首页 > 最新文献

2014 IEEE 5th International Conference on Software Engineering and Service Science最新文献

英文 中文
The multi-attribute vertical handoff algorithm based on node mobility 基于节点移动性的多属性垂直切换算法
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933769
Sui Bo, Li Lin, Dan Feng
The combination of different networks adopting various wireless access technologies can improve the wireless transmission performance. Vertical handoff is the basis of mutual integration of heterogeneous wireless networks, and handoff decision is a critical part in the vertical handoff process, which determines handoff performance. Multi-attribute vertical handoff algorithm based on node mobility is proposed in this paper, and the mobility model is built based on node mobility characteristics. The current access point pre-switch to the adjacent access points, and when the signal coverage rate of the access point is below a pre-set threshold, handoff is triggered. The experimental results show that: compared with the traditional multi-attribute decision making, the proposed algorithm has obvious advantages in handoff performance.
采用多种无线接入技术的不同网络的组合可以提高无线传输性能。垂直切换是异构无线网络相互集成的基础,而切换决策是垂直切换过程中的关键环节,决定着切换性能。提出了基于节点移动性的多属性垂直切换算法,并根据节点移动性特征建立了移动性模型。当前接入点预切换到相邻接入点,当该接入点的信号覆盖率低于预先设定的阈值时触发切换。实验结果表明:与传统的多属性决策相比,该算法在切换性能上具有明显优势。
{"title":"The multi-attribute vertical handoff algorithm based on node mobility","authors":"Sui Bo, Li Lin, Dan Feng","doi":"10.1109/ICSESS.2014.6933769","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933769","url":null,"abstract":"The combination of different networks adopting various wireless access technologies can improve the wireless transmission performance. Vertical handoff is the basis of mutual integration of heterogeneous wireless networks, and handoff decision is a critical part in the vertical handoff process, which determines handoff performance. Multi-attribute vertical handoff algorithm based on node mobility is proposed in this paper, and the mobility model is built based on node mobility characteristics. The current access point pre-switch to the adjacent access points, and when the signal coverage rate of the access point is below a pre-set threshold, handoff is triggered. The experimental results show that: compared with the traditional multi-attribute decision making, the proposed algorithm has obvious advantages in handoff performance.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"68 1","pages":"1146-1149"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87803299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Document similarity calculation model of CSLN CSLN的文献相似度计算模型
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933701
Weiling Chen, G. Wang, Fengxia Yin
CSLN is a citation semantic link network with semantic representation and reasoning abilities. The documents in citation semantic link network (CSLN) is a set of many objects. The similarity calculation of a single object can't accurately calculate the document similarity of citation semantic link network. This paper analyzes in depth the characteristics of each part of the document, and puts forward the document similarity calculation model of the citation semantic link network. This model not only improves the accuracy of document similarity calculation of the citation semantic link network, but also lays a foundation for the community discovery of citation semantic link network and the hot prediction of research.
CSLN是一个具有语义表示和推理能力的引文语义链接网络。引文语义链接网络(CSLN)中的文献是许多对象的集合。单一对象的相似度计算不能准确计算引文语义链接网络的文献相似度。本文深入分析了文献各部分的特征,提出了引文语义链接网络的文献相似度计算模型。该模型不仅提高了引文语义链接网络文献相似度计算的准确性,而且为引文语义链接网络的社区发现和研究热点预测奠定了基础。
{"title":"Document similarity calculation model of CSLN","authors":"Weiling Chen, G. Wang, Fengxia Yin","doi":"10.1109/ICSESS.2014.6933701","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933701","url":null,"abstract":"CSLN is a citation semantic link network with semantic representation and reasoning abilities. The documents in citation semantic link network (CSLN) is a set of many objects. The similarity calculation of a single object can't accurately calculate the document similarity of citation semantic link network. This paper analyzes in depth the characteristics of each part of the document, and puts forward the document similarity calculation model of the citation semantic link network. This model not only improves the accuracy of document similarity calculation of the citation semantic link network, but also lays a foundation for the community discovery of citation semantic link network and the hot prediction of research.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"136 1","pages":"859-862"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86889972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust watermarking algorithm for digital image based on SIFT feature points 基于SIFT特征点的数字图像鲁棒水印算法
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933733
X. Zou, Na Li, Nawei Ji
In this paper, we present a robust watermarking algorithm for digital image using SIFT (Scale-invariant feature transform) feature points and realizes the blind detection. The algorithm uses SIFT feature points on the host image to decide the embedding location and capacity, and adjusts the size of the binary watermark with Neighbor interpolation, and embeds the watermark into DCT low-frequency coefficients of some qualified sub-blocks for the host image. The algorithm has the following characteristics: (1) the watermark is embedded in the DCT coefficient based on scale-invariant feature points, which can effectively resist common attacks, such as Gaussian noise-adding, salt and pepper noise-adding, cropping, Wiener filtering; (2) the watermarking detection does not require original digital image. The experiments show that the algorithm has good invisibility and strong robustness.
