首页 > 最新文献

Int. J. Networked Distributed Comput.最新文献

英文 中文
Tracing a Weld Line using Artificial Neural Networks 用人工神经网络跟踪焊缝
Pub Date : 2018-09-01 DOI: 10.2991/IJNDC.2018.6.4.4
S. Rao, V. Kalaichelvi, R. Karthikeyan
{"title":"Tracing a Weld Line using Artificial Neural Networks","authors":"S. Rao, V. Kalaichelvi, R. Karthikeyan","doi":"10.2991/IJNDC.2018.6.4.4","DOIUrl":"https://doi.org/10.2991/IJNDC.2018.6.4.4","url":null,"abstract":"","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126151338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction 通过缩短提取时间改进动态软件胎记处理
Pub Date : 2018-09-01 DOI: 10.2991/ijndc.2018.6.4.5
Takanori Yokoi, Haruaki Tamada
The dynamic software birthmark methods are the methods to detect the stolen programs based on the runtime behavior of the target programs. For this, the dynamic birthmark methods extract the characteristics of programs themselves by running the target programs. Then, the extracted characteristics are compared and calculated the similarities between two characteristics. If the similarity is greater than the given threshold, either of programs is suspected the stolen program from the other. Based on the process, many researchers proposed various dynamic software birthmark methods focused on different aspect of the runtime behaviors. However, the problem is that above detection procedure consumes much time cost. The main cause is the extraction requires the suitable inputs, and the cost for preparing inputs is quite high. Because, the preparation of inputs need the understanding the target programs, and the dynamic birthmarks generally require several inputs for reliable results.
动态软件胎记方法是根据目标程序的运行时行为来检测被盗程序的方法。为此,动态胎记方法通过运行目标程序来提取程序本身的特征。然后,对提取的特征进行比较,计算两个特征之间的相似度。如果相似性大于给定的阈值,则怀疑其中一个程序是从另一个程序窃取的程序。基于这一过程,许多研究者针对运行时行为的不同方面提出了各种动态软件胎记方法。但问题是上述检测过程耗费了大量的时间成本。主要原因是提取需要合适的投入物,而投入物的制备成本很高。因为,输入的准备需要了解目标程序,而动态胎记通常需要多个输入才能获得可靠的结果。
{"title":"Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction","authors":"Takanori Yokoi, Haruaki Tamada","doi":"10.2991/ijndc.2018.6.4.5","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.4.5","url":null,"abstract":"The dynamic software birthmark methods are the methods to detect the stolen programs based on the runtime behavior of the target programs. For this, the dynamic birthmark methods extract the characteristics of programs themselves by running the target programs. Then, the extracted characteristics are compared and calculated the similarities between two characteristics. If the similarity is greater than the given threshold, either of programs is suspected the stolen program from the other. Based on the process, many researchers proposed various dynamic software birthmark methods focused on different aspect of the runtime behaviors. However, the problem is that above detection procedure consumes much time cost. The main cause is the extraction requires the suitable inputs, and the cost for preparing inputs is quite high. Because, the preparation of inputs need the understanding the target programs, and the dynamic birthmarks generally require several inputs for reliable results.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127349245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods 针对标识符重命名方法的去混淆方法设计与评价
Pub Date : 2018-09-01 DOI: 10.2991/ijndc.2018.6.4.6
Yosuke Isobe, Haruaki Tamada
To protect the software from cracking, the obfuscation methods were proposed. An obfuscation method is to change programs hard to understand by preserving input/output specification. Various obfuscation methods are proposed [2–4], and are implemented to tools, such as Dash-O2, ProGuard3, and etc. In particular, the Identifier Renaming Method (IRM) is widely used, which changes the identifiers in the programs to meaningless names. Because it is easy to implement and to understand the approach [5,6]. However, IRM did not sufficiently discuss the tolerance against attacks, and strength of the protection. Because the relationships between the meanings of identifiers and strength of the protection are not clear.
