首页 > 最新文献

15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)最新文献

英文 中文
A source code plagiarism detecting method using alignment with abstract syntax tree elements 一个源代码剽窃检测方法,使用与抽象语法树元素对齐
Hiroshi Kikuchi, T. Goto, Mitsuo Wakatsuki, T. Nishino
Learning to program is an important subject in computer science courses. During programming exercises, plagiarism by copying and pasting can lead to problems for fair evaluation. Some methods of plagiarism detection are currently available, such as sim. However, because sim is easily influenced by changing the identifier or program statement order, it fails to do enough to support plagiarism detection. In this paper, we propose a plagiarism detection method which is not influenced by changing the identifier or program statement order. We also explain our method's capabilities by comparing it to the sim plagiarism detector. Furthermore, we reveal how our method successfully detects the presence of plagiarism.
学习编程是计算机科学课程中的一门重要学科。在编程练习中,抄袭和粘贴会导致公平评估的问题。目前已有一些检测抄袭的方法,如sim。然而,由于sim很容易受到更改标识符或程序语句顺序的影响,因此它无法提供足够的抄袭检测支持。在本文中,我们提出了一种不受改变标识符或程序语句顺序影响的抄袭检测方法。我们还通过将其与sim抄袭检测器进行比较来解释我们的方法的功能。此外,我们揭示了我们的方法如何成功地检测到抄袭的存在。
{"title":"A source code plagiarism detecting method using alignment with abstract syntax tree elements","authors":"Hiroshi Kikuchi, T. Goto, Mitsuo Wakatsuki, T. Nishino","doi":"10.1109/SNPD.2014.6888733","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888733","url":null,"abstract":"Learning to program is an important subject in computer science courses. During programming exercises, plagiarism by copying and pasting can lead to problems for fair evaluation. Some methods of plagiarism detection are currently available, such as sim. However, because sim is easily influenced by changing the identifier or program statement order, it fails to do enough to support plagiarism detection. In this paper, we propose a plagiarism detection method which is not influenced by changing the identifier or program statement order. We also explain our method's capabilities by comparing it to the sim plagiarism detector. Furthermore, we reveal how our method successfully detects the presence of plagiarism.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Development of Leaving-bed Detection System to Prevent Midnight Prowl 防止午夜潜行的离床检测系统的研制
Y. Takahashi, Yuhki Kitazono, Shota Nakashima
In this study, we developed Leaving-bed Detection System to Prevent Midnight Prowl and checked the operation of the system constructed. First, installed the camera on the ceiling, get depth information in the field of view, and also get background's depth information. The detection of human get up was performed by taking the difference between the depth and the current depth of the background. Converted into numeric depth information a distance from the camera to be retrieved as a string, and obtains the height of the object from the difference between them. Take a threshold value than the height that was acquired to detect anything more than a certain height, and also in after removing those narrow areas coordinates from the coordinates, and performs the tracking to obtain the center coordinates of the target. However, in view of the error occurring in the case of detecting a plurality of persons, human tracking is performed after the extraction of the target person by labeling process. We went from the center point when the track is interrupted the entry and exit detection.
