首页 > 最新文献

2014 IEEE 5th International Conference on Software Engineering and Service Science最新文献

英文 中文
A new approach of clustering malicious JavaScript 一种聚类恶意JavaScript的新方法
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933535
Liu Biao, Huamin Feng, Zhang Kejun, Li Yang
In the recent years, many hostile websites have been using polymorphic JavaScript in order to conceal its code. The virtual execution is considered to be effective to process and detect such types of JavaScript. However, a challenge often encountered with that approach is the mandatory preparation of very detail-oriented environments that may also require specific user-driven events for the malicious JavaScript to execute properly as it was designed to. This paper proposes a hierarchical clustering algorithm based on tree edit distance to recognize and categorize hostile JavaScript. Firstly, the JavaScript's abstract syntax tree is constructed to be structural analysis. Secondly, the similarity of two JavaScript is calculated by tree-matching algorithm based on tree edit distance. Finally, the hierarchical clustering of malicious JavaScript is determined by predefined threshold. Our promising results confirm the effectiveness of the approach.
近年来,许多恶意网站一直在使用多态JavaScript来隐藏其代码。虚拟执行被认为是处理和检测此类JavaScript类型的有效方法。然而,这种方法经常遇到的一个挑战是,必须准备非常面向细节的环境,这些环境可能还需要特定的用户驱动事件,以便恶意JavaScript按照设计的方式正确执行。提出了一种基于树编辑距离的分层聚类算法对恶意JavaScript进行识别和分类。首先,构建JavaScript的抽象语法树进行结构分析。其次,采用基于树编辑距离的树匹配算法计算两种JavaScript的相似度;最后,通过预定义阈值确定恶意JavaScript的分层聚类。我们令人鼓舞的结果证实了该方法的有效性。
{"title":"A new approach of clustering malicious JavaScript","authors":"Liu Biao, Huamin Feng, Zhang Kejun, Li Yang","doi":"10.1109/ICSESS.2014.6933535","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933535","url":null,"abstract":"In the recent years, many hostile websites have been using polymorphic JavaScript in order to conceal its code. The virtual execution is considered to be effective to process and detect such types of JavaScript. However, a challenge often encountered with that approach is the mandatory preparation of very detail-oriented environments that may also require specific user-driven events for the malicious JavaScript to execute properly as it was designed to. This paper proposes a hierarchical clustering algorithm based on tree edit distance to recognize and categorize hostile JavaScript. Firstly, the JavaScript's abstract syntax tree is constructed to be structural analysis. Secondly, the similarity of two JavaScript is calculated by tree-matching algorithm based on tree edit distance. Finally, the hierarchical clustering of malicious JavaScript is determined by predefined threshold. Our promising results confirm the effectiveness of the approach.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"1 1","pages":"157-160"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82979407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Specification and modeling of QoS based on AADL 基于AADL的QoS规范与建模
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933759
Lichen Zhang
Specifying and modeling Quality of Service (QoS) properties represents a key challenge for cyber physical system development. Quality of Service (QoS) is a general term that specifies system quality and performance, as opposed to system functionality of cyber physical systems. QoS specification is concerned with capturing application level QoS requirements and management policies of cyber physical systems. Architecture Analysis and Design Language (AADL) is a textual and graphic language used to design and analyze the software and hardware architectures of embedded and realtime systems for performance-critical characteristics (e.g., end-to-end latency, schedulability, and reliability), AADL supports the representation of end-to-end flows through the concept of a flow specification This paper proposes an approach to specify and model QoS based on AADL. We present our current effort to apply and extend AADL to specify and model QoS of cyber physical systems, finally, we illustrate QoS specifying and modeling via an example of specifying and modeling Vehicular Ad-hoc NETwork (VANET).
