STP Spanning Tree Protocol as an important method to prevent broadcast storms since the 1985 proposed by Radia Perlem, has been widely used. This paper presents anew technology named DVSP-open flow. Compare STP and the STP improved version, this technology can be can be forward data packets dynamic by using Open Flow support switches. This method separates the forward rules and control rules and the network with this method will be able to collect real-time network information and create a virtual switch pool to manager Data forward path, achieve the ability to forward the packet to reach the network to dynamically control Open Flow switch. The technology can effectively suppress network storms, and be able to reduce the packet forwarding delay.
{"title":"Dynamic Virtual Switch Protocol Using Openflow","authors":"Miao Tang, Qiaochu Lv, Zheng Lu, Qi Zhao, Y. Song","doi":"10.1109/SNPD.2012.129","DOIUrl":"https://doi.org/10.1109/SNPD.2012.129","url":null,"abstract":"STP Spanning Tree Protocol as an important method to prevent broadcast storms since the 1985 proposed by Radia Perlem, has been widely used. This paper presents anew technology named DVSP-open flow. Compare STP and the STP improved version, this technology can be can be forward data packets dynamic by using Open Flow support switches. This method separates the forward rules and control rules and the network with this method will be able to collect real-time network information and create a virtual switch pool to manager Data forward path, achieve the ability to forward the packet to reach the network to dynamically control Open Flow switch. The technology can effectively suppress network storms, and be able to reduce the packet forwarding delay.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a method to recommend the relevant information of the document which recorded in the development support systems such as BTS and VCS. We improve a system which we implemented in previous work with the method proposed in this paper. Our method get a document from the support systems, extract the word, then calculate the feature vector based on the TF-IDF value of each word. In the experiment, we apply the proposal method to the dataset from an open source software projects, and evaluate the recommendation accuracy between the six clustering algorithm. The result of the experiment shows that the proposed method improves the recommendation accuracy compared with the previous work.
{"title":"Aggregation of Development History from Distributed Support Systems","authors":"Hiroki Kawai, H. Uwano, Soichiro Tani","doi":"10.1109/SNPD.2012.63","DOIUrl":"https://doi.org/10.1109/SNPD.2012.63","url":null,"abstract":"This paper proposes a method to recommend the relevant information of the document which recorded in the development support systems such as BTS and VCS. We improve a system which we implemented in previous work with the method proposed in this paper. Our method get a document from the support systems, extract the word, then calculate the feature vector based on the TF-IDF value of each word. In the experiment, we apply the proposal method to the dataset from an open source software projects, and evaluate the recommendation accuracy between the six clustering algorithm. The result of the experiment shows that the proposed method improves the recommendation accuracy compared with the previous work.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130814396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, data stream has become popular in many contexts of data mining. Due to the high amount of incoming data, traditional clustering algorithms are not suitable for this family of problems. Many data stream clustering algorithms proposed in recent years considered the scalability of data, but most of them did not attend the following issues: (1) The quality of clustering can be dramatically low over the time. (2) Some of the algorithms cannot handle arbitrary shapes of data stream and consequently the results are limited to specific regions. (3) Most of the algorithms have not been evaluated in multi-density environments. Identifying appropriate clusters for data stream by handling the arbitrary shapes of clusters is the aim of this paper. The gist of the overall approach in this paper can be stated in two phases. In online phase, data manipulate with specific data structure called micro cluster. This phase is activated by incoming of data. The offline phase is manually activated by coming a request from user. The algorithm handles clusters by considering with micro clusters created by the online phase. The experimental evaluation showed that proposed algorithm has suitable quality and also returns appropriate results even in multi-density environments.