在本研究中,我们开发了防止午夜潜行的离床检测系统,并检查了所构建的系统的运行情况。首先,将摄像头安装在天花板上,获取视野深度信息,同时获取背景深度信息。利用背景深度与当前深度的差值对人体进行检测。将距离相机的距离转换为数字深度信息,以字符串形式检索,并从两者之间的差中获得物体的高度。在获得的高度之外取一个阈值,检测超过一定高度的物体,并在将这些狭窄区域的坐标从坐标中去除后,进行跟踪,得到目标的中心坐标。然而,鉴于在检测多人的情况下会出现错误,因此,在通过标记处理提取目标人之后进行人体跟踪。我们从中心点出发,当轨道被中断时进行进出探测。
{"title":"Development of Leaving-bed Detection System to Prevent Midnight Prowl","authors":"Y. Takahashi, Yuhki Kitazono, Shota Nakashima","doi":"10.1109/SNPD.2014.6888740","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888740","url":null,"abstract":"In this study, we developed Leaving-bed Detection System to Prevent Midnight Prowl and checked the operation of the system constructed. First, installed the camera on the ceiling, get depth information in the field of view, and also get background's depth information. The detection of human get up was performed by taking the difference between the depth and the current depth of the background. Converted into numeric depth information a distance from the camera to be retrieved as a string, and obtains the height of the object from the difference between them. Take a threshold value than the height that was acquired to detect anything more than a certain height, and also in after removing those narrow areas coordinates from the coordinates, and performs the tracking to obtain the center coordinates of the target. However, in view of the error occurring in the case of detecting a plurality of persons, human tracking is performed after the extraction of the target person by labeling process. We went from the center point when the track is interrupted the entry and exit detection.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"53 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communication 内存中的大数据:在内存数据库中使用分布式键值存储进行机器对机器通信的基准测试
M. Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi
The Universal Communication Research Institute (UCRI), NICT conducts research and development on universal communication technologies: multi-lingual machine translation, spoken dialogue, information analysis and ultra-realistic interaction technologies, through which people can truly interconnect, anytime, anywhere, about any topic, and by any method, transcending the boundaries of language, culture, ability and distance. To enhance the universal communication technology, we are trying to develop a large-scale information infrastructure which collects and stores diverse information including huge volumes of web pages from the networks. The one of most important key technologies to realize a large-scaled information infrastructure is a distributed in memory database system. In this paper, we introduced a large-scale information infrastructure, mainly explaining a distributed in-memory database system “okuyama” which is a key technology on our project. We examined the I/O performance of the in memory storage, which verified whether if “okuyama” meet requirements for the infrastructure. Furthermore we give a blueprint of cluster systems on which the infrastructure will be constructed.
NICT的通用通信研究所(Universal Communication Research Institute, UCRI)致力于研究和开发通用通信技术:多语言机器翻译、口语对话、信息分析和超现实交互技术,使人们能够超越语言、文化、能力和距离的界限,在任何时间、任何地点、任何话题、以任何方式实现真正的互联互通。为了提高通用通信技术,我们正在尝试开发一个大规模的信息基础设施,以收集和存储来自网络的各种信息,包括大量的网页。分布式内存数据库系统是实现大规模信息基础设施的关键技术之一。本文介绍了一种大规模的信息基础设施,重点阐述了分布式内存数据库系统“okuyama”,这是本项目的关键技术。我们检查了内存存储的I/O性能,验证了“okuyama”是否满足基础设施的要求。此外,我们还给出了构建基础设施的集群系统的蓝图。
{"title":"Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communication","authors":"M. Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi","doi":"10.1109/SNPD.2014.6888748","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888748","url":null,"abstract":"The Universal Communication Research Institute (UCRI), NICT conducts research and development on universal communication technologies: multi-lingual machine translation, spoken dialogue, information analysis and ultra-realistic interaction technologies, through which people can truly interconnect, anytime, anywhere, about any topic, and by any method, transcending the boundaries of language, culture, ability and distance. To enhance the universal communication technology, we are trying to develop a large-scale information infrastructure which collects and stores diverse information including huge volumes of web pages from the networks. The one of most important key technologies to realize a large-scaled information infrastructure is a distributed in memory database system. In this paper, we introduced a large-scale information infrastructure, mainly explaining a distributed in-memory database system “okuyama” which is a key technology on our project. We examined the I/O performance of the in memory storage, which verified whether if “okuyama” meet requirements for the infrastructure. Furthermore we give a blueprint of cluster systems on which the infrastructure will be constructed.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software ontology design to support organized open source software development 软件本体设计支持有组织的开源软件开发
Md. Mahfuzus Salam Khan, Md. Anwarus Salam Khan, T. Goto, T. Nishino, N. Debnath
In the field of software engineering, a very old and important issue is how to understand the software. Understanding software means more than understanding the source code; it also refers to the other facts related to that particular software. Sometimes even experienced developers can be overwhelmed by a project's extensive development capabilities. In the development process, project leaders (PLs) have overall knowledge about the project and are keenly aware of its vision. Other members have only partial knowledge of the functions assigned to them. In this research, we propose a model to design ontology to support software comprehension and handle issues of knowledge management throughout the development process. By applying our methodology, understanding software and managing knowledge can become possible in a systematic way for open source and commercial projects. Furthermore, it will help beginners become more involved in a project and contribute to it in a productive way.
