首页 > 最新文献

... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing最新文献

英文 中文
Curriculum design and methodologies for security requirements analysis 安全需求分析的课程设计和方法
K. Taguchi, Yasuyuki Tahara
Lack of security is one of the most widespread problems affecting information systems. Security breaches at companies are reported almost everyday and users of computer systems are busy updating security of their computer system against vulnerabilities. While some of these problems are caused by human errors and faults of physical devices but the majority of them are due to the defects in software systems. The best way to reduce them is to find and fix them in an early stage of the software development, especially in the requirements elicitation and analysis phases. In this paper, we will present how we designed a security requirements analysis course to address this issue. We will also present security requirements elicitation methodologies based on the agentand goal-oriented requirements analysis methodologies of KAOS and i*.
缺乏安全性是影响信息系统的最普遍的问题之一。几乎每天都有公司的安全漏洞报告,计算机系统的用户忙于更新他们的计算机系统的安全漏洞。虽然这些问题有些是人为错误和物理设备故障造成的,但大多数是由于软件系统的缺陷造成的。减少它们的最好方法是在软件开发的早期阶段找到并修复它们,特别是在需求引出和分析阶段。在本文中,我们将介绍如何设计一个安全需求分析课程来解决这个问题。我们还将介绍基于KAOS和i*的代理和面向目标的需求分析方法的安全需求引出方法。
{"title":"Curriculum design and methodologies for security requirements analysis","authors":"K. Taguchi, Yasuyuki Tahara","doi":"10.2201/NIIPI.2008.5.4","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.4","url":null,"abstract":"Lack of security is one of the most widespread problems affecting information systems. Security breaches at companies are reported almost everyday and users of computer systems are busy updating security of their computer system against vulnerabilities. While some of these problems are caused by human errors and faults of physical devices but the majority of them are due to the defects in software systems. The best way to reduce them is to find and fix them in an early stage of the software development, especially in the requirements elicitation and analysis phases. In this paper, we will present how we designed a security requirements analysis course to address this issue. We will also present security requirements elicitation methodologies based on the agentand goal-oriented requirements analysis methodologies of KAOS and i*.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"104 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76375759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Placing computer security at the heart of learning 将计算机安全置于学习的核心
M. Richards, B. Price, B. Nuseibeh
In this paper we present the approach adopted at the UK’s Open University for teaching computer security to large numbers of students at a distance through supported open learning. We discuss how the production of learning materials at the university has had to change to reflect the ever-increasing rate of technological, legislative and social change within the computing discipline, and how the university has had to rethink the role of the academic in th ec ourse development process. We argue that computer security is best taught starting at th ee arliest level of undergraduate teaching and continuing through in-depth postgraduate study. We discuss our approach which combines the traditional technical aspects of security with discussions on the professional and ethical issues surrounding security and privacy. This approach presents computer security and privacy in the light of relevant legislative and regulatory regimes, thus the students have a firm grounding in the relevant national and international laws. We discuss the importance of international standards for information security risk assessment and management and as well as the relevance of forensic computing to a computer security curriculum. We conclude with an examination of our course development methodology and argue for a practitioner-led approach to teaching.
