首页 > 最新文献

The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)最新文献

英文 中文
Some improvements in the RGB-D SLAM system RGB-D SLAM系统的一些改进
Hieu Pham Quang, N. Ly
RGB-D cameras offer both color and depth images of the surrounding environment, making them an attractive option for robot sensor. In this work, we present an RGB-D SLAM system using the Microsoft Kinect. The proposed system is a full 6DoF (Degrees of Freedom) SLAM system which can estimate camera trajectory and reconstruct a 3D model of the environment in real-time. Unlike traditional filtering-based approaches, our system optimizes the entire trajectory by the use of graph optimization. We achieve better accuracy than a previous system by employing key-frame matching instead of frame-to-frame matching. We evaluate our system on a published dataset. The results demonstrate that our system can handle unrestricted camera movements in indoor settings.
RGB-D相机提供周围环境的彩色和深度图像,使其成为机器人传感器的一个有吸引力的选择。在这项工作中,我们提出了一个使用微软Kinect的RGB-D SLAM系统。所提出的系统是一个全6DoF(自由度)SLAM系统,可以估计相机轨迹并实时重建环境的3D模型。与传统的基于过滤的方法不同,我们的系统通过使用图优化来优化整个轨迹。通过采用关键帧匹配代替帧对帧匹配,我们获得了比以前系统更好的精度。我们在发布的数据集上评估我们的系统。结果表明,该系统可以处理室内环境下不受限制的摄像机运动。
{"title":"Some improvements in the RGB-D SLAM system","authors":"Hieu Pham Quang, N. Ly","doi":"10.1109/RIVF.2015.7049884","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049884","url":null,"abstract":"RGB-D cameras offer both color and depth images of the surrounding environment, making them an attractive option for robot sensor. In this work, we present an RGB-D SLAM system using the Microsoft Kinect. The proposed system is a full 6DoF (Degrees of Freedom) SLAM system which can estimate camera trajectory and reconstruct a 3D model of the environment in real-time. Unlike traditional filtering-based approaches, our system optimizes the entire trajectory by the use of graph optimization. We achieve better accuracy than a previous system by employing key-frame matching instead of frame-to-frame matching. We evaluate our system on a published dataset. The results demonstrate that our system can handle unrestricted camera movements in indoor settings.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121254087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Approximate regret based elicitation in Markov decision process 马尔可夫决策过程中基于近似后悔的启发
Pegah Alizadeh, Y. Chevaleyre, Jean-Daniel Zucker
Consider a decision support system (DSS) designed to find optimal strategies in stochastic environments, on behalf of a user. To perform this computation, the DSS will need a precise model of the environment. Of course, when the environment can be modeled as a Markov decision process (MDP) with numerical rewards (or numerical penalties), the DSS can compute the optimal strategy in polynomial time. But in many real-world cases, rewards are unknown. To compensate this missing information, the DSS may query the user for its preferences among some alternative policies. Based on the user's answers, the DSS can step-by-step compute the user's preferred policy. In this work, we describe a computational method based on minimax regret to find optimal policy when rewards are unknown. Then we present types of queries on feasible set of rewards by using preference elicitation approaches. When user answers these queries based on her preferences, we will have more information about rewards which will result in more desirable policies.