在软件工程领域,一个非常古老而重要的问题是如何理解软件。理解软件不仅仅意味着理解源代码;它还涉及与该特定软件相关的其他事实。有时,即使是经验丰富的开发人员也会被项目的广泛开发能力所淹没。在开发过程中,项目负责人(PLs)对项目有全面的了解,并敏锐地意识到它的愿景。其他成员对分配给他们的功能只有部分知识。在本研究中,我们提出了一个模型来设计本体,以支持软件理解和处理整个开发过程中的知识管理问题。通过应用我们的方法,对于开源和商业项目,理解软件和管理知识可以以一种系统的方式成为可能。此外,它将帮助初学者更多地参与一个项目,并以一种富有成效的方式为它做出贡献。
{"title":"Software ontology design to support organized open source software development","authors":"Md. Mahfuzus Salam Khan, Md. Anwarus Salam Khan, T. Goto, T. Nishino, N. Debnath","doi":"10.1109/SNPD.2014.6888736","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888736","url":null,"abstract":"In the field of software engineering, a very old and important issue is how to understand the software. Understanding software means more than understanding the source code; it also refers to the other facts related to that particular software. Sometimes even experienced developers can be overwhelmed by a project's extensive development capabilities. In the development process, project leaders (PLs) have overall knowledge about the project and are keenly aware of its vision. Other members have only partial knowledge of the functions assigned to them. In this research, we propose a model to design ontology to support software comprehension and handle issues of knowledge management throughout the development process. By applying our methodology, understanding software and managing knowledge can become possible in a systematic way for open source and commercial projects. Furthermore, it will help beginners become more involved in a project and contribute to it in a productive way.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126363053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme 基于身份的无可信PKG代理签名方案和代理盲多重签名方案分析
Limin Sha
This paper analyzes two proxy signature schemes' security, and proves that they exist loopholes. Xu's ID-based proxy signature scheme without trusted PKG is not safe, because there exists a security attack which original signer can tamper with the proxy warrant allayed with PKG.Hu's proxy blind multi-signature scheme also exists a security attack that the signature requester can tamper with the proxy warrant.
分析了两种代理签名方案的安全性,证明了它们存在漏洞。Xu的没有可信PKG的基于id的代理签名方案是不安全的,因为存在原始签署人可以篡改使用PKG缓和的代理证书的安全攻击,hu的代理盲多重签名方案也存在签名请求者可以篡改代理证书的安全攻击。
{"title":"Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme","authors":"Limin Sha","doi":"10.1109/SNPD.2014.6888700","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888700","url":null,"abstract":"This paper analyzes two proxy signature schemes' security, and proves that they exist loopholes. Xu's ID-based proxy signature scheme without trusted PKG is not safe, because there exists a security attack which original signer can tamper with the proxy warrant allayed with PKG.Hu's proxy blind multi-signature scheme also exists a security attack that the signature requester can tamper with the proxy warrant.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133795782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for mobile elearning (mLearning) with analytical decision model 基于分析决策模型的移动学习框架
Jahangir Dewan, M. Chowdhury
Mobile eLearning (mLearning) can create a revolution in eLearning with the popularity of smart mobile devices and Application. However, contents are the king to make this revolution happen. Moreover, for an effective mLearning system, analytical aspects such as, quality of contents, quality of results, performance of learners, needs to be addressed. This paper presents a framework for personal mLearning. In this paper, we have used graph-based model called bipartite graph for content authentication and identification of the quality of results. Furthermore, we have used statistical estimation process for trustworthiness of weights in the bipartite graph using confidence interval and hypothesis test as analytical decision model tool.
