P. A. Hernandez-Avalos, C. F. Uribe, Roger Luis Velázquez, R. Cumplido
This paper presents an original approach for watermarking of digital images using Iterated function Systems (IFS) to generate positions maps used by Least Significant Bit method (LSB). The new approach exploits the main feature of fractals (generated by IFS): infinite magnification. The map generated by only one IFS can be used in images of different sizes. Furthermore, to avoid the image distortion by the embedding process, the data are inserted in non-homogeneous regions, to obtain this behavior, the Harris feature detector was modified. Obtaining a watermarking scheme robust to visual attack.
{"title":"Watermarking Based on Iterated Function Systems","authors":"P. A. Hernandez-Avalos, C. F. Uribe, Roger Luis Velázquez, R. Cumplido","doi":"10.1109/ENC.2009.58","DOIUrl":"https://doi.org/10.1109/ENC.2009.58","url":null,"abstract":"This paper presents an original approach for watermarking of digital images using Iterated function Systems (IFS) to generate positions maps used by Least Significant Bit method (LSB). The new approach exploits the main feature of fractals (generated by IFS): infinite magnification. The map generated by only one IFS can be used in images of different sizes. Furthermore, to avoid the image distortion by the embedding process, the data are inserted in non-homogeneous regions, to obtain this behavior, the Harris feature detector was modified. Obtaining a watermarking scheme robust to visual attack.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Jawad, Patricia Serrano-Alvarado, P. Valduriez, Stéphane Drapeau
Online peer-to-peer (P2P) communities such as professional ones (e.g., medical or research) are becoming popular due to increasing needs on data sharing. P2P environments offer valuable characteristics but limited guarantees when sharing sensitive or confidential data. They can be considered as hostile because data can be accessed by everyone (by potentially untrustworthy peers) and used for everything (e.g., for marketing or for activities against the owner’s preferences or ethics). In this paper we propose PriServ, a privacy service located on top of distributed hash table (DHT) based P2P systems which prevents data privacy violations. Based on data owner privacy preferences, PriServ uses Hippocratic database principles, takes into account which operations will be realized on shared data (e.g., read, write, disclosure) and uses reputation techniques to increase trust on peers. Several simulation results encourage our ideas and a prototype of PriServ is under development.
{"title":"A Data Privacy Service for Structured P2P Systems","authors":"M. Jawad, Patricia Serrano-Alvarado, P. Valduriez, Stéphane Drapeau","doi":"10.1109/ENC.2009.32","DOIUrl":"https://doi.org/10.1109/ENC.2009.32","url":null,"abstract":"Online peer-to-peer (P2P) communities such as professional ones (e.g., medical or research) are becoming popular due to increasing needs on data sharing. P2P environments offer valuable characteristics but limited guarantees when sharing sensitive or confidential data. They can be considered as hostile because data can be accessed by everyone (by potentially untrustworthy peers) and used for everything (e.g., for marketing or for activities against the owner’s preferences or ethics). In this paper we propose PriServ, a privacy service located on top of distributed hash table (DHT) based P2P systems which prevents data privacy violations. Based on data owner privacy preferences, PriServ uses Hippocratic database principles, takes into account which operations will be realized on shared data (e.g., read, write, disclosure) and uses reputation techniques to increase trust on peers. Several simulation results encourage our ideas and a prototype of PriServ is under development.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a proposal for adapting the Software Engineering Institute’s (SEI) architectural development methods (QAW, ADD, ATAM and V&B)to the context of small software development teams.The paper presents the motivations for creating the adapted methods and the adaptation proposal of the different methods, including examples of the templates that support them. The adapted methods are evaluated by observing 2 student teams perform the architectural design of an application based in a variant of the Service Oriented Architecture (SOA). Finally, the paper provides guidelines for integrating the adapted methods to the TSPi, specifically explaining where they fit with respect to requirements development and high-level design phases.
