首页 > 最新文献

2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing最新文献

英文 中文
Developing Secure Cloud Applications: A Case Study 开发安全的云应用:一个案例研究
Ermanno Battista, V. Casola, N. Mazzocca, M. Ficco, M. Rak
Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud Provider prospective in order to securely integrate frameworks and Infrastructures as a Services (IaaS) in a Cloud datacenter. There is no way to monitor and evaluate the provided security. In fact, Service Level Agreements mainly focus on performance related terms and no guarantees are given for security mechanisms. Users are interested in tools to verify and monitor the implemented security requirements. On the other side, developers need tools to deploy Cloud application offering measurable security grants to end users. In this paper we will propose an approach to implement security mechanisms as components in the application design process. We modeled security interactions according to the specific threat, the specific security requirements and user/application capabilities trying to improve security and enable a Service Provider to offer security guarantees to customers. The approach has been designed to fit with different Cloud platforms, but to demonstrate its applicability, we will present a case study on the mOSAIC Platform.
今天,云采用的主要限制与用户对安全损失的感知有关。实际上,现有的提供安全性的解决方案主要关注云提供商的前景,以便在云数据中心中安全地集成框架和基础设施即服务(IaaS)。没有办法监控和评估所提供的安全性。事实上,服务水平协议主要关注与性能相关的术语,并没有为安全机制提供保证。用户对验证和监视实现的安全需求的工具感兴趣。另一方面,开发人员需要工具来部署云应用程序,为最终用户提供可衡量的安全授权。在本文中,我们将提出一种在应用程序设计过程中作为组件实现安全机制的方法。我们根据特定的威胁、特定的安全需求和用户/应用程序功能对安全交互进行建模,试图提高安全性,并使服务提供者能够向客户提供安全保证。该方法旨在适应不同的云平台,但为了展示其适用性,我们将介绍一个关于mOSAIC平台的案例研究。
{"title":"Developing Secure Cloud Applications: A Case Study","authors":"Ermanno Battista, V. Casola, N. Mazzocca, M. Ficco, M. Rak","doi":"10.1109/SYNASC.2013.63","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.63","url":null,"abstract":"Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud Provider prospective in order to securely integrate frameworks and Infrastructures as a Services (IaaS) in a Cloud datacenter. There is no way to monitor and evaluate the provided security. In fact, Service Level Agreements mainly focus on performance related terms and no guarantees are given for security mechanisms. Users are interested in tools to verify and monitor the implemented security requirements. On the other side, developers need tools to deploy Cloud application offering measurable security grants to end users. In this paper we will propose an approach to implement security mechanisms as components in the application design process. We modeled security interactions according to the specific threat, the specific security requirements and user/application capabilities trying to improve security and enable a Service Provider to offer security guarantees to customers. The approach has been designed to fit with different Cloud platforms, but to demonstrate its applicability, we will present a case study on the mOSAIC Platform.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Plagiarism to Malware Detection 从剽窃到恶意软件检测
Ciprian Oprișa, George Cabau, Adrian Colesa
We have often seen how malware families evolve over time: the malware authors add new features, change the order of functions, modify some strings or add random useless code. They do all that to evade detection. In a similar way, computer science students that copy homework will change variable and function names, rephrase comments or even replace some small portions of the code. In both cases, the essence remains the same and it is easy for one to see it, by comparing two samples or two source codes. The challenge however, is to automatically find groups of similar items in a large collection. Our research shows that we can apply the same techniques in order to cluster new malicious samples into malware families and detect plagiarized students work. The paper proposes a novel approach for computing the similarity between two items, based not only on their features, but also based on the frequencies of those features in a given population. The new similarity function was tested in a clustering algorithm and it proved better than other approaches. Also, the nature of the method allows it to be used in other document classification tasks.
