software Product Lines (SPL) and Service-Orientation (SO) are two strategies that focus on different goals, but they both use software reuse as their main principle. SPL encompass a family of software systems develope...
详细信息
software Product Lines (SPL) and Service-Orientation (SO) are two strategies that focus on different goals, but they both use software reuse as their main principle. SPL encompass a family of software systems developed from reusable assets, while SO is a way of developing service-based applications, providing reusable business functionalities. In the combination of SPL and SO, a key aspect is the understanding about the use of variability mechanisms for realizing variabilities in different levels of granularity (e.g., components, services, service-orchestrations) addressed in a technology specific way and improve modularity, complexity, and Separation of Concerns (SoC) of reusable assets. In this paper, we present a quantitative case study for evaluating the modularity, complexity, SoC and stability of reusable core assets using distinct technologies for implementing them, and an initial decision model based to guide software engineers on choosing suitable technologies.
The positive trend of increased use of both railway passenger and freight transportation in Europe has resulted in an increased sensitivity to and occurrence of traffic disturbances. In addition to the need for extens...
详细信息
The positive trend of increased use of both railway passenger and freight transportation in Europe has resulted in an increased sensitivity to and occurrence of traffic disturbances. In addition to the need for extensions of the infrastructure, the need to effectively limit and predict the effects of disturbances becomes apparent. The abilities to maximise the use of available infrastructure such as sidings and platforms as well as the tracks in both directions is therefore critical. The kernel of the disturbance management problem is to revise the original timetable in line with the new conditions and decide where, when and how trains should overtake or meet to minimise the negative effect of the disturbance. There exist both sophisticated and simple models and methods which have different strengths and weaknesses. This paper presents results from a Swedish research project and investigates the pros and cons of different re-scheduling models and methods.
Although some work has been done to better predict the outcome of sporting events, it has focused on mainstream sports such as football and has typically employed forecasting or machine learning techniques. This work ...
详细信息
ISBN:
(纸本)9781605582177
Although some work has been done to better predict the outcome of sporting events, it has focused on mainstream sports such as football and has typically employed forecasting or machine learning techniques. This work focuses on the sport of crosscountry, and uses feature selection and evolutionary computation to better predict National Meet results. Feature Selection is utilized to find the most optimal feature set and a Particle Swarm Optimizer (PSO) to find the most optimal weight set. The best results are attained using the PSO, with an improvement over the current system of 2.5% for Women and 0.3% for Men. Copyright 2009 ACM.
The Autonomic System Specification Language (ASSL) is an initiative for the development of autonomic systems where we approach the problem of formal specification, validation, and code generation of such systems withi...
详细信息
This paper presents practical results of our endeavor towards formal specification and code generation of the Autonomic Distributed Modular Audio Recognition Framework (ADMARF) system. We used the Autonomic System Spe...
详细信息
ISBN:
(纸本)9781605584010
This paper presents practical results of our endeavor towards formal specification and code generation of the Autonomic Distributed Modular Audio Recognition Framework (ADMARF) system. We used the Autonomic System Specification Language (ASSL) to design and specify a self-protecting mechanism that must be incorporated by DMARF. Our overall goal is to have an autonomic computing layer covering DMARF by specifying autonomic properties at each of the pattern recognition stages of the same. Here we present results that complement our related work on the self-healing and self-optimizatin autonomic properties.
Test case mutation and generation (m&g) based on data samples is a n effective way to generate test cases for Knowledge-based fuzzing, but present m&g technique is only capable of one-dimensional m&g at a ...
详细信息
Test case mutation and generation (m&g) based on data samples is a n effective way to generate test cases for Knowledge-based fuzzing, but present m&g technique is only capable of one-dimensional m&g at a time based on a data sample and thus it is impossible to find a vulnerability that can only be detected by multidimensional m&g. This paper proposes a mathematical model FTSG that formally describes Fuzzing Test Suite Generation based on m&g, and can process multidimension input elements m&g, which is done by a Genetic Algorithm Mutation operator (GAMutator). By executionoriented input-output (I/O) analysis, the influence relationships between input elements and insecure functions in target application were collected. Based on these relationships, GAMutator can directly mutate corresponding input elements to trigger the suspected vulnerability in a target insecure function, which could never been found by one-dimension m&g fuzzing. Importantly, GAMutator does not bring the input combination explosion, and the number of test cases it generates is linear with the number of insecure functions. Finally, an experiment on Libpng has proved that FTSG could effectively enrich the ability of knowledge-based fuzzing technique to find vulnerabilities.
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow ...
详细信息
ISBN:
(纸本)9781605587981
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow tracking, has been widely applied to secure software execution (e.g., taint tracking), protect software privacy and improve performance (e.g., control speculation). In this paper, we propose a novel use of information flow tracking to obfuscate the whole control flow of a program with only modest performance degradation, to defeat malicious code injection, discourage software piracy and impede malware analysis. Specifically, we exploit two common features in information flow tracking: the architectural support for automatic propagation of tags and violation handling of tag misuses. Unlike other schemes that use tags as oracles to catch attacks (e.g., taint tracking) or speculation failures, we use the tags as flow-sensitive predicates to hide normal control flow transfers: the tags are used as predicates for control flow transfers to the violation handler, where the real control flow transfer happens. We have implemented a working prototype based on Itanium processors, by leveraging the hardware support for control speculation. Experimental results show that BOSH can obfuscate the whole control flow with only a mean of 26.7% (ranging from 4% to 59%) overhead on SPECINT2006. The increase in code size and compilation time is also modest. Copyright 2009 ACM.
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the c...
详细信息
ISBN:
(纸本)9781601321190
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the correct recognized samples and the number of all possible samples. This paper proposes a new technique to improve the previous research work in order to have a better result. As part of the preprocessing phase the image file is checked for skewing. If the image is skewed, it is corrected by a simple rotation technique in the appropriate direction. Character fragmentation process is done based on the existing technique. The improvement of feature extraction process is made by detecting details of glyph and used as an input for the classification process of ANN (Artificial Neural Network) to develop a full OCR system. Result indicated that some versions, even upon first using them, were at least as good as last methods of recognition.
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others incr...
详细信息
ISBN:
(纸本)9781424439416
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others increasingly in accessing those location based services. Exposure of the location information may result in privacy threat by malicious servers and hackers. In this paper, we propose a new framework that mobile users can enjoy conveniently the services provided by location-based server (LBS), and also protect their location information. This framework prevents mobile users' location information from exposing in two ways: providing the server with fake identities;two different ways of diffusing a number of fake queries with the real query hidden when and where it was issued.
Maintenance of articular cartilage's functional mechanical properties ultimately depends on the balance between the extracellular matrix component biosynthesis, degradation, and loss. A variety of factors are know...
详细信息
暂无评论