为了防止软件被破解,提出了混淆方法。一种混淆方法是通过保留输入/输出规范来改变难以理解的程序。提出了各种混淆方法[2-4],并在Dash-O2、ProGuard3等工具上实现。特别是标识符重命名方法(Identifier Renaming Method, IRM)被广泛使用,它将程序中的标识符更改为无意义的名称。因为这种方法易于实现和理解[5,6]。然而,IRM没有充分讨论对攻击的容忍度和保护的强度。因为标识符的含义和保护强度之间的关系并不清楚。
{"title":"Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods","authors":"Yosuke Isobe, Haruaki Tamada","doi":"10.2991/ijndc.2018.6.4.6","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.4.6","url":null,"abstract":"To protect the software from cracking, the obfuscation methods were proposed. An obfuscation method is to change programs hard to understand by preserving input/output specification. Various obfuscation methods are proposed [2–4], and are implemented to tools, such as Dash-O2, ProGuard3, and etc. In particular, the Identifier Renaming Method (IRM) is widely used, which changes the identifiers in the programs to meaningless names. Because it is easy to implement and to understand the approach [5,6]. However, IRM did not sufficiently discuss the tolerance against attacks, and strength of the protection. Because the relationships between the meanings of identifiers and strength of the protection are not clear.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine 后端区块链分析引擎中加密链脱链文件系统的可靠性
Pub Date : 2018-09-01 DOI: 10.2991/IJNDC.2018.6.4.3
Jongho Seol, Abhilash Kancharla, N. Park, N. Park, Indy Park
A P2P file sharing system, namely Interplanetary File Systems (IPFS) [2,3], provides a service to store huge files in off-chain local storage and partition them into pieces, for each of which with a hash code created and assigned to be posted back in blockchain for reference, referred to as crypto link. IPFS manages hash codes on blockchain in a versioned manner based on the contentaddressed distributed P2P model [4]. It is investigated in this research how to assure the efficacy of managing crypto links along with the performance of the processes with respect to the dependability of blockchain. The dependability [5] in this research is defined with reference to crypto links in a proportional manner and its performance, as referred to as the crypto speed, in an inversely proportional manner, respectively. Also note that the dependability is proportional to the cost such that the more the number of crypto links come in place, the higher its cost is. It is a standard and intuitive practice to partition a large output file into smaller pieces at a certain threshold size provided in the blockchain analytics engine (e.g., 250 KB/partition in IPFS/Hadoop). Crypto link (CL) is defined by the hash address (i.e., a pointer link) stored in the blockchain for a partition of an output file off from a backend blockchain analytics engine. Note that IPFS manages a crypto link to every partition of a file of interest whereas the proposed crypto link scheme is at a reduced number in order to address the cost and performance issue such that one crypto link to the entire file and the links between partitions within a file are maintained by local chains of links. Crypto speed (CS) is defined by the rate of the number of crypto links over the total turnaround time to encrypt all the crypto links (hash addressing) per file. Thus, notice that without loss of generality, the crypto speed increases inverselinearly along with the number of crypto links. A binomial-based [6] dependability model can be expressed as a rather straightforward function of the total number of partitions and the number of crypto links as proposed in this research. At the same time a cost model can be expressed as a function of the ratio of the number of A RT I C L E I N F O
P2P文件共享系统,即星际文件系统(IPFS)[2,3],提供了一种服务,将巨大的文件存储在链下本地存储中,并将其划分为多个部分,每个部分都有一个创建并分配的哈希码,以发布回区块链中以供参考,称为加密链接。IPFS基于内容寻址的分布式P2P模型,以版本化的方式管理区块链上的哈希码[4]。本研究探讨了如何确保管理加密链接的有效性以及与区块链可靠性相关的流程性能。在本研究中,可靠性[5]分别以加密链路成比例和其性能(即加密速度)成反比来定义。还要注意,可靠性与成本成正比,因此加密链接的数量越多,其成本就越高。在区块链分析引擎中,按照一定的阈值大小(例如,IPFS/Hadoop中的250 KB/分区)将一个大的输出文件分割成更小的文件是一种标准和直观的做法。加密链接(CL)是由存储在区块链中的哈希地址(即指针链接)定义的,用于从后端区块链分析引擎输出文件的分区。请注意,IPFS管理到感兴趣的文件的每个分区的加密链接,而提议的加密链接方案的数量减少,以解决成本和性能问题,以便一个加密链接到整个文件,文件内分区之间的链接由本地链接链维护。加密速度(CS)由加密链接的数量与每个文件加密所有加密链接(散列寻址)的总周转时间的比率定义。因此,请注意,在不损失通用性的情况下,加密速度随着加密链路的数量呈反比增长。基于二项[6]的可靠性模型可以表示为本研究提出的分区总数和加密链接数的一个相当简单的函数。同时,成本模型可以表示为a / RT / C / L / E / N / F / O数量之比的函数