在本文中,我们介绍了英国开放大学采用的方法,通过支持开放学习向大量远程学生教授计算机安全。我们讨论了牛津大学学习材料的制作如何改变,以反映计算机学科内不断增长的技术、立法和社会变革的速度,以及牛津大学如何重新思考学术在计算机课程开发过程中的作用。我们认为计算机安全最好从本科教学的最初阶段开始,并通过深入的研究生学习继续教授。我们讨论了我们的方法,将安全的传统技术方面与围绕安全和隐私的专业和道德问题的讨论相结合。该课程从相关立法和监管制度的角度来介绍计算机安全和隐私,从而使学生在相关的国家和国际法律方面有坚实的基础。我们讨论了信息安全风险评估和管理的国际标准的重要性,以及法庭计算与计算机安全课程的相关性。最后,我们对课程开发方法进行了检查,并主张采用以从业者为主导的教学方法。
{"title":"Placing computer security at the heart of learning","authors":"M. Richards, B. Price, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.9","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.9","url":null,"abstract":"In this paper we present the approach adopted at the UK’s Open University for teaching computer security to large numbers of students at a distance through supported open learning. We discuss how the production of learning materials at the university has had to change to reflect the ever-increasing rate of technological, legislative and social change within the computing discipline, and how the university has had to rethink the role of the academic in th ec ourse development process. We argue that computer security is best taught starting at th ee arliest level of undergraduate teaching and continuing through in-depth postgraduate study. We discuss our approach which combines the traditional technical aspects of security with discussions on the professional and ethical issues surrounding security and privacy. This approach presents computer security and privacy in the light of relevant legislative and regulatory regimes, thus the students have a firm grounding in the relevant national and international laws. We discuss the importance of international standards for information security risk assessment and management and as well as the relevance of forensic computing to a computer security curriculum. We conclude with an examination of our course development methodology and argue for a practitioner-led approach to teaching.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"90 1","pages":"91"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83459946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feature interaction: the security threat from within software systems 功能交互:来自软件系统内部的安全威胁
A. Nhlabatsi, R. Laney, B. Nuseibeh
Security engineering is about protecting assets from harm. The feature interaction problem occurs when the composition of features leads to undesirable system behaviours. Usually, this problem manifests itself as conflicting actions of features on a shared context. Security requirements may be violated by feature interactions creating security vulnerabilities which can potentially be exploited by attackers. In thi sp aper, we discuss the feature interaction problem and some of its possible implications for security requirements. The paper concludes that (1) the detection of the violation of security requirements by feature interactions is not different from other types of requirements - what differs is the impact of such violation; and (2)feature interaction detection approaches can be used as a means for vulnerability analysis.
安全工程是关于保护资产免受伤害。当特征的组合导致不期望的系统行为时,就会出现特征交互问题。通常,这个问题表现为共享上下文中功能的冲突行为。功能交互可能会违反安全需求,从而产生可能被攻击者利用的安全漏洞。在本文中,我们讨论了功能交互问题及其对安全需求的一些可能含义。本文的结论是:(1)特征交互对违反安全需求的检测与其他类型的需求没有什么不同——不同的是这种违反的影响;(2)特征交互检测方法可以作为漏洞分析的手段。
{"title":"Feature interaction: the security threat from within software systems","authors":"A. Nhlabatsi, R. Laney, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.8","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.8","url":null,"abstract":"Security engineering is about protecting assets from harm. The feature interaction problem occurs when the composition of features leads to undesirable system behaviours. Usually, this problem manifests itself as conflicting actions of features on a shared context. Security requirements may be violated by feature interactions creating security vulnerabilities which can potentially be exploited by attackers. In thi sp aper, we discuss the feature interaction problem and some of its possible implications for security requirements. The paper concludes that (1) the detection of the violation of security requirements by feature interactions is not different from other types of requirements - what differs is the impact of such violation; and (2)feature interaction detection approaches can be used as a means for vulnerability analysis.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"47 1","pages":"75"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87139850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
3DCG reconstitution and virtual reality of UNESCO world heritage in danger: the Citadel of Bam 联合国教科文组织濒危世界遗产:巴姆城堡的3DCG重建与虚拟现实
K. Ono, E. Andaroodi, A. Einifar, N. Abe, M. Matini, O. Bouet, F. Chopin, T. Kawai, A. Kitamoto, Asaka Ito, E. Mokhtari, Saeed Einifar, Seyyed Mohammad Beheshti, C. Adle
This paper provides a report of a research project on virtual revival of the Citadel of Bam, a UNESCO world heritage site in danger that was destroyed in an earthquake in 2003. The simulation of damaged buildings that lies along the primary axes of the citadel and 3-D reconstitution using state-of-the-art 3DCG tools are presented. The key approach to 3-D modeling of the destroyed buildings is complementary usage of heterogeneous data such as 2-D maps, photos, cartography maps, and sketches in collaboration between different teams. As the basic 2-D maps had error, analytic and comparative research is conducted on diverse data resources to create a knowledge-base for the 3DCG restoration of the site. The process of modeling is completed with regard to the complicated and curved mud brick buildings with traditional architectural details. For this purpose proper functions of the tools is selected and in some cases different tools are used. The modeling is done by linking the component with their semantic by a metadata-based layer naming process. The tasks of evaluating the historical, architectural, and technical details of the 3-D buildings are done in parallel with the modeling by a team of CG and architecture experts in order to increase the precision of the 3DCG reconstitution so that it can be used as a reference for the physical restoration. The first trial version of virtual reality demonstration of the main axes of the Citadel of Bam is described. The paper concludes with proposals to enhance the process of simulation and also to open the restricted views of the virtual reconstitution on Internet.