本文提出了一种基于SIFT (Scale-invariant feature transform)特征点的数字图像鲁棒水印算法,实现了图像的盲检测。该算法利用主图像上的SIFT特征点确定嵌入位置和容量,利用邻域插值调整二值水印的大小,并将水印嵌入到主图像的一些合格子块的DCT低频系数中。该算法具有以下特点:(1)水印基于尺度不变特征点嵌入到DCT系数中,能够有效抵御常见的高斯加噪、椒盐加噪、裁剪、维纳滤波等攻击;(2)水印检测不需要原始数字图像。实验表明,该算法具有良好的不可见性和较强的鲁棒性。
{"title":"Robust watermarking algorithm for digital image based on SIFT feature points","authors":"X. Zou, Na Li, Nawei Ji","doi":"10.1109/ICSESS.2014.6933733","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933733","url":null,"abstract":"In this paper, we present a robust watermarking algorithm for digital image using SIFT (Scale-invariant feature transform) feature points and realizes the blind detection. The algorithm uses SIFT feature points on the host image to decide the embedding location and capacity, and adjusts the size of the binary watermark with Neighbor interpolation, and embeds the watermark into DCT low-frequency coefficients of some qualified sub-blocks for the host image. The algorithm has the following characteristics: (1) the watermark is embedded in the DCT coefficient based on scale-invariant feature points, which can effectively resist common attacks, such as Gaussian noise-adding, salt and pepper noise-adding, cropping, Wiener filtering; (2) the watermarking detection does not require original digital image. The experiments show that the algorithm has good invisibility and strong robustness.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"14 1","pages":"996-1000"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88228279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Generating policy for software project management decision support paradigm 为软件项目管理决策支持范式生成策略
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933514
Ali Tizkar Sadabadi, Nazri Kama
Decision making for software project management encompasses a critical role for effective management. Decisions stem from constraints considered over definition of a project. Decision making of this practice considered with many challenges ranged based on intangible nature of software projects to the deficiency of strategy-model employed. In this paper a conceptual multi-method simulation based framework will be introduced in a modality to cover multiple levels of the decision structure over software project management process. The methods used are integrated towards a multi-method simulation model. Each of These methods exclusively realizes distinct aspect of software project management. The framework evolves the manner of decision making by a paradigm which establishes the foundation for a strategic level understanding and tactical decision support for practitioners. At the results section an optimal policy for the framework will be presented.
软件项目管理的决策制定对于有效管理起着至关重要的作用。决策源于项目定义中考虑的约束条件。该实践的决策制定考虑了许多挑战,这些挑战包括基于软件项目的无形性质和所采用的战略模型的不足。在本文中,将以一种模式介绍一个概念性的基于多方法仿真的框架,以涵盖软件项目管理过程中决策结构的多个层次。所使用的方法被整合成一个多方法仿真模型。这些方法中的每一种都专门实现了软件项目管理的不同方面。该框架通过一个范例发展了决策的方式,该范例为从业者建立了战略层面理解和战术决策支持的基础。在结果部分,将给出该框架的最优策略。
{"title":"Generating policy for software project management decision support paradigm","authors":"Ali Tizkar Sadabadi, Nazri Kama","doi":"10.1109/ICSESS.2014.6933514","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933514","url":null,"abstract":"Decision making for software project management encompasses a critical role for effective management. Decisions stem from constraints considered over definition of a project. Decision making of this practice considered with many challenges ranged based on intangible nature of software projects to the deficiency of strategy-model employed. In this paper a conceptual multi-method simulation based framework will be introduced in a modality to cover multiple levels of the decision structure over software project management process. The methods used are integrated towards a multi-method simulation model. Each of These methods exclusively realizes distinct aspect of software project management. The framework evolves the manner of decision making by a paradigm which establishes the foundation for a strategic level understanding and tactical decision support for practitioners. At the results section an optimal policy for the framework will be presented.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"1 1","pages":"58-63"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89162537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of the KNN algorithm based on KD tree in intelligent transportation system 基于KD树的KNN算法在智能交通系统中的应用
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933695
Guangyi Zhang, Fangzhen Li
The intelligent transportation system has demonstrated its strong advantages in solving the urban transport problem. One of its important roles is able to reflect the traffic conditions timely through the floating car. The key problem is to find out the candidate road sections from the vast road network quickly. Then we make the floating car match to the corresponding road by the map-matching algorithm. So we can get the real location of the floating car on the map. Every floating car needs to select candidate road sections from the whole road network, so the computing time is an important factor in affecting the real-time performance of the whole system. The commonly used method is to build an ellipse according to the probability criterion. It needs to determine the size of the ellipse, which is based on the statistic theory. It also needs to find these road sections which are in the ellipse from the whole road network. The whole process is complicated and time-consuming. Therefore, this paper proposes the k-nearest neighbors algorithm based on KD tree to get the candidate road sections.
