首页 > 最新文献

2016 IEEE Symposium Series on Computational Intelligence (SSCI)最新文献

英文 中文
Component behavior discovery from software execution data 从软件执行数据中发现组件行为
Pub Date : 2016-12-06 DOI: 10.1109/SSCI.2016.7849947
Cong Liu, B. V. Dongen, Nour Assy, Wil M.P. van der Aalst
Tremendous amounts of data can be recorded during software execution. This provides valuable information on software runtime analysis. Many crashes and exceptions may occur, and it is a real challenge to understand how software is behaving. Software is usually composed of various components. A component is a nearly independent part of software that full-fills a clear function. Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs. This paper presents an approach to utilize process mining as a tool to discover the real behavior of software and analyze it. The unstructured software execution data may be too complex, involving multiple interleaved components, etc. Applying existing process mining techniques results in spaghetti-like models with no clear structure and no valuable information that can be easily understood by end. In this paper, we start with the observation that software is composed of components and we use this information to decompose the problem into smaller independent ones by discovering a behavioral model per component. Through experimental analysis, we illustrate that the proposed approach facilitates the discovery of more understandable software models. All proposed approaches have been implemented in the open-source process mining toolkit ProM.
在软件执行过程中可以记录大量的数据。这为软件运行时分析提供了有价值的信息。可能会发生许多崩溃和异常,理解软件的行为方式是一个真正的挑战。软件通常由各种组件组成。组件是软件中几乎独立的部分,它完成了一个明确的功能。过程挖掘旨在通过从事件日志中提取知识来发现、监控和改进实际过程。本文提出了一种利用过程挖掘作为工具来发现软件的真实行为并对其进行分析的方法。非结构化的软件执行数据可能过于复杂,涉及多个交错的组件等。应用现有的流程挖掘技术会产生类似意大利面的模型,没有清晰的结构,也没有最终容易理解的有价值的信息。在本文中,我们首先观察到软件是由组件组成的,我们使用这些信息通过发现每个组件的行为模型来将问题分解为更小的独立问题。通过实验分析,我们证明了所提出的方法有助于发现更易于理解的软件模型。所有提出的方法都已在开源过程挖掘工具包ProM中实现。
{"title":"Component behavior discovery from software execution data","authors":"Cong Liu, B. V. Dongen, Nour Assy, Wil M.P. van der Aalst","doi":"10.1109/SSCI.2016.7849947","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849947","url":null,"abstract":"Tremendous amounts of data can be recorded during software execution. This provides valuable information on software runtime analysis. Many crashes and exceptions may occur, and it is a real challenge to understand how software is behaving. Software is usually composed of various components. A component is a nearly independent part of software that full-fills a clear function. Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs. This paper presents an approach to utilize process mining as a tool to discover the real behavior of software and analyze it. The unstructured software execution data may be too complex, involving multiple interleaved components, etc. Applying existing process mining techniques results in spaghetti-like models with no clear structure and no valuable information that can be easily understood by end. In this paper, we start with the observation that software is composed of components and we use this information to decompose the problem into smaller independent ones by discovering a behavioral model per component. Through experimental analysis, we illustrate that the proposed approach facilitates the discovery of more understandable software models. All proposed approaches have been implemented in the open-source process mining toolkit ProM.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122392473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
A systemic approach to automatic metadata extraction from multimedia content 从多媒体内容中自动提取元数据的系统方法
Pub Date : 2016-12-06 DOI: 10.1109/SSCI.2016.7849983
Christos Varytimidis, Georgios Tsatiris, Konstantinos Rapantzikos, S. Kollias
There is a need for automatic processing and extracting of meaningful metadata from multimedia information, especially in the audiovisual industry. This higher level information is used in a variety of practices, such as enriching multimedia content with external links, clickable objects and useful related information in general. This paper presents a system for efficient multimedia content analysis and automatic annotation within a multimedia processing and publishing framework. This system is comprised of three modules: the first provides detection of faces and recognition of known persons; the second provides generic object detection, based on a deep convolutional neural network topology; the third provides automated location estimation and landmark recognition based on state-of-the-art technologies. The results are exported in meaningful metadata that can be utilized in various ways. The system has been developed and successfully tested in the framework of the EC Horizon 2020 Mecanex project, targeting advertising and production markets.
