首页 > 最新文献

... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing最新文献

英文 中文
Image retrieval: Research and use in the information explosion 图像检索:信息爆炸中的研究与应用
Masashi Inoue
We surveyed the current research on the retrieval and utilization of images. This paper provides an overview of the difficulties and possibilities of technological or technology-related research topics resulting from the huge amount of images currently available and highlights some of the important research topics. We looked at the ongoing research activities and analyzed them from four aspects, information access and organization technology, the computing infrastructure that enables access to large-scale image resources, issues in human-system interaction and human factors related to using images, and the social aspect of image media. On the technical side, we noticed that as the number of digital images increases, so does the importance of the accuracy and scalability in relation to the image retrieval. The accuracy and scalability are in fact needed to cope with the current explosion in digital images. On the social side, not so long ago, image retrieval technologies were only experimental tools or used by experts within a limited domain. However, now the general public has access to a wide range of digital images, which means that image retrieval technologies are being used by various users in a large diversity of social contexts. Thus, as we show in this paper, the accuracy and scalability are not the only important factors in the era of information explosion, but that researchers must also be concerned with the social aspects of these technologies.
本文综述了图像检索与利用的研究现状。本文概述了目前大量可用的图像所导致的技术或与技术相关的研究课题的困难和可能性,并突出了一些重要的研究课题。我们对正在进行的研究活动进行了回顾,并从四个方面进行了分析,即信息访问和组织技术、访问大规模图像资源的计算基础设施、与使用图像相关的人机交互问题和人为因素以及图像媒体的社会方面。在技术方面,我们注意到,随着数字图像数量的增加,与图像检索相关的准确性和可扩展性的重要性也在增加。精度和可扩展性实际上是应对当前数字图像爆炸式增长所需要的。在社会方面,不久以前,图像检索技术还只是实验工具或在有限的领域内由专家使用。然而,现在普通大众可以接触到各种各样的数字图像,这意味着图像检索技术正在被各种各样的用户在各种各样的社会背景下使用。因此,正如我们在本文中所展示的那样,准确性和可扩展性并不是信息爆炸时代唯一重要的因素,研究人员还必须关注这些技术的社会方面。
{"title":"Image retrieval: Research and use in the information explosion","authors":"Masashi Inoue","doi":"10.2201/NIIPI.2009.6.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.2","url":null,"abstract":"We surveyed the current research on the retrieval and utilization of images. This paper provides an overview of the difficulties and possibilities of technological or technology-related research topics resulting from the huge amount of images currently available and highlights some of the important research topics. We looked at the ongoing research activities and analyzed them from four aspects, information access and organization technology, the computing infrastructure that enables access to large-scale image resources, issues in human-system interaction and human factors related to using images, and the social aspect of image media. On the technical side, we noticed that as the number of digital images increases, so does the importance of the accuracy and scalability in relation to the image retrieval. The accuracy and scalability are in fact needed to cope with the current explosion in digital images. On the social side, not so long ago, image retrieval technologies were only experimental tools or used by experts within a limited domain. However, now the general public has access to a wide range of digital images, which means that image retrieval technologies are being used by various users in a large diversity of social contexts. Thus, as we show in this paper, the accuracy and scalability are not the only important factors in the era of information explosion, but that researchers must also be concerned with the social aspects of these technologies.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"11 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75257561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A distributed information retrieval manner based on the statistic information for ubiquitous services 一种基于统计信息的泛在服务分布式信息检索方法
Takeshi Tsuchiya, Hiroaki Sawano, Marc Lihan, H. Yoshinaga, K. Koyanagi
We propose and clarify the manner in which a distributed information retrieval (IR) is conducted using a Peer-to-Peer (P2P) technology that has approximately the same accuracy as a current index-integrated search engine with the statistical information calculated from the contents. We need to solve the following three problems to develop distributed IR services that use statistic information. The first one is the manner of the calculation of the statistic information from all the contents and then generating the manner of the indices using the collaboration among distributed peers (nodes). The second problem is the efficiency of the index distribution on the logical space collaborated by the peers which is named the MultipleRing. The last problem is having efficient IR strategies that are highly accurate. We discuss the relationship between the propagation time for generating the statistics information and the system scalability by using simulations and emulations to evaluate the results. Our proposed system is suitable for flexible IR services that use the content environment of small to mid-scale networks such as those in an office.