这篇论文提供了一个关于Bam城堡虚拟复兴的研究项目的报告,Bam城堡是联合国教科文组织世界遗产,在2003年的一次地震中被摧毁。利用最先进的3DCG工具对城堡主轴沿线的受损建筑进行了模拟和三维重建。对被毁建筑进行三维建模的关键方法是补充使用异构数据,如二维地图、照片、制图地图和不同团队合作的草图。由于基本的二维地图存在误差,因此对不同的数据资源进行分析和比较研究,为现场的三维三维恢复建立知识库。以传统建筑细部复杂弯曲的泥砖建筑完成造型过程。为此,选择工具的适当功能,在某些情况下使用不同的工具。建模是通过基于元数据的层命名过程将组件与其语义链接起来完成的。评估3-D建筑的历史、建筑和技术细节的任务与建模同时进行,由CG和建筑专家组成的团队进行建模,以提高3DCG重建的精度,从而可以作为物理修复的参考。介绍了巴姆城堡主轴的虚拟现实演示的第一个试用版本。文章最后提出了加强仿真过程的建议,并对互联网上虚拟重构的局限性提出了开放的看法。
{"title":"3DCG reconstitution and virtual reality of UNESCO world heritage in danger: the Citadel of Bam","authors":"K. Ono, E. Andaroodi, A. Einifar, N. Abe, M. Matini, O. Bouet, F. Chopin, T. Kawai, A. Kitamoto, Asaka Ito, E. Mokhtari, Saeed Einifar, Seyyed Mohammad Beheshti, C. Adle","doi":"10.2201/NIIPI.2008.5.10","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.10","url":null,"abstract":"This paper provides a report of a research project on virtual revival of the Citadel of Bam, a UNESCO world heritage site in danger that was destroyed in an earthquake in 2003. The simulation of damaged buildings that lies along the primary axes of the citadel and 3-D reconstitution using state-of-the-art 3DCG tools are presented. The key approach to 3-D modeling of the destroyed buildings is complementary usage of heterogeneous data such as 2-D maps, photos, cartography maps, and sketches in collaboration between different teams. As the basic 2-D maps had error, analytic and comparative research is conducted on diverse data resources to create a knowledge-base for the 3DCG restoration of the site. The process of modeling is completed with regard to the complicated and curved mud brick buildings with traditional architectural details. For this purpose proper functions of the tools is selected and in some cases different tools are used. The modeling is done by linking the component with their semantic by a metadata-based layer naming process. The tasks of evaluating the historical, architectural, and technical details of the 3-D buildings are done in parallel with the modeling by a team of CG and architecture experts in order to increase the precision of the 3DCG reconstitution so that it can be used as a reference for the physical restoration. The first trial version of virtual reality demonstration of the main axes of the Citadel of Bam is described. The paper concludes with proposals to enhance the process of simulation and also to open the restricted views of the virtual reconstitution on Internet.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"1 1","pages":"99-136"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90940389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Named Entity Recognition in Vietnamese documents 越南文件中的命名实体识别
Q. Tran, T. Pham, Quoc Hung Ngo, D. Dinh, Nigel Collier
NamedEntityRecognition (NER) aimstoclassify wordsin a documentintopre-definedtarget entity classes and is now considered to be fundamental for many natural language processing tasks such a si nformation retrieval, machine translation, information extraction and question answering. This paper presents the results of an experiment in which a Support Vector Machine (SVM) based NER model is applied to the Vietnamese language. Though this state of the art machine learning method has been widely applied to NER in several well-studied languages, this is the first time this method has been applied to Vietnamese. In a comparison against Conditional Random Fields (CRFs) the SVM model was shown to outperform CRF by optimizing its feature window size, obtaining an overall F-score of 87.75. The paper also presents a detailed discussion about the characteristics of the Vietnamese language and provides an analysis of the factors which influence performance in this task.