服务质量(QoS)属性的指定和建模是网络物理系统开发的一个关键挑战。服务质量(QoS)是指定系统质量和性能的通用术语,与网络物理系统的系统功能相对。QoS规范涉及捕获应用层的QoS需求和网络物理系统的管理策略。架构分析和设计语言(AADL)是一种文本和图形语言,用于设计和分析嵌入式和实时系统的软件和硬件架构的性能关键特征(例如,端到端延迟,可调度性和可靠性),AADL通过流规范的概念支持端到端流的表示。本文提出了一种基于AADL的指定和建模QoS的方法。我们介绍了目前应用和扩展AADL来指定和建模网络物理系统的QoS的工作,最后,我们通过指定和建模车辆自组织网络(VANET)的一个例子来说明QoS的指定和建模。
{"title":"Specification and modeling of QoS based on AADL","authors":"Lichen Zhang","doi":"10.1109/ICSESS.2014.6933759","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933759","url":null,"abstract":"Specifying and modeling Quality of Service (QoS) properties represents a key challenge for cyber physical system development. Quality of Service (QoS) is a general term that specifies system quality and performance, as opposed to system functionality of cyber physical systems. QoS specification is concerned with capturing application level QoS requirements and management policies of cyber physical systems. Architecture Analysis and Design Language (AADL) is a textual and graphic language used to design and analyze the software and hardware architectures of embedded and realtime systems for performance-critical characteristics (e.g., end-to-end latency, schedulability, and reliability), AADL supports the representation of end-to-end flows through the concept of a flow specification This paper proposes an approach to specify and model QoS based on AADL. We present our current effort to apply and extend AADL to specify and model QoS of cyber physical systems, finally, we illustrate QoS specifying and modeling via an example of specifying and modeling Vehicular Ad-hoc NETwork (VANET).","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"4 1","pages":"1107-1110"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81579661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A lightweight anomaly mining algorithm in the Internet of Things 物联网中一种轻量级异常挖掘算法
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933768
Yan-bing Liu, Qi Wu
The security of Internet of Things (IoT) has already become a thorny problem because of opening deployment and limited resources. Thus, as the essential part of intrusion detection anomaly mining gets more and more attention. However, complexity of algorithm is the vital issue due to the specialty of IoT. Meanwhile, traditional methods with Euclidean distance may cause misjudgment at some extent. So this paper proposes a lightweight anomaly mining algorithm which employ Jaccard coefficient firstly as the judging criterion instead of Euclidean distance. The experiment verifies the availability of proposed algorithm.
由于开放部署和资源有限,物联网的安全已经成为一个棘手的问题。因此,异常挖掘作为入侵检测的重要组成部分,越来越受到人们的重视。然而,由于物联网的特殊性,算法的复杂性成为关键问题。同时,传统的欧氏距离方法也会造成一定程度的误判。为此,本文提出了一种轻量级的异常挖掘算法,该算法首先采用Jaccard系数代替欧氏距离作为判断准则。实验验证了算法的有效性。
{"title":"A lightweight anomaly mining algorithm in the Internet of Things","authors":"Yan-bing Liu, Qi Wu","doi":"10.1109/ICSESS.2014.6933768","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933768","url":null,"abstract":"The security of Internet of Things (IoT) has already become a thorny problem because of opening deployment and limited resources. Thus, as the essential part of intrusion detection anomaly mining gets more and more attention. However, complexity of algorithm is the vital issue due to the specialty of IoT. Meanwhile, traditional methods with Euclidean distance may cause misjudgment at some extent. So this paper proposes a lightweight anomaly mining algorithm which employ Jaccard coefficient firstly as the judging criterion instead of Euclidean distance. The experiment verifies the availability of proposed algorithm.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"23 1","pages":"1142-1145"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82828802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A novel deep model for image recognition 一种新的图像识别深度模型
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933585
Ming Zhu, Yan Wu
In this paper we propose a hybrid deep network for image recognition. First we use the sparse autoencoder(SAE) which is a method to extract high-level feature representations of data in an unsupervised way, without any manual feature engineering, and then we perform the classification using the deep belief networks(DBNs), which consist of restricted Boltzmann machine(RBM). Finally, we implement some comparative experiments on image datasets, and the results show that our methods achieved better performance when compared with neural network and other deep learning techniques such as DBNs.