我们提出并阐明了使用点对点(P2P)技术进行分布式信息检索(IR)的方式,该技术具有与当前索引集成搜索引擎大致相同的准确性,并从内容中计算出统计信息。要开发利用统计信息的分布式IR服务,需要解决以下三个问题。一是利用分布式节点(节点)之间的协作,从所有内容中计算统计信息并生成索引的方式。第二个问题是节点间协作的逻辑空间上索引分布的效率问题,称为乘数。最后一个问题是拥有高效且高度准确的IR策略。通过仿真和仿真,讨论了统计信息生成的传播时间与系统可扩展性之间的关系。我们提出的系统适用于灵活的IR业务,这些业务使用中小型网络(如办公室网络)的内容环境。
{"title":"A distributed information retrieval manner based on the statistic information for ubiquitous services","authors":"Takeshi Tsuchiya, Hiroaki Sawano, Marc Lihan, H. Yoshinaga, K. Koyanagi","doi":"10.2201/NIIPI.2009.6.8","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.8","url":null,"abstract":"We propose and clarify the manner in which a distributed information retrieval (IR) is conducted using a Peer-to-Peer (P2P) technology that has approximately the same accuracy as a current index-integrated search engine with the statistical information calculated from the contents. We need to solve the following three problems to develop distributed IR services that use statistic information. The first one is the manner of the calculation of the statistic information from all the contents and then generating the manner of the indices using the collaboration among distributed peers (nodes). The second problem is the efficiency of the index distribution on the logical space collaborated by the peers which is named the MultipleRing. The last problem is having efficient IR strategies that are highly accurate. We discuss the relationship between the propagation time for generating the statistics information and the system scalability by using simulations and emulations to evaluate the results. Our proposed system is suitable for flexible IR services that use the content environment of small to mid-scale networks such as those in an office.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"12 1","pages":"63-77"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82118838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Buildingweb page collections efficiently exploiting local surrounding pages 有效地利用本地周边页面构建网页集合
Yuxin Wang, K. Oyama
This paper describes a method for building a high-quality web page collection with a reduced manual assessment cost that exploits local surrounding pages. Effectiveness of the method is shown through experiments using a researcher’s homepage as an example of the target categories. The method consists of two processes: rough filtering and accurate classification. In both processes, we introduce a logical page group structure concept that is represented by the relation between an entry page and its surrounding pages based on their connection type and relative URL directory level, and use the contents of local surrounding pages according to that concept. For the first process, we propose a very efficient method for comprehensively gathering all potential researchers’ homepages from the web using property-based keyword lists. Four kinds of page group models (PGMs) based on the page group structure were used for merging the keywords from the surrounding pages. Although a lot of noise pages are included if we use keywords in the surrounding pages without considering the page group structure, the experimental results show that our method can reduce the increase of noise pages to an allowable level and can gather a significant number of the positive pages that could not be gathered using a single-page-based method. For the second process, we propose composing a three-grade classifier using two base classifiers: precision-assured and recall-assured. It classifies the input to assured positive, assured negative, and uncertain pages, where the uncertain pages need a manual assessment, so that the collection quality required by an application can be assured. Each of the base classifiers is further composed of a surrounding page classifier (SC) and an entry page classifier (EC). The SC selects likely component pages and the EC classifies the entry pages using information from both the entry page and the likely component pages. An evident performance improvement of the base classifiers by the introduction of the SC is shown through experiments. Then, the reduction of the number of uncertain pages is evaluated and the effectiveness of the proposed method is shown.
