首页 > 最新文献

2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing最新文献

英文 中文
Maximum Local Energy Based Multifocus Image Fusion in Mirror Extended Curvelet Transform Domain 基于最大局部能量的镜像扩展曲线变换域多聚焦图像融合
Lifeng Zhang, Huimin Lu, Yujie Li, S. Serikawa
In this paper, we firstly propose the maximum local energy (MLE) method to calculate the low frequency coefficients of images and compare the results with those of mirror extended curve let transform, which enhance the edge features and details of images. An image fusion step was performed as follows: First, we obtained the coefficients of two different types of images through mirror extended curve let transform. Second, we selected the low frequency coefficients by maximum local energy and obtaining the high-frequency coefficients using the absolute maximum value (AMV) method. Finally, the fused image was obtained by performing an inverse mirror extended curve let transform. In addition to human vision analysis, the images were also compared through quantitative analysis. multifocus images were used in the experiments to compare the results among the beyond wavelets. The numerical experiments reveal that maximum local energy is a new strategy for attaining image fusion with satisfactory performance.
本文首先提出了最大局部能量法(maximum local energy, MLE)来计算图像的低频系数,并与镜面扩展曲线let变换的结果进行了比较,增强了图像的边缘特征和细节。图像融合步骤如下:首先,通过镜像扩展曲线let变换得到两种不同类型图像的系数;其次,利用最大局部能量选择低频系数,利用绝对最大值(AMV)法获得高频系数;最后,通过逆镜像扩展曲线let变换得到融合图像。除人眼视觉分析外,还通过定量分析对图像进行比较。实验中采用多聚焦图像,比较了不同小波之间的结果。数值实验表明,局部能量最大化是一种获得满意图像融合效果的新策略。
{"title":"Maximum Local Energy Based Multifocus Image Fusion in Mirror Extended Curvelet Transform Domain","authors":"Lifeng Zhang, Huimin Lu, Yujie Li, S. Serikawa","doi":"10.1109/SNPD.2012.16","DOIUrl":"https://doi.org/10.1109/SNPD.2012.16","url":null,"abstract":"In this paper, we firstly propose the maximum local energy (MLE) method to calculate the low frequency coefficients of images and compare the results with those of mirror extended curve let transform, which enhance the edge features and details of images. An image fusion step was performed as follows: First, we obtained the coefficients of two different types of images through mirror extended curve let transform. Second, we selected the low frequency coefficients by maximum local energy and obtaining the high-frequency coefficients using the absolute maximum value (AMV) method. Finally, the fused image was obtained by performing an inverse mirror extended curve let transform. In addition to human vision analysis, the images were also compared through quantitative analysis. multifocus images were used in the experiments to compare the results among the beyond wavelets. The numerical experiments reveal that maximum local energy is a new strategy for attaining image fusion with satisfactory performance.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114885305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physicomimetics for Mobile Robot Obstacle Avoidance 移动机器人避障的物理模拟
S. Hettiarachchi, W. Spears
The ability of robots to promptly avoid obstacles and reach a goal while accurately maintaining a formation is extremely important for many swarm robotic tasks such as terrain analysis, search and rescue, and chemical plume source tracing. In prior work, using simulation, we established how Physicomimetics can be used to maintain swarms of mobile robots in formations that move towards a goal through an obstacle field. In this paper, we demonstrate the obstacle avoidance capability of Physicomimetics control algorithm using two different mobile robot platforms with limited hardware, Maxelbot and X80Pro.
