首页 > 最新文献

Software: Practice and Experience最新文献

英文 中文
Sustainable edge computing: Challenges and future directions 可持续边缘计算:挑战与未来方向
Pub Date : 2024-05-10 DOI: 10.1002/spe.3340
Patricia Arroba, Rajkumar Buyya, Román Cárdenas, José L. Risco‐Martín, José M. Moya
The advent of edge computing holds immense promise for advancing the digitization of society, ushering in critical applications that elevate the overall quality of life. Yet, the practical implementation of the edge paradigm proves more challenging than anticipated, encountering disruptions primarily due to the constraints of applying conventional cloud‐based strategies at the network's periphery. Increasingly influenced by sustainability commitments, industry regulations currently view edge computing as a potential threat, primarily due to the energy inefficiency of solutions situated in close proximity to data generation sources and the rising density of computing. This paper presents a proactive strategy to transform the perceived threat into an opportunity, steering the sustainable evolution of future edge infrastructures to make them both environmentally and economically competitive for accelerated adoption. The vision outlined addresses key challenges associated with edge deployment and operation, emphasizing energy efficiency, fault‐tolerant automation, and collaborative orchestration. The proposed approach integrates two‐phase immersion cooling, formal modeling, machine learning, and federated management to effectively harness heterogeneity, propelling the sustainability of edge computing. To substantiate the efficacy of this approach, the paper details initial efforts towards establishing the sustainability of an edge infrastructure designed for an Advanced Driver Assistance Systems application.
边缘计算的出现为推进社会数字化带来了巨大希望,它将带来提升整体生活质量的关键应用。然而,事实证明,边缘范式的实际应用比预期更具挑战性,主要是由于在网络外围应用传统云计算策略所面临的限制而造成的干扰。受可持续发展承诺的影响越来越大,行业法规目前将边缘计算视为潜在威胁,这主要是由于靠近数据生成源的解决方案能源效率低下,以及计算密度不断提高。本文提出了一种积极主动的战略,可将所认为的威胁转化为机遇,引导未来边缘基础设施的可持续发展,使其在环境和经济上都具有竞争力,从而加快采用速度。本文概述的愿景旨在解决边缘部署和运行所面临的关键挑战,强调能源效率、容错自动化和协作协调。所提出的方法整合了两相沉浸冷却、形式建模、机器学习和联合管理,可有效利用异构性,推动边缘计算的可持续发展。为了证明这种方法的有效性,本文详细介绍了为高级驾驶辅助系统应用设计的边缘基础设施建立可持续性的初步努力。
{"title":"Sustainable edge computing: Challenges and future directions","authors":"Patricia Arroba, Rajkumar Buyya, Román Cárdenas, José L. Risco‐Martín, José M. Moya","doi":"10.1002/spe.3340","DOIUrl":"https://doi.org/10.1002/spe.3340","url":null,"abstract":"The advent of edge computing holds immense promise for advancing the digitization of society, ushering in critical applications that elevate the overall quality of life. Yet, the practical implementation of the edge paradigm proves more challenging than anticipated, encountering disruptions primarily due to the constraints of applying conventional cloud‐based strategies at the network's periphery. Increasingly influenced by sustainability commitments, industry regulations currently view edge computing as a potential threat, primarily due to the energy inefficiency of solutions situated in close proximity to data generation sources and the rising density of computing. This paper presents a proactive strategy to transform the perceived threat into an opportunity, steering the sustainable evolution of future edge infrastructures to make them both environmentally and economically competitive for accelerated adoption. The vision outlined addresses key challenges associated with edge deployment and operation, emphasizing energy efficiency, fault‐tolerant automation, and collaborative orchestration. The proposed approach integrates two‐phase immersion cooling, formal modeling, machine learning, and federated management to effectively harness heterogeneity, propelling the sustainability of edge computing. To substantiate the efficacy of this approach, the paper details initial efforts towards establishing the sustainability of an edge infrastructure designed for an Advanced Driver Assistance Systems application.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140932019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic hierarchical intrusion detection task offloading in IoT edge networks 物联网边缘网络中的动态分层入侵检测任务卸载
