首页 > 最新文献

15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)最新文献

英文 中文
Training of intelligent intrusion detection system using neuro fuzzy 利用神经模糊训练智能入侵检测系统
Biswajit Panja, Olugbenga Ogunyanwo, Priyanka Meharia
Intrusion detection systems classify computer activities into two main categories: normal and suspicious activities. In order to achieve the classification, Intrusion detection systems use software computing techniques including neural networks and neuro fuzzy networks to categorize network activities and specify what category of attack is being generated. Neuro-Fuzzy classifiers are used for the initial classification of the initial network traffic. An inference system, Fuzzy inference systems is further used to determine whether the activity is normal or malicious. Efficient IDS systems are those capable of reducing false positives and generate high rate attack detection. However, fuzzy inference systems use human knowledge to create their fuzzy rule. In order to introduce a more accurate way of classifying network traffic, we introduce the use of Genetic Algorithms in conjunction with ANFIS so as to optimize data classification and obtain the best results. Genetic algorithms use a set of genetic operators such as mutation, crossover and selection on current population to reproduce similar patterns that will be used repeatedly until a particular criterion is met.
入侵检测系统将计算机活动分为两大类:正常活动和可疑活动。为了实现分类,入侵检测系统使用包括神经网络和神经模糊网络在内的软件计算技术对网络活动进行分类,并指定正在产生何种类型的攻击。神经模糊分类器用于对初始网络流量进行初始分类。一个推理系统,模糊推理系统进一步用于确定活动是正常的还是恶意的。高效的IDS系统是那些能够减少误报并产生高速率攻击检测的系统。然而,模糊推理系统使用人类的知识来创建模糊规则。为了引入一种更准确的网络流量分类方法,我们将遗传算法与ANFIS结合使用,以优化数据分类并获得最佳结果。遗传算法使用一组遗传操作符,如突变、交叉和选择,在当前种群中复制相似的模式,这些模式将被反复使用,直到满足特定的标准。
{"title":"Training of intelligent intrusion detection system using neuro fuzzy","authors":"Biswajit Panja, Olugbenga Ogunyanwo, Priyanka Meharia","doi":"10.1109/SNPD.2014.6888688","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888688","url":null,"abstract":"Intrusion detection systems classify computer activities into two main categories: normal and suspicious activities. In order to achieve the classification, Intrusion detection systems use software computing techniques including neural networks and neuro fuzzy networks to categorize network activities and specify what category of attack is being generated. Neuro-Fuzzy classifiers are used for the initial classification of the initial network traffic. An inference system, Fuzzy inference systems is further used to determine whether the activity is normal or malicious. Efficient IDS systems are those capable of reducing false positives and generate high rate attack detection. However, fuzzy inference systems use human knowledge to create their fuzzy rule. In order to introduce a more accurate way of classifying network traffic, we introduce the use of Genetic Algorithms in conjunction with ANFIS so as to optimize data classification and obtain the best results. Genetic algorithms use a set of genetic operators such as mutation, crossover and selection on current population to reproduce similar patterns that will be used repeatedly until a particular criterion is met.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Scalable bootstrap clustering for massive data 用于海量数据的可伸缩自举集群
Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi
The bootstrap provides a simple and powerful means of improving the accuracy of clustering. However, for today's increasingly large datasets, the computation of bootstrap-based quantities can be prohibitively demanding. In this paper we introduce the Bag of Little Bootstraps Clustering (BLBC), a new procedure which utilizes the Bag of Little Bootstraps technique to obtain a robust, computationally efficient means of clustering for massive data. Moreover, BLBC is suited to implementation on modern parallel and distributed computing architectures which are often used to process large datasets. We investigate empirically the performance characteristics of BLBC and compare to the performances of existing methods via experiments on simulated data and real data. The results show that BLBC has a significantly more favorable computational profile than the bootstrap based clustering while maintaining good statistical correctness.