考虑一个决策支持系统(DSS),用于在随机环境中代表用户找到最优策略。为了执行这个计算,DSS需要一个精确的环境模型。当然,当环境可以建模为具有数值奖励(或数值惩罚)的马尔可夫决策过程(MDP)时,DSS可以在多项式时间内计算出最优策略。但在现实世界的许多情况下,奖励是未知的。为了弥补这些缺失的信息,DSS可能会查询用户在一些可选策略中的首选项。根据用户的回答,DSS可以逐步计算出用户的首选策略。在这项工作中,我们描述了一种基于极小极大后悔的计算方法,用于在奖励未知的情况下寻找最优策略。然后,我们利用偏好启发方法给出了可行奖励集的查询类型。当用户根据自己的喜好回答这些问题时,我们将获得更多关于奖励的信息,从而产生更理想的政策。
{"title":"Approximate regret based elicitation in Markov decision process","authors":"Pegah Alizadeh, Y. Chevaleyre, Jean-Daniel Zucker","doi":"10.1109/RIVF.2015.7049873","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049873","url":null,"abstract":"Consider a decision support system (DSS) designed to find optimal strategies in stochastic environments, on behalf of a user. To perform this computation, the DSS will need a precise model of the environment. Of course, when the environment can be modeled as a Markov decision process (MDP) with numerical rewards (or numerical penalties), the DSS can compute the optimal strategy in polynomial time. But in many real-world cases, rewards are unknown. To compensate this missing information, the DSS may query the user for its preferences among some alternative policies. Based on the user's answers, the DSS can step-by-step compute the user's preferred policy. In this work, we describe a computational method based on minimax regret to find optimal policy when rewards are unknown. Then we present types of queries on feasible set of rewards by using preference elicitation approaches. When user answers these queries based on her preferences, we will have more information about rewards which will result in more desirable policies.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"753 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving acoustic model for English ASR System using deep neural network 用深度神经网络改进英语ASR系统声学模型
Quoc Bao Nguyen, T. Vu, C. Luong
In this paper, a method based on deep learning is applied to improve acoustic model for English Automatic Speech Recognition (ASR) system using two main approaches of deep neural network (Hybrid and bottleneck feature). Deep neural networks systems are able to achieve significant improvements over a number of last year system. The experiments are carried out on the dataset containing speeches on Technology, Entertainment, and Design (TED) Talks. The results show that applying Deep neural network decrease the relative error rate by 33% compared to the MFCC baseline system.
本文将基于深度学习的方法应用于英语自动语音识别(ASR)系统的声学模型改进,并结合了深度神经网络的两种主要方法(混合和瓶颈特征)。深度神经网络系统能够比去年的许多系统取得显著的改进。实验是在包含科技、娱乐和设计(TED)演讲的数据集上进行的。结果表明,与MFCC基线系统相比,应用深度神经网络可将相对错误率降低33%。
{"title":"Improving acoustic model for English ASR System using deep neural network","authors":"Quoc Bao Nguyen, T. Vu, C. Luong","doi":"10.1109/RIVF.2015.7049869","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049869","url":null,"abstract":"In this paper, a method based on deep learning is applied to improve acoustic model for English Automatic Speech Recognition (ASR) system using two main approaches of deep neural network (Hybrid and bottleneck feature). Deep neural networks systems are able to achieve significant improvements over a number of last year system. The experiments are carried out on the dataset containing speeches on Technology, Entertainment, and Design (TED) Talks. The results show that applying Deep neural network decrease the relative error rate by 33% compared to the MFCC baseline system.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124126432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Balance Particle Swarm Optimization and gravitational search algorithm for energy efficient in heterogeneous wireless sensor networks 基于平衡粒子群优化和引力搜索算法的异构无线传感器网络节能研究
T. Huynh, Anh-Vu Dinh-Duc, C. Tran, T. Le
In this paper, we propose a Balanced PSOGSA algorithm by combining the ability for social thinking in Particle Swarm Optimization with the local search capability of Gravitational Search Algorithm for reducing the probability of trapping in local optimum and prolonging time period before the death of the first node in wireless sensor network. Besides, we also improve the objective function to shorten the convergence time of the algorithm. The simulation results show that our proposed protocol has lower energy consumption and longer lifetime compared to other protocols.
