Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Data mining (4)
- Empirical study (4)
- Model Check (4)
- Indoor localization (3)
- Wireless (3)
-
- 802.11 (2)
- Adequacy (2)
- Collaboration (2)
- Conversation (2)
- Empirical Study (2)
- Fault Localization (2)
- Formal verification (2)
- Game-based learning (2)
- Interaction (2)
- Linear Temporal Logic (2)
- Model checking (2)
- Platform (2)
- Smart phones (2)
- Social (2)
- Software testing (2)
- Test cases (2)
- Verification (2)
- Volume Topography (2)
- Wireless sensor network (2)
- AOA signature (1)
- Accuracy (1)
- Activity inference (1)
- Agile methods (1)
- Algorithms (1)
- Annova (1)
Articles 31 - 60 of 84
Full-Text Articles in Physical Sciences and Mathematics
Conferencesense: Monitoring Of Public Events Using Phone Sensors, Vigneshwaran Subbaraju, Amit Kumar, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, Archan Misra
Conferencesense: Monitoring Of Public Events Using Phone Sensors, Vigneshwaran Subbaraju, Amit Kumar, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, Archan Misra
Research Collection School Of Computing and Information Systems
We explore the use of a participatory sensing paradigm, where data generated from individual smartphones is used to extract and understand collective properties of temporary public gatherings and events (e.g., concerts & conferences). We focus on the use of this paradigm at a technical conference, and describe the design, implementation and deployment of ConferenceSense, an application that uses multiple sensor and human-generated inputs from attendees' smartphones to infer context, such as the start time of a session or the degree of interaction during a tea break. Based on data collected from multiple attendees at a 3-day conference, we explore how …
Theory And Practice, Do They Match? A Case With Spectrum-Based Fault Localization, Tien-Duy B. Le, Ferdian Thung, David Lo
Theory And Practice, Do They Match? A Case With Spectrum-Based Fault Localization, Tien-Duy B. Le, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Spectrum-based fault localization refers to the process of identifying program units that are buggy from two sets of execution traces: normal traces and faulty traces. These approaches use statistical formulas to measure the suspiciousness of program units based on the execution traces. There have been many spectrum-based fault localization approaches proposing various formulas in the literature. Two of the best performing and well-known ones are Tarantula and Ochiai. Recently, Xie et al. find that theoretically, under certain assumptions, two families of spectrum-based fault localization formulas outperform all other formulas including those of Tarantula and Ochiai. In this work, we empirically …
Securearray: Improving Wifi Security With Fine-Grained Physical-Layer, Jie Xiong, Kyle Jamieson
Securearray: Improving Wifi Security With Fine-Grained Physical-Layer, Jie Xiong, Kyle Jamieson
Research Collection School Of Computing and Information Systems
Despite the important role that WiFi networks play in home and enterprise networks they are relatively weak from a security standpoint. With easily available directional antennas, attackers can be physically located off-site, yet compromise WiFi security protocols such as WEP, WPA, and even to some extent WPA2 through a range of exploits specific to those protocols, or simply by running dictionary and human-factors attacks on users' poorly-chosen passwords. This presents a security risk to the entire home or enterprise network. To mitigate this ongoing problem, we propose SecureArray, a system designed to operate alongside existing wireless security protocols, adding defense …
Learning Spatio-Temporal Co-Occurrence Correlograms For Efficient Human Action Classification, Qianru Sun, Hong Liu
Learning Spatio-Temporal Co-Occurrence Correlograms For Efficient Human Action Classification, Qianru Sun, Hong Liu
Research Collection School Of Computing and Information Systems
Spatio-temporal interest point (STIP) based features show great promises in human action analysis with high efficiency and robustness. However, they typically focus on bag-of-visual words (BoVW), which omits any correlation among words and shows limited discrimination in real-world videos. In this paper, we propose a novel approach to add the spatio-temporal co-occurrence relationships of visual words to BoVW for a richer representation. Rather than assigning a particular scale on videos, we adopt the normalized google-like distance (NGLD) to measure the words' co-occurrence semantics, which grasps the videos' structure information in a statistical way. All pairwise distances in spatial and temporal …