本文提出了一种用于图像识别的混合深度网络。首先,我们使用稀疏自编码器(SAE),这是一种以无监督的方式提取数据的高级特征表示的方法,无需任何手动特征工程,然后我们使用由受限玻尔兹曼机(RBM)组成的深度信念网络(dbn)进行分类。最后,我们在图像数据集上进行了一些对比实验,结果表明,与神经网络和其他深度学习技术(如dbn)相比,我们的方法取得了更好的性能。
{"title":"A novel deep model for image recognition","authors":"Ming Zhu, Yan Wu","doi":"10.1109/ICSESS.2014.6933585","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933585","url":null,"abstract":"In this paper we propose a hybrid deep network for image recognition. First we use the sparse autoencoder(SAE) which is a method to extract high-level feature representations of data in an unsupervised way, without any manual feature engineering, and then we perform the classification using the deep belief networks(DBNs), which consist of restricted Boltzmann machine(RBM). Finally, we implement some comparative experiments on image datasets, and the results show that our methods achieved better performance when compared with neural network and other deep learning techniques such as DBNs.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"33 1","pages":"373-376"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82887288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load adaptive congestion control and rate readjustment for wireless mesh networks 无线网状网络的负载自适应拥塞控制和速率调整
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933755
Maheen Islam, M. L. Rahman, M. Mamun-Or-Rashid
Traffic in WMNs has a wide range of variations which contributes to channel saturation and may bring up congestion due to contention caused by concurrent transmission, buffer overflows and time varying wireless channel condition. In this paper, we propose a distributed congestion control scheme for wireless mesh networks to ensure higher network throughput while avoiding congestion and maintaining inter-flow fairness. Our proposed technique handles congestion by restricting the available transmission rate of downstream nodes among the upstream nodes according to their flow demands based on their: packet arrival rate, service rate and buffer occupancy. We also introduce prioritized queues in each node to treat real time and non-real time traffic differently. Therefore, congestion degree calculation, rate allocation and traffic prioritization ensures higher network throughput and guaranteed delivery of real time traffic. Experiments conducted on ns-2 simulations demonstrate that our proposed algorithm can achieve significant improvements in both overall network throughput and inter-flow fairness for both non real time and delay bound traffic.
WMNs中的业务量变化很大,导致信道饱和,并发传输引起的争用、缓冲区溢出和时变的无线信道状况可能导致拥塞。本文提出了一种用于无线网状网络的分布式拥塞控制方案,以确保更高的网络吞吐量,同时避免拥塞并保持流间公平性。该技术根据上游节点的流量需求,根据分组到达率、服务率和缓冲区占用率来限制下游节点在上游节点之间的可用传输速率,从而解决拥塞问题。我们还在每个节点中引入了优先队列,以区别对待实时和非实时流量。因此,通过拥塞度计算、速率分配和流量优先级排序,可以保证更高的网络吞吐量,保证流量的实时性。ns-2仿真实验表明,对于非实时和延迟绑定的流量,本文提出的算法在整体网络吞吐量和流间公平性方面都有显著提高。
{"title":"Load adaptive congestion control and rate readjustment for wireless mesh networks","authors":"Maheen Islam, M. L. Rahman, M. Mamun-Or-Rashid","doi":"10.1109/ICSESS.2014.6933755","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933755","url":null,"abstract":"Traffic in WMNs has a wide range of variations which contributes to channel saturation and may bring up congestion due to contention caused by concurrent transmission, buffer overflows and time varying wireless channel condition. In this paper, we propose a distributed congestion control scheme for wireless mesh networks to ensure higher network throughput while avoiding congestion and maintaining inter-flow fairness. Our proposed technique handles congestion by restricting the available transmission rate of downstream nodes among the upstream nodes according to their flow demands based on their: packet arrival rate, service rate and buffer occupancy. We also introduce prioritized queues in each node to treat real time and non-real time traffic differently. Therefore, congestion degree calculation, rate allocation and traffic prioritization ensures higher network throughput and guaranteed delivery of real time traffic. Experiments conducted on ns-2 simulations demonstrate that our proposed algorithm can achieve significant improvements in both overall network throughput and inter-flow fairness for both non real time and delay bound traffic.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"27 1","pages":"1088-1092"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89839044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved recurrent neural network language model with context vector features 基于上下文向量特征的改进递归神经网络语言模型
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933694
Jian Zhang, Dan Qu, Zhen Li
Recurrent neural network language models have solved the problems of data sparseness and dimensionality disaster which exist in traditional N-gram models. RNNLMs have recently demonstrated state-of-the-art performance in speech recognition, machine translation and other tasks. In this paper, we improve the model performance by providing contextual word vectors in association with RNNLMs. This method can reinforce the ability of learning long-distance information using vectors training from Skip-gram model. The experimental results show that the proposed method can improve the perplexity performance significantly on Penn Treebank data. And we further apply the models to speech recognition task on the Wall Street Journal corpora, where we achieve obvious improvements in word-error-rate.