Pub Date : 2024-05-01 DOI: 10.1002/spe.3338
Mansi Sahi, Nitin Auluck, Akramul Azim, Md Al Maruf
The Internet of Things (IoT) has gained widespread importance in recent time. However, the related issues of security and privacy persist in such IoT networks. Owing to device limitations in terms of computational power and storage, standard protection approaches cannot be deployed. In this article, we propose a lightweight distributed intrusion detection system (IDS) framework, called FCAFE‐BNET (Fog based Context Aware Feature Extraction using BranchyNET). The proposed FCAFE‐BNET approach considers versatile network conditions, such as varying bandwidths and data loads, while allocating inference tasks to cloud/edge resources. FCAFE‐BNET is able to adjust to dynamic network conditions. This can be advantageous for applications with particular quality of service requirements, such as video streaming or real‐time communication, ensuring a steady and reliable performance. Early exit deep neural networks (DNNs) have been employed for faster inference generation at the edge. Often, the weights that the model learns in the initial layer may be sufficiently qualified to perform the required classification tasks. Instead of using subsequent layers of DNNs for generating the inference, we have employed the early‐exit mechanism in the DNNs. Such DNNs help to predict a wide range of testing samples through these early‐exit branches, upon crossing a threshold. This method maintains the confidence values corresponding to the inference. Employing this approach, we achieved a faster inference, with significantly high accuracy. Comparative studies exploit manual feature extraction techniques, that can potentially overlook certain valuable patterns, thus degrading classification performance. The proposed framework converts textual/tabular data into 2‐D images, allowing the DNN model to autonomously learns its own features. This conversion scheme facilitated the identification of various intrusion types, ranging from 5 to 14 different categories. FCAFE‐BNET works for both network‐based and host‐based IDS: NIDS and HIDS. Our experiments demonstrate that, in comparison with recent approaches, FCAFE‐BNET achieves a 39.12%–50.23% reduction in the total inference time on benchmark real‐world datasets, such as: NSL‐KDD, UNSW‐NB 15, ToN_IoT, and ADFA_LD.
近年来,物联网(IoT)得到了广泛重视。然而,与之相关的安全和隐私问题在此类物联网网络中依然存在。由于设备在计算能力和存储方面的限制,无法部署标准的保护方法。在本文中,我们提出了一种轻量级分布式入侵检测系统(IDS)框架,称为 FCAFE-BNET(使用 BranchyNET 的基于雾的上下文感知特征提取)。所提出的 FCAFE-BNET 方法在将推理任务分配给云/边缘资源的同时,考虑了各种网络条件,如不同的带宽和数据负载。FCAFE-BNET 能够适应动态网络条件。这对于有特殊服务质量要求的应用(如视频流或实时通信)来说非常有利,可确保稳定可靠的性能。早期退出的深度神经网络(DNN)被用于在边缘更快地生成推理。通常情况下,模型在初始层中学习的权重可能足以胜任所需的分类任务。我们在 DNN 中采用了早期退出机制,而不是使用 DNN 的后续层来生成推理。这种 DNN 在跨越阈值时,通过这些早期退出分支帮助预测各种测试样本。这种方法可以保持与推理相对应的置信度值。采用这种方法,我们的推理速度更快,准确率也显著提高。比较研究利用的是人工特征提取技术,这种技术可能会忽略某些有价值的模式,从而降低分类性能。我们提出的框架将文本/表格数据转换为二维图像,使 DNN 模型能够自主学习自身特征。这种转换方案有助于识别各种入侵类型,从 5 到 14 个不同类别不等。FCAFE-BNET 既适用于基于网络的 IDS,也适用于基于主机的 IDS:NIDS 和 HIDS。我们的实验表明,与最近的方法相比,FCAFE-BNET 在基准真实数据集上的总推理时间减少了 39.12%-50.23%,这些数据集包括:NSL-KDD、UNSW-KDD、NSL-KDD 和 NSL-KDD:NSL-KDD、UNSW-NB 15、ToN_IoT 和 ADFA_LD。
