There is much comparability between natural immune system and computer security, and the key point is how to distinguish self from other. Based on the principles and structures of artificial immune system, the simulation modeling of network intrusion detection was developed. The model consisted of many nodes that distributed across different locations. The nodes needed not be centralized controlled. The purpose of model was to distinguish between illegitimate behavior (non-self) and legitimate behavior (self). In case of finding abnormity, model could give an alarm to user.
{"title":"Simulation Modeling of Network Intrusion Detection Based on Artificial Immune System","authors":"Jing Yu, Feng Wang","doi":"10.1109/WCSE.2010.78","DOIUrl":"https://doi.org/10.1109/WCSE.2010.78","url":null,"abstract":"There is much comparability between natural immune system and computer security, and the key point is how to distinguish self from other. Based on the principles and structures of artificial immune system, the simulation modeling of network intrusion detection was developed. The model consisted of many nodes that distributed across different locations. The nodes needed not be centralized controlled. The purpose of model was to distinguish between illegitimate behavior (non-self) and legitimate behavior (self). In case of finding abnormity, model could give an alarm to user.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheping Xu, Jinzhong Cui, Zhaogai Wang, Fenghong Liu, Guojun Liu
Digital library is the trend of current traditional library. However, many problems, such as data collection, sharing, cooperation among different libraries and the copyright, disturb the development of digital library. Based on previous work and the cooperation with BHL (Biodiversity Heritage Library), this paper gives a description on lots of affairs in the construction of digital library in biodiversity: the hardware and software, the workflow with IA (Internet Archive), database basis, the architecture and the function. Some development works and future work are also demonstrated in the paper. The application of digital library in biodiversity will largely improve the service of related resources in traditional libraries and also have a pilot effect for many libraries in other disciplines.
{"title":"The Architecture and Implementation of Biodiversity Digital Library in China","authors":"Zheping Xu, Jinzhong Cui, Zhaogai Wang, Fenghong Liu, Guojun Liu","doi":"10.1109/WCSE.2010.167","DOIUrl":"https://doi.org/10.1109/WCSE.2010.167","url":null,"abstract":"Digital library is the trend of current traditional library. However, many problems, such as data collection, sharing, cooperation among different libraries and the copyright, disturb the development of digital library. Based on previous work and the cooperation with BHL (Biodiversity Heritage Library), this paper gives a description on lots of affairs in the construction of digital library in biodiversity: the hardware and software, the workflow with IA (Internet Archive), database basis, the architecture and the function. Some development works and future work are also demonstrated in the paper. The application of digital library in biodiversity will largely improve the service of related resources in traditional libraries and also have a pilot effect for many libraries in other disciplines.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129984023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
GPS is a new generation of satellite navigation and positioning system which is most widely applied at present. This article introduces briefly the receiving and analysis of GPS data, and the application of GPS positioning, path analysis and navigation module in power inspection instrument software.
{"title":"Application of GPS in the Power Inspection Instrument Software Design","authors":"Na Li, Z. Piao, Nan Hao","doi":"10.1109/WCSE.2010.127","DOIUrl":"https://doi.org/10.1109/WCSE.2010.127","url":null,"abstract":"GPS is a new generation of satellite navigation and positioning system which is most widely applied at present. This article introduces briefly the receiving and analysis of GPS data, and the application of GPS positioning, path analysis and navigation module in power inspection instrument software.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130077798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
one of the great benefits of using a Stream X-machine (SXM) to specify a system is its associated testing method. Under certain test conditions, this method produces a test suite that can determine the correctness of the implementation under test (IUT). However, the size of the test suite is generally very large, the manual test suite generation is very complex and error-prone. With the more and more application for SXM in test area, developing the automatic support tool is urgent. The paper introduces the algorithm of obtaining the key values and sets, and develops the tool SXMtool which supports the editing of SXM models, automatic generation of SXM test suite. An example of using the SXMtool is then given to present its function.
