We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to CERT can be modeled using a common mathematical fra...
详细信息
ISBN:
(纸本)0769510469
We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C=I+S/spl times//spl radic/M where C is the cumulative count of reported incidents, M is the time since the start of the exploit cycle, and I and S are the regression coefficients determined by analysis of the incident report data. Further analysis of two additional exploits involving vulnerabilities in mountd and statd confirm the model. We believe that the models will aid in predicting the severity of subsequent vulnerability exploitations, based on the rate of early incident reports.
Given sufficient resources, any classification task is possible with a high accuracy, but to achieve a particular task given finite resources, the problem is to utilize these resources intelligently. Cognitive studies...
详细信息
Given sufficient resources, any classification task is possible with a high accuracy, but to achieve a particular task given finite resources, the problem is to utilize these resources intelligently. Cognitive studies in human vision associate multi-resolution features with high recognition accuracy. We show that classifier development using separability optimization is very similar to emulation of human cognition. The identification of key features leads to optimal resource utilization by the classifier. Evolving such classifiers is the focus of the paper. The resources required for classification can be identified in terms of amount of time required to develop a recognizer amount of processing power required and the number and kind of features extracted. Our digit recognition method strives not only to report high accuracy but also targets generation of simple solutions. The simplicity of a solution can be a measure of the resources utilized. Our methodology is termed as active based on the premise that once the complexity of a classification task is known an intelligent recognizer should incrementally increase the resources needed for classification.
There is a growing interest in empirical study in softwareengineering, both for validating mature technologies and for guiding improvements of less-mature technologies. This paper introduces an empirical methodology,...
详细信息
There is a growing interest in empirical study in softwareengineering, both for validating mature technologies and for guiding improvements of less-mature technologies. This paper introduces an empirical methodology, based on experiences garnered over more than two decades of work by the Empirical softwareengineering Group at the University of Maryland and related organizations, for taking a newly proposed improvement to development processes from the conceptual phase through transfer to industry. The methodology presents a series of questions that should be addressed, as well as the types of studies that best address those questions. The methodology is illustrated by a specific research program on inspection processes for Object-Oriented designs. Specific examples of the studies that were performed and how the methodology impacted the development of the inspection process are also described.
The lack of use of high technology in the healthcare delivery system is especially apparent in the emergency medical information systems (EMIS) area. For example, in New York State, all patients who enter the emergenc...
详细信息
The lack of use of high technology in the healthcare delivery system is especially apparent in the emergency medical information systems (EMIS) area. For example, in New York State, all patients who enter the emergency medical service (EMS) are tracked through their pre-hospital care to the emergency room using a pre-hospital care report (PCR). Our goal is to automate the collection of data from the PCR and enable efficient maintenance and dissemination of information. The task involves the automatic extraction and transliteration of the handwritten text in the response boxes provided on the form. The objective is to produce, for each form image, an ASCII transcription of the handwritten contents of the response boxes. These responses could be then used to populate a database. The database itself would then emerge as a valuable resource for enabling data mining and knowledge discovery for the entire medical community.
This paper describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is based on a case study of the statistic...
详细信息
ISBN:
(纸本)9780769510507
This paper describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is based on a case study of the statistical analysis of 15 projects and an in-depth analysis of one representative project. These analyses focus on the conflict resolution process, stakeholders' roles and their relationships to quality artifacts, and tool effectiveness. We show that stakeholders tend to accept satisfactory rather than optimal resolutions. Users and customers are more proactive in stating win conditions, whereas developers are more active in working toward resolutions. Further, we suggest that knowledge-based automated aids have potential to significantly enhance process effectiveness and efficiency. Finally, we conclude that such processes and tools have theoretical and practical implications in the quest for better software requirements elicitation.
Describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is based on a case study of the statistical analysis...
详细信息
ISBN:
(纸本)0769510507
Describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is based on a case study of the statistical analysis of 15 projects and an in-depth analysis of one representative project. These analyses focus on the conflict resolution process, stakeholders' roles and their relationships to quality artifacts, and tool effectiveness. We show that stakeholders tend to accept satisfactory rather than optimal resolutions. Users and customers are more proactive in stating win conditions, whereas developers are more active in working toward resolutions. Further, we suggest that knowledge-based automated aids have potential to significantly enhance process effectiveness and efficiency. Finally, we conclude that such processes and tools have theoretical and practical implications in the quest for better software requirements elicitation.
Industry often complains that current university curricula fail to address the practical issues of real software development. This paper outlines a proposal for an innovative core curriculum for a Bachelor of Science ...
ISBN:
(纸本)9780769510507
Industry often complains that current university curricula fail to address the practical issues of real software development. This paper outlines a proposal for an innovative core curriculum for a Bachelor of Science in computer Science. The proposed core curriculum contains elements of traditional computer science programs combined with softwareengineering via a team-oriented, hands-on approach to large-scale software development. In addition to traditional lecture/project/exam courses, students are required to take an eight-semester sequence of “software Factory” courses. software Factory courses put the students' newly acquired skills to work in a real software organization staffed and managed by all students in the program. Students from all courses in the software Factory sequence meet simultaneously to fulfill their roles in the software organization. We expect the students will be better-prepared softwareengineering practitioners after completing a curriculum that combines traditional courses with practical software Factory experience.
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically gene...
详细信息
ISBN:
(纸本)0769509819
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically generated from digest video scenes selected by user preference. (2) Directions can be added using a happiness or sadness level based on the user preferences. (3) Personalized TV programs for an individual viewer can be made. The procedures taken by the system are as follows: (1) Conjunctive expressions between scenes are automatically generated; (2) Emotional expressions are automatically generated by user preference; (3) TV program metaphors are defined; (4) Direction templates corresponding to the metaphors are defined; (5) These expressions and definitions are coded using a markup language, and (6) Contents such as virtual characters and movies are synchronized. The resultant program can be shown on a TV set.
software product lines have received increasing amounts of attention within the softwareengineering community, especially from industry. Most authors focus on the technical and process aspects and assume an organizat...
详细信息
暂无评论