Inferring Ongoing Human Activities Based On Recurrent Self-Organizing Map Trajectory, Qianru Sun, Hong Liu
Inferring Ongoing Human Activities Based On Recurrent Self-Organizing Map Trajectory, Qianru Sun, Hong Liu
Research Collection School Of Computing and Information Systems
Automatically inferring ongoing activities is to enable the early recognition of unfinished activities, which is quite meaningful for applications, such as online human-machine interaction and security monitoring. State-of-the-art methods use the spatiotemporal interest point (STIP) based features as the low-level video description to handle complex scenes. While the existing problem is that typical bag-of-visual words (BoVW) focuses on the statistical distribution of features but ignores the inherent contexts in activity sequences, resulting in low discrimination when directly dealing with limited observations. To solve this problem, the Recurrent Self-Organizing Map (RSOM), which was designed to process sequential data, is novelly adopted …
Integration Of Social Media Technologies With Erp:A Prototype Implementation, Venky Shankararaman, Eng Kit Lum
Integration Of Social Media Technologies With Erp:A Prototype Implementation, Venky Shankararaman, Eng Kit Lum
Research Collection School Of Computing and Information Systems
Many organizations use social media to enhance collaboration both internally among employees and externally with customers and partners. However, it is not sufficient to just create a presence in some key social environments such as Facebook or YouTube. In order to fully leverage the value of social media, organizations must integrate social media with their business processes, which means new solutions have to be developed that extend existing enterprise systems. In this paper, we present a prototype solution that demonstrates the integration of social media with the order processing process. The implemented solution brings together the embedded best practice processes …
How Many Researchers Does It Take To Make Impact? Mining Software Engineering Publication Data For Collaboration Insights, Subhajit Datta, Santonu Sarkar, Sajeev A. S. M., Nishant Kumar
How Many Researchers Does It Take To Make Impact? Mining Software Engineering Publication Data For Collaboration Insights, Subhajit Datta, Santonu Sarkar, Sajeev A. S. M., Nishant Kumar
Research Collection School Of Computing and Information Systems
In the three and half decades since the inception of organized research publication in software engineering, the discipline has gained a significant maturity. This journey to maturity has been guided by the synergy of ideas, individuals and interactions. In this journey software engineering has evolved into an increasingly empirical discipline. Empirical sciences involve significant collaboration, leading to large teams working on research problems. In this paper we analyze a corpus of 19,000+ papers, written by 21,000+ authors from 16 publication venues between 1975 to 2010, to understand what is the ideal team size that has produced maximum impact in software …
Usmmc: A Self-Contained Model Checker For Uml State Machines, Shuang Liu, Yang Liu, Jun Sun, Manchun Zheng, Bimlesh Wadhwa, Jin Song Dong
Usmmc: A Self-Contained Model Checker For Uml State Machines, Shuang Liu, Yang Liu, Jun Sun, Manchun Zheng, Bimlesh Wadhwa, Jin Song Dong
Research Collection School Of Computing and Information Systems
UML diagrams are gaining increasing usage in Object-Oriented system designs. UML state machines are specifically used in modeling dynamic behaviors of classes. It has been widely agreed that verification of system designs at an early stage will dramatically reduce the development cost. Tool support for verification UML designs can also encourage consistent usage of UML diagrams throughout the software development procedure. In this work, we present a tool, named USMMC, which turns model checking of UML state machines into practice. USMMC is a self-contained toolkit, which provides editing, interactive simulation as well as powerful model checking support for UML state …
Orion: A Software Project Search Engine With Integrated Diverse Software Artifacts, Tegawende F. Bissyande, Ferdian Thung, David Lo, Lingxiao Jiang, Laurent Réveillère
Orion: A Software Project Search Engine With Integrated Diverse Software Artifacts, Tegawende F. Bissyande, Ferdian Thung, David Lo, Lingxiao Jiang, Laurent Réveillère
Research Collection School Of Computing and Information Systems
