首页 > 最新文献

15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)最新文献

英文 中文
Using goal net to model user stories in agile software development 在敏捷软件开发中使用目标网对用户故事建模
Jun Lin, Han Yu, Zhiqi Shen, C. Miao
Agile methodologies use user stories to capture software requirements. This often results in team members over emphasizing their understanding of the goals, without proper incorporation of goals from other stakeholders or customers. Existing UML or other goal oriented modeling methods tend to be overly complex for non-technical stakeholders to properly express their goals and communicate them to the agile team. In this paper, we propose a light weight Goal Net based method to model goal requirements in agile software development process to address this problem. It can be used to decompose complex processes into phased goals, and model low level user stories to high level hierarchy goal structures. Our preliminary analysis and studies in educational software engineering contexts show that it can improve agile team's group awareness to project goals and, thus, improve team productivity and artifact quality. The proposed approach was evaluated in university level agile software engineering projects. It has achieved an improvement of over 50 percentage points in terms of the proportion of high quality user stories generated by students compared to the standard user story template used in Scrum.
敏捷方法使用用户故事来捕获软件需求。这通常会导致团队成员过分强调他们对目标的理解,而没有适当地结合其他涉众或客户的目标。对于非技术涉众来说,现有的UML或其他面向目标的建模方法往往过于复杂,无法恰当地表达他们的目标并与敏捷团队进行沟通。为了解决这一问题,本文提出了一种基于Goal Net的轻量级敏捷软件开发过程目标需求建模方法。它可以用来将复杂的过程分解为分阶段的目标,并将低级用户故事建模为高级层次目标结构。我们在教育软件工程环境中的初步分析和研究表明,它可以提高敏捷团队对项目目标的团队意识,从而提高团队生产力和工件质量。在高校敏捷软件工程项目中对该方法进行了评价。与Scrum中使用的标准用户故事模板相比,学生生成的高质量用户故事的比例提高了50个百分点以上。
{"title":"Using goal net to model user stories in agile software development","authors":"Jun Lin, Han Yu, Zhiqi Shen, C. Miao","doi":"10.1109/SNPD.2014.6888731","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888731","url":null,"abstract":"Agile methodologies use user stories to capture software requirements. This often results in team members over emphasizing their understanding of the goals, without proper incorporation of goals from other stakeholders or customers. Existing UML or other goal oriented modeling methods tend to be overly complex for non-technical stakeholders to properly express their goals and communicate them to the agile team. In this paper, we propose a light weight Goal Net based method to model goal requirements in agile software development process to address this problem. It can be used to decompose complex processes into phased goals, and model low level user stories to high level hierarchy goal structures. Our preliminary analysis and studies in educational software engineering contexts show that it can improve agile team's group awareness to project goals and, thus, improve team productivity and artifact quality. The proposed approach was evaluated in university level agile software engineering projects. It has achieved an improvement of over 50 percentage points in terms of the proportion of high quality user stories generated by students compared to the standard user story template used in Scrum.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116729471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Jade: An efficient energy-aware computation offloading system with heterogeneous network interface bonding for ad-hoc networked mobile devices Jade:面向 ad-hoc 网络移动设备的异构网络接口结合型高效能源感知计算卸载系统
Hao Qian, Daniel Andresen
Mobile device users consistently desire faster results and longer battery life, which is frequently accomplished by of-floading computation to cloud-based servers. However, in common cases (Internet connectivity slow/unavailable, priva-cy/security issues), users have multiple devices with heterogeneous battery and computational capabilities independent of the cloud. Android provides mechanisms for creating mobile code, but lacks a native scheduling mechanism for determining where code should be executed. In this paper we present the results of an investigation into adding sophisticated scheduling capabilities to Android apps, which provides scheduling balancing energy and performance across networked mobile devices. Jade monitors and adapts to workload variation, communication costs, and energy status in a distributed ad-hoc network of Android mobile devices for supporting distributed computation. We show how the two goals can be integrated, and present several algorithms indicating a major advantage (over 75% improvement in energy use) can be achieved through the use of dynamic scheduling information for remote computational devices. We provide a detailed discussion of our system architecture and implementation, and briefly summarize the experimental results which have been achieved.