我们经常看到恶意软件家族是如何随着时间的推移而演变的:恶意软件作者添加新功能,改变函数的顺序,修改一些字符串或添加随机无用的代码。他们这么做是为了逃避侦查。类似地,抄作业的计算机科学专业的学生会更改变量和函数名,改写注释,甚至替换一小部分代码。在这两种情况下,本质是相同的,通过比较两个示例或两个源代码,很容易看出这一点。然而,挑战在于如何在一个大的集合中自动找到一组相似的项目。我们的研究表明,我们可以应用相同的技术来将新的恶意样本聚类到恶意软件家族中,并检测剽窃的学生作业。本文提出了一种新的方法来计算两个项目之间的相似性,不仅基于它们的特征,而且基于这些特征在给定群体中的频率。在聚类算法中测试了新的相似度函数,证明了它优于其他方法。此外,该方法的性质允许将其用于其他文档分类任务。
{"title":"From Plagiarism to Malware Detection","authors":"Ciprian Oprișa, George Cabau, Adrian Colesa","doi":"10.1109/SYNASC.2013.37","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.37","url":null,"abstract":"We have often seen how malware families evolve over time: the malware authors add new features, change the order of functions, modify some strings or add random useless code. They do all that to evade detection. In a similar way, computer science students that copy homework will change variable and function names, rephrase comments or even replace some small portions of the code. In both cases, the essence remains the same and it is easy for one to see it, by comparing two samples or two source codes. The challenge however, is to automatically find groups of similar items in a large collection. Our research shows that we can apply the same techniques in order to cluster new malicious samples into malware families and detect plagiarized students work. The paper proposes a novel approach for computing the similarity between two items, based not only on their features, but also based on the frequencies of those features in a given population. The new similarity function was tested in a clustering algorithm and it proved better than other approaches. Also, the nature of the method allows it to be used in other document classification tasks.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Compiler Design for Hyper-metaprogramming 超元编程的编译器设计
Lucian Radu Teodorescu, R. Potolea
Although static metaprogramming is not a new technique and is present in some of the most popular programming languages today, it is still considered an esoteric feature. This is mainly because writing metaprograms requires syntactic constructs and programming abstractions different from those used for writing regular programs. We propose in this paper the concept of hyper-metaprogramming, a new kind of Turing-complete compile-time metaprogramming, which allows metaprograms to be written in the same way as traditional programs: with the same abstractions, syntax, and semantics. Using this feature, programmers can easily implement any complex algorithms and data structures at compile-time, before producing the final run-time program. The paper focuses on discussing the main mechanisms involved in implementing hyper-metaprogramming.
尽管静态元编程并不是一种新技术,而且存在于当今一些最流行的编程语言中,但它仍然被认为是一种深奥的特性。这主要是因为编写元程序需要的语法结构和编程抽象不同于编写常规程序。本文提出了超元编程的概念,这是一种新的图灵完备的编译时元编程,它允许元程序以与传统程序相同的方式编写:具有相同的抽象、语法和语义。使用这个特性,程序员可以在生成最终的运行时程序之前,在编译时轻松实现任何复杂的算法和数据结构。本文重点讨论了实现超元编程所涉及的主要机制。
{"title":"Compiler Design for Hyper-metaprogramming","authors":"Lucian Radu Teodorescu, R. Potolea","doi":"10.1109/SYNASC.2013.34","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.34","url":null,"abstract":"Although static metaprogramming is not a new technique and is present in some of the most popular programming languages today, it is still considered an esoteric feature. This is mainly because writing metaprograms requires syntactic constructs and programming abstractions different from those used for writing regular programs. We propose in this paper the concept of hyper-metaprogramming, a new kind of Turing-complete compile-time metaprogramming, which allows metaprograms to be written in the same way as traditional programs: with the same abstractions, syntax, and semantics. Using this feature, programmers can easily implement any complex algorithms and data structures at compile-time, before producing the final run-time program. The paper focuses on discussing the main mechanisms involved in implementing hyper-metaprogramming.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130890461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting Loss of Diversity for an Efficient Termination of EAs 检测分集损失的有效终止ea
D. Roche, D. Gil, J. Giraldo
Termination of Evolutionary Algorithms (EA) at its steady state so that useless iterations are not performed is a main point for its efficient application to black-box problems. Many EA algorithms evolve while there is still diversity in their population and, thus, they could be terminated by analyzing the behavior some measures of EA population diversity. This paper presents a numeric approximation to steady states that can be used to detect the moment EA population has lost its diversity for EA termination. Our condition has been applied to 3 EA paradigms based on diversity and a selection of functions covering the properties most relevant for EA convergence. Experiments show that our condition works regardless of the search space dimension and function landscape.