机器人迅速避开障碍物并达到目标,同时准确保持队形的能力对于许多群体机器人任务(如地形分析,搜索和救援以及化学羽流源追踪)非常重要。在之前的工作中,通过模拟,我们建立了如何使用物理模拟来维持移动机器人群体的队形,使其通过障碍场向目标移动。在本文中,我们利用Maxelbot和X80Pro两种不同的移动机器人平台,在有限的硬件条件下,演示了物理模拟控制算法的避障能力。
{"title":"Physicomimetics for Mobile Robot Obstacle Avoidance","authors":"S. Hettiarachchi, W. Spears","doi":"10.1109/SNPD.2012.136","DOIUrl":"https://doi.org/10.1109/SNPD.2012.136","url":null,"abstract":"The ability of robots to promptly avoid obstacles and reach a goal while accurately maintaining a formation is extremely important for many swarm robotic tasks such as terrain analysis, search and rescue, and chemical plume source tracing. In prior work, using simulation, we established how Physicomimetics can be used to maintain swarms of mobile robots in formations that move towards a goal through an obstacle field. In this paper, we demonstrate the obstacle avoidance capability of Physicomimetics control algorithm using two different mobile robot platforms with limited hardware, Maxelbot and X80Pro.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Risk Management to User Perception of Insecurity in Ambient Service 环境服务中用户不安全感知的风险管理
S. Tanimoto, Daisuke Sakurai, Yosiaki Seki, M. Iwashita, Hiroyuki Sato, Atsushi Kanai
In recent years, Ambient service has attracted attention as a ubiquitous, future intelligence infrastructure. The Ambient service provides service suitable for user needs automatically by making a sensor and a computer cooperate, and gathering and analyzing the information about each user. However, with the Ambient service, in order to manage personal information, various risks, such as an information leakage, are assumed. In this research, about a risk of being assumed with the Ambient service, it analyzes from a viewpoint by the side of service provision and service use, and clarifies the proposed measures. Specifically, risk breakdown structure and the risk matrix which are the typical risk management methods of project management were used. These results extracted 40 factors as a risk factor of the Ambient service. As the main feature of countermeasure, for Risk Transference, a countermeasure, such as preparing a third party's inspection on the service provision side, was proposed. Moreover, for Risk Mitigation, a countermeasure, such as a rule for a new specification corresponding to the Ambient service, was proposed. As mentioned above, the risk management of the Ambient service was proposed in this paper. A future subject is evaluating the effectiveness of the proposed countermeasure.
近年来,环境服务作为一种无处不在的未来智能基础设施引起了人们的关注。Ambient service通过传感器和计算机的配合,对每个用户的信息进行收集和分析,自动提供适合用户需要的服务。但是,在使用Ambient服务时,为了管理个人信息,需要承担信息泄露等各种风险。本研究从服务提供和服务使用的角度分析了环境服务所承担的风险,并明确了建议的措施。具体运用了项目管理中典型的风险管理方法——风险分解结构和风险矩阵。这些结果提取了40个因素作为Ambient服务的风险因素。作为对策的主要特征,针对风险转移,提出了在服务提供方准备第三方检查等对策。此外,为了降低风险,还提出了一种对策,例如为与Ambient服务相对应的新规范制定规则。如上所述,本文提出了对Ambient服务的风险管理。未来的课题是评估对策的有效性。
{"title":"Risk Management to User Perception of Insecurity in Ambient Service","authors":"S. Tanimoto, Daisuke Sakurai, Yosiaki Seki, M. Iwashita, Hiroyuki Sato, Atsushi Kanai","doi":"10.1109/SNPD.2012.91","DOIUrl":"https://doi.org/10.1109/SNPD.2012.91","url":null,"abstract":"In recent years, Ambient service has attracted attention as a ubiquitous, future intelligence infrastructure. The Ambient service provides service suitable for user needs automatically by making a sensor and a computer cooperate, and gathering and analyzing the information about each user. However, with the Ambient service, in order to manage personal information, various risks, such as an information leakage, are assumed. In this research, about a risk of being assumed with the Ambient service, it analyzes from a viewpoint by the side of service provision and service use, and clarifies the proposed measures. Specifically, risk breakdown structure and the risk matrix which are the typical risk management methods of project management were used. These results extracted 40 factors as a risk factor of the Ambient service. As the main feature of countermeasure, for Risk Transference, a countermeasure, such as preparing a third party's inspection on the service provision side, was proposed. Moreover, for Risk Mitigation, a countermeasure, such as a rule for a new specification corresponding to the Ambient service, was proposed. As mentioned above, the risk management of the Ambient service was proposed in this paper. A future subject is evaluating the effectiveness of the proposed countermeasure.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122777514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding Botnet: From Mathematical Modelling to Integrated Detection and Mitigation Framework 理解僵尸网络:从数学建模到集成检测和缓解框架
Wang Yong, S. Tefera, Yonas Kibret Beshah
No one is absolutely sure about cyber security as long as a communication system is connected to the internet, since internet is a wild that comprises all kind of people around the world from white hat to black hat. In other words, virtually any Internet connected system is vulnerable to major outrages from receiving a spam email to a botnet originated DDOS attack. But every individual, company and government wants to make sure that the security of their system is dependable so that they can use the outmost benefits of the twenty first century information society advantage. Since the problem is inevitable it very critical to understand the properties of this nefarious attacking machines from different perspective. In this paper we have developed a mathematical model to scrutinize the favouring and hindering factors for botnet propagation and growth. In addition we have proposed a detection and mitigation framework based on the model we developed.