自举提供了一种简单而强大的方法来提高聚类的准确性。然而,对于今天越来越大的数据集,基于自举的数量的计算可能要求过高。本文介绍了一种新的聚类方法BLBC (Bag of Little bootstrap Clustering),它利用Bag of Little bootstrap技术获得了一种鲁棒的、计算效率高的海量数据聚类方法。此外,BLBC适合在现代并行和分布式计算架构上实现,这些架构通常用于处理大型数据集。我们通过模拟数据和真实数据的实验,对BLBC的性能特点进行了实证研究,并对现有方法的性能进行了比较。结果表明,在保持良好的统计正确性的同时,BLBC具有明显优于基于自举的聚类的计算轮廓。
{"title":"Scalable bootstrap clustering for massive data","authors":"Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi","doi":"10.1109/SNPD.2014.6888693","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888693","url":null,"abstract":"The bootstrap provides a simple and powerful means of improving the accuracy of clustering. However, for today's increasingly large datasets, the computation of bootstrap-based quantities can be prohibitively demanding. In this paper we introduce the Bag of Little Bootstraps Clustering (BLBC), a new procedure which utilizes the Bag of Little Bootstraps technique to obtain a robust, computationally efficient means of clustering for massive data. Moreover, BLBC is suited to implementation on modern parallel and distributed computing architectures which are often used to process large datasets. We investigate empirically the performance characteristics of BLBC and compare to the performances of existing methods via experiments on simulated data and real data. The results show that BLBC has a significantly more favorable computational profile than the bootstrap based clustering while maintaining good statistical correctness.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performance gpu上的AES-128 ECB加密及输入明文模式对性能的影响
Ayaz H. Khan, M. Al-Mouhamed, A. Almousa, Allam Fatayar, A. Ibrahim, A. Siddiqui
In the recent years, the Graphics Processing Units (GPUs) have gained popularity for general purpose applications, immensely outperforming traditional optimized CPU based implementations. A class of such applications implemented on GPUs to achieve faster execution than CPUs include cryptographic techniques like the Advanced Encryption Standard (AES) which is a widely deployed symmetric encryption/decryption scheme in various electronic communication domains. With the drastic advancements in electronic communication technology, and growth in the user space, the size of data exchanged electronically has increased substantially. So, such cryptographic techniques become a bottleneck to fast transfers of information. In this work, we implement the AES-128 ECB Encryption on two of the recent and advanced GPUs (NVIDIA Quadro FX 7000 and Tesla K20c) with different memory usage schemes and varying input plaintext sizes and patterns. We obtained a speedup of up to 87x against an advanced CPU (Intel Xeon X5690) based implementation. Moreover, our experiments reveal that the different degrees of pattern repetitions in input plaintext affect the encryption performance on GPU.
近年来,图形处理单元(gpu)在通用应用程序中越来越受欢迎,其性能大大优于传统的基于CPU的优化实现。在gpu上实现的一类此类应用程序可以实现比cpu更快的执行速度,包括加密技术,如高级加密标准(AES),这是在各种电子通信领域广泛部署的对称加密/解密方案。随着电子通信技术的飞速发展和用户空间的扩大,以电子方式交换的数据量大大增加。因此,这种加密技术成为信息快速传输的瓶颈。在这项工作中,我们在两种最新和先进的gpu (NVIDIA Quadro FX 7000和Tesla K20c)上实现了AES-128 ECB加密,这些gpu具有不同的内存使用方案和不同的输入明文大小和模式。对于基于高级CPU (Intel Xeon X5690)的实现,我们获得了高达87x的加速。此外,我们的实验表明,输入明文中不同程度的模式重复会影响GPU上的加密性能。
{"title":"AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performance","authors":"Ayaz H. Khan, M. Al-Mouhamed, A. Almousa, Allam Fatayar, A. Ibrahim, A. Siddiqui","doi":"10.1109/SNPD.2014.6888707","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888707","url":null,"abstract":"In the recent years, the Graphics Processing Units (GPUs) have gained popularity for general purpose applications, immensely outperforming traditional optimized CPU based implementations. A class of such applications implemented on GPUs to achieve faster execution than CPUs include cryptographic techniques like the Advanced Encryption Standard (AES) which is a widely deployed symmetric encryption/decryption scheme in various electronic communication domains. With the drastic advancements in electronic communication technology, and growth in the user space, the size of data exchanged electronically has increased substantially. So, such cryptographic techniques become a bottleneck to fast transfers of information. In this work, we implement the AES-128 ECB Encryption on two of the recent and advanced GPUs (NVIDIA Quadro FX 7000 and Tesla K20c) with different memory usage schemes and varying input plaintext sizes and patterns. We obtained a speedup of up to 87x against an advanced CPU (Intel Xeon X5690) based implementation. Moreover, our experiments reveal that the different degrees of pattern repetitions in input plaintext affect the encryption performance on GPU.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129565082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices 确保使用商用NFC设备在传统渠道汇出电子发票的完整性和不可抵赖性