在稳定状态下终止进化算法(EA)以避免无用的迭代是其有效应用于黑盒问题的一个要点。许多EA算法是在种群多样性仍然存在的情况下进化的,因此,通过分析EA种群多样性的行为可以终止这些算法。本文提出了一个稳定状态的数值近似,可用于检测EA种群因EA终止而失去多样性的时刻。我们的条件已经应用于基于多样性的3个EA范式,并选择了涵盖与EA收敛最相关的属性的函数。实验表明,无论搜索空间维数和函数格局如何,我们的条件都是有效的。
{"title":"Detecting Loss of Diversity for an Efficient Termination of EAs","authors":"D. Roche, D. Gil, J. Giraldo","doi":"10.1109/SYNASC.2013.79","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.79","url":null,"abstract":"Termination of Evolutionary Algorithms (EA) at its steady state so that useless iterations are not performed is a main point for its efficient application to black-box problems. Many EA algorithms evolve while there is still diversity in their population and, thus, they could be terminated by analyzing the behavior some measures of EA population diversity. This paper presents a numeric approximation to steady states that can be used to detect the moment EA population has lost its diversity for EA termination. Our condition has been applied to 3 EA paradigms based on diversity and a selection of functions covering the properties most relevant for EA convergence. Experiments show that our condition works regardless of the search space dimension and function landscape.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123787738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distributed Resource Identification Service for Cloud Environments 面向云环境的分布式资源识别服务
S. Panica, D. Petcu
Resource identification in massive deployed distributed systems, like the cloud environments, is a common problem when multiple types of resources need to be managed. This is the case of platform as a service (PaaS) where the platform offers different types resources that are deployed in heterogeneous systems. While most of the solutions on the market follow a predefined architecture using common naming services in a centralized manner this paper proposes a new approach based on a distributed naming and resource identification service. The proposed solution allows a client to consume or communicate with a resource without having to deal with resource location or discovery protocols.
在大规模部署的分布式系统(如云环境)中,当需要管理多种类型的资源时,资源标识是一个常见问题。这就是平台即服务(PaaS)的情况,平台提供部署在异构系统中的不同类型的资源。虽然市场上的大多数解决方案都遵循预定义的体系结构,以集中的方式使用通用命名服务,但本文提出了一种基于分布式命名和资源标识服务的新方法。提出的解决方案允许客户端使用资源或与资源通信,而无需处理资源定位或发现协议。
{"title":"Distributed Resource Identification Service for Cloud Environments","authors":"S. Panica, D. Petcu","doi":"10.1109/SYNASC.2013.65","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.65","url":null,"abstract":"Resource identification in massive deployed distributed systems, like the cloud environments, is a common problem when multiple types of resources need to be managed. This is the case of platform as a service (PaaS) where the platform offers different types resources that are deployed in heterogeneous systems. While most of the solutions on the market follow a predefined architecture using common naming services in a centralized manner this paper proposes a new approach based on a distributed naming and resource identification service. The proposed solution allows a client to consume or communicate with a resource without having to deal with resource location or discovery protocols.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127918418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Coxeter Type Classification of Loop-Free Edge-Bipartite Graphs and Matrix Morsifications 无环边二部图的Coxeter型分类及矩阵模化
Rafal Bocian, Mariusz Felisiak, D. Simson
We continue and complete a Coxeter spectral study (presented in our talk given in SYNASC11 and SYNASC12) of the root systems in the sense of Bourbaki, the mesh geometries Γ(RΔ, ΦA) of roots of Δ in the sense of [J. Pure Appl. Algebra, 215 (2010), 13-34], and matrix morsifications A ∈ MorΔ, for simply laced Dynkin diagrams Δ ∈ {An, Dn, E6, E7, E8}. Here we report on algorithmic and morsification technique for the Coxeter spectral analysis of connected loop-free edge-bipartite graphs Δ with n ≥ 2 vertices by means of the Coxeter matrix CoxΔ ∈ Mn(Z), the Coxeter spectrum speccΔ, and an inflation algorithm associating to any connected loop-free positive bigraph Δ a simply laced Dynkin diagram DΔ, and defining a Z-congruence of the symmetric Gram matrices GΔ and G. We also present a computer aided technique that allows us to construct a Z-congruence of the non-symmetric Gram matrices ĞΔ and ĞΔ', if the Coxeter spectra speccΔ and speccΔ' coincide. A complete Coxeter spectral classification of positive edge-bipartite graphs Δ of Coxeter-Dynkin types DΔ ∈ {An, Dn, E6, E7}, with n ≤ 7, is obtained by a reduction to computer calculation of Gl(n, Z)-orbits in the set Mor, where Gl(n, Z) is the isotropy group of the Dynkin diagram DΔ.
