首页 > 最新文献

2013 10th International Conference on Information Technology: New Generations最新文献

英文 中文
Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities 基于规则的缓冲区溢出漏洞源级补丁
H. Shahriar, Hisham M. Haddad
Buffer overflow (BOF) is a notorious vulnerability that leads to non-secure software. The presence of BOF hampers essential security objectives - confidentiality, integrity and availability. A BOF might result in neigh boring data values corruption, application core dumps, etc. This research focuses on the detection and patching of BOF vulnerabilities. The detection includes identifying programming elements that might cause BOF, such as limitations due to languages, associated libraries, and logical errors. This work presents several code patterns that include simple (one statement) and complex (multiple statements) forms of BOF. For prevention, we propose eight rules to fix vulnerable code to avoid BOF without modifying the application functionality. The proposed approach addresses BOF issues not only at the unit level but also at the integrated level by passing buffer length information. The proposed rules are evaluated with 14 benchmark applications that have known BOF vulnerabilities. The results show that the proposed rules are effective in detecting and patching BOF without altering original functionalities of applications. The performance overhead due to the application of the proposed patching rules is negligible.
缓冲区溢出(BOF)是一个臭名昭著的漏洞,它会导致不安全的软件。BOF的存在阻碍了基本的安全目标——保密性、完整性和可用性。BOF可能会导致邻近无聊的数据值损坏、应用程序核心转储等。本研究的重点是BOF漏洞的检测与修补。检测包括识别可能导致BOF的编程元素,例如由于语言、相关库和逻辑错误造成的限制。本文介绍了几种代码模式,包括简单(一条语句)和复杂(多条语句)形式的BOF。为了预防,我们提出了八条规则来修复漏洞代码,在不修改应用程序功能的情况下避免BOF。所提出的方法不仅解决了单元级的BOF问题,而且通过传递缓冲区长度信息解决了集成级的BOF问题。建议的规则使用14个已知BOF漏洞的基准应用程序进行评估。结果表明,在不改变应用程序原有功能的情况下,所提出的规则能够有效地检测和修补BOF。由于应用所建议的补丁规则而产生的性能开销可以忽略不计。
{"title":"Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities","authors":"H. Shahriar, Hisham M. Haddad","doi":"10.1109/ITNG.2013.96","DOIUrl":"https://doi.org/10.1109/ITNG.2013.96","url":null,"abstract":"Buffer overflow (BOF) is a notorious vulnerability that leads to non-secure software. The presence of BOF hampers essential security objectives - confidentiality, integrity and availability. A BOF might result in neigh boring data values corruption, application core dumps, etc. This research focuses on the detection and patching of BOF vulnerabilities. The detection includes identifying programming elements that might cause BOF, such as limitations due to languages, associated libraries, and logical errors. This work presents several code patterns that include simple (one statement) and complex (multiple statements) forms of BOF. For prevention, we propose eight rules to fix vulnerable code to avoid BOF without modifying the application functionality. The proposed approach addresses BOF issues not only at the unit level but also at the integrated level by passing buffer length information. The proposed rules are evaluated with 14 benchmark applications that have known BOF vulnerabilities. The results show that the proposed rules are effective in detecting and patching BOF without altering original functionalities of applications. The performance overhead due to the application of the proposed patching rules is negligible.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132455427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Comparative Evaluation of Web Services Description Approaches Web服务描述方法的比较评价
Hajar Omrana, I. Bitar, Fatima-Zahra Belouadha, O. Roudiès
Web services Description has been recognized as an interesting paradigm that attracted significant attention from the research community. Currently, several WS description approaches have been presented to complete a detailed description with all the required aspects. The WSDL standard remains incomplete to provide a sufficiently rich description to service consumers. Thus, WSDL extensions as SAWSDL and WS-Policy have been proposed to offer a wider coverage of various WSs description aspects. Meanwhile, OWL-S and WSMO provide general representational frameworks for semantic Web Services. In this paper, we systematically compare WSMO, OWL-S and WSDL 2.0 enriched by SAWSDL and WS-Policy extentions, in the context of four aspects namely the functional, non-functional, technical and the data model aspects to better illustrate the strengths and the weaknesses of each of these approaches.