移动设备用户一直希望获得更快的结果和更长的电池续航时间,这通常是通过将计算加载到云端服务器来实现的。然而,在常见情况下(互联网连接缓慢/不可用、隐私/安全问题),用户拥有独立于云端的多台设备,其电池和计算能力各不相同。安卓系统提供了创建移动代码的机制,但缺乏确定代码执行位置的本地调度机制。在本文中,我们介绍了为安卓应用程序添加复杂调度功能的研究成果,该调度功能可在联网移动设备之间平衡能量和性能。Jade 监控并适应由 Android 移动设备组成的分布式 ad-hoc 网络中的工作量变化、通信成本和能源状况,以支持分布式计算。我们展示了如何将这两个目标整合在一起,并介绍了几种算法,这些算法表明,通过使用远程计算设备的动态调度信息,可以实现重大优势(能源利用率提高 75% 以上)。我们对系统架构和实施进行了详细讨论,并简要总结了已取得的实验结果。
{"title":"Jade: An efficient energy-aware computation offloading system with heterogeneous network interface bonding for ad-hoc networked mobile devices","authors":"Hao Qian, Daniel Andresen","doi":"10.1109/SNPD.2014.6888703","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888703","url":null,"abstract":"Mobile device users consistently desire faster results and longer battery life, which is frequently accomplished by of-floading computation to cloud-based servers. However, in common cases (Internet connectivity slow/unavailable, priva-cy/security issues), users have multiple devices with heterogeneous battery and computational capabilities independent of the cloud. Android provides mechanisms for creating mobile code, but lacks a native scheduling mechanism for determining where code should be executed. In this paper we present the results of an investigation into adding sophisticated scheduling capabilities to Android apps, which provides scheduling balancing energy and performance across networked mobile devices. Jade monitors and adapts to workload variation, communication costs, and energy status in a distributed ad-hoc network of Android mobile devices for supporting distributed computation. We show how the two goals can be integrated, and present several algorithms indicating a major advantage (over 75% improvement in energy use) can be achieved through the use of dynamic scheduling information for remote computational devices. We provide a detailed discussion of our system architecture and implementation, and briefly summarize the experimental results which have been achieved.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128374670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A rule-based framework for managing context-aware services based on heterogeneous and distributed Web services 一个基于规则的框架,用于管理基于异构和分布式Web服务的上下文感知服务
Hiroki Takatsuka, S. Saiki, S. Matsumoto, Masahide Nakamura
With the spread of Machine-to-Machine (M2M) systems and cloud services, various kinds of data are available through Web services. A context-aware service recognizes a real-world context from such data and behaves autonomously based on the context. However, it has been challenging to manage contexts and services defined on the heterogeneous and distributed Web services. In this paper, we propose a framework, called RuCAS, which systematically creates and manages context-aware service using various Web services (e.g. information services, sensor services, networked appliances, etc.). The framework describes every context-aware service by an ECA (Event-Condition-Action) rule. For this, an event is a context triggering the service, a condition is a set of contexts to be satisfied for execution, and the action is a set of Web services to be executed by the service. Thus, every context-aware service is simply managed in a uniform manner. Since the RuCAS is published as a Web service, it is easy for various applications to reuse and integrate created contexts and services. As a case study, RuCAS is applied to creating context-aware services in a real home network system.