{"title":"The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine","authors":"Jongho Seol, Abhilash Kancharla, N. Park, N. Park, Indy Park","doi":"10.2991/IJNDC.2018.6.4.3","DOIUrl":"https://doi.org/10.2991/IJNDC.2018.6.4.3","url":null,"abstract":"A P2P file sharing system, namely Interplanetary File Systems (IPFS) [2,3], provides a service to store huge files in off-chain local storage and partition them into pieces, for each of which with a hash code created and assigned to be posted back in blockchain for reference, referred to as crypto link. IPFS manages hash codes on blockchain in a versioned manner based on the contentaddressed distributed P2P model [4]. It is investigated in this research how to assure the efficacy of managing crypto links along with the performance of the processes with respect to the dependability of blockchain. The dependability [5] in this research is defined with reference to crypto links in a proportional manner and its performance, as referred to as the crypto speed, in an inversely proportional manner, respectively. Also note that the dependability is proportional to the cost such that the more the number of crypto links come in place, the higher its cost is. It is a standard and intuitive practice to partition a large output file into smaller pieces at a certain threshold size provided in the blockchain analytics engine (e.g., 250 KB/partition in IPFS/Hadoop). Crypto link (CL) is defined by the hash address (i.e., a pointer link) stored in the blockchain for a partition of an output file off from a backend blockchain analytics engine. Note that IPFS manages a crypto link to every partition of a file of interest whereas the proposed crypto link scheme is at a reduced number in order to address the cost and performance issue such that one crypto link to the entire file and the links between partitions within a file are maintained by local chains of links. Crypto speed (CS) is defined by the rate of the number of crypto links over the total turnaround time to encrypt all the crypto links (hash addressing) per file. Thus, notice that without loss of generality, the crypto speed increases inverselinearly along with the number of crypto links. A binomial-based [6] dependability model can be expressed as a rather straightforward function of the total number of partitions and the number of crypto links as proposed in this research. At the same time a cost model can be expressed as a function of the ratio of the number of A RT I C L E I N F O","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":" 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120834890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Formal Model of Peer-to-Peer Digital Product Marketplace 点对点数字产品市场的正式模型
Pub Date : 2018-07-01 DOI: 10.2991/ijndc.2018.6.3.3
Sylvanus A. Ehikioya
Peer-to-peer (P2P) electronic commerce has become increasingly popular over the last few years. This popularity of P2P is due mainly to the many advantages it offers, such as the ease of sharing of computer resources and reducing cost. This paper uses both semi-formal and formal specification methods to model a P2P digital product marketplace. First, models are written in UML, as this is expected to be relatively easy to understand and economic. Then, the models are transformed into a formal notation, object-Z notation. A formally specified and verified model of e-commerce transactions will provide a correct, fail-safe, and robust transaction processing environment for ecommerce. By using both semi-formal and formal methods in the design of the P2P system, we can reason about and create a correct and reliable system quickly and efficiently.
点对点(P2P)电子商务在过去几年中变得越来越流行。P2P的流行主要是由于它提供了许多优点,例如易于共享计算机资源和降低成本。本文采用半形式化和形式化两种规范方法对P2P数字产品市场进行建模。首先,模型是用UML编写的,因为这样比较容易理解和经济。然后,将模型转换为正式的符号,即对象- z符号。一个正式指定和验证的电子商务交易模型将为电子商务提供一个正确的、故障安全的和健壮的交易处理环境。在P2P系统的设计中,采用半形式化和形式化两种方法,可以快速有效地进行推理,构建出正确可靠的系统。
{"title":"A Formal Model of Peer-to-Peer Digital Product Marketplace","authors":"Sylvanus A. Ehikioya","doi":"10.2991/ijndc.2018.6.3.3","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.3.3","url":null,"abstract":"Peer-to-peer (P2P) electronic commerce has become increasingly popular over the last few years. This popularity of P2P is due mainly to the many advantages it offers, such as the ease of sharing of computer resources and reducing cost. This paper uses both semi-formal and formal specification methods to model a P2P digital product marketplace. First, models are written in UML, as this is expected to be relatively easy to understand and economic. Then, the models are transformed into a formal notation, object-Z notation. A formally specified and verified model of e-commerce transactions will provide a correct, fail-safe, and robust transaction processing environment for ecommerce. By using both semi-formal and formal methods in the design of the P2P system, we can reason about and create a correct and reliable system quickly and efficiently.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application toF ault-ProneP rogram Analysis 基于熵的开源开发者贡献度量及其在项目分析中的应用
Pub Date : 2018-07-01 DOI: 10.2991/ijndc.2018.6.3.1
Kazuki Yamauchi, Hirohisa Aman, S. Amasaki, Tomoyuki Yokogawa, Minoru Kawahara
To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a source file as an entropy. Through an analysis of data collected from 10 popular OSS projects, the following trends are reported: a source file is more faultprone as the developers’ contributions to the file are more imbalanced (lower entropy), and the proposed metric can be useful for predicting fault-prone programs.
