Measuring software similarity base on software design artifacts has been one of the research topics in softwareengineering. software similarity measurement is used in software reuse, clone detection, and learning ass...
详细信息
ISBN:
(纸本)9781728114743
Measuring software similarity base on software design artifacts has been one of the research topics in softwareengineering. software similarity measurement is used in software reuse, clone detection, and learning assessment. Previous research focus on universal modeling language design artifacts. These design artifacts concern on the semantic and structure of a set of objects within a system and their interaction with themselves and objects outside the system. There are also design artifacts that model how data or information transformed into different forms, sizes, and time. This study focus on developing diagram similarity measurement base on one of those artifacts, i.e., object-oriented data flow diagrams. The measurement uses the greedy approach to calculate the similarity score of two diagrams using four elements derived from elements of object oriented data flow diagram, i.e. external entities, processes, data stores, and classes. The initial experimentation result shows that the proposed diagram similarity measurement is feasible.
The proceedings contain 13 papers. The topics discussed include: comparing design and code metrics for software quality prediction;adapting a fault prediction model to allow inter language reuse;an empirical analysis ...
ISBN:
(纸本)9781605580364
The proceedings contain 13 papers. The topics discussed include: comparing design and code metrics for software quality prediction;adapting a fault prediction model to allow inter language reuse;an empirical analysis of software effort estimation with outlier elimination;using correlation and accuracy for identifying good estimators;data sets and data quality in softwareengineering;comparing negative binomial and recursive partitioning models for fault prediction;implications of ceiling effects in defect predictors;multi-criteria decision analysis for customization of estimation by analogy method AQUA;confidence in software cost estimation results based on MMRE and PRED;improving analogy software effort estimation using fuzzy feature subset selection algorithm;optimizing requirements decision with KEYS;complementing approaches in ERP effort estimation practice: an industrial study;and software defect repair times: a multiplicative model.
This paper mainly discusses the management and application of computer softwareengineering to improve the optimization algorithm of manta rays. With the rapid development of computer science and engineering, more and...
详细信息
In recent years, with the continuous development of Internet technology, Internet products have penetrated into People's Daily life and become an indispensable part of people's life. With the continuous develo...
详细信息
ISBN:
(纸本)9781665416061
In recent years, with the continuous development of Internet technology, Internet products have penetrated into People's Daily life and become an indispensable part of people's life. With the continuous development and innovation of modern artificial intelligence, big data and Internet information technology, the profit model of the Internet is also constantly updated, entering the vision of most researchers. Among them, the income brought by Internet advertising [1] is particularly prominent. So how to quickly test a kind of online advertising strategy has become the main problem facing at present. As for Internet online advertising strategies, the main research direction of major Internet companies is to design different strategies for different groups of people and businesses, and each strategy needs to go through a series of testing procedures to ensure that there will be no serious problems before a certain strategy goes online. However, Whether a real online advertising strategy can meet the established target groups and target businesses, as well as how to really bring revenue to the company can only observe the corresponding results after the online advertising strategy.
In this paper, we study the application of data warehouse in e-government from the point of view on the personalized information service, and analyze its structure and features combining with the requirement of the e-...
详细信息
Cryptocurrencies are a significant development in recent years, featuring in global news, the financial sector, and academic research. They also hold a significant presence in open source development, comprising some ...
详细信息
We attempt to address a case of the Recommendation for Repeat Consumption (RRC) problem by proposing a Time-Sensitive Personalized Pairwise Ranking (TS-PPR) model based on the behavioral features extracted from user i...
详细信息
ISBN:
(纸本)9781509065431
We attempt to address a case of the Recommendation for Repeat Consumption (RRC) problem by proposing a Time-Sensitive Personalized Pairwise Ranking (TS-PPR) model based on the behavioral features extracted from user implicit feedback in the consumption history. TS-PPR factorizes the temporal useritem interactions via learning the mappings from the behavioral features in observable space to the preference features in latent space, and combines users static and dynamic preferences together in recommendation. An empirical study on real-world data sets shows encouraging results.
database application programs are often designed to be executed concurrently by many users. By grouping related database queries into transactions, DBMS systems can guarantee that each transaction satisfies the well-k...
详细信息
ISBN:
(纸本)0769520359
database application programs are often designed to be executed concurrently by many users. By grouping related database queries into transactions, DBMS systems can guarantee that each transaction satisfies the well-known ACID properties: Atomicity, Consistency, Isolation, and Durability. However, if a database application is decomposed into transactions in an incorrect manner, the application may fail when executed concurrently due to potential offline concurrency problems. This paper presents a dataflow analysis technique for identifying schedules of transaction execution aimed at revealing concurrency faults of this nature, along with techniques for controlling the DBMS or the application so that execution of transaction sequences follows generated schedules. The techniques have been integrated into AGENDA, a tool set for testing relational database application programs. Preliminary empirical evaluation is presented.
Malicious reverse engineering is a problem when a program is delivered to the end users. In fact, an end user might try to understand the internals of the program, in order to elaborate an attack, tamper with the soft...
详细信息
ISBN:
(纸本)9781728105918
Malicious reverse engineering is a problem when a program is delivered to the end users. In fact, an end user might try to understand the internals of the program, in order to elaborate an attack, tamper with the software and alter its behaviour. Code obfuscation represents a mitigation to these kind of malicious reverse engineering and tampering attacks, making programs harder to analyze (by a tool) and understand (by a human). In this paper, we present Oblive, a tool meant to support developers in applying code obfuscation to their programs. A developer is required to specify security requirements as single-line code annotations only. Oblive, then, reads annotations and applies state-of-the-art data and code obfuscation, namely xormask with opaque mask and java-to-native code, while the program is being compiled. Oblive is successfully applied both to plain Java programs and Android apps. Showcase videos are available for the code obfuscation part https://***/Bml-BkKP3CU and for the data obfuscation part https://***/zUizYVK42ps.
The model-based engineering technique Reactive Blocks supports the development of reactive systems by UML-based graphic modeling of control and data flows, model checker supported analysis, and automated code generati...
详细信息
ISBN:
(纸本)9789897581892
The model-based engineering technique Reactive Blocks supports the development of reactive systems by UML-based graphic modeling of control and data flows, model checker supported analysis, and automated code generation. Moreover, it facilitates the cooperation of teams of engineers by enabling the definition of formally precise behavioral interfaces that make the separation of the modelling process into various work packages easy. In this paper, we illustrate the use of Reactive Blocks for a joint student project that realized the monitoring and control of Lego Mindstorms-based trains in Norway through a control center in Australia. In particular, we explain how the Reactive Blocks interfaces and the applied communication protocols were used to split the project into work packages separately handled by the students involved.
暂无评论