首页 > 最新文献

2012 International Conference on Computer Systems and Industrial Informatics最新文献

英文 中文
Assessment metrics for intelligence level of human-computer interface 人机界面智能水平评估指标
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454413
Ahmed El Zarka, T. Ozkul
The Quality of human computer interface is increasingly getting more important as embedded computers and mobile computing are becoming an important part of our lives. The user friendly human computer interface is what trumps the commercial success of the device. Machine intelligence quotient describes the intelligence level of machines, and this intelligence is complemented with the user interface level of intelligence. This relationship arises from the position of the interface that mediates the interaction between human and machines. The intelligent interface makes it easy for users to tell the device what they want to do. This communication between the user and the device provides insights into quantitatively assess the user interface intelligence quotient. This study investigates the user interface intelligence of several Smartphone interfaces by proposing a framework for assessing the intelligence quotient.
随着嵌入式计算机和移动计算成为我们生活的重要组成部分,人机界面的质量变得越来越重要。用户友好的人机界面胜过了该设备的商业成功。机器智商描述了机器的智能水平,这种智能与用户界面的智能水平相辅相成。这种关系源于调解人机交互的接口位置。智能界面使用户可以轻松地告诉设备他们想要做什么。用户和设备之间的这种通信提供了对定量评估用户界面智商的见解。本研究通过提出一个评估智商的框架来调查几个智能手机界面的用户界面智能。
{"title":"Assessment metrics for intelligence level of human-computer interface","authors":"Ahmed El Zarka, T. Ozkul","doi":"10.1109/ICCSII.2012.6454413","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454413","url":null,"abstract":"The Quality of human computer interface is increasingly getting more important as embedded computers and mobile computing are becoming an important part of our lives. The user friendly human computer interface is what trumps the commercial success of the device. Machine intelligence quotient describes the intelligence level of machines, and this intelligence is complemented with the user interface level of intelligence. This relationship arises from the position of the interface that mediates the interaction between human and machines. The intelligent interface makes it easy for users to tell the device what they want to do. This communication between the user and the device provides insights into quantitatively assess the user interface intelligence quotient. This study investigates the user interface intelligence of several Smartphone interfaces by proposing a framework for assessing the intelligence quotient.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Can Android be used for real-time purposes? Android可以用于实时目的吗?
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454350
Luc Perneel, Hasan Fayyad-Kazan, M. Timmerman
Android is thought as being yet another operating system! In reality, it is a software platform rather than just an OS; in practical terms, it is an application framework on top of Linux, which facilitates its rapid deployment in many domains. Android was originally designed to be used in mobile computing applications, from handsets to tablets to e-books. But developers are also looking to employ Android in a variety of other embedded systems that have traditionally relied on the benefits of true real-time operating systems performance, boot-up time, real-time response, reliability, and no hidden maintenance costs. In this paper, we present a preliminary conclusion about Android's real-time behavior and performance based on experimental measurements such as thread switch latency, interrupt latency, sustained interrupt frequency, and finally the behavior of mutex and semaphore. All these measurements were done on the same ARM platform (Beagleboard-XM). Our testing results showed that Android in its current state cannot be qualified to be used in real-time environments.
Android被认为是另一个操作系统!实际上,它是一个软件平台,而不仅仅是一个操作系统;实际上,它是一个建立在Linux之上的应用程序框架,这有助于它在许多领域的快速部署。Android最初被设计用于移动计算应用,从手机到平板电脑再到电子书。但开发人员也希望在各种其他嵌入式系统中使用Android,这些系统传统上依赖于真正的实时操作系统性能、启动时间、实时响应、可靠性和无隐藏维护成本等优点。本文基于线程切换延迟、中断延迟、持续中断频率以及互斥锁和信号量的行为等实验测量,对Android的实时行为和性能给出了初步的结论。所有这些测量都是在相同的ARM平台(Beagleboard-XM)上完成的。我们的测试结果表明,目前状态的Android不具备在实时环境中使用的资格。
{"title":"Can Android be used for real-time purposes?","authors":"Luc Perneel, Hasan Fayyad-Kazan, M. Timmerman","doi":"10.1109/ICCSII.2012.6454350","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454350","url":null,"abstract":"Android is thought as being yet another operating system! In reality, it is a software platform rather than just an OS; in practical terms, it is an application framework on top of Linux, which facilitates its rapid deployment in many domains. Android was originally designed to be used in mobile computing applications, from handsets to tablets to e-books. But developers are also looking to employ Android in a variety of other embedded systems that have traditionally relied on the benefits of true real-time operating systems performance, boot-up time, real-time response, reliability, and no hidden maintenance costs. In this paper, we present a preliminary conclusion about Android's real-time behavior and performance based on experimental measurements such as thread switch latency, interrupt latency, sustained interrupt frequency, and finally the behavior of mutex and semaphore. All these measurements were done on the same ARM platform (Beagleboard-XM). Our testing results showed that Android in its current state cannot be qualified to be used in real-time environments.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122843711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Concurrent monitoring environment for obtaining IPFIX flow and signature based IDS alert data 用于获取基于IPFIX流和签名的IDS警报数据的并发监控环境
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454305
Teemu Alapaholuoma, T. Seppala, J. Nieminen, J. Ylinen, P. Loula
The aim of this paper is to introduce and untangle the operating model of a network monitoring environment that handles flow and signature based techniques side by side on a large-scale campus network. This paper introduces one approach for solving the problematic creation of standard-based flow information and signature alarms in tandem from large-scale network traffic. The operating model takes into account cost efficiency, trustworthy and privacy protection. Due to the Privacy Protection Act and local laws, data analysis is made after traffic anonymization.