{"title":"DSCLU: A New Data Stream Clustring Algorithm for Multi Density Environments","authors":"A. Namadchian, Gholamreza Esfandani","doi":"10.1109/SNPD.2012.119","DOIUrl":"https://doi.org/10.1109/SNPD.2012.119","url":null,"abstract":"Recently, data stream has become popular in many contexts of data mining. Due to the high amount of incoming data, traditional clustering algorithms are not suitable for this family of problems. Many data stream clustering algorithms proposed in recent years considered the scalability of data, but most of them did not attend the following issues: (1) The quality of clustering can be dramatically low over the time. (2) Some of the algorithms cannot handle arbitrary shapes of data stream and consequently the results are limited to specific regions. (3) Most of the algorithms have not been evaluated in multi-density environments. Identifying appropriate clusters for data stream by handling the arbitrary shapes of clusters is the aim of this paper. The gist of the overall approach in this paper can be stated in two phases. In online phase, data manipulate with specific data structure called micro cluster. This phase is activated by incoming of data. The offline phase is manually activated by coming a request from user. The algorithm handles clusters by considering with micro clusters created by the online phase. The experimental evaluation showed that proposed algorithm has suitable quality and also returns appropriate results even in multi-density environments.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114334046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, it becomes common to handle large files in computers. However, we have a difficulty to realize file sharing over networks, especially for large files. The problem is that we have extended the system model designed decades ago based on a stand-alone computer model. Assuming that all files are located in data centers, and nobody accesses them at the sites, we can redesign the file sharing system model for higher access speed and efficient storage resource usage. We designed a global secure file sharing system called Content Espresso. In this paper, we describe the difficulty, the design goal for global secure file sharing system, and our approach for it. Finally, we explain the impact of Content Espresso on network.
{"title":"Content Espresso: A Global Secure Large File Sharing System for Media Industries","authors":"K. Kaneko, Daisuke Ando, F. Teraoka","doi":"10.1109/SNPD.2012.126","DOIUrl":"https://doi.org/10.1109/SNPD.2012.126","url":null,"abstract":"Recently, it becomes common to handle large files in computers. However, we have a difficulty to realize file sharing over networks, especially for large files. The problem is that we have extended the system model designed decades ago based on a stand-alone computer model. Assuming that all files are located in data centers, and nobody accesses them at the sites, we can redesign the file sharing system model for higher access speed and efficient storage resource usage. We designed a global secure file sharing system called Content Espresso. In this paper, we describe the difficulty, the design goal for global secure file sharing system, and our approach for it. Finally, we explain the impact of Content Espresso on network.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114367504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nao Shikanai, K. Hachimura, Misako Sawada, Motonobu Ishii
This experiment investigated the kansei information and movement characteristics that observers use to perceive expressions of joy in dance. Expressing joy with movements by dancers was recorded. Observers then rated words related to kansei and characteristics of the movements. The results of factor analyses and multiple regression analyses indicated that the expression of joy in dance has particular features. Joy in dance consists of gDynamics, h gExtensity, h gStability, h gFlowing, h gFlexion of the body, h gUpward extension of the limbs, h gForward movement, h gUpward movement, h gDiagonally forward locomotion, h and gWalking. h Stability, movements using space with little downward movement and more upward extension of the limbs, tended to have a greater effect on perceiving movements as expressing joy.