Shi-Cho Cha, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng
Despite the globally recognized advantages of e-invoicing and various efforts to implement such systems, retailers and stores may still have difficulties in promoting purely paperless e-invoices due to the lack of a convenient and secure way for consumers to receive and retrieve the e-invoices. As such, paper-based invoices may still be issued along with e-invoices, contradicting an important benefit of e-invoicing - paper consumption reduction. Thanks to the advances in smart phones and Near Field Communication (NFC) technologies, e-invoices can be delivered via NFC-enabled smartpones, allowing consumers to examine the content immediately after transactions and to easily retrieve them later on. Still, an extra security mechanism is needed to ensure the integrity and non-repudiation of the content, as invoices may bear some value and thus become the target of a security attack. In this paper, we propose a secure NFC-based e-invoice remitting scheme using standard NFC P2P communications, and discuss how it fulfills major security requirements, including authenticity, integrity, and non-repudiation. The proposed system is also implemented and tested in Taiwan's e-invoicing system.
尽管全球公认电子发票的优势,以及实施这种系统的各种努力,零售商和商店在推广纯无纸化电子发票方面可能仍然存在困难,因为消费者缺乏一种方便和安全的方式来接收和检索电子发票。因此,纸质发票可能仍然会与电子发票一起发出,这与电子发票的一个重要好处——减少纸张消耗相矛盾。由于智能手机和近场通信(NFC)技术的进步,电子发票可以通过支持NFC的智能手机发送,允许消费者在交易后立即检查内容,并在稍后轻松检索。但是,还需要额外的安全机制来确保内容的完整性和不可否认性,因为发票可能具有一定的价值,从而成为安全攻击的目标。在本文中,我们提出了一个安全的基于NFC的电子发票汇款方案,使用标准的NFC P2P通信,并讨论了它如何满足主要的安全要求,包括真实性,完整性和不可否认性。建议的系统也在台湾的电子发票系统中实施和测试。
{"title":"Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices","authors":"Shi-Cho Cha, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng","doi":"10.1109/SNPD.2014.6888705","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888705","url":null,"abstract":"Despite the globally recognized advantages of e-invoicing and various efforts to implement such systems, retailers and stores may still have difficulties in promoting purely paperless e-invoices due to the lack of a convenient and secure way for consumers to receive and retrieve the e-invoices. As such, paper-based invoices may still be issued along with e-invoices, contradicting an important benefit of e-invoicing - paper consumption reduction. Thanks to the advances in smart phones and Near Field Communication (NFC) technologies, e-invoices can be delivered via NFC-enabled smartpones, allowing consumers to examine the content immediately after transactions and to easily retrieve them later on. Still, an extra security mechanism is needed to ensure the integrity and non-repudiation of the content, as invoices may bear some value and thus become the target of a security attack. In this paper, we propose a secure NFC-based e-invoice remitting scheme using standard NFC P2P communications, and discuss how it fulfills major security requirements, including authenticity, integrity, and non-repudiation. The proposed system is also implemented and tested in Taiwan's e-invoicing system.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An improvement of micro area selection technique for the diffusion of ICT infrastructure 信息通信技术基础设施扩散的微区域选择技术改进
M. Iwashita, T. Kurosawa, A. Inoue, K. Nishimatsu
ICT infrastructures such as wired/wireless information networks are poised to play an important role in meeting these demands, and there is an urgent need to facilitate nationwide ICT infrastructure immediately. Since installation of such ICT infrastructures takes a large amount of time and expenditure, the selection of installation area is an important issue. Low-usage facilities can cause huge problems for businesses in terms of investment efficiency, and it takes time to select areas because we need to consider how to estimate the potential demand and how to diffuse the installation for thousands of municipal areas across the nation. This paper evaluates the micro area selection method which is previously proposed with ICT infrastructure propagating based on commuting flows. A comparison with the performance of a WiMAX service currently in use for several areas induces the improved method.