本文的目的是介绍并解决一个大型校园网中基于流和基于签名技术并行处理的网络监控环境的运行模型。本文介绍了一种解决大规模网络流量中基于标准的流量信息和签名告警同步生成问题的方法。该运营模式考虑了成本效益、可信度和隐私保护。由于隐私保护法和当地法律的原因,数据分析是在流量匿名化之后进行的。
{"title":"Concurrent monitoring environment for obtaining IPFIX flow and signature based IDS alert data","authors":"Teemu Alapaholuoma, T. Seppala, J. Nieminen, J. Ylinen, P. Loula","doi":"10.1109/ICCSII.2012.6454305","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454305","url":null,"abstract":"The aim of this paper is to introduce and untangle the operating model of a network monitoring environment that handles flow and signature based techniques side by side on a large-scale campus network. This paper introduces one approach for solving the problematic creation of standard-based flow information and signature alarms in tandem from large-scale network traffic. The operating model takes into account cost efficiency, trustworthy and privacy protection. Due to the Privacy Protection Act and local laws, data analysis is made after traffic anonymization.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimental analysis of energy consumption in milling strategies 铣削策略能耗的实验分析
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454527
S. Pervaiz, I. Deiab, A. Rashid, M. Nicolescu
Pocket milling operation is one of the widely used milling operations. CAM packages offer different tool path strategies to execute a machining operation. In the presented work zigzag, constant overlap spiral, parallel spiral and oneway tool path strategies were compared in terms of power and energy consumption for pocket milling of Al 6061 aluminum alloy. All pocketing operations were conducted using 8 mm diameter High Speed Steel (HSS) end milling cutters. Energy utilization was analysed for all tool path strategies. This work aims to develop better understanding towards sustainability concept in core machining phase.
口袋铣削是一种广泛应用的铣削作业。CAM包提供不同的刀具路径策略来执行加工操作。比较了锯齿形、等距重合螺旋形、平行螺旋形和单向刀路4种刀路策略对Al 6061铝合金口袋铣削的功率和能耗的影响。所有装袋作业均使用直径为8mm的高速钢(HSS)立铣刀进行。分析了各种刀具路径策略的能量利用率。这项工作旨在更好地理解芯加工阶段的可持续性概念。
{"title":"An experimental analysis of energy consumption in milling strategies","authors":"S. Pervaiz, I. Deiab, A. Rashid, M. Nicolescu","doi":"10.1109/ICCSII.2012.6454527","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454527","url":null,"abstract":"Pocket milling operation is one of the widely used milling operations. CAM packages offer different tool path strategies to execute a machining operation. In the presented work zigzag, constant overlap spiral, parallel spiral and oneway tool path strategies were compared in terms of power and energy consumption for pocket milling of Al 6061 aluminum alloy. All pocketing operations were conducted using 8 mm diameter High Speed Steel (HSS) end milling cutters. Energy utilization was analysed for all tool path strategies. This work aims to develop better understanding towards sustainability concept in core machining phase.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers 便携式web浏览器取证:对便携式web浏览器的隐私好处进行取证检查
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454516
A. Marrington, I. Baggili, T. Al Ismail, A. Al Kaf
Portable web browsers are installed on removable storage devices which can be taken by a user from computer to computer. One of the claimed benefits of portable web browsers is enhanced privacy, through minimization of the traces of browsing activity left on the host's hard disk. On the basis of this claim, it would appear that portable web browsers pose a challenge to forensic examiners trying to reconstruct past web browsing activity in the context of a digital investigation. The research examines one popular portable web browser, Google Chrome in both normal and private browsing mode, and compares the forensic traces of its use to forensic traces of the installed version of the same browser. The results show that Google Chrome Portable leaves traces of web browsing activity on the host computer's hard disk, and demonstrate a need for forensic testing of the privacy claims made for the use of portable web browsers.