递归神经网络语言模型解决了传统n图模型存在的数据稀疏性和维数灾难问题。rnnlm最近在语音识别、机器翻译和其他任务中表现出了最先进的性能。在本文中,我们通过提供与rnnlm相关联的上下文词向量来提高模型性能。该方法利用Skip-gram模型的向量训练增强了远程信息的学习能力。实验结果表明,该方法可以显著提高Penn Treebank数据的perplexity性能。我们进一步将模型应用于华尔街日报语料库的语音识别任务,在错误率方面取得了明显的改善。
{"title":"An improved recurrent neural network language model with context vector features","authors":"Jian Zhang, Dan Qu, Zhen Li","doi":"10.1109/ICSESS.2014.6933694","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933694","url":null,"abstract":"Recurrent neural network language models have solved the problems of data sparseness and dimensionality disaster which exist in traditional N-gram models. RNNLMs have recently demonstrated state-of-the-art performance in speech recognition, machine translation and other tasks. In this paper, we improve the model performance by providing contextual word vectors in association with RNNLMs. This method can reinforce the ability of learning long-distance information using vectors training from Skip-gram model. The experimental results show that the proposed method can improve the perplexity performance significantly on Penn Treebank data. And we further apply the models to speech recognition task on the Wall Street Journal corpora, where we achieve obvious improvements in word-error-rate.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"34 1","pages":"828-831"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89916388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The research of the test case prioritization algorithm for black box testing 黑盒测试用例优先排序算法的研究
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933509
Wenhong Liu, Xin Wu, Weixiang Zhang, Yang Xu
In order to improve the efficiency of software test case execution, this paper analyzed the impact of some factors to test cases prioritization and presented two adjustment algorithms. These factors included software requirement prioritization, software failure severity and software failure probability level. Firstly, gave the definition of software requirement prioritization, the ranking methods of software failure severity and software failure probability level, the description of the relationship between test cases and test requirements. Then, presented an initial test case prioritization method based on the analysis. And then, proposed a dynamic adjustment algorithm using of software requirement prioritization and software failure probability level when software failure occurred. Experimental data show that the two test case prioritization algorithms can improve the efficiency of software testing and are helpful to find more software defects in a short period.
为了提高软件测试用例的执行效率,分析了一些因素对测试用例优先级的影响,提出了两种调整算法。这些因素包括软件需求优先级、软件故障严重程度和软件故障概率级别。首先,给出了软件需求优先级的定义、软件故障严重程度和软件故障概率等级的排序方法,描述了测试用例与测试需求之间的关系;在此基础上,提出了一种初始测试用例的优先级划分方法。在此基础上,提出了一种基于软件需求优先级和软件故障概率级别的软件故障动态调整算法。实验数据表明,这两种测试用例优先排序算法可以提高软件测试的效率,有助于在短时间内发现更多的软件缺陷。
{"title":"The research of the test case prioritization algorithm for black box testing","authors":"Wenhong Liu, Xin Wu, Weixiang Zhang, Yang Xu","doi":"10.1109/ICSESS.2014.6933509","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933509","url":null,"abstract":"In order to improve the efficiency of software test case execution, this paper analyzed the impact of some factors to test cases prioritization and presented two adjustment algorithms. These factors included software requirement prioritization, software failure severity and software failure probability level. Firstly, gave the definition of software requirement prioritization, the ranking methods of software failure severity and software failure probability level, the description of the relationship between test cases and test requirements. Then, presented an initial test case prioritization method based on the analysis. And then, proposed a dynamic adjustment algorithm using of software requirement prioritization and software failure probability level when software failure occurred. Experimental data show that the two test case prioritization algorithms can improve the efficiency of software testing and are helpful to find more software defects in a short period.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"47 1 1","pages":"37-40"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78042139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling of real-time embedded systems using SysML and its verification using UPPAAL and DiVinE 实时嵌入式系统的SysML建模及UPPAAL和DiVinE验证
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933529
Muhammad Abdul Basit-Ur-Rahim, F. Arif, J. Ahmad
SysML is a graphical modeling language that is more suitable for modeling of real-time and embedded systems. The application modeled in SysML must be verified in earlier phases of software development life cycle to increase the reliability and reduce the modeling and verification cost. The available tools for verification are sequential and parallel types. The sequential verification tools either fail or unable to show the significant performance to verify a large scale embedded real-time system. The limitations of sequential verification tools have increased the importance of parallel verification tools. While, DiVinE is parallel verification tool that doesn't support the timed verification of model. By keeping in view the limitations of both types of model checkers and their compatibility, we have proposed a methodology to use both types of model checkers for verification of real-time system that are graphically modeled using SysML. We demonstrate the suitability of the framework by applying it on a case study of embedded real-time system. The case study is modeled using state machine diagram of SysML and verified against specified timed properties using UPPAAL while the untimed properties are verified using DiVinE.