随着机器对机器(M2M)系统和云服务的普及,各种类型的数据都可以通过Web服务获得。上下文感知服务从这些数据中识别现实世界的上下文,并基于上下文自主地执行操作。然而,管理在异构和分布式Web服务上定义的上下文和服务一直是一个挑战。在本文中,我们提出了一个名为RuCAS的框架,该框架使用各种Web服务(例如信息服务、传感器服务、联网设备等)系统地创建和管理上下文感知服务。该框架通过ECA(事件-条件-操作)规则描述每个上下文感知服务。为此,事件是触发服务的上下文,条件是执行时要满足的一组上下文,操作是服务要执行的一组Web服务。因此,以统一的方式简单地管理每个上下文感知服务。由于RuCAS是作为Web服务发布的,因此各种应用程序很容易重用和集成已创建的上下文和服务。作为一个案例研究,RuCAS应用于在一个真实的家庭网络系统中创建上下文感知服务。
{"title":"A rule-based framework for managing context-aware services based on heterogeneous and distributed Web services","authors":"Hiroki Takatsuka, S. Saiki, S. Matsumoto, Masahide Nakamura","doi":"10.1109/SNPD.2014.6888725","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888725","url":null,"abstract":"With the spread of Machine-to-Machine (M2M) systems and cloud services, various kinds of data are available through Web services. A context-aware service recognizes a real-world context from such data and behaves autonomously based on the context. However, it has been challenging to manage contexts and services defined on the heterogeneous and distributed Web services. In this paper, we propose a framework, called RuCAS, which systematically creates and manages context-aware service using various Web services (e.g. information services, sensor services, networked appliances, etc.). The framework describes every context-aware service by an ECA (Event-Condition-Action) rule. For this, an event is a context triggering the service, a condition is a set of contexts to be satisfied for execution, and the action is a set of Web services to be executed by the service. Thus, every context-aware service is simply managed in a uniform manner. Since the RuCAS is published as a Web service, it is easy for various applications to reuse and integrate created contexts and services. As a case study, RuCAS is applied to creating context-aware services in a real home network system.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A theoretical exploration of the impact of packet loss on network intrusion detection 丢包对网络入侵检测影响的理论探讨
Sidney C. Smith, R. Hammell, Travis W. Parker, L. Marvel
In this paper we review the problem of packet loss as it pertains to Network Intrusion Detection, seeking to answer two fundamental research questions which are stepping stones towards building a model that can be used to predict the rate of alert loss based upon the rate of packet loss. The first question deals with how the packet loss rate affects the sensor alert rate, and the second considers how the network traffic composition affects the results of the first question. Potential places where packet loss may occur are examined by dividing the problem into network, host, and sensor based packets loss. We posit theories about how packet loss may present itself and develop the Packet Dropper that induces packet loss into a dataset. Drop rates ranging from 0% to 100% are applied to four different data sets and the resulting abridged data sets are analyzed with Snort to collect alert loss rate. Conclusions are drawn about the importance of the distribution of packet loss and the effect of the network traffic composition.
在本文中,我们回顾了网络入侵检测中的丢包问题,试图回答两个基本的研究问题,这两个问题是建立一个模型的基石,该模型可以用来预测基于丢包率的警报损失率。第一个问题处理丢包率如何影响传感器报警率,第二个问题考虑网络流量构成如何影响第一个问题的结果。通过将问题划分为基于网络、主机和传感器的数据包丢失,检查可能发生数据包丢失的潜在位置。我们假设了关于丢包如何呈现的理论,并开发了数据包丢弃器,该丢包器可以诱导数据包丢失到数据集中。将0%到100%的丢失率应用于四个不同的数据集,并使用Snort分析所得到的精简数据集,以收集警报损失率。总结了丢包分布的重要性和网络流量构成的影响。
{"title":"A theoretical exploration of the impact of packet loss on network intrusion detection","authors":"Sidney C. Smith, R. Hammell, Travis W. Parker, L. Marvel","doi":"10.1109/SNPD.2014.6888699","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888699","url":null,"abstract":"In this paper we review the problem of packet loss as it pertains to Network Intrusion Detection, seeking to answer two fundamental research questions which are stepping stones towards building a model that can be used to predict the rate of alert loss based upon the rate of packet loss. The first question deals with how the packet loss rate affects the sensor alert rate, and the second considers how the network traffic composition affects the results of the first question. Potential places where packet loss may occur are examined by dividing the problem into network, host, and sensor based packets loss. We posit theories about how packet loss may present itself and develop the Packet Dropper that induces packet loss into a dataset. Drop rates ranging from 0% to 100% are applied to four different data sets and the resulting abridged data sets are analyzed with Snort to collect alert loss rate. Conclusions are drawn about the importance of the distribution of packet loss and the effect of the network traffic composition.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129774866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Can text mining technique be used as an alternative tool for qualitative research in education? 文本挖掘技术能否作为教育定性研究的替代工具?