便携式网络浏览器安装在可移动存储设备上,用户可以将其从一台计算机带到另一台计算机上。便携式网络浏览器声称的好处之一是增强隐私,通过最大限度地减少在主机硬盘上留下的浏览活动痕迹。基于这一说法,似乎便携式网络浏览器对试图在数字调查的背景下重建过去的网络浏览活动的法医审查员构成了挑战。这项研究调查了一种流行的便携式网络浏览器,谷歌Chrome,在正常和私人浏览模式下,并将其使用的取证痕迹与同一浏览器安装版本的取证痕迹进行了比较。结果显示,Google Chrome Portable在主机的硬盘上留下了网页浏览活动的痕迹,并表明有必要对使用便携式网页浏览器的隐私声明进行法医测试。
{"title":"Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers","authors":"A. Marrington, I. Baggili, T. Al Ismail, A. Al Kaf","doi":"10.1109/ICCSII.2012.6454516","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454516","url":null,"abstract":"Portable web browsers are installed on removable storage devices which can be taken by a user from computer to computer. One of the claimed benefits of portable web browsers is enhanced privacy, through minimization of the traces of browsing activity left on the host's hard disk. On the basis of this claim, it would appear that portable web browsers pose a challenge to forensic examiners trying to reconstruct past web browsing activity in the context of a digital investigation. The research examines one popular portable web browser, Google Chrome in both normal and private browsing mode, and compares the forensic traces of its use to forensic traces of the installed version of the same browser. The results show that Google Chrome Portable leaves traces of web browsing activity on the host computer's hard disk, and demonstrate a need for forensic testing of the privacy claims made for the use of portable web browsers.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126893904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Virtual laser keyboards: A giant leap towards human-computer interaction 虚拟激光键盘:人机交互的巨大飞跃
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454614
Z. AlKassim
This paper provides an alternative solution to the traditional physical-button keyboards. With implementation of laser technology, this virtual keyboard solves many problems faced with traditional keyboards, making it more practical. The keyboard consists of three modules respectively; the illuminating, sensing, and projecting module. The projecting module projects an image of a keyboard onto any surface, then the sensing module senses the user's fingers in coordination with the illuminating module, after which typed keys are displayed on the screen.
本文提供了一种替代传统物理按键键盘的解决方案。随着激光技术的实现,这种虚拟键盘解决了传统键盘面临的许多问题,使其更具实用性。键盘分别由三个模块组成;照明、传感和投射模块。投影模块将键盘的图像投射到任何表面上,然后感应模块与照明模块协调感应用户的手指,之后输入的按键显示在屏幕上。
{"title":"Virtual laser keyboards: A giant leap towards human-computer interaction","authors":"Z. AlKassim","doi":"10.1109/ICCSII.2012.6454614","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454614","url":null,"abstract":"This paper provides an alternative solution to the traditional physical-button keyboards. With implementation of laser technology, this virtual keyboard solves many problems faced with traditional keyboards, making it more practical. The keyboard consists of three modules respectively; the illuminating, sensing, and projecting module. The projecting module projects an image of a keyboard onto any surface, then the sensing module senses the user's fingers in coordination with the illuminating module, after which typed keys are displayed on the screen.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Perception based adaptive haptic communication protocol (PAHCP) 基于感知的自适应触觉通信协议
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454426
Q. Nasir, Enas Khalil
Packet-switched communication of haptic data telepresence systems is characterized by high packet rates on the communication channel. The quality of the internet-based telepresence systems depend on the quality of the communication channel between the operator and the remote site, and the delay jitter in the data exchange. Perceptual based data reduction for haptic data is used to reduce packet rate. It is proved and through experimental studies that the implementing the perception thresholds and additional buffering techniques can significantly reduce haptic data traffic with little or no influence on the quality of collaborative haptic-enabled (C-HE) or Tele-Operation/Tele-Presence, and Tele-Interaction (TPTA). In this paper, an adaptive size of the dead-band (Just Noticeable Difference - JND) technique for feedback forces received from remote side is presented, while keeping fixed JND for movements velocities for the transmitted haptic data from the operator side, to reduces the packet rate without perceptible disturbance.
