首页 > 最新文献

2010 International Conference on Educational and Information Technology最新文献

英文 中文
Research of the RRC layer IDLE State in TD-LTE TD-LTE中RRC层IDLE状态研究
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608354
Xingbing Cao, Lili Liu
Long Term Evolution system represents the latest developments in the direction of UMTS standard. Radio Resource Control layer protocol is an important component of LTE, and its IDLE state plays an important role in the LTE. This paper is established in a study of cell selection and reselection of RRC IDLE and state transitions. Mainly focuses on the design of MSC of cell selection and reselection process.
长期演进系统代表了UMTS标准的最新发展方向。无线资源控制层协议是LTE的重要组成部分,其IDLE状态在LTE中起着重要作用。本文建立在对RRC、IDLE和状态转换的细胞选择和重选择的研究基础上。主要介绍MSC的细胞选择和重选过程的设计。
{"title":"Research of the RRC layer IDLE State in TD-LTE","authors":"Xingbing Cao, Lili Liu","doi":"10.1109/ICEIT.2010.5608354","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608354","url":null,"abstract":"Long Term Evolution system represents the latest developments in the direction of UMTS standard. Radio Resource Control layer protocol is an important component of LTE, and its IDLE state plays an important role in the LTE. This paper is established in a study of cell selection and reselection of RRC IDLE and state transitions. Mainly focuses on the design of MSC of cell selection and reselection process.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese problems analysis in JAVA language JAVA语言中文问题分析
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608452
Xianmin Wei
This paper introduces the relationship between various encoding methods and JAVA, For various reasons such as the garbled from file and stream, from the Web application and from database application, the garbled reasons are dissected from the analysis, their own solutions are put forward.
本文介绍了各种编码方式与JAVA之间的关系,针对文件和流、Web应用和数据库应用中出现的码乱等各种原因,从分析的角度剖析了码乱的原因,并提出了各自的解决方案。
{"title":"Chinese problems analysis in JAVA language","authors":"Xianmin Wei","doi":"10.1109/ICEIT.2010.5608452","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608452","url":null,"abstract":"This paper introduces the relationship between various encoding methods and JAVA, For various reasons such as the garbled from file and stream, from the Web application and from database application, the garbled reasons are dissected from the analysis, their own solutions are put forward.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133128176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on teaching reform of the computer science and technology major in local university 地方高校计算机科学与技术专业教学改革研究
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608373
Zeng-gang Xiong, Xue-wen Xia, Xue-min Zhang, Jianxin Chen
This paper aims to improve the core ability of the computer science and technology majors in local university. It does some researches on three aspects: the training system of the core abilities of the students of the computer science and technology major in local university; the teaching reform of the computer science and technology major, and the courses construction of the computer science and technology major. For this purpose the research is very instructive for students in local university.
本文旨在提高地方高校计算机科学与技术专业学生的核心能力。本文从三个方面进行了研究:地方高校计算机科学与技术专业学生核心能力的培养体系;计算机科学与技术专业教学改革与计算机科学与技术专业课程建设为此,本研究对地方高校学生具有一定的指导意义。
{"title":"Research on teaching reform of the computer science and technology major in local university","authors":"Zeng-gang Xiong, Xue-wen Xia, Xue-min Zhang, Jianxin Chen","doi":"10.1109/ICEIT.2010.5608373","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608373","url":null,"abstract":"This paper aims to improve the core ability of the computer science and technology majors in local university. It does some researches on three aspects: the training system of the core abilities of the students of the computer science and technology major in local university; the teaching reform of the computer science and technology major, and the courses construction of the computer science and technology major. For this purpose the research is very instructive for students in local university.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133235699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The architecture of an intrusion tolerant database system 入侵容忍数据库系统的体系结构
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607768
Z. Falahiazar, M. Rohani
With the ever increasing development and expansion of database use, protection of database against hazards, which threaten the integrity, availability and confidentiality of database, is inevitable. However, traditional mechanisms of database security is concentrated on protection or prevention. The main objective of an intrusion tolerant database system is such that even if a number of attacks penetrated inside information system, specified levels of availability, integrity and confidentiality are yet guaranteed. A key part of intrusion tolerant database system is intrusion detection which informs system about attacks. However, detection latency will result in damage spreading. Two novel techniques are used for containment of damage in intrusion tolerant database system: Attack isolation and multiphase damage Confinement. These techniques have been posed as general solutions and in real applications, they may cause outbreak of problems in integrity and availability. In this paper, we present a practical architecture for an intrusion tolerant database system with the aim of safeguarding integrity and availability in the presence of successful attacks through taking advantages of these two techniques.