智能交通系统在解决城市交通问题方面已显示出强大的优势。它的一个重要作用是能够通过浮车及时反映交通状况。关键问题是从庞大的路网中快速找到候选路段。然后通过地图匹配算法将浮车与相应的道路进行匹配。这样我们就能在地图上找到浮车的真实位置。每辆浮动车都需要从整个路网中选择候选路段,因此计算时间是影响整个系统实时性的重要因素。常用的方法是根据概率准则构造椭圆。它需要确定椭圆的大小,这是基于统计理论。它还需要从整个路网中找出这些在椭圆内的路段。整个过程既复杂又耗时。为此,本文提出了基于KD树的k近邻算法来获取候选路段。
{"title":"Application of the KNN algorithm based on KD tree in intelligent transportation system","authors":"Guangyi Zhang, Fangzhen Li","doi":"10.1109/ICSESS.2014.6933695","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933695","url":null,"abstract":"The intelligent transportation system has demonstrated its strong advantages in solving the urban transport problem. One of its important roles is able to reflect the traffic conditions timely through the floating car. The key problem is to find out the candidate road sections from the vast road network quickly. Then we make the floating car match to the corresponding road by the map-matching algorithm. So we can get the real location of the floating car on the map. Every floating car needs to select candidate road sections from the whole road network, so the computing time is an important factor in affecting the real-time performance of the whole system. The commonly used method is to build an ellipse according to the probability criterion. It needs to determine the size of the ellipse, which is based on the statistic theory. It also needs to find these road sections which are in the ellipse from the whole road network. The whole process is complicated and time-consuming. Therefore, this paper proposes the k-nearest neighbors algorithm based on KD tree to get the candidate road sections.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"1 1","pages":"832-835"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83063759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The application of Bayesian statistics in measuring anonymity 贝叶斯统计在匿名性度量中的应用
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933623
Han-Ru Pei, Yu Wang, Zhijian Wang
There are numerous efforts to measure the degree of anonymity. Among which the entropy anonymity is a popular one. However in practice entropy anonymity is hardly used because one of its assumptions is difficult to meet. In this paper we propose a method to tackle this problem. Our method is based on Bayesian statistics and can be used to compare the entropy anonymity of different anonymous communication systems. We use this method to analyze Threshold Mix to show its effectiveness and usefulness.
有许多努力来衡量匿名程度。其中,熵匿名是一种比较流行的匿名算法。然而,在实践中,由于熵匿名的一个假设很难满足,所以很少使用熵匿名。本文提出了一种解决这一问题的方法。该方法基于贝叶斯统计,可用于比较不同匿名通信系统的熵匿名性。用该方法对阈值混合进行分析,验证了该方法的有效性和实用性。
{"title":"The application of Bayesian statistics in measuring anonymity","authors":"Han-Ru Pei, Yu Wang, Zhijian Wang","doi":"10.1109/ICSESS.2014.6933623","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933623","url":null,"abstract":"There are numerous efforts to measure the degree of anonymity. Among which the entropy anonymity is a popular one. However in practice entropy anonymity is hardly used because one of its assumptions is difficult to meet. In this paper we propose a method to tackle this problem. Our method is based on Bayesian statistics and can be used to compare the entropy anonymity of different anonymous communication systems. We use this method to analyze Threshold Mix to show its effectiveness and usefulness.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"21 1","pages":"533-536"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83204433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Finding dimensions for text based on heterogeneous information network 基于异构信息网络的文本维数查找
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933692
Fei Jiang, Xiaoguang Hong, Zhaohui Peng, Qingzhong Li
We propose an approach applicable in the problem of multi dimensions text mining that finds out several sets of phrases which were referred to as the text dimension. Based on the dimensions of text found by the proposed approach, a network could be built by similarities between documents. A method is proposed to transform the network from a coarse-grained one to a fine-grained one. By repeatedly mining phrases sets from the networks of different granularities, we could get a refined text dimensions set. We provide experimental results on text mining showing the computational feasibility and effectiveness for finding text dimensions which combines text mining with network mining and can be used for learning interesting knowledge.
