首页 > 最新文献

Proceedings of the 2006 ACM symposium on Applied computing最新文献

英文 中文
Towards low-perturbation anonymity preserving pattern discovery 低摄动匿名保持模式发现
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141412
M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support threshold in association rule mining. We have recently shown [3], that the above belief is ill-founded: by shifting the concept of k-anonymity [8] from data to patterns, we have formally characterized the notion of a threat to anonymity in the context of frequent itemsets mining, and provided a methodology to efficiently and effectively identify such threats that might arise from the disclosure of a set of frequent itemsets. In our previous paper [2] we have introduced a first, naïve strategy (named suppressive) to sanitize such threats. In this paper we develop a novel sanitization strategy, named additive, which outperforms the previous one in terms of the introduced distortion and has the interesting feature of maintaining the original set of frequent itemsets unchanged, while modifying only the corresponding support values.
一般认为,数据挖掘结果不会违反源数据库中记录的个人的匿名性。实际上,数据挖掘模型和模式为了保证所需的统计显著性,代表了大量的个体,从而隐藏了个体的身份:关联规则挖掘中的最小支持度阈值就是这种情况。我们最近表明[3],上述信念是没有根据的:通过将k-匿名的概念[8]从数据转移到模式,我们已经正式表征了频繁项目集挖掘背景下匿名威胁的概念,并提供了一种方法来有效地识别这些威胁,这些威胁可能来自一组频繁项目集的披露。在我们之前的论文[2]中,我们介绍了第一种naïve策略(称为suppressive)来清除此类威胁。在本文中,我们开发了一种新的消毒策略,称为添加剂,它在引入畸变方面优于先前的策略,并且具有保持原始频繁项集不变而仅修改相应支持值的有趣特征。
{"title":"Towards low-perturbation anonymity preserving pattern discovery","authors":"M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi","doi":"10.1145/1141277.1141412","DOIUrl":"https://doi.org/10.1145/1141277.1141412","url":null,"abstract":"It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support threshold in association rule mining. We have recently shown [3], that the above belief is ill-founded: by shifting the concept of k-anonymity [8] from data to patterns, we have formally characterized the notion of a threat to anonymity in the context of frequent itemsets mining, and provided a methodology to efficiently and effectively identify such threats that might arise from the disclosure of a set of frequent itemsets. In our previous paper [2] we have introduced a first, naïve strategy (named suppressive) to sanitize such threats. In this paper we develop a novel sanitization strategy, named additive, which outperforms the previous one in terms of the introduced distortion and has the interesting feature of maintaining the original set of frequent itemsets unchanged, while modifying only the corresponding support values.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator 基于混合反比超突变算子的无约束全局优化实数编码克隆选择算法
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141501
V. Cutello, Giuseppe Nicosia, M. Pavone
Numerical optimization of given objective functions is a crucial task in many real-life problems. This paper introduces a new immunological algorithm for continuous global optimization problems, called opt-IMMALG; it is an improved version of a previously proposed clonal selection algorithm, using a real-code representation and a new Inversely Proportional Hypermutation operator.We evaluate and assess the performance of opt-IMMALG and several others algorithms, namely opt-IA, PSO, arPSO, DE, and SEA with respect to their general applicability as numerical optimization algorithms. The experiments have been performed on 23 widely used benchmark problems.The experimental results show that opt-IMMALG is a suitable numerical optimization technique that, in terms of accuracy, outperforms the analyzed algorithms in this comparative study. In addition it is shown that opt-IMMALG is also suitable for solving large-scale problems.