我们继续并完成了布尔巴基意义下根系的考克斯特谱研究(在SYNASC11和SYNASC12的演讲中提出),以及Δ意义下根系的网格几何Γ(RΔ, ΦA) [J]。纯粹的达成。代数,215(2010),13-34],和矩阵模化A∈MorΔ,对于简单系Dynkin图Δ∈{An, Dn, E6, E7, E8}。本文利用Coxeter矩阵CoxΔ∈Mn(Z)、Coxeter谱speccΔ和一种与任意连通的无环正图Δ(简带Dynkin图DΔ)相关联的膨胀算法,并定义对称Gram矩阵GΔ和GDΔ的Z同余,研究了n≥2个顶点的连通无环边二部图Δ的Coxeter谱分析的算法和摩尔化技术。我们还提出了一种计算机辅助技术,该技术允许我们构建非对称Gram矩阵ĞΔ和ĞΔ'的z同余,如果Coxeter谱speccΔ和speccΔ'重合。通过对集合MorDΔ中Gl(n, Z)DΔ-orbits的计算机计算约简,得到Coxeter-Dynkin型(DΔ∈{An, Dn, E6, E7})的正边二部图Δ的完整Coxeter谱分类,其中Gl(n, Z)DΔ为Dynkin图DΔ的各向同性群。
{"title":"On Coxeter Type Classification of Loop-Free Edge-Bipartite Graphs and Matrix Morsifications","authors":"Rafal Bocian, Mariusz Felisiak, D. Simson","doi":"10.1109/SYNASC.2013.22","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.22","url":null,"abstract":"We continue and complete a Coxeter spectral study (presented in our talk given in SYNASC11 and SYNASC12) of the root systems in the sense of Bourbaki, the mesh geometries Γ(R<sub>Δ</sub>, Φ<sub>A</sub>) of roots of Δ in the sense of [J. Pure Appl. Algebra, 215 (2010), 13-34], and matrix morsifications A ∈ Mor<sub>Δ</sub>, for simply laced Dynkin diagrams Δ ∈ {A<sub>n</sub>, D<sub>n</sub>, E<sub>6</sub>, E<sub>7</sub>, E<sub>8</sub>}. Here we report on algorithmic and morsification technique for the Coxeter spectral analysis of connected loop-free edge-bipartite graphs Δ with n ≥ 2 vertices by means of the Coxeter matrix Cox<sub>Δ</sub> ∈ M<sub>n</sub>(Z), the Coxeter spectrum specc<sub>Δ</sub>, and an inflation algorithm associating to any connected loop-free positive bigraph Δ a simply laced Dynkin diagram DΔ, and defining a Z-congruence of the symmetric Gram matrices G<sub>Δ</sub> and G<sub>DΔ</sub>. We also present a computer aided technique that allows us to construct a Z-congruence of the non-symmetric Gram matrices Ğ<sub>Δ</sub> and Ğ<sub>Δ'</sub>, if the Coxeter spectra specc<sub>Δ</sub> and specc<sub>Δ'</sub> coincide. A complete Coxeter spectral classification of positive edge-bipartite graphs Δ of Coxeter-Dynkin types DΔ ∈ {A<sub>n</sub>, D<sub>n</sub>, E<sub>6</sub>, E<sub>7</sub>}, with n ≤ 7, is obtained by a reduction to computer calculation of Gl(n, Z)<sub>DΔ</sub>-orbits in the set Mor<sub>DΔ</sub>, where Gl(n, Z)<sub>DΔ</sub> is the isotropy group of the Dynkin diagram DΔ.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"40 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126177489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Bounded Bi-ideals and Linear Recurrence 有界双理想与线性递归
I. Berzina, J. Buls, Raivis Bēts
Bounded bi-ideals are a subclass of uniformly recurrent words. We introduce the notion of completely bounded bi-ideals by imposing a restriction on their generating base sequences. We prove that a bounded bi-ideal is linearly recurrent if and only if it is completely bounded.