从多媒体信息中自动处理和提取有意义的元数据是一种迫切需要,尤其是在视听行业。这种高级信息用于各种实践,例如用外部链接、可点击对象和有用的相关信息来丰富多媒体内容。本文提出了一个在多媒体处理和发布框架下的高效多媒体内容分析和自动注释系统。该系统由三个模块组成:第一个模块提供人脸检测和已知人员的识别;第二种提供基于深度卷积神经网络拓扑的通用目标检测;第三个提供基于最先进技术的自动位置估计和地标识别。结果导出为有意义的元数据,可以以各种方式使用这些元数据。该系统已在EC Horizon 2020 Mecanex项目框架下开发并成功测试,目标是广告和生产市场。
{"title":"A systemic approach to automatic metadata extraction from multimedia content","authors":"Christos Varytimidis, Georgios Tsatiris, Konstantinos Rapantzikos, S. Kollias","doi":"10.1109/SSCI.2016.7849983","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849983","url":null,"abstract":"There is a need for automatic processing and extracting of meaningful metadata from multimedia information, especially in the audiovisual industry. This higher level information is used in a variety of practices, such as enriching multimedia content with external links, clickable objects and useful related information in general. This paper presents a system for efficient multimedia content analysis and automatic annotation within a multimedia processing and publishing framework. This system is comprised of three modules: the first provides detection of faces and recognition of known persons; the second provides generic object detection, based on a deep convolutional neural network topology; the third provides automated location estimation and landmark recognition based on state-of-the-art technologies. The results are exported in meaningful metadata that can be utilized in various ways. The system has been developed and successfully tested in the framework of the EC Horizon 2020 Mecanex project, targeting advertising and production markets.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust data processing in the presence of uncertainty and outliers: Case of localization problems 存在不确定性和异常值的稳健数据处理:定位问题的案例
Pub Date : 2016-12-06 DOI: 10.1109/SSCI.2016.7849985
Anthony Welte, L. Jaulin, M. Ceberio, V. Kreinovich
To properly process data, we need to take into account both the measurement errors and the fact that some of the observations may be outliers. This is especially important in radar-based localization problems, where some signals may reflect not from the analyzed object, but from some nearby object. There are known methods for dealing with both measurement errors and outliers in situations in which we have full information about the corresponding probability distributions. There are also known statistics-based methods for dealing with measurement errors in situations when we only have partial information about the corresponding probabilities. In this paper, we show how these methods can be extended to situations in which we also have partial information about the outliers (and even to situations when we have no information about the outliers). In some situations in which efficient semi-heuristic methods are known, our methodology leads to a justification of these efficient heuristics - which makes us confident that our new methods will be efficient in other situations as well.
为了正确地处理数据,我们需要考虑到测量误差和一些观测值可能是异常值的事实。这在基于雷达的定位问题中尤其重要,因为有些信号可能不是来自被分析的物体,而是来自附近的物体。在我们有关于相应概率分布的完整信息的情况下,有一些已知的方法可以处理测量误差和异常值。当我们只有有关相应概率的部分信息时,也有一些已知的基于统计的方法来处理测量误差。在本文中,我们展示了如何将这些方法扩展到我们也有关于异常值的部分信息的情况下(甚至当我们没有关于异常值的信息时)。在某些已知有效的半启发式方法的情况下,我们的方法为这些有效的启发式方法提供了理由——这使我们相信我们的新方法在其他情况下也会有效。
{"title":"Robust data processing in the presence of uncertainty and outliers: Case of localization problems","authors":"Anthony Welte, L. Jaulin, M. Ceberio, V. Kreinovich","doi":"10.1109/SSCI.2016.7849985","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849985","url":null,"abstract":"To properly process data, we need to take into account both the measurement errors and the fact that some of the observations may be outliers. This is especially important in radar-based localization problems, where some signals may reflect not from the analyzed object, but from some nearby object. There are known methods for dealing with both measurement errors and outliers in situations in which we have full information about the corresponding probability distributions. There are also known statistics-based methods for dealing with measurement errors in situations when we only have partial information about the corresponding probabilities. In this paper, we show how these methods can be extended to situations in which we also have partial information about the outliers (and even to situations when we have no information about the outliers). In some situations in which efficient semi-heuristic methods are known, our methodology leads to a justification of these efficient heuristics - which makes us confident that our new methods will be efficient in other situations as well.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130820136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparing exploration strategies for Q-learning in random stochastic mazes 比较随机迷宫中q学习的探索策略
Pub Date : 2016-12-06 DOI: 10.1109/SSCI.2016.7849366
A. Tijsma, Mădălina M. Drugan, M. Wiering
Balancing the ratio between exploration and exploitation is an important problem in reinforcement learning. This paper evaluates four different exploration strategies combined with Q-learning using random stochastic mazes to investigate their performances. We will compare: UCB-1, softmax, ∈-greedy, and pursuit. For this purpose we adapted the UCB-1 and pursuit strategies to be used in the Q-learning algorithm. The mazes consist of a single optimal goal state and two suboptimal goal states that lie closer to the starting position of the agent, which makes efficient exploration an important part of the learning agent. Furthermore, we evaluate two different kinds of reward functions, a normalized one with rewards between 0 and 1, and an unnormalized reward function that penalizes the agent for each step with a negative reward. We have performed an extensive grid-search to find the best parameters for each method and used the best parameters on novel randomly generated maze problems of different sizes. The results show that softmax exploration outperforms the other strategies, although it is harder to tune its temperature parameter. The worst performing exploration strategy is ∈-greedy.