{"title":"Dynamic hierarchical intrusion detection task offloading in IoT edge networks","authors":"Mansi Sahi, Nitin Auluck, Akramul Azim, Md Al Maruf","doi":"10.1002/spe.3338","DOIUrl":"https://doi.org/10.1002/spe.3338","url":null,"abstract":"The Internet of Things (IoT) has gained widespread importance in recent time. However, the related issues of security and privacy persist in such IoT networks. Owing to device limitations in terms of computational power and storage, standard protection approaches cannot be deployed. In this article, we propose a lightweight distributed intrusion detection system (IDS) framework, called FCAFE‐BNET (<jats:styled-content>F</jats:styled-content>og based <jats:styled-content>C</jats:styled-content>ontext <jats:styled-content>A</jats:styled-content>ware <jats:styled-content>F</jats:styled-content>eature <jats:styled-content>E</jats:styled-content>xtraction using <jats:styled-content>B</jats:styled-content>ranchy<jats:styled-content>NET</jats:styled-content>). The proposed FCAFE‐BNET approach considers versatile network conditions, such as varying bandwidths and data loads, while allocating inference tasks to cloud/edge resources. FCAFE‐BNET is able to adjust to dynamic network conditions. This can be advantageous for applications with particular quality of service requirements, such as video streaming or real‐time communication, ensuring a steady and reliable performance. Early exit deep neural networks (DNNs) have been employed for faster inference generation at the edge. Often, the weights that the model learns in the initial layer may be sufficiently qualified to perform the required classification tasks. Instead of using subsequent layers of DNNs for generating the inference, we have employed the early‐exit mechanism in the DNNs. Such DNNs help to predict a wide range of testing samples through these early‐exit branches, upon crossing a threshold. This method maintains the confidence values corresponding to the inference. Employing this approach, we achieved a faster inference, with significantly high accuracy. Comparative studies exploit manual feature extraction techniques, that can potentially overlook certain valuable patterns, thus degrading classification performance. The proposed framework converts textual/tabular data into 2‐D images, allowing the DNN model to autonomously learns its own features. This conversion scheme facilitated the identification of various intrusion types, ranging from 5 to 14 different categories. FCAFE‐BNET works for both network‐based and host‐based IDS: NIDS and HIDS. Our experiments demonstrate that, in comparison with recent approaches, FCAFE‐BNET achieves a 39.12%–50.23% reduction in the total inference time on benchmark real‐world datasets, such as: NSL‐KDD, UNSW‐NB 15, ToN_IoT, and ADFA_LD.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140831487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced discovery mechanisms in model repositories 模型库中的高级发现机制
Pub Date : 2024-04-25 DOI: 10.1002/spe.3332
Arsene Indamutsa, Juri Di Rocco, Lissette Almonte, Davide Di Ruscio, A. Pierantonio
As model‐driven engineering gains traction and poses as the new paradigm for software engineering, it raises a need for efficient approaches and tools to manage, discover, and retrieve relevant modeling artifacts. Hence, industry and academia are conceiving effective ways to store, search, and retrieve heterogeneous model artifacts that employ advanced discovery mechanisms. This paper presents MDEForge‐Search, a novel approach to discovering heterogeneous model artifacts over MDEForge, a distributed cloud‐based model repository. We designed advanced discovery mechanisms that retrieve heterogeneous artifacts within their context (megamodel) and reuse them across model management services. In addition, a domain‐specific approach has been proposed to formulate queries in terms of keywords, search tags, conditional operators, quality model assessment services and a transformation chain discoverer. Finally, the applicability of our approach was assessed in a recommender system modeling framework, which, thanks to the operated integration, can rely on the availability of more than 5000 model artifacts currently persisted in our cloud‐based model repository.