触觉数据临场感系统的分组交换通信以通信信道上的高分组速率为特点。基于互联网的网真系统的质量取决于运营商与远程站点之间通信信道的质量以及数据交换中的延迟抖动。对触觉数据采用基于感知的数据约简来降低数据包速率。通过实验研究证明,感知阈值和附加缓冲技术的实施可以显著减少触觉数据流量,而对协同触觉启用(C-HE)或远程操作/远程呈现和远程交互(TPTA)的质量几乎没有影响。本文提出了一种自适应接收远端反馈力的死带(Just Noticeable Difference - JND)技术,同时对来自操作端传输的触觉数据保持固定的运动速度JND,从而在不产生可感知干扰的情况下降低分组速率。
{"title":"Perception based adaptive haptic communication protocol (PAHCP)","authors":"Q. Nasir, Enas Khalil","doi":"10.1109/ICCSII.2012.6454426","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454426","url":null,"abstract":"Packet-switched communication of haptic data telepresence systems is characterized by high packet rates on the communication channel. The quality of the internet-based telepresence systems depend on the quality of the communication channel between the operator and the remote site, and the delay jitter in the data exchange. Perceptual based data reduction for haptic data is used to reduce packet rate. It is proved and through experimental studies that the implementing the perception thresholds and additional buffering techniques can significantly reduce haptic data traffic with little or no influence on the quality of collaborative haptic-enabled (C-HE) or Tele-Operation/Tele-Presence, and Tele-Interaction (TPTA). In this paper, an adaptive size of the dead-band (Just Noticeable Difference - JND) technique for feedback forces received from remote side is presented, while keeping fixed JND for movements velocities for the transmitted haptic data from the operator side, to reduces the packet rate without perceptible disturbance.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Smart grid controller for optimizing HVAC energy consumption 优化暖通空调能耗的智能电网控制器
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454548
A. Al-Ali, N. A. Tubaiz, A. Al-Radaideh, J. Al-Dmour, L. Murugan
As the smart grid emerges from concept to implementation, power utilities start to optimize power consumed by Heating, Ventilation and Air-Conditioning Systems (HVACs). Engineers started to design controllers that better manage the power consumption of the HVAC systems. HVACs consume more than 50% of generated power in many countries that have hot and/or cold weather. Such huge power loads may exceed the generated power. Due to this large power demands, some utilities have to resort to rationalize the available electricity to its consumers randomly. This paper presents a fuzzy logic based system that monitors and controls residential HVACs units, where demand exceeds the supplied electrical power. The proposed system reads the rooms temperature and turns ON/OFF the units alternatively to maintain the cooling/heating based on the available supplied power; i.e. shedding the load without compromising the residents comfort. The proposed fuzzy logic rule-based system was designed, simulated and tested.
随着智能电网从概念到实施,电力公司开始优化供暖、通风和空调系统(hvac)的电力消耗。工程师们开始设计能够更好地管理HVAC系统功耗的控制器。在许多天气炎热和/或寒冷的国家,暖通空调消耗了50%以上的发电量。如此巨大的电力负荷可能会超过产生的功率。由于这种巨大的电力需求,一些公用事业公司不得不采取随机合理的电力供应给消费者。本文提出了一种基于模糊逻辑的住宅暖通空调系统,用于监测和控制需求超过供电功率的住宅暖通空调机组。建议的系统读取房间温度,并根据可用的供电功率轮流打开/关闭设备,以维持冷却/加热;即在不影响居民舒适度的情况下减轻负荷。设计、仿真和测试了基于模糊逻辑规则的系统。
{"title":"Smart grid controller for optimizing HVAC energy consumption","authors":"A. Al-Ali, N. A. Tubaiz, A. Al-Radaideh, J. Al-Dmour, L. Murugan","doi":"10.1109/ICCSII.2012.6454548","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454548","url":null,"abstract":"As the smart grid emerges from concept to implementation, power utilities start to optimize power consumed by Heating, Ventilation and Air-Conditioning Systems (HVACs). Engineers started to design controllers that better manage the power consumption of the HVAC systems. HVACs consume more than 50% of generated power in many countries that have hot and/or cold weather. Such huge power loads may exceed the generated power. Due to this large power demands, some utilities have to resort to rationalize the available electricity to its consumers randomly. This paper presents a fuzzy logic based system that monitors and controls residential HVACs units, where demand exceeds the supplied electrical power. The proposed system reads the rooms temperature and turns ON/OFF the units alternatively to maintain the cooling/heating based on the available supplied power; i.e. shedding the load without compromising the residents comfort. The proposed fuzzy logic rule-based system was designed, simulated and tested.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A new traceable software requirements specification based on IEEE 830 一种新的基于IEEE 830的可跟踪软件需求规范
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454481
A. Chikh, M. Aldayel
This paper aims to enrich software requirements specification by integrating the concept of traceability. This integration, which will allow a more helpful reading of that specification, will provide a critical support to different requirements stakeholders. Indeed traceability will help for example designers in refining requirements into lower-level design components and analysts in understanding the implications of a proposed change, to ensure that no extraneous code exists and to minimize or eliminate the presence of faked or frivolous requirements that lack any justification. The main contribution of this paper is building a schema for software requirements specification that make it easily traceable by linking each requirement to real-world dimensions such as detail design deliverables, related system requirements and sources such as user requirement, analyst, regulation and standard.
