[AISWorld] Newly published papers of JCSE (Dec. 2013)

JCSE OFFICE office at kiise.org
Mon Dec 30 02:06:33 EST 2013


Dear Colleague:

 

We are pleased to announce the release of a new issue of Journal of
Computing Science and Engineering (JCSE), published by the Korean Institute
of Information Scientists and Engineers (KIISE). KIISE is the largest
organization for computer scientists in Korea with over 4000 active
members. 

 

Journal of Computing Science and Engineering (JCSE) is a peer-reviewed
quarterly journal that publishes high-quality papers on all aspects of
computing science and engineering. JCSE aims to foster communication
between academia and industry within the rapidly evolving field of
Computing Science and Engineering. The journal is intended to promote
problem-oriented research that fuses academic and industrial expertise. The
journal focuses on emerging computer and information technologies
including, but not limited to, embedded computing, ubiquitous computing,
convergence computing, green computing, smart and intelligent computing,
and human computing. JCSE publishes original research contributions,
surveys, and experimental studies with scientific advances.

 

Please take a look at our new issue posted at http://jcse.kiise.org
<http://jcse.kiise.org/> . All the papers can be downloaded from the Web
page.

 

 

The contents of the latest issue of Journal of Computing Science and
Engineering (JCSE)

Official Publication of the Korean Institute of Information Scientists and
Engineers

Volume 7, Number 4, December 2013

 

pISSN: 1976-4677

eISSN: 2093-8020

 

* JCSE web page: http://jcse.kiise.org

* e-submission: http://mc.manuscriptcentral.com/jcse

 

Editor in Chief: Insup Lee (University of Pennsylvania)

Il-Yeol Song (Drexel University) 

Jong C. Park (KAIST)

Taewhan Kim (Seoul National University)

 

 

JCSE, vol. 7, no. 4, December 2013

 

[Paper One]

- Title: On the Intersection of Human-Centered Computing and Web Science

- Authors: Alejandro Jaimes

- Keyword: Computer science and engineering; Human-computer interaction

 

- Abstract

Human-centered computing (HCC) as a field was defined several years ago.
Since then, the Web has grown significantly, and so has its impact in
society at every level, creating the grounds for a new Web science. In this
paper, we examine the definitions of HCC and Web science, and discuss how
they might be related. On the one hand, HCC can be viewed as a set of
methodologies, and on the other hand, Web science can be viewed as a
platform or repository, from which behavioral data can be drawn. We examine
the relationship between the two, and summarize three different research
approaches that in many ways show this intersection.

 

To obtain a copy of the entire article, click on the link below.
 
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=186&page_url=Cur
rent_Issues> JCSE, vol. 7, no. 4, pp.211-219

 

[Paper Two]

- Title: A Review of Window Query Processing for Data Streams

- Authors: Hyeon Gyu Kim, Myoung Ho Kim

- Keyword: Data streams; Continuous queries; Sliding windows; Window query
processing; Load shedding

 

- Abstract

In recent years, progress in hardware technology has resulted in the
possibility of monitoring many events in real time. The volume of incoming
data may be so large, that monitoring all individual data might be
intractable. Revisiting any particular record can also be impossible in
this environment. Therefore, many database schemes, such as aggregation,
join, frequent pattern mining, and indexing, become more challenging in
this context. This paper surveys the previous efforts to resolve these
issues in processing data streams. The emphasis is on specifying and
processing sliding window queries, which are supported in many stream
processing engines. We also review the related work on stream query
processing, including synopsis structures, plan sharing, operator
scheduling, load shedding, and disorder control.

 

To obtain a copy of the entire article, click on the link below.
JCSE,
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=187&page_url=Cur
rent_Issues>  vol. 7, no. 4, pp.220-230

 

[Paper Three]

- Title: A Survey on Communication Protocols for Wireless Sensor Networks

- Authors: Ingook Jang, Dohoo Pyeon, Sunwoo Kim, and Hyunsoo Yoon

- Keyword: Medium access control; Synchronous/asynchronous MAC protocols;
Single-channel/Multi-channel communication; Multihop broadcast; Energy
efficiency

 

- Abstract

Improvements in wireless sensor network (WSN) technology have resulted in a
large number of applications. WSNs have been mainly used for monitoring
applications, but they are also applicable to target tracking, health care,
and monitoring with multimedia data. Nodes are generally deployed in
environments where the exhausted batteries of sensor nodes are difficult to
charge or replace. The primary goal of communication protocols in WSNs is
to maximize energy efficiency in order to prolong network lifetime. In this
paper, various medium access control (MAC) protocols for synchronous/

asynchronous and single/multi-channel WSNs are investigated. Single-channel
MAC protocols are categorized into synchronous and asynchronous approaches,
and the advantages and disadvantages of each protocol are presented. The
different features required in multi-channel WSNs compared to single-
channel WSNs are also investigated, and surveys on multi-channel MAC
protocols proposed for WSNs are provided. Then, existing broadcast schemes
in such MAC protocols and efficient multi-hop broadcast protocols proposed
for WSNs are provided. The limitations and challenges in many communication
protocols according to this survey are pointed out, which will help future
researches on the design of communication protocols for WSNs.

