In this paper, we present a robust approach of digital watermarking embedding and retrieval for digital *** new approach works in special domain and it has two major steps: (1) to extract affine co-variant regions, an...
详细信息
In this paper, we present a robust approach of digital watermarking embedding and retrieval for digital *** new approach works in special domain and it has two major steps: (1) to extract affine co-variant regions, and (2) to embed watermarks with a novel fuzzy inference *** advantage of this proposed approach is demonstrated by a large amount of experiments, which are mainly against different attacks, such as common image processing, rotation, scaling, cropping, and several other affine transformations.
We propose and experiment a Social Networking Service (SNS) for local communities for tsunami disaster control. It is an easy-to-use GIS-based system with powerful GIS analysis capabilities. One of the features of the...
详细信息
ISBN:
(纸本)9780780397408
We propose and experiment a Social Networking Service (SNS) for local communities for tsunami disaster control. It is an easy-to-use GIS-based system with powerful GIS analysis capabilities. One of the features of the system is resident participation. The GIS layer structure proposed in this paper nicely supports this user participation. The system architecture and the use of the system for tsunami disaster control are discussed. We report ongoing developments in Hachinohe-City, Japan.
Web documents are widely replicated on the Internet. These replicated documents bring potential problems to Web based informationsystems. So replica detection on the Web is an indispensable task. The challenge is to ...
详细信息
Human tastes in art motivate the need for effective means to build a visual mosaic picture which is made up of many small tiles. In some previous work researchers have tried to translate pictures' styles.1 In this...
详细信息
A secure system is one that is protected against specific undesired outcomes. Delivering a secure system, and particularly a secure web application, is not easy. Integrating general-purpose informationsystems develop...
详细信息
ISBN:
(纸本)1595933522
A secure system is one that is protected against specific undesired outcomes. Delivering a secure system, and particularly a secure web application, is not easy. Integrating general-purpose informationsystems development methods with security development activities could be a useful means to surmount these difficulties [6]. Agile processes, such as Extreme Programming, are of increasing interest in software development. Most significantly for web applications, agile processes encourage and embrace requirements change, which is a desirable characteristic for web application development. In this paper, we present an agile process to deliver secure web applications. The contribution of the research is not the development of a new method or process that addresses security concerns. Rather, we investigate general-purpose information system development methods (e.g., Feature-Driven Development (FDD)) and mature security methods, namely risk analysis, and integrate them to address the development of secure web applications. The key features of our approach are (1) a process capable of dealing with the key challenges of web applications development, namely decreasing life-cycle times and frequently changing requirements;and (2) an iterative approach to risk analysis that integrates security design throughout the development process.
Multivariate time series (MTS) data are widely available in different fields including medicine, finance, bioinformatics, science and engineering. Modelling MTS data accurately is important for many decision making ac...
详细信息
data replication is one of the key components in data grid architecture as it enhances data access and reliability and minimises the cost of data transmission. In this paper, we address the problem of reducing the ove...
详细信息
Refactoring, as a software engineering discipline has emerged over recent years to become an important aspect of maintaining software. Refactoring refers to the restructuring of software according to specific mechanic...
详细信息
ISBN:
(纸本)1595931082
Refactoring, as a software engineering discipline has emerged over recent years to become an important aspect of maintaining software. Refactoring refers to the restructuring of software according to specific mechanics and principles. In this paper, we describe a tool that allows refactoring data across multiple versions of seven open-source software systems to be collected. The tool automates the identification of refactorings as program transformations between consecutive software releases. The same tool thus allowed an empirical analysis of software development across versions from the perspective of those transformations. We describe results for the systems analysed and point to key conclusions from our analysis. In particular, we investigate a problematic empirical question as to whether certain refactorings are related, i.e., they cannot be undertaken in isolation without other refactorings being undertaken in parallel. In this context, we focus specifically on the four most common refactorings identified by the tool from three of the open-source systems and use a dependency graph to inform conclusions about the empirical data extracted by the tool. An interesting result relating to some common refactorings is described. Copyright 2006 ACM.
In this paper, we describe and then appraise a testing taxonomy proposed by van Deursen and Moonen (VD&M) based on the post-refactoring repeatability of tests. Four categories of refactoring are identified by VD&a...
详细信息
In this paper, we describe and then appraise a testing taxonomy proposed by van Deursen and Moonen (VD&M) based on the post-refactoring repeatability of tests. Four categories of refactoring are identified by VD&M ranging from semantic-preserving to incompatible, where, for the former, no new tests are required and for the latter, a completely new test set has to be developed. In our appraisal of the taxonomy, we heavily stress the need for the inter-dependence of the refactoring categories to be considered when making refactoring decisions and we base that need on a refactoring dependency graph developed as part of the research. We demonstrate that while incompatible refactorings may be harmful and time-consuming from a testing perspective, semantic-preserving refactorings can have equally unpleasant hidden ramifications despite their advantages. In fact, refactorings which fall into neither category have the most interesting properties. We support our results with empirical refactoring data drawn from seven Java open-source systems (OSS) and from the same analysis form a tentative categorization of code smells
To create an understanding of enterprises and the ways they do business, a starting point could be to identify the main actors and the values transferred between them. Business models are created in order to make clea...
详细信息
To create an understanding of enterprises and the ways they do business, a starting point could be to identify the main actors and the values transferred between them. Business models are created in order to make clear who the business actors are in a business case and to make their relations explicit. The relations are formulated in terms of values exchanged between the actors. The purpose of the work reported in this paper is to create a better understanding of business models by identifying basic notions used in such models. It does so by constructing a common ontology based on three established business model ontologies: e3-value, REA, and BMO. By means of a careful analysis of these ontologies a conceptual schema is created that defines the common concepts. An example is worked out that explains how the common ontology should be understood.
暂无评论