{"title":"Using Adapted Software Architecture Development Methods in a SOA Context","authors":"Ismael Nuñez-Reyna, H. Cervantes","doi":"10.1109/ENC.2009.12","DOIUrl":"https://doi.org/10.1109/ENC.2009.12","url":null,"abstract":"This paper presents a proposal for adapting the Software Engineering Institute’s (SEI) architectural development methods (QAW, ADD, ATAM and V&B)to the context of small software development teams.The paper presents the motivations for creating the adapted methods and the adaptation proposal of the different methods, including examples of the templates that support them. The adapted methods are evaluated by observing 2 student teams perform the architectural design of an application based in a variant of the Service Oriented Architecture (SOA). Finally, the paper provides guidelines for integrating the adapted methods to the TSPi, specifically explaining where they fit with respect to requirements development and high-level design phases.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The IP Multimedia Subsystem is a control overlay network that enables the delivery of multimedia services to end subscribers. One of the core steps towards the optimization of an IMS deployment consists of verifying that the involved resources deliver the desired performance when the system is operating under stress conditions. With this goal in mind, this paper presents an IMS performance evaluation based on the IMS/NGN Performance Benchmark specification from ETSI, using well-known open source software reference implementations and state-of-the-art analyzing tools for collecting the related measurements.
{"title":"A Performance Benchmark of a Multimedia Service Delivery Framework","authors":"R. Herpertz, J. M. Carlín","doi":"10.1109/ENC.2009.24","DOIUrl":"https://doi.org/10.1109/ENC.2009.24","url":null,"abstract":"The IP Multimedia Subsystem is a control overlay network that enables the delivery of multimedia services to end subscribers. One of the core steps towards the optimization of an IMS deployment consists of verifying that the involved resources deliver the desired performance when the system is operating under stress conditions. With this goal in mind, this paper presents an IMS performance evaluation based on the IMS/NGN Performance Benchmark specification from ETSI, using well-known open source software reference implementations and state-of-the-art analyzing tools for collecting the related measurements.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123864653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ricardo Cruz Mendoza, Miguel Morales Trujillo, Mauricio Morgado C., H. Oktaba, Guadalupe E. Ibargüengoitia, F. Pino, M. Piattini
Recurring problems in the application of a new software process improvement model have to do with the lack of knowledge about how it works, its dissemination and the tools available, making it difficult to acquire the model and then understand it. Nowadays, e-learning systems could help Very Small Software Entities (VSEs), to get to know and understand software models and their peculiarities. To address this issue, this paper focuses on the development of a tool based on e-learning standards; it is called the HEPALE! Project.This project is composed of three steps. First, the creation of a deployment package set, in line with ISO/IEC PDTR 29110-5-1 Software Engineering-Lifecycle Profiles for VSEs, for implementing software process improvement models, as well for making them easier to use. Secondly, the creation of a repository that supports changes in the deployment packages, based on e-learning standards and tools, to create, represent, interact with and manipulate learning objects and e-learning. Finally, the last part aims to spread the software development models COMPETISOFT and ISO / IEC 29110-5-1, the application of technologies that make use of e-learning. All this is done to aid VSEs in bringing best practices into their software production.
{"title":"Supporting the Software Process Improvement in Very Small Entities through E-learning: The HEPALE! Project","authors":"Ricardo Cruz Mendoza, Miguel Morales Trujillo, Mauricio Morgado C., H. Oktaba, Guadalupe E. Ibargüengoitia, F. Pino, M. Piattini","doi":"10.1109/ENC.2009.33","DOIUrl":"https://doi.org/10.1109/ENC.2009.33","url":null,"abstract":"Recurring problems in the application of a new software process improvement model have to do with the lack of knowledge about how it works, its dissemination and the tools available, making it difficult to acquire the model and then understand it. Nowadays, e-learning systems could help Very Small Software Entities (VSEs), to get to know and understand software models and their peculiarities. To address this issue, this paper focuses on the development of a tool based on e-learning standards; it is called the HEPALE! Project.This project is composed of three steps. First, the creation of a deployment package set, in line with ISO/IEC PDTR 29110-5-1 Software Engineering-Lifecycle Profiles for VSEs, for implementing software process improvement models, as well for making them easier to use. Secondly, the creation of a repository that supports changes in the deployment packages, based on e-learning standards and tools, to create, represent, interact with and manipulate learning objects and e-learning. Finally, the last part aims to spread the software development models COMPETISOFT and ISO / IEC 29110-5-1, the application of technologies that make use of e-learning. All this is done to aid VSEs in bringing best practices into their software production.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Morales-Sandoval, C. F. Uribe, R. Cumplido, I. Algredo-Badillo
This paper reports a run-time reconfigurable co-processor for scalar multiplication in elliptic curve cryptography. By reconfiguration, the co-processor can support various finite field orders and hence, different security levels. This is a contribution to solve the current interoperability problems in elliptic curve cryptography. We report the co-processor hardware organization and the cost in terms of area and speed of the reconfigurable solution compared to a static implementation.