命名实体识别(NER)的目的是将文档中的单词分类到重新定义的目标实体类中,现在被认为是许多自然语言处理任务的基础,例如信息检索、机器翻译、信息提取和问答。本文介绍了一种基于支持向量机(SVM)的NER模型应用于越南语的实验结果。尽管这种最先进的机器学习方法已被广泛应用于几种经过充分研究的语言的NER,但这是该方法首次应用于越南语。在与条件随机场(CRF)的比较中,SVM模型通过优化其特征窗口大小而优于CRF,获得了87.75的总体f分。本文还详细讨论了越南语的特点,并分析了影响这项任务表现的因素。
{"title":"Named Entity Recognition in Vietnamese documents","authors":"Q. Tran, T. Pham, Quoc Hung Ngo, D. Dinh, Nigel Collier","doi":"10.2201/NIIPI.2007.4.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.2","url":null,"abstract":"NamedEntityRecognition (NER) aimstoclassify wordsin a documentintopre-definedtarget entity classes and is now considered to be fundamental for many natural language processing tasks such a si nformation retrieval, machine translation, information extraction and question answering. This paper presents the results of an experiment in which a Support Vector Machine (SVM) based NER model is applied to the Vietnamese language. Though this state of the art machine learning method has been widely applied to NER in several well-studied languages, this is the first time this method has been applied to Vietnamese. In a comparison against Conditional Random Fields (CRFs) the SVM model was shown to outperform CRF by optimizing its feature window size, obtaining an overall F-score of 87.75. The paper also presents a detailed discussion about the characteristics of the Vietnamese language and provides an analysis of the factors which influence performance in this task.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"21 1 1","pages":"5"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84833153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
ILL/DD in Japan across the turn of the century : basic findings about NACSIS-ILL from 1994 to 2005 世纪之交日本的ILL/DD: 1994 - 2005年NACSIS-ILL的基本发现
S. Tutiya, Hiroya Takeuchi, Yoshinori Sato, Hiroshi Itsumura
The present articl ed escribes basic facts about the interuniversity cooperative library service that has been in practice in Japan since mid-1990s by way of an ILL request message sending system called NACSIS-ILL. The study underlying the article is based on the data recorded by th es yste mf rom 199 4t o2005. Among major findings are that the “Interlibrary Loan (ILL)” in the Japanese university context is very peculiar in that requests for photocopies of “foreign journal” articles are significantly predominant in 1990s; that, ironically, increase of requests for “domestic journal” articles, including those in nursing science in particular, is becoming conspicuous as if to match the decrease of requests for “foreign journal” articles, most of which have become available online through site licensing under consortial arrangements that began in 2002; that requests for book loan, which have only accounted for a small portion of requests, apparently increased as the union catalog database called NACSIS-CAT grew; that th es yste mi sr emarkably efficient with the fill rates in lending/supplying constantly high and the average turnaround time generally less than a week; that while the original intention was construction o fa mutually beneficiary collaborative system, there have been some libraries that mainly only request and others that mainly only supply, due partly to the existence of “subject foreign journal center” libraries which started in 1970s; and that some small or middle-sized libraries noticeably began to supply in recent years.