给定目标函数的数值优化是许多现实问题中的关键任务。本文介绍了一种求解连续全局优化问题的免疫算法——opt-IMMALG;它是先前提出的克隆选择算法的改进版本,使用实码表示和新的反比例超突变算子。我们评估和评估了opt-IMMALG和其他几种算法的性能,即opt-IA, PSO, arPSO, DE和SEA,它们作为数值优化算法的一般适用性。在23个广泛使用的基准问题上进行了实验。实验结果表明,opt-IMMALG是一种合适的数值优化技术,在精度方面优于本对比研究中分析的算法。此外,还证明了opt-IMMALG也适用于解决大规模问题。
{"title":"Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator","authors":"V. Cutello, Giuseppe Nicosia, M. Pavone","doi":"10.1145/1141277.1141501","DOIUrl":"https://doi.org/10.1145/1141277.1141501","url":null,"abstract":"Numerical optimization of given objective functions is a crucial task in many real-life problems. This paper introduces a new immunological algorithm for continuous global optimization problems, called opt-IMMALG; it is an improved version of a previously proposed clonal selection algorithm, using a real-code representation and a new Inversely Proportional Hypermutation operator.We evaluate and assess the performance of opt-IMMALG and several others algorithms, namely opt-IA, PSO, arPSO, DE, and SEA with respect to their general applicability as numerical optimization algorithms. The experiments have been performed on 23 widely used benchmark problems.The experimental results show that opt-IMMALG is a suitable numerical optimization technique that, in terms of accuracy, outperforms the analyzed algorithms in this comparative study. In addition it is shown that opt-IMMALG is also suitable for solving large-scale problems.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114478374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components 方法重载和重写导致封装缺陷:一个异构组件组装实验
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141608
A. Beugnard
Based on an experiment using three languages under .NET, this paper argues that the semantic differences between these languages regarding method overloading and overriding give rise to significant complexity and break encapsulation. We first recalls the various interpretations of overriding and overloading in object oriented languages through what we call language signatures. Then, we realize an experimentation with .NET components coded in different programming languages in order to observe the global behavior. From this, we show that overriding and overloading are not compatible with a key property of components: encapsulation. We conclude that, in the current state of the art, in order to build predictable assembly, components must expose their internal structure! We propose a solution to this problem.
通过在。net下使用三种语言进行实验,本文认为这些语言之间在方法重载和重写方面的语义差异导致了显著的复杂性和破坏封装。我们首先回顾一下在面向对象语言中对覆盖和重载的各种解释,我们称之为语言签名。然后,为了观察全局行为,我们实现了用不同编程语言编写的。net组件的实验。由此我们可以看出,重写和重载与组件的一个关键属性:封装是不兼容的。我们的结论是,在目前的技术水平下,为了构建可预测的组装,组件必须暴露其内部结构!我们提出了一个解决这个问题的办法。
{"title":"Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components","authors":"A. Beugnard","doi":"10.1145/1141277.1141608","DOIUrl":"https://doi.org/10.1145/1141277.1141608","url":null,"abstract":"Based on an experiment using three languages under .NET, this paper argues that the semantic differences between these languages regarding method overloading and overriding give rise to significant complexity and break encapsulation. We first recalls the various interpretations of overriding and overloading in object oriented languages through what we call language signatures. Then, we realize an experimentation with .NET components coded in different programming languages in order to observe the global behavior. From this, we show that overriding and overloading are not compatible with a key property of components: encapsulation. We conclude that, in the current state of the art, in order to build predictable assembly, components must expose their internal structure! We propose a solution to this problem.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the transitive closure representation and adjustable compression 关于传递闭包表示和可调压缩
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141385
Yangjun Chen, D. Cooke
A composite object represented as a directed graph (digraph for short) is an important data structure that requires efficient support in CAD/CAM, CASE, office systems, software management, web databases, and document databases. It is cumbersome to handle such objects in relational database systems when they involve ancestor-descendant relationships (or say, recursive relationships). In this paper, we present a new encoding method to label a digraph, which reduces the footprints of all previous strategies. This method is based on a tree labeling method and the concept of branchings that are used in graph theory for finding the shortest connection networks. A branching is a subgraph of a given digraph that is in fact a forest, but covers all the nodes of the graph. On the one hand, the proposed encoding scheme achieves the smallest space requirements among all previously published strategies for recognizing recursive relationships. On the other hand, it leads to a new algorithm for computing transitive closures for DAGs (directed acyclic graph) in O(e·b) time and O(n·b) space, where n represents the number of the nodes of a DAG, e the numbers of the edges, and b the DAG's breadth. The method can also be extended to graphs containing cycles. Especially, based on this encoding method, a multi-level compression is developed, by means of which the space for the representation of a transitive closure can be reduced to O((b/dk)·n), where k is the number of compression levels and d is the average outdegree of the nodes.