本文将粒子群优化中的社会思维能力与引力搜索算法的局部搜索能力相结合,提出了一种平衡的PSOGSA算法,以减少无线传感器网络中陷入局部最优的概率,延长首个节点死亡前的时间。此外,我们还对目标函数进行了改进,缩短了算法的收敛时间。仿真结果表明,与其他协议相比,我们提出的协议具有更低的能耗和更长的生存期。
{"title":"Balance Particle Swarm Optimization and gravitational search algorithm for energy efficient in heterogeneous wireless sensor networks","authors":"T. Huynh, Anh-Vu Dinh-Duc, C. Tran, T. Le","doi":"10.1109/RIVF.2015.7049895","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049895","url":null,"abstract":"In this paper, we propose a Balanced PSOGSA algorithm by combining the ability for social thinking in Particle Swarm Optimization with the local search capability of Gravitational Search Algorithm for reducing the probability of trapping in local optimum and prolonging time period before the death of the first node in wireless sensor network. Besides, we also improve the objective function to shorten the convergence time of the algorithm. The simulation results show that our proposed protocol has lower energy consumption and longer lifetime compared to other protocols.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131947237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Vietnamese 3D taking face for embodied conversational agents 具身对话代理的越南3D人脸
Thi Duyen Ngo, T. D. Bui
Conversational agents are receiving significant attention from multi-agent and human computer interaction research societies. Many techniques have been developed to enable these agents to behave in a human-like manner. In order to do so, they are simulated with similar communicative channels as humans. Moreover, they are also simulated with emotion and personality. In this work, we focus on issue of expressing emotions for embodied-agents. We present a three dimensional face with ability to speak emotional Vietnamese speech and naturally express emotions while talking. Our face can represent lip movements during emotionally pronouncing Vietnamese words, and at the same time it can show emotional facial expressions while speaking. The face's architecture consists of three parts: Vietnamese Emotional Speech Synthesis module, Emotions to Facial Expressions module, and Combination module which creates lip movements when pronouncing Vietnamese emotional speech and combines these movements with emotional facial expressions. We have tested the face in the football supporter domain in order to confirm its naturalness. The face is simulated as the face of a football supporter agent which experiences emotions and expresses emotional expressions in his voice as well as on his face.
会话代理正受到多智能体和人机交互研究团体的广泛关注。已经开发了许多技术,使这些代理能够以类似人类的方式行事。为了做到这一点,它们被模拟成与人类相似的交流渠道。此外,他们还模拟了情感和个性。在这项工作中,我们重点研究了体现代理的情感表达问题。我们呈现了一个三维的面孔,能够说情感越南语,并在说话时自然地表达情感。我们的脸可以在情绪化地念越南语时表现出嘴唇的运动,同时也可以在说话时表现出情绪化的面部表情。面部结构由三个部分组成:越南语情感语音合成模块,情感到面部表情模块,以及组合模块,该模块在越南语情感语音发音时产生嘴唇运动,并将这些运动与情感面部表情结合起来。我们已经在足球支持者领域测试了这张脸,以确认它的自然性。这张脸被模拟成一个足球支持者经纪人的脸,他的声音和面部表情都能感受情感并表达情感。
{"title":"A Vietnamese 3D taking face for embodied conversational agents","authors":"Thi Duyen Ngo, T. D. Bui","doi":"10.1109/RIVF.2015.7049881","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049881","url":null,"abstract":"Conversational agents are receiving significant attention from multi-agent and human computer interaction research societies. Many techniques have been developed to enable these agents to behave in a human-like manner. In order to do so, they are simulated with similar communicative channels as humans. Moreover, they are also simulated with emotion and personality. In this work, we focus on issue of expressing emotions for embodied-agents. We present a three dimensional face with ability to speak emotional Vietnamese speech and naturally express emotions while talking. Our face can represent lip movements during emotionally pronouncing Vietnamese words, and at the same time it can show emotional facial expressions while speaking. The face's architecture consists of three parts: Vietnamese Emotional Speech Synthesis module, Emotions to Facial Expressions module, and Combination module which creates lip movements when pronouncing Vietnamese emotional speech and combines these movements with emotional facial expressions. We have tested the face in the football supporter domain in order to confirm its naturalness. The face is simulated as the face of a football supporter agent which experiences emotions and expresses emotional expressions in his voice as well as on his face.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121705843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey on Image Forgery Detection techniques 图像伪造检测技术综述
T. K. Huynh, K. V. Huynh, T. Le-Tien, Sy C. Nguyen
The paper presents a survey on Image Forgery Detection (IFD) techniques applied for both Copy-Move and spliced images. The survey attempts to cover involved algorithms over past ten years, classify them in groups having the similar methods to solve problems. For the Copy-Move images, the classification depends on differences in processing input images with or without transformation before extracting the image features. For the spliced images, groups of detection techniques based on image features or camera features are summarized. Achievements, limitations and future works from these techniques are also mentioned in this title as orientations and references for the coming researches as well.