随着数据库应用的不断发展和扩大,数据库的完整性、可用性和保密性受到威胁,保护数据库免受危害是不可避免的。然而,传统的数据库安全机制主要集中在保护或预防上。可容忍入侵的数据库系统的主要目标是,即使许多攻击渗透到信息系统内部,仍然保证指定级别的可用性、完整性和机密性。入侵检测是入侵容忍数据库系统的一个关键部分,它能及时通知系统受到的攻击。但是,检测延迟会导致损害扩散。在入侵容忍数据库系统中,采用了两种新的损害控制技术:攻击隔离和多相损害约束。这些技术已作为一般解决方案提出,但在实际应用程序中,它们可能会导致完整性和可用性问题的爆发。在本文中,我们提出了一种实用的入侵容忍数据库系统体系结构,目的是通过利用这两种技术在存在成功攻击的情况下保护完整性和可用性。
{"title":"The architecture of an intrusion tolerant database system","authors":"Z. Falahiazar, M. Rohani","doi":"10.1109/ICEIT.2010.5607768","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607768","url":null,"abstract":"With the ever increasing development and expansion of database use, protection of database against hazards, which threaten the integrity, availability and confidentiality of database, is inevitable. However, traditional mechanisms of database security is concentrated on protection or prevention. The main objective of an intrusion tolerant database system is such that even if a number of attacks penetrated inside information system, specified levels of availability, integrity and confidentiality are yet guaranteed. A key part of intrusion tolerant database system is intrusion detection which informs system about attacks. However, detection latency will result in damage spreading. Two novel techniques are used for containment of damage in intrusion tolerant database system: Attack isolation and multiphase damage Confinement. These techniques have been posed as general solutions and in real applications, they may cause outbreak of problems in integrity and availability. In this paper, we present a practical architecture for an intrusion tolerant database system with the aim of safeguarding integrity and availability in the presence of successful attacks through taking advantages of these two techniques.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The registration of aerial infrared and visible images 航空红外和可见光图像的配准
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607665
Mingchao Sun, Bao Zhang, Jinghong Liu, Yongyang Wang, Quan Yang
In order to solve the registration problem of different source image existed on aerial image fusion, algorithms based on Particle Swarm Optimization (PSO) are applied as search strategy in this paper, and Alignment Metric (AM) is used as judgment. This study has realized the different source image registration of infrared and visible light with high speed, high accuracy and high reliability. Basically, with little restriction of gray level properties, a new alignment measure is applied, which can efficiently measure the image registration extent and tolerate noise well. Even more, the intelligent optimization algorithm - Particle Swarm Optimization (PSO) is combined to improve the registration precision and rate of infrared and visible light. Experimental results indicate that, the study attains the registration accuracy of pixel level, and every registration time is cut down over 40 percent compared to traditional method. The match algorithm based on AM, solves the registration problem that greater differences between different source images are existed on gray and characteristic. At the same time, the adoption of combining the intelligent optimization algorithms significantly improves the searching efficiency and convergence speed of the algorithms, and the registration result has higher accuracy and stability, which builds up solid foundation for different source image fusion. The method in this paper has a magnificent effect, and is easy for application and very suitable for engineering use.