本文旨在通过集成可追溯性的概念来丰富软件需求规范。这种集成,将允许对规范进行更有帮助的阅读,将为不同的需求涉众提供关键的支持。事实上,可追溯性将帮助例如设计师将需求细化为较低层次的设计组件,帮助分析人员理解所提议的变更的含义,以确保没有多余的代码存在,并最大限度地减少或消除缺乏任何理由的虚假或琐碎的需求。本文的主要贡献是为软件需求规范构建了一个模式,通过将每个需求与现实世界的维度(如详细设计交付物、相关系统需求和来源,如用户需求、分析人员、法规和标准)联系起来,使其易于跟踪。
{"title":"A new traceable software requirements specification based on IEEE 830","authors":"A. Chikh, M. Aldayel","doi":"10.1109/ICCSII.2012.6454481","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454481","url":null,"abstract":"This paper aims to enrich software requirements specification by integrating the concept of traceability. This integration, which will allow a more helpful reading of that specification, will provide a critical support to different requirements stakeholders. Indeed traceability will help for example designers in refining requirements into lower-level design components and analysts in understanding the implications of a proposed change, to ensure that no extraneous code exists and to minimize or eliminate the presence of faked or frivolous requirements that lack any justification. The main contribution of this paper is building a schema for software requirements specification that make it easily traceable by linking each requirement to real-world dimensions such as detail design deliverables, related system requirements and sources such as user requirement, analyst, regulation and standard.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A client privacy preserving discovery service scheme 一种客户端隐私保护发现服务方案
Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454610
Zhipeng Wang, Hong Zhu
The EPCglobal Network is a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC) in supply chains. Discovery Service (DS) is an important component storing large amounts of indices from EPCs to detailed information in EPCISes. However, to the client, DS is a third-party server which can easily get clients' privacy when they send queries. In this paper, using the policy of Private Information Retrieval (PIR), we propose a client privacy preserving DS scheme that can meet both basic functional requirement and client privacy requirement. Compared to existing privacy preserving DS schemes, our work is more concise in architecture and can completely guarantee the client privacy.
EPCglobal Network是供应链中携带带有电子产品代码(EPC)的RFID标签的对象的全球信息架构。发现服务(Discovery Service, DS)是存储epcses中从epcses到详细信息的大量索引的重要组件。然而,对于客户端来说,DS是一个第三方服务器,当客户端发送查询时,DS很容易获得客户端的隐私。本文利用私有信息检索(PIR)策略,提出了一种既能满足基本功能要求又能满足客户隐私要求的客户端隐私保护DS方案。与现有的隐私保护DS方案相比,我们的工作在架构上更加简洁,可以完全保证客户的隐私。
{"title":"A client privacy preserving discovery service scheme","authors":"Zhipeng Wang, Hong Zhu","doi":"10.1109/ICCSII.2012.6454610","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454610","url":null,"abstract":"The EPCglobal Network is a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC) in supply chains. Discovery Service (DS) is an important component storing large amounts of indices from EPCs to detailed information in EPCISes. However, to the client, DS is a third-party server which can easily get clients' privacy when they send queries. In this paper, using the policy of Private Information Retrieval (PIR), we propose a client privacy preserving DS scheme that can meet both basic functional requirement and client privacy requirement. Compared to existing privacy preserving DS schemes, our work is more concise in architecture and can completely guarantee the client privacy.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 International Conference on Computer Systems and Industrial Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1