Web服务描述已经被认为是一个有趣的范例,吸引了研究社区的大量关注。目前,已经提出了几种WS描述方法来完成包含所有所需方面的详细描述。WSDL标准仍然不完整,无法为服务消费者提供足够丰富的描述。因此,作为SAWSDL和WS-Policy的WSDL扩展已经被提出,以提供对各种web服务描述方面的更广泛的覆盖。同时,OWL-S和WSMO为语义Web服务提供了通用的表示框架。在本文中,我们系统地比较了由SAWSDL和WS-Policy扩展丰富的WSMO、OWL-S和WSDL 2.0,在四个方面的上下文中,即功能、非功能、技术和数据模型方面,以更好地说明每种方法的优缺点。
{"title":"A Comparative Evaluation of Web Services Description Approaches","authors":"Hajar Omrana, I. Bitar, Fatima-Zahra Belouadha, O. Roudiès","doi":"10.1109/ITNG.2013.17","DOIUrl":"https://doi.org/10.1109/ITNG.2013.17","url":null,"abstract":"Web services Description has been recognized as an interesting paradigm that attracted significant attention from the research community. Currently, several WS description approaches have been presented to complete a detailed description with all the required aspects. The WSDL standard remains incomplete to provide a sufficiently rich description to service consumers. Thus, WSDL extensions as SAWSDL and WS-Policy have been proposed to offer a wider coverage of various WSs description aspects. Meanwhile, OWL-S and WSMO provide general representational frameworks for semantic Web Services. In this paper, we systematically compare WSMO, OWL-S and WSDL 2.0 enriched by SAWSDL and WS-Policy extentions, in the context of four aspects namely the functional, non-functional, technical and the data model aspects to better illustrate the strengths and the weaknesses of each of these approaches.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
GajaNindu: A Distributed System Management Framework with User-Defined Management Logic GajaNindu:一个具有用户定义管理逻辑的分布式系统管理框架
S. Kodithuwakku, Lakmal Padmakumara, Ishara Premadasa, S. Rathnayaka, V. Nanayakkara, S. Perera
Management of a large scale distributed system presents several issues such as managing a network of thousands of nodes, keeping the system up to date when nodes are added, deleted, changed and detecting and recovering from failures. With all these challenges, required features of a distributed system vary from organization to organization. Here we present 'GajaNindu', a distributed management framework, which facilitates user-defined management rules. This feature provides organizations with the capability of modifying the framework according to their business/organizational needs. Open source technologies (Apache Zookeeper, Apache Thrift and Jboss Drools) have been used to implement a prototype of the concept.
管理一个大规模的分布式系统提出了几个问题,如管理一个由数千个节点组成的网络,当节点被添加、删除、更改时保持系统的最新状态,以及检测和恢复故障。面对所有这些挑战,分布式系统所需的特性因组织而异。在这里,我们提出了“GajaNindu”,一个分布式管理框架,便于用户自定义管理规则。此特性为组织提供了根据其业务/组织需求修改框架的能力。开源技术(Apache Zookeeper、Apache Thrift和Jboss Drools)已经被用来实现这个概念的原型。
{"title":"GajaNindu: A Distributed System Management Framework with User-Defined Management Logic","authors":"S. Kodithuwakku, Lakmal Padmakumara, Ishara Premadasa, S. Rathnayaka, V. Nanayakkara, S. Perera","doi":"10.1109/ITNG.2013.125","DOIUrl":"https://doi.org/10.1109/ITNG.2013.125","url":null,"abstract":"Management of a large scale distributed system presents several issues such as managing a network of thousands of nodes, keeping the system up to date when nodes are added, deleted, changed and detecting and recovering from failures. With all these challenges, required features of a distributed system vary from organization to organization. Here we present 'GajaNindu', a distributed management framework, which facilitates user-defined management rules. This feature provides organizations with the capability of modifying the framework according to their business/organizational needs. Open source technologies (Apache Zookeeper, Apache Thrift and Jboss Drools) have been used to implement a prototype of the concept.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133803720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks 运行时监控检测和防止基于联合查询的SQL注入攻击
Ramya Dharam, S. Shiva
Web applications are increasingly used in recent years to provide online services such as banking, shopping, social networking, etc. These applications operate with sensitive user information and hence there is a high need for assuring their confidentiality, integrity, and availability. Existing pre-deployment testing techniques, tools, and methodologies do not assure complete analysis, execution and testing of all possible behaviors of the software. This causes the software to sometimes behave differently than what it was designed for during its post-deployment. Such a deviation in the system's behavior, also termed as "Software Anomaly," is mostly due to external attacks such as Path Traversal Attacks, SQL Injection Attacks, etc., that in turn affect confidential user information stored in the application. In this paper, we present and evaluate a framework called Runtime Monitoring Framework to handle union query based SQL Injection Attacks.