表示为有向图(简称有向图)的复合对象是一种重要的数据结构,在CAD/CAM、CASE、办公系统、软件管理、web数据库和文档数据库中需要有效的支持。在关系数据库系统中,当涉及到祖先-后代关系(或者说递归关系)时,处理这样的对象是很麻烦的。在本文中,我们提出了一种新的编码方法来标记有向图,它减少了所有以前的策略的足迹。该方法基于图论中用于寻找最短连接网络的树标记方法和分支的概念。分支是给定有向图的子图,它实际上是一个森林,但覆盖了图的所有节点。一方面,所提出的编码方案在所有先前发布的递归关系识别策略中实现了最小的空间需求。另一方面,提出了在O(e·b)时间和O(n·b)空间上计算DAG(有向无环图)传递闭包的新算法,其中n表示DAG的节点数,e表示DAG的边数,b表示DAG的宽度。该方法也可以推广到包含循环的图。特别地,基于这种编码方法,开发了一种多级压缩方法,通过该方法可以将传递闭包的表示空间缩减到O((b/dk)·n),其中k为压缩级别数,d为节点的平均出度。
{"title":"On the transitive closure representation and adjustable compression","authors":"Yangjun Chen, D. Cooke","doi":"10.1145/1141277.1141385","DOIUrl":"https://doi.org/10.1145/1141277.1141385","url":null,"abstract":"A composite object represented as a directed graph (digraph for short) is an important data structure that requires efficient support in CAD/CAM, CASE, office systems, software management, web databases, and document databases. It is cumbersome to handle such objects in relational database systems when they involve ancestor-descendant relationships (or say, recursive relationships). In this paper, we present a new encoding method to label a digraph, which reduces the footprints of all previous strategies. This method is based on a tree labeling method and the concept of branchings that are used in graph theory for finding the shortest connection networks. A branching is a subgraph of a given digraph that is in fact a forest, but covers all the nodes of the graph. On the one hand, the proposed encoding scheme achieves the smallest space requirements among all previously published strategies for recognizing recursive relationships. On the other hand, it leads to a new algorithm for computing transitive closures for DAGs (directed acyclic graph) in O(e·b) time and O(n·b) space, where n represents the number of the nodes of a DAG, e the numbers of the edges, and b the DAG's breadth. The method can also be extended to graphs containing cycles. Especially, based on this encoding method, a multi-level compression is developed, by means of which the space for the representation of a transitive closure can be reduced to O((b/dk)·n), where k is the number of compression levels and d is the average outdegree of the nodes.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Impact of peer incentives on the dissemination of polluted content 同伴激励对污染内容传播的影响
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141720
Fabrício Benevenuto, C. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, J. Almeida, M. Mowbray
Recent studies have reported a new form of malicious behavior in file-sharing Peer-to-Peer systems: content pollution. The dissemination of polluted content in a P2P system has the detrimental effect of reducing content availability, and ultimately, decreasing the confidence of users in such systems. Two potential strategies for polluting P2P content are decoy insertion, which consists of injecting corrupted copies of a file into the system, and hash corruption, which consists of injecting a corrupted file with the same hash code as a non-corrupted one. Polluted content disseminates through P2P networks because users typically do not delete the corrupted files that they download.This paper investigates the effectiveness of peer incentives to delete corrupted files in reducing the dissemination of polluted content, considering the two aforementioned pollution mechanisms. Our simulation results show that the effectiveness of incentives is highly dependent on the pollution mechanism. We show that for a pollution dissemintation techinique called hash corruption, only effective incentive mechanisms are able to avoid spreading of polluted content.
最近的研究报告了文件共享对等系统中一种新的恶意行为形式:内容污染。在P2P系统中传播受污染的内容会降低内容的可用性,并最终降低用户对此类系统的信心。污染P2P内容的两种潜在策略是诱饵插入(decoy insertion)和散列破坏(hash corruption),前者包括将损坏的文件副本注入系统,后者包括将损坏的文件与未损坏的文件注入具有相同散列码的文件。受污染的内容通过P2P网络传播,因为用户通常不会删除他们下载的损坏文件。本文在考虑上述两种污染机制的情况下,研究了同伴激励删除损坏文件在减少污染内容传播方面的有效性。我们的模拟结果表明,激励的有效性高度依赖于污染机制。我们证明了一种被称为哈希腐败的污染传播技术,只有有效的激励机制才能避免污染内容的传播。
{"title":"Impact of peer incentives on the dissemination of polluted content","authors":"Fabrício Benevenuto, C. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, J. Almeida, M. Mowbray","doi":"10.1145/1141277.1141720","DOIUrl":"https://doi.org/10.1145/1141277.1141720","url":null,"abstract":"Recent studies have reported a new form of malicious behavior in file-sharing Peer-to-Peer systems: content pollution. The dissemination of polluted content in a P2P system has the detrimental effect of reducing content availability, and ultimately, decreasing the confidence of users in such systems. Two potential strategies for polluting P2P content are decoy insertion, which consists of injecting corrupted copies of a file into the system, and hash corruption, which consists of injecting a corrupted file with the same hash code as a non-corrupted one. Polluted content disseminates through P2P networks because users typically do not delete the corrupted files that they download.This paper investigates the effectiveness of peer incentives to delete corrupted files in reducing the dissemination of polluted content, considering the two aforementioned pollution mechanisms. Our simulation results show that the effectiveness of incentives is highly dependent on the pollution mechanism. We show that for a pollution dissemintation techinique called hash corruption, only effective incentive mechanisms are able to avoid spreading of polluted content.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Towards chemical coordination for grids 走向网格的化学配位
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141381
J. Banâtre, Pascal Fradet, Yann Radenac
In [6], Ian Foster and Karl Kesselman explain that grids need "a rethinking of existing programming models and, most likely, new thinking about novel models". In this work, we investigate a "novel programming model" for grids based on the chemical metaphor.