本文综述了用于复制-移动和拼接图像的图像伪造检测(IFD)技术。该调查试图涵盖过去十年中涉及的算法,将它们分类为具有相似解决问题方法的组。对于Copy-Move图像,在提取图像特征之前,分类取决于对输入图像进行变换或不进行变换处理的差异。针对拼接图像,总结了基于图像特征或基于摄像机特征的检测技术。并对这些技术的成就、局限性和未来的工作进行了展望,为今后的研究提供方向和参考。
{"title":"A survey on Image Forgery Detection techniques","authors":"T. K. Huynh, K. V. Huynh, T. Le-Tien, Sy C. Nguyen","doi":"10.1109/RIVF.2015.7049877","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049877","url":null,"abstract":"The paper presents a survey on Image Forgery Detection (IFD) techniques applied for both Copy-Move and spliced images. The survey attempts to cover involved algorithms over past ten years, classify them in groups having the similar methods to solve problems. For the Copy-Move images, the classification depends on differences in processing input images with or without transformation before extracting the image features. For the spliced images, groups of detection techniques based on image features or camera features are summarized. Achievements, limitations and future works from these techniques are also mentioned in this title as orientations and references for the coming researches as well.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125094012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Heuristics to solve appointment scheduling in chemotherapy 启发式解决化疗预约调度问题
Minh-Duc Le, Minh H. Nhat Nguyen, C. Baril, V. Gascon, T. Dinh
This paper studies meta-heuristic methods in solving an appointment-scheduling problem in a hospital in Canada. Our paper proposes a two-step algorithm: The first step creates an initial solution with a Greedy Algorithm considering many strategies. The second step consists in choosing the best strategy and improving it with Tabu Search. Our algorithm performed well for the appointment-scheduling problem. The data used was collected from a hematology-oncology department in a hospital. It includes information about patients, nurses, treatments and fixed appointments. Patients must be assigned to nurses with specific treatment seats. We focus on 3 main objectives: maximize the number of patients scheduled over a planning horizon, minimize overtime and provide a more balanced workload between nurses. Our algorithm succeeds in scheduling more patients over a planning horizon without overtime and with a better balanced workload between nurses.
本文研究了解决加拿大某医院预约调度问题的元启发式方法。本文提出了一种两步算法:第一步使用考虑多种策略的贪心算法创建初始解。第二步是选择最佳策略,并通过禁忌搜索对其进行改进。我们的算法在约会调度问题上表现良好。所使用的数据是从一家医院的血液肿瘤科收集的。它包括病人、护士、治疗和固定预约的信息。病人必须被分配给有特殊治疗座位的护士。我们专注于三个主要目标:在计划范围内最大限度地安排患者数量,最大限度地减少加班时间,并在护士之间提供更平衡的工作量。我们的算法成功地在计划范围内安排了更多的病人,没有加班,护士之间的工作量更好地平衡。
{"title":"Heuristics to solve appointment scheduling in chemotherapy","authors":"Minh-Duc Le, Minh H. Nhat Nguyen, C. Baril, V. Gascon, T. Dinh","doi":"10.1109/RIVF.2015.7049875","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049875","url":null,"abstract":"This paper studies meta-heuristic methods in solving an appointment-scheduling problem in a hospital in Canada. Our paper proposes a two-step algorithm: The first step creates an initial solution with a Greedy Algorithm considering many strategies. The second step consists in choosing the best strategy and improving it with Tabu Search. Our algorithm performed well for the appointment-scheduling problem. The data used was collected from a hematology-oncology department in a hospital. It includes information about patients, nurses, treatments and fixed appointments. Patients must be assigned to nurses with specific treatment seats. We focus on 3 main objectives: maximize the number of patients scheduled over a planning horizon, minimize overtime and provide a more balanced workload between nurses. Our algorithm succeeds in scheduling more patients over a planning horizon without overtime and with a better balanced workload between nurses.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127317754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A new pre-authentication protocol in Kerberos 5: biometric authentication Kerberos 5中的一个新的预身份验证协议:生物识别身份验证
H. Le, Hung Phuoc Truong, Hoang Thien Van, T. Le
Kerberos is a well-known network authentication protocol that allows nodes to communicate over a non-secure network connection. After Kerberos is used to prove the identity of objects in client-server model, it will encrypt all of their communications in following steps to assure privacy and data integrity. In this paper, we modify the initial authentication exchange in Kerberos 5 by using biometric data and asymmetric cryptography. This proposed method creates a new preauthentication protocol in order to make Kerberos 5 more secure. Due to the proposed method, the limitation of password-based authentication in Kerberos 5 is solved. It is too difficult for a user to repudiate having accessed to the application. Moreover, the mechanism of user authentication is more convenient. This method is a strong authentication scheme that is against several attacks.