{"title":"A Run Time Reconfigurable Co-processor for Elliptic Curve Scalar Multiplication","authors":"M. Morales-Sandoval, C. F. Uribe, R. Cumplido, I. Algredo-Badillo","doi":"10.1109/ENC.2009.57","DOIUrl":"https://doi.org/10.1109/ENC.2009.57","url":null,"abstract":"This paper reports a run-time reconfigurable co-processor for scalar multiplication in elliptic curve cryptography. By reconfiguration, the co-processor can support various finite field orders and hence, different security levels. This is a contribution to solve the current interoperability problems in elliptic curve cryptography. We report the co-processor hardware organization and the cost in terms of area and speed of the reconfigurable solution compared to a static implementation.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128795791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Javier-Alfonso Espinosa-Oviedo, Genoveva Vargas-Solar, J. Zechinelli-Martini, C. Collet
Along with the emergence of Web 2.0 there is a need for accessing information in a continues and secure way using whatever device available for doing so. In such a context, access to information resources must be done in a secure and robust way through services that come up as a new paradigm for programming and organizing operations. This paper presents an approach for retrieving critical and non critical data with different security constraints by coordinating services. Thanks to contracts describing the logic of a services based application running in a dynamic environment, it is possible to associate a personalized secure behavior in an orthogonal way. Contracts ensure, for example, integrity and authentication of services at execution time in the presence of exceptions and make applications aware of their execution context.
{"title":"Securely Coordinating Services Using Contracts","authors":"Javier-Alfonso Espinosa-Oviedo, Genoveva Vargas-Solar, J. Zechinelli-Martini, C. Collet","doi":"10.1109/ENC.2009.20","DOIUrl":"https://doi.org/10.1109/ENC.2009.20","url":null,"abstract":"Along with the emergence of Web 2.0 there is a need for accessing information in a continues and secure way using whatever device available for doing so. In such a context, access to information resources must be done in a secure and robust way through services that come up as a new paradigm for programming and organizing operations. This paper presents an approach for retrieving critical and non critical data with different security constraints by coordinating services. Thanks to contracts describing the logic of a services based application running in a dynamic environment, it is possible to associate a personalized secure behavior in an orthogonal way. Contracts ensure, for example, integrity and authentication of services at execution time in the presence of exceptions and make applications aware of their execution context.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Much work has been done in recent years on designing techniques used as support tools in the knowledge discovery process, particularly in classification tasks. In most cases it is assumed that the data where these techniques are applied is free of errors or the data was cleaned in a previous phase. However the data cleaning process represents a great amount of time and effort to the general knowledge discovery process.In this paper, we present preliminary results to devise a method to determine if the amount of errors in a dataset that will be processed by means of Naive Bayes classifier will influence the results. Our results may be used as a criterion to determine if it is necessary to carry out the data cleaning tasks over the data that will be processed by the classifier. Since the cleaning process takes a lot of time and effort our results are a helpful tool in the overall knowledge discovery process.
{"title":"Meaningful Error Estimations for Data Analysis","authors":"René Villeda-Ruz, Javier García-García","doi":"10.1109/ENC.2009.23","DOIUrl":"https://doi.org/10.1109/ENC.2009.23","url":null,"abstract":"Much work has been done in recent years on designing techniques used as support tools in the knowledge discovery process, particularly in classification tasks. In most cases it is assumed that the data where these techniques are applied is free of errors or the data was cleaned in a previous phase. However the data cleaning process represents a great amount of time and effort to the general knowledge discovery process.In this paper, we present preliminary results to devise a method to determine if the amount of errors in a dataset that will be processed by means of Naive Bayes classifier will influence the results. Our results may be used as a criterion to determine if it is necessary to carry out the data cleaning tasks over the data that will be processed by the classifier. Since the cleaning process takes a lot of time and effort our results are a helpful tool in the overall knowledge discovery process.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cooperative or collaborative learning techniques are based on student cooperation aimed at the achievement of a common goal. This kind of techniques generates more significant and lasting knowledge. Additionally, the student has to face the challenge of not only learning individually, but also explaining to their classmates the ideas that they do not quite grasp, which implies a practice of their communication, argumentation and discussion skills. That is why this kind of techniques has been used in courses related to object-oriented software development at Pontificia Universidad Católica del Perú (PUCP) since 2002 and at Universidad del Bío-Bío (UBB) since 2006 as a reinforcement for the lectures previously given on each subject. Feedback from students who have participated in cooperative classes has been very positive.This paper presents the design of a cooperative learning-based class to teach analysis class diagrams using the jigsaw technique and shows the results obtained in two semesters at PUCP and one semester at UBB.The results of the tests taken allowed us to corroborate that students who bore some misconceptions at first, eventually improved their performance after the cooperative work was finalized. Based on the results of an anonymous questionnaire, we can observe that the students consider that the work carried out with the jigsaw technique improved their comprehension and learning of the subject.
