... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing最新文献
Lack of security is one of the most widespread problems affecting information systems. Security breaches at companies are reported almost everyday and users of computer systems are busy updating security of their computer system against vulnerabilities. While some of these problems are caused by human errors and faults of physical devices but the majority of them are due to the defects in software systems. The best way to reduce them is to find and fix them in an early stage of the software development, especially in the requirements elicitation and analysis phases. In this paper, we will present how we designed a security requirements analysis course to address this issue. We will also present security requirements elicitation methodologies based on the agentand goal-oriented requirements analysis methodologies of KAOS and i*.
{"title":"Curriculum design and methodologies for security requirements analysis","authors":"K. Taguchi, Yasuyuki Tahara","doi":"10.2201/NIIPI.2008.5.4","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.4","url":null,"abstract":"Lack of security is one of the most widespread problems affecting information systems. Security breaches at companies are reported almost everyday and users of computer systems are busy updating security of their computer system against vulnerabilities. While some of these problems are caused by human errors and faults of physical devices but the majority of them are due to the defects in software systems. The best way to reduce them is to find and fix them in an early stage of the software development, especially in the requirements elicitation and analysis phases. In this paper, we will present how we designed a security requirements analysis course to address this issue. We will also present security requirements elicitation methodologies based on the agentand goal-oriented requirements analysis methodologies of KAOS and i*.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"104 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76375759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present the approach adopted at the UK’s Open University for teaching computer security to large numbers of students at a distance through supported open learning. We discuss how the production of learning materials at the university has had to change to reflect the ever-increasing rate of technological, legislative and social change within the computing discipline, and how the university has had to rethink the role of the academic in th ec ourse development process. We argue that computer security is best taught starting at th ee arliest level of undergraduate teaching and continuing through in-depth postgraduate study. We discuss our approach which combines the traditional technical aspects of security with discussions on the professional and ethical issues surrounding security and privacy. This approach presents computer security and privacy in the light of relevant legislative and regulatory regimes, thus the students have a firm grounding in the relevant national and international laws. We discuss the importance of international standards for information security risk assessment and management and as well as the relevance of forensic computing to a computer security curriculum. We conclude with an examination of our course development methodology and argue for a practitioner-led approach to teaching.
{"title":"Placing computer security at the heart of learning","authors":"M. Richards, B. Price, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.9","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.9","url":null,"abstract":"In this paper we present the approach adopted at the UK’s Open University for teaching computer security to large numbers of students at a distance through supported open learning. We discuss how the production of learning materials at the university has had to change to reflect the ever-increasing rate of technological, legislative and social change within the computing discipline, and how the university has had to rethink the role of the academic in th ec ourse development process. We argue that computer security is best taught starting at th ee arliest level of undergraduate teaching and continuing through in-depth postgraduate study. We discuss our approach which combines the traditional technical aspects of security with discussions on the professional and ethical issues surrounding security and privacy. This approach presents computer security and privacy in the light of relevant legislative and regulatory regimes, thus the students have a firm grounding in the relevant national and international laws. We discuss the importance of international standards for information security risk assessment and management and as well as the relevance of forensic computing to a computer security curriculum. We conclude with an examination of our course development methodology and argue for a practitioner-led approach to teaching.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"90 1","pages":"91"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83459946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security engineering is about protecting assets from harm. The feature interaction problem occurs when the composition of features leads to undesirable system behaviours. Usually, this problem manifests itself as conflicting actions of features on a shared context. Security requirements may be violated by feature interactions creating security vulnerabilities which can potentially be exploited by attackers. In thi sp aper, we discuss the feature interaction problem and some of its possible implications for security requirements. The paper concludes that (1) the detection of the violation of security requirements by feature interactions is not different from other types of requirements - what differs is the impact of such violation; and (2)feature interaction detection approaches can be used as a means for vulnerability analysis.