Carl Lee, Chin-I Cheng, A. Zeleke
Qualitative research methodology is commonly used for education research. The main advantage is that it is capable of gaining more rigorous insights of research objectives when compared with quantitative research. However, due to the extensive time required, the sample size for a qualitative research is usually very small, and can be as small as two subjects. As a consequence, the results are difficult to be inferred to the population. Text mining methodology is a modern technique to analyze text data. It has been successfully applied to a wide variety of business problems. However, it has not yet been applied as a tool for qualitative research in education. In this study, we attempt to apply text mining method to analyze students' written reasons of a question related to the concept of variation. Four sections of an introductory statistics course participated in the study (n = 218). The results suggest text mining method can be an alternative, if applied appropriately. The strength and weakness of using text mining for qualitative research are investigated.
定性研究方法是教育研究中常用的方法。它的主要优点是,与定量研究相比,它能够获得更严格的研究目标见解。然而,由于需要大量的时间,定性研究的样本量通常非常小,可以小到两个受试者。因此,这些结果很难向大众推断出来。文本挖掘方法是一种分析文本数据的现代技术。它已经成功地应用于各种各样的商业问题。然而,它尚未被用作教育定性研究的工具。在本研究中,我们尝试运用文本挖掘方法来分析学生对变异概念相关问题的书面原因。统计学入门课程的四个部分参与了研究(n = 218)。结果表明,如果应用得当,文本挖掘方法可以成为一种替代方法。探讨了文本挖掘在定性研究中的优缺点。
{"title":"Can text mining technique be used as an alternative tool for qualitative research in education?","authors":"Carl Lee, Chin-I Cheng, A. Zeleke","doi":"10.1109/SNPD.2014.6888691","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888691","url":null,"abstract":"Qualitative research methodology is commonly used for education research. The main advantage is that it is capable of gaining more rigorous insights of research objectives when compared with quantitative research. However, due to the extensive time required, the sample size for a qualitative research is usually very small, and can be as small as two subjects. As a consequence, the results are difficult to be inferred to the population. Text mining methodology is a modern technique to analyze text data. It has been successfully applied to a wide variety of business problems. However, it has not yet been applied as a tool for qualitative research in education. In this study, we attempt to apply text mining method to analyze students' written reasons of a question related to the concept of variation. Four sections of an introductory statistics course participated in the study (n = 218). The results suggest text mining method can be an alternative, if applied appropriately. The strength and weakness of using text mining for qualitative research are investigated.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Refinement/verification of early stage probabilistic software project schedules in the planning stage 在计划阶段细化/验证早期概率软件项目进度表
Donghwoon Kwon, R. Hammell
Previous research proposed a framework for the objective and accurate estimation of software project schedules in the proposal preparation stage of large-sized software development projects. A probabilistic approach was used to take into account the uncertainty inherent in the early stage of such projects. This work illustrates how to use the framework in the later planning stage when additional, more detailed information is available via the design documentation. The process continues to use the International Function Point User Group (IFPUG) function point analysis and the International Software Benchmarking Standards Group (ISBSG) regression equations to calculate project size and resource effort, but substitutes the more accurate adjusted function point information for the previously used unadjusted function point data. The use of the proposed framework in the planning stage provides for the reassessment, verification and/or refinement of the estimated schedule produced in the early stage.
