The goal of our software assurance (SwA) landscape project is to create a usable framework that describes assurance participants, assurance technologies, and their contributions to accelerate the formation and adoptio...
详细信息
SQL antipatterns are frequently-made missteps that are commonly found in the design of relational databases, the use of SQL, and the development of database applications. They are intended to solve certain problems bu...
详细信息
ISBN:
(纸本)9781509055050
SQL antipatterns are frequently-made missteps that are commonly found in the design of relational databases, the use of SQL, and the development of database applications. They are intended to solve certain problems but will eventually lead to other problems. The motivation of this paper is how to assist database administrators in diagnosing SQL antipatterns and suggest refactoring techniques to solve the antipatterns. Specifically, we attempt to automate the detection of logical database design antipatterns by developing a tool that uses Transact-SQL language to query and analyze the database schema. The tool reports on potential antipatterns and gives an instruction on how to refactor the database schema. In an evaluation based on three databases from the industry, the performance of the tool is satisfactory in terms of recall of the antipatterns but the tool detects a number of false positives which affect its precision. It is found that SQL antipatterns detection still largely depends on the semantics of the data and the detection tool should rather be used in a semi-automated manner, i.e it can point out potential problematic locations in the database schema which require further diagnosis by the database administrators. This approach would be useful especially in the context of large databases where manual antipatterns inspection is very difficult.
Hard disk failure is a serious problem in term of product quality and credibility to customers. All hard disk drive companies need to be aware and address how to get rid of failure and prevent the repeat of the proble...
详细信息
Hard disk failure is a serious problem in term of product quality and credibility to customers. All hard disk drive companies need to be aware and address how to get rid of failure and prevent the repeat of the problem in their products. The quality of failure analysis process depends on the person who has most experience. It would not be so efficient if the company has no experienced person to perform the analysis. A knowledge management system can store the knowledge of experienced engineers. It can help new engineers to learn the craft. It would reduce a knowledge gap issues and bring up efficiency for failure solving process. This paper presents a design and implementation of knowledge management system for failure analysis in hard disk with case-based reasoning. The existing cases are stored and a new case can be compared to the existing one in order to retrieve the relevant existing knowledge to help the analysis. Once the new case is solved, it can be stored to aid the future cases. A prototype of the system has been implemented and the assessment of user satisfaction shows that it can improve the failure analysis process effectively.
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the...
详细信息
ISBN:
(纸本)9781509055050
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the market to offer corporate customers productivity and security while lowering costs of identity management. System integrators who implement the IDM solutions for their corporate customers often face problems when choosing the right IDM products for integrating with the customers' enterprise systems. This paper proposes a decision model for IDM product selection which is used in evaluating and ranking IDM products based on the proposed customer requirements questionnaire. The model is comprehensive in that its decision criteria comprise not only the technical specifications of the products but also other important aspects including price and accountability of system integrators and product vendors. Based on the decision model, product selection is conducted using a multi-criteria decision making technique called fuzzy analytic hierarchy process (fuzzy AHP). In an evaluation, a leading system integrator company in Thailand applies the proposed approach to IDM product selection for its customer and the result is quite satisfactory.
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy ap...
详细信息
ISBN:
(纸本)9781665462730
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy applications still struggle to containerize. Rehost strategy seems to be a faster method. On Kubernetes, KubeVirt can be used to manage rehosted VM. However, there is a huge difference between the long-term use of the VMs and containers. For example, container IP addresses change over time is problematic for VMs that need a static IP. In addition, some VM-based applications may require multiple network interfaces or a specific domain name for service discovery. These issues prevent some VMs from functioning properly after the migration to KubeVirt. We developed an operator framework to solve network problems that arise in the application layer such as DNS queries. In addition, we provide a guideline on how to use open-source projects like the Multus Container Network Interface, NMState to enable the migration of VMs with applications related to network function properly. Our operator and guideline allow most VMs to function properly with few modifications (to none) after migrating to KubeVirt. This facilitated the adoption of Kubernetes in more organizations.
Supercompilation is a program transformation technique introduced in the 1970s by V. Turchin [13,14,16]. His ideas were studied by a number of authors for a long time. We constructed an experimental supercompiler for ...
ISBN:
(纸本)3540208135
Supercompilation is a program transformation technique introduced in the 1970s by V. Turchin [13,14,16]. His ideas were studied by a number of authors for a long time. We constructed an experimental supercompiler for a functional language Refal-5 [15]. The Scp4 project was discussed with V. Turchin. He initiated and supported our work. Scp4 has been implemented once again using Refal-5. Sources of Scp4 and the whole version of this paper are available for immediate download [8,9,17]. A user manual on Scp4 and reports on several interesting experiments can be found in [4,5,6]. Scp4 is a first experimental supercompiler for the real functional language Refal-5. The principal new tool in Scp4 is an online analysis of global properties of folded-components of the meta-tree MTr of all potential computations. Let a program P and a parameterized input of the P be given. Then such a pair defines a partial mapping. A supercompiler is a transformer of such pairs. The transformer must preserve the map values on the map domain. Scp4 unfolds a potentially infinite tree of all possible computations. It reduces in the process the redundancy that could be present in the original program. It folds the tree into a finite graph of states and transitions between possible configurations of the computing system. It analyses global properties of the graph and specializes this graph w.r.t. these properties. The resulting definition is constructed solely based on the meta-interpretation of the source program rather than by a step-by-step transformation of the program. The size of the Scp4 system is about 19500 lines of commented source code (800 KB).
The development of Internet of Things (IoT) makes the application of smart homes grow rapidly. It is very popular to install smart appliances in the house. However, building a smart control system at home not only cos...
详细信息
Cloud provider assessment is important for cloud consumers to determine, when outsourcing computing work, which providers can serve their business and system requirements. This paper presents an initial attempt to ass...
详细信息
Cloud provider assessment is important for cloud consumers to determine, when outsourcing computing work, which providers can serve their business and system requirements. This paper presents an initial attempt to assess security requirements compliance of cloud providers by following the Goal Question Metric approach and defining a weighted scoring model for the assessment. The security goals and questions that address the goals are taken from Cloud Security Alliance's Cloud Controls Matrix and Consensus Assessments Initiative Questionnaire. We then transform such questions into more detailed ones and define metrics that help provide quantitative answers to the transformed questions based on evidence of security compliance provided by the cloud providers. The scoring is weighted by quality of evidence, i.e. its compliance with the associated questions and its completeness. We propose a scoring system architecture which utilizes CloudAudit and assess Amazon Web Services as an example.
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspect...
详细信息
ISBN:
(数字)9783642183089
ISBN:
(纸本)9783642183072;9783642266942
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data. This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology. “Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.
暂无评论