平衡探索和利用之间的比例是强化学习中的一个重要问题。本文利用随机迷宫对四种结合Q-learning的探索策略进行评估,考察其性能。我们将比较:UCB-1, softmax,∈-greedy, and pursuit。为此,我们在Q-learning算法中采用了UCB-1和追击策略。迷宫由一个最优目标状态和两个靠近智能体起始位置的次优目标状态组成,这使得高效探索成为学习智能体的重要组成部分。此外,我们评估了两种不同类型的奖励函数,一种是奖励介于0和1之间的规范化奖励函数,另一种是奖励为负的非规范化奖励函数。我们进行了广泛的网格搜索,以找到每种方法的最佳参数,并将最佳参数用于不同大小的新型随机生成的迷宫问题。结果表明,softmax勘探策略优于其他策略,尽管其温度参数难以调整。表现最差的勘探策略是山贪。
{"title":"Comparing exploration strategies for Q-learning in random stochastic mazes","authors":"A. Tijsma, Mădălina M. Drugan, M. Wiering","doi":"10.1109/SSCI.2016.7849366","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849366","url":null,"abstract":"Balancing the ratio between exploration and exploitation is an important problem in reinforcement learning. This paper evaluates four different exploration strategies combined with Q-learning using random stochastic mazes to investigate their performances. We will compare: UCB-1, softmax, ∈-greedy, and pursuit. For this purpose we adapted the UCB-1 and pursuit strategies to be used in the Q-learning algorithm. The mazes consist of a single optimal goal state and two suboptimal goal states that lie closer to the starting position of the agent, which makes efficient exploration an important part of the learning agent. Furthermore, we evaluate two different kinds of reward functions, a normalized one with rewards between 0 and 1, and an unnormalized reward function that penalizes the agent for each step with a negative reward. We have performed an extensive grid-search to find the best parameters for each method and used the best parameters on novel randomly generated maze problems of different sizes. The results show that softmax exploration outperforms the other strategies, although it is harder to tune its temperature parameter. The worst performing exploration strategy is ∈-greedy.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128568415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Improving RL power for on-line evolution of gaits in modular robots 改进模块化机器人步态在线进化的强化学习功率
Pub Date : 2016-12-06 DOI: 10.1109/SSCI.2016.7850166
Milan Jelisavcic, Matteo De Carlo, E. Haasdijk, A. Eiben
This paper addresses the problem of on-line gait learning in modular robots whose shape is not known in advance. The best algorithm for this problem known to us is a reinforcement learning method, called RL PoWER. In this study we revisit the original RL PoWER algorithm and observe that in essence it is a specific evolutionary algorithm. Based on this insight we propose two modifications of the main search operators and compare the quality of the evolved gaits when either or both of these modified operators are employed. The results show that using 2-parent crossover as well as mutation with self-adaptive step-sizes can significantly improve the performance of the original algorithm.