本文描述了一种利用本地周边页面构建高质量网页集的方法,减少了人工评估成本。以某研究员的主页为例,对目标分类进行了实验,证明了该方法的有效性。该方法包括粗过滤和精确分类两个过程。在这两个过程中,我们都引入了一个逻辑页面组结构概念,该概念由条目页面与其周围页面之间的关系(基于它们的连接类型和相对URL目录级别)表示,并根据该概念使用本地周围页面的内容。对于第一个过程,我们提出了一种非常有效的方法,利用基于属性的关键字列表从网络上全面收集所有潜在研究人员的主页。采用四种基于页面组结构的页面组模型(page group model, PGMs)对周边页面进行关键词合并。虽然在不考虑页面组结构的情况下使用周围页面中的关键字会产生大量的噪声页面,但实验结果表明,我们的方法可以将噪声页面的增加减少到允许的水平,并且可以收集到使用基于单页面的方法无法收集到的大量积极页面。对于第二个过程,我们建议使用两个基本分类器组成一个三级分类器:精度保证和召回保证。它将输入分类为确定的正面、确定的负面和不确定的页面,其中不确定的页面需要手动评估,以便可以确保应用程序所需的收集质量。每个基分类器进一步由一个周围页面分类器(SC)和一个条目页面分类器(EC)组成。SC选择可能的组件页面,EC使用来自条目页面和可能的组件页面的信息对条目页面进行分类。实验表明,引入SC后,基分类器的性能有了明显的提高。然后,对不确定页数的减少进行了评估,并证明了所提方法的有效性。
{"title":"Buildingweb page collections efficiently exploiting local surrounding pages","authors":"Yuxin Wang, K. Oyama","doi":"10.2201/NIIPI.2009.6.4","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.4","url":null,"abstract":"This paper describes a method for building a high-quality web page collection with a reduced manual assessment cost that exploits local surrounding pages. Effectiveness of the method is shown through experiments using a researcher’s homepage as an example of the target categories. The method consists of two processes: rough filtering and accurate classification. In both processes, we introduce a logical page group structure concept that is represented by the relation between an entry page and its surrounding pages based on their connection type and relative URL directory level, and use the contents of local surrounding pages according to that concept. For the first process, we propose a very efficient method for comprehensively gathering all potential researchers’ homepages from the web using property-based keyword lists. Four kinds of page group models (PGMs) based on the page group structure were used for merging the keywords from the surrounding pages. Although a lot of noise pages are included if we use keywords in the surrounding pages without considering the page group structure, the experimental results show that our method can reduce the increase of noise pages to an allowable level and can gather a significant number of the positive pages that could not be gathered using a single-page-based method. For the second process, we propose composing a three-grade classifier using two base classifiers: precision-assured and recall-assured. It classifies the input to assured positive, assured negative, and uncertain pages, where the uncertain pages need a manual assessment, so that the collection quality required by an application can be assured. Each of the base classifiers is further composed of a surrounding page classifier (SC) and an entry page classifier (EC). The SC selects likely component pages and the EC classifies the entry pages using information from both the entry page and the likely component pages. An evident performance improvement of the base classifiers by the introduction of the SC is shown through experiments. Then, the reduction of the number of uncertain pages is evaluated and the effectiveness of the proposed method is shown.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"12 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84383071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilization of external knowledge for personal name disambiguation 利用外部知识进行姓名消歧
Q. Vu, A. Takasu, J. Adachi
The amount of information on the World Wide Web (WWW) is increasing at an explosive rate, and the role of computer systems in processing such a huge amount of data has become crucial. In this paper, we focus on the name disambiguation problem when searching for people, because information about people is an important part of the web and improvements to personal information may benefit many web citizens. The name ambiguity problem occurs frequently when searching for people, because a name may be shared by several people. In this research, we use external knowledge while solving this problem, so that we can analyze information in web documents more easily. We collect web directories and use the latent Dirichlet allocation method to extract latent topics from web directories. The extracted topics are used to modify the search result documents so that important contexts that help to discriminate people can be recognized more easily. We carried out experiments with real web documents and verified the advantages of our approach over other disambiguation approaches that use the vector space model and named entity recognition methods.