在大型软件开发项目的提案准备阶段,已有的研究提出了一个客观、准确估算软件项目进度的框架。采用了一种概率方法来考虑此类项目早期阶段固有的不确定性。当通过设计文档可以获得额外的、更详细的信息时,这项工作说明了如何在后期规划阶段使用框架。该过程继续使用国际功能点用户组(IFPUG)功能点分析和国际软件基准标准组(ISBSG)回归方程来计算项目规模和资源工作量,但是用更准确的调整功能点信息代替以前使用的未调整功能点数据。在规划阶段使用拟议的框架可重新评估、核实和/或改进在早期阶段产生的估计时间表。
{"title":"Refinement/verification of early stage probabilistic software project schedules in the planning stage","authors":"Donghwoon Kwon, R. Hammell","doi":"10.1109/SNPD.2014.6888712","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888712","url":null,"abstract":"Previous research proposed a framework for the objective and accurate estimation of software project schedules in the proposal preparation stage of large-sized software development projects. A probabilistic approach was used to take into account the uncertainty inherent in the early stage of such projects. This work illustrates how to use the framework in the later planning stage when additional, more detailed information is available via the design documentation. The process continues to use the International Function Point User Group (IFPUG) function point analysis and the International Software Benchmarking Standards Group (ISBSG) regression equations to calculate project size and resource effort, but substitutes the more accurate adjusted function point information for the previously used unadjusted function point data. The use of the proposed framework in the planning stage provides for the reassessment, verification and/or refinement of the estimated schedule produced in the early stage.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134593663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic test case prioritization based on multi-objective 基于多目标的动态测试用例优先级划分
Xiaolin Wang, Hong-wei Zeng
Test case prioritization technology is to sort the test cases before the software testing designed to improve test efficiency. This paper presents a dynamic test case prioritization technique based on multi-objective. It integrates several traditional single-objective technologies so that makes it more flexible. This technology, from five dimensions, calculates prioritization values of test cases separately. Then a weighted sum is made to the values and it sorts the test cases according to the values. The results return to the storage in order to dynamically adjust the sort of test cases. This technology not only meets the high demands of regression testing, but also ensures the high efficiency of the test results.
测试用例优先排序技术是在软件测试之前对测试用例进行排序,旨在提高测试效率。提出了一种基于多目标的动态测试用例优先排序技术。它集成了几种传统的单目标技术,使其更加灵活。该技术从五个维度分别计算测试用例的优先级值。然后对这些值进行加权和,并根据这些值对测试用例进行排序。结果返回到存储中,以便动态调整测试用例的排序。该技术既满足了回归测试的高要求,又保证了测试结果的高效率。
{"title":"Dynamic test case prioritization based on multi-objective","authors":"Xiaolin Wang, Hong-wei Zeng","doi":"10.1109/SNPD.2014.6888744","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888744","url":null,"abstract":"Test case prioritization technology is to sort the test cases before the software testing designed to improve test efficiency. This paper presents a dynamic test case prioritization technique based on multi-objective. It integrates several traditional single-objective technologies so that makes it more flexible. This technology, from five dimensions, calculates prioritization values of test cases separately. Then a weighted sum is made to the values and it sorts the test cases according to the values. The results return to the storage in order to dynamically adjust the sort of test cases. This technology not only meets the high demands of regression testing, but also ensures the high efficiency of the test results.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Error value driven fault analysis attack 错误值驱动的故障分析攻击
M. Yoshikawa, Hikaru Goto, K. Asahi
The advanced encryption standard (AES) has been sufficiently studied to confirm that its decryption is computationally impossible. However, its vulnerability against fault analysis attacks has been pointed out in recent years. To verify the vulnerability of electronic devices in the future, into which cryptographic circuits have been incorporated, fault Analysis attacks must be thoroughly studied. The present study proposes a new fault analysis attack method which utilizes the tendency of an operation error due to a glitch. The present study also verifies the validity of the proposed method by performing evaluation experiments using FPGA.