随着模型驱动工程逐渐成为软件工程的新范例,人们需要高效的方法和工具来管理、发现和检索相关的建模工件。因此,业界和学术界都在构思采用先进的发现机制来存储、搜索和检索异构模型工件的有效方法。本文介绍了 MDEForge-Search,一种通过分布式云模型库 MDEForge 发现异构模型工件的新方法。我们设计了先进的发现机制,可在其上下文(巨型模型)中检索异构工件,并在模型管理服务中重复使用它们。此外,我们还提出了一种针对特定领域的方法,可通过关键词、搜索标签、条件运算符、质量模型评估服务和转换链发现器来进行查询。最后,我们在一个推荐系统建模框架中评估了我们的方法的适用性,由于进行了操作集成,该框架可以依赖于目前保存在我们基于云的模型库中的 5000 多个模型工件的可用性。
{"title":"Advanced discovery mechanisms in model repositories","authors":"Arsene Indamutsa, Juri Di Rocco, Lissette Almonte, Davide Di Ruscio, A. Pierantonio","doi":"10.1002/spe.3332","DOIUrl":"https://doi.org/10.1002/spe.3332","url":null,"abstract":"As model‐driven engineering gains traction and poses as the new paradigm for software engineering, it raises a need for efficient approaches and tools to manage, discover, and retrieve relevant modeling artifacts. Hence, industry and academia are conceiving effective ways to store, search, and retrieve heterogeneous model artifacts that employ advanced discovery mechanisms. This paper presents MDEForge‐Search, a novel approach to discovering heterogeneous model artifacts over MDEForge, a distributed cloud‐based model repository. We designed advanced discovery mechanisms that retrieve heterogeneous artifacts within their context (megamodel) and reuse them across model management services. In addition, a domain‐specific approach has been proposed to formulate queries in terms of keywords, search tags, conditional operators, quality model assessment services and a transformation chain discoverer. Finally, the applicability of our approach was assessed in a recommender system modeling framework, which, thanks to the operated integration, can rely on the availability of more than 5000 model artifacts currently persisted in our cloud‐based model repository.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140657455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue on collaborative edge computing for secure and scalable Internet of Things 面向安全和可扩展物联网的协作边缘计算特刊
Pub Date : 2024-04-17 DOI: 10.1002/spe.3337
Deepak Puthal, Amit Kumar Mishra, Sambit Kumar Mishra
{"title":"Special issue on collaborative edge computing for secure and scalable Internet of Things","authors":"Deepak Puthal, Amit Kumar Mishra, Sambit Kumar Mishra","doi":"10.1002/spe.3337","DOIUrl":"https://doi.org/10.1002/spe.3337","url":null,"abstract":"","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140612290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous QoS‐compliant orchestration in the Cloud‐Edge continuum 在 "云-边缘 "连续体中进行符合 QoS 的持续协调
Pub Date : 2024-04-11 DOI: 10.1002/spe.3334
Giuseppe Bisicchia, Stefano Forti, Ernesto Pimentel, Antonio Brogi
The problem of managing multi‐service applications on top of Cloud‐Edge networks in a quality of service (QoS)‐aware manner has been thoroughly studied in recent years from a decision‐making perspective. However, only a few studies addressed the problem of actively enforcing such decisions while orchestrating multi‐service applications and considering infrastructure and application variations. In this article, we propose a next‐gen orchestrator prototype based on Docker to achieve the continuous and QoS‐compliant management of multiservice applications on top of geographically distributed Cloud‐Edge resources, in continuity with CI/CD pipelines and infrastructure monitoring tools. Finally, we assess our proposal over a geographically distributed testbed across Italy.
