首页 > 最新文献

Proceedings of the Symposium on Applied Computing最新文献

英文 中文
Defining an architecture for evolving environments 为不断发展的环境定义体系结构
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019902
Jarkko Hyysalo, Gavin Harper, J. Sauvola, A. Keskinarkaus, I. Juuso, Miikka Salminen, Juha Partala
The architecture of a system specifies how the system should be designed and built. However, shortcomings are identified in current architecture process frameworks concerning evolving domains like healthcare. We claim that an iterative architecture process is required, where the technical concerns are separated from the non-technical ones. Furthermore, a strong guiding vision is required. Based on our experiences from a biobank IT infrastructure process, we present an architecture process that is modular, interoperable, controlled and abstracted, thus being capable of handling complex systems with large uncertainties.
系统的体系结构指定了系统应该如何设计和构建。然而,当前的体系结构流程框架在涉及诸如医疗保健等不断发展的领域时发现了缺点。我们声称需要一个迭代的架构过程,其中技术关注点与非技术关注点是分离的。此外,还需要一个强有力的指导性愿景。基于我们在生物银行IT基础架构过程中的经验,我们提出了一个模块化、可互操作、可控和抽象的架构过程,从而能够处理具有大不确定性的复杂系统。
{"title":"Defining an architecture for evolving environments","authors":"Jarkko Hyysalo, Gavin Harper, J. Sauvola, A. Keskinarkaus, I. Juuso, Miikka Salminen, Juha Partala","doi":"10.1145/3019612.3019902","DOIUrl":"https://doi.org/10.1145/3019612.3019902","url":null,"abstract":"The architecture of a system specifies how the system should be designed and built. However, shortcomings are identified in current architecture process frameworks concerning evolving domains like healthcare. We claim that an iterative architecture process is required, where the technical concerns are separated from the non-technical ones. Furthermore, a strong guiding vision is required. Based on our experiences from a biobank IT infrastructure process, we present an architecture process that is modular, interoperable, controlled and abstracted, thus being capable of handling complex systems with large uncertainties.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"09 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85864027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iterative multi-scale modeling of software-intensive systems of systems architectures 系统架构中软件密集型系统的迭代多尺度建模
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019801
Ilhem Khlif, M. Kacem, A. Kacem
Modeling correct software-intensive Systems of Systems architectures is a challenging research direction that can be mastered by providing modeling abstractions. For this purpose, we provide an iterative modeling solution for a multi-scale description of software architectures. We provide a visual notation extending the graphical UML notations to represent structural as well as behavioral features of software architectures. We define a step-wise iterative process from a coarse-grain to a fine-grain description. The intermediate iterations provide a description with a given abstraction that allow the validation to be conducted significantly while remaining tractable w.r.t. complexity. The iterative process involves both system-independent structural features ensuring the model correctness, and system-specific features related to the expected behavior of the modeled domain. We apply our approach for a methodological design of an Emergency Response and Crisis Management System (ERCMS).
对系统架构的正确软件密集型系统进行建模是一个具有挑战性的研究方向,可以通过提供建模抽象来掌握。为此,我们为软件架构的多尺度描述提供了一个迭代建模解决方案。我们提供了一种可视化的符号,扩展了图形化的UML符号,以表示软件架构的结构和行为特征。我们定义了一个从粗粒度到细粒度描述的逐步迭代过程。中间迭代提供了具有给定抽象的描述,允许在保持可处理的w.r.t.复杂性的同时进行有效的验证。迭代过程包括确保模型正确性的系统独立结构特性,以及与建模域的预期行为相关的系统特定特性。我们将我们的方法应用于应急响应和危机管理系统(ERCMS)的方法学设计。
{"title":"Iterative multi-scale modeling of software-intensive systems of systems architectures","authors":"Ilhem Khlif, M. Kacem, A. Kacem","doi":"10.1145/3019612.3019801","DOIUrl":"https://doi.org/10.1145/3019612.3019801","url":null,"abstract":"Modeling correct software-intensive Systems of Systems architectures is a challenging research direction that can be mastered by providing modeling abstractions. For this purpose, we provide an iterative modeling solution for a multi-scale description of software architectures. We provide a visual notation extending the graphical UML notations to represent structural as well as behavioral features of software architectures. We define a step-wise iterative process from a coarse-grain to a fine-grain description. The intermediate iterations provide a description with a given abstraction that allow the validation to be conducted significantly while remaining tractable w.r.t. complexity. The iterative process involves both system-independent structural features ensuring the model correctness, and system-specific features related to the expected behavior of the modeled domain. We apply our approach for a methodological design of an Emergency Response and Crisis Management System (ERCMS).","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85920226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards adaptation of named entity classification 面向命名实体分类的适应
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3022188
Pikakshi Manchanda, E. Fersini, M. Palmonari, Debora Nozza, E. Messina
Numerous state-of-the-art Named Entity Recognition (NER) systems use different classification schemas/ontologies. Comparisons and integration among NER systems, thus, becomes complex. In this paper, we propose a transfer-learning approach where we use supervised learning methods to automatically learn mappings between ontologies of NER systems, where an input probability distribution over a set of entity types defined in a source ontology is mapped to a target distribution over the entity types defined for a target ontology. Experiments conducted with benchmark data show valuable re-classification performance of entity mentions, suggesting our approach as a promising one for domain adaptation of NER systems.