近年来,Web应用程序越来越多地用于提供在线服务,如银行、购物、社交网络等。这些应用程序使用敏感的用户信息运行,因此非常需要确保它们的机密性、完整性和可用性。现有的预部署测试技术、工具和方法不能保证对软件所有可能的行为进行完整的分析、执行和测试。这导致软件在部署后有时表现得与设计时不同。系统行为的这种偏差,也称为“软件异常”,主要是由于外部攻击,如路径遍历攻击、SQL注入攻击等,这些攻击反过来影响存储在应用程序中的机密用户信息。在本文中,我们提出并评估了一个称为运行时监控框架的框架来处理基于联合查询的SQL注入攻击。
{"title":"Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks","authors":"Ramya Dharam, S. Shiva","doi":"10.1109/ITNG.2013.57","DOIUrl":"https://doi.org/10.1109/ITNG.2013.57","url":null,"abstract":"Web applications are increasingly used in recent years to provide online services such as banking, shopping, social networking, etc. These applications operate with sensitive user information and hence there is a high need for assuring their confidentiality, integrity, and availability. Existing pre-deployment testing techniques, tools, and methodologies do not assure complete analysis, execution and testing of all possible behaviors of the software. This causes the software to sometimes behave differently than what it was designed for during its post-deployment. Such a deviation in the system's behavior, also termed as \"Software Anomaly,\" is mostly due to external attacks such as Path Traversal Attacks, SQL Injection Attacks, etc., that in turn affect confidential user information stored in the application. In this paper, we present and evaluate a framework called Runtime Monitoring Framework to handle union query based SQL Injection Attacks.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying Testing to Enhance Software Product Quality 应用测试提高软件产品质量
Etiene Lamas, L. Dias, A. Cunha
Software free from defects is a goal to be ideally achieved. Defects in software do arise from the development process. A possible solution for quality improvement is to apply a reference framework for software testing during all development phases. What is needed is a software testing process performed along with its development, in an orderly and simple way, even if the software development have been conducted in an organization without maturity certification. This investigation proposes to validate the hypothesis: software product quality is dependent on the software testing. In order to verify and validate the proposed hypothesis, it was applied to a case study, in which the statistical technique for Pearson's Chi-Square was used to determine whether there is a significant relationship among the categorical variables based on software testing results. This case study was derived from an actual project at the Brazilian Aeronautics Institute of Technology and its preliminary results are promising.
没有缺陷的软件是一个理想的目标。软件中的缺陷确实来自于开发过程。质量改进的一个可能的解决方案是在所有开发阶段为软件测试应用一个参考框架。所需要的是以有序和简单的方式在软件开发过程中执行软件测试过程,即使软件开发是在没有成熟度认证的组织中进行的。本研究旨在验证软件产品质量依赖于软件测试的假设。为了验证和验证所提出的假设,我们将其应用于一个案例研究中,在这个案例研究中,我们使用皮尔逊卡方的统计技术,根据软件测试结果来确定分类变量之间是否存在显著的关系。这个案例研究来源于巴西航空技术学院的一个实际项目,其初步结果是有希望的。
{"title":"Applying Testing to Enhance Software Product Quality","authors":"Etiene Lamas, L. Dias, A. Cunha","doi":"10.1109/ITNG.2013.56","DOIUrl":"https://doi.org/10.1109/ITNG.2013.56","url":null,"abstract":"Software free from defects is a goal to be ideally achieved. Defects in software do arise from the development process. A possible solution for quality improvement is to apply a reference framework for software testing during all development phases. What is needed is a software testing process performed along with its development, in an orderly and simple way, even if the software development have been conducted in an organization without maturity certification. This investigation proposes to validate the hypothesis: software product quality is dependent on the software testing. In order to verify and validate the proposed hypothesis, it was applied to a case study, in which the statistical technique for Pearson's Chi-Square was used to determine whether there is a significant relationship among the categorical variables based on software testing results. This case study was derived from an actual project at the Brazilian Aeronautics Institute of Technology and its preliminary results are promising.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116837955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Approach to Heterogeneous Database Migration 一种异构数据库迁移方法
Qian Wang, Chun-I Yu, Naijia Liu
The core problems of database migration are the data integrity, data accuracy and business continuity. We discussed these problems during heterogeneous database migration in this article. We designed and implemented a migration project for Tsinghua University. This project migrated Oracle RAC into a heterogeneous database completely and successfully.