本文介绍了自20世纪90年代中期以来,日本利用互用请求信息发送系统NACSIS-ILL开展校际合作图书馆服务的基本情况。这篇文章的基础研究是基于该系统从1994年到2005年记录的数据。其中主要发现是,日本大学背景下的“馆际互借”(ILL)非常特殊,因为在20世纪90年代,对“外国期刊”文章的影印请求显着占主导地位;具有讽刺意味的是,对“国内期刊”文章的需求增加,特别是护理科学方面的文章,正变得越来越明显,似乎与对“外国期刊”文章的需求减少相匹配,其中大多数已经在2002年开始的合作安排下通过网站许可在网上提供;图书借阅请求只占请求的一小部分,但随着联合目录数据库NACSIS-CAT的增长,借阅请求明显增加;该系统效率极高,贷款/供应的充足率持续较高,平均周转时间一般少于一星期;在构建互利共赢合作体系的初衷下,由于20世纪70年代开始的“学科外刊中心”图书馆的存在,出现了一些以求为主、以供为主的图书馆;近年来,一些中小型图书馆明显开始提供图书。
{"title":"ILL/DD in Japan across the turn of the century : basic findings about NACSIS-ILL from 1994 to 2005","authors":"S. Tutiya, Hiroya Takeuchi, Yoshinori Sato, Hiroshi Itsumura","doi":"10.2201/NIIPI.2007.4.4","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.4","url":null,"abstract":"The present articl ed escribes basic facts about the interuniversity cooperative library service that has been in practice in Japan since mid-1990s by way of an ILL request message sending system called NACSIS-ILL. The study underlying the article is based on the data recorded by th es yste mf rom 199 4t o2005. Among major findings are that the “Interlibrary Loan (ILL)” in the Japanese university context is very peculiar in that requests for photocopies of “foreign journal” articles are significantly predominant in 1990s; that, ironically, increase of requests for “domestic journal” articles, including those in nursing science in particular, is becoming conspicuous as if to match the decrease of requests for “foreign journal” articles, most of which have become available online through site licensing under consortial arrangements that began in 2002; that requests for book loan, which have only accounted for a small portion of requests, apparently increased as the union catalog database called NACSIS-CAT grew; that th es yste mi sr emarkably efficient with the fill rates in lending/supplying constantly high and the average turnaround time generally less than a week; that while the original intention was construction o fa mutually beneficiary collaborative system, there have been some libraries that mainly only request and others that mainly only supply, due partly to the existence of “subject foreign journal center” libraries which started in 1970s; and that some small or middle-sized libraries noticeably began to supply in recent years.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"16 1","pages":"29-48"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82443992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rewriting XQuery by child-path folding 通过子路径折叠重写XQuery
H. Kato, S. Hidaka, Masatoshi Yoshikawa
An XQuery optimization by rewriting based on a partial evaluation using folding expressions is proposed. It consists of two parts: one is the main algorithm, which is a recursive algorithm based on an inductive definition of XQuery expressions. The other is invoked by the main algorithm with an expression whose subexpressions are already folded as its input, and it applies the expression-specific folding function. The main contributions of this paper is to propose analgorithmofanexpression-specificfoldingcalled“child-pathfolding”. Fora given query to the child axis over an element constructed by another XQuery, that is, a composite XQuery, this folding eliminates redundant element construction operators and expressions. These kinds of queries are typical in Global-As-View approach to data integration systems. We also show thatallredundant elementconstructionoperators and expressions in child-path expressions are eliminated by applying auxiliary transformations. In addition to child-path folding, we discuss folding of major XQuery constructors including FLWOR and quantified expressions. Moreover, we improve the rewriting algorithm based on pruning by adding two annotations to the parsed trees of XQuery expressions.
