们提出了CAWET(上下文感知工作流编辑工具),这是一个上下文感知,自适应和个性化的开发工具,可以通过手持设备在泛在计算环境中编辑用户的当前上下文信息。为了增强手持设备对用户的支持,在不干扰工作流服务的情况下,将在初始工作流场景中添加更多的便利性、服务和功能。CAWET架构通过使用uWDL文档作为上下文来提供上下文感知信息,它不仅用于表示上下文数据,还用于将服务之间的关系信息表示到其节点的字段中。建议的CAWET使用一种算法在上下文子树和用户的情况信息之间进行上下文比较。该算法选择的上下文的值和类型完全等于userpsilas上下文的值和类型。
{"title":"CAWET: A Tool of Context-Aware Workflow with Hand-Held Devices","authors":"Peng Li, Yongyun Cho, Jaeyoung Choi","doi":"10.1109/ASEA.2008.44","DOIUrl":"https://doi.org/10.1109/ASEA.2008.44","url":null,"abstract":"Hand-held devices are rapidly becoming a common technology at work, school, and play. The technologies related with hand-held devices have widely applied to the areas of ubiquitous computing or embedded computing. In recent years, context-aware computing is rapidly developing and can bring important benefits such as interaction with computation by explicit acts of communication and implicit context. In this paper, we present CAWET (Context-Aware Workflow Editor Tool), a context-aware, adaptive and personalized development tool that can edit userpsilas current context information in ubiquitous computing environment through hand-held devices. In order to enhance the support offered by hand-held devices to users, enhanced convenience, more services and functionalities will be added into an initial workflow scenario without interfering workflow services. CAWET architecture provides context-aware information by using uWDL document as the context, which is not only used to express context data but also relation information among services into the fields of its nodes. The suggested CAWET uses an algorithm for context comparison between context sub-tree and userpsilas situation information. The algorithm selects a context that has values and types entirely equal to those of the userpsilas contexts.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization 基于图像分类的犯罪嫌疑人数字证据法医调查
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.19
Youngsoo Kim, Dowon Hong, Dong-Hyun Won
In computer crimes, even in general crimes, important evidence or clues are increasingly stored in a variety of electronic media, such as computer or mobile devices. The digital data is easily duplicated and it is difficult to discriminate the original from a copy. Further, the digital data can be easily falsified, changed, or deleted from the original data. Therefore, criminal investigations need high level forensic technologies to get better evidences from digital data in suspectspsila computers. This paper is about forensic analyses for digital evidences including a lot of images like pictures and photos. Usually forensic examiners open to check every image files included at hard disks of suspectspsila computers or memory cards. If they have huge amount of images, it takes too much time to check and analyze them. Therefore we use an image filter applying a learning model to divide them into some categories automatically. Through this way, forensic examiners can check out only related image files and then reduce analyzing time. Since, in advance, forensic examiners make some categories for classifying images and input and learn huge amount of image samples to this image filter, accuracy for classifying image files could be improved.
在计算机犯罪中,甚至在一般犯罪中,重要的证据或线索越来越多地存储在各种电子媒介中,如计算机或移动设备。数字数据很容易被复制,很难区分真伪。此外,数字数据可以很容易地从原始数据中伪造、更改或删除。因此,刑事侦查需要高水平的取证技术,才能更好地从嫌疑人的计算机数据中获取证据。本文是关于数字证据的法医分析,包括大量的图像,如图片和照片。通常,法医会打开检查嫌疑人的硬盘、电脑或存储卡上的每个图像文件。如果他们有大量的图像,检查和分析它们需要花费太多的时间。因此,我们使用了一个图像过滤器,应用学习模型将它们自动划分为若干类别。通过这种方式,法医鉴定人员可以只检查相关的图像文件,从而减少分析时间。由于法医事先对图像进行分类,并将大量的图像样本输入和学习到该图像滤波器中,因此可以提高图像文件分类的准确性。
{"title":"A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization","authors":"Youngsoo Kim, Dowon Hong, Dong-Hyun Won","doi":"10.1109/ASEA.2008.19","DOIUrl":"https://doi.org/10.1109/ASEA.2008.19","url":null,"abstract":"In computer crimes, even in general crimes, important evidence or clues are increasingly stored in a variety of electronic media, such as computer or mobile devices. The digital data is easily duplicated and it is difficult to discriminate the original from a copy. Further, the digital data can be easily falsified, changed, or deleted from the original data. Therefore, criminal investigations need high level forensic technologies to get better evidences from digital data in suspectspsila computers. This paper is about forensic analyses for digital evidences including a lot of images like pictures and photos. Usually forensic examiners open to check every image files included at hard disks of suspectspsila computers or memory cards. If they have huge amount of images, it takes too much time to check and analyze them. Therefore we use an image filter applying a learning model to divide them into some categories automatically. Through this way, forensic examiners can check out only related image files and then reduce analyzing time. Since, in advance, forensic examiners make some categories for classifying images and input and learn huge amount of image samples to this image filter, accuracy for classifying image files could be improved.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131775464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal Representations of the Data Flow Diagram: A Survey 数据流程图的形式化表示:综述
Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.34
A.A.A. Jilanic, A. Nadeem, Tai-hoon Kim, Eun-suk Cho
Structured analysis and design methodology has now been replaced by object oriented analysis and design software development techniques. A major design artifact in structured approach is the data flow diagram (DFD). DFD is very important for the modernization of old legacy systems. It is also very useful in requirement elicitation. However, DFD lacks formalism and by representing DFD formally, ambiguity and inconsistencies can be removed. Formal representation of DFD and its formal semantics help in better understanding of requirements and design. In this paper, we present a survey of techniques that formally represent or give formal semantics to the data flow diagram. We analyze formal representation techniques using analysis parameters. On the basis of identified parameters, we present an analysis table, which describes the strengths and weaknesses of representation techniques.
结构化分析和设计方法现在已经被面向对象的分析和设计软件开发技术所取代。结构化方法中的一个主要设计工件是数据流程图(DFD)。DFD对于旧的遗留系统的现代化非常重要。它在需求引出中也非常有用。然而,DFD缺乏形式主义,通过正式表示DFD,可以消除歧义和不一致。DFD的形式化表示及其形式化语义有助于更好地理解需求和设计。在本文中,我们提出了正式表示或给予数据流图形式化语义的技术综述。我们使用分析参数分析形式化表示技术。在识别参数的基础上,我们给出了一个分析表,其中描述了表示技术的优缺点。
{"title":"Formal Representations of the Data Flow Diagram: A Survey","authors":"A.A.A. Jilanic, A. Nadeem, Tai-hoon Kim, Eun-suk Cho","doi":"10.1109/ASEA.2008.34","DOIUrl":"https://doi.org/10.1109/ASEA.2008.34","url":null,"abstract":"Structured analysis and design methodology has now been replaced by object oriented analysis and design software development techniques. A major design artifact in structured approach is the data flow diagram (DFD). DFD is very important for the modernization of old legacy systems. It is also very useful in requirement elicitation. However, DFD lacks formalism and by representing DFD formally, ambiguity and inconsistencies can be removed. Formal representation of DFD and its formal semantics help in better understanding of requirements and design. In this paper, we present a survey of techniques that formally represent or give formal semantics to the data flow diagram. We analyze formal representation techniques using analysis parameters. On the basis of identified parameters, we present an analysis table, which describes the strengths and weaknesses of representation techniques.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2008 Advanced Software Engineering and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1