{"title":"Feature interaction: the security threat from within software systems","authors":"A. Nhlabatsi, R. Laney, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.8","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.8","url":null,"abstract":"Security engineering is about protecting assets from harm. The feature interaction problem occurs when the composition of features leads to undesirable system behaviours. Usually, this problem manifests itself as conflicting actions of features on a shared context. Security requirements may be violated by feature interactions creating security vulnerabilities which can potentially be exploited by attackers. In thi sp aper, we discuss the feature interaction problem and some of its possible implications for security requirements. The paper concludes that (1) the detection of the violation of security requirements by feature interactions is not different from other types of requirements - what differs is the impact of such violation; and (2)feature interaction detection approaches can be used as a means for vulnerability analysis.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"47 1","pages":"75"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87139850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ono, E. Andaroodi, A. Einifar, N. Abe, M. Matini, O. Bouet, F. Chopin, T. Kawai, A. Kitamoto, Asaka Ito, E. Mokhtari, Saeed Einifar, Seyyed Mohammad Beheshti, C. Adle
This paper provides a report of a research project on virtual revival of the Citadel of Bam, a UNESCO world heritage site in danger that was destroyed in an earthquake in 2003. The simulation of damaged buildings that lies along the primary axes of the citadel and 3-D reconstitution using state-of-the-art 3DCG tools are presented. The key approach to 3-D modeling of the destroyed buildings is complementary usage of heterogeneous data such as 2-D maps, photos, cartography maps, and sketches in collaboration between different teams. As the basic 2-D maps had error, analytic and comparative research is conducted on diverse data resources to create a knowledge-base for the 3DCG restoration of the site. The process of modeling is completed with regard to the complicated and curved mud brick buildings with traditional architectural details. For this purpose proper functions of the tools is selected and in some cases different tools are used. The modeling is done by linking the component with their semantic by a metadata-based layer naming process. The tasks of evaluating the historical, architectural, and technical details of the 3-D buildings are done in parallel with the modeling by a team of CG and architecture experts in order to increase the precision of the 3DCG reconstitution so that it can be used as a reference for the physical restoration. The first trial version of virtual reality demonstration of the main axes of the Citadel of Bam is described. The paper concludes with proposals to enhance the process of simulation and also to open the restricted views of the virtual reconstitution on Internet.
{"title":"3DCG reconstitution and virtual reality of UNESCO world heritage in danger: the Citadel of Bam","authors":"K. Ono, E. Andaroodi, A. Einifar, N. Abe, M. Matini, O. Bouet, F. Chopin, T. Kawai, A. Kitamoto, Asaka Ito, E. Mokhtari, Saeed Einifar, Seyyed Mohammad Beheshti, C. Adle","doi":"10.2201/NIIPI.2008.5.10","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.10","url":null,"abstract":"This paper provides a report of a research project on virtual revival of the Citadel of Bam, a UNESCO world heritage site in danger that was destroyed in an earthquake in 2003. The simulation of damaged buildings that lies along the primary axes of the citadel and 3-D reconstitution using state-of-the-art 3DCG tools are presented. The key approach to 3-D modeling of the destroyed buildings is complementary usage of heterogeneous data such as 2-D maps, photos, cartography maps, and sketches in collaboration between different teams. As the basic 2-D maps had error, analytic and comparative research is conducted on diverse data resources to create a knowledge-base for the 3DCG restoration of the site. The process of modeling is completed with regard to the complicated and curved mud brick buildings with traditional architectural details. For this purpose proper functions of the tools is selected and in some cases different tools are used. The modeling is done by linking the component with their semantic by a metadata-based layer naming process. The tasks of evaluating the historical, architectural, and technical details of the 3-D buildings are done in parallel with the modeling by a team of CG and architecture experts in order to increase the precision of the 3DCG reconstitution so that it can be used as a reference for the physical restoration. The first trial version of virtual reality demonstration of the main axes of the Citadel of Bam is described. The paper concludes with proposals to enhance the process of simulation and also to open the restricted views of the virtual reconstitution on Internet.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"1 1","pages":"99-136"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90940389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. Tran, T. Pham, Quoc Hung Ngo, D. Dinh, Nigel Collier
NamedEntityRecognition (NER) aimstoclassify wordsin a documentintopre-definedtarget entity classes and is now considered to be fundamental for many natural language processing tasks such a si nformation retrieval, machine translation, information extraction and question answering. This paper presents the results of an experiment in which a Support Vector Machine (SVM) based NER model is applied to the Vietnamese language. Though this state of the art machine learning method has been widely applied to NER in several well-studied languages, this is the first time this method has been applied to Vietnamese. In a comparison against Conditional Random Fields (CRFs) the SVM model was shown to outperform CRF by optimizing its feature window size, obtaining an overall F-score of 87.75. The paper also presents a detailed discussion about the characteristics of the Vietnamese language and provides an analysis of the factors which influence performance in this task.