研究了形状未知的模块化机器人在线步态学习问题。我们已知的解决这个问题的最佳算法是一种强化学习方法,称为RL PoWER。在本研究中,我们重新审视了原始的RL PoWER算法,并观察到本质上它是一个特定的进化算法。基于这一见解,我们提出了两种主要搜索算子的修改,并比较了当使用这两种修改算子中的一种或两种时进化步态的质量。结果表明,采用双亲交叉和自适应步长突变可以显著提高原算法的性能。
{"title":"Improving RL power for on-line evolution of gaits in modular robots","authors":"Milan Jelisavcic, Matteo De Carlo, E. Haasdijk, A. Eiben","doi":"10.1109/SSCI.2016.7850166","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7850166","url":null,"abstract":"This paper addresses the problem of on-line gait learning in modular robots whose shape is not known in advance. The best algorithm for this problem known to us is a reinforcement learning method, called RL PoWER. In this study we revisit the original RL PoWER algorithm and observe that in essence it is a specific evolutionary algorithm. Based on this insight we propose two modifications of the main search operators and compare the quality of the evolved gaits when either or both of these modified operators are employed. The results show that using 2-parent crossover as well as mutation with self-adaptive step-sizes can significantly improve the performance of the original algorithm.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Broken bikes detection using CitiBike bikeshare system open data 利用CitiBike共享单车系统公开数据进行自行车破损检测
Pub Date : 2016-12-06 DOI: 10.1109/SSCI.2016.7850091
Rémi Delassus, R. Giot, Raphael Cherrier, Gabriele Barbieri, Guy Melançon
It seems necessary to detect a broken bike rooted at a station in near realtime as the number of bikes within bikeshare systems has reached more than a million in 2015. Indeed, a bike that cannot be moved is not cost effective in terms of number of trips. This brings frustration to users who were expecting to find a bike at that station without knowing that it is actually defective. We thus propose a methodology from feature extraction to anomaly detection on a distributed cloud infrastructure in order to detect bicycles requiring a repair. Through a first step of K-means clustering, and a second step consisting of spotting samples that do not clearly belong to any cluster, we separate anomalies from normal behaviors. The proposal is validated on a publicly available dataset provided by Motivate, the operator of the New-York bikeshare system. The number of distinct bikes that have been classified by this algorithm as broken at least once during a month is close to the number of repairs given in monthly reports of Motivate.
2015年,共享单车系统内的自行车数量已超过100万辆,因此,在车站近乎实时地检测出一辆坏掉的自行车似乎很有必要。事实上,一辆不能移动的自行车在骑行次数上并不划算。这给用户带来了挫败感,他们本来希望在那个车站找到一辆自行车,却不知道它实际上是有缺陷的。因此,我们提出了一种在分布式云基础设施上从特征提取到异常检测的方法,以检测需要维修的自行车。通过K-means聚类的第一步,以及由发现不明确属于任何聚类的样本组成的第二步,我们将异常从正常行为中分离出来。该提议在纽约共享单车系统运营商Motivate提供的公开数据集上得到了验证。被该算法分类为一个月内至少损坏一次的不同自行车的数量接近于Motivate每月报告中给出的维修数量。
{"title":"Broken bikes detection using CitiBike bikeshare system open data","authors":"Rémi Delassus, R. Giot, Raphael Cherrier, Gabriele Barbieri, Guy Melançon","doi":"10.1109/SSCI.2016.7850091","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7850091","url":null,"abstract":"It seems necessary to detect a broken bike rooted at a station in near realtime as the number of bikes within bikeshare systems has reached more than a million in 2015. Indeed, a bike that cannot be moved is not cost effective in terms of number of trips. This brings frustration to users who were expecting to find a bike at that station without knowing that it is actually defective. We thus propose a methodology from feature extraction to anomaly detection on a distributed cloud infrastructure in order to detect bicycles requiring a repair. Through a first step of K-means clustering, and a second step consisting of spotting samples that do not clearly belong to any cluster, we separate anomalies from normal behaviors. The proposal is validated on a publicly available dataset provided by Motivate, the operator of the New-York bikeshare system. The number of distinct bikes that have been classified by this algorithm as broken at least once during a month is close to the number of repairs given in monthly reports of Motivate.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Q-learning with experience replay in a dynamic environment 动态环境下的q学习与经验回放
Pub Date : 2016-12-06 DOI: 10.1109/SSCI.2016.7849368
Mathijs Pieters, M. Wiering
Most research in reinforcement learning has focused on stationary environments. In this paper, we propose several adaptations of Q-learning for a dynamic environment, for both single and multiple agents. The environment consists of a grid of random rewards, where every reward is removed after a visit. We focus on experience replay, a technique that receives a lot of attention nowadays, and combine this method with Q-learning. We compare two variations of experience replay, where experiences are reused based on time or based on the obtained reward. For multi-agent reinforcement learning we compare two variations of policy representation. In the first variation the agents share a Q-function, while in the second variation both agents have a separate Q-function. Furthermore, in both variations we test the effect of reward sharing between the agents. This leads to four different multi-agent reinforcement learning algorithms, from which sharing a Q-function and sharing the rewards is the most cooperative method. The results show that in the single-agent environment both experience replay algorithms significantly outperform standard Q-learning and a greedy benchmark agent. In the multi-agent environment the highest maximum reward sum in a trial is achieved by using one Q-function and reward sharing. The highest mean reward sum is obtained with separate Q-functions and separate rewards.