许多最先进的命名实体识别(NER)系统使用不同的分类模式/本体。因此,NER系统之间的比较和集成变得复杂。在本文中,我们提出了一种迁移学习方法,其中我们使用监督学习方法来自动学习NER系统本体之间的映射,其中源本体中定义的一组实体类型的输入概率分布映射到为目标本体定义的实体类型的目标分布。用基准数据进行的实验显示了实体提及的重分类性能,表明我们的方法对于NER系统的领域自适应很有前景。
{"title":"Towards adaptation of named entity classification","authors":"Pikakshi Manchanda, E. Fersini, M. Palmonari, Debora Nozza, E. Messina","doi":"10.1145/3019612.3022188","DOIUrl":"https://doi.org/10.1145/3019612.3022188","url":null,"abstract":"Numerous state-of-the-art Named Entity Recognition (NER) systems use different classification schemas/ontologies. Comparisons and integration among NER systems, thus, becomes complex. In this paper, we propose a transfer-learning approach where we use supervised learning methods to automatically learn mappings between ontologies of NER systems, where an input probability distribution over a set of entity types defined in a source ontology is mapped to a target distribution over the entity types defined for a target ontology. Experiments conducted with benchmark data show valuable re-classification performance of entity mentions, suggesting our approach as a promising one for domain adaptation of NER systems.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79427316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Similarity search through one-dimensional embeddings 基于一维嵌入的相似性搜索
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019674
H. Razente, Rafael L. Bernardes Lima, M. Barioni
The optimization of similarity queries is often done with specialized data structures known as metric access methods. It has recently been proposed the use of B+trees to index high dimensional data for range and nearest neighbor search in metric spaces. This work1 introduces a new access method called GroupSim and query algorithms for indexing and retrieving complex data by similarity. It employs a single B+tree in order to dynamically index data elements with regard to a set of one-dimensional embeddings. Our strategy uses a new scheme to store distance information, allowing to determine directly if each element lies on the intersection of the embeddings. We compare GroupSim with two related methods, iDistance and OmniB-Forest, and we show empirically the new access method outperforms them with regard to the time required to run similarity queries.
相似性查询的优化通常使用称为度量访问方法的专用数据结构来完成。最近有人提出使用B+树来索引度量空间中的范围和最近邻搜索的高维数据。本文介绍了一种名为GroupSim的新访问方法和查询算法,用于根据相似性对复杂数据进行索引和检索。它使用单个B+树,以便根据一组一维嵌入动态索引数据元素。我们的策略使用了一种新的方案来存储距离信息,允许直接确定每个元素是否位于嵌入的交叉点上。我们将GroupSim与iDistance和OmniB-Forest这两种相关方法进行了比较,并通过经验证明,在运行相似性查询所需的时间方面,新的访问方法优于它们。
{"title":"Similarity search through one-dimensional embeddings","authors":"H. Razente, Rafael L. Bernardes Lima, M. Barioni","doi":"10.1145/3019612.3019674","DOIUrl":"https://doi.org/10.1145/3019612.3019674","url":null,"abstract":"The optimization of similarity queries is often done with specialized data structures known as metric access methods. It has recently been proposed the use of B+trees to index high dimensional data for range and nearest neighbor search in metric spaces. This work1 introduces a new access method called GroupSim and query algorithms for indexing and retrieving complex data by similarity. It employs a single B+tree in order to dynamically index data elements with regard to a set of one-dimensional embeddings. Our strategy uses a new scheme to store distance information, allowing to determine directly if each element lies on the intersection of the embeddings. We compare GroupSim with two related methods, iDistance and OmniB-Forest, and we show empirically the new access method outperforms them with regard to the time required to run similarity queries.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90396480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cyber security patrol: detecting fake and vulnerable wifi-enabled printers 网络安全巡逻:检测假冒易受攻击的wifi打印机
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019722
Jinghui Toh, Muhammad Hatib, Omer Porzecanski, Y. Elovici
Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer's wireless connectivity, others are not aware at all that it is enabled and some enable it in an encrypted form. In this paper we demonstrate how an application called "pFaker" running on a mobile device or smart watch can be used to mimic a printer's Wi-Fi connectivity and functionalities in order to harm user privacy by unobtrusively stealing print jobs. To mitigate these risks, we developed a mobile application called "Cyber-Security Patrol". We demonstrate how a mobile phone running Cyber-Security patrol can be placed on a drone or an autonomous vacuum cleaner to search for devices that try to mimic the printer's Wi-Fi connectivity and for printers that expose unsecured wireless connection in the target organization. Cyber-Security Patrol takes photos of the location where unauthorized Wi-Fi enabled printers were detected and sends them to the organization's administrator. For cases that the Wi-Fi enabled printer is legitimate but unsecured, Cyber Security Patrol sends a print job to the printer with detailed instructions on how to secure the specific printer model as identified based on its Service Set Identifier (SSID). A demo that demonstrates one of the use cases can be found here: https://www.youtube.com/watch?v=aJ2ZG04BrjM
现在许多打印机都支持Wi-Fi连接。有些企业选择禁用打印机的无线连接,有些企业根本不知道打印机已经启用了无线连接,有些企业则以加密的形式启用了无线连接。在本文中,我们演示了一个名为“pFaker”的应用程序如何运行在移动设备或智能手表上,可以用来模仿打印机的Wi-Fi连接和功能,从而通过不显眼地窃取打印作业来损害用户隐私。为了降低这些风险,我们开发了一个名为“网络安全巡逻”的移动应用程序。我们演示了如何将运行网络安全巡逻的手机放置在无人机或自动真空吸尘器上,以搜索试图模仿打印机的Wi-Fi连接的设备,以及在目标组织中暴露不安全无线连接的打印机。网络安全巡逻队将检测到的未授权Wi-Fi打印机的位置拍照,并将其发送给组织的管理员。对于启用Wi-Fi的打印机是合法的但不安全的情况,网络安全巡逻队会向打印机发送打印作业,并详细说明如何保护基于其服务集标识符(SSID)识别的特定打印机型号。可以在这里找到演示其中一个用例的演示:https://www.youtube.com/watch?v=aJ2ZG04BrjM
{"title":"Cyber security patrol: detecting fake and vulnerable wifi-enabled printers","authors":"Jinghui Toh, Muhammad Hatib, Omer Porzecanski, Y. Elovici","doi":"10.1145/3019612.3019722","DOIUrl":"https://doi.org/10.1145/3019612.3019722","url":null,"abstract":"Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer's wireless connectivity, others are not aware at all that it is enabled and some enable it in an encrypted form. In this paper we demonstrate how an application called \"pFaker\" running on a mobile device or smart watch can be used to mimic a printer's Wi-Fi connectivity and functionalities in order to harm user privacy by unobtrusively stealing print jobs. To mitigate these risks, we developed a mobile application called \"Cyber-Security Patrol\". We demonstrate how a mobile phone running Cyber-Security patrol can be placed on a drone or an autonomous vacuum cleaner to search for devices that try to mimic the printer's Wi-Fi connectivity and for printers that expose unsecured wireless connection in the target organization. Cyber-Security Patrol takes photos of the location where unauthorized Wi-Fi enabled printers were detected and sends them to the organization's administrator. For cases that the Wi-Fi enabled printer is legitimate but unsecured, Cyber Security Patrol sends a print job to the printer with detailed instructions on how to secure the specific printer model as identified based on its Service Set Identifier (SSID). A demo that demonstrates one of the use cases can be found here: https://www.youtube.com/watch?v=aJ2ZG04BrjM","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90799888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SmartOrch: an adaptive orchestration system for human-machine collectives SmartOrch:人机集体的自适应编排系统
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019623
Michael Rovatsos, Dimitrios I. Diochnos, Z. Wen, S. Ceppi, Pavlos Andreadis
Web-based collaborative systems, where most computation is performed by human collectives, have distinctly different requirements from traditional workflow orchestration systems, as humans have to be mobilised to perform computations and the system has to adapt to their collective behaviour at runtime. In this paper, we present a social orchestration system called SmartOrch, which has been designed specifically for collective adaptive systems in which human participation is at the core of the overall distributed computation. SmartOrch provides a flexible and customisable workflow composition framework that has multi-level optimisation capabilities. These features allow us to manage the uncertainty that collective adaptive systems need to deal with in a principled way. We demonstrate the benefits of SmartOrch with simulation experiments in a ridesharing domain. Our experiments show that SmartOrch is able to respond flexibly to variation in collective human behaviour, and to adapt to observed behaviour at different levels. This is accomplished by learning how to propose and route human-based tasks, how to allocate computational resources when managing these tasks, and how to adapt the overall interaction model of the platform based on past performance. By proposing novel, solid engineering principles for these kinds of systems, SmartOrch addresses shortcomings of previous work that mostly focused on application-specific, non-adaptive solutions.