{"title":"Named Entity Recognition in Vietnamese documents","authors":"Q. Tran, T. Pham, Quoc Hung Ngo, D. Dinh, Nigel Collier","doi":"10.2201/NIIPI.2007.4.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.2","url":null,"abstract":"NamedEntityRecognition (NER) aimstoclassify wordsin a documentintopre-definedtarget entity classes and is now considered to be fundamental for many natural language processing tasks such a si nformation retrieval, machine translation, information extraction and question answering. This paper presents the results of an experiment in which a Support Vector Machine (SVM) based NER model is applied to the Vietnamese language. Though this state of the art machine learning method has been widely applied to NER in several well-studied languages, this is the first time this method has been applied to Vietnamese. In a comparison against Conditional Random Fields (CRFs) the SVM model was shown to outperform CRF by optimizing its feature window size, obtaining an overall F-score of 87.75. The paper also presents a detailed discussion about the characteristics of the Vietnamese language and provides an analysis of the factors which influence performance in this task.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"21 1 1","pages":"5"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84833153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Tutiya, Hiroya Takeuchi, Yoshinori Sato, Hiroshi Itsumura
The present articl ed escribes basic facts about the interuniversity cooperative library service that has been in practice in Japan since mid-1990s by way of an ILL request message sending system called NACSIS-ILL. The study underlying the article is based on the data recorded by th es yste mf rom 199 4t o2005. Among major findings are that the “Interlibrary Loan (ILL)” in the Japanese university context is very peculiar in that requests for photocopies of “foreign journal” articles are significantly predominant in 1990s; that, ironically, increase of requests for “domestic journal” articles, including those in nursing science in particular, is becoming conspicuous as if to match the decrease of requests for “foreign journal” articles, most of which have become available online through site licensing under consortial arrangements that began in 2002; that requests for book loan, which have only accounted for a small portion of requests, apparently increased as the union catalog database called NACSIS-CAT grew; that th es yste mi sr emarkably efficient with the fill rates in lending/supplying constantly high and the average turnaround time generally less than a week; that while the original intention was construction o fa mutually beneficiary collaborative system, there have been some libraries that mainly only request and others that mainly only supply, due partly to the existence of “subject foreign journal center” libraries which started in 1970s; and that some small or middle-sized libraries noticeably began to supply in recent years.
{"title":"ILL/DD in Japan across the turn of the century : basic findings about NACSIS-ILL from 1994 to 2005","authors":"S. Tutiya, Hiroya Takeuchi, Yoshinori Sato, Hiroshi Itsumura","doi":"10.2201/NIIPI.2007.4.4","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.4","url":null,"abstract":"The present articl ed escribes basic facts about the interuniversity cooperative library service that has been in practice in Japan since mid-1990s by way of an ILL request message sending system called NACSIS-ILL. The study underlying the article is based on the data recorded by th es yste mf rom 199 4t o2005. Among major findings are that the “Interlibrary Loan (ILL)” in the Japanese university context is very peculiar in that requests for photocopies of “foreign journal” articles are significantly predominant in 1990s; that, ironically, increase of requests for “domestic journal” articles, including those in nursing science in particular, is becoming conspicuous as if to match the decrease of requests for “foreign journal” articles, most of which have become available online through site licensing under consortial arrangements that began in 2002; that requests for book loan, which have only accounted for a small portion of requests, apparently increased as the union catalog database called NACSIS-CAT grew; that th es yste mi sr emarkably efficient with the fill rates in lending/supplying constantly high and the average turnaround time generally less than a week; that while the original intention was construction o fa mutually beneficiary collaborative system, there have been some libraries that mainly only request and others that mainly only supply, due partly to the existence of “subject foreign journal center” libraries which started in 1970s; and that some small or middle-sized libraries noticeably began to supply in recent years.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"16 1","pages":"29-48"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82443992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An XQuery optimization by rewriting based on a partial evaluation using folding expressions is proposed. It consists of two parts: one is the main algorithm, which is a recursive algorithm based on an inductive definition of XQuery expressions. The other is invoked by the main algorithm with an expression whose subexpressions are already folded as its input, and it applies the expression-specific folding function. The main contributions of this paper is to propose analgorithmofanexpression-specificfoldingcalled“child-pathfolding”. Fora given query to the child axis over an element constructed by another XQuery, that is, a composite XQuery, this folding eliminates redundant element construction operators and expressions. These kinds of queries are typical in Global-As-View approach to data integration systems. We also show thatallredundant elementconstructionoperators and expressions in child-path expressions are eliminated by applying auxiliary transformations. In addition to child-path folding, we discuss folding of major XQuery constructors including FLWOR and quantified expressions. Moreover, we improve the rewriting algorithm based on pruning by adding two annotations to the parsed trees of XQuery expressions.