随着智能移动设备和应用程序的普及,移动电子学习(mLearning)可以在电子学习中掀起一场革命。然而,内容才是这场革命的王道。此外,对于一个有效的移动学习系统,需要解决内容质量、结果质量、学习者表现等分析方面的问题。本文提出了一个个人移动学习的框架。在本文中,我们使用基于图的二部图模型来进行内容认证和结果质量的识别。在此基础上,利用置信区间和假设检验作为分析决策模型工具,对二部图中权重的可信度进行了统计估计。
{"title":"A framework for mobile elearning (mLearning) with analytical decision model","authors":"Jahangir Dewan, M. Chowdhury","doi":"10.1109/SNPD.2014.6888702","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888702","url":null,"abstract":"Mobile eLearning (mLearning) can create a revolution in eLearning with the popularity of smart mobile devices and Application. However, contents are the king to make this revolution happen. Moreover, for an effective mLearning system, analytical aspects such as, quality of contents, quality of results, performance of learners, needs to be addressed. This paper presents a framework for personal mLearning. In this paper, we have used graph-based model called bipartite graph for content authentication and identification of the quality of results. Furthermore, we have used statistical estimation process for trustworthiness of weights in the bipartite graph using confidence interval and hypothesis test as analytical decision model tool.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122057850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The analysis method focusing on peaks of darkness for the impression evaluation method by space 该分析方法以暗峰为重点,为空间印象评价方法
Shunsuke Akai, T. Hochin, Hiroki Nomiya
This paper proposes an analysis method of the evaluation results obtained through the Impression Evaluation Method by Space (IEMS). The IEMS uses a plane containing impression words as the Kansei space. The impression of an object is specified by circling the areas matching the impression. The degree of matching the impression is expressed by painting color. As the impression words can be moved and/or added in the IEMS, it is difficult to analyze the evaluation results obtained from many subjects. The proposed analysis method focuses on the peaks of darkness. It is called the analysis method focusing on the peaks of darkness (abbr. AM_PD). By mapping the peaks of the darkness in each evaluation result to the same Kansei space, this method can analyze characteristic impressions. In this paper, the algorithm of extracting obvious peaks automatically is proposed toward realization of the AM_PD. The parameters of the AM_PD required to extract the obvious peaks are experimentally determined. This paper shows that the obvious peaks in the evaluation results can be extracted by using this algorithm.
本文提出了空间印象评价法(IEMS)评价结果的分析方法。IEMS使用一个包含印象词的平面作为感性空间。对象的印象是通过圈出与印象匹配的区域来指定的。与印象的匹配程度是通过绘画色彩来表达的。由于印象词可以在IEMS中移动和/或添加,因此很难分析许多受试者的评价结果。提出的分析方法侧重于暗峰。称为聚焦暗峰分析方法(缩写AM_PD)。通过将每个评价结果中的黑暗峰值映射到相同的感性空间,该方法可以分析特征印象。本文针对AM_PD的实现,提出了一种自动提取明显峰值的算法。实验确定了提取明显峰所需的AM_PD参数。结果表明,该算法可以提取出评价结果中的明显峰。
{"title":"The analysis method focusing on peaks of darkness for the impression evaluation method by space","authors":"Shunsuke Akai, T. Hochin, Hiroki Nomiya","doi":"10.1109/SNPD.2014.6888721","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888721","url":null,"abstract":"This paper proposes an analysis method of the evaluation results obtained through the Impression Evaluation Method by Space (IEMS). The IEMS uses a plane containing impression words as the Kansei space. The impression of an object is specified by circling the areas matching the impression. The degree of matching the impression is expressed by painting color. As the impression words can be moved and/or added in the IEMS, it is difficult to analyze the evaluation results obtained from many subjects. The proposed analysis method focuses on the peaks of darkness. It is called the analysis method focusing on the peaks of darkness (abbr. AM_PD). By mapping the peaks of the darkness in each evaluation result to the same Kansei space, this method can analyze characteristic impressions. In this paper, the algorithm of extracting obvious peaks automatically is proposed toward realization of the AM_PD. The parameters of the AM_PD required to extract the obvious peaks are experimentally determined. This paper shows that the obvious peaks in the evaluation results can be extracted by using this algorithm.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing and implementing service framework for virtual agents in home network system 家庭网络系统中虚拟代理服务框架的设计与实现
Hiroyasu Horiuchi, S. Saiki, S. Matsumoto, Masahide Nakamura
In order to achieve intuitive and easy operations for home network system (HNS), we have previously proposed user interface with virtual agent (called HNS virtual agent user interface, HNS-VAUI). The HNS-VAUI was implemented with MMDAgent toolkit. A user can operate appliances and services interactively through dialog with a virtual agent in a screen. However, the previous prototype heavily depends on MMDAgent, which causes a tight coupling between HNS operations and agent behaviors, and poor capability of using external information. To cope with the problem, this paper proposes a service-oriented framework that allows the HNS-VAUI to provide richer interaction. Specifically, we decompose the tightly-coupled system into two separate services: MMC Service and MSM service. The MMC service concentrates on controlling detailed behaviors of a virtual agent, whereas the MSM service defines logic of HNS operations and dialog with the agent with richer state machines. The two services are loosely coupled to enable more flexible and sophisticated dialog in the HNS-VAUI. The proposed framework is implemented in a real HNS environment. We also conduct a case study with practical service scenarios, to demonstrate effectiveness of the proposed framework.