近年来,以服务质量(QoS)感知方式管理云边缘网络之上的多服务应用问题已从决策角度得到了深入研究。然而,只有少数研究探讨了在协调多服务应用并考虑基础设施和应用变化的同时主动执行此类决策的问题。在本文中,我们提出了一个基于 Docker 的下一代协调器原型,以实现在地理上分布广泛的 Cloud-Edge 资源之上对多服务应用进行持续且符合 QoS 的管理,并与 CI/CD 管道和基础架构监控工具保持一致。最后,我们将在意大利境内的地理分布式测试平台上对我们的建议进行评估。
{"title":"Continuous QoS‐compliant orchestration in the Cloud‐Edge continuum","authors":"Giuseppe Bisicchia, Stefano Forti, Ernesto Pimentel, Antonio Brogi","doi":"10.1002/spe.3334","DOIUrl":"https://doi.org/10.1002/spe.3334","url":null,"abstract":"The problem of managing multi‐service applications on top of Cloud‐Edge networks in a quality of service (QoS)‐aware manner has been thoroughly studied in recent years from a decision‐making perspective. However, only a few studies addressed the problem of actively enforcing such decisions while orchestrating multi‐service applications and considering infrastructure and application variations. In this article, we propose a next‐gen orchestrator prototype based on Docker to achieve the continuous and QoS‐compliant management of multiservice applications on top of geographically distributed Cloud‐Edge resources, in continuity with CI/CD pipelines and infrastructure monitoring tools. Finally, we assess our proposal over a geographically distributed testbed across Italy.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140584783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post‐quantum attack resilience blockchain‐assisted data authentication protocol for smart healthcare system 用于智能医疗系统的后量子攻击弹性区块链辅助数据验证协议
Pub Date : 2024-04-10 DOI: 10.1002/spe.3336
Lacchita Soni, Harish Chandra, Daya Sagar Gupta
The smart healthcare system (SHS), a significant medical domain underpinning the Internet of Things (IoT), which collects and analyzes health data from many sources to provide better medical treatment. The smart healthcare system is a combination of hardware and software used in the medical care field, providing remote diagnosis and treatment via a patient‐based health data‐sharing system. To increase security, a large variety of authenticated techniques have been developed over the past several decades, most of which are based on conventional number‐theoretic assumptions such as discrete logarithms and integer factorization problems. However, Shor's method is capable of solving number‐theory‐based problems. As a result, Shor's technique might be used to resolve challenging number theory problems on a quantum computer effectively. Therefore, this article presents blockchain‐based healthcare record solutions with lattice RLWE‐based key exchange protocol using a smart card. Blockchain applications may correctly detect errors, including those that are risky, in the medical industry. It can also improve the efficiency, security, and transparency of transferring medical data throughout the healthcare protocol. The formal security of this protocol is shown under the ROM (random oracle model), and the informal security is also given in this article against well‐known attacks. The presented protocol outperforms related earlier mechanisms in terms of communication and computational cost overheads, according to the performance study.
智能医疗系统(SHS)是支撑物联网(IoT)的一个重要医疗领域,它收集并分析来自多个来源的健康数据,以提供更好的医疗服务。智能医疗系统是医疗领域使用的硬件和软件的结合,通过基于患者的健康数据共享系统提供远程诊断和治疗。为了提高安全性,过去几十年来开发了大量的验证技术,其中大多数都基于传统的数论假设,如离散对数和整数因式分解问题。然而,Shor 的方法能够解决基于数论的问题。因此,Shor 的技术可用于在量子计算机上有效解决具有挑战性的数论问题。因此,本文提出了基于区块链的医疗记录解决方案,并使用智能卡提出了基于网格 RLWE 的密钥交换协议。区块链应用可以正确检测医疗行业中的错误,包括有风险的错误。它还能提高整个医疗协议中医疗数据传输的效率、安全性和透明度。本文展示了该协议在 ROM(随机甲骨文模型)下的正式安全性,并给出了针对众所周知的攻击的非正式安全性。根据性能研究,本文提出的协议在通信和计算成本开销方面优于早期的相关机制。
{"title":"Post‐quantum attack resilience blockchain‐assisted data authentication protocol for smart healthcare system","authors":"Lacchita Soni, Harish Chandra, Daya Sagar Gupta","doi":"10.1002/spe.3336","DOIUrl":"https://doi.org/10.1002/spe.3336","url":null,"abstract":"The smart healthcare system (SHS), a significant medical domain underpinning the Internet of Things (IoT), which collects and analyzes health data from many sources to provide better medical treatment. The smart healthcare system is a combination of hardware and software used in the medical care field, providing remote diagnosis and treatment via a patient‐based health data‐sharing system. To increase security, a large variety of authenticated techniques have been developed over the past