没有人能绝对保证网络安全,只要一个通信系统连接到互联网,因为互联网是一个由世界各地的人组成的荒野,从白帽到黑帽。换句话说,从接收垃圾邮件到僵尸网络发起的DDOS攻击,几乎任何与互联网连接的系统都容易受到重大破坏。但是,每个个人、公司和政府都希望确保其系统的安全性是可靠的,以便他们能够利用21世纪信息社会优势的最大好处。由于这个问题是不可避免的,因此从不同的角度了解这种恶意攻击机器的特性非常重要。在本文中,我们已经开发了一个数学模型来仔细检查有利于和阻碍因素的僵尸网络的传播和增长。此外,我们还提出了一个基于我们开发的模型的检测和缓解框架。
{"title":"Understanding Botnet: From Mathematical Modelling to Integrated Detection and Mitigation Framework","authors":"Wang Yong, S. Tefera, Yonas Kibret Beshah","doi":"10.1109/SNPD.2012.78","DOIUrl":"https://doi.org/10.1109/SNPD.2012.78","url":null,"abstract":"No one is absolutely sure about cyber security as long as a communication system is connected to the internet, since internet is a wild that comprises all kind of people around the world from white hat to black hat. In other words, virtually any Internet connected system is vulnerable to major outrages from receiving a spam email to a botnet originated DDOS attack. But every individual, company and government wants to make sure that the security of their system is dependable so that they can use the outmost benefits of the twenty first century information society advantage. Since the problem is inevitable it very critical to understand the properties of this nefarious attacking machines from different perspective. In this paper we have developed a mathematical model to scrutinize the favouring and hindering factors for botnet propagation and growth. In addition we have proposed a detection and mitigation framework based on the model we developed.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124762461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Study on Extraction Method of Synonyms in Specification Documents 规范文档中同义词提取方法研究
Y. Kawai, T. Yoshikawa, T. Furuhashi, E. Hirao, Ayako Kuno, T. Gotoh
Recently, the document information managed in companies tend to be more complex and various. Specification documents are used for the technical transfer and inheritance of manufactures and services. However, the description and the meaning of the component words in specifications are often inconsistent or multiple, because a specification document is made by the persons in charge of various parts. Then the readers may misunderstand the contents of specifications by them. This paper focuses on synonyms, multiple description of words for a meaning or a word, in specification documents and proposes an extraction method of them considering the co-occurrence words of component words. This paper applies the proposed method to a test data, in which some words in an actual specification document are replaced with another words, and studies the effectiveness of the proposed method.
近年来,企业管理的文档信息越来越复杂和多样化。规范文件用于制造和服务的技术转让和继承。但是,由于一份规范文件是由各部件的负责人共同制定的,因此规范中各部件词的描述和含义往往不一致或多个。这样读者就会对说明书的内容产生误解。本文针对规范文档中的同义词,即对一个意思或一个词的多重描述,提出了一种考虑组成词共现词的同义词提取方法。本文将所提出的方法应用于将实际规范文件中的一些词语替换为另一些词语的测试数据,并对所提出的方法的有效性进行了研究。
{"title":"A Study on Extraction Method of Synonyms in Specification Documents","authors":"Y. Kawai, T. Yoshikawa, T. Furuhashi, E. Hirao, Ayako Kuno, T. Gotoh","doi":"10.1109/SNPD.2012.43","DOIUrl":"https://doi.org/10.1109/SNPD.2012.43","url":null,"abstract":"Recently, the document information managed in companies tend to be more complex and various. Specification documents are used for the technical transfer and inheritance of manufactures and services. However, the description and the meaning of the component words in specifications are often inconsistent or multiple, because a specification document is made by the persons in charge of various parts. Then the readers may misunderstand the contents of specifications by them. This paper focuses on synonyms, multiple description of words for a meaning or a word, in specification documents and proposes an extraction method of them considering the co-occurrence words of component words. This paper applies the proposed method to a test data, in which some words in an actual specification document are replaced with another words, and studies the effectiveness of the proposed method.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123103916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Explaining Estimation of Factor Scores of Question and Answer Statements 解释问答题因子分数的估计
Yuya Yokoyama, T. Hochin, Hiroki Nomiya, T. Satoh
In order to avoid the problem of mismatch between the questioner and the respondent, we have conducted impression evaluation experiment and nine factors are obtained as a result. Then factor scores of any other statements have been tried to be estimated by using multiple regression analysis from feature values of statements. By adopting syntactic information of statements, word imageability and closing sentence expressions as the feature values, all the factor scores were well estimated. This paper tries to explain the estimation result with major feature values. The explanation is confirmed by comparing the features of the statements having high and low factor scores with the major features.