为了支持成功的开源软件(OSS)项目的质量管理,本文提出以熵的形式度量开发人员对源文件的贡献的平衡。通过对从10个流行的OSS项目中收集的数据的分析,报告了以下趋势:由于开发人员对文件的贡献更不平衡(更低熵),源文件更容易出错,并且所提出的度量可以用于预测容易出错的程序。
{"title":"An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application toF ault-ProneP rogram Analysis","authors":"Kazuki Yamauchi, Hirohisa Aman, S. Amasaki, Tomoyuki Yokogawa, Minoru Kawahara","doi":"10.2991/ijndc.2018.6.3.1","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.3.1","url":null,"abstract":"To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a source file as an entropy. Through an analysis of data collected from 10 popular OSS projects, the following trends are reported: a source file is more faultprone as the developers’ contributions to the file are more imbalanced (lower entropy), and the proposed metric can be useful for predicting fault-prone programs.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Customer Prediction using Parking Logs with Recurrent Neural Networks 基于循环神经网络的停车日志客户预测
Pub Date : 2018-07-01 DOI: 10.2991/ijndc.2018.6.3.2
Liaq Mudassar, Y. Byun
Neural Networks have been performing state of the art for almost a decade now; when it comes to classification and prediction domains. Within last few years, neural networks have been improved tremendously and their performance is even better than humans in some domains, e.g. AlphaGo vs Lee Sedol and Image Net Challenge-2009. It’s a beneficial factor for any parking lot to know that what would be a parking position at any given point in time. If we are able to know in advance that are we going to get parking tomorrow afternoon in a busy super store parking lot, its very beneficial to plan accordingly. In this paper, we predict customer influx in a specific departmental store by analyzing the data of its parking lot. We use this parking data to predict the customer influx and outflux for that parking lot as this parking influx is directly proportional to the customer influx in the store. We use Recurrent Neural Network on the top of two years of historical data. We generate promising results using this dataset by predicting the traffic flow for each hour for next 7 days. We further improve our performance on this dataset by incorporating three more environmental factors along with the parking logs.
近十年来,神经网络一直在发挥最先进的作用;当涉及到分类和预测领域。在过去的几年里,神经网络已经得到了巨大的改进,它们在某些领域的表现甚至比人类更好,例如AlphaGo vs Lee Sedol和Image Net Challenge-2009。对于任何停车场来说知道任意时间点的停车位置都是很有好处的。如果我们能够提前知道明天下午我们将在一个繁忙的超市停车场停车,这对相应地计划是非常有益的。本文通过对某百货店停车场的数据分析,预测了该百货店的客流量。我们使用这个停车数据来预测该停车场的顾客流入和流出,因为这个停车流量与商店的顾客流入成正比。我们使用递归神经网络对两年的历史数据进行分析。我们使用该数据集通过预测未来7天内每小时的交通流量产生了有希望的结果。通过将另外三个环境因素与停车日志结合起来,我们进一步提高了该数据集的性能。
{"title":"Customer Prediction using Parking Logs with Recurrent Neural Networks","authors":"Liaq Mudassar, Y. Byun","doi":"10.2991/ijndc.2018.6.3.2","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.3.2","url":null,"abstract":"Neural Networks have been performing state of the art for almost a decade now; when it comes to classification and prediction domains. Within last few years, neural networks have been improved tremendously and their performance is even better than humans in some domains, e.g. AlphaGo vs Lee Sedol and Image Net Challenge-2009. It’s a beneficial factor for any parking lot to know that what would be a parking position at any given point in time. If we are able to know in advance that are we going to get parking tomorrow afternoon in a busy super store parking lot, its very beneficial to plan accordingly. In this paper, we predict customer influx in a specific departmental store by analyzing the data of its parking lot. We use this parking data to predict the customer influx and outflux for that parking lot as this parking influx is directly proportional to the customer influx in the store. We use Recurrent Neural Network on the top of two years of historical data. We generate promising results using this dataset by predicting the traffic flow for each hour for next 7 days. We further improve our performance on this dataset by incorporating three more environmental factors along with the parking logs.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Procedure for Function Point and Development Cost in South Korea 韩国的功能点和开发成本估算程序
Pub Date : 2018-07-01 DOI: 10.2991/ijndc.2018.6.3.6
Byeongdo Kang, Jongseo Lee