SysML是一种图形化建模语言,更适合于实时系统和嵌入式系统的建模。在SysML中建模的应用程序必须在软件开发生命周期的早期阶段进行验证,以提高可靠性并降低建模和验证成本。可用的验证工具是顺序的和并行的类型。在大规模嵌入式实时系统的验证中,顺序验证工具要么失效,要么无法显示出显著的性能。顺序验证工具的局限性增加了并行验证工具的重要性。而DiVinE是并行验证工具,不支持模型的定时验证。考虑到两种类型的模型检查器及其兼容性的局限性,我们提出了一种方法,可以使用两种类型的模型检查器来验证使用SysML图形化建模的实时系统。通过对嵌入式实时系统的实例研究,证明了该框架的适用性。案例研究使用SysML的状态机图建模,并使用UPPAAL对指定的定时属性进行验证,而使用DiVinE对非定时属性进行验证。
{"title":"Modeling of real-time embedded systems using SysML and its verification using UPPAAL and DiVinE","authors":"Muhammad Abdul Basit-Ur-Rahim, F. Arif, J. Ahmad","doi":"10.1109/ICSESS.2014.6933529","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933529","url":null,"abstract":"SysML is a graphical modeling language that is more suitable for modeling of real-time and embedded systems. The application modeled in SysML must be verified in earlier phases of software development life cycle to increase the reliability and reduce the modeling and verification cost. The available tools for verification are sequential and parallel types. The sequential verification tools either fail or unable to show the significant performance to verify a large scale embedded real-time system. The limitations of sequential verification tools have increased the importance of parallel verification tools. While, DiVinE is parallel verification tool that doesn't support the timed verification of model. By keeping in view the limitations of both types of model checkers and their compatibility, we have proposed a methodology to use both types of model checkers for verification of real-time system that are graphically modeled using SysML. We demonstrate the suitability of the framework by applying it on a case study of embedded real-time system. The case study is modeled using state machine diagram of SysML and verified against specified timed properties using UPPAAL while the untimed properties are verified using DiVinE.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"31 1","pages":"132-136"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82312548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Routing algorithms analysis for ODMA-WiFi systems ODMA-WiFi系统的路由算法分析
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933763
Zhenchao Wang, Zhe Li, Xianchao Zhu
ODMA-WiFi network is a sort of multi-hop temporary autonomous network which is of great compatibility, composed of lots of mobile nodes without pre-positioned network infrastructure, and mainly used for conditions where the network needs to be deployed rapidly. This flexibility of ODMA-WiFi nodes introduces new challenges for the design of efficient network protocols. The throughput of the network depends largely on the routing algorithm, and due to the special nature of ODMA, there is a great deal of difference between ODMA-WiFi and traditional technologies. In this paper, the features of ODMA-WiFi networks are firstly presented, then several typical routing protocols are introduced and the performances of each protocol are analyzed and compared. Finally, we come to the conclusion through the above process.