为了解决航拍图像融合中存在的不同源图像的配准问题,采用基于粒子群优化(PSO)的算法作为搜索策略,并采用对齐度量(AM)作为判断手段。本研究实现了红外与可见光不同源图像的高速、高精度、高可靠性配准。基本上,在不受灰度属性限制的情况下,采用了一种新的对齐方法,该方法既能有效地测量图像的配准程度,又能很好地容忍噪声。结合智能优化算法粒子群优化(PSO),提高了红外和可见光的配准精度和配准率。实验结果表明,该方法达到了像素级的配准精度,每次配准时间比传统方法缩短40%以上。基于AM的匹配算法解决了不同源图像在灰度和特征上存在较大差异的配准问题。同时,结合智能优化算法的采用显著提高了算法的搜索效率和收敛速度,配准结果具有更高的精度和稳定性,为不同源图像融合奠定了坚实的基础。该方法具有较好的效果,易于应用,非常适合工程应用。
{"title":"The registration of aerial infrared and visible images","authors":"Mingchao Sun, Bao Zhang, Jinghong Liu, Yongyang Wang, Quan Yang","doi":"10.1109/ICEIT.2010.5607665","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607665","url":null,"abstract":"In order to solve the registration problem of different source image existed on aerial image fusion, algorithms based on Particle Swarm Optimization (PSO) are applied as search strategy in this paper, and Alignment Metric (AM) is used as judgment. This study has realized the different source image registration of infrared and visible light with high speed, high accuracy and high reliability. Basically, with little restriction of gray level properties, a new alignment measure is applied, which can efficiently measure the image registration extent and tolerate noise well. Even more, the intelligent optimization algorithm - Particle Swarm Optimization (PSO) is combined to improve the registration precision and rate of infrared and visible light. Experimental results indicate that, the study attains the registration accuracy of pixel level, and every registration time is cut down over 40 percent compared to traditional method. The match algorithm based on AM, solves the registration problem that greater differences between different source images are existed on gray and characteristic. At the same time, the adoption of combining the intelligent optimization algorithms significantly improves the searching efficiency and convergence speed of the algorithms, and the registration result has higher accuracy and stability, which builds up solid foundation for different source image fusion. The method in this paper has a magnificent effect, and is easy for application and very suitable for engineering use.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing enterprise archiecture with “model-evaluate-extend” approach 使用“模型-评估-扩展”方法开发企业架构
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607799
R. Davidrajuh, R. Davidrajuh
This paper proposes a simple yet robust approach for enterprise architecture development. The approach centers on the three most important phases of the enterprise architecture namely modeling, evaluation, and extension. This paper also identifies a set of resources (tools and frameworks) for this approach.
本文为企业架构开发提出了一种简单而健壮的方法。该方法以企业架构的三个最重要的阶段为中心,即建模、评估和扩展。本文还为这种方法确定了一组资源(工具和框架)。
{"title":"Developing enterprise archiecture with “model-evaluate-extend” approach","authors":"R. Davidrajuh, R. Davidrajuh","doi":"10.1109/ICEIT.2010.5607799","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607799","url":null,"abstract":"This paper proposes a simple yet robust approach for enterprise architecture development. The approach centers on the three most important phases of the enterprise architecture namely modeling, evaluation, and extension. This paper also identifies a set of resources (tools and frameworks) for this approach.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computer-Supported Assessment of Software Verification Proofs 计算机支持的软件验证证明评估
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607766
Claus A. Usener, S. Gruttmann, Tim A. Majchrzak, H. Kuchen
Most conventional e-assessment systems are not suited for examining analytic, creative and constructive skills and the few existing ones have too limited functionality to appropriately support Computer Science assessments. On this account the e-assessment system EASy has been developed which e.g. provides relevant exercise modules for Computer Science tasks. Recently the system has been extended by a module for the computer-supported examination of software verification proofs based on the Hoare Logic. In this work we discuss this module and evaluate its applicability, usability and acceptance in terms of a lecture on Formal Specification.