数据库迁移的核心问题是数据完整性、数据准确性和业务连续性。我们在本文中讨论了异构数据库迁移过程中的这些问题。我们为清华大学设计并实现了一个迁移项目。该项目完全成功地将Oracle RAC迁移到异构数据库中。
{"title":"An Approach to Heterogeneous Database Migration","authors":"Qian Wang, Chun-I Yu, Naijia Liu","doi":"10.1109/ITNG.2013.120","DOIUrl":"https://doi.org/10.1109/ITNG.2013.120","url":null,"abstract":"The core problems of database migration are the data integrity, data accuracy and business continuity. We discussed these problems during heterogeneous database migration in this article. We designed and implemented a migration project for Tsinghua University. This project migrated Oracle RAC into a heterogeneous database completely and successfully.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia 供应链技术的接受、采用和可能的挑战:沙特阿拉伯服务组织的案例研究
H. Khan, Shafiq Ahmad, M. Abdollahian
Information Technology has redefined the parameters of doing the business in the recent past. On one side it is opening the doors for new opportunities and on the other side many obstacles are also coming in the successful use of IT tools. Supply chain management is one of the core focuses on the emerging technologies now days. The concept of competitive economy in globalized world is increasing the importance of efficient supply chain management in service organizations. The question raised over here is that whether the service companies are adopting the concept of supply chain management (SCM) in an efficient way or not? Adoption of suitable supply chain technologies in service organizations can have timely and accurate information availability for their decision making process. This adoption of proper Information Technology tools in the SCM is the most important factor to maximize the efficiency in the service organizations. Service organizations in Saudi Arabia (KSA) are facing many obstacles and challenges in successful implementation of supply chain technologies. Based on the data collected from surveying supply chain and logistics managers in 52 organizations based in KSA, this study proposes the possible challenges of Supply chain technologies faced by different categories of service organizations. The findings provide a new perspective in identifying the possible challenges faced by the service organizations to implement supply chain technologies.
在最近的过去,信息技术已经重新定义了做生意的参数。一方面,它为新的机会打开了大门,另一方面,在成功使用it工具方面也出现了许多障碍。供应链管理是当今新兴技术的核心焦点之一。在全球化的世界中,竞争经济的概念增加了服务组织中高效供应链管理的重要性。这里提出的问题是,服务公司是否有效地采用了供应链管理的概念?在服务组织中采用合适的供应链技术可以为他们的决策过程提供及时和准确的信息。在供应链管理中采用适当的信息技术工具是最大限度地提高服务组织效率的最重要因素。沙特阿拉伯(KSA)的服务机构在成功实施供应链技术方面面临着许多障碍和挑战。基于对KSA 52个组织的供应链和物流经理的调查收集的数据,本研究提出了不同类别的服务组织面临的供应链技术可能面临的挑战。研究结果为识别服务组织在实施供应链技术时可能面临的挑战提供了一个新的视角。
{"title":"Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia","authors":"H. Khan, Shafiq Ahmad, M. Abdollahian","doi":"10.1109/ITNG.2013.75","DOIUrl":"https://doi.org/10.1109/ITNG.2013.75","url":null,"abstract":"Information Technology has redefined the parameters of doing the business in the recent past. On one side it is opening the doors for new opportunities and on the other side many obstacles are also coming in the successful use of IT tools. Supply chain management is one of the core focuses on the emerging technologies now days. The concept of competitive economy in globalized world is increasing the importance of efficient supply chain management in service organizations. The question raised over here is that whether the service companies are adopting the concept of supply chain management (SCM) in an efficient way or not? Adoption of suitable supply chain technologies in service organizations can have timely and accurate information availability for their decision making process. This adoption of proper Information Technology tools in the SCM is the most important factor to maximize the efficiency in the service organizations. Service organizations in Saudi Arabia (KSA) are facing many obstacles and challenges in successful implementation of supply chain technologies. Based on the data collected from surveying supply chain and logistics managers in 52 organizations based in KSA, this study proposes the possible challenges of Supply chain technologies faced by different categories of service organizations. The findings provide a new perspective in identifying the possible challenges faced by the service organizations to implement supply chain technologies.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127389605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A Sinc Method for an Eigenvalue Problem of a Differential Operator with Periodic Coefficients and Its Comparison with Hill's Method 周期系数微分算子特征值问题的Sinc方法及其与Hill方法的比较
Ken’ichiro Tanaka
We consider a problem of computing spectrum of an ordinary differential operator with periodic coefficients. Due to Floquet's theory, such a problem is reduced to a set of eigenvalue problems for modified operators with a periodic boundary condition. We treat two numerical methods for such problems. A first is Hill's method, which reduces each problem to a matrix eigenvalue problem with the finite Fourier series approximation of eigenfunctions of each operator. This method achieves exponential convergence rate with respect to the size of the matrix. The rate, however, gets worse as the period of the coefficients becomes longer, which is observed in some numerical experiments. Then, in order to realize accurate computation in the cases of the long periods, we propose a second method related to Sinc approximation. Basically, Sinc approximation employs Sinc bases generated by the sinc function sinc(x) = sin(pi x)/(pi x) on R. In this work, a certain variant of the sinc function is adopted to approximate periodic functions. Our method keeps good accuracy in the cases of the long periods, which can be confirmed in some numerical experiments.