several decades, most of which are based on conventional number‐theoretic assumptions such as discrete logarithms and integer factorization problems. However, Shor's method is capable of solving number‐theory‐based problems. As a result, Shor's technique might be used to resolve challenging number theory problems on a quantum computer effectively. Therefore, this article presents blockchain‐based healthcare record solutions with lattice RLWE‐based key exchange protocol using a smart card. Blockchain applications may correctly detect errors, including those that are risky, in the medical industry. It can also improve the efficiency, security, and transparency of transferring medical data throughout the healthcare protocol. The formal security of this protocol is shown under the ROM (random oracle model), and the informal security is also given in this article against well‐known attacks. The presented protocol outperforms related earlier mechanisms in terms of communication and computational cost overheads, according to the performance study.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140584654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching long patterns with BNDM 使用 BNDM 搜索长图案
Pub Date : 2024-04-05 DOI: 10.1002/spe.3335
Jorma Tarhio
We present new algorithms for exact string matching of long patterns. Our algorithms read ‐grams at constant distances and are variations of the simplified BNDM algorithm. We demonstrate the competitiveness of our solutions through practical experiments. Many of our algorithms were faster than previous methods for English and DNA patterns between 400 and 50,000 in length. Our algorithms were still better when the preprocessing time was taken into account or when the patterns were taken from a different text of the same type.
我们提出了长模式精确字符串匹配的新算法。我们的算法以恒定距离读取字符串,是简化 BNDM 算法的变体。我们通过实际实验证明了我们的解决方案的竞争力。对于长度在 400 到 50,000 之间的英语和 DNA 模式,我们的许多算法都比以前的方法更快。如果将预处理时间考虑在内,或者图案取自同一类型的不同文本,我们的算法仍然更胜一筹。
{"title":"Searching long patterns with BNDM","authors":"Jorma Tarhio","doi":"10.1002/spe.3335","DOIUrl":"https://doi.org/10.1002/spe.3335","url":null,"abstract":"We present new algorithms for exact string matching of long patterns. Our algorithms read ‐grams at constant distances and are variations of the simplified BNDM algorithm. We demonstrate the competitiveness of our solutions through practical experiments. Many of our algorithms were faster than previous methods for English and DNA patterns between 400 and 50,000 in length. Our algorithms were still better when the preprocessing time was taken into account or when the patterns were taken from a different text of the same type.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140584747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of competence on agile effort estimation in academic setting 能力对学术环境中敏捷工作估算的影响
Pub Date : 2024-04-03 DOI: 10.1002/spe.3333
Luka Fürst, Tomaž Hovelja, Marko Poženel, Damjan Vavpotič
Effort estimation is an important activity in agile software development. The goal of the presented study was to determine the influence of individual competence on software development effort estimation. In particular, we measured both the accuracy of effort estimation and the duration of the estimation process itself, both for three different estimation methods. The subjects of our study were teams of students of a graduate‐level software engineering course at the University of Ljubljana, Faculty of Computer and Information Science. Based on the grades that individual students attained in their undergraduate study, we classified each team as “high‐competence” or “low‐competence” and additionally as “heterogeneous” or “homogeneous” (the criterion here being the variance of the members' average grades). We found out that there was no significant difference in effort estimation accuracy neither between high‐competence and low‐competence teams nor between heterogeneous and homogeneous teams, regardless of which estimation method was used. However, high‐competence teams spent significantly less time on effort estimation than low‐competence ones. Likewise, for two of the employed estimation methods, heterogeneous teams completed effort estimation in a significantly shorter time than homogeneous teams. These results might benefit both academic and professional community.