大多数强化学习的研究都集中在固定环境上。在本文中,我们提出了几个动态环境下q -学习的适应性,包括单智能体和多智能体。游戏环境由随机奖励网格组成,玩家访问后所有奖励都会被移除。我们专注于经验回放,这是一种现在非常受关注的技术,并将这种方法与Q-learning相结合。我们比较了体验重放的两种变体,即基于时间或基于获得的奖励而重复使用体验。对于多智能体强化学习,我们比较了策略表示的两种变体。在第一个变量中,智能体共享一个q函数,而在第二个变量中,两个智能体都有一个单独的q函数。此外,在这两种变化中,我们都测试了代理之间奖励分享的影响。这导致了四种不同的多智能体强化学习算法,其中共享q函数和共享奖励是最具协作性的方法。结果表明,在单智能体环境下,两种经验重放算法的性能都明显优于标准q -学习和贪婪基准智能体。在多智能体环境中,通过使用一个q函数和奖励共享来实现一次试验中最大的奖励总和。使用单独的q函数和单独的奖励获得最高的平均奖励总和。
{"title":"Q-learning with experience replay in a dynamic environment","authors":"Mathijs Pieters, M. Wiering","doi":"10.1109/SSCI.2016.7849368","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849368","url":null,"abstract":"Most research in reinforcement learning has focused on stationary environments. In this paper, we propose several adaptations of Q-learning for a dynamic environment, for both single and multiple agents. The environment consists of a grid of random rewards, where every reward is removed after a visit. We focus on experience replay, a technique that receives a lot of attention nowadays, and combine this method with Q-learning. We compare two variations of experience replay, where experiences are reused based on time or based on the obtained reward. For multi-agent reinforcement learning we compare two variations of policy representation. In the first variation the agents share a Q-function, while in the second variation both agents have a separate Q-function. Furthermore, in both variations we test the effect of reward sharing between the agents. This leads to four different multi-agent reinforcement learning algorithms, from which sharing a Q-function and sharing the rewards is the most cooperative method. The results show that in the single-agent environment both experience replay algorithms significantly outperform standard Q-learning and a greedy benchmark agent. In the multi-agent environment the highest maximum reward sum in a trial is achieved by using one Q-function and reward sharing. The highest mean reward sum is obtained with separate Q-functions and separate rewards.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
HERMES: A high-level policy language for high-granularity enterprise-wide secure browser configuration management HERMES:用于高粒度企业级安全浏览器配置管理的高级策略语言
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849914
Ananth A. Jillepalli, D. Leon, Stuart Steiner, Frederick T. Sheldon
In this article, we describe the characteristics, structure, and uses of HERMES. HERMES is a high-level security policy description language. Its characteristics are: (1) enable the specification of organizational domain knowledge in a hierarchical manner; (2) enable the specification of security policies at desired granularity levels within the organizational IT and OT infrastructure; (3) enable security policies to be automatically instantiated into security configurations; (4) it is human-centered and designed for ease of use; (5) it is application and device independent. We show an example of using HERMES to write a high-level policy and show examples of how such policy can be instantiated into a domain and device, user and role, application and action specific security configuration. We also describe the integration of HERMES within the HiFiPol:Browser policy management system. We believe HERMES is a necessary step toward securing the client side of the web ecosystem and prevent or mitigate the current onslaught of web browser-based attacks, such as phishing.