{"title":"Kansei Information and Movement Characteristics Related to the Expression of Joy in Dance: An Investigation for Analyzing Rousing and Stimulating Dance Motions","authors":"Nao Shikanai, K. Hachimura, Misako Sawada, Motonobu Ishii","doi":"10.1109/SNPD.2012.97","DOIUrl":"https://doi.org/10.1109/SNPD.2012.97","url":null,"abstract":"This experiment investigated the kansei information and movement characteristics that observers use to perceive expressions of joy in dance. Expressing joy with movements by dancers was recorded. Observers then rated words related to kansei and characteristics of the movements. The results of factor analyses and multiple regression analyses indicated that the expression of joy in dance has particular features. Joy in dance consists of gDynamics, h gExtensity, h gStability, h gFlowing, h gFlexion of the body, h gUpward extension of the limbs, h gForward movement, h gUpward movement, h gDiagonally forward locomotion, h and gWalking. h Stability, movements using space with little downward movement and more upward extension of the limbs, tended to have a greater effect on perceiving movements as expressing joy.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianfei Zhang, Zhiyi Fang, Hyung Jae Chang, S. Zheng
In the previous papers, we presented a new mesh of trees based switch architecture, denoted as MOTS (N) switch, along with its variations IMOTS (N) and IMOTS-CT (N) switches. The analysis and simulation results were presented that all of them achieve 100% throughput and the mean cell delay of IMOTS-CT (N) is comparable to that of OQ switch with FIFO queues (FIFO-OQ). Especially, IMOTS-CT (N) was proposed for a way to reduce mean cell delay of IMOTS (N). In this paper, we propose advanced IMOTS (N), denoted as AIMOTS (N), with token based scheduling algorithm of it. It shows a way to reduce hardware complexity of IMOTS (N) and IMOTS-CT (N). Quantitative simulation results are presented to compare AMOTS (N) switch with others.
{"title":"Token Based Scheduling Algorithm for Advanced IMOTS(N) Switch Architecture","authors":"Jianfei Zhang, Zhiyi Fang, Hyung Jae Chang, S. Zheng","doi":"10.1109/SNPD.2012.133","DOIUrl":"https://doi.org/10.1109/SNPD.2012.133","url":null,"abstract":"In the previous papers, we presented a new mesh of trees based switch architecture, denoted as MOTS (N) switch, along with its variations IMOTS (N) and IMOTS-CT (N) switches. The analysis and simulation results were presented that all of them achieve 100% throughput and the mean cell delay of IMOTS-CT (N) is comparable to that of OQ switch with FIFO queues (FIFO-OQ). Especially, IMOTS-CT (N) was proposed for a way to reduce mean cell delay of IMOTS (N). In this paper, we propose advanced IMOTS (N), denoted as AIMOTS (N), with token based scheduling algorithm of it. It shows a way to reduce hardware complexity of IMOTS (N) and IMOTS-CT (N). Quantitative simulation results are presented to compare AMOTS (N) switch with others.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121408572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By analyzing the basic principle of Otsu method and its application in image segmentation, and according to the distribution characteristics of the target and background, an improved threshold image segmentation algorithm based on the Otsu method is developed. By narrowing the selection range of threshold and searching the minimum variance ratio, the improved algorithm selects the optimal threshold. Through the compared with the Otsu method and other methods, the results show that the new improved algorithm has these advantages such as high segmentation precision and fast computation speed.
{"title":"An Improved Image Segmentation Algorithm Based on the Otsu Method","authors":"Mengxing Huang, Wenjiao Yu, Donghai Zhu","doi":"10.1109/SNPD.2012.26","DOIUrl":"https://doi.org/10.1109/SNPD.2012.26","url":null,"abstract":"By analyzing the basic principle of Otsu method and its application in image segmentation, and according to the distribution characteristics of the target and background, an improved threshold image segmentation algorithm based on the Otsu method is developed. By narrowing the selection range of threshold and searching the minimum variance ratio, the improved algorithm selects the optimal threshold. Through the compared with the Otsu method and other methods, the results show that the new improved algorithm has these advantages such as high segmentation precision and fast computation speed.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Testing the GUI (Graphical User Interface) of a software application is typically accomplished by developing a GUI test script composed of sequences of events and assertions. A GUI test script is in a sense similar to the source code of a program, since events and assertions are like source-code statements, which are executed line by line. Therefore, like source code, a GUI test script may have bad smells, and refactoring is an effective technique that can eradicate bad smells, making the script better and easier to maintain. This paper studies the bad smells a GUI test script may have and the refactoring methods that can be applied to remove the bad smells. A total of 11 bad smells are identified and 16 refactoring methods are proposed. The refactoring methods have been implemented in a GUI testing tool, called GTT, to support the automatic refactoring of GUI test scripts.