大多数传统的电子评估系统不适合检查分析,创造性和建设性技能,现有的少数电子评估系统功能过于有限,无法适当地支持计算机科学评估。因此,电子评估系统EASy已经开发出来,例如为计算机科学任务提供相关的练习模块。最近,该系统又扩展了一个基于Hoare逻辑的计算机支持的软件验证证明检验模块。在这项工作中,我们讨论了这个模块,并评估其适用性,可用性和接受程度的讲座形式规范。
{"title":"Computer-Supported Assessment of Software Verification Proofs","authors":"Claus A. Usener, S. Gruttmann, Tim A. Majchrzak, H. Kuchen","doi":"10.1109/ICEIT.2010.5607766","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607766","url":null,"abstract":"Most conventional e-assessment systems are not suited for examining analytic, creative and constructive skills and the few existing ones have too limited functionality to appropriately support Computer Science assessments. On this account the e-assessment system EASy has been developed which e.g. provides relevant exercise modules for Computer Science tasks. Recently the system has been extended by a module for the computer-supported examination of software verification proofs based on the Hoare Logic. In this work we discuss this module and evaluate its applicability, usability and acceptance in terms of a lecture on Formal Specification.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Region-based fusion of infrared and visible images using Bidimensional Empirical Mode Decomposition 基于二维经验模态分解的红外与可见光图像区域融合
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608352
W. Liang, Zhifang Liu
Region-based image fusion schemes have been studied a lot, but they are all based on some common decomposition, such as pyramid, wavelet and contourlet transform. In this paper, we present a novel region-based image fusion scheme using BEMD (Bidimensional Empirical Mode Decomposition) for infrared and visible images. BEMD is a new 2D signal analysis method extended from EMD and it decomposes the signal into a series of IMFs (Intrinsic Mode Functions) from finest to coarsest. Region segmentation is of vital importance in the fusion process. Real images are always intensity inhomogeneous, e.g. infrared and visible images, so we use an LBF (Local Binary Fitting) model which aims at segmenting intensity inhomogeneous images to extract our regions. Experiments show that the proposed fusion scheme works effectively compared with traditional fusion schemes.
基于区域的图像融合方案已经研究了很多,但它们都是基于一些常见的分解,如金字塔变换、小波变换和轮廓波变换。本文提出了一种基于区域的红外和可见光图像融合方法。BEMD是在EMD基础上扩展而来的一种新的二维信号分析方法,它将信号从最优到最粗分解为一系列的内模函数(IMFs)。在融合过程中,区域分割是至关重要的。真实图像总是强度不均匀的,例如红外和可见光图像,因此我们使用LBF(局部二值拟合)模型来分割强度不均匀的图像来提取我们的区域。实验表明,与传统的融合方案相比,所提出的融合方案是有效的。
{"title":"Region-based fusion of infrared and visible images using Bidimensional Empirical Mode Decomposition","authors":"W. Liang, Zhifang Liu","doi":"10.1109/ICEIT.2010.5608352","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608352","url":null,"abstract":"Region-based image fusion schemes have been studied a lot, but they are all based on some common decomposition, such as pyramid, wavelet and contourlet transform. In this paper, we present a novel region-based image fusion scheme using BEMD (Bidimensional Empirical Mode Decomposition) for infrared and visible images. BEMD is a new 2D signal analysis method extended from EMD and it decomposes the signal into a series of IMFs (Intrinsic Mode Functions) from finest to coarsest. Region segmentation is of vital importance in the fusion process. Real images are always intensity inhomogeneous, e.g. infrared and visible images, so we use an LBF (Local Binary Fitting) model which aims at segmenting intensity inhomogeneous images to extract our regions. Experiments show that the proposed fusion scheme works effectively compared with traditional fusion schemes.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"626 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116467815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Descriptive model of peer-to-peer Botnet structures 点对点僵尸网络结构描述模型
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5608400
J. Duan, Jian Jiao, Chunhe Xia, Shan Yao, Xiaojian Li
Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop detection and mitigation methods. Most of existing work is case study of typical P2P botnets. In this paper, we focus on systematically analyzing structures of P2P botnets. We propose a descriptive model of P2P botnet structures, which consists of features of P2P bot, definitions of structures, and structural properties. Firstly, we detail two key functionalities of P2P bot, command-and-control (C&C) functionality and peer-to-peer (P2P) functionality, and give several features of P2P bot. And then, we define two structures of P2P botnets: C&C structure and P2P structure. To characterize these structures, we propose several properties and corresponding quantitative methods. Finally, we conduct experiments to verify our results.