我们提出了一种适用于多维文本挖掘问题的方法,即找出几组短语作为文本维度。基于所提出的方法找到的文本的维度,可以通过文档之间的相似性来构建网络。提出了一种将粗粒度网络转换为细粒度网络的方法。通过从不同粒度的网络中反复挖掘短语集,得到精细化的文本维度集。我们提供了文本挖掘的实验结果,显示了文本挖掘与网络挖掘相结合的文本维度查找的计算可行性和有效性,可以用于学习有趣的知识。
{"title":"Finding dimensions for text based on heterogeneous information network","authors":"Fei Jiang, Xiaoguang Hong, Zhaohui Peng, Qingzhong Li","doi":"10.1109/ICSESS.2014.6933692","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933692","url":null,"abstract":"We propose an approach applicable in the problem of multi dimensions text mining that finds out several sets of phrases which were referred to as the text dimension. Based on the dimensions of text found by the proposed approach, a network could be built by similarities between documents. A method is proposed to transform the network from a coarse-grained one to a fine-grained one. By repeatedly mining phrases sets from the networks of different granularities, we could get a refined text dimensions set. We provide experimental results on text mining showing the computational feasibility and effectiveness for finding text dimensions which combines text mining with network mining and can be used for learning interesting knowledge.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"36 1","pages":"819-823"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84771228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of multi-physiological parameters information management system 多生理参数信息管理系统的设计与实现
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933706
Xin-chao Qu, Yue Zhang
With the developing trend of healthcare monitoring instruments becoming miniaturized and intelligent, more and more embedded healthcare monitoring devices are being used in hospitals. It is necessary to develop an integrated management platform for a variety of monitoring data. This paper presents a software application tool to manage multiple physiological parameters monitor data including Holter, static ECG, oxygen saturation and blood pressure. First, the system provides an automated medical monitoring procedure. Second, a clinical multi-parameter monitoring database stores user information, monitoring data, etc. Third, the system enables off-site doctors to operate diagnosis reports using a PC or smartphone through the Internet. The system effectively enhances the efficiency of health care monitoring, and the network delay of the system is small enough to meet the requirements of users.
随着医疗监控仪器小型化、智能化的发展趋势,越来越多的嵌入式医疗监控设备在医院得到应用。因此,有必要针对各种监测数据开发一个综合管理平台。本文介绍了一种管理动态心电图、静态心电图、血氧饱和度和血压等多种生理参数监测数据的软件应用工具。首先,该系统提供了一个自动化的医疗监测程序。其次,建立临床多参数监测数据库,存储用户信息、监测数据等。第三,该系统使异地医生可以通过互联网使用个人电脑或智能手机操作诊断报告。该系统有效地提高了医疗监控的效率,并且系统的网络时延足够小,能够满足用户的要求。
{"title":"Design and implementation of multi-physiological parameters information management system","authors":"Xin-chao Qu, Yue Zhang","doi":"10.1109/ICSESS.2014.6933706","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933706","url":null,"abstract":"With the developing trend of healthcare monitoring instruments becoming miniaturized and intelligent, more and more embedded healthcare monitoring devices are being used in hospitals. It is necessary to develop an integrated management platform for a variety of monitoring data. This paper presents a software application tool to manage multiple physiological parameters monitor data including Holter, static ECG, oxygen saturation and blood pressure. First, the system provides an automated medical monitoring procedure. Second, a clinical multi-parameter monitoring database stores user information, monitoring data, etc. Third, the system enables off-site doctors to operate diagnosis reports using a PC or smartphone through the Internet. The system effectively enhances the efficiency of health care monitoring, and the network delay of the system is small enough to meet the requirements of users.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"169 1","pages":"881-884"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80645685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavior-based portability analysis methodology for Android applications 基于行为的Android应用程序可移植性分析方法
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933667
Won Shin, Doo-Ho Park, Tae-Wan Kim, Chun-Hyon Chang
As Android is an open-source operating system, numerous device-specific updates are frequently published by various developers. Thus, in order to increase the portability of an application, the development of an Android application requires an efficient porting process. However, many analytical time-consuming problems arise when developers convert the application for other versions of platform. In this paper, we propose a behavior-based portability analysis methodology for Android applications. Using this methodology, a developer can extract the ideal behavior of an application and use it to compare the similarity of application flows. We study Android applications to determine whether the proposed methodology can be adopted to detect potential errors. The principal contribution of this paper is to enable developers to use behavior-based analysis for detecting potential errors related to portability by utilizing the porting process easily and quickly.