万维网(WWW)上的信息量正以爆炸性的速度增长,计算机系统在处理如此庞大的数据方面的作用变得至关重要。在本文中,我们关注的是搜索人物时的姓名消歧问题,因为关于人物的信息是网络的重要组成部分,个人信息的改进可能会使许多网民受益。在搜索人员时,经常会出现名称歧义问题,因为一个名称可能由几个人共享。在本研究中,我们在解决这个问题的同时使用了外部知识,这样我们可以更容易地分析web文档中的信息。我们收集web目录,并使用潜在狄利克雷分配方法从web目录中提取潜在主题。提取的主题用于修改搜索结果文档,以便能够更容易地识别有助于区分人员的重要上下文。我们对真实的web文档进行了实验,并验证了我们的方法比其他使用向量空间模型和命名实体识别方法的消歧方法的优势。
{"title":"Utilization of external knowledge for personal name disambiguation","authors":"Q. Vu, A. Takasu, J. Adachi","doi":"10.2201/NIIPI.2009.6.3","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.3","url":null,"abstract":"The amount of information on the World Wide Web (WWW) is increasing at an explosive rate, and the role of computer systems in processing such a huge amount of data has become crucial. In this paper, we focus on the name disambiguation problem when searching for people, because information about people is an important part of the web and improvements to personal information may benefit many web citizens. The name ambiguity problem occurs frequently when searching for people, because a name may be shared by several people. In this research, we use external knowledge while solving this problem, so that we can analyze information in web documents more easily. We collect web directories and use the latent Dirichlet allocation method to extract latent topics from web directories. The extracted topics are used to modify the search result documents so that important contexts that help to discriminate people can be recognized more easily. We carried out experiments with real web documents and verified the advantages of our approach over other disambiguation approaches that use the vector space model and named entity recognition methods.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"101 1","pages":"15"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86776178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of the Shinshu University Online System of General Academic Resources (SOAR) 信州大学通识学术资源在线系统(SOAR)的开发
K. Ishizaka, Masashi Iwai, Masato Gokan, H. Ohba, Ryosuke Sakaguchi
This paper discusses the development of the Shinshu University Online System of General Academic Resources (SOAR). As a participant in the 2006–2007 Cyber Science Infrastructure (CSI) development project of the National Institute of Informatics (NII), Shinshu University is seeking to develop SOAR as an integrated academic resource system. In addition to developing an environment for providing access to the latest academic resources within the university, SOAR is intended to promulgate university research results and research activities, both within Japan and around the world, to a broad audience. Specifically, this system achieves mutual coordination by linking e-journals and the Web of Science to the researcher directory and the institutional repository – two system cornerstones. SOAR can be regarded as a potential model for future academic-resource systems. Although the Institutional Repository (SOAR-IR) was developed using existing software, the Researcher Directory (SOARRD) is a new system based on XML technology.