在本文中,我们将描述HERMES的特点、结构和用途。HERMES是一种高级安全策略描述语言。它的特点是:(1)能够以层次的方式规范组织领域知识;(2)在组织的IT和OT基础设施中,在所需的粒度级别上规范安全策略;(3)使安全策略能够自动实例化到安全配置中;(4)以人为本,便于使用;(5)与应用和设备无关。我们展示了一个使用HERMES编写高级策略的示例,并展示了如何将此类策略实例化为特定于域和设备、用户和角色、应用程序和操作的安全配置的示例。我们还描述了HERMES在HiFiPol:Browser策略管理系统中的集成。我们相信HERMES是确保网络生态系统客户端安全的必要步骤,并防止或减轻当前基于浏览器的攻击,如网络钓鱼。
{"title":"HERMES: A high-level policy language for high-granularity enterprise-wide secure browser configuration management","authors":"Ananth A. Jillepalli, D. Leon, Stuart Steiner, Frederick T. Sheldon","doi":"10.1109/SSCI.2016.7849914","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849914","url":null,"abstract":"In this article, we describe the characteristics, structure, and uses of HERMES. HERMES is a high-level security policy description language. Its characteristics are: (1) enable the specification of organizational domain knowledge in a hierarchical manner; (2) enable the specification of security policies at desired granularity levels within the organizational IT and OT infrastructure; (3) enable security policies to be automatically instantiated into security configurations; (4) it is human-centered and designed for ease of use; (5) it is application and device independent. We show an example of using HERMES to write a high-level policy and show examples of how such policy can be instantiated into a domain and device, user and role, application and action specific security configuration. We also describe the integration of HERMES within the HiFiPol:Browser policy management system. We believe HERMES is a necessary step toward securing the client side of the web ecosystem and prevent or mitigate the current onslaught of web browser-based attacks, such as phishing.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Sensor-based change detection schemes for dynamic multi-objective optimization problems 基于传感器的动态多目标优化问题变化检测方案
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849963
Shaaban A. Sahmoud, H. Topcuoglu
Detecting changes in a landscape is a critical issue for several evolutionary dynamic optimization techniques. This is because most of these techniques have steps to be taken as a response to the environmental changes. It may not be feasible for most of the real world problems to know a priori when a change occurs; therefore, explicit schemes should be proposed to detect the points in time when a change occurs. Although there are both sensor-based and population-based detection schemes presented in the literature for single objective dynamic optimization problems, there are no such efforts for the dynamic multi-objective optimization problems (DMOPs). This paper proposes a set of novel sensor-based change detection schemes for DMOPs. An empirical study is presented for validating the performance of the proposed detection schemes by using eight test problems which have different types and characteristics. Additionally, the proposed change detection schemes are incorporated into a dynamic multi-objective evolutionary algorithm to validate the effectiveness of the proposed change detection schemes.
对于一些进化动态优化技术来说,检测景观的变化是一个关键问题。这是因为大多数这些技术都需要采取步骤来应对环境变化。对于大多数现实世界的问题来说,先验地知道变化何时发生可能是不可行的;因此,应该提出明确的方案来检测变化发生的时间点。尽管针对单目标动态优化问题,文献中既有基于传感器的检测方案,也有基于种群的检测方案,但对于动态多目标优化问题(dops),尚无此类研究。本文提出了一套新的基于传感器的dmp变化检测方案。通过使用8个具有不同类型和特征的测试问题,对所提出的检测方案的性能进行了实证研究。此外,将所提出的变更检测方案整合到动态多目标进化算法中,验证所提出的变更检测方案的有效性。
{"title":"Sensor-based change detection schemes for dynamic multi-objective optimization problems","authors":"Shaaban A. Sahmoud, H. Topcuoglu","doi":"10.1109/SSCI.2016.7849963","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849963","url":null,"abstract":"Detecting changes in a landscape is a critical issue for several evolutionary dynamic optimization techniques. This is because most of these techniques have steps to be taken as a response to the environmental changes. It may not be feasible for most of the real world problems to know a priori when a change occurs; therefore, explicit schemes should be proposed to detect the points in time when a change occurs. Although there are both sensor-based and population-based detection schemes presented in the literature for single objective dynamic optimization problems, there are no such efforts for the dynamic multi-objective optimization problems (DMOPs). This paper proposes a set of novel sensor-based change detection schemes for DMOPs. An empirical study is presented for validating the performance of the proposed detection schemes by using eight test problems which have different types and characteristics. Additionally, the proposed change detection schemes are incorporated into a dynamic multi-objective evolutionary algorithm to validate the effectiveness of the proposed change detection schemes.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Applying Computational Intelligence for enhancing the dependability of multi-cloud systems using Docker Swarm 利用Docker Swarm应用计算智能增强多云系统的可靠性