研究一类具有周期系数的常微分算子的谱计算问题。利用Floquet理论,将该问题简化为具有周期边界条件的修正算子的特征值问题集。我们用两种数值方法来处理这类问题。第一种是希尔方法,它将每个问题简化为矩阵特征值问题,利用每个算子的特征函数的有限傅立叶级数逼近。该方法对矩阵的大小达到指数收敛速度。然而,在一些数值实验中观察到,随着系数周期的延长,速率变差。然后,为了在长周期情况下实现精确计算,我们提出了与Sinc近似相关的第二种方法。基本上,Sinc近似使用Sinc函数Sinc (x) = sin(x)/(x)在r上生成的Sinc基。在这项工作中,采用Sinc函数的某种变体来近似周期函数。该方法在较长周期的情况下仍能保持较好的精度,这一点在一些数值实验中得到了证实。
{"title":"A Sinc Method for an Eigenvalue Problem of a Differential Operator with Periodic Coefficients and Its Comparison with Hill's Method","authors":"Ken’ichiro Tanaka","doi":"10.1109/ITNG.2013.31","DOIUrl":"https://doi.org/10.1109/ITNG.2013.31","url":null,"abstract":"We consider a problem of computing spectrum of an ordinary differential operator with periodic coefficients. Due to Floquet's theory, such a problem is reduced to a set of eigenvalue problems for modified operators with a periodic boundary condition. We treat two numerical methods for such problems. A first is Hill's method, which reduces each problem to a matrix eigenvalue problem with the finite Fourier series approximation of eigenfunctions of each operator. This method achieves exponential convergence rate with respect to the size of the matrix. The rate, however, gets worse as the period of the coefficients becomes longer, which is observed in some numerical experiments. Then, in order to realize accurate computation in the cases of the long periods, we propose a second method related to Sinc approximation. Basically, Sinc approximation employs Sinc bases generated by the sinc function sinc(x) = sin(pi x)/(pi x) on R. In this work, a certain variant of the sinc function is adopted to approximate periodic functions. Our method keeps good accuracy in the cases of the long periods, which can be confirmed in some numerical experiments.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workload Based Optimization Model for Parallel Disk Systems 基于工作负载的并行磁盘系统优化模型
Fangyang Shen, Bing Qi
Researchers are struggling for building high reliable and energy efficient parallel disk systems for years. With the times of high energy cost, conserving energy in parallel disk systems has large impact on reducing cost of disk systems and other related backup systems. In addition, it will conserve a lot of energy consumed by parallel disks in high performance computing systems. Moreover, Disk reliability is also significant for data integrity. While different reliability models and energy conservation techniques have been developed for parallel disk systems, most solutions do not consider two factors together in an optimization prospective and they do not consider the impact of disk workload. In this paper, we build a high reliable and energy-efficient parallel disk system using Markov chains. Specifically, we develop a quantitative reliability model for energy-efficient parallel disk systems which considers the impact of disk workload. With the new model, we can achieve the optimization between disk reliability and energy efficiency in parallel disk systems.