在[6]中,Ian Foster和Karl Kesselman解释说,网格需要“重新思考现有的编程模型,并最有可能对新模型进行新的思考”。在这项工作中,我们研究了一种基于化学隐喻的网格“新型编程模型”。
{"title":"Towards chemical coordination for grids","authors":"J. Banâtre, Pascal Fradet, Yann Radenac","doi":"10.1145/1141277.1141381","DOIUrl":"https://doi.org/10.1145/1141277.1141381","url":null,"abstract":"In [6], Ian Foster and Karl Kesselman explain that grids need \"a rethinking of existing programming models and, most likely, new thinking about novel models\". In this work, we investigate a \"novel programming model\" for grids based on the chemical metaphor.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A chat interface for human-agent interaction in MAST MAST中人机交互的聊天界面
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141302
Marco M. Carvalho, M. Rebeschini, J. Horsley, Niranjan Suri
In this paper we introduce a group-messaging interface that allows humans to efficiently interact with a group of agents through a hierarchical and customizable text protocol. Our approach is presented in the context of the MAST mobile agent-based framework for security and administration of large scale computer networks. The MAST framework is primarily human-centric and directly supports human-agent interaction that enables customized agents to notify administrators and react to abnormal environmental conditions. The proposed IRC-like interface was developed and tested in the context of MAST. In this paper we present the group-manager interface in contrast with other agent interfaces currently available in the MAST framework.
在本文中,我们介绍了一个组消息传递接口,它允许人类通过分层和可定制的文本协议有效地与一组代理进行交互。我们的方法是在用于大规模计算机网络安全和管理的基于移动代理的MAST框架的背景下提出的。MAST框架主要以人为中心,直接支持人-代理交互,使自定义代理能够通知管理员并对异常环境条件作出反应。提出的类irc接口是在MAST环境下开发和测试的。在本文中,我们提出了组管理器接口,并与MAST框架中目前可用的其他代理接口进行了比较。
{"title":"A chat interface for human-agent interaction in MAST","authors":"Marco M. Carvalho, M. Rebeschini, J. Horsley, Niranjan Suri","doi":"10.1145/1141277.1141302","DOIUrl":"https://doi.org/10.1145/1141277.1141302","url":null,"abstract":"In this paper we introduce a group-messaging interface that allows humans to efficiently interact with a group of agents through a hierarchical and customizable text protocol. Our approach is presented in the context of the MAST mobile agent-based framework for security and administration of large scale computer networks. The MAST framework is primarily human-centric and directly supports human-agent interaction that enables customized agents to notify administrators and react to abnormal environmental conditions. The proposed IRC-like interface was developed and tested in the context of MAST. In this paper we present the group-manager interface in contrast with other agent interfaces currently available in the MAST framework.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129593570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Bayesian approach for protein classification 蛋白质分类的贝叶斯方法
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141322
L. Merschmann, A. Plastino
In this work, we propose a new approach for protein classification based on Bayesian classifiers. Our goal is to predict the functional family of novel protein sequences based on their motif composition. For this purpose, datasets extracted from Prosite, a curated protein family database, are used as training datasets. In the conducted experiments, the performance of our classifier is compared to other known data mining approaches. The computational results have shown that the proposed method outperforms the other ones and looks very promising for problems with characteristics similar to the problem addressed here.