ODMA-WiFi网络是一种多跳临时自治网络,具有很大的兼容性,由大量移动节点组成,无需预先定位网络基础设施,主要用于网络需要快速部署的情况。ODMA-WiFi节点的这种灵活性给高效网络协议的设计带来了新的挑战。网络的吞吐量很大程度上取决于路由算法,由于ODMA的特殊性,ODMA- wifi与传统技术有很大的区别。本文首先介绍了ODMA-WiFi网络的特点,然后介绍了几种典型的路由协议,并对每种协议的性能进行了分析和比较。最后,我们通过以上的过程得出结论。
{"title":"Routing algorithms analysis for ODMA-WiFi systems","authors":"Zhenchao Wang, Zhe Li, Xianchao Zhu","doi":"10.1109/ICSESS.2014.6933763","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933763","url":null,"abstract":"ODMA-WiFi network is a sort of multi-hop temporary autonomous network which is of great compatibility, composed of lots of mobile nodes without pre-positioned network infrastructure, and mainly used for conditions where the network needs to be deployed rapidly. This flexibility of ODMA-WiFi nodes introduces new challenges for the design of efficient network protocols. The throughput of the network depends largely on the routing algorithm, and due to the special nature of ODMA, there is a great deal of difference between ODMA-WiFi and traditional technologies. In this paper, the features of ODMA-WiFi networks are firstly presented, then several typical routing protocols are introduced and the performances of each protocol are analyzed and compared. Finally, we come to the conclusion through the above process.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"30 1","pages":"1122-1125"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80635043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the quorum requirement and value selection rule for Fast Paxos Fast Paxos的仲裁要求和值选择规则研究
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933593
Wenbing Zhao
Fault tolerance is a crucial requirement for big data and cloud computing because it helps remove single point of failures. The Paxos algorithm has been employed in a number of real-world fault tolerant systems. Fast Paxos is one of the latest algorithms in the Paxos family of algorithms for distributed consensus. In Fast Paxos, an acceptor is allowed to cast a vote for a value of its own choice unilaterally in a fast round, which eliminates a communication step for reaching consensus. As a tradeoff, a bigger quorum than simple majority must be used and a value selection rule is employed to select the right value for agreement to overcome collisions. The derivation of quorum requirements and value selection rule in the original article on Fast Paxos by Lamport, while very rigorous, may be hard to follow and difficult to implement. In this paper, we present a more intuitive approach to deriving the quorum requirements and easy-to-implement value selection rule for Fast Paxos.
容错是大数据和云计算的关键要求,因为它有助于消除单点故障。Paxos算法已经在许多现实世界的容错系统中得到了应用。Fast Paxos是Paxos分布式共识算法家族中最新的算法之一。在Fast Paxos中,允许接受者在快速轮中单方面投票选择自己选择的值,这消除了达成共识的沟通步骤。作为权衡,必须使用比简单多数更大的法定人数,并使用值选择规则来选择正确的值以达成一致,以克服冲突。Lamport在Fast Paxos的原文中对quorum需求和value selection rule的推导虽然非常严谨,但可能难以遵循和实现。在本文中,我们提出了一种更直观的方法来推导快速Paxos的仲裁需求和易于实现的值选择规则。
{"title":"On the quorum requirement and value selection rule for Fast Paxos","authors":"Wenbing Zhao","doi":"10.1109/ICSESS.2014.6933593","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933593","url":null,"abstract":"Fault tolerance is a crucial requirement for big data and cloud computing because it helps remove single point of failures. The Paxos algorithm has been employed in a number of real-world fault tolerant systems. Fast Paxos is one of the latest algorithms in the Paxos family of algorithms for distributed consensus. In Fast Paxos, an acceptor is allowed to cast a vote for a value of its own choice unilaterally in a fast round, which eliminates a communication step for reaching consensus. As a tradeoff, a bigger quorum than simple majority must be used and a value selection rule is employed to select the right value for agreement to overcome collisions. The derivation of quorum requirements and value selection rule in the original article on Fast Paxos by Lamport, while very rigorous, may be hard to follow and difficult to implement. In this paper, we present a more intuitive approach to deriving the quorum requirements and easy-to-implement value selection rule for Fast Paxos.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"778 1","pages":"406-409"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76409385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 5th International Conference on Software Engineering and Service Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1