{"title":"Bad Smells and Refactoring Methods for GUI Test Scripts","authors":"Woei-Kae Chen, Jung-Chi Wang","doi":"10.1109/SNPD.2012.10","DOIUrl":"https://doi.org/10.1109/SNPD.2012.10","url":null,"abstract":"Testing the GUI (Graphical User Interface) of a software application is typically accomplished by developing a GUI test script composed of sequences of events and assertions. A GUI test script is in a sense similar to the source code of a program, since events and assertions are like source-code statements, which are executed line by line. Therefore, like source code, a GUI test script may have bad smells, and refactoring is an effective technique that can eradicate bad smells, making the script better and easier to maintain. This paper studies the bad smells a GUI test script may have and the refactoring methods that can be applied to remove the bad smells. A total of 11 bad smells are identified and 16 refactoring methods are proposed. The refactoring methods have been implemented in a GUI testing tool, called GTT, to support the automatic refactoring of GUI test scripts.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116662017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper reports some new variants of gradient ascent type in learning SVMs. The theoretical development is presented in the third section of the paper. The performance analysis of the proposed variants, in terms of recognition accuracy and generalization capacity, is experimentally evaluated and the results are presented and commented in the final part of the paper.
{"title":"Heuristic Attempts to Improve the Generalization Capacities in Learning SVMs","authors":"L. State, C. Cocianu, Marinela Mircea","doi":"10.1109/SNPD.2012.37","DOIUrl":"https://doi.org/10.1109/SNPD.2012.37","url":null,"abstract":"The paper reports some new variants of gradient ascent type in learning SVMs. The theoretical development is presented in the third section of the paper. The performance analysis of the proposed variants, in terms of recognition accuracy and generalization capacity, is experimentally evaluated and the results are presented and commented in the final part of the paper.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126896871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-core processors are becoming widely deployed in computer systems. While improving the performance of applications with multi-core technology, multi-core CPUs consume more power than a single-core one. We propose a power saving technique for multi-core systems based on the observation of critical sections in multi-threaded applications. First, since only one thread on a core can enter into a critical section for a shared resource, other threads on other cores that would access the same resource would run into busy waiting state. Hence the frequency of those idle cores could be minimized to reduce energy wastages without degrading overall applications' performance. Secondly, the accurate engage/disengage timing of a critical section could be detected by matching particular byte code patterns before a thread actually enters into a critical section. Thus the frequency of busy waiting cores could be tuned in advance. Based on these findings, the power-saving technique of critical sections is proposed and implemented. With the experiments of five multi-threaded Java benchmarks, the proposed power-saving technique leads to good energy savings (11 to 15 percent) with lower values of Energy Delay Product as compared to the other power-saving techniques.
{"title":"Smart Energy Management of Multi-threaded Java Applications on Multi-core Processors","authors":"Fuh-Gwo Chen, Kuo-Yi Chen, Jr-Shian Chen, Chi-Chen Shui","doi":"10.1109/SNPD.2012.66","DOIUrl":"https://doi.org/10.1109/SNPD.2012.66","url":null,"abstract":"Multi-core processors are becoming widely deployed in computer systems. While improving the performance of applications with multi-core technology, multi-core CPUs consume more power than a single-core one. We propose a power saving technique for multi-core systems based on the observation of critical sections in multi-threaded applications. First, since only one thread on a core can enter into a critical section for a shared resource, other threads on other cores that would access the same resource would run into busy waiting state. Hence the frequency of those idle cores could be minimized to reduce energy wastages without degrading overall applications' performance. Secondly, the accurate engage/disengage timing of a critical section could be detected by matching particular byte code patterns before a thread actually enters into a critical section. Thus the frequency of busy waiting cores could be tuned in advance. Based on these findings, the power-saving technique of critical sections is proposed and implemented. With the experiments of five multi-threaded Java benchmarks, the proposed power-saving technique leads to good energy savings (11 to 15 percent) with lower values of Energy Delay Product as compared to the other power-saving techniques.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}