本文讨论了信州大学通用学术资源在线系统(SOAR)的开发。信州大学作为国立信息科学研究所(NII) 2006-2007年网络科学基础设施(CSI)开发项目的参与者,正在寻求将SOAR开发为综合学术资源系统。除了为获取大学内最新的学术资源提供环境外,SOAR还旨在向广大受众发布日本和世界各地的大学研究成果和研究活动。具体来说,该系统通过将电子期刊和Web of Science与研究者目录和机构知识库这两个系统基石相连接,实现了相互协调。SOAR可以被视为未来学术资源系统的潜在模式。虽然机构存储库(SOAR-IR)是利用现有软件开发的,但研究人员目录(SOARRD)是一个基于XML技术的新系统。
{"title":"Development of the Shinshu University Online System of General Academic Resources (SOAR)","authors":"K. Ishizaka, Masashi Iwai, Masato Gokan, H. Ohba, Ryosuke Sakaguchi","doi":"10.2201/NIIPI.2008.5.11","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.11","url":null,"abstract":"This paper discusses the development of the Shinshu University Online System of General Academic Resources (SOAR). As a participant in the 2006–2007 Cyber Science Infrastructure (CSI) development project of the National Institute of Informatics (NII), Shinshu University is seeking to develop SOAR as an integrated academic resource system. In addition to developing an environment for providing access to the latest academic resources within the university, SOAR is intended to promulgate university research results and research activities, both within Japan and around the world, to a broad audience. Specifically, this system achieves mutual coordination by linking e-journals and the Web of Science to the researcher directory and the institutional repository – two system cornerstones. SOAR can be regarded as a potential model for future academic-resource systems. Although the Institutional Repository (SOAR-IR) was developed using existing software, the Researcher Directory (SOARRD) is a new system based on XML technology.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"24 1","pages":"137-151"},"PeriodicalIF":0.0,"publicationDate":"2008-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73338477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A survey on security patterns 关于安全模式的调查
Nobukazu Yoshioka, H. Washizaki, Katsuhisa Maruyama
Security has become an important topic for many software systems. Security patterns are reusable solutions to security problems. Although many security patterns and techniques for using them have been proposed, it is still difficult to adapt security patterns to each phase of software development. This paper provides a survey of approaches to security patterns. As a result of classifying these approaches, a direction for the integration and future research topics is illustrated.
安全性已经成为许多软件系统的一个重要课题。安全模式是安全问题的可重用解决方案。尽管已经提出了许多安全模式和使用它们的技术,但是要使安全模式适应软件开发的每个阶段仍然很困难。本文概述了实现安全模式的方法。通过对这些方法的分类,指出了整合的方向和未来的研究课题。
{"title":"A survey on security patterns","authors":"Nobukazu Yoshioka, H. Washizaki, Katsuhisa Maruyama","doi":"10.2201/NIIPI.2008.5.5","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.5","url":null,"abstract":"Security has become an important topic for many software systems. Security patterns are reusable solutions to security problems. Although many security patterns and techniques for using them have been proposed, it is still difficult to adapt security patterns to each phase of software development. This paper provides a survey of approaches to security patterns. As a result of classifying these approaches, a direction for the integration and future research topics is illustrated.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"AES-14 1","pages":"35-48"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84545156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 205
Towards robust self-managed systems 走向健壮的自我管理系统
J. Kramer, J. Magee
Software is pervasive. It plays a part in every aspect of our lives, forming a significant part of every automated system or tool that we use, from washing machines to healthcare systems. Like the washing machine, some of these applications are simple, selfcontained devices; however the majority are far more complex. They are generally distributed systems which rely on interacting, distributed subsystems of software components to perform their function. They are expected to interact with users with changing needs and with other systems with unreliable service provision. The challenge is to provide these software systems in such a way that they are robust in the presence of major issues such as change and complexity. Change is inherent, both in the changing needs of users and in the changes which take place in the operational environment of the system. Hence it is essential that our systems can adapt as necessary to continue to achieve their goals. Change is also induced by failures or the unavailability of parts of the system. It is therefore necessary to envisage dynamically changing