有线/无线信息网络等信息通信技术基础设施将在满足这些需求方面发挥重要作用,迫切需要立即促进全国范围内的信息通信技术基础设施。由于此类ICT基础设施的安装需要大量的时间和费用,因此安装区域的选择是一个重要的问题。低使用率设施会给企业的投资效率带来巨大的问题,而且需要考虑如何估计潜在需求和如何在全国数千个市辖区分散安装,因此需要时间选择。”本文对基于通勤流的ICT基础设施传播的微区域选择方法进行了评价。通过与目前在几个地区使用的WiMAX服务的性能比较,得出了改进的方法。
{"title":"An improvement of micro area selection technique for the diffusion of ICT infrastructure","authors":"M. Iwashita, T. Kurosawa, A. Inoue, K. Nishimatsu","doi":"10.1109/SNPD.2014.6888722","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888722","url":null,"abstract":"ICT infrastructures such as wired/wireless information networks are poised to play an important role in meeting these demands, and there is an urgent need to facilitate nationwide ICT infrastructure immediately. Since installation of such ICT infrastructures takes a large amount of time and expenditure, the selection of installation area is an important issue. Low-usage facilities can cause huge problems for businesses in terms of investment efficiency, and it takes time to select areas because we need to consider how to estimate the potential demand and how to diffuse the installation for thousands of municipal areas across the nation. This paper evaluates the micro area selection method which is previously proposed with ICT infrastructure propagating based on commuting flows. A comparison with the performance of a WiMAX service currently in use for several areas induces the improved method.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133969914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ONTOSSN: Scientific social network ontology ONTOSSN:科学的社会网络本体
Eya Ben Ahmed, Wafa Tebourski, W. Karaa, F. Gargouri
During the past decade, the advent of the social network has offered several platforms that promote communication among users on common spaces. Several efforts were devoted to unify the social network domain, particularly the scientific domain through introducing ontology-based modeling of scientific social network. However, the measurement of the researchers standings within the scientific community is generally absent. To overcome this drawback, we propose, in this paper, a scientific social network ontology which includes definitions of main entities and describes main attributes of : Scientific social network concepts aiming to share common understanding of this domain and to reflect the academic career paths.
