首页 > 最新文献

2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)最新文献

英文 中文
Test Data Augmentation for Image Recognition Software 图像识别软件的测试数据增强
Pu Wang, Zhiyi Zhang, Yuqian Zhou, Zhiqiu Huang
Image recognition software has been widely used in many vital areas, so it needs to be thoroughly tested with images as test data. However, for some special areas, such as medical treatment, there are only a few sufficient and credible test data. Some test data still depends on the training data, which results in the defect detection ability of the testing is not high. In this paper, we propose a new test data augmentation approach with combing domain knowledge and data mutation. Given an image, our approach extracts the features of the recognition targets in this image based on domain knowledge, then mutates these features to generate new images. In theory, our approach could generate high-quality test data, which helps testing image recognition software adequately, and improving the accuracy of image recognition software.
图像识别软件已广泛应用于许多重要领域,因此需要以图像作为测试数据进行彻底的测试。然而,对于一些特殊领域,如医疗,只有少数充分和可信的测试数据。部分测试数据仍然依赖于训练数据,导致测试的缺陷检测能力不高。本文提出了一种结合领域知识和数据突变的测试数据增强方法。给定图像,我们的方法基于领域知识提取图像中识别目标的特征,然后对这些特征进行突变以生成新图像。理论上,我们的方法可以生成高质量的测试数据,有助于充分测试图像识别软件,提高图像识别软件的准确性。
{"title":"Test Data Augmentation for Image Recognition Software","authors":"Pu Wang, Zhiyi Zhang, Yuqian Zhou, Zhiqiu Huang","doi":"10.1109/QRS-C51114.2020.00054","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00054","url":null,"abstract":"Image recognition software has been widely used in many vital areas, so it needs to be thoroughly tested with images as test data. However, for some special areas, such as medical treatment, there are only a few sufficient and credible test data. Some test data still depends on the training data, which results in the defect detection ability of the testing is not high. In this paper, we propose a new test data augmentation approach with combing domain knowledge and data mutation. Given an image, our approach extracts the features of the recognition targets in this image based on domain knowledge, then mutates these features to generate new images. In theory, our approach could generate high-quality test data, which helps testing image recognition software adequately, and improving the accuracy of image recognition software.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Verification of CAN Bus in Cyber Physical System 网络物理系统CAN总线的形式化验证
Rui Wang, Yong Guan, Xiaojuan Li, Rui Zhang
Cyber physical system (CPS) is a multi-dimensional complicated system integrating computing, communication and physical environment. CPS is widely used in safety-critical areas such as aerospace, intelligent transportation and medical equipment. So ensuring the security and reliability of CPS is of great significance. Formal verification is one of the useful ways. This paper builds timed automata models for the communication process of CAN bus used in CPS. Our research especially analyses the gateway in the communication process, and simulates the transmission with different rates between the external environment and internal unit. The task also takes into account the packet transmission priority. The model checking tool Uppaal is used to verify the functional and real-time properties. The verification results illustrate that the established model can meet the relevant properties, and the packet can be transmitted in an orderly and efficient manner.
网络物理系统是一个集计算、通信和物理环境于一体的多维复杂系统。CPS广泛应用于航空航天、智能交通和医疗设备等安全关键领域。因此,保证CPS的安全性和可靠性具有十分重要的意义。形式验证是一种有用的方法。本文建立了用于CPS的CAN总线通信过程的时间自动机模型。我们的研究重点分析了网关在通信过程中的作用,并模拟了外部环境和内部单元之间以不同速率的传输。该任务还考虑了数据包的传输优先级。使用模型校验工具Uppaal对模型的功能性和实时性进行校验。验证结果表明,所建立的模型能够满足相关特性,数据包能够有序、高效地传输。
{"title":"Formal Verification of CAN Bus in Cyber Physical System","authors":"Rui Wang, Yong Guan, Xiaojuan Li, Rui Zhang","doi":"10.1109/QRS-C51114.2020.00050","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00050","url":null,"abstract":"Cyber physical system (CPS) is a multi-dimensional complicated system integrating computing, communication and physical environment. CPS is widely used in safety-critical areas such as aerospace, intelligent transportation and medical equipment. So ensuring the security and reliability of CPS is of great significance. Formal verification is one of the useful ways. This paper builds timed automata models for the communication process of CAN bus used in CPS. Our research especially analyses the gateway in the communication process, and simulates the transmission with different rates between the external environment and internal unit. The task also takes into account the packet transmission priority. The model checking tool Uppaal is used to verify the functional and real-time properties. The verification results illustrate that the established model can meet the relevant properties, and the packet can be transmitted in an orderly and efficient manner.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121810357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using TDL for Standardised Test Purpose Definitions 使用TDL进行标准化测试目的定义
Philip Makedonski, Ilie-Daniel Gheorghe-Pop, A. Rennoch, F. Kristoffersen, Bostjan Pintar, A. Ulrich
This article reports on experiences from the use of the ETSI Test Description Language (TDL) and its extension for structured test objective specification (TDL-TO) for the definition of functional and non-functional test purposes in the Internet of Things (IoT) domain. The experiences are based on results from different working groups at ETSI TC MTS and the ETSI Specialist Task Force (STF) 574, focusing on the definition of test purposes for functional, security, and performance testing of the CoAP and MQTT protocols as well as VxLTeinteroperability testing.
本文报告了使用ETSI测试描述语言(TDL)及其对结构化测试目标规范(TDL- to)的扩展的经验,以定义物联网(IoT)领域中的功能和非功能测试目的。这些经验是基于ETSI TC MTS和ETSI专家任务组(STF) 574的不同工作组的结果,重点是CoAP和MQTT协议以及vxlte互操作性测试的功能、安全性和性能测试目的的定义。
{"title":"Using TDL for Standardised Test Purpose Definitions","authors":"Philip Makedonski, Ilie-Daniel Gheorghe-Pop, A. Rennoch, F. Kristoffersen, Bostjan Pintar, A. Ulrich","doi":"10.1109/QRS-C51114.2020.00091","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00091","url":null,"abstract":"This article reports on experiences from the use of the ETSI Test Description Language (TDL) and its extension for structured test objective specification (TDL-TO) for the definition of functional and non-functional test purposes in the Internet of Things (IoT) domain. The experiences are based on results from different working groups at ETSI TC MTS and the ETSI Specialist Task Force (STF) 574, focusing on the definition of test purposes for functional, security, and performance testing of the CoAP and MQTT protocols as well as VxLTeinteroperability testing.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133310299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Iterative Program Synthesis with Knowledge Searched from Internet 基于网络知识检索的有效迭代程序综合
Jiaxin Liu, Wei Dong, Binbin Liu, Yating Zhang, Daiyan Wang
This paper presents the ongoing work of studying the iterative program synthesis based on knowledge searched from the Internet, which can fairly reduce the scale of program space and improve the efficiency of synthesis. First, we implement a tool named Args(api Recommendation via General Search) to obtain the API knowledge from the Internet. Second, we propose an iterative method that incrementally constructs the program space to quickly approach the target program. The initial experimental result shows the effectiveness of our work.
本文介绍了基于互联网知识搜索的迭代程序综合的研究工作,该方法可以较好地减小程序空间的规模,提高综合效率。首先,我们实现了一个名为Args(api Recommendation via General Search)的工具,从互联网上获取api知识。其次,我们提出了一种迭代方法,增量构建程序空间以快速接近目标程序。初步的实验结果表明了我们工作的有效性。
{"title":"Effective Iterative Program Synthesis with Knowledge Searched from Internet","authors":"Jiaxin Liu, Wei Dong, Binbin Liu, Yating Zhang, Daiyan Wang","doi":"10.1109/QRS-C51114.2020.00117","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00117","url":null,"abstract":"This paper presents the ongoing work of studying the iterative program synthesis based on knowledge searched from the Internet, which can fairly reduce the scale of program space and improve the efficiency of synthesis. First, we implement a tool named Args(api Recommendation via General Search) to obtain the API knowledge from the Internet. Second, we propose an iterative method that incrementally constructs the program space to quickly approach the target program. The initial experimental result shows the effectiveness of our work.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134272031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organizing Committee QRS 2020 组委会QRS 2020
{"title":"Organizing Committee QRS 2020","authors":"","doi":"10.1109/qrs-c51114.2020.00007","DOIUrl":"https://doi.org/10.1109/qrs-c51114.2020.00007","url":null,"abstract":"","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallelizing Flow-Sensitive Demand-Driven Points-to Analysis 并行流敏感需求驱动点分析
Haibo Yu, Qiang Sun, Kejun Xiao, Yuting Chen, Tsunenori Mine, Jianjun Zhao
Ahstract-Points-to analysis is a fundamental, but computationally intensive technique for static program analysis, optimization, debugging and verification. Context-Free Language (CFL) reachability has been proposed and widely used in demand-driven points-to analyses that aims for computing specific points-to relations on demand rather than all variables in the program. However, CFL-reachability-based points-to analysis still faces challenges when applied in practice especially for flow-sensitive points-to analysis, which aims at improving the precision of points-to analysis by taking account of the execution order of program statements. We propose a scalable approach named Parseeker to parallelize flow-sensitive demand-driven points-to analysis via CFL-reachability in order to improve the performance of points-to analysis with high precision. Our core insights are to (1) produce and process a set of fine-grained, parallelizable queries of points-to relations for the objective program, and (2) take a CFL-reachability-based points-to analysis to answer each query. The MapReduce is used to parallelize the queries and three optimization strategies are designed for further enhancing the efficiency.
抽象点分析是静态程序分析、优化、调试和验证的基本技术,但计算量很大。上下文无关语言(CFL)可达性已经被提出并广泛应用于需求驱动的点对分析,目的是计算特定的点对关系,而不是程序中的所有变量。然而,基于cfl可达性的点对分析在实际应用中仍然面临挑战,特别是流敏感点分析,其目的是通过考虑程序语句的执行顺序来提高点对分析的精度。我们提出了一种可扩展的Parseeker方法,通过cfl可达性并行化流敏感需求驱动的点对分析,以提高点对分析的高精度性能。我们的核心见解是:(1)为目标程序生成和处理一组细粒度的、可并行的点对关系查询,以及(2)采用基于cfl可达性的点对分析来回答每个查询。使用MapReduce对查询进行并行化处理,并设计了三种优化策略来进一步提高查询效率。
{"title":"Parallelizing Flow-Sensitive Demand-Driven Points-to Analysis","authors":"Haibo Yu, Qiang Sun, Kejun Xiao, Yuting Chen, Tsunenori Mine, Jianjun Zhao","doi":"10.1109/QRS-C51114.2020.00026","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00026","url":null,"abstract":"Ahstract-Points-to analysis is a fundamental, but computationally intensive technique for static program analysis, optimization, debugging and verification. Context-Free Language (CFL) reachability has been proposed and widely used in demand-driven points-to analyses that aims for computing specific points-to relations on demand rather than all variables in the program. However, CFL-reachability-based points-to analysis still faces challenges when applied in practice especially for flow-sensitive points-to analysis, which aims at improving the precision of points-to analysis by taking account of the execution order of program statements. We propose a scalable approach named Parseeker to parallelize flow-sensitive demand-driven points-to analysis via CFL-reachability in order to improve the performance of points-to analysis with high precision. Our core insights are to (1) produce and process a set of fine-grained, parallelizable queries of points-to relations for the objective program, and (2) take a CFL-reachability-based points-to analysis to answer each query. The MapReduce is used to parallelize the queries and three optimization strategies are designed for further enhancing the efficiency.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115787443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based Vulnerability Detection via Extracting Features from Sliced Code 从切片代码中提取特征的基于图的漏洞检测
Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong
With the development of open source software and open source community, there are more available codes on the Internet. And the open vulnerability information can be found on the Internet. In fact, using known vulnerabilities to calculate the similarity with the source code has been demonstrated a useful method to detect vulnerabilities. But the vulnerabilities often have many irrelevant codes, which may cause false positives and reduce the accuracy of vulnerability detection. Besides, the program code may have been patched. This also leads to false positives. We use code property graphs to extract source code and calculate the similarity between the vulnerable code and the source code to judge whether the software has vulnerabilities. By using the patched code, we can reduce the false positive. We use our approach on LibTIFF and Linux kernel. The experimental results show that the approach can effectively find vulnerabilities and reduce the false positive.
随着开源软件和开源社区的发展,互联网上有了更多的可用代码。开放的漏洞信息可以在互联网上找到。事实上,使用已知漏洞来计算与源代码的相似度已被证明是检测漏洞的一种有用方法。但是这些漏洞往往包含许多不相关的代码,容易造成误报,降低漏洞检测的准确性。此外,程序代码可能已经打过补丁。这也会导致误报。我们利用代码属性图提取源代码,并通过计算漏洞代码与源代码的相似度来判断软件是否存在漏洞。通过使用补丁码,我们可以减少误报。我们在LibTIFF和Linux内核上使用我们的方法。实验结果表明,该方法能有效地发现漏洞,减少误报。
{"title":"Graph-based Vulnerability Detection via Extracting Features from Sliced Code","authors":"Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong","doi":"10.1109/QRS-C51114.2020.00018","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00018","url":null,"abstract":"With the development of open source software and open source community, there are more available codes on the Internet. And the open vulnerability information can be found on the Internet. In fact, using known vulnerabilities to calculate the similarity with the source code has been demonstrated a useful method to detect vulnerabilities. But the vulnerabilities often have many irrelevant codes, which may cause false positives and reduce the accuracy of vulnerability detection. Besides, the program code may have been patched. This also leads to false positives. We use code property graphs to extract source code and calculate the similarity between the vulnerable code and the source code to judge whether the software has vulnerabilities. By using the patched code, we can reduce the false positive. We use our approach on LibTIFF and Linux kernel. The experimental results show that the approach can effectively find vulnerabilities and reduce the false positive.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Driver's Perception Model in Driving Assist 驾驶辅助中的驾驶员感知模型
Renzhi Tang, Zhihao Jiang
Vision is the primary way to perceive the environment during driving. However, due to its low spatial and temporal resolution, a driver may fail to perceive agents on the road, which may lead to collisions. Modern vehicles are equipped with sensors that can better perceive the driving environment, as well as ADAS to provide driving assist. However, ADAS does not consider the driver's perception, which may result in unnecessary warnings or actions against the driver's will. These false-positives may cause distractions and confusions in complex driving scenarios, which pose safety threat. In this project, we proposed a driving assist system which can reduce the number of unnecessary warnings by taking into account the driver's perception of the driving environment. The driver's perception model combines estimation of driving environment update and driver's observation. The driver's observation is obtained from gaze tracking and the driving environment update is estimated based on the last observation. In this paper, we formulated inference problem on the driver's perception, and developed a virtual driving simulator to evaluate the feasibility of the system.
视觉是驾驶过程中感知环境的主要方式。然而,由于其空间和时间分辨率较低,驾驶员可能无法感知道路上的智能体,从而可能导致碰撞。现代车辆配备了可以更好地感知驾驶环境的传感器,以及提供驾驶辅助的ADAS。然而,ADAS并不考虑驾驶员的感知,这可能会导致不必要的警告或违背驾驶员意愿的行为。这些误报可能会在复杂的驾驶场景中造成分心和混淆,从而对安全构成威胁。在这个项目中,我们提出了一个驾驶辅助系统,该系统可以通过考虑驾驶员对驾驶环境的感知来减少不必要的警告次数。驾驶员感知模型将对驾驶环境更新的估计与驾驶员的观察相结合。通过注视跟踪获得驾驶员的观察值,并根据最后的观察值估计驾驶环境的更新。在本文中,我们提出了关于驾驶员感知的推理问题,并开发了一个虚拟驾驶模拟器来评估系统的可行性。
{"title":"Driver's Perception Model in Driving Assist","authors":"Renzhi Tang, Zhihao Jiang","doi":"10.1109/QRS-C51114.2020.00047","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00047","url":null,"abstract":"Vision is the primary way to perceive the environment during driving. However, due to its low spatial and temporal resolution, a driver may fail to perceive agents on the road, which may lead to collisions. Modern vehicles are equipped with sensors that can better perceive the driving environment, as well as ADAS to provide driving assist. However, ADAS does not consider the driver's perception, which may result in unnecessary warnings or actions against the driver's will. These false-positives may cause distractions and confusions in complex driving scenarios, which pose safety threat. In this project, we proposed a driving assist system which can reduce the number of unnecessary warnings by taking into account the driver's perception of the driving environment. The driver's perception model combines estimation of driving environment update and driver's observation. The driver's observation is obtained from gaze tracking and the driving environment update is estimated based on the last observation. In this paper, we formulated inference problem on the driver's perception, and developed a virtual driving simulator to evaluate the feasibility of the system.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Result Diversification in Clinical Case Reports Retrieval based on Main Finding 基于主要发现的临床病例报告检索的多样化
Mengqi Luo, Fengchang Yu, Haihua Chen
Clinical case reports are the ‘eyewitness’ in biomedical literature and provide a valuable, unique, albeit noisy and underutilized type of evidence. Main finding is the reason for writing up the reports. Main finding based case reports retrieval provides way for user to conveniently access information of eyewitness evidence. However, user retrieval requirements are often ambiguous and diverse, traditional similarity based retrieval mechanism cannot meet different needs of users. Here, we conduct research of result diversification in case reports retrieval based on main finding. First, four similarity measurements for comparing main finding contents are used for initial result ranking; second, two implicit reranking algorithms and two explicit reranking algorithms are applied for result diversification. Experimental result showed that the methods we used had improved sub-topics coverage rate (CR@ X%) in re-ranking result, which proved the effectiveness of our research work for improving result diversification degree.
临床病例报告是生物医学文献中的“目击者”,提供了一种有价值的、独特的、尽管嘈杂且未充分利用的证据。主要发现是撰写这些报告的原因。基于主查找的案件报告检索为用户方便地获取目击证据信息提供了途径。然而,用户的检索需求往往是模糊和多样的,传统的基于相似度的检索机制不能满足用户的不同需求。本文对基于主要发现的病例报告检索结果多样化进行了研究。首先,采用比较主要查找内容的四种相似度度量进行初步结果排序;其次,采用两种隐式重排序算法和两种显式重排序算法实现结果多样化。实验结果表明,我们使用的方法在重新排序结果中提高了子主题覆盖率(CR@ X%),证明了我们的研究工作在提高结果多样化程度方面的有效性。
{"title":"Result Diversification in Clinical Case Reports Retrieval based on Main Finding","authors":"Mengqi Luo, Fengchang Yu, Haihua Chen","doi":"10.1109/QRS-C51114.2020.00044","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00044","url":null,"abstract":"Clinical case reports are the ‘eyewitness’ in biomedical literature and provide a valuable, unique, albeit noisy and underutilized type of evidence. Main finding is the reason for writing up the reports. Main finding based case reports retrieval provides way for user to conveniently access information of eyewitness evidence. However, user retrieval requirements are often ambiguous and diverse, traditional similarity based retrieval mechanism cannot meet different needs of users. Here, we conduct research of result diversification in case reports retrieval based on main finding. First, four similarity measurements for comparing main finding contents are used for initial result ranking; second, two implicit reranking algorithms and two explicit reranking algorithms are applied for result diversification. Experimental result showed that the methods we used had improved sub-topics coverage rate (CR@ X%) in re-ranking result, which proved the effectiveness of our research work for improving result diversification degree.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File System 联盟区块链和星际文件系统上任务调度方案的安全存储和访问
Dongcheng Li, W. E. Wong, Man Zhao, Qiang Hou
Computerized systems and software, which allow optimizing and planning the processes of production, storage, transportation, sale, and distribution of goods, have emerged in the industry. Scheduling systems, in particular, are designed to control and optimize the manufacturing process. This tool can have a significant effect on the productivity of the industry because it reduces the time and cost through well-defined optimization algorithms. Recently, the applicability of blockchain technology has been demonstrated in scheduling systems to add decentralization, traceability, au-ditability, and verifiability of the immutable information that this technology provides. This is a novel contribution that provides scheduling systems with an additional layer of security. With the latest version of Hyperledger Fabric, the appropriate levels of permission and policies for access to information can be established with significant levels of privacy and security, which prevent malicious actors from trying to cheat or abuse the system. Different alternatives exist to manage all processes associated with the operation of a blockchain network, and among them, providers of blockchain as a service have emerged. Chainstack stands out for its simplicity and scalability features to deploy and operate a blockchain network. Our goal in this work is to create a solution for secure storage of and access to task-scheduling scheme on the consortium blockchain and inter-planetary file system as a proof of concept to demonstrate its potential and usability.
计算机化的系统和软件可以优化和规划货物的生产、储存、运输、销售和分配过程,已经在工业中出现。特别是调度系统,是用来控制和优化制造过程的。该工具可以对行业的生产力产生重大影响,因为它通过定义良好的优化算法减少了时间和成本。最近,区块链技术的适用性已经在调度系统中得到证明,以增加该技术提供的不可变信息的去中心化、可追溯性、可编辑性和可验证性。这是一个新颖的贡献,为调度系统提供了额外的安全层。使用最新版本的Hyperledger Fabric,可以建立适当级别的权限和访问信息的策略,并具有显著的隐私和安全级别,从而防止恶意行为者试图欺骗或滥用系统。存在不同的替代方案来管理与区块链网络操作相关的所有过程,其中出现了区块链作为服务的提供者。Chainstack以其部署和操作区块链网络的简单性和可扩展性而脱颖而出。我们的目标是在财团区块链和星际文件系统上创建一个安全存储和访问任务调度方案的解决方案,作为概念验证,以展示其潜力和可用性。
{"title":"Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File System","authors":"Dongcheng Li, W. E. Wong, Man Zhao, Qiang Hou","doi":"10.1109/QRS-C51114.2020.00035","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00035","url":null,"abstract":"Computerized systems and software, which allow optimizing and planning the processes of production, storage, transportation, sale, and distribution of goods, have emerged in the industry. Scheduling systems, in particular, are designed to control and optimize the manufacturing process. This tool can have a significant effect on the productivity of the industry because it reduces the time and cost through well-defined optimization algorithms. Recently, the applicability of blockchain technology has been demonstrated in scheduling systems to add decentralization, traceability, au-ditability, and verifiability of the immutable information that this technology provides. This is a novel contribution that provides scheduling systems with an additional layer of security. With the latest version of Hyperledger Fabric, the appropriate levels of permission and policies for access to information can be established with significant levels of privacy and security, which prevent malicious actors from trying to cheat or abuse the system. Different alternatives exist to manage all processes associated with the operation of a blockchain network, and among them, providers of blockchain as a service have emerged. Chainstack stands out for its simplicity and scalability features to deploy and operate a blockchain network. Our goal in this work is to create a solution for secure storage of and access to task-scheduling scheme on the consortium blockchain and inter-planetary file system as a proof of concept to demonstrate its potential and usability.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1