Software projects produce a wealth of data that is leveraged in different tasks and for different purposes: researchers collect project data for building experimental datasets; software programmers reuse code from projects; developers often explore the opportunities for getting involved in the development of a project to gain or offer expertise. Finding relevant projects that suit one needs is however currently challenging with the capabilities of existing search systems. We propose Orion, an integrated search engine architecture that combines information from different types of software repositories from multiple sources to facilitate the construction and execution of advanced search queries. Orion provides …
Popularity, Interoperability, And Impact Of Programming Languages In 100,000 Open Source Projects, Tegawende F. Bissyande, Ferdian Thung, David Lo, Lingxiao Jiang, Laurent Réveillère
Popularity, Interoperability, And Impact Of Programming Languages In 100,000 Open Source Projects, Tegawende F. Bissyande, Ferdian Thung, David Lo, Lingxiao Jiang, Laurent Réveillère
Research Collection School Of Computing and Information Systems
Programming languages have been proposed even before the era of the modern computer. As years have gone, computer resources have increased and application domains have expanded, leading to the proliferation of hundreds of programming languages, each attempting to improve over others or to address new programming paradigms. These languages range from procedural languages like C, object oriented languages like Java, and functional languages such as ML and Haskell. Unfortunately, there is a lack of large scale and comprehensive studies that examine the “popularity”, “interoperability”, and “impact” of various programming languages. To fill this gap, this study investigates a hundred thousands …
The Case For Mobile Forensics Of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection, Joseph Joo Keng Chan, Kiat Wee Tan, Lingxiao Jiang, Rajesh Krishna Balan
The Case For Mobile Forensics Of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection, Joseph Joo Keng Chan, Kiat Wee Tan, Lingxiao Jiang, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
Privacy protection against mobile applications on mobile devices is becoming a serious concern as user sensitive data may be leaked without proper justification. Most current leak detection tools only report leaked private data, but provide inadequate information about the causes of the leaks for end users to take preventive measures. Hence, users often cannot reconcile the way they have used an application to a reported leak — i.e., they are unable to comprehend the (il)legitimacy of the leak or make a decision on whether to allow the leak. This paper aims to demonstrate the feasibility and benefits of identifying the …
An Empirical Study Of Adoption Of Software Testing In Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, Lingxiao Jiang
An Empirical Study Of Adoption Of Software Testing In Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
In software engineering, testing is a crucial activity that is designed to ensure the quality of program code. For this activity, software teams spend substantial resources constructing test cases to thoroughly assess the correctness of software functionality. What is the proportion of open source projects that include test cases? What is the effect of number of developers on the number of test cases? In this study, we explore open source projects and investigate the correlation between the presence of test cases and various project development characteristics, including the number of lines of code, the size of development teams and the …
An Empirical Study Of Bugs In Software Build Systems, Xin Xia, Xiaozhen Zhou, David Lo, Xiaoqiong Zhao
An Empirical Study Of Bugs In Software Build Systems, Xin Xia, Xiaozhen Zhou, David Lo, Xiaoqiong Zhao
Research Collection School Of Computing and Information Systems
Build system converts source code, libraries and other data into executable programs by orchestrating the execution of compilers and other tools. The whole building process is managed by a software build system, such as Make, Ant, CMake, Maven, Scons, and QMake. The reliability of software build systems would affect the reliability of the build process. In this paper, we perform an empirical study on bugs in software build systems. We analyze four software build systems, Ant, Maven, CMake and QMake, which are four typical and widely-used software build systems, and can be used to build Java, C, C++ systems. We …
An Empirical Study Of Adoption Of Software Testing In Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, Lingxiao Jiang
An Empirical Study Of Adoption Of Software Testing In Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
No abstract provided.