提出了一种基于部分求值的重写XQuery优化方法。它由两部分组成:一部分是主算法,它是基于XQuery表达式的归纳定义的递归算法。另一个由主算法使用一个表达式调用,该表达式的子表达式已经作为其输入进行了折叠,并应用特定于表达式的折叠函数。本文的主要贡献是提出了算法表达式特定的折叠,称为“子路径折叠”。对于由另一个XQuery(即复合XQuery)构造的元素上的子轴的给定查询,这种折叠消除了多余的元素构造操作符和表达式。这些类型的查询在数据集成系统的全局即视图方法中是典型的。我们还展示了通过应用辅助转换消除子路径表达式中所有冗余的元素构造操作符和表达式。除了子路径折叠之外,我们还讨论了主要XQuery构造函数的折叠,包括FLWOR和量化表达式。此外,我们通过在XQuery表达式的解析树中添加两个注释来改进基于剪枝的重写算法。
{"title":"Rewriting XQuery by child-path folding","authors":"H. Kato, S. Hidaka, Masatoshi Yoshikawa","doi":"10.2201/NIIPI.2007.4.3","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.3","url":null,"abstract":"An XQuery optimization by rewriting based on a partial evaluation using folding expressions is proposed. It consists of two parts: one is the main algorithm, which is a recursive algorithm based on an inductive definition of XQuery expressions. The other is invoked by the main algorithm with an expression whose subexpressions are already folded as its input, and it applies the expression-specific folding function. The main contributions of this paper is to propose analgorithmofanexpression-specificfoldingcalled“child-pathfolding”. Fora given query to the child axis over an element constructed by another XQuery, that is, a composite XQuery, this folding eliminates redundant element construction operators and expressions. These kinds of queries are typical in Global-As-View approach to data integration systems. We also show thatallredundant elementconstructionoperators and expressions in child-path expressions are eliminated by applying auxiliary transformations. In addition to child-path folding, we discuss folding of major XQuery constructors including FLWOR and quantified expressions. Moreover, we improve the rewriting algorithm based on pruning by adding two annotations to the parsed trees of XQuery expressions.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"3 1","pages":"15"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82765590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Japanese universities' research activity based on the number of awards of Grants-in-Aid for Scientific Research from 1998 to 2002 and in 2003 1998 ~ 2002年和2003年日本大学科研资助数量评价
M. Nishizawa, M. Negishi, Morio Shibayama, Yuan Sun, Hiroyasu Nomura, Masafumi Maeda, Yoshitaka Mitsuda
The system of Grants-in-Aid for Scientific Research from the Ministry of Education, Culture, Sports, Science and Technology (MEXT) is one of the oldest funding systems for researchers belonging to universities and institutes in Japan. The fund is allotted to researchers by peer review of their applications for research projects. The total number of subjects of Grantsin-Aid for Scientific Research allotted to the individual research fields from fiscal years (FY) 1998 to 2002 were tallied for each university and institute. The purpose of this report is to rank funded subjects as an index of the research activities of each university and institute. Furthermore, using the database for FY 2003, for which the ministry undertook a large revision to the classification of academic fields, we show the relationship between the situations before and after the classification changes. We indicate whether the last revision has caused significant shifts in the allocation of funds. This paper contains information abstracted from six series of NII Technical Reports from FY 1998 to 2002 and five series for FY 2003.