This paper introduces the practical guidelines for function point analysis in the Republic of Korea. Korean government recommends that Function Point Analysis should be adopted as a standard method for measuring the functional size of software. Function Point was proposed by an international organization. We will present the procedure of counting Function Point with adjustment factors. The functional size and development cost of software can be estimated from the number of Function Point
本文介绍了韩国功能点分析的实用指南。韩国政府建议将功能点分析作为衡量软件功能大小的标准方法。功能点是由一个国际组织提出的。我们将介绍用调整因子计算功能点的过程。软件的功能大小和开发成本可以通过功能点的数量来估算
{"title":"Estimating Procedure for Function Point and Development Cost in South Korea","authors":"Byeongdo Kang, Jongseo Lee","doi":"10.2991/ijndc.2018.6.3.6","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.3.6","url":null,"abstract":"This paper introduces the practical guidelines for function point analysis in the Republic of Korea. Korean government recommends that Function Point Analysis should be adopted as a standard method for measuring the functional size of software. Function Point was proposed by an international organization. We will present the procedure of counting Function Point with adjustment factors. The functional size and development cost of software can be estimated from the number of Function Point","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developer Experience Considering Work Difficulty in Software Development 软件开发中考虑工作难度的开发人员经验
Pub Date : 2018-04-01 DOI: 10.2991/ijndc.2018.6.2.1
Taketo Tsunoda, H. Washizaki, Y. Fukazawa, S. Inoue, Y. Hanai, Masanobu Kanazawa
{"title":"Developer Experience Considering Work Difficulty in Software Development","authors":"Taketo Tsunoda, H. Washizaki, Y. Fukazawa, S. Inoue, Y. Hanai, Masanobu Kanazawa","doi":"10.2991/ijndc.2018.6.2.1","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.2.1","url":null,"abstract":"","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-time Multi-Agents Architecture for E-commerce Servers 电子商务服务器的实时多代理体系结构
Pub Date : 2018-04-01 DOI: 10.2991/ijndc.2018.6.2.4
Sylvanus A. Ehikioya, Cong Zhang
Electronic commerce applications have strict timing constraints on the interactions between e-commerce servers and customers. Customers prefer real-time services, which mean immediate response from the server shortly after submission of a request. This trend of demand gives e-commerce servers high pressure, both on the software and the architecture they currently use. In this paper, we propose a real-time architecture for e-commerce servers that addresses the problem efficiently. We adopt a framework that permits the appropriate treatment of dynamic behaviours that are data interdependent, and reasoning about the communication protocols and internal mechanisms of client / server relationships in a real-time multi-agents based e-commerce application architecture.
电子商务应用程序对电子商务服务器和客户之间的交互具有严格的时间约束。客户更喜欢实时服务,这意味着在提交请求后不久服务器就会立即做出响应。这种需求趋势给电子商务服务器带来了巨大的压力,无论是软件还是它们目前使用的架构。在本文中,我们提出了一个电子商务服务器的实时架构,有效地解决了这个问题。我们采用了一个框架,该框架允许对数据相互依赖的动态行为进行适当处理,并对基于实时多代理的电子商务应用程序体系结构中的通信协议和客户/服务器关系的内部机制进行推理。
{"title":"Real-time Multi-Agents Architecture for E-commerce Servers","authors":"Sylvanus A. Ehikioya, Cong Zhang","doi":"10.2991/ijndc.2018.6.2.4","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.2.4","url":null,"abstract":"Electronic commerce applications have strict timing constraints on the interactions between e-commerce servers and customers. Customers prefer real-time services, which mean immediate response from the server shortly after submission of a request. This trend of demand gives e-commerce servers high pressure, both on the software and the architecture they currently use. In this paper, we propose a real-time architecture for e-commerce servers that addresses the problem efficiently. We adopt a framework that permits the appropriate treatment of dynamic behaviours that are data interdependent, and reasoning about the communication protocols and internal mechanisms of client / server relationships in a real-time multi-agents based e-commerce application architecture.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114391832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Int. J. Networked Distributed Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1