基于web的协作系统,其中大多数计算是由人类集体执行的,与传统的工作流编排系统有着明显不同的需求,因为人类必须被动员起来执行计算,而系统必须在运行时适应他们的集体行为。在本文中,我们提出了一个名为SmartOrch的社会编排系统,它是专门为集体适应系统设计的,在集体适应系统中,人类的参与是整个分布式计算的核心。SmartOrch提供了一个灵活的、可定制的工作流组合框架,具有多层次的优化能力。这些特性使我们能够管理集体适应系统需要以有原则的方式处理的不确定性。我们通过拼车领域的仿真实验证明了SmartOrch的优点。我们的实验表明,SmartOrch能够灵活地响应人类集体行为的变化,并适应不同层次的观察行为。这是通过学习如何提出和路由基于人工的任务、如何在管理这些任务时分配计算资源、以及如何根据过去的性能调整平台的整体交互模型来实现的。通过为这类系统提出新颖、可靠的工程原理,SmartOrch解决了以往工作中主要侧重于特定应用、非自适应解决方案的缺点。
{"title":"SmartOrch: an adaptive orchestration system for human-machine collectives","authors":"Michael Rovatsos, Dimitrios I. Diochnos, Z. Wen, S. Ceppi, Pavlos Andreadis","doi":"10.1145/3019612.3019623","DOIUrl":"https://doi.org/10.1145/3019612.3019623","url":null,"abstract":"Web-based collaborative systems, where most computation is performed by human collectives, have distinctly different requirements from traditional workflow orchestration systems, as humans have to be mobilised to perform computations and the system has to adapt to their collective behaviour at runtime. In this paper, we present a social orchestration system called SmartOrch, which has been designed specifically for collective adaptive systems in which human participation is at the core of the overall distributed computation. SmartOrch provides a flexible and customisable workflow composition framework that has multi-level optimisation capabilities. These features allow us to manage the uncertainty that collective adaptive systems need to deal with in a principled way. We demonstrate the benefits of SmartOrch with simulation experiments in a ridesharing domain. Our experiments show that SmartOrch is able to respond flexibly to variation in collective human behaviour, and to adapt to observed behaviour at different levels. This is accomplished by learning how to propose and route human-based tasks, how to allocate computational resources when managing these tasks, and how to adapt the overall interaction model of the platform based on past performance. By proposing novel, solid engineering principles for these kinds of systems, SmartOrch addresses shortcomings of previous work that mostly focused on application-specific, non-adaptive solutions.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78854023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Session details: IRMAS - intelligent robotics and multi-agent systems track 会议细节:IRMAS -智能机器人和多代理系统跟踪
Pub Date : 2017-04-03 DOI: 10.1145/3243947
The special track on Intelligent Robotics and Multi-Agent Systems (IRMAS) focuses on all aspects of intelligent robotics and multi-agent systems (MAS) including related areas and applications. Its primary goal is to exploit synergies between robotics and artificial intelligence (AI), more precisely between intelligent robotics and MAS, and bring together researchers from both fields. For many years, robotics and AI researchers have worked separately, both fields have matured enormously, and today there is a growing interest in getting the two research fields together. Many in robotics believe that the focus in the near future should be adding capabilities to robots that lie at the core of AI research. Reciprocally, AI researchers aim at embedding their techniques in physical robots that can perceive, reason and act in real, dynamic environments.