 

To obtain a copy of the entire article, click on the link below.
JCSE,
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=188&page_url=Cur
rent_Issues>  vol. 7, no. 4, pp.231-241

 

[Paper Four]

- Title: A Survey on Intrusion-Tolerant System

- Authors: Seondong Heo, Pyeong Kim, Yongjoo Shin, Jungmin Lim, Dongyoung
Koo, Yonggon Kim, Ohmin Kwon, and Hyunsoo Yoon

- Keyword: Intrusion-tolerant system; ITS; Availability; Security

 

- Abstract

Many information systems that provide useful services to people are
connected to the Internet for convenience and efficiency. However, improper
accessibility might make the systems susceptible to a variety of attacks.
Although existing security solutions such as an intrusion detection system,
intrusion prevention system, and firewalls have been designed to protect
against such attacks, it is impossible to block all kinds of attacks.
Furthermore, most of the proposed solutions require information about
attacks for efficient prevention. Research on intrusion-tolerant systems
(ITSs) have been conducted in order to continue providing proper services
in threatening environments. The purpose of an ITS is to survive

against every intrusion, rather than to prevent them. In this paper,
previous studies on ITS are introduced and classified according to the
centric scheme as middleware-based ITS, hardware-based ITS, and recovery-
based ITS. Recent research focusing on adaptive transformation schemes is
also introduced.

 

To obtain a copy of the entire article, click on the link below.
JCSE,
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=189&page_url=Cur
rent_Issues>  vol. 7, no. 4, pp.242-250

 

[Paper Five]

- Title: A Catalog of Bad Smells in Design-by-Contract Methodologies with
Java Modeling Language

- Authors: Thiago Viana

- Keyword: Java Modeling Language; Bad smells; Design-By-Contract;
Refactoring

 

- Abstract

Bad smells are usually related to program source code, arising from bad
design and programming practices. Refactoring activities are often
motivated by the detection of bad smells. With the increasing adoption of
Design-by-Contract (DBC) methodologies in formal software development,
evidence of bad design practices can similarly be found in programs that
combine actual production code with interface contracts. These contracts
can be written in languages, such as the Java Modeling Language (JML), an
extension to the Java syntax. This paper presents a catalog of bad smells
that appear during DBC practice, considering JML as the language for
specifying contracts. These smells are described over JML constructs,
although several can appear in other DBC languages. The catalog contains 6
DBC smells. We evaluate the recurrence of DBC smells in two ways: first by
describing a small study with graduate student projects, and second by
counting occurrences of smells in contracts from the JML models application
programming interface (API). This API contains classes with more than 1,600
lines in contracts. Along with the documented smells, suggestions are
provided for minimizing the impact or even removing a bad smell. It is
believed that initiatives towards the cataloging of bad smells are useful
for establishing good design practices in DBC.

 

To obtain a copy of the entire article, click on the link below.
JCSE,
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=190&page_url=Cur
rent_Issues>  vol. 7, no. 4, pp.251-262

 

[Paper Six]

- Title: Robust Fuzzy Varying Coefficient Regression Analysis with Crisp
Inputs and Gaussian Fuzzy Output

- Authors: Zhihui Yang and Yunqiang Yin, Yizeng Chen

- Keyword: Gaussian fuzzy number; Goodness of fit; Outlier; Fuzzy varying
coefficient regression

- Abstract

This study presents a fuzzy varying coefficient regression model after
deleting the outliers to improve the feasibility and effectiveness of the
fuzzy regression model. The objective of our methodology is to allow the
fuzzy regression coefficients to vary with a covariate, and simultaneously
avoid the impact of data contaminated by outliers. In this paper, fuzzy
regression coefficients are represented by Gaussian fuzzy numbers. We also
formulate suitable goodness of fit to evaluate the performance of the
proposed methodology. An example is given to demonstrate the effectiveness
of our methodology.