{"title":"Rewriting XQuery by child-path folding","authors":"H. Kato, S. Hidaka, Masatoshi Yoshikawa","doi":"10.2201/NIIPI.2007.4.3","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.3","url":null,"abstract":"An XQuery optimization by rewriting based on a partial evaluation using folding expressions is proposed. It consists of two parts: one is the main algorithm, which is a recursive algorithm based on an inductive definition of XQuery expressions. The other is invoked by the main algorithm with an expression whose subexpressions are already folded as its input, and it applies the expression-specific folding function. The main contributions of this paper is to propose analgorithmofanexpression-specificfoldingcalled“child-pathfolding”. Fora given query to the child axis over an element constructed by another XQuery, that is, a composite XQuery, this folding eliminates redundant element construction operators and expressions. These kinds of queries are typical in Global-As-View approach to data integration systems. We also show thatallredundant elementconstructionoperators and expressions in child-path expressions are eliminated by applying auxiliary transformations. In addition to child-path folding, we discuss folding of major XQuery constructors including FLWOR and quantified expressions. Moreover, we improve the rewriting algorithm based on pruning by adding two annotations to the parsed trees of XQuery expressions.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"3 1","pages":"15"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82765590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nishizawa, M. Negishi, Morio Shibayama, Yuan Sun, Hiroyasu Nomura, Masafumi Maeda, Yoshitaka Mitsuda
The system of Grants-in-Aid for Scientific Research from the Ministry of Education, Culture, Sports, Science and Technology (MEXT) is one of the oldest funding systems for researchers belonging to universities and institutes in Japan. The fund is allotted to researchers by peer review of their applications for research projects. The total number of subjects of Grantsin-Aid for Scientific Research allotted to the individual research fields from fiscal years (FY) 1998 to 2002 were tallied for each university and institute. The purpose of this report is to rank funded subjects as an index of the research activities of each university and institute. Furthermore, using the database for FY 2003, for which the ministry undertook a large revision to the classification of academic fields, we show the relationship between the situations before and after the classification changes. We indicate whether the last revision has caused significant shifts in the allocation of funds. This paper contains information abstracted from six series of NII Technical Reports from FY 1998 to 2002 and five series for FY 2003.
{"title":"Evaluation of Japanese universities' research activity based on the number of awards of Grants-in-Aid for Scientific Research from 1998 to 2002 and in 2003","authors":"M. Nishizawa, M. Negishi, Morio Shibayama, Yuan Sun, Hiroyasu Nomura, Masafumi Maeda, Yoshitaka Mitsuda","doi":"10.2201/NIIPI.2007.4.7","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.7","url":null,"abstract":"The system of Grants-in-Aid for Scientific Research from the Ministry of Education, Culture, Sports, Science and Technology (MEXT) is one of the oldest funding systems for researchers belonging to universities and institutes in Japan. The fund is allotted to researchers by peer review of their applications for research projects. The total number of subjects of Grantsin-Aid for Scientific Research allotted to the individual research fields from fiscal years (FY) 1998 to 2002 were tallied for each university and institute. The purpose of this report is to rank funded subjects as an index of the research activities of each university and institute. Furthermore, using the database for FY 2003, for which the ministry undertook a large revision to the classification of academic fields, we show the relationship between the situations before and after the classification changes. We indicate whether the last revision has caused significant shifts in the allocation of funds. This paper contains information abstracted from six series of NII Technical Reports from FY 1998 to 2002 and five series for FY 2003.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"33 1","pages":"79"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81434456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Urushidani, S. Abe, J. Matsukata, Yusheng Ji, K. Fukuda, M. Koibuchi, S. Yamada
This paper outlines the next-generation science information network, called SINET3, which will be launched in April 2007 as the integrated successor network to SINET and SuperSINET. Using leading-edge networking technologies, SINET3 will provide a rich variety of network services and will adapt flexibly to the needs of the research and education community. The network services include multi-layer services such as IP, Ethernet, and lambda services, well-prepared virtual private network services for collaborative research among related organizations, and layer-1 bandwidth on demand services for emerging high-performance applications. Introducing layer-1 switches as core network components, the network will be structurally changed into an advanced hybrid optical and IP/MPLS network and will form a nationwide innovative network infrastructure for the research and education community. This paper gives an overview of SINET3 from the viewpoints of network services, network architecture, and networking technologies.