为了实现家庭网络系统(HNS)的直观、简便的操作,我们提出了带有虚拟代理的用户界面(称为HNS虚拟代理用户界面,HNS- vaui)。HNS-VAUI是通过MMDAgent工具包实现的。用户可以通过与屏幕上的虚拟代理进行对话来交互式地操作设备和服务。然而,先前的原型严重依赖于MMDAgent,导致HNS操作与agent行为之间的紧密耦合,并且使用外部信息的能力较差。为了解决这个问题,本文提出了一个面向服务的框架,该框架允许HNS-VAUI提供更丰富的交互。具体来说,我们将紧密耦合的系统分解为两个独立的服务:MMC服务和MSM服务。MMC服务专注于控制虚拟代理的详细行为,而MSM服务定义HNS操作的逻辑以及与具有更丰富状态机的代理的对话。这两个服务是松散耦合的,以便在HNS-VAUI中实现更灵活和复杂的对话。该框架在实际HNS环境中得到了实现。我们亦以实际服务场景进行个案研究,以证明建议架构的有效性。
{"title":"Designing and implementing service framework for virtual agents in home network system","authors":"Hiroyasu Horiuchi, S. Saiki, S. Matsumoto, Masahide Nakamura","doi":"10.1109/SNPD.2014.6888728","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888728","url":null,"abstract":"In order to achieve intuitive and easy operations for home network system (HNS), we have previously proposed user interface with virtual agent (called HNS virtual agent user interface, HNS-VAUI). The HNS-VAUI was implemented with MMDAgent toolkit. A user can operate appliances and services interactively through dialog with a virtual agent in a screen. However, the previous prototype heavily depends on MMDAgent, which causes a tight coupling between HNS operations and agent behaviors, and poor capability of using external information. To cope with the problem, this paper proposes a service-oriented framework that allows the HNS-VAUI to provide richer interaction. Specifically, we decompose the tightly-coupled system into two separate services: MMC Service and MSM service. The MMC service concentrates on controlling detailed behaviors of a virtual agent, whereas the MSM service defines logic of HNS operations and dialog with the agent with richer state machines. The two services are loosely coupled to enable more flexible and sophisticated dialog in the HNS-VAUI. The proposed framework is implemented in a real HNS environment. We also conduct a case study with practical service scenarios, to demonstrate effectiveness of the proposed framework.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Unbinds data and tasks to improving the Hadoop performance 解除数据和任务的绑定,以提高Hadoop性能
Kun Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang
Hadoop is a popular framework that provides easy programming interface of parallel programs to process large scale of data on clusters of commodity machines. Data intensive programs are the important part running on the cluster especially in large scale machine learning algorithm which executes of the same program iteratively. In-memory cache of input data is an efficient way to speed up these data intensive programs. However, we cannot be able to load all the data in memory because of the limitation of memory capacity. So, the key challenge is how we can accurately know when data should be cached in memory and when it ought to be released. The other problem is that memory capacity may even not enough to hold the input data of the running program. This leads to there is some data cannot be cached in memory. Prefetching is an effective method for such situation. We provide a unbinding technology which do not put the programs and data binded together before the real computation start. With unbinding technology, Hadoop can get a better performance when using caching and prefetching technology. We provide a Hadoop framework with unbinding technology named unbinding-Hadoop which decide the map tasks' input data in the map starting up phase, not at the job submission phase. Prefetching as well can be used in unbinding-Hadoop and can get better performance compared with the programs without unbinding. Evaluations on this system show that unbinding-Hadoop reduces the execution time of jobs by 40.2% and 29.2% with WordCount programs and K-means algorithm.