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7850194
N. Naik
Multi-cloud systems have been gaining popularity due to the several benefits of the multi-cloud infrastructure such as lower level of vendor lock-in and minimize the risk of widespread data loss or downtime. Thus, the multi-cloud infrastructure enhances the dependability of the cloud-based system. However, it also poses many challenges such as nonstandard and inherent complexity due to different technologies, interfaces, and services. Consequently, it is a challenging task to design multi-cloud dependable systems. Virtualization is the key technology employed in the development of cloud-based systems. Docker has recently introduced its container-based virtualization technology for the development of software systems. It has newly launched a distributed system development tool called Swarm, which allows the development of a cluster of multiple Swarm nodes on multiple clouds. Docker Swarm has also incorporated several dependability attributes to support the development of a multi-cloud dependable system. However, making Swarm cluster always available requires minimum three active manager nodes which can safeguard one failure. This essential condition for the dependability is one of the main limitations because if two manager nodes fail suddenly due to the failure of their hosts, then Swarm cluster cannot be made available for routine operations. Therefore, this paper proposes an intuitive approach based on Computational Intelligence (CI) for enhancing its dependability. The proposed CI-based approach predicts the possible failure of the host of a manager node by observing its abnormal behaviour. Thus, this indication can automatically trigger the process of creating a new manager node or promoting an existing node as a manager for enhancing the dependability of Docker Swarm.
多云系统越来越受欢迎,这是由于多云基础设施的几个好处,例如较低的供应商锁定级别,并最大限度地减少大范围数据丢失或停机的风险。因此,多云基础架构增强了基于云的系统的可靠性。然而,由于技术、接口和服务的不同,它也带来了许多挑战,如非标准和固有的复杂性。因此,设计多云可靠系统是一项具有挑战性的任务。虚拟化是开发基于云的系统所采用的关键技术。Docker最近推出了用于软件系统开发的基于容器的虚拟化技术。它最近推出了一个名为Swarm的分布式系统开发工具,它允许在多个云上开发多个Swarm节点的集群。Docker Swarm还整合了几个可靠性属性,以支持多云可靠系统的开发。然而,使Swarm集群始终可用需要至少三个活动管理节点,这可以防止一个故障。这个可靠性的基本条件是主要限制之一,因为如果两个管理节点由于其主机故障而突然失效,那么Swarm集群就不能用于日常操作。因此,本文提出了一种基于计算智能(CI)的直观方法来提高其可靠性。提出的基于ci的方法通过观察管理节点主机的异常行为来预测其可能出现的故障。因此,该指示可以自动触发创建新的管理节点或将现有节点提升为管理器的过程,以增强Docker Swarm的可靠性。
{"title":"Applying Computational Intelligence for enhancing the dependability of multi-cloud systems using Docker Swarm","authors":"N. Naik","doi":"10.1109/SSCI.2016.7850194","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7850194","url":null,"abstract":"Multi-cloud systems have been gaining popularity due to the several benefits of the multi-cloud infrastructure such as lower level of vendor lock-in and minimize the risk of widespread data loss or downtime. Thus, the multi-cloud infrastructure enhances the dependability of the cloud-based system. However, it also poses many challenges such as nonstandard and inherent complexity due to different technologies, interfaces, and services. Consequently, it is a challenging task to design multi-cloud dependable systems. Virtualization is the key technology employed in the development of cloud-based systems. Docker has recently introduced its container-based virtualization technology for the development of software systems. It has newly launched a distributed system development tool called Swarm, which allows the development of a cluster of multiple Swarm nodes on multiple clouds. Docker Swarm has also incorporated several dependability attributes to support the development of a multi-cloud dependable system. However, making Swarm cluster always available requires minimum three active manager nodes which can safeguard one failure. This essential condition for the dependability is one of the main limitations because if two manager nodes fail suddenly due to the failure of their hosts, then Swarm cluster cannot be made available for routine operations. Therefore, this paper proposes an intuitive approach based on Computational Intelligence (CI) for enhancing its dependability. The proposed CI-based approach predicts the possible failure of the host of a manager node by observing its abnormal behaviour. Thus, this indication can automatically trigger the process of creating a new manager node or promoting an existing node as a manager for enhancing the dependability of Docker Swarm.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2016 IEEE Symposium Series on Computational Intelligence (SSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1