 

To obtain a copy of the entire article, click on the link below.
JCSE,
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=191&page_url=Cur
rent_Issues>  vol. 7, no. 4, pp.263-271

 

[Paper Seven]

- Title: Anomaly Detection in Medical Wireless Sensor Networks

- Authors: Osman Salem, Yaning Liu, Ahmed Mehaoua

- Keyword: Healthcare monitoring; Wireless sensor networks; Security;
Anomaly detection; Fault detection; Mahalanobis distance

 

- Abstract

In this paper, we propose a new framework for anomaly detection in medical
wireless sensor networks, which are used for remote monitoring of patient
vital signs. The proposed framework performs sequential data analysis on a
mini gateway used as a base station to detect abnormal changes and to cope
with unreliable measurements in collected data without prior knowledge of
anomalous events or normal data patterns. The proposed approach is based on
the Mahalanobis distance for spatial analysis, and a kernel density
estimator for the identification of abnormal temporal patterns. Our main
objective is to distinguish between faulty measurements and clinical
emergencies in order to reduce false alarms triggered by faulty
measurements or ill-behaved sensors. Our experimental results on both real
and synthetic medical datasets show that the proposed approach can achieve
good detection accuracy with a low false alarm rate (less than 5.5%).

 

To obtain a copy of the entire article, click on the link below.
JCSE,
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=192&page_url=Cur
rent_Issues>  vol. 7, no. 4, pp.272-284

 

[Paper Eight]

- Title: Counter-Based Approaches for Efficient WCET Analysis of Multicore
Processors with Shared Caches

- Authors: Yiqiang Ding and Wei Zhang

- Keyword: Performance; Reliability; WCET analysis; Multicore processors;
Shared caches

 

- Abstract

To enable hard real-time systems to take advantage of multicore processors,
it is crucial to obtain the worst-case execution time (WCET) for programs
running on multicore processors. However, this is challenging and
complicated due to the inter-thread interferences from the shared resources
in a multicore processor. Recent research used the combined cache conflict
graph (CCCG) to model and compute the worst-case inter-thread interferences
on a shared L2 cache in a multicore processor, which is called the CCCG-
based approach in this paper. Although it can compute the WCET safely and
accurately, its computational complexity is exponential and prohibitive for
a large number of cores. In this paper, we propose three counter-based
approaches to significantly reduce the complexity of the multicore WCET
analysis, while achieving absolute safety with tightness close to the CCCG-
based approach. The basic counter-based approach simply counts the worst-
case number of cache line blocks mapped to a cache set of a shared L2 cache
from all the concurrent threads, and compares it with the associativity of
the cache set to compute the worst-case cache behavior. The enhanced
counter-based approach uses techniques to enhance the accuracy of
calculating the counters. The hybrid counter-based

approach combines the enhanced counter-based approach and the CCCG-based
approach to further improve the tightness of analysis without significantly
increasing the complexity. Our experiments on a 4-core processor indicate
that the enhanced counter-based approach overestimates the WCET by 14% on
average compared to the CCCG-based approach, while its averaged running
time is less than 1/380 that of the CCCG-based approach. The hybrid
approach reduces the overestimation to only 2.65%, while its running time
is less than 1/150 that of the CCCG-based approach on average.

 

To obtain a copy of the entire article, click on the link below.
JCSE,
<http://jcse.kiise.org/PublishedPaper/year_abstract.asp?idx=193&page_url=Cur
rent_Issues>  vol. 7, no. 4, pp.285-299

 

[Call For Papers]

Journal of Computing Science and Engineering (JCSE), published by the
Korean Institute of Information Scientists and Engineers (KIISE) is devoted
to the timely dissemination of novel results and discussions on all aspects
of computing science and engineering, divided into Foundations, Software &
Applications, and Systems & Architecture. Papers are solicited in all areas
of computing science and engineering. See JCSE home page at
http://jcse.kiise.org <http://jcse.kiise.org/>  for the subareas.

The journal publishes regularly submitted papers, invited papers, selected
best papers from reputable conferences and workshops, and thematic issues
that address hot research topics. Potential authors are invited to submit
their manuscripts electronically, prepared in PDF files, through
<http://mc.manuscriptcentral.com/jcse>
http://mc.manuscriptcentral.com/jcse, where ScholarOne is used for on-line
submission and review. Authors are especially encouraged to submit papers
of around 10 but not more than 30 double-spaced pages in twelve point type.
The corresponding author's full postal and e-mail addresses, telephone and
FAX numbers as well as current affiliation information must be given on the
manuscript. Further inquires are welcome at JCSE Editorial Office,
<mailto:office at kiise.org> office at kiise.org (phone: +82-2-588-9240; FAX: +82-
2-521-1352).

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20131230/7e5715b0/attachment.html>


More information about the AISWorld mailing list