为了避免提问者和被调查者不匹配的问题,我们进行了印象评价实验,得到了九个因素。然后尝试用多元回归分析从语句的特征值估计任何其他语句的因子得分。以语句的句法信息、词的可意象性和闭句表达式作为特征值,可以很好地估计出各因素的得分。本文试图用主要特征值来解释估计结果。通过比较具有高和低因子得分的陈述的特征与主要特征,可以证实这一解释。
{"title":"Explaining Estimation of Factor Scores of Question and Answer Statements","authors":"Yuya Yokoyama, T. Hochin, Hiroki Nomiya, T. Satoh","doi":"10.1109/SNPD.2012.52","DOIUrl":"https://doi.org/10.1109/SNPD.2012.52","url":null,"abstract":"In order to avoid the problem of mismatch between the questioner and the respondent, we have conducted impression evaluation experiment and nine factors are obtained as a result. Then factor scores of any other statements have been tried to be estimated by using multiple regression analysis from feature values of statements. By adopting syntactic information of statements, word imageability and closing sentence expressions as the feature values, all the factor scores were well estimated. This paper tries to explain the estimation result with major feature values. The explanation is confirmed by comparing the features of the statements having high and low factor scores with the major features.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Service Contract 服务合同调查
Yucong Duan
Service contracts function as interfaces which bridge IT implementation, business modeling, and economical analysis for service systems among various stakeholder from a holistic perspective. This paper conducts a review of recent research and practice on service contracts with focus on service contract content and service contract management. Dimensions of {Quality of data (QoD), Quality of service (QoS), Legal issue, Context, Business term} are introduced to evaluate service contract content. Dimensions of {Description of contract, Monitor/Control, Selection, Matchmaking, Composition} are introduced to evaluate service contract management Based on the survey, we propose possible directions for future efforts.
服务契约作为接口,从整体的角度为不同涉众之间的服务系统连接IT实现、业务建模和经济分析。本文从服务合同内容和服务合同管理两个方面综述了近年来有关服务合同的研究与实践。引入{数据质量(QoD)、服务质量(QoS)、法律问题(Legal issue)、上下文(Context)、业务术语(Business term)}维度对服务合同内容进行评价。通过引入{合同描述、监督/控制、选择、配对、构成}维度对服务合同管理进行评价,并在此基础上提出了今后工作的可能方向。
{"title":"A Survey on Service Contract","authors":"Yucong Duan","doi":"10.1109/SNPD.2012.22","DOIUrl":"https://doi.org/10.1109/SNPD.2012.22","url":null,"abstract":"Service contracts function as interfaces which bridge IT implementation, business modeling, and economical analysis for service systems among various stakeholder from a holistic perspective. This paper conducts a review of recent research and practice on service contracts with focus on service contract content and service contract management. Dimensions of {Quality of data (QoD), Quality of service (QoS), Legal issue, Context, Business term} are introduced to evaluate service contract content. Dimensions of {Description of contract, Monitor/Control, Selection, Matchmaking, Composition} are introduced to evaluate service contract management Based on the survey, we propose possible directions for future efforts.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Shared-Cache Simulation for Multi-core System with LRU2-MRU Collaborative Cache Replacement Algorithm 基于LRU2-MRU协同缓存替换算法的多核系统共享缓存仿真
Shan Ding, Shiya Lui, Yuanyuan Li
The L2 shared cache is an important resource for multi-core system. The cache replacement algorithm of L2 shared cache is one of the key factors in judging whether the L2 shared cache of multi-core system is efficient. In this paper, we study shared-cache simulation for multi-core with the LRU2-MRU collaborative cache replacement algorithm. We propose a theoretical foundation for LRU2-MRU to show the property, test the stack distance of the LRU2-MRU algorithm. In addition, the simulation results demonstrate that the MPKI (misses per thousand instructions) of LRU2-MRU is lower than other cache replacement algorithm, and the miss ratio for shared-cache can be reduce through cache replacement algorithm optimization.