configurations of software components so as to adapt to the current situation. Dynamic change, which occurs while the system is operational, requires that the system evolves dynamically, and that the adaptation occurs at run-time. Complexity requires that we use rigorous techniques to design, build and analyse our software and thereby avoid unnecessary design flaws. This implies the need for analytical techniques which cope with changing goals and the changing compositions of adaptive software. Since the complexity and response times required by the changes may not permit human intervention, we must plan for automated management of change. The systems themselves must be capable of determining
软件无处不在。它在我们生活的方方面面都发挥着作用,从洗衣机到医疗保健系统,它是我们使用的每个自动化系统或工具的重要组成部分。像洗衣机一样,这些应用程序中的一些是简单的,独立的设备;然而,大多数都要复杂得多。它们通常是分布式系统,依赖于相互作用的分布式软件组件子系统来执行其功能。期望它们与需求不断变化的用户以及提供不可靠服务的其他系统进行交互。挑战在于以这样一种方式提供这些软件系统,即它们在诸如变化和复杂性等主要问题的存在下是健壮的。变化是固有的,无论是用户不断变化的需求,还是系统运行环境发生的变化。因此,至关重要的是,我们的制度能够根据需要进行调整,以继续实现其目标。系统部分的故障或不可用也会引起变更。因此,有必要设想动态改变软件组件的配置,以适应当前的情况。在系统运行时发生的动态更改要求系统动态发展,并且要求在运行时进行适应。复杂性要求我们使用严格的技术来设计、构建和分析我们的软件,从而避免不必要的设计缺陷。这意味着需要分析技术来应对不断变化的目标和适应性软件的不断变化的组成。由于变更所需的复杂性和响应时间可能不允许人工干预,因此我们必须计划变更的自动化管理。系统本身必须能够决定
{"title":"Towards robust self-managed systems","authors":"J. Kramer, J. Magee","doi":"10.2201/NIIPI.2008.5.1","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.1","url":null,"abstract":"Software is pervasive. It plays a part in every aspect of our lives, forming a significant part of every automated system or tool that we use, from washing machines to healthcare systems. Like the washing machine, some of these applications are simple, selfcontained devices; however the majority are far more complex. They are generally distributed systems which rely on interacting, distributed subsystems of software components to perform their function. They are expected to interact with users with changing needs and with other systems with unreliable service provision. The challenge is to provide these software systems in such a way that they are robust in the presence of major issues such as change and complexity. Change is inherent, both in the changing needs of users and in the changes which take place in the operational environment of the system. Hence it is essential that our systems can adapt as necessary to continue to achieve their goals. Change is also induced by failures or the unavailability of parts of the system. It is therefore necessary to envisage dynamically changing configurations of software components so as to adapt to the current situation. Dynamic change, which occurs while the system is operational, requires that the system evolves dynamically, and that the adaptation occurs at run-time. Complexity requires that we use rigorous techniques to design, build and analyse our software and thereby avoid unnecessary design flaws. This implies the need for analytical techniques which cope with changing goals and the changing compositions of adaptive software. Since the complexity and response times required by the changes may not permit human intervention, we must plan for automated management of change. The systems themselves must be capable of determining","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"65 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91172063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CAMNEP: An intrusion detection system for high-speed networks CAMNEP:用于高速网络的入侵检测系统
M. Rehák, M. Pechoucek, Karel Bartos, Martin Grill, Pavel Čeleda, Vojtech Krmicek
The presented research aims to detect malicious traffic in highspeed networks by means of correlated anomaly detectionmethods. In order to acquire the real-time traffic statisticsin NetFlow format, we deploy transparent inline probes based onFPGA elements. They provide traffic statistics to theagent-based detection layer, where each agent uses a specificanomaly detection method to detect anomalies and describe theflows in its extended trust model. The agents share the anomalyassessments of individual network flows that are used as aninput for the agents trust models. The trustfulness values ofindividual flows from all agents are combined to estimate theirmaliciousness. The estimate of trust is subsequently used tofilter out the most significant events that are reported tonetwork operators for further analysis. We argue that the useof trust model for integration of several anomaly detectionmethods and efficient representation of history data shallreduce the high rate of false positives (legitimate trafficclassified as malicious) which limits the effectiveness ofcurrent intrusion detection systems.