{"title":"Overview of SINET3-next-generation Science Information Network","authors":"S. Urushidani, S. Abe, J. Matsukata, Yusheng Ji, K. Fukuda, M. Koibuchi, S. Yamada","doi":"10.2201/NIIPI.2007.4.5","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.5","url":null,"abstract":"This paper outlines the next-generation science information network, called SINET3, which will be launched in April 2007 as the integrated successor network to SINET and SuperSINET. Using leading-edge networking technologies, SINET3 will provide a rich variety of network services and will adapt flexibly to the needs of the research and education community. The network services include multi-layer services such as IP, Ethernet, and lambda services, well-prepared virtual private network services for collaborative research among related organizations, and layer-1 bandwidth on demand services for emerging high-performance applications. Introducing layer-1 switches as core network components, the network will be structurally changed into an advanced hybrid optical and IP/MPLS network and will form a nationwide innovative network infrastructure for the research and education community. This paper gives an overview of SINET3 from the viewpoints of network services, network architecture, and networking technologies.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"27 1","pages":"51"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90520698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Washizaki, Kobayashi Yasuhide, Watanabe Hiroyuki, Eiji Nakajima, Y. Hagiwara, Kenji Hiranabe, Kazuya Fukuda
A robot design contest, called the “Embedded Technology (ET) Software Design Robot Contest,” which involves designing software to automatically control a line-trace robot, was held in Tokyo, in 2005. The contest was intended to provide a practical opportunity to educate young Japanese developers in the field of embedded software development. In this paper, we give the results of the contest from the viewpoint of software quality evaluation. We created a framework for evaluating software quality, which integrated the design model quality and the final system performance, and we conducted an analysis using this framework. As a result of the analysis, the quantitative measurement of the structural complexity of the design model was found to have a strong relationship to the qualitative evaluation of the design by the contest judges. On the other hand, no strong correlation between the design model quality evaluated by the judges and the final system performance was found. For embedded software development, it is particularly important to estimate and verify reliability and performance in the early stages, according to the design and analysis models. Based on the results, we consider possible remedies with respect to the models submitted, the evaluation methods used, and the contest specifications. To adequately measure several quality characteristics, including performance, in terms of a model, it is necessary to improve the approach to developing robot software (for example, by applying model-driven development) and to reexamine the
{"title":"Quality evaluation of embedded software in robot software design contest","authors":"H. Washizaki, Kobayashi Yasuhide, Watanabe Hiroyuki, Eiji Nakajima, Y. Hagiwara, Kenji Hiranabe, Kazuya Fukuda","doi":"10.2201/NIIPI.2007.4.6","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.6","url":null,"abstract":"A robot design contest, called the “Embedded Technology (ET) Software Design Robot Contest,” which involves designing software to automatically control a line-trace robot, was held in Tokyo, in 2005. The contest was intended to provide a practical opportunity to educate young Japanese developers in the field of embedded software development. In this paper, we give the results of the contest from the viewpoint of software quality evaluation. We created a framework for evaluating software quality, which integrated the design model quality and the final system performance, and we conducted an analysis using this framework. As a result of the analysis, the quantitative measurement of the structural complexity of the design model was found to have a strong relationship to the qualitative evaluation of the design by the contest judges. On the other hand, no strong correlation between the design model quality evaluated by the judges and the final system performance was found. For embedded software development, it is particularly important to estimate and verify reliability and performance in the early stages, according to the design and analysis models. Based on the results, we consider possible remedies with respect to the models submitted, the evaluation methods used, and the contest specifications. To adequately measure several quality characteristics, including performance, in terms of a model, it is necessary to improve the approach to developing robot software (for example, by applying model-driven development) and to reexamine the","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"67 1","pages":"63-78"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83853565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing