Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on

Date 23-25 May 2013

Filter Results

Displaying Results 1 - 25 of 252
  • The role-oriented process modeling language

    Publication Year: 2013 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (624 KB) |  | HTML iconHTML  

    Process modeling and its description language are attracting increasing attention from industries. As the concept of role orientation becomes more widely accepted, there have already been some role-modeling approaches and description languages of role orientation. This paper summarizes the characteristics and the weakness of the methods mentioned above, and presents an intuitive, vivid, flexible, and highly scalable process description language for role orientation. This language adopts a modular and component-oriented approach which lowers the coupling degree between the process modules and provides a new methodology for future process description. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and design on information management system for auto-part Container Leasing platform

    Publication Year: 2013 , Page(s): 6 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (421 KB) |  | HTML iconHTML  

    The study summarizes the current situation of research on both Container Leasing and its application in enterprises. For auto-part industry, paper focuses on the analysis on container management process and designing the new business process in the condition of Container leasing platform. The restructure method for forming 'delivery plan for empty container' is shown in the detail. And the information management system's architecture and function modules are designed considering the feature of auto-part container business. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configurable communication middleware model and implementation for industrial network service software

    Publication Year: 2013 , Page(s): 10 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1080 KB) |  | HTML iconHTML  

    With the increasing use of network in industrial production process, new and higher requirements are put forward to industrial network service and management software. The users, however, have to make a difficult choice between the universal management software with little specialized function and the customized software with little extension ability. To solve this problem, this paper summarized the interactive network communication model and proposed an implementation solution of configurable middleware with good performance on expandability and cross-platform portability, which helps to satisfy the increasing and various needs of network services in industrial production process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast spatial partition method in bounding volume hierarchy

    Publication Year: 2013 , Page(s): 15 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (371 KB) |  | HTML iconHTML  

    Acceleration data structure plays a critical role in ray tracing. As a popular acceleration data structure, bounding volume hierarchy(BVH) is preferred due to its low memory cost and flexibility. The efficiency of BVH can be affected by the non-uniform scene. This paper presents a novel algorithm which is able to build a tree of high quality and high building efficiency. The algorithm is based on the depth attribute of BVH tree, and it takes different building strategies: utilizing spatial partition in shallow levels, while using object partition in deep levels. It is difficult to get an optimal spatial partition plane in shallow levels, since it is a tradeoff between building efficiency and tree quality. The object partition method is used under some assumption to find an appropriate optimal solution. The experiment results indicate that our algorithm takes about 39% of the building time to build the similar quality BVH tree compared with the latest algorithm Spatial Splits in Bounding Volume Hierarchies (SBVH) on average. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time model of railway interlocking system based on UML extension mechanism

    Publication Year: 2013 , Page(s): 19 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (641 KB) |  | HTML iconHTML  

    Railway interlocking system (RIS), a very important part of the railway signaling system (RSS), greatly achieves the intelligent control of the train route process, and improves the efficiency and reliability of the route management Modeling with UML contributes to the connection between rail experts and related system developers. However, the standard UML can't meet real-time requirements of RIS which is typically safety-critical, due to its lack of precise definitions of time. Therefore, a complete and reliable modeling method with time constraints to RIS becomes urgent. The UML extension mechanism based modeling method with time constraints (UemBMMwtc) is introduced in this paper to model the terminals in decentralized railway interlocking system (DRIS) by statecharts, by which to conquers the lack of the time factor in standard UML and greatly improves the credibility and usability of DRIS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining software design for wind farms

    Publication Year: 2013 , Page(s): 23 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (423 KB) |  | HTML iconHTML  

    Recent years has witnessed a rapid development of the wind power industry. It has become a concern for operators as to how to extract valuable information from the massive amount of historical data generated during operation of wind farm. A design plan of data mining software applied in wind farm is proposed in this paper. B/S mode and J2EE framework are adopted, and the software is composed of three layers: data layer, logical layer and presentation layer. The technology used in software development is explained in detail. Data mining algorithms of the software are also introduced, with the focus laid on analytical method of time series. The plan is highly feasible and can be taken as reference to development of data analysis software for wind farms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel detection approach for statement clones

    Publication Year: 2013 , Page(s): 27 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (736 KB) |  | HTML iconHTML  

    Activities such as copying, pasting and modifying codes usually lead to a lot of code clones in the software systems. These code clones have a great impact on software development and maintenance. This paper presents a new clone detection approach. That is to uses a algorithm based on suffix array to efficiently search repeated token substrings and finally to detect code clones. We also develop a clone detection tool SaCD in order to implement the method. This tool has detected statement clones in 31 open source software systems of C, C++ and Java language. The experimental results show that the SaCD can efficiently detect code clones at the statement granularity in the software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards set-oriented recursive XML query in pattern-based logic views

    Publication Year: 2013 , Page(s): 31 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (171 KB) |  | HTML iconHTML  

    Recursive query is an interesting and subtle topic in XML query. Existing XML query languages often resort to recursive function or recursive predicate to present recursive XML query. However, this approach implicitly adopts a tuple-oriented way to query processing which is not fit for the set-oriented data processing in databases. In this paper, we propose a new approach to presenting recursive XML query in a pattern-based logic view named CDV. CDV deploys conjunctive and disjunctive operators to compose tree-like patterns, which can expressively specify the logic semantics in XML elements. With the assistance of the descendant operator, the syntactic and semantic mechanisms of CDV, the recursive XML query can be easily presented in a set-oriented way. We demonstrate the usage and advantage of the CDV in typical recursive queries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subversion(r): An empirical performance case study from a collaborative perspective on integrated circuits and software development

    Publication Year: 2013 , Page(s): 35 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1049 KB) |  | HTML iconHTML  

    Due to the ongoing increase in integrated circuit (IC) and software project complexity, configuration management has acquired a primary significance. Apache's Subversion(r), one of the most prominent configuration management open-source tools, often exhibits a performance deficit when it handles an immense amount of managed data. In this paper, we present a performance study conducted on a typical industrial platform. We identify the large quantity of files and directories as being the pivotal performance bottleneck of Subversion(r)-as the number of files and directories increases, performance deteriorates further. We analyze the impact of the reformed meta-data structure in release 1.7 on the efficiency and contrast it to the previous revision 1.6. We also examine how the performance is affected by the hardware configuration and suggest measures for improvement that facilitate higher efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule based clinical decision support system for hematological disorder

    Publication Year: 2013 , Page(s): 43 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1156 KB) |  | HTML iconHTML  

    Evidence Based Medicine (EBM) has become a popular approach to medical decision making. It is a method of assisting in clinical decision making by using the most relevant research evidence to answer clinical questions. Complete Blood Count (CBC) is one of the most commonly ordered blood test that could be done within minutes and is mostly used as a basis for further testing. Therefore, CBC could be used as a base to quickly diagnose a patient and later on, use external clinical evidence from systematic research to further diagnose the patient. This paper proposes the development of a clinical decision support system (CDSS) to assist physicians in evidence based practice. The system will be able to provide the list of external evidence (electronic medical journals) for each type of generated probable disease. Usability and user acceptance testing were conducted with a group of physicians and medical students. This study reveals some usability issues of the system and significant improvements that are required to improve the accuracy of the system in generating probable hematological disorder. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HTML5 visual composition of REST-like web services

    Publication Year: 2013 , Page(s): 49 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (576 KB) |  | HTML iconHTML  

    In this paper we discuss a visual programming environment for the composition of services based on dataflow paradigm. This approach, strongly oriented towards web technologies, aims to offer the corporate application designer an integrated set of very high-level tools to design and test new services via functional composition of already available ones. The user experience is a mixture of (a) graphical actions and choices, for example the drag and drop of graphical widgets and the connection of input-output links, and of (b) interface coding, via the textual specification of the translation logic of data object types flowing through the input/output interfaces of the composed services. The new environment, named VisProSL (Visual Programming Service-Link), capitalizes on a standardized JSON syntax of exchanged data objects, is oriented to REST services, and makes use of a basic layer that provides the visual generation of interfaces towards location services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam detection in social bookmarking websites

    Publication Year: 2013 , Page(s): 56 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (958 KB) |  | HTML iconHTML  

    The popularity of social bookmarking systems became attractive to spammers to disturb systems by posting illegal or inappropriate web content links that users do not wish to share. We present a study of automatic detection of spammers in a social tagging system. Several distinct features are extracted that address various properties of social spam, which provide sufficient information to discriminate legitimate against spammer users. So these features are used for various machine learning algorithms to classify, achieving over 99% accuracy in detecting spammers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RNM based decentralized architecture of cross-organizational workflow management system for e-government

    Publication Year: 2013 , Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (722 KB) |  | HTML iconHTML  

    With the rapid development of e-government, the business process management for e-government has been gradually changing from intra-organization to cross-organization. The cross-organizational business process brings new characteristics such as complexity, instance intensive, loosely coupled and dynamic. As a result, there are some disadvantages to use traditional centerialized workflow management system (WFMS) for cross-organizational business process, i.e. a single point of failure, poor scalability and performance bottleneck. In this paper, we use Role Network Model (RNM) as modelling method of cross-organizational business process for e-government, which satisfies new characteristics of cross-organizational business process. Then, based on RNM, a decentralized architecture of cross-organizaitional WFMS for e-government is proposed, which avoids disadvantages of centralized WFMS. Finaly, a control mechanism based on the proposed architecture is presented to ensure workflow executed correctly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service portfolio optimization algorithm based on value model and graph theory in SOA

    Publication Year: 2013 , Page(s): 64 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (485 KB) |  | HTML iconHTML  

    Business process reengineering frequently occurs in complex service systems because of its dynamic, random and varied running characteristics. To solve the problem, we proposed a novel SOA portfolio optimization algorithm based on value model and graph theory. Firstly, in order to strengthen the QoS analytical capacity of SOA, the value model is introduced into the SOA system to describe customer's service requirements of both function and non-function aspects. Next, a directed graph of SOA services and a value dependence graph of services are provided, as well as a service portfolio optimization algorithm designed based on the graphs. Finally, the simulated data case is used to analyze and verify the methods proposed in this paper. The result shows that introducing the value model and graph algorithm into the SOA-based service system can effectively improve the quality of service portfolio. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Desktop maneuver software technologies to demonstrate and testify the emergency plan

    Publication Year: 2013 , Page(s): 68 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (445 KB) |  | HTML iconHTML  

    In this paper, the state of art of emergency plan is explained and its existing problems for emergency management are pointed out. To create a good and comprehensive emergency plan for practical usages in different domains such as the energy and environmental disaster fields, the methods for demonstrating and testifying the plan are described. The approach using desktop maneuver is proposed to exercise the plan, and its main components are defined. With considering the comprehensive factors in emergency exercises, a good simulation results can be achieved and the flaws of the emergency plan can be found out. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The modeling research of a fingerprint access control system based on UML

    Publication Year: 2013 , Page(s): 72 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (813 KB) |  | HTML iconHTML  

    According to the UML standard, Rational Rose 2003 is used on the analysis and modeling of the fingerprint access control system, which presents the detailed design and implementation process of the use case diagram, class diagram, sequence diagram and the database model, etc. The practical application shows that the object-oriented modeling based on UML can effectively improve the efficiency of software development and enhance the system maintainability and portability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An electricity-sale-support and information-sharing design scheme based on Web

    Publication Year: 2013 , Page(s): 77 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    In this paper, the payment information can be shared among different systems with the Web services established in electricity vending system and acquisition system. When the associated users go to pay money by rechargeable card, bank or POS machine, the payment information should be sent from electricity vending system to acquisition system, and then this information is transmitted to electric meter. When the client side of electricity vending system calls its service, the payment information will be updated into the database of electricity vending system, and then, it will be shared to the database of acquisition system by calling the service of acquisition system. The Web service is established by integrating CXF and Spring framework. The client side will show the process that electricity vending system interacts with its database, and the data of electricity vending system will be shared to the database of acquisition system by JSP technology and Java language. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical modeling approach for the automatic planning of space operation mission

    Publication Year: 2013 , Page(s): 81 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1026 KB) |  | HTML iconHTML  

    Space operation needs the collaboration of many systems and its execution is a complex process, which greatly increases the difficulty of knowledge representation of system state, timing and constraints. Usually, the realization of a mission requires the cooperation of multiple sub-missions, so the action level model, which is a single level modeling approach, cannot support the automatic planning of space operation. The paper builds the model field of space operation by using hierarchical modeling method. It divides operation activities into two levels: action level and mission level. The model of action is created by the relations and constraints between action and system states, and the model of mission is built by sub-missions and their constraints. The models of actions, missions and constraints such as resources compose the field of space operation. Analysis and simulation shows that the approach could model space operation effectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A structural testing approach for Aspect-Oriented Programs based on data and control flow

    Publication Year: 2013 , Page(s): 85 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (609 KB) |  | HTML iconHTML  

    Software testing is a key factor for ensuring software quality. The traditional process-oriented and object-oriented test technology has been quite mature, but test technology in aspect-oriented is still in the primary stage. Due to the unique characteristics of Aspect-Oriented Programs (AOP), the existing testing approaches for process-oriented program and object-oriented program can't be applied directly to aspect-oriented program. So researching an effective test method for Aspect-Oriented Programs becomes very important. In this paper a structural testing approach for AOP is presented. A Block-Definition-Use-Control (BDUC) expression which can represent the control flow and data flow between each block is proposed. Based on the BDUC, three testing criteria are defined: two control flow criteria and one data flow criterion. Our approach is implemented by a tool called CDCT-AJ, which computes the control flow and data flow coverage. Exploratory evaluation presents evidence of the effectiveness and feasibility of the proposed testing approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of automatic vulnerability detection system for Web application program

    Publication Year: 2013 , Page(s): 89 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1078 KB) |  | HTML iconHTML  

    At present, Web application vulnerability safety problems widely exist because of the lack of effective validation and filtering mechanism for untrusted user data. This paper shows the design of the prototype system against SQL injection and cross-site scripting vulnerability. The main steps of the detection are as follows: construct the taint dependency graph for the program by the static analysis of source code; use finite state automata to represent the value of tainted string; verify whether the program has effective safe handling for the user input by matching with the attack pattern and then implement the prototype system for automatic detection on the Java Web program vulnerability based on taint dependency analysis. The experimental results show that the system is comprehensive and accurate for the detection of related vulnerabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on classification rules of hypertension based on decision tree

    Publication Year: 2013 , Page(s): 93 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (626 KB) |  | HTML iconHTML  

    To extract classification rules of hypertension more effectively, the C4.5 decision tree algorithm was put forward. Firstly, C4.5 algorithm was used to analyse pre-processed hypertension data and a decision tree model was constructed. Then, the understandable classification rules were extracted and the maintaining method was used to test the accuracy of the classification results. Finally, the improved C4.5 algorithm was proposed to amend the information gain of the selected attribute by introducing the concept of correlation. The improved decision tree model more conforms to the medical understanding and the classification accuracy was also improved. The experiment results show that the improved algorithm was effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product configuration method based on ontology mapping

    Publication Year: 2013 , Page(s): 97 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (794 KB) |  | HTML iconHTML  

    Customer requirement has the characteristics of vagueness, incompleteness and time -varying. An ontology model of product family case and customer fuzzy requirement was constructed by using sharing and reusability of ontology on semantic layer. The fuzziness of customer requirement was expressed by introducing the fuzzy ontology of linguistic variables; The incompleteness of customer requirement was solved by introducing the rules of ontology and constructing ontology rule base; The time -varying of customer requirement was solved by normalizing parameter of customer requirement and product family. It used multi -strategy ontology mapping method to achieve matching between customer requirement ontology and product family case ontology to realize product configuration based on customer requirement. Finally, the computer product configuration is taken as an example to verify the feasibility of this approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal analysis of pure-join model of chord using alloy

    Publication Year: 2013 , Page(s): 102 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    Chord is a popular structured peer-to-peer protocol. In this protocol a hash function is used to identify Nodes ID and data Keys. Therefore, it is possible that different nodes have the same ID; examining the features of this protocol under the condition in which different nodes may have the same ID is important. In this paper, using Alloy, we formally examine two features of Pure-Join model of Chord in such a condition: “Join preserves validity or not” and “The state of Allcycle can be reached with stabilize operation or not”. Our study shows that with high probability, Join preserves validity, and Chord cannot reach “Allcycle” state with stabilize operation in some cases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The study of urban drainage network information system space framework data standards in kunming based on GIS

    Publication Year: 2013 , Page(s): 107 - 111
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (560 KB) |  | HTML iconHTML  

    Geographic data are the basis of the urban drainage network management information system, in order to ensure the consistency and validity of the data, provide reliable data sharing and exchange for the tube network information system, research of data standardization is very important and must be carried out. This article based on detected data, completing the following standardized work: 1.Divide the drainage network layer for ordering layer structure in logic; 2.Formulate the rules of data encoding for providing all the data in a standardized format; 3.Developing data attribute table, so to elaborate content rules for each type of tube wells based on unified coding; 4. At last, propose requirements of validity of the data to ensure the maintenance of the system data and new data update. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding requirements engineering practices for packaged software implementation

    Publication Year: 2013 , Page(s): 112 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (195 KB) |  | HTML iconHTML  

    Requirements engineering approaches are appropriate when software is to be developed from scratch. However, in most organization, new software is now created by integrating functionality from existing software and components or by implementing packaged software. In such cases, it makes little sense to specify requirements in terms of what the software should do - the functionality is already defined in this software. Rather, we argue that it is more appropriate to consider the software requirements from a misalignments perspective - what functions software provides and who needs that functions to do their job and what misalignments between software functions and users' needs. To explore this area, we study cases of PS implementation in two software development companies. Our research design follows an interpretive approach, in which analysis was undertaken using an inductive approach. From an analysis of the cases, we induced a theoretical model explaining the requirement engineering practices (REP) for packaged software implementation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.