在过去的十年里,社交网络的出现提供了几个促进用户在公共空间交流的平台。通过引入基于本体的科学社会网络建模,致力于统一社会网络领域,特别是科学领域。然而,对研究人员在科学界的地位的衡量通常是缺失的。为了克服这一缺陷,本文提出了一个科学社会网络本体,该本体包括主要实体的定义和描述科学社会网络概念的主要属性,旨在分享对该领域的共同理解,并反映学术生涯路径。
{"title":"ONTOSSN: Scientific social network ontology","authors":"Eya Ben Ahmed, Wafa Tebourski, W. Karaa, F. Gargouri","doi":"10.1109/SNPD.2014.6888677","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888677","url":null,"abstract":"During the past decade, the advent of the social network has offered several platforms that promote communication among users on common spaces. Several efforts were devoted to unify the social network domain, particularly the scientific domain through introducing ontology-based modeling of scientific social network. However, the measurement of the researchers standings within the scientific community is generally absent. To overcome this drawback, we propose, in this paper, a scientific social network ontology which includes definitions of main entities and describes main attributes of : Scientific social network concepts aiming to share common understanding of this domain and to reflect the academic career paths.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection range fitting of slit type Obrid-Sensor 狭缝式光学传感器的探测距离拟合
Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, S. Okabe, Kanya Tanaka, Yuhki Kitazono, S. Serikawa
As aging society problem goes severe, systems to confirm to safety of elders in daily life are expected to relieve burdensome safety confirmation tasks of care workers. In this paper, a sensor, which detects person localization without privacy offending, applying Obrid-Sensor is proposed. In the proposed design, the Obrid-Sensor is constructed with a line sensor and a slit to obtain one-dimensional brightness distribution. The proposed sensor is able to obtain one-dimensional brightness distribution that is approximately equal to integration value of each vertical pixel line of two-dimensional image. Meanwhile, the novel slit type Obrid-Sensor, which was constructed without Rod lens, is studied in this research. By employing the proposed sensor, the information of a subject's position and motion can be obtained without using two-dimensional texture image. The effectiveness of the proposed method is confirmed by experiments.
随着老龄化社会问题的日益严重,人们期待着在日常生活中确认老年人安全的系统能够减轻护理人员繁重的安全确认工作。本文提出了一种基于Obrid-Sensor的不侵犯隐私的人定位传感器。在本设计中,Obrid-Sensor由一个线传感器和一个狭缝组成,以获得一维亮度分布。该传感器能够获得近似等于二维图像各垂直像素线积分值的一维亮度分布。同时,本文还研究了一种新型的无杆透镜狭缝式光学传感器。采用该传感器,可以在不使用二维纹理图像的情况下获得被测物体的位置和运动信息。通过实验验证了该方法的有效性。
{"title":"Detection range fitting of slit type Obrid-Sensor","authors":"Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, S. Okabe, Kanya Tanaka, Yuhki Kitazono, S. Serikawa","doi":"10.1109/SNPD.2014.6888738","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888738","url":null,"abstract":"As aging society problem goes severe, systems to confirm to safety of elders in daily life are expected to relieve burdensome safety confirmation tasks of care workers. In this paper, a sensor, which detects person localization without privacy offending, applying Obrid-Sensor is proposed. In the proposed design, the Obrid-Sensor is constructed with a line sensor and a slit to obtain one-dimensional brightness distribution. The proposed sensor is able to obtain one-dimensional brightness distribution that is approximately equal to integration value of each vertical pixel line of two-dimensional image. Meanwhile, the novel slit type Obrid-Sensor, which was constructed without Rod lens, is studied in this research. By employing the proposed sensor, the information of a subject's position and motion can be obtained without using two-dimensional texture image. The effectiveness of the proposed method is confirmed by experiments.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125604292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Strategy-guided requirements development and validation 战略引导的需求开发和验证
Xiaofeng Cui, R. Paige
The ultimate aim of business/mission software is to help implement the business value or mission imperatives. For critical business/mission applications, high-level strategies need to play a crucial role in the development and validation of software requirement, so that the requirements and the produced software can closely align with the business/mission objectives and effectively contribute to the business/mission success. In this paper, we propose a strategy-guided method for the development and validation of requirements. We firstly articulate the dimensions of strategy and concept model for connecting strategies and requirements. We then present the approaches for the requirements development and validation, based on the relationship between the elements of strategies and requirements. This strategy-guided method addresses the paradigms for both the market-oriented and customer-specific software development. We also give an example illustrating the strategy perspectives and the resulting requirements.