对高级加密标准(AES)进行了充分的研究,证实其解密在计算上是不可能的。然而,近年来人们指出了它在故障分析攻击中的脆弱性。为了在未来验证电子设备的脆弱性,必须深入研究故障分析攻击。本研究提出了一种新的故障分析攻击方法,该方法利用故障导致操作错误的倾向。本研究还通过FPGA进行了评估实验,验证了所提方法的有效性。
{"title":"Error value driven fault analysis attack","authors":"M. Yoshikawa, Hikaru Goto, K. Asahi","doi":"10.1109/SNPD.2014.6888689","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888689","url":null,"abstract":"The advanced encryption standard (AES) has been sufficiently studied to confirm that its decryption is computationally impossible. However, its vulnerability against fault analysis attacks has been pointed out in recent years. To verify the vulnerability of electronic devices in the future, into which cryptographic circuits have been incorporated, fault Analysis attacks must be thoroughly studied. The present study proposes a new fault analysis attack method which utilizes the tendency of an operation error due to a glitch. The present study also verifies the validity of the proposed method by performing evaluation experiments using FPGA.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125854703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal of eye-gaze recognize method for input interface without infra-red ray equipment 一种无红外设备输入界面人眼注视识别方法的提出
K. Fukushima, N. Shirahama
The main purpose of this study is to develop the inexpensive eye-gaze input interface for disabled people. The eye-gaze inputting can suit many situations, and it has little load for user because it is non-contact input interface. Many projects about the eye-gaze have been studied recently. Most of the productions of eye-gaze inputting use infra-red rays (IR) to detect the iris in the eyes. However the harm of IR for human eyes has been pointed out. In addition, if the interface requires the camera which has IR, the users must purchase the specific devices. Therefore we adopted a PC and the camera doesn't have the IR function. We propose the system by using the motion-template that is one of the functions of OpenCV library for tracking motion. However this function can't recognize the point where the user watches on monitor. It can recognize only the motion. That's why we made calibrate function to relate the eye-gaze with the monitor. We propose two methods to recognize eye-gaze. Both methods require the iris binary image. This image shows the iris shape and we expect that user's visual point can be calculated from this iris image. One method uses gravity point to calculate the point. Other method uses the rectangular approximation to calculate it. We did experiments for some subjects by both methods and compared the results to validate which method is proper and how much the calibrate function is accurate. In the experiment, the function randomly spotted a blue target on the monitor. The target position changes on a regular basis. In this experiment, the user stares at the target and we check the accuracy. If this function or methods are proper, the function correctly recognizes the user stare at target or near. For more accuracy, we will consider about how to detect the iris correctly in the future.
本研究的主要目的是为残障人士开发廉价的眼注视输入介面。眼睛注视输入可以适应多种情况,并且由于它是非接触式输入接口,对用户的负荷很小。最近有许多关于眼睛注视的研究项目。眼球注视输入的大部分产品都是利用红外线(IR)来检测眼睛中的虹膜。然而,红外辐射对人眼的危害已经被指出。另外,如果接口需要有红外的摄像头,用户必须购买特定的设备。所以我们采用的是PC机,相机没有红外功能。我们利用OpenCV库的运动模板功能来实现系统的运动跟踪。然而,该功能不能识别用户在监视器上观看的点。它只能识别运动。这就是为什么我们制作了校准功能,将眼睛的凝视与显示器联系起来。我们提出了两种识别眼睛注视的方法。这两种方法都需要虹膜二值图像。该图像显示了虹膜的形状,我们期望从该虹膜图像中可以计算出用户的视觉点。一种方法是利用重力点计算点。另一种方法是用矩形近似来计算。我们用这两种方法对一些对象进行了实验,并对结果进行了比较,以验证哪种方法更合适,校准函数的准确度有多大。在实验中,该功能在显示器上随机发现了一个蓝色目标。目标位置定期变化。在这个实验中,用户盯着目标,我们检查准确性。如果该功能或方法适当,该功能可以正确识别用户盯着目标或靠近目标。为了更准确,我们将在未来考虑如何正确检测虹膜。