本研究旨在利用相关异常检测方法检测高速网络中的恶意流量。为了获取NetFlow格式的实时流量统计数据,我们部署了基于fpga元件的透明内联探针。它们为基于代理的检测层提供流量统计数据,其中每个代理使用特定的异常检测方法来检测异常并在其扩展的信任模型中描述流量。代理共享单个网络流的异常评估,这些评估用作代理信任模型的输入。将来自所有代理的单个流的信任值组合起来以估计其恶意程度。信任的估计随后被用来过滤掉报告给网络运营商的最重要的事件,以供进一步分析。我们认为,使用信任模型集成多种异常检测方法和有效的历史数据表示将降低高误报率(合法流量被归类为恶意流量),这限制了当前入侵检测系统的有效性。
{"title":"CAMNEP: An intrusion detection system for high-speed networks","authors":"M. Rehák, M. Pechoucek, Karel Bartos, Martin Grill, Pavel Čeleda, Vojtech Krmicek","doi":"10.2201/NIIPI.2008.5.7","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.7","url":null,"abstract":"The presented research aims to detect malicious traffic in high\u0000speed networks by means of correlated anomaly detection\u0000methods. In order to acquire the real-time traffic statistics\u0000in NetFlow format, we deploy transparent inline probes based on\u0000FPGA elements. They provide traffic statistics to the\u0000agent-based detection layer, where each agent uses a specific\u0000anomaly detection method to detect anomalies and describe the\u0000flows in its extended trust model. The agents share the anomaly\u0000assessments of individual network flows that are used as an\u0000input for the agents trust models. The trustfulness values of\u0000individual flows from all agents are combined to estimate their\u0000maliciousness. The estimate of trust is subsequently used to\u0000filter out the most significant events that are reported to\u0000network operators for further analysis. We argue that the use\u0000of trust model for integration of several anomaly detection\u0000methods and efficient representation of history data shall\u0000reduce the high rate of false positives (legitimate traffic\u0000classified as malicious) which limits the effectiveness of\u0000current intrusion detection systems.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"10 1","pages":"65"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73271235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Security software engineering in wireless sensor networks 无线传感器网络中的安全软件工程
E. Platon, Y. Sei
Th ee ngineering of security is an essential discipline in software engineering. It requires one to embrace a holistic approach, as any weakness along the engineering process of the system may lead to future security breaches. It is in general difficult to achieve and becomes particularly acute in wireless sensor networks, owing to the stringent limitations in communication an dc omputational power. We survey the current state of the art on this topic and set forth issues that require further study. The analysis of current work covers general security issues of wireless sensor network research and discusse st he present achievements for engineering security with regards to earlier surveys in this domain. We also cover security capabilities of major implementation platforms, namely TinyOS and Sun SPOT TM ,a ndpresent available and required mechanisms that will become essential for software engineers.