Hadoop是一个流行的框架,它提供了并行程序的简单编程接口,可以在商用机器集群上处理大规模数据。数据密集型程序是运行在集群上的重要组成部分,特别是在对同一程序进行迭代执行的大规模机器学习算法中。输入数据的内存缓存是提高这些数据密集型程序速度的有效方法。但是,由于内存容量的限制,我们无法将所有数据加载到内存中。因此,关键的挑战是我们如何准确地知道什么时候应该将数据缓存到内存中,什么时候应该释放数据。另一个问题是,内存容量甚至可能不足以保存运行程序的输入数据。这就导致有一些数据无法缓存在内存中。预取是解决这种情况的有效方法。我们提供了一种解绑定技术,在实际计算开始之前,不需要将程序和数据绑定在一起。通过解绑定技术,Hadoop可以在使用缓存和预取技术时获得更好的性能。我们提供了一个具有解绑定技术的Hadoop框架,名为unbinding-Hadoop,它在map启动阶段决定map任务的输入数据,而不是在job提交阶段。预取也可以用于解绑定hadoop,与未解绑定的程序相比,可以获得更好的性能。对该系统的评估表明,unbinding-Hadoop使用WordCount程序和K-means算法分别减少了40.2%和29.2%的作业执行时间。
{"title":"Unbinds data and tasks to improving the Hadoop performance","authors":"Kun Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang","doi":"10.1109/SNPD.2014.6888710","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888710","url":null,"abstract":"Hadoop is a popular framework that provides easy programming interface of parallel programs to process large scale of data on clusters of commodity machines. Data intensive programs are the important part running on the cluster especially in large scale machine learning algorithm which executes of the same program iteratively. In-memory cache of input data is an efficient way to speed up these data intensive programs. However, we cannot be able to load all the data in memory because of the limitation of memory capacity. So, the key challenge is how we can accurately know when data should be cached in memory and when it ought to be released. The other problem is that memory capacity may even not enough to hold the input data of the running program. This leads to there is some data cannot be cached in memory. Prefetching is an effective method for such situation. We provide a unbinding technology which do not put the programs and data binded together before the real computation start. With unbinding technology, Hadoop can get a better performance when using caching and prefetching technology. We provide a Hadoop framework with unbinding technology named unbinding-Hadoop which decide the map tasks' input data in the map starting up phase, not at the job submission phase. Prefetching as well can be used in unbinding-Hadoop and can get better performance compared with the programs without unbinding. Evaluations on this system show that unbinding-Hadoop reduces the execution time of jobs by 40.2% and 29.2% with WordCount programs and K-means algorithm.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130618985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis and acceleration of NTRU lattice-based cryptographic system 基于NTRU格的密码系统分析与加速
Tianyu Bai, Spencer Davis, Juanjuan Li, Hai Jiang
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/decryption process. However, the big data problem has perplexed lattice based cryptographic systems with the slow processing speed. This paper intends to analyze one of the major lattice-based cryptographic systems, Nth-degree truncated polynomial ring (NTRU), and accelerate its execution with Graphic Processing Unit (GPU) for acceptable processing performance. Three strategies, including single GPU with zero copy, single GPU with data transfer, and multi-GPU versions are proposed. GPU computing techniques such as stream and zero copy are applied to overlap the computation and communication for possible speedup. Experimental results have demonstrated the effectiveness of GPU acceleration of NTRU. As the number of involved devices increases, better NTRU performance will be achieved.
基于点阵的密码学以其抗量子计算能力和高效的加解密过程而备受关注。然而,由于处理速度慢,大数据问题一直困扰着基于点阵的密码系统。本文旨在分析主要的基于格的密码系统之一,n度截断多项式环(NTRU),并利用图形处理单元(GPU)加速其执行,以获得可接受的处理性能。提出了单GPU零拷贝、单GPU数据传输和多GPU版本三种策略。GPU计算技术,如流和零复制应用重叠的计算和通信,以可能的加速。实验结果证明了GPU加速NTRU的有效性。随着所涉及设备数量的增加,NTRU的性能将得到提高。
{"title":"Analysis and acceleration of NTRU lattice-based cryptographic system","authors":"Tianyu Bai, Spencer Davis, Juanjuan Li, Hai Jiang","doi":"10.1109/SNPD.2014.6888686","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888686","url":null,"abstract":"Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/decryption process. However, the big data problem has perplexed lattice based cryptographic systems with the slow processing speed. This paper intends to analyze one of the major lattice-based cryptographic systems, Nth-degree truncated polynomial ring (NTRU), and accelerate its execution with Graphic Processing Unit (GPU) for acceptable processing performance. Three strategies, including single GPU with zero copy, single GPU with data transfer, and multi-GPU versions are proposed. GPU computing techniques such as stream and zero copy are applied to overlap the computation and communication for possible speedup. Experimental results have demonstrated the effectiveness of GPU acceleration of NTRU. As the number of involved devices increases, better NTRU performance will be achieved.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132557417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1