智能机器人和多智能体系统(IRMAS)专题讲座将重点介绍智能机器人和多智能体系统(MAS)的各个方面,包括相关领域和应用。其主要目标是利用机器人和人工智能(AI)之间的协同作用,更确切地说,是智能机器人和MAS之间的协同作用,并将两个领域的研究人员聚集在一起。多年来,机器人和人工智能研究人员分开工作,这两个领域已经非常成熟,今天人们越来越有兴趣将这两个研究领域结合起来。许多机器人领域的人认为,在不久的将来,重点应该是为机器人增加功能,这是人工智能研究的核心。反过来,人工智能研究人员的目标是将他们的技术嵌入到能够在真实的动态环境中感知、推理和行动的物理机器人中。
{"title":"Session details: IRMAS - intelligent robotics and multi-agent systems track","authors":"","doi":"10.1145/3243947","DOIUrl":"https://doi.org/10.1145/3243947","url":null,"abstract":"The special track on Intelligent Robotics and Multi-Agent Systems (IRMAS) focuses on all aspects of intelligent robotics and multi-agent systems (MAS) including related areas and applications. Its primary goal is to exploit synergies between robotics and artificial intelligence (AI), more precisely between intelligent robotics and MAS, and bring together researchers from both fields. For many years, robotics and AI researchers have worked separately, both fields have matured enormously, and today there is a growing interest in getting the two research fields together. Many in robotics believe that the focus in the near future should be adding capabilities to robots that lie at the core of AI research. Reciprocally, AI researchers aim at embedding their techniques in physical robots that can perceive, reason and act in real, dynamic environments.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"20 9-10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78179260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning environment model at runtime for self-adaptive systems 自适应系统运行时的学习环境模型
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019776
Moeka Tanabe, K. Tei, Y. Fukazawa, S. Honiden
Self-adaptive systems alter their behavior in response to environmental changes to continually satisfy their requirements. Self-adaptive systems employ an environment model, which should be updated during runtime to maintain consistency with the real environment. Although some techniques have been proposed to learn environment model based on execution traces at the design time, these techniques are time consuming and consequently inappropriate for runtime learning. Herein, a technique using a stochastic gradient descent and the difference in the data acquired during the runtime is proposed as an efficient learning environment model. The computational time and accuracy of our technique are verified through study.
自适应系统根据环境变化改变自身行为,以不断满足自身需求。自适应系统采用环境模型,该模型应在运行时更新,以保持与实际环境的一致性。尽管已经提出了一些在设计时基于执行轨迹来学习环境模型的技术,但这些技术非常耗时,因此不适合运行时学习。本文提出了一种利用随机梯度下降和运行期间获取的数据差异作为有效学习环境模型的技术。通过研究验证了该方法的计算时间和精度。
{"title":"Learning environment model at runtime for self-adaptive systems","authors":"Moeka Tanabe, K. Tei, Y. Fukazawa, S. Honiden","doi":"10.1145/3019612.3019776","DOIUrl":"https://doi.org/10.1145/3019612.3019776","url":null,"abstract":"Self-adaptive systems alter their behavior in response to environmental changes to continually satisfy their requirements. Self-adaptive systems employ an environment model, which should be updated during runtime to maintain consistency with the real environment. Although some techniques have been proposed to learn environment model based on execution traces at the design time, these techniques are time consuming and consequently inappropriate for runtime learning. Herein, a technique using a stochastic gradient descent and the difference in the data acquired during the runtime is proposed as an efficient learning environment model. The computational time and accuracy of our technique are verified through study.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78962525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
From object-oriented code with assertions to behavioural types 从带有断言的面向对象代码到行为类型
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019733
Cláudio Vasconcelos, A. Ravara
The widespread use of service-oriented and cloud computing is creating a need for a communication-based programming approach to distributed concurrent software systems. Protocols play a central role in the design and development of such systems but mainstream programming languages still give poor support to ensure protocol compatibility. Testing alone is insufficient to ensure it, so there is a pressing need for tools to assist the development of these kind of systems. While there are tools to verify statically object-oriented code equipped with assertions, these mainly help to prevent runtime errors. However, a program can be ill-behaved and still execute without terminating abruptly. It is important to guarantee that the code implements correctly its communication protocol. Our contribution is a tool to analyse source code written in a subset of Java, equipped with assertions, and return it annotated with its respective behavioural types that can be used to verify statically that the code implements the intended protocol of the application. A running example illustrates each step of the tool.