合作或协作学习技术是基于学生合作,旨在实现一个共同的目标。这种技术产生了更有意义和更持久的知识。此外,学生不仅要面对单独学习的挑战,还要向同学们解释他们不太掌握的想法,这意味着他们的沟通、论证和讨论能力的练习。这就是为什么这种技术从2002年开始在Pontificia Universidad Católica del Perú (PUCP)和从2006年开始在Universidad del Bío-Bío (UBB)用于与面向对象软件开发相关的课程中,作为先前对每个主题的讲座的补充。参与合作课堂的学生反馈非常积极。本文提出了一种基于合作学习的课堂设计,利用拼图技术来教授分析类图,并展示了在PUCP两个学期和UBB一个学期所取得的成果。所做的测试结果让我们证实,最初有一些误解的学生,最终在合作作业完成后,他们的表现有所改善。根据一份匿名问卷的结果,我们可以观察到学生们认为用拼图技术进行的工作提高了他们对学科的理解和学习。
{"title":"The Jigsaw Technique: Experiences Teaching Analysis Class Diagrams","authors":"J. Pow-Sang, P. Campos","doi":"10.1109/ENC.2009.31","DOIUrl":"https://doi.org/10.1109/ENC.2009.31","url":null,"abstract":"Cooperative or collaborative learning techniques are based on student cooperation aimed at the achievement of a common goal. This kind of techniques generates more significant and lasting knowledge. Additionally, the student has to face the challenge of not only learning individually, but also explaining to their classmates the ideas that they do not quite grasp, which implies a practice of their communication, argumentation and discussion skills. That is why this kind of techniques has been used in courses related to object-oriented software development at Pontificia Universidad Católica del Perú (PUCP) since 2002 and at Universidad del Bío-Bío (UBB) since 2006 as a reinforcement for the lectures previously given on each subject. Feedback from students who have participated in cooperative classes has been very positive.This paper presents the design of a cooperative learning-based class to teach analysis class diagrams using the jigsaw technique and shows the results obtained in two semesters at PUCP and one semester at UBB.The results of the tests taken allowed us to corroborate that students who bore some misconceptions at first, eventually improved their performance after the cooperative work was finalized. Based on the results of an anonymous questionnaire, we can observe that the students consider that the work carried out with the jigsaw technique improved their comprehension and learning of the subject.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"36 213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Photographic observations of the night sky can best be presented using a data model that conveys the observations, analysis, objects contained with the observations, and results of analysis pertaining to those objects. Such a model is proposed in this paper and it is referred to as the internet Flexible Image Transport System (iFITS), along with a mapping function to transform instances of the Sloan Digital Sky Survey (SDSS) Data Release 1 (DR1) to instances of iFITS, and a hybrid light-weight marshaling method to transfer DR1 data to the implementation of iFITS. iFITS is implemented as a mobile code agent that supports client-based image retrieval in web-based mobile computing environments. The implementation of iFITS was tested against the Image Query Service of SDSS Data Release 6 and the Revised Image Query Service recently proposed. The experiments results reported show a three-fold speedup for iFITS.
{"title":"A Data Model for a Mobile Image Query Service","authors":"D. Beatty, N. Lopez-Benitez","doi":"10.1109/ENC.2009.13","DOIUrl":"https://doi.org/10.1109/ENC.2009.13","url":null,"abstract":"Photographic observations of the night sky can best be presented using a data model that conveys the observations, analysis, objects contained with the observations, and results of analysis pertaining to those objects. Such a model is proposed in this paper and it is referred to as the internet Flexible Image Transport System (iFITS), along with a mapping function to transform instances of the Sloan Digital Sky Survey (SDSS) Data Release 1 (DR1) to instances of iFITS, and a hybrid light-weight marshaling method to transfer DR1 data to the implementation of iFITS. iFITS is implemented as a mobile code agent that supports client-based image retrieval in web-based mobile computing environments. The implementation of iFITS was tested against the Image Query Service of SDSS Data Release 6 and the Revised Image Query Service recently proposed. The experiments results reported show a three-fold speedup for iFITS.","PeriodicalId":273670,"journal":{"name":"2009 Mexican International Conference on Computer Science","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132420985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}