L2共享缓存是多核系统的重要资源。L2共享缓存的缓存替换算法是判断多核系统L2共享缓存是否高效的关键因素之一。本文研究了基于LRU2-MRU协同缓存替换算法的多核共享缓存仿真。我们提出了LRU2-MRU的理论基础,以展示LRU2-MRU算法的特性,测试LRU2-MRU算法的堆栈距离。此外,仿真结果表明,LRU2-MRU的MPKI(每千条指令失误率)低于其他缓存替换算法,通过优化缓存替换算法可以降低共享缓存的失误率。
{"title":"Shared-Cache Simulation for Multi-core System with LRU2-MRU Collaborative Cache Replacement Algorithm","authors":"Shan Ding, Shiya Lui, Yuanyuan Li","doi":"10.1109/SNPD.2012.112","DOIUrl":"https://doi.org/10.1109/SNPD.2012.112","url":null,"abstract":"The L2 shared cache is an important resource for multi-core system. The cache replacement algorithm of L2 shared cache is one of the key factors in judging whether the L2 shared cache of multi-core system is efficient. In this paper, we study shared-cache simulation for multi-core with the LRU2-MRU collaborative cache replacement algorithm. We propose a theoretical foundation for LRU2-MRU to show the property, test the stack distance of the LRU2-MRU algorithm. In addition, the simulation results demonstrate that the MPKI (misses per thousand instructions) of LRU2-MRU is lower than other cache replacement algorithm, and the miss ratio for shared-cache can be reduce through cache replacement algorithm optimization.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134421647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Program Incomprehensibility Evaluation for Obfuscation Methods with Queue-based Mental Simulation Model 基于队列心理仿真模型的混淆方法程序不可理解性评价
Haruaki Tamada, Kazumasa Fukuda, Tomoya Yoshioka
Obfuscation methods were proposed for protecting programs from cracking. These methods convert program into incomprehensible one, such as change symbol names from meaningful to meaningless. As a result, secret information in the program can be hidden. However, obfuscation methods are not evaluated sufficiently. This paper evaluates incomprehensibility of the obfuscated programs using queue based virtual mental simulation model (VMSM) which is focused on short term memory in program comprehension. An experimental evaluation showed that VMSM was able to evaluate the incomprehensibility of data and control flow obfuscation methods.
提出了防止程序被破解的混淆方法。这些方法将程序转换为不可理解的程序,例如将符号名称从有意义的更改为无意义的。因此,程序中的秘密信息可以被隐藏。然而,混淆方法没有得到充分的评价。本文采用基于队列的虚拟心理模拟模型(VMSM)对模糊程序的不可理解性进行了评价,该模型以程序理解中的短期记忆为重点。实验评估表明,VMSM能够评估数据和控制流混淆方法的不可理解性。
{"title":"Program Incomprehensibility Evaluation for Obfuscation Methods with Queue-based Mental Simulation Model","authors":"Haruaki Tamada, Kazumasa Fukuda, Tomoya Yoshioka","doi":"10.1109/SNPD.2012.32","DOIUrl":"https://doi.org/10.1109/SNPD.2012.32","url":null,"abstract":"Obfuscation methods were proposed for protecting programs from cracking. These methods convert program into incomprehensible one, such as change symbol names from meaningful to meaningless. As a result, secret information in the program can be hidden. However, obfuscation methods are not evaluated sufficiently. This paper evaluates incomprehensibility of the obfuscated programs using queue based virtual mental simulation model (VMSM) which is focused on short term memory in program comprehension. An experimental evaluation showed that VMSM was able to evaluate the incomprehensibility of data and control flow obfuscation methods.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130747710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TAM's Application: E-service Quality Study in Online Apparel Store TAM的应用:在线服装商店的电子服务质量研究
R. Lee, P. Dion
The percentage of U.S. consumers shopping and purchasing through the Internet is growing. The consumer has adapted to using the Internet to purchase products and retailers have profited from this new channel. Little is known about how a website provides competitive advantage to a retailer and what makes a website appealing to consumers. In order to address the gap in research that exists regarding why and how consumers identify with online apparel retailers, the purpose of this research is to examine the relationship between e-service quality (e.g., efficiency, fulfillment, and system availability) and consumer-company identification for online information search and purchase behavior.
美国消费者通过互联网购物和购买的比例正在增长。消费者已经适应了使用互联网来购买产品,零售商也从这个新渠道中获利。关于网站如何为零售商提供竞争优势以及如何使网站吸引消费者,我们知之甚少。为了解决关于消费者为什么以及如何认同在线服装零售商的研究差距,本研究的目的是研究电子服务质量(例如,效率,履行和系统可用性)与消费者对在线信息搜索和购买行为的公司认同之间的关系。
{"title":"TAM's Application: E-service Quality Study in Online Apparel Store","authors":"R. Lee, P. Dion","doi":"10.1109/SNPD.2012.122","DOIUrl":"https://doi.org/10.1109/SNPD.2012.122","url":null,"abstract":"The percentage of U.S. consumers shopping and purchasing through the Internet is growing. The consumer has adapted to using the Internet to purchase products and retailers have profited from this new channel. Little is known about how a website provides competitive advantage to a retailer and what makes a website appealing to consumers. In order to address the gap in research that exists regarding why and how consumers identify with online apparel retailers, the purpose of this research is to examine the relationship between e-service quality (e.g., efficiency, fulfillment, and system availability) and consumer-company identification for online information search and purchase behavior.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1