多年来,研究人员一直在努力构建高可靠性和节能的并行磁盘系统。在能源成本高的时代,节约并行磁盘系统的能源对降低磁盘系统和其他相关备份系统的成本有很大的影响。此外,它还可以节省高性能计算系统中并行磁盘所消耗的大量能量。此外,磁盘可靠性对数据完整性也很重要。虽然针对并行磁盘系统开发了不同的可靠性模型和节能技术,但大多数解决方案都没有在优化前景中同时考虑两个因素,也没有考虑磁盘工作负载的影响。本文利用马尔可夫链构建了一个高可靠、高能效的并行磁盘系统。具体来说,我们建立了一个考虑磁盘工作负载影响的节能并行磁盘系统的定量可靠性模型。利用该模型,我们可以实现并行磁盘系统中磁盘可靠性和能效之间的优化。
{"title":"Workload Based Optimization Model for Parallel Disk Systems","authors":"Fangyang Shen, Bing Qi","doi":"10.1109/ITNG.2013.34","DOIUrl":"https://doi.org/10.1109/ITNG.2013.34","url":null,"abstract":"Researchers are struggling for building high reliable and energy efficient parallel disk systems for years. With the times of high energy cost, conserving energy in parallel disk systems has large impact on reducing cost of disk systems and other related backup systems. In addition, it will conserve a lot of energy consumed by parallel disks in high performance computing systems. Moreover, Disk reliability is also significant for data integrity. While different reliability models and energy conservation techniques have been developed for parallel disk systems, most solutions do not consider two factors together in an optimization prospective and they do not consider the impact of disk workload. In this paper, we build a high reliable and energy-efficient parallel disk system using Markov chains. Specifically, we develop a quantitative reliability model for energy-efficient parallel disk systems which considers the impact of disk workload. With the new model, we can achieve the optimization between disk reliability and energy efficiency in parallel disk systems.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Validation of Model-Based Testing in Hardware in the Loop Platform 硬件在环平台中基于模型测试的验证
J. Keranen, T. Raty
Model-based testing (MBT) in hardware-in-the-loop (HIL) platform is a simulation and testing environment for embedded systems, in which test design automation provided by MBT is combined with HIL methodology. A HIL platform is a testing environment in which the embedded system under testing (SUT) assumes to be operating with real-world inputs and outputs. In this paper, we focus on presenting the novel methodologies and tools that were used to conduct the validation of the MBT in HIL platform. Another novelty of the validation approach is that it aims to provide a comprehensive and many-sided process view to validating MBT and HIL related systems including different component, integration and system level testing activities. The research is based on the constructive method of the related scientific literature and testing technologies, and the results are derived through testing and validating the implemented MBT in HIL platform. The used testing process indicated that the functionality of the constructed MBT in HIL prototype platform was validated.
硬件在环(HIL)平台中基于模型的测试(MBT)是嵌入式系统的仿真和测试环境,MBT提供的测试设计自动化与HIL方法相结合。HIL平台是一种测试环境,其中被测嵌入式系统(SUT)假定使用真实世界的输入和输出进行操作。在本文中,我们重点介绍了用于在HIL平台上进行MBT验证的新方法和工具。验证方法的另一个新颖之处在于,它旨在提供一个全面和多方面的过程视图来验证MBT和HIL相关系统,包括不同的组件、集成和系统级测试活动。本研究基于相关科学文献的构建方法和测试技术,并通过在HIL平台上对实现的MBT进行测试和验证得出结果。采用的测试过程表明,所构建的主战坦克在HIL原型平台上的功能得到了验证。
{"title":"Validation of Model-Based Testing in Hardware in the Loop Platform","authors":"J. Keranen, T. Raty","doi":"10.1109/ITNG.2013.53","DOIUrl":"https://doi.org/10.1109/ITNG.2013.53","url":null,"abstract":"Model-based testing (MBT) in hardware-in-the-loop (HIL) platform is a simulation and testing environment for embedded systems, in which test design automation provided by MBT is combined with HIL methodology. A HIL platform is a testing environment in which the embedded system under testing (SUT) assumes to be operating with real-world inputs and outputs. In this paper, we focus on presenting the novel methodologies and tools that were used to conduct the validation of the MBT in HIL platform. Another novelty of the validation approach is that it aims to provide a comprehensive and many-sided process view to validating MBT and HIL related systems including different component, integration and system level testing activities. The research is based on the constructive method of the related scientific literature and testing technologies, and the results are derived through testing and validating the implemented MBT in HIL platform. The used testing process indicated that the functionality of the constructed MBT in HIL prototype platform was validated.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 10th International Conference on Information Technology: New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1