Psyhcos: Parameter Synthesis For Hierarchical Concurrent Real-Time Systems, Étienne André, Yang Liu, Jun Sun, Jin Song Dong, Shang-Wei Lin
Psyhcos: Parameter Synthesis For Hierarchical Concurrent Real-Time Systems, Étienne André, Yang Liu, Jun Sun, Jin Song Dong, Shang-Wei Lin
Research Collection School Of Computing and Information Systems
Real-time systems are often hard to control, due to their complicated structures, quantitative time factors and even unknown delays. We present here PSyHCoS, a tool for analyzing parametric real-time systems specified using the hierarchical modeling language PSTCSP. PSyHCoS supports several algorithms for parameter synthesis and model checking, as well as state space reduction techniques. Its architecture favors reusability in terms of syntax, semantics, and algorithms. It comes with a friendly user interface that can be used to edit, simulate and verify PSTCSP models. Experiments show its efficiency and applicability
Combining Model Checking And Testing With An Application To Reliability Prediction And Distribution, Lin Gui, Jun Sun, Yang Liu, Yuanjie Si, Jin Song Dong, Xinyu Wang
Combining Model Checking And Testing With An Application To Reliability Prediction And Distribution, Lin Gui, Jun Sun, Yang Liu, Yuanjie Si, Jin Song Dong, Xinyu Wang
Research Collection School Of Computing and Information Systems
Testing provides a probabilistic assurance of system correctness. In general, testing relies on the assumptions that the system under test is deterministic so that test cases can be sampled. However, a challenge arises when a system under test behaves non-deterministiclly in a dynamic operating environment because it will be unknown how to sample test cases.In this work, we propose a method combining hypothesis testing and probabilistic model checking so as to provide the ``assurance" and quantify the error bounds. The idea is to apply hypothesis testing to deterministic system components and use probabilistic model checking techniques to lift the results …
A Formal Semantics For Complete Uml State Machines With Communications, Shuang Liu, Yang Liu, Étienne André, Christine Choppy, Jun Sun, Bimlesh Wadhwa, Jin Song Dong
A Formal Semantics For Complete Uml State Machines With Communications, Shuang Liu, Yang Liu, Étienne André, Christine Choppy, Jun Sun, Bimlesh Wadhwa, Jin Song Dong
Research Collection School Of Computing and Information Systems
UML is a widely used notation, and formalizing its semantics is an important issue. Here, we concentrate on formalizing UML state machines, used to express the dynamic behaviour of software systems. We propose a formal operational semantics covering all features of the latest version (2.4.1) of UML state machines specification. We use labelled transition systems as the semantic model, so as to use automatic verification techniques like model checking. Furthermore, our proposed semantics includes synchronous and asynchronous communications between state machines. We implement our approach in USM2C, a model checker supporting editing, simulation and automatic verification of UML state machines. …
Cameo: A Middleware For Mobile Advertisement Delivery, Azeem J. Khan, Kasthuri Jayarajah, Dongsu Han, Archan Misra, Rajesh Krishna Balan, Srinivasan Seshan
Cameo: A Middleware For Mobile Advertisement Delivery, Azeem J. Khan, Kasthuri Jayarajah, Dongsu Han, Archan Misra, Rajesh Krishna Balan, Srinivasan Seshan
Research Collection School Of Computing and Information Systems
Advertisements are the de-facto currency of the Internet with many popular applications (e.g. Angry Birds) and online services (e.g., YouTube) relying on advertisement generated revenue. However, the current economic models and mechanisms for mobile advertising are fundamentally not sustainable and far from ideal. In particular, as we show, applications which use mobile advertising are capable of using significant amounts of a mobile users' critical resources without being controlled or held accountable. This paper seeks to redress this situation by enabling advertisement supported applications to become significantly more "user-friendly". To this end, we present the design and implementation of CAMEO, a …
Experiences With Performance Tradeoffs In Practical, Continuous Indoor Localization, Azeem J. Khan, Vikash Ranjan, Trung-Tuan Luong, Rajesh Krishna Balan, Archan Misra
Experiences With Performance Tradeoffs In Practical, Continuous Indoor Localization, Azeem J. Khan, Vikash Ranjan, Trung-Tuan Luong, Rajesh Krishna Balan, Archan Misra
Research Collection School Of Computing and Information Systems
This paper describes our experiences and observations with the first version of a localization system that continuous tracks the indoor location of a large number of consumer mobile devices. Unlike past work that focuses principally on the accuracy of the location tracking algorithm, we study the performance of the localization system in terms of key additional metrics: scalability and energy-efficiency, which can sometimes conflict with the desire for high accuracy. To ensure that our solution can handle both Android and iOS-based mobile devices (& other closed mobile platforms), we adapt the conventional client-side fingerprinting-based localization approaches to develop a novel …
Energy-Efficient Collaborative Query Processing Framework For Mobile Sensing Services, Jin Yang, Tianli Mo, Lipyeow Lim, Kai Uwe Sattler, Archan Misra
Energy-Efficient Collaborative Query Processing Framework For Mobile Sensing Services, Jin Yang, Tianli Mo, Lipyeow Lim, Kai Uwe Sattler, Archan Misra
Research Collection School Of Computing and Information Systems
Many emerging context-aware mobile applications involve the execution of continuous queries over sensor data streams generated by a variety of on-board sensors on multiple personal mobile devices (aka smartphones). To reduce the energyoverheads of such large-scale, continuous mobile sensing and query processing, this paper introduces CQP, a collaborative query processing framework that exploits the overlap (in both the sensor sources and the query predicates) across multiple smartphones. The framework automatically identifies the shareable parts of multiple executing queries, and then reduces the overheads of repetitive execution and data transmissions, by having a set of 'leader' mobile nodes execute and disseminate …
Sociophone: Everyday Face-To-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, Junehwa Song
Sociophone: Everyday Face-To-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, Junehwa Song
Research Collection School Of Computing and Information Systems
In this paper, we propose SocioPhone, a novel initiative to build a mobile platform for face-to-face interaction monitoring. Face-to-face interaction, especially conversation, is a fundamental part of everyday life. Interaction-aware applications aimed at facilitating group conversations have been proposed, but have not proliferated yet. Useful contexts to capture and support face-to-face interactions need to be explored more deeply. More important, recognizing delicate conversational contexts with commodity mobile devices requires solving a number of technical challenges. As a first step to address such challenges, we identify useful meta-linguistic contexts of conversation, such as turn-takings, prosodic features, a dominant participant, and pace. …
Introducing Programmers To Pair Programming: A Controlled Experiment, A. S. M. Sajeev, Subhajit Datta
Introducing Programmers To Pair Programming: A Controlled Experiment, A. S. M. Sajeev, Subhajit Datta
Research Collection School Of Computing and Information Systems
Pair programming is a key characteristic of the Extreme Programming (XP) method. Through a controlled experiment we investigate pair programming behaviour of programmers without prior experience in XP. The factors investigated are: (a) characteristics of pair programming that are less favored (b) perceptions of team effectiveness and how they relate to product quality, and (c) whether it is better to train a pair by giving routine tasks first or by giving complex tasks first. Our results show that: (a) the least liked aspects of pair programming were having to share the screen, keyboard and mouse, and having to switch between …
Improved Reachability Analysis In Dtmc Via Divide And Conquer, Songzheng Song, Lin Gui, Jun Sun, Yang Liu, Jin Song Dong
Improved Reachability Analysis In Dtmc Via Divide And Conquer, Songzheng Song, Lin Gui, Jun Sun, Yang Liu, Jin Song Dong
Research Collection School Of Computing and Information Systems
Discrete Time Markov Chains (DTMCs) are widely used to model probabilistic systems in many domains, such as biology, network and communication protocols. There are two main approaches for probability reachability analysis of DTMCs, i.e., solving linear equations or using value iteration. However, both approaches have drawbacks. On one hand, solving linear equations can generate accurate results, but it can be only applied to relatively small models. On the other hand, value iteration is more scalable, but often suffers from slow convergence. Furthermore, it is unclear how to parallelize (i.e., taking advantage of multi-cores or distributed computers) these two approaches. In …
Demo: Sociophone: Everyday Face-To-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, Junehwa Song
Demo: Sociophone: Everyday Face-To-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, Junehwa Song
Research Collection School Of Computing and Information Systems
In this demo, we introduce SocioPhone, a novel initiative toward everyday face-to-face interaction monitoring platform. Among diverse verbal, aural, visual cues expressed during face-to-face interaction, SocioPhone captures diverse meta-linguistic information from conversations and provides interaction-aware applications on-the-fly. Undoubtedly, conversations are a key channel for face-to-face interaction. Specifically, monitoring conversational turns, i.e., alternation of different speakers (including none speaking), is the first crucial step to derive diverse interesting aspects of conversations, e.g., who is talking right now, how long and often one talks, how quickly one responds to another, and so on. In this demo, we will show the core technique …
Approximating The Performance Of A "Last Mile" Transportation System, Hai Wang, Amedeo Odoni
Approximating The Performance Of A "Last Mile" Transportation System, Hai Wang, Amedeo Odoni
Research Collection School Of Computing and Information Systems
The Last Mile Problem (LMP) refers to the provision of travel service from thenearest public transportation node to a home or office. We study the supply side of thisproblem in a stochastic setting, with batch demands resulting from the arrival of groupsof passengers at rail stations or bus stops who request last-mile service. Closed-formbounds and approximations are derived for the performance of Last Mile TransportationsSystems as a function of the fundamental design parameters of such systems. An initialset of results is obtained for the case in which a fleet of vehicles of unit capacity providesthe Last Mile service and each …
Energy-Neutral Scheduling And Forwarding In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena Valera, Weng Seng Soh, Hwee-Pink Tan
Energy-Neutral Scheduling And Forwarding In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena Valera, Weng Seng Soh, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
In environmentally-powered wireless sensor networks (EPWSNs), low latency wakeup scheduling and packet forwarding is challenging due to dynamic duty cycling, posing time-varying sleep latencies and necessitating the use of dynamic wakeup schedules. We show that the variance of the intervals between receiving wakeup slots affects the expected sleep latency: when the variance of the intervals is low (high), the expected latency is low (high). We therefore propose a novel scheduling scheme that uses the bit-reversal permutation sequence (BRPS) – a finite integer sequence that positions receiving wakeup slots as evenly as possible to reduce the expected sleep latency. At the …
Tag Recommendation In Software Information Sites, Xin Xia, David Lo, Xinyu Wang, Bo Zhou
Tag Recommendation In Software Information Sites, Xin Xia, David Lo, Xinyu Wang, Bo Zhou
Research Collection School Of Computing and Information Systems
Nowadays, software engineers use a variety of online media to search and become informed of new and interesting technologies, and to learn from and help one another. We refer to these kinds of online media which help software engineers improve their performance in software development, maintenance and test processes as software information sites. It is common to see tags in software information sites and many sites allow users to tag various objects with their own words. Users increasingly use tags to describe the most important features of their posted contents or projects. In this paper, we propose TagCombine, an automatic …
Accelerating Optimistic Hla-Based Simulations In Virtual Execution Environments, Zengxiang Li, Xiaorong Li, Nguyen Binh Duong Ta, Wentong Cai, Stephen John Turner
Accelerating Optimistic Hla-Based Simulations In Virtual Execution Environments, Zengxiang Li, Xiaorong Li, Nguyen Binh Duong Ta, Wentong Cai, Stephen John Turner
Research Collection School Of Computing and Information Systems
High Level Architecture (HLA)-based simulations employing optimistic synchronization allows federates to process event and to advance simulation time freely at the risk of over-optimistic execution and execution rollbacks. In this paper, an adaptive resource provisioning system is proposed to accelerate optimistic HLA-based simulations in Virtual Execution Environment (VEE). A performance monitor is introduced using a middleware approach to measure the performance of individual federates transparently to the simulation application. Based on the performance measurements, a resource manager distributes the available computational resources to the federates, making them advance simulation time with comparable speeds. Our proposed approach is evaluated using a …
Dynamic Synthesis Of Local Time Requirement For Service Composition, Tian Huat Tan, Étienne André, Jun Sun, Yang Liu, Jin Song Dong, Manman Chen
Dynamic Synthesis Of Local Time Requirement For Service Composition, Tian Huat Tan, Étienne André, Jun Sun, Yang Liu, Jin Song Dong, Manman Chen
Research Collection School Of Computing and Information Systems
Service composition makes use of existing servicebased applications as components to achieve a business goal. In time critical business environments, the response time of a service is crucial, which is also reflected as a clause in service level agreements (SLAs) between service providers and service users. To allow the composite service to fulfill the response time requirement as promised, it is important to find a feasible set of component services, such that their response time could collectively allow the satisfaction of the response time of the composite service. In this work, we propose a fully automated approach to synthesize the …
Mining Sql Injection And Cross Site Scripting Vulnerabilities Using Hybrid Program Analysis, Lwin Khin Shar, Hee Beng Kuan Tan, Lionel C. Briand
Mining Sql Injection And Cross Site Scripting Vulnerabilities Using Hybrid Program Analysis, Lwin Khin Shar, Hee Beng Kuan Tan, Lionel C. Briand
Research Collection School Of Computing and Information Systems
In previous work, we proposed a set of static attributes that characterize input validation and input sanitization code patterns. We showed that some of the proposed static attributes are significant predictors of SQL injection and cross site scripting vulnerabilities. Static attributes have the advantage of reflecting general properties of a program. Yet, dynamic attributes collected from execution traces may reflect more specific code characteristics that are complementary to static attributes. Hence, to improve our initial work, in this paper, we propose the use of dynamic attributes to complement static attributes in vulnerability prediction. Furthermore, since existing work relies on supervised …