努力估算是敏捷软件开发中的一项重要活动。本研究旨在确定个人能力对软件开发工作量估算的影响。特别是,我们测量了三种不同估算方法的工作量估算准确性和估算过程本身的持续时间。我们的研究对象是卢布尔雅那大学计算机与信息科学学院软件工程研究生课程的学生团队。根据每个学生在本科阶段的成绩,我们将每个团队分为 "高能力 "和 "低能力",以及 "异质 "和 "同质"(这里的标准是成员平均成绩的差异)。我们发现,无论采用哪种估算方法,高能力团队和低能力团队之间以及异质团队和同质团队之间的努力估算准确率都没有显著差异。但是,高能力团队花费在努力估算上的时间明显少于低能力团队。同样,在使用的两种估算方法中,异质团队完成努力估算的时间明显短于同质团队。这些结果可能对学术界和专业界都有益处。
{"title":"Impact of competence on agile effort estimation in academic setting","authors":"Luka Fürst, Tomaž Hovelja, Marko Poženel, Damjan Vavpotič","doi":"10.1002/spe.3333","DOIUrl":"https://doi.org/10.1002/spe.3333","url":null,"abstract":"Effort estimation is an important activity in agile software development. The goal of the presented study was to determine the influence of individual competence on software development effort estimation. In particular, we measured both the accuracy of effort estimation and the duration of the estimation process itself, both for three different estimation methods. The subjects of our study were teams of students of a graduate‐level software engineering course at the University of Ljubljana, Faculty of Computer and Information Science. Based on the grades that individual students attained in their undergraduate study, we classified each team as “high‐competence” or “low‐competence” and additionally as “heterogeneous” or “homogeneous” (the criterion here being the variance of the members' average grades). We found out that there was no significant difference in effort estimation accuracy neither between high‐competence and low‐competence teams nor between heterogeneous and homogeneous teams, regardless of which estimation method was used. However, high‐competence teams spent significantly less time on effort estimation than low‐competence ones. Likewise, for two of the employed estimation methods, heterogeneous teams completed effort estimation in a significantly shorter time than homogeneous teams. These results might benefit both academic and professional community.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140584782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iQuantum: A toolkit for modeling and simulation of quantum computing environments iQuantum:量子计算环境建模与仿真工具包
Pub Date : 2024-03-30 DOI: 10.1002/spe.3331
H. T. Nguyen, Muhammad Usman, R. Buyya
Quantum computing resources are predominantly accessible through cloud services, with a potential future shift to edge networks. This paradigm and the increasing global interest in quantum computing have amplified the need for efficient, adaptable resource management strategies and service models for quantum systems. However, many limitations in the quantum resources' quantity, quality, availability, and cost pose significant challenges for conducting research in practical environments. To address these challenges, we proposed iQuantum, a holistic and lightweight discrete‐event simulation toolkit uniquely tailored to model hybrid quantum computing environments. We also present a detailed system model for prototyping and problem formulation in quantum resource management. Through rigorous empirical validation and evaluations using large‐scale quantum workload datasets, we demonstrate the flexibility and applicability of our toolkit in various use cases. iQuantum provides a versatile environment for designing and evaluating quantum resource management policies such as quantum task scheduling, backend selection, hybrid task offloading, and orchestration in the quantum cloud‐edge continuum. Our work endeavors to create substantial contributions to quantum computing modeling and simulation, empowering the creation of future resource management strategies and quantum computing's broader applications.