教育、文化、体育、科学和技术省(MEXT)的科学研究资助制度是日本最古老的资助大学和研究所研究人员的制度之一。该基金通过对研究项目申请的同行评审分配给研究人员。统计了1998 ~ 2002财政年度各大学和研究所分配给各研究领域的科研补助金科目总数。本报告的目的是为每所大学和研究所的研究活动对资助科目进行排名。此外,利用2003财年的数据库,我们展示了分类变化前后的情况之间的关系,该部为此进行了大规模的学术领域分类修订。我们指出最后一次修订是否造成了资金分配的重大变化。本文的资料摘自1998 - 2002年度的六期国家技术研究所技术报告和2003年度的五期技术报告。
{"title":"Evaluation of Japanese universities' research activity based on the number of awards of Grants-in-Aid for Scientific Research from 1998 to 2002 and in 2003","authors":"M. Nishizawa, M. Negishi, Morio Shibayama, Yuan Sun, Hiroyasu Nomura, Masafumi Maeda, Yoshitaka Mitsuda","doi":"10.2201/NIIPI.2007.4.7","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.7","url":null,"abstract":"The system of Grants-in-Aid for Scientific Research from the Ministry of Education, Culture, Sports, Science and Technology (MEXT) is one of the oldest funding systems for researchers belonging to universities and institutes in Japan. The fund is allotted to researchers by peer review of their applications for research projects. The total number of subjects of Grantsin-Aid for Scientific Research allotted to the individual research fields from fiscal years (FY) 1998 to 2002 were tallied for each university and institute. The purpose of this report is to rank funded subjects as an index of the research activities of each university and institute. Furthermore, using the database for FY 2003, for which the ministry undertook a large revision to the classification of academic fields, we show the relationship between the situations before and after the classification changes. We indicate whether the last revision has caused significant shifts in the allocation of funds. This paper contains information abstracted from six series of NII Technical Reports from FY 1998 to 2002 and five series for FY 2003.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"33 1","pages":"79"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81434456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Overview of SINET3-next-generation Science Information Network 新一代科学信息网络sinet3概述
S. Urushidani, S. Abe, J. Matsukata, Yusheng Ji, K. Fukuda, M. Koibuchi, S. Yamada
This paper outlines the next-generation science information network, called SINET3, which will be launched in April 2007 as the integrated successor network to SINET and SuperSINET. Using leading-edge networking technologies, SINET3 will provide a rich variety of network services and will adapt flexibly to the needs of the research and education community. The network services include multi-layer services such as IP, Ethernet, and lambda services, well-prepared virtual private network services for collaborative research among related organizations, and layer-1 bandwidth on demand services for emerging high-performance applications. Introducing layer-1 switches as core network components, the network will be structurally changed into an advanced hybrid optical and IP/MPLS network and will form a nationwide innovative network infrastructure for the research and education community. This paper gives an overview of SINET3 from the viewpoints of network services, network architecture, and networking technologies.
这篇论文概述了下一代科学信息网络SINET3,它将作为SINET和SuperSINET的集成后继网络于2007年4月启动。利用先进的网络技术,SINET3将提供丰富多样的网络服务,并将灵活地适应研究和教育界的需求。网络服务包括IP、以太网和lambda服务等多层服务,为相关组织之间的协作研究准备充分的虚拟专用网服务,以及为新兴高性能应用提供的第一层带宽随需应变服务。引入第一层交换机作为核心网络组件,该网络将在结构上转变为先进的混合光和IP/MPLS网络,并将为研究和教育界形成全国性的创新网络基础设施。本文从网络服务、网络架构和网络技术三个方面对SINET3进行了概述。
{"title":"Overview of SINET3-next-generation Science Information Network","authors":"S. Urushidani, S. Abe, J. Matsukata, Yusheng Ji, K. Fukuda, M. Koibuchi, S. Yamada","doi":"10.2201/NIIPI.2007.4.5","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.5","url":null,"abstract":"This paper outlines the next-generation science information network, called SINET3, which will be launched in April 2007 as the integrated successor network to SINET and SuperSINET. Using leading-edge networking technologies, SINET3 will provide a rich variety of network services and will adapt flexibly to the needs of the research and education community. The network services include multi-layer services such as IP, Ethernet, and lambda services, well-prepared virtual private network services for collaborative research among related organizations, and layer-1 bandwidth on demand services for emerging high-performance applications. Introducing layer-1 switches as core network components, the network will be structurally changed into an advanced hybrid optical and IP/MPLS network and will form a nationwide innovative network infrastructure for the research and education community. This paper gives an overview of SINET3 from the viewpoints of network services, network architecture, and networking technologies.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"27 1","pages":"51"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90520698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Quality evaluation of embedded software in robot software design contest 机器人软件设计竞赛中嵌入式软件的质量评价