业务/任务软件的最终目标是帮助实现业务价值或任务要求。对于关键的业务/任务应用程序,高级策略需要在软件需求的开发和验证中发挥关键作用,以便需求和生成的软件能够与业务/任务目标紧密结合,并有效地促进业务/任务的成功。在本文中,我们提出了一种用于开发和验证需求的策略指导方法。本文首先阐述了战略的维度和连接战略与需求的概念模型。然后,我们根据策略元素和需求之间的关系,提出了需求开发和验证的方法。这种策略导向的方法解决了面向市场和特定于客户的软件开发的范例。我们还给出了一个例子来说明战略视角和由此产生的需求。
{"title":"Strategy-guided requirements development and validation","authors":"Xiaofeng Cui, R. Paige","doi":"10.1109/SNPD.2014.6888717","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888717","url":null,"abstract":"The ultimate aim of business/mission software is to help implement the business value or mission imperatives. For critical business/mission applications, high-level strategies need to play a crucial role in the development and validation of software requirement, so that the requirements and the produced software can closely align with the business/mission objectives and effectively contribute to the business/mission success. In this paper, we propose a strategy-guided method for the development and validation of requirements. We firstly articulate the dimensions of strategy and concept model for connecting strategies and requirements. We then present the approaches for the requirements development and validation, based on the relationship between the elements of strategies and requirements. This strategy-guided method addresses the paradigms for both the market-oriented and customer-specific software development. We also give an example illustrating the strategy perspectives and the resulting requirements.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134038976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An obfuscation method to build a fake call flow graph by hooking method calls 一种混淆方法,通过挂钩方法调用来构建假的调用流图
Kazumasa Fukuda, Haruaki Tamada
This paper proposes an obfuscation method against illegal analysis. The proposed method tries to build a fake call flow graph from debugging tools. The call flow graph represents relations among methods, and helps understanding of a program. The fake call flow graph leads misunderstanding of the program. We focus on a hook mechanism of the method call for changing a callee. We conduct two experiments to evaluate the proposed method. First experiment simulates attacks by existing tools: Soot, jad, Procyon, and Krakatau. The Procyon only succeeded decompilation, the others crashed. Second experiment evaluates understandability of the obfuscated program by the hand. Only one subject in the nine subjects answered the correct value. The experiments shows the proposed method has good tolerance against existing tools, and high difficulty of understanding even if the target program is tiny and simple program.
本文提出了一种防止非法分析的混淆方法。提出的方法试图从调试工具构建一个假的调用流图。调用流程图表示方法之间的关系,有助于理解程序。虚假的调用流程图导致程序的误解。我们将重点讨论用于更改被调用方的方法调用的钩子机制。我们进行了两个实验来评估所提出的方法。第一个实验模拟了现有工具的攻击:Soot, jad, Procyon和Krakatau。程序只有反编译成功,其他的都崩溃了。第二个实验评估了手工混淆程序的可理解性。9个被试中只有1个回答正确。实验表明,该方法对现有工具具有良好的容忍度,即使目标程序很小且简单,也具有较高的理解难度。
{"title":"An obfuscation method to build a fake call flow graph by hooking method calls","authors":"Kazumasa Fukuda, Haruaki Tamada","doi":"10.1109/SNPD.2014.6888726","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888726","url":null,"abstract":"This paper proposes an obfuscation method against illegal analysis. The proposed method tries to build a fake call flow graph from debugging tools. The call flow graph represents relations among methods, and helps understanding of a program. The fake call flow graph leads misunderstanding of the program. We focus on a hook mechanism of the method call for changing a callee. We conduct two experiments to evaluate the proposed method. First experiment simulates attacks by existing tools: Soot, jad, Procyon, and Krakatau. The Procyon only succeeded decompilation, the others crashed. Second experiment evaluates understandability of the obfuscated program by the hand. Only one subject in the nine subjects answered the correct value. The experiments shows the proposed method has good tolerance against existing tools, and high difficulty of understanding even if the target program is tiny and simple program.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A machine learning technique for predicting the productivity of practitioners from individually developed software projects 一种机器学习技术,用于从单独开发的软件项目中预测从业者的生产力