量子计算资源主要通过云服务访问,未来有可能转向边缘网络。这种模式以及全球对量子计算日益增长的兴趣,扩大了对高效、适应性强的资源管理策略和量子系统服务模式的需求。然而,量子资源在数量、质量、可用性和成本方面的诸多限制给在实际环境中开展研究带来了巨大挑战。为了应对这些挑战,我们提出了 iQuantum,这是一个全面、轻量级的离散事件仿真工具包,专门用于模拟混合量子计算环境。我们还提出了一个详细的系统模型,用于量子资源管理的原型设计和问题制定。通过使用大规模量子工作负载数据集进行严格的经验验证和评估,我们证明了我们的工具包在各种用例中的灵活性和适用性。iQuantum 为设计和评估量子资源管理策略(如量子任务调度、后端选择、混合任务卸载和量子云-边缘连续体中的协调)提供了一个多功能环境。我们的工作致力于为量子计算建模和仿真做出实质性贡献,为未来资源管理策略的创建和量子计算的广泛应用提供支持。
{"title":"iQuantum: A toolkit for modeling and simulation of quantum computing environments","authors":"H. T. Nguyen, Muhammad Usman, R. Buyya","doi":"10.1002/spe.3331","DOIUrl":"https://doi.org/10.1002/spe.3331","url":null,"abstract":"Quantum computing resources are predominantly accessible through cloud services, with a potential future shift to edge networks. This paradigm and the increasing global interest in quantum computing have amplified the need for efficient, adaptable resource management strategies and service models for quantum systems. However, many limitations in the quantum resources' quantity, quality, availability, and cost pose significant challenges for conducting research in practical environments. To address these challenges, we proposed iQuantum, a holistic and lightweight discrete‐event simulation toolkit uniquely tailored to model hybrid quantum computing environments. We also present a detailed system model for prototyping and problem formulation in quantum resource management. Through rigorous empirical validation and evaluations using large‐scale quantum workload datasets, we demonstrate the flexibility and applicability of our toolkit in various use cases. iQuantum provides a versatile environment for designing and evaluating quantum resource management policies such as quantum task scheduling, backend selection, hybrid task offloading, and orchestration in the quantum cloud‐edge continuum. Our work endeavors to create substantial contributions to quantum computing modeling and simulation, empowering the creation of future resource management strategies and quantum computing's broader applications.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140364928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluate Chat‐GPT's programming capability in Swift through real university exam questions 通过大学真题评估 Chat-GPT 的 Swift 编程能力
Pub Date : 2024-03-21 DOI: 10.1002/spe.3330
Zizhuo Zhang, Lian Wen, Yanfei Jiang, Yongli Liu
In this study, we evaluate the programming capabilities of OpenAI's GPT‐3.5 and GPT‐4 models using Swift‐based exam questions from a third‐year university course. The results indicate that both GPT models generally outperform the average student score, yet they do not consistently exceed the performance of the top students. This comparison highlights areas where the GPT models excel and where they fall short, providing a nuanced view of their current programming proficiency. The study also reveals surprising instances where GPT‐3.5 outperforms GPT‐4, suggesting complex variations in AI model capabilities. By providing a clear benchmark of GPT's programming skills in an academic context, our research contributes valuable insights for future advancements in AI programming education and underscores the need for continued development to fully realize AI's potential in educational settings.
在本研究中,我们使用大学三年级课程中基于 Swift 的试题,对 OpenAI 的 GPT-3.5 和 GPT-4 模型的编程能力进行了评估。结果表明,这两种 GPT 模型的成绩普遍高于学生的平均成绩,但它们并没有持续超过优秀学生的成绩。这种比较凸显了 GPT 模型的优势领域和不足之处,提供了对其当前编程能力的细微观察。研究还揭示了 GPT-3.5 优于 GPT-4 的惊人情况,这表明人工智能模型能力存在复杂的差异。我们的研究为 GPT 在学术背景下的编程技能提供了一个清晰的基准,为人工智能编程教育的未来发展提供了宝贵的见解,并强调了在教育环境中充分发挥人工智能潜力的持续发展的必要性。
{"title":"Evaluate Chat‐GPT's programming capability in Swift through real university exam questions","authors":"Zizhuo Zhang, Lian Wen, Yanfei Jiang, Yongli Liu","doi":"10.1002/spe.3330","DOIUrl":"https://doi.org/10.1002/spe.3330","url":null,"abstract":"In this study, we evaluate the programming capabilities of OpenAI's GPT‐3.5 and GPT‐4 models using Swift‐based exam questions from a third‐year university course. The results indicate that both GPT models generally outperform the average student score, yet they do not consistently exceed the performance of the top students. This comparison highlights areas where the GPT models excel and where they fall short, providing a nuanced view of their current programming proficiency. The study also reveals surprising instances where GPT‐3.5 outperforms GPT‐4, suggesting complex variations in AI model capabilities. By providing a clear benchmark of GPT's programming skills in an academic context, our research contributes valuable insights for future advancements in AI programming education and underscores the need for continued development to fully realize AI's potential in educational settings.","PeriodicalId":21899,"journal":{"name":"Software: Practice and Experience","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Software: Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1