Kerberos是一种著名的网络身份验证协议,它允许节点通过不安全的网络连接进行通信。在使用Kerberos证明客户机-服务器模型中对象的身份之后,它将在以下步骤中加密它们的所有通信,以确保隐私和数据完整性。在本文中,我们使用生物特征数据和非对称密码修改Kerberos 5中的初始身份验证交换。这个建议的方法创建了一个新的预身份验证协议,以使Kerberos 5更加安全。该方法解决了Kerberos 5中基于密码的身份验证的局限性。用户很难拒绝对应用程序的访问。此外,用户认证机制也更加方便。该方法是一种抗多种攻击的强认证方案。
{"title":"A new pre-authentication protocol in Kerberos 5: biometric authentication","authors":"H. Le, Hung Phuoc Truong, Hoang Thien Van, T. Le","doi":"10.1109/RIVF.2015.7049892","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049892","url":null,"abstract":"Kerberos is a well-known network authentication protocol that allows nodes to communicate over a non-secure network connection. After Kerberos is used to prove the identity of objects in client-server model, it will encrypt all of their communications in following steps to assure privacy and data integrity. In this paper, we modify the initial authentication exchange in Kerberos 5 by using biometric data and asymmetric cryptography. This proposed method creates a new preauthentication protocol in order to make Kerberos 5 more secure. Due to the proposed method, the limitation of password-based authentication in Kerberos 5 is solved. It is too difficult for a user to repudiate having accessed to the application. Moreover, the mechanism of user authentication is more convenient. This method is a strong authentication scheme that is against several attacks.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127831785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Interaction analysis of annotated specification and program codes in Extended Static Checking 扩展静态检测中标注规范与程序代码的交互分析
Truong-Thang Nguyen, Manh-Dong Tran
Software cost can be reduced if more software defects are detected earlier in the development phase. Motivated by the Extended Static Checking (ESC) technique, many programming errors have been discovered by ESC tools. In a typical ESC procedure, the source code of a program written in a high-level programming language, e.g. Java [1] or C#, Spec# [2], is translated into some logical imperative-style language, resp. Guarded Commands [1] or BoogiePL [2]. At the same time, associated annotated specifications which state constraints of the program are also translated into the same logical language. This two-fold translation phase induces code-interleaving phenomenon of annotated specification and program. The subsequent phases in ESC relies on the interleaving codes while there is a possibility that logical imperative codes translated from annotated specification may change behavior of the original program. This paper proposes a formal analysis approach of possible interaction between specification and program codes. It does not only show the range of specification categories which are safe in this ESC procedure, but also presents cases for potential ESC unsoundness.