H. Washizaki, Kobayashi Yasuhide, Watanabe Hiroyuki, Eiji Nakajima, Y. Hagiwara, Kenji Hiranabe, Kazuya Fukuda
A robot design contest, called the “Embedded Technology (ET) Software Design Robot Contest,” which involves designing software to automatically control a line-trace robot, was held in Tokyo, in 2005. The contest was intended to provide a practical opportunity to educate young Japanese developers in the field of embedded software development. In this paper, we give the results of the contest from the viewpoint of software quality evaluation. We created a framework for evaluating software quality, which integrated the design model quality and the final system performance, and we conducted an analysis using this framework. As a result of the analysis, the quantitative measurement of the structural complexity of the design model was found to have a strong relationship to the qualitative evaluation of the design by the contest judges. On the other hand, no strong correlation between the design model quality evaluated by the judges and the final system performance was found. For embedded software development, it is particularly important to estimate and verify reliability and performance in the early stages, according to the design and analysis models. Based on the results, we consider possible remedies with respect to the models submitted, the evaluation methods used, and the contest specifications. To adequately measure several quality characteristics, including performance, in terms of a model, it is necessary to improve the approach to developing robot software (for example, by applying model-driven development) and to reexamine the
2005年在东京举行了一场名为“嵌入式技术(ET)软件设计机器人大赛”的机器人设计比赛,该比赛涉及设计自动控制直线机器人的软件。该竞赛旨在为嵌入式软件开发领域的年轻日本开发人员提供一个实际的教育机会。本文从软件质量评价的角度给出了比赛的结果。我们创建了一个评估软件质量的框架,它集成了设计模型质量和最终系统性能,并且我们使用这个框架进行了分析。分析结果表明,设计模型的结构复杂性的定量测量与大赛评委对设计的定性评价有很强的关系。另一方面,评委评价的设计模型质量与最终系统性能之间没有很强的相关性。对于嵌入式软件开发,根据设计和分析模型,在早期阶段评估和验证可靠性和性能是特别重要的。根据结果,我们考虑提交的模型、使用的评估方法和竞赛规范方面可能的补救措施。为了充分衡量模型的几个质量特征,包括性能,有必要改进开发机器人软件的方法(例如,通过应用模型驱动的开发),并重新检查模型
{"title":"Quality evaluation of embedded software in robot software design contest","authors":"H. Washizaki, Kobayashi Yasuhide, Watanabe Hiroyuki, Eiji Nakajima, Y. Hagiwara, Kenji Hiranabe, Kazuya Fukuda","doi":"10.2201/NIIPI.2007.4.6","DOIUrl":"https://doi.org/10.2201/NIIPI.2007.4.6","url":null,"abstract":"A robot design contest, called the “Embedded Technology (ET) Software Design Robot Contest,” which involves designing software to automatically control a line-trace robot, was held in Tokyo, in 2005. The contest was intended to provide a practical opportunity to educate young Japanese developers in the field of embedded software development. In this paper, we give the results of the contest from the viewpoint of software quality evaluation. We created a framework for evaluating software quality, which integrated the design model quality and the final system performance, and we conducted an analysis using this framework. As a result of the analysis, the quantitative measurement of the structural complexity of the design model was found to have a strong relationship to the qualitative evaluation of the design by the contest judges. On the other hand, no strong correlation between the design model quality evaluated by the judges and the final system performance was found. For embedded software development, it is particularly important to estimate and verify reliability and performance in the early stages, according to the design and analysis models. Based on the results, we consider possible remedies with respect to the models submitted, the evaluation methods used, and the contest specifications. To adequately measure several quality characteristics, including performance, in terms of a model, it is necessary to improve the approach to developing robot software (for example, by applying model-driven development) and to reexamine the","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"67 1","pages":"63-78"},"PeriodicalIF":0.0,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83853565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1