{"title":"SXMTool A Tool for Stream X-Machine Testing","authors":"Chunyan Ma, Junsheng Wu, Tao Zhang","doi":"10.1109/WCSE.2010.139","DOIUrl":"https://doi.org/10.1109/WCSE.2010.139","url":null,"abstract":"one of the great benefits of using a Stream X-machine (SXM) to specify a system is its associated testing method. Under certain test conditions, this method produces a test suite that can determine the correctness of the implementation under test (IUT). However, the size of the test suite is generally very large, the manual test suite generation is very complex and error-prone. With the more and more application for SXM in test area, developing the automatic support tool is urgent. The paper introduces the algorithm of obtaining the key values and sets, and develops the tool SXMtool which supports the editing of SXM models, automatic generation of SXM test suite. An example of using the SXMtool is then given to present its function.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In china, with the development of GPS, GIS, RS, 3S technology is gradually used in the agriculture in recent years. This paper introduced the concepts of GPS, GIS, RS. Considering the fact of the Chinese agriculture, we developed the farmland information support system based on the integration of GPS, GIS, RS. With the application of this system in some counties of Yunnan province, the work mode of the department of the agriculture has started to be changed.
{"title":"3S-Based Farmland Information Support System at County Level","authors":"Wu Xuequn, Zuo Xiaoqing, Fang Yuanmin","doi":"10.1109/WCSE.2010.148","DOIUrl":"https://doi.org/10.1109/WCSE.2010.148","url":null,"abstract":"In china, with the development of GPS, GIS, RS, 3S technology is gradually used in the agriculture in recent years. This paper introduced the concepts of GPS, GIS, RS. Considering the fact of the Chinese agriculture, we developed the farmland information support system based on the integration of GPS, GIS, RS. With the application of this system in some counties of Yunnan province, the work mode of the department of the agriculture has started to be changed.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Insider threat makes great damage to the security of information system, traditional security methods are extremely difficult to work. Insider attack identification plays an important role in insider threat detection. Monitoring user’s abnormal behavior is an effective method to detect impersonation, this method is applied to insider threat identification, to built user’s behavior attribute information database based on weights changeable feedback tree augmented Bayes network, but data is massive, using the dimensionality reduction based on rough set, to establish the process information model of user’s behavior attribute. Using the minimum risk Bayes decision can effectively identify the real identity of the user when user’s behavior departs from the characteristic model.
{"title":"Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction","authors":"Tao Zhang, Peng Zhao","doi":"10.1109/WCSE.2010.106","DOIUrl":"https://doi.org/10.1109/WCSE.2010.106","url":null,"abstract":"Insider threat makes great damage to the security of information system, traditional security methods are extremely difficult to work. Insider attack identification plays an important role in insider threat detection. Monitoring user’s abnormal behavior is an effective method to detect impersonation, this method is applied to insider threat identification, to built user’s behavior attribute information database based on weights changeable feedback tree augmented Bayes network, but data is massive, using the dimensionality reduction based on rough set, to establish the process information model of user’s behavior attribute. Using the minimum risk Bayes decision can effectively identify the real identity of the user when user’s behavior departs from the characteristic model.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Java Modeling Language (JML) is a formal interface specification language to document the behavior of Java program modules and has been used in many research and industrial projects. However, its inability to support Java 5 features such as generics is reducing its user base significantly. Besides, the JML compiler is on average 8.5 times slower than the javac Java compiler. In this paper, we present a new JML compiler built on the Eclipse Java compiler to support Java 5 features. We used a technique called emph{AST merging} to implement coarse-grained incremental compilation. In our experiments we observed a significant improvement in compilation speed, the new compiler is 3 to 4.5 times faster than the current one.