面向服务的计算和云计算的广泛使用使得分布式并发软件系统需要一种基于通信的编程方法。协议在此类系统的设计和开发中起着核心作用,但主流编程语言对协议兼容性的支持仍然很差。仅靠测试是不足以确保这一点的,因此迫切需要工具来帮助开发这类系统。虽然有一些工具可以验证带有断言的静态面向对象代码,但这些工具主要有助于防止运行时错误。然而,一个程序可能表现不佳,但仍然可以执行而不会突然终止。保证代码正确地实现其通信协议是很重要的。我们的贡献是一个工具,用于分析用Java子集编写的源代码,配备断言,并返回带有相应行为类型注释的源代码,这些行为类型可用于静态验证代码是否实现了应用程序的预期协议。一个运行的示例说明了该工具的每个步骤。
{"title":"From object-oriented code with assertions to behavioural types","authors":"Cláudio Vasconcelos, A. Ravara","doi":"10.1145/3019612.3019733","DOIUrl":"https://doi.org/10.1145/3019612.3019733","url":null,"abstract":"The widespread use of service-oriented and cloud computing is creating a need for a communication-based programming approach to distributed concurrent software systems. Protocols play a central role in the design and development of such systems but mainstream programming languages still give poor support to ensure protocol compatibility. Testing alone is insufficient to ensure it, so there is a pressing need for tools to assist the development of these kind of systems. While there are tools to verify statically object-oriented code equipped with assertions, these mainly help to prevent runtime errors. However, a program can be ill-behaved and still execute without terminating abruptly. It is important to guarantee that the code implements correctly its communication protocol. Our contribution is a tool to analyse source code written in a subset of Java, equipped with assertions, and return it annotated with its respective behavioural types that can be used to verify statically that the code implements the intended protocol of the application. A running example illustrates each step of the tool.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84739431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring login webpage security 测量登入网页的安全性
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019798
S. Acker, Daniel Hausknecht, A. Sabelfeld
Login webpages are the entry points into sensitive parts of web applications, dividing between public access to a website and private, user-specific, access to the website resources. As such, these entry points must be guarded with great care. A vast majority of today's websites relies on text-based user-name/password pairs for user authentication. While much prior research has focused on the strengths and weaknesses of textual passwords, this paper puts a spotlight on the security of the login webpages themselves. We conduct an empirical study of the Alexa top 100,000 pages to identify login pages and scrutinize their security. Our findings show several widely spread vulnerabilities, such as possibilities for password leaks to third parties and password eavesdropping on the network. They also show that only a scarce number of login pages deploy advanced security measures. Our findings on open-source web frameworks and content management systems confirm the lack of support against the login attacker. To ameliorate the problematic state of the art, we discuss measures to improve the security of login pages.
登录网页是进入web应用程序敏感部分的入口点,分为对网站的公共访问和对网站资源的私有、特定于用户的访问。因此,必须非常小心地保护这些入口点。今天的绝大多数网站都依赖于基于文本的用户名/密码对进行用户身份验证。虽然之前的许多研究都集中在文本密码的优缺点上,但本文将重点放在登录网页本身的安全性上。我们对Alexa排名前10万的页面进行了实证研究,以识别登录页面并审查其安全性。我们的研究结果显示了几个广泛传播的漏洞,例如密码泄露给第三方和网络密码窃听的可能性。它们还表明,只有极少数登录页面部署了高级安全措施。我们在开源web框架和内容管理系统上的发现证实了它们缺乏对登录攻击者的支持。为了改善目前存在的问题,我们讨论了提高登录页面安全性的措施。
{"title":"Measuring login webpage security","authors":"S. Acker, Daniel Hausknecht, A. Sabelfeld","doi":"10.1145/3019612.3019798","DOIUrl":"https://doi.org/10.1145/3019612.3019798","url":null,"abstract":"Login webpages are the entry points into sensitive parts of web applications, dividing between public access to a website and private, user-specific, access to the website resources. As such, these entry points must be guarded with great care. A vast majority of today's websites relies on text-based user-name/password pairs for user authentication. While much prior research has focused on the strengths and weaknesses of textual passwords, this paper puts a spotlight on the security of the login webpages themselves. We conduct an empirical study of the Alexa top 100,000 pages to identify login pages and scrutinize their security. Our findings show several widely spread vulnerabilities, such as possibilities for password leaks to third parties and password eavesdropping on the network. They also show that only a scarce number of login pages deploy advanced security measures. Our findings on open-source web frameworks and content management systems confirm the lack of support against the login attacker. To ameliorate the problematic state of the art, we discuss measures to improve the security of login pages.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88709118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
Proceedings of the Symposium on Applied Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1