由于Android是一个开源操作系统,各种开发人员经常发布许多特定于设备的更新。因此,为了增加应用程序的可移植性,Android应用程序的开发需要一个有效的移植过程。然而,当开发人员将应用程序转换为其他版本的平台时,会出现许多耗时的分析问题。本文提出了一种基于行为的Android应用程序可移植性分析方法。使用这种方法,开发人员可以提取应用程序的理想行为,并用它来比较应用程序流的相似性。我们研究了Android应用程序,以确定所提出的方法是否可以用于检测潜在的错误。本文的主要贡献是使开发人员能够使用基于行为的分析,通过轻松快速地利用移植过程来检测与可移植性相关的潜在错误。
{"title":"Behavior-based portability analysis methodology for Android applications","authors":"Won Shin, Doo-Ho Park, Tae-Wan Kim, Chun-Hyon Chang","doi":"10.1109/ICSESS.2014.6933667","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933667","url":null,"abstract":"As Android is an open-source operating system, numerous device-specific updates are frequently published by various developers. Thus, in order to increase the portability of an application, the development of an Android application requires an efficient porting process. However, many analytical time-consuming problems arise when developers convert the application for other versions of platform. In this paper, we propose a behavior-based portability analysis methodology for Android applications. Using this methodology, a developer can extract the ideal behavior of an application and use it to compare the similarity of application flows. We study Android applications to determine whether the proposed methodology can be adopted to detect potential errors. The principal contribution of this paper is to enable developers to use behavior-based analysis for detecting potential errors related to portability by utilizing the porting process easily and quickly.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"1 1","pages":"714-717"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81953521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of static server based on event-driven 基于事件驱动的静态服务器的设计与实现
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933659
Jiantao Zhao, Liujie Qin
Static server is a type of busy I/O application, traditional server wastes computer resource on waiting for I/O owing to using synchronous I/O. Its concurrency and timeliness are very poor. This paper uses event-driven model to design and implement a static server. The server composes of event dispatcher and several processing modules. Event dispatcher is the core component, using a high performance multiplexing I/O epoll in implementation so that server can being running all out in response to new requests. In the end, by comparing the web load tests, verify that event-driven model improves massive performance for static server.
静态服务器是一种繁忙的I/O应用程序,传统服务器由于使用同步I/O而浪费计算机资源在等待I/O上。它的并发性和时效性都很差。本文采用事件驱动模型设计并实现了一个静态服务器。服务器由事件调度程序和多个处理模块组成。事件调度程序是核心组件,在实现中使用高性能多路I/O epoll,以便服务器可以在响应新请求时全力运行。最后,通过对比web负载测试,验证事件驱动模型对静态服务器的性能有很大的提高。
{"title":"Design and implementation of static server based on event-driven","authors":"Jiantao Zhao, Liujie Qin","doi":"10.1109/ICSESS.2014.6933659","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933659","url":null,"abstract":"Static server is a type of busy I/O application, traditional server wastes computer resource on waiting for I/O owing to using synchronous I/O. Its concurrency and timeliness are very poor. This paper uses event-driven model to design and implement a static server. The server composes of event dispatcher and several processing modules. Event dispatcher is the core component, using a high performance multiplexing I/O epoll in implementation so that server can being running all out in response to new requests. In the end, by comparing the web load tests, verify that event-driven model improves massive performance for static server.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"1 1","pages":"679-682"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89823646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 5th International Conference on Software Engineering and Service Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1