{"title":"A New Eclipse-Based JML Compiler Built Using AST Merging","authors":"A. Sarcar, Yoonsik Cheon","doi":"10.1109/WCSE.2010.92","DOIUrl":"https://doi.org/10.1109/WCSE.2010.92","url":null,"abstract":"The Java Modeling Language (JML) is a formal interface specification language to document the behavior of Java program modules and has been used in many research and industrial projects. However, its inability to support Java 5 features such as generics is reducing its user base significantly. Besides, the JML compiler is on average 8.5 times slower than the javac Java compiler. In this paper, we present a new JML compiler built on the Eclipse Java compiler to support Java 5 features. We used a technique called emph{AST merging} to implement coarse-grained incremental compilation. In our experiments we observed a significant improvement in compilation speed, the new compiler is 3 to 4.5 times faster than the current one.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116207193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The capability of Bidirectional Model Transformation (BMT) has been continuously investigated by the software engineering community. BMT approach is able to improve the productivity of software development and save the production cost through a precise transformation definition process. However, nowadays a systematic study that is related to the current issue and supporting approaches of BMT does not exist yet. Therefore, this paper aims to analyse and explore the current issues on BMT by using a systematic literature review (SLR). Based on the results of the SLR, seven issues related to BMT were identified and two prominent approaches in solving the inherent BMT problem were discovered and reviewed. These results will be useful as an input in designing a better framework of BMT in the future.
{"title":"A Systematic Literature Review to Identify the Issues in Bidirectional Model Transformation","authors":"Lusiana Efrizoni, W. M. Wan-Kadir, R. Mohamad","doi":"10.1109/WCSE.2010.118","DOIUrl":"https://doi.org/10.1109/WCSE.2010.118","url":null,"abstract":"The capability of Bidirectional Model Transformation (BMT) has been continuously investigated by the software engineering community. BMT approach is able to improve the productivity of software development and save the production cost through a precise transformation definition process. However, nowadays a systematic study that is related to the current issue and supporting approaches of BMT does not exist yet. Therefore, this paper aims to analyse and explore the current issues on BMT by using a systematic literature review (SLR). Based on the results of the SLR, seven issues related to BMT were identified and two prominent approaches in solving the inherent BMT problem were discovered and reviewed. These results will be useful as an input in designing a better framework of BMT in the future.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127828091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the wide application of safety critical embedded systems in various fields, some modern software engineering technology must be developed to increase the security of embedded system to insure the safety of people. Based on the Model-Driven Architecture method, this paper deeply research the semantics of AADL (Architecture Analysis and Design Language) models, and design a tool named UCaS, which is integrated in OSATE (Open Source AADL Tool Environment), and can acquire information from AADL code for the schedulability analysis. Finally, this paper shows the efficiency of the UCaS and point out the direction of future work.
{"title":"Tool of Scheduling Simulation Based on AADL Models","authors":"Li Yun, Guo Fulei","doi":"10.1109/WCSE.2010.42","DOIUrl":"https://doi.org/10.1109/WCSE.2010.42","url":null,"abstract":"With the wide application of safety critical embedded systems in various fields, some modern software engineering technology must be developed to increase the security of embedded system to insure the safety of people. Based on the Model-Driven Architecture method, this paper deeply research the semantics of AADL (Architecture Analysis and Design Language) models, and design a tool named UCaS, which is integrated in OSATE (Open Source AADL Tool Environment), and can acquire information from AADL code for the schedulability analysis. Finally, this paper shows the efficiency of the UCaS and point out the direction of future work.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134181795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geographic information is more and more important in our information systems development. The geographic information data standards are essential and indispensable when developing the GIS. To make those standards taking effect we need to give a clear roadmap on how to combine the geographic data standards and the software development process. These articles first introduces the concept of the geographic information data standards, then describe how to apply these standards in the software developing process and at last gives the DIDs needed to document the software requirements and software designs according to MIL-STD-498 with GDDMS as an example.
{"title":"Geographic Information Data Standard Applied in the Software Development Process","authors":"Huang Maosheng, C. Tianhe","doi":"10.1109/WCSE.2010.33","DOIUrl":"https://doi.org/10.1109/WCSE.2010.33","url":null,"abstract":"Geographic information is more and more important in our information systems development. The geographic information data standards are essential and indispensable when developing the GIS. To make those standards taking effect we need to give a clear roadmap on how to combine the geographic data standards and the software development process. These articles first introduces the concept of the geographic information data standards, then describe how to apply these standards in the software developing process and at last gives the DIDs needed to document the software requirements and software designs according to MIL-STD-498 with GDDMS as an example.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132134274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}