{"title":"Proposal of eye-gaze recognize method for input interface without infra-red ray equipment","authors":"K. Fukushima, N. Shirahama","doi":"10.1109/SNPD.2014.6888742","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888742","url":null,"abstract":"The main purpose of this study is to develop the inexpensive eye-gaze input interface for disabled people. The eye-gaze inputting can suit many situations, and it has little load for user because it is non-contact input interface. Many projects about the eye-gaze have been studied recently. Most of the productions of eye-gaze inputting use infra-red rays (IR) to detect the iris in the eyes. However the harm of IR for human eyes has been pointed out. In addition, if the interface requires the camera which has IR, the users must purchase the specific devices. Therefore we adopted a PC and the camera doesn't have the IR function. We propose the system by using the motion-template that is one of the functions of OpenCV library for tracking motion. However this function can't recognize the point where the user watches on monitor. It can recognize only the motion. That's why we made calibrate function to relate the eye-gaze with the monitor. We propose two methods to recognize eye-gaze. Both methods require the iris binary image. This image shows the iris shape and we expect that user's visual point can be calculated from this iris image. One method uses gravity point to calculate the point. Other method uses the rectangular approximation to calculate it. We did experiments for some subjects by both methods and compared the results to validate which method is proper and how much the calibrate function is accurate. In the experiment, the function randomly spotted a blue target on the monitor. The target position changes on a regular basis. In this experiment, the user stares at the target and we check the accuracy. If this function or methods are proper, the function correctly recognizes the user stare at target or near. For more accuracy, we will consider about how to detect the iris correctly in the future.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115226678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New data warehouse designing approach based on principal component analysis 基于主成分分析的数据仓库设计新方法
Wafa Tebourski, W. Karaa, H. Ghézala
Decision making has become a strategic need for any business. Indeed, it is among the priorities of capital business. The establishment of decision information systems facilitates the data exploitation and analysis. We distinguish data warehouses as the core system of business intelligence to ensure the structuring and analysis of multidimensional data. Consequently, the design of data warehouses has become a major problem, leading to the development of appropriate approaches to implement data warehouses. In this paper, we propose an approach to design and to construct data warehouses based on a descriptive statistics technique for the analysis of multidimensional data in the Principal Components Analysis (PCA). The findings of this article appear in two main areas: (i) a conceptual model data warehouse, (ii) an algorithm for the determination of measures and dimensions. A case study is used to validate our proposal.
决策已成为任何企业的战略需要。事实上,这是资本业务的优先事项之一。决策信息系统的建立有利于数据的开发和分析。我们将数据仓库作为商业智能的核心系统,确保多维数据的结构化和分析。因此,数据仓库的设计已成为一个主要问题,需要开发适当的方法来实现数据仓库。在本文中,我们提出了一种基于描述统计技术的设计和构建数据仓库的方法,用于主成分分析(PCA)中多维数据的分析。本文的发现主要体现在两个方面:(i)概念模型数据仓库,(ii)确定度量和维度的算法。一个案例研究被用来验证我们的建议。
{"title":"New data warehouse designing approach based on principal component analysis","authors":"Wafa Tebourski, W. Karaa, H. Ghézala","doi":"10.1109/SNPD.2014.6888696","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888696","url":null,"abstract":"Decision making has become a strategic need for any business. Indeed, it is among the priorities of capital business. The establishment of decision information systems facilitates the data exploitation and analysis. We distinguish data warehouses as the core system of business intelligence to ensure the structuring and analysis of multidimensional data. Consequently, the design of data warehouses has become a major problem, leading to the development of appropriate approaches to implement data warehouses. In this paper, we propose an approach to design and to construct data warehouses based on a descriptive statistics technique for the analysis of multidimensional data in the Principal Components Analysis (PCA). The findings of this article appear in two main areas: (i) a conceptual model data warehouse, (ii) an algorithm for the determination of measures and dimensions. A case study is used to validate our proposal.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1