Communication about requirements is often handled in issue tracking systems, especially in a distributed setting. As issue tracking systems also contain bug reports or programming tasks, the software feature requests ...
详细信息
ISBN:
(纸本)9781509041220
Communication about requirements is often handled in issue tracking systems, especially in a distributed setting. As issue tracking systems also contain bug reports or programming tasks, the software feature requests of the users are often difficult to identify. This paper investigates natural language processing and machine learning features to detect software feature requests in natural language data of issue tracking systems. It compares traditional linguistic machine learning features, such as "bag of words", with more advanced features, such as subject-action-object, and evaluates combinations of machine learning features derived from the natural language and features taken from the issue tracking system meta-data. Our investigation shows that some combinations of machine learning features derived from natural language and the issue tracking system meta-data outperform traditional approaches. We show that issues or data fields (e.g. descriptions or comments), which contain software feature requests, can be identified reasonably well, but hardly the exact sentence. Finally, we show that the choice of machine learning algorithms should depend on the goal, e.g. maximization of the detection rate or balance between detection rate and precision. In addition, the paper contributes a double coded gold standard and an open-source implementation to further pursue this topic.
Data falsification attack is one of the main security issues in vehicular ad-hoc networks (VANETs) where vehicles rely on information received from other peers/vehicles. In this paper, we propose a method to detect da...
详细信息
ISBN:
(纸本)9781509025985
Data falsification attack is one of the main security issues in vehicular ad-hoc networks (VANETs) where vehicles rely on information received from other peers/vehicles. In this paper, we propose a method to detect data falsification attack using hash chains for enhancing the network performance by adapting contention window size to forward accurate information to the neighboring vehicles in a timely manner (to improve throughput while reducing end-to-end delay). Performance of the proposed approach is evaluated using numerical results obtained from simulations. We found that the proposed adaptive approach prevents VANET from data falsification attacks and provides higher throughput with lower delay.
This paper proposes the optimal structure of a Printed Circuit Board-based micro-PCR Chip constructed on a PCB substrate using commercial adhesive tapes and plastic films. The proposed micro-PCR chip was composed of f...
详细信息
In this paper, we address how to reduce the amount of page updates in flash-based DBMS equipped with SSD (solid state drive). We propose a novel buffering scheme that evicts a dirty page X without flushing it into SSD...
详细信息
In this paper, we propose a user-friendly tool that calibrates the coefficient variables of Steinhart-Hart equation used for the temperature measurement of NTC thermistor. The proposed tool provides automatic modifica...
详细信息
This study is a sequel of a recent publication where the coupling concepts as well as the advantages of coupling of declarative models were clarified. In this article, the basic concepts of simulation model coupling i...
详细信息
ISBN:
(纸本)9789897581205
This study is a sequel of a recent publication where the coupling concepts as well as the advantages of coupling of declarative models were clarified. In this article, the basic concepts of simulation model coupling is reviewed. Advanced input concepts, including context-mediated perception, are elucidated. Synergy of agents and simulation is revised. Awareness-based couplings of intelligent agents are explained. Other advanced coupling concepts clarified include: deliberation-based coupling, introspection-based coupling, anticipation-based coupling, and model/real-system coupling.
To support program comprehension, maintenance, and evolution, metamodels are frequently used during program reverse engineering activities to describe and analyze constituents of a program and their relations. Reverse...
详细信息
To support program comprehension, maintenance, and evolution, metamodels are frequently used during program reverse engineering activities to describe and analyze constituents of a program and their relations. Reverse engineering tools often define their own metamodels according to the intended purposes and features. Although each metamodel has its own advantages, its limitations may be addressed by other metamodels. Existing works have evaluated and compared metamodels and tools, but none have considered all the possible characteristics and limitations to provide a comprehensive guideline for classifying, comparing, reusing, and extending program metamodels. To aid practitioners and researchers in classifying, comparing, reusing, and extending program metamodels and their corresponding reverse engineering tools according to the intended goals, we establish a conceptual framework with definitions of program metamodels and related concepts. Then this framework is used to provide a comprehensive taxonomy, named Program Metamodel TAxonomy (ProMeTA), which incorporates newly identified characteristics into those stated in previous works, which were identified via a systematic literature survey on program metamodels, while keeping the orthogonality of the entire taxonomy. Additionally, we validate the taxonomy in terms of its orthogonality and usefulness through the classification of popular metamodels.
Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity pres...
详细信息
Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity preserving mechanism, which hides the identities of communicating parties, plays an important role as a defense against cyber and physical attacks. While anonymous routing protocols for DTNs have been proposed in the past, to the best of our knowledge, there is no work that emphasizes the theoretical aspects. In this paper, we first design an abstract of anonymous routing protocols for DTNs and augment the existing solution with multi-copy message forwarding. Then, we construct simplified mathematical models, which can be used to understand the fundamental performance and security guarantees of onion-based anonymous routing in DTNs. The numerical and simulation results using randomly generated contact graphs and the real traces demonstrate that our models provide very close approximations to the performance of the anonymous DTN routing protocol.
Given a probabilistic transition system (PTS) A partially observed by an attacker, and an ω-regular predicate φ over the traces of A, measuring the disclosure of the secret φ in A means computing the probability th...
详细信息
Given a probabilistic transition system (PTS) A partially observed by an attacker, and an ω-regular predicate φ over the traces of A, measuring the disclosure of the secret φ in A means computing the probability that an attacker who observes a run of A can ascertain that its trace belongs to φ. We consider specifications given as Interval Markov Chains (IMCs), which are underspecified Markov chains where probabilities on edges are only required to belong to intervals. Scheduling an IMC S produces a concrete implementation as a PTS and we define the worst case disclosure of secret φ in S as the maximal disclosure of φ over all PTSs thus produced. We compute this value for a subclass of IMCs and we prove that simulation between specifications can only improve the opacity of implementations.
Depending on expansion of supply of smartphone, development of mobile application is more active using various mobile platform. As a result of malicious applications, but also targeting the mobile it is rapidly increa...
详细信息
暂无评论