点对点(P2P)僵尸网络随着点对点技术的发展而出现,它比集中式僵尸网络更具弹性和健壮性。更好地了解这种新现象将有助于研究人员开发检测和缓解方法。现有的研究大多是针对典型的P2P僵尸网络的案例研究。本文主要对P2P僵尸网络的结构进行了系统的分析。本文提出了一个描述P2P僵尸网络结构的模型,该模型包括P2P僵尸网络的特征、结构定义和结构属性。首先,我们详细介绍了P2P机器人的两个关键功能,即命令与控制(C&C)功能和点对点(P2P)功能,并给出了P2P机器人的几个特点。然后,我们定义了P2P僵尸网络的两种结构:C&C结构和P2P结构。为了表征这些结构,我们提出了一些性质和相应的定量方法。最后,我们进行了实验来验证我们的结果。
{"title":"Descriptive model of peer-to-peer Botnet structures","authors":"J. Duan, Jian Jiao, Chunhe Xia, Shan Yao, Xiaojian Li","doi":"10.1109/ICEIT.2010.5608400","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5608400","url":null,"abstract":"Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop detection and mitigation methods. Most of existing work is case study of typical P2P botnets. In this paper, we focus on systematically analyzing structures of P2P botnets. We propose a descriptive model of P2P botnet structures, which consists of features of P2P bot, definitions of structures, and structural properties. Firstly, we detail two key functionalities of P2P bot, command-and-control (C&C) functionality and peer-to-peer (P2P) functionality, and give several features of P2P bot. And then, we define two structures of P2P botnets: C&C structure and P2P structure. To characterize these structures, we propose several properties and corresponding quantitative methods. Finally, we conduct experiments to verify our results.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SA based software deployment reliability estimation: Problem space, challenges and strategies 基于SA的软件部署可靠性评估:问题空间、挑战和策略
Pub Date : 2010-10-25 DOI: 10.1109/ICEIT.2010.5607510
Xihong Su, Hongwei Liu, Zhibo Wu, Decheng Zuo, Xiaozong Yang
Software architecture (SA) has been widely advocated as an effective abstraction for modeling, implementing, and evolving complex software systems such as those in distributed, decentralized, heterogeneous, mobile, and pervasive environments. We intend to investigate two problems related to the domain of those environments: software deployment and reliability. Software deployment is a post-production activity that is performed for or by the customer of a piece of software. Though many approaches for Architecture-based reliability research, little work has been done in incorporating software deployment into architecture-based reliability estimation. Thus, this paper describes which information constitute SA based software deployment reliability model and how to obtain available information for the model. The system reliability estimation at an architectural level includes software deployment, architectural style and component replica.
软件架构(SA)作为一种有效的抽象被广泛提倡,用于建模、实现和进化复杂的软件系统,例如那些分布的、分散的、异构的、移动的和普及的环境。我们打算研究与这些环境领域相关的两个问题:软件部署和可靠性。软件部署是一个后期生产活动,由软件的客户执行或由客户执行。尽管基于体系结构的可靠性研究方法很多,但将软件部署纳入基于体系结构的可靠性评估方面的工作还很少。因此,本文描述了哪些信息构成了基于情景分析的软件部署可靠性模型,以及如何获取该模型的可用信息。体系结构级别的系统可靠性评估包括软件部署、体系结构风格和组件副本。
{"title":"SA based software deployment reliability estimation: Problem space, challenges and strategies","authors":"Xihong Su, Hongwei Liu, Zhibo Wu, Decheng Zuo, Xiaozong Yang","doi":"10.1109/ICEIT.2010.5607510","DOIUrl":"https://doi.org/10.1109/ICEIT.2010.5607510","url":null,"abstract":"Software architecture (SA) has been widely advocated as an effective abstraction for modeling, implementing, and evolving complex software systems such as those in distributed, decentralized, heterogeneous, mobile, and pervasive environments. We intend to investigate two problems related to the domain of those environments: software deployment and reliability. Software deployment is a post-production activity that is performed for or by the customer of a piece of software. Though many approaches for Architecture-based reliability research, little work has been done in incorporating software deployment into architecture-based reliability estimation. Thus, this paper describes which information constitute SA based software deployment reliability model and how to obtain available information for the model. The system reliability estimation at an architectural level includes software deployment, architectural style and component replica.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124485020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 International Conference on Educational and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1