如果在开发阶段早期检测到更多的软件缺陷,则可以减少软件成本。在扩展静态检查(ESC)技术的推动下,ESC工具发现了许多编程错误。在一个典型的ESC过程中,用高级编程语言(如Java[1]或c#, spec#[2])编写的程序的源代码被翻译成某种逻辑命令式风格的语言,例如:保护命令[1]或BoogiePL[2]。同时,相关的说明程序约束的注释规范也被翻译成相同的逻辑语言。这一双重翻译阶段产生了注释规范和程序的代码交错现象。ESC的后续阶段依赖于交错代码,而从注释规范翻译的逻辑命令式代码可能会改变原始程序的行为。本文提出了一种规范与程序代码之间可能相互作用的形式化分析方法。它不仅显示了ESC程序中安全的规格类别范围,而且还展示了潜在ESC不健全的情况。
{"title":"Interaction analysis of annotated specification and program codes in Extended Static Checking","authors":"Truong-Thang Nguyen, Manh-Dong Tran","doi":"10.1109/RIVF.2015.7049890","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049890","url":null,"abstract":"Software cost can be reduced if more software defects are detected earlier in the development phase. Motivated by the Extended Static Checking (ESC) technique, many programming errors have been discovered by ESC tools. In a typical ESC procedure, the source code of a program written in a high-level programming language, e.g. Java [1] or C#, Spec# [2], is translated into some logical imperative-style language, resp. Guarded Commands [1] or BoogiePL [2]. At the same time, associated annotated specifications which state constraints of the program are also translated into the same logical language. This two-fold translation phase induces code-interleaving phenomenon of annotated specification and program. The subsequent phases in ESC relies on the interleaving codes while there is a possibility that logical imperative codes translated from annotated specification may change behavior of the original program. This paper proposes a formal analysis approach of possible interaction between specification and program codes. It does not only show the range of specification categories which are safe in this ESC procedure, but also presents cases for potential ESC unsoundness.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical analysis of IPv6 stateless address autoconfiguration in Low-power and Lossy Wireless Networks 低功耗和有损无线网络中IPv6无状态地址自动配置的理论分析
J. Montavont, Cosmin Cobarzan, Thomas Noël
Low-power and Lossy Wireless Networks (LLN) is a crucial enabling technology for a broad range of applications that will touch everybody's life and be driving forces for new businesses. Example of the rapidly emerging application domains are the Internet of Things, Smart Cities and Smart Homes. Recently, there is strong effort to provide LLN with IP connectivity. Supporting IP provides interoperability with existing IP devices and infrastructure together with the access to a large panel of tools for diagnostic, management and commissioning. However, enabling such solutions on LLN requires to optimize the IP communication stack. Among the features introduced by IP, the stateless address autoconfiguration is of particular importance as the success of IP is largely because of its ability to connect together networks of different sizes and types. In this article, we propose a complete evaluation of the stateless address autoconfiguration in LLN. Our theoretical analysis is based on neighbor discovery optimizations especially designed for LLN.
低功耗和有损无线网络(LLN)是一项至关重要的使能技术,它将影响到每个人的生活,并推动新业务的发展。快速崛起的应用领域包括物联网、智慧城市和智能家居。最近,人们正在努力为LLN提供IP连接。支持IP提供了与现有IP设备和基础设施的互操作性,以及对用于诊断、管理和调试的大型工具面板的访问。但是,在LLN上启用此类解决方案需要优化IP通信堆栈。在IP引入的特性中,无状态地址自动配置尤为重要,因为IP的成功很大程度上是因为它能够将不同规模和类型的网络连接在一起。在本文中,我们对LLN中的无状态地址自动配置进行了完整的评估。我们的理论分析是基于专门为LLN设计的邻居发现优化。
{"title":"Theoretical analysis of IPv6 stateless address autoconfiguration in Low-power and Lossy Wireless Networks","authors":"J. Montavont, Cosmin Cobarzan, Thomas Noël","doi":"10.1109/RIVF.2015.7049899","DOIUrl":"https://doi.org/10.1109/RIVF.2015.7049899","url":null,"abstract":"Low-power and Lossy Wireless Networks (LLN) is a crucial enabling technology for a broad range of applications that will touch everybody's life and be driving forces for new businesses. Example of the rapidly emerging application domains are the Internet of Things, Smart Cities and Smart Homes. Recently, there is strong effort to provide LLN with IP connectivity. Supporting IP provides interoperability with existing IP devices and infrastructure together with the access to a large panel of tools for diagnostic, management and commissioning. However, enabling such solutions on LLN requires to optimize the IP communication stack. Among the features introduced by IP, the stateless address autoconfiguration is of particular importance as the success of IP is largely because of its ability to connect together networks of different sizes and types. In this article, we propose a complete evaluation of the stateless address autoconfiguration in LLN. Our theoretical analysis is based on neighbor discovery optimizations especially designed for LLN.","PeriodicalId":166971,"journal":{"name":"The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128312247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1