安全工程是软件工程中的一门重要学科。它要求人们采用整体方法,因为系统工程过程中的任何弱点都可能导致未来的安全漏洞。由于通信和直流计算能力的严格限制,这在无线传感器网络中通常很难实现,并且变得特别尖锐。我们调查了这一主题的现状,并提出了需要进一步研究的问题。对当前工作的分析涵盖了无线传感器网络研究的一般安全问题,并讨论了该领域早期调查的工程安全成果。我们还介绍了主要实现平台的安全功能,即TinyOS和Sun SPOT TM,这是一种现有的和必需的机制,将成为软件工程师必不可少的。
{"title":"Security software engineering in wireless sensor networks","authors":"E. Platon, Y. Sei","doi":"10.2201/NIIPI.2008.5.6","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.6","url":null,"abstract":"Th ee ngineering of security is an essential discipline in software engineering. It requires one to embrace a holistic approach, as any weakness along the engineering process of the system may lead to future security breaches. It is in general difficult to achieve and becomes particularly acute in wireless sensor networks, owing to the stringent limitations in communication an dc omputational power. We survey the current state of the art on this topic and set forth issues that require further study. The analysis of current work covers general security issues of wireless sensor network research and discusse st he present achievements for engineering security with regards to earlier surveys in this domain. We also cover security capabilities of major implementation platforms, namely TinyOS and Sun SPOT TM ,a ndpresent available and required mechanisms that will become essential for software engineers.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"42 1","pages":"49"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74261570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Special issue: The future of software engineering for security and privacy 特刊:安全与隐私的软件工程的未来
S. Honiden, B. Nuseibeh
The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving overall systems security. This special issue provides a forum for discussing research directions in software engineering for developing secure systems more effectively. It comprises seven papers that underwent one or more cycles of anonymous peer review and revision. The first paper on “PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application”, by Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri, presents an automated tool to support users and providers of information systems, to help them understand the threats and the requirements of these systems. The paper focuses on Java mobile code applications. The second paper on “Curriculum Design and Methodologies for Security Requirements Analysis”, by Kenji Taguchi and Yasuyuki Tahara, describes the authors’ Security Requirements Analysis educational course, part of the Top SE project, to teach the students how to find and fix security defects in software, as early as possible in the systems development life cycle. The third paper on “A Survey on Security Patterns”, by Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama, surveys existing approaches to establishing security patterns, which are reusable solutions to security problems, and illustrates a direction for the integration of patterns into the development life cycle. The fourth paper on “Software Security Engineer-
基于计算机的系统操纵的关键任务资产的滥用规模增加了,因为它们可以通过因特网和系统自动化在全世界范围内使用。安全就是要防止这种滥用。明确考虑安全风险和威胁的软件系统开发日益被认为是提高整体系统安全性的关键。为更有效地开发安全系统提供了一个讨论软件工程研究方向的论坛。它由七篇论文组成,这些论文经历了一个或多个匿名同行评审和修订周期。由Haruhiko Kaiya、Kouta Sasaki和Kenji Kaijiri撰写的关于“PORTAM:移动代码应用程序的策略、需求和威胁分析器”的第一篇论文提出了一个自动化工具来支持信息系统的用户和提供者,帮助他们理解这些系统的威胁和需求。本文重点研究了Java手机代码的应用。Kenji Taguchi和Yasuyuki Tahara撰写的关于“安全需求分析的课程设计和方法”的第二篇论文描述了作者的安全需求分析教育课程,该课程是Top SE项目的一部分,旨在教学生如何在系统开发生命周期中尽早发现和修复软件中的安全缺陷。由Nobukazu Yoshioka、Hironori Washizaki和Katsuhisa Maruyama撰写的关于“安全模式综述”的第三篇论文调查了建立安全模式的现有方法,这些模式是安全问题的可重用解决方案,并说明了将模式集成到开发生命周期中的方向。第四篇论文关于“软件安全工程师”
{"title":"Special issue: The future of software engineering for security and privacy","authors":"S. Honiden, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.2","url":null,"abstract":"The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving overall systems security. This special issue provides a forum for discussing research directions in software engineering for developing secure systems more effectively. It comprises seven papers that underwent one or more cycles of anonymous peer review and revision. The first paper on “PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application”, by Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri, presents an automated tool to support users and providers of information systems, to help them understand the threats and the requirements of these systems. The paper focuses on Java mobile code applications. The second paper on “Curriculum Design and Methodologies for Security Requirements Analysis”, by Kenji Taguchi and Yasuyuki Tahara, describes the authors’ Security Requirements Analysis educational course, part of the Top SE project, to teach the students how to find and fix security defects in software, as early as possible in the systems development life cycle. The third paper on “A Survey on Security Patterns”, by Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama, surveys existing approaches to establishing security patterns, which are reusable solutions to security problems, and illustrates a direction for the integration of patterns into the development life cycle. The fourth paper on “Software Security Engineer-","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"1 1","pages":"5-6"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77963211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1