在这项工作中,我们提出了一种基于贝叶斯分类器的蛋白质分类新方法。我们的目标是根据它们的基序组成来预测新的蛋白质序列的功能家族。为此,从Prosite(一个精心策划的蛋白质家族数据库)中提取的数据集被用作训练数据集。在进行的实验中,将我们的分类器的性能与其他已知的数据挖掘方法进行了比较。计算结果表明,所提出的方法优于其他方法,并且对于具有类似问题特征的问题看起来非常有希望。
{"title":"A Bayesian approach for protein classification","authors":"L. Merschmann, A. Plastino","doi":"10.1145/1141277.1141322","DOIUrl":"https://doi.org/10.1145/1141277.1141322","url":null,"abstract":"In this work, we propose a new approach for protein classification based on Bayesian classifiers. Our goal is to predict the functional family of novel protein sequences based on their motif composition. For this purpose, datasets extracted from Prosite, a curated protein family database, are used as training datasets. In the conducted experiments, the performance of our classifier is compared to other known data mining approaches. The computational results have shown that the proposed method outperforms the other ones and looks very promising for problems with characteristics similar to the problem addressed here.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127088339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Assisted verification of elementary functions using Gappa 使用Gappa辅助验证基本函数
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141584
F. D. Dinechin, C. Lauter, G. Melquiond
The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall error of the implementation with respect to the mathematical function. Such work is function specific, concerns tens of lines of code for each function, and will usually be broken by the smallest change to the code (e.g. for maintenance or optimization purpose). Therefore, it is very tedious and error-prone if done by hand. This article discusses the use of the Gappa proof assistant in this context. Gappa has two main advantages over previous approaches: Its input format is very close to the actual C code to validate, and it automates error evaluation and propagation using interval arithmetic. Besides, it can be used to incrementally prove complex mathematical properties pertaining to the C code. Yet it does not require any specific knowledge about automatic theorem proving, and thus is accessible to a wider community. Moreover, Gappa may generate a formal proof of the results that can be checked independently by a lower-level proof assistant like Coq, hence providing an even higher confidence in the certification of the numerical code.
一个正确的四舍五入或区间初等函数的实现需要在最后的细节中仔细证明。证明需要对实现相对于数学函数的总体误差有一个严格的限定。这样的工作是特定于函数的,涉及到每个函数的数十行代码,并且通常会被代码的最小更改所破坏(例如为了维护或优化目的)。因此,如果手工完成,是非常繁琐和容易出错的。本文讨论了在这种情况下使用Gappa证明助手。与以前的方法相比,Gappa有两个主要优点:它的输入格式非常接近实际的C代码进行验证,并且它使用间隔算法自动进行错误评估和传播。此外,它还可以用于增量地证明与C代码相关的复杂数学属性。然而,它不需要任何关于自动定理证明的特定知识,因此可供更广泛的社区使用。此外,Gappa可以生成结果的形式化证明,可以由较低级别的证明助手(如Coq)独立检查,从而为数字代码的认证提供更高的信心。
{"title":"Assisted verification of elementary functions using Gappa","authors":"F. D. Dinechin, C. Lauter, G. Melquiond","doi":"10.1145/1141277.1141584","DOIUrl":"https://doi.org/10.1145/1141277.1141584","url":null,"abstract":"The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall error of the implementation with respect to the mathematical function. Such work is function specific, concerns tens of lines of code for each function, and will usually be broken by the smallest change to the code (e.g. for maintenance or optimization purpose). Therefore, it is very tedious and error-prone if done by hand. This article discusses the use of the Gappa proof assistant in this context. Gappa has two main advantages over previous approaches: Its input format is very close to the actual C code to validate, and it automates error evaluation and propagation using interval arithmetic. Besides, it can be used to incrementally prove complex mathematical properties pertaining to the C code. Yet it does not require any specific knowledge about automatic theorem proving, and thus is accessible to a wider community. Moreover, Gappa may generate a formal proof of the results that can be checked independently by a lower-level proof assistant like Coq, hence providing an even higher confidence in the certification of the numerical code.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Conceptual process configurations in enterprise knowledge management systems 企业知识管理系统中的概念流程配置
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141631
Peter Bollen
In this paper we will present the results of research into the semantics of modeling constructs for the process-oriented perspective for the conceptual modeling of enterprise subject areas. The set of modeling constructs that are defined in this paper are fully 'compatible' with the models in the data-oriented perspective in the fact oriented school of conceptual modeling. We will derive the 'semantic' bridges for the conceptual modeling methodology for enterprises in the process-oriented perspective.
在本文中,我们将介绍在面向过程的视角下对企业主题领域概念建模的建模构造语义的研究结果。本文中定义的建模构造集与面向事实的概念建模学派中面向数据视角的模型完全“兼容”。我们将从面向过程的角度为企业的概念建模方法推导“语义”桥梁。
{"title":"Conceptual process configurations in enterprise knowledge management systems","authors":"Peter Bollen","doi":"10.1145/1141277.1141631","DOIUrl":"https://doi.org/10.1145/1141277.1141631","url":null,"abstract":"In this paper we will present the results of research into the semantics of modeling constructs for the process-oriented perspective for the conceptual modeling of enterprise subject areas. The set of modeling constructs that are defined in this paper are fully 'compatible' with the models in the data-oriented perspective in the fact oriented school of conceptual modeling. We will derive the 'semantic' bridges for the conceptual modeling methodology for enterprises in the process-oriented perspective.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127539800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Proceedings of the 2006 ACM symposium on Applied computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1