Cuauhtémoc López Martín, Arturo Chavoya-Pena, M. Meda-Campaña
Context: Productivity management of software developers is a challenge in Information and Communication Technology. Predictions of productivity can be useful to determine corrective actions and to assist managers in evaluating improvement alternatives. Productivity prediction models have been based on statistical regressions, statistical time series, fuzzy logic, and machine learning. Goal: To propose a machine learning model termed general regression neural network (GRNN) for predicting the productivity of software practitioners. Hypothesis: Prediction accuracy of a GRNN is better than a statistical regression model when these two models are applied for predicting productivity of software practitioners who have individually developed their software projects. Method: A sample obtained from 396 software projects developed between the years 2005 and 2011 by 99 practitioners was used for training the models, whereas a sample of 60 projects developed by 15 practitioners in the first months of 2012 was used for testing the models. All projects were developed based upon a disciplined development process within a controlled environment. The accuracy of the GRNN was compared against that of a multiple regression model (MLR). The criteria for evaluating the accuracy of these two models were the Magnitude of Error Relative to the estimate and a t-paired statistical test. Results: Prediction accuracy of an GRNN was statistically better than that of an MLR model at the 99% confidence level. Conclusion: An GRNN could be applied for predicting the productivity of practitioners when New and Changed lines of code, reused code, and programming language experience of practitioners are used as independent variables.
背景:软件开发人员的生产力管理是信息和通信技术中的一个挑战。对生产率的预测对于确定纠正措施和帮助管理者评价改进方案是有用的。生产率预测模型基于统计回归、统计时间序列、模糊逻辑和机器学习。目标:提出一种称为通用回归神经网络(GRNN)的机器学习模型,用于预测软件从业者的生产力。假设:当应用GRNN和统计回归模型来预测单独开发软件项目的软件从业者的生产力时,GRNN的预测精度优于统计回归模型。方法:使用99名从业人员在2005 - 2011年间开发的396个软件项目样本对模型进行训练,而使用15名从业人员在2012年前几个月开发的60个项目样本对模型进行测试。所有的项目都是在一个受控的环境中基于一个有纪律的开发过程开发的。将GRNN与多元回归模型(MLR)的准确率进行了比较。评估这两个模型准确性的标准是相对于估计值的误差幅度和t配对统计检验。结果:在99%的置信水平下,GRNN的预测精度在统计学上优于MLR模型。结论:GRNN可以应用于预测从业者的生产力,当新的和改变的代码行,重用的代码,和从业者的编程语言经验作为独立变量。
{"title":"A machine learning technique for predicting the productivity of practitioners from individually developed software projects","authors":"Cuauhtémoc López Martín, Arturo Chavoya-Pena, M. Meda-Campaña","doi":"10.1109/SNPD.2014.6888690","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888690","url":null,"abstract":"Context: Productivity management of software developers is a challenge in Information and Communication Technology. Predictions of productivity can be useful to determine corrective actions and to assist managers in evaluating improvement alternatives. Productivity prediction models have been based on statistical regressions, statistical time series, fuzzy logic, and machine learning. Goal: To propose a machine learning model termed general regression neural network (GRNN) for predicting the productivity of software practitioners. Hypothesis: Prediction accuracy of a GRNN is better than a statistical regression model when these two models are applied for predicting productivity of software practitioners who have individually developed their software projects. Method: A sample obtained from 396 software projects developed between the years 2005 and 2011 by 99 practitioners was used for training the models, whereas a sample of 60 projects developed by 15 practitioners in the first months of 2012 was used for testing the models. All projects were developed based upon a disciplined development process within a controlled environment. The accuracy of the GRNN was compared against that of a multiple regression model (MLR). The criteria for evaluating the accuracy of these two models were the Magnitude of Error Relative to the estimate and a t-paired statistical test. Results: Prediction accuracy of an GRNN was statistically better than that of an MLR model at the 99% confidence level. Conclusion: An GRNN could be applied for predicting the productivity of practitioners when New and Changed lines of code, reused code, and programming language experience of practitioners are used as independent variables.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1