有界双理想是一致循环词的一个子类。通过对完全有界双理想的生成基序列施加限制,引入了它们的概念。证明有界双理想是线性循环的当且仅当它是完全有界的。
{"title":"Bounded Bi-ideals and Linear Recurrence","authors":"I. Berzina, J. Buls, Raivis Bēts","doi":"10.1109/SYNASC.2013.57","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.57","url":null,"abstract":"Bounded bi-ideals are a subclass of uniformly recurrent words. We introduce the notion of completely bounded bi-ideals by imposing a restriction on their generating base sequences. We prove that a bounded bi-ideal is linearly recurrent if and only if it is completely bounded.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Token Free Bounded Delay Codes and Hash Iteration 无令牌有界延迟码与哈希迭代
Sebastian Codrin Ditu
A hash iteration technique takes as input a hash compression function which works on fixed length binary strings and outputs a hash function which works on arbitrary length binary strings. In this paper we introduce token-free bounded delay codes and then use them to define a hash iteration technique. The newly created schema, when applied to a hash compression function, preserves the following security properties: preimage resistance (Pre), always preimage-resistance (aPre), everywhere preimage-resistance (ePre) and collision-resistance (Coll). The proofs for the preservation of the second-preimage resistance (Sec), always second-preimage resistance (aSec), and everywhere second-preimage resistance (eSec) are part of our future work. Comparisons with other iteration techniques are also provided.
哈希迭代技术将哈希压缩函数作为输入,该哈希压缩函数用于固定长度的二进制字符串,并输出一个哈希函数用于任意长度的二进制字符串。在本文中,我们引入了无令牌有界延迟码,然后使用它们来定义哈希迭代技术。当将新创建的模式应用于哈希压缩函数时,它保留以下安全属性:抗预映像(Pre)、始终抗预映像(aPre)、处处抗预映像(ePre)和抗碰撞(Coll)。第二预像电阻(Sec)、总是第二预像电阻(aSec)和处处第二预像电阻(eSec)的保存证明是我们未来工作的一部分。还提供了与其他迭代技术的比较。
{"title":"Token Free Bounded Delay Codes and Hash Iteration","authors":"Sebastian Codrin Ditu","doi":"10.1109/SYNASC.2013.58","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.58","url":null,"abstract":"A hash iteration technique takes as input a hash compression function which works on fixed length binary strings and outputs a hash function which works on arbitrary length binary strings. In this paper we introduce token-free bounded delay codes and then use them to define a hash iteration technique. The newly created schema, when applied to a hash compression function, preserves the following security properties: preimage resistance (Pre), always preimage-resistance (aPre), everywhere preimage-resistance (ePre) and collision-resistance (Coll). The proofs for the preservation of the second-preimage resistance (Sec), always second-preimage resistance (aSec), and everywhere second-preimage resistance (eSec) are part of our future work. Comparisons with other iteration techniques are also provided.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130366643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Covering Arrays 覆盖阵测量
J. Torres-Jiménez, Idelfonso Izquierdo
Covering Arrays(CA) are combinatorial objects that have been used succesfully to automate the generation of test cases for software testing. The CAs have the features of being of minimal cardinality (i.e. minimize the number of test cases), and maximum coverage (i.e. they guarantee to cover all combinations of certain size between the input parameters). Only in few cases there is known an optimal solution to construct CAs, but in general the problem of constructing optimal CAs is a hard combinatorial optimization problem. For this reason, a number of methods to solve the construction of covering arrays have been developed. This paper gives a survey of the state of the art of the methods to construct covering arrays. The methods analyzed were grouped in four categories: exact methods (Section II), greedy methods (Section III), metaheuristic methods (Section IV), and algebraic methods (Section V). The paper ends with a summary of the methods analyzed.
覆盖数组(CA)是组合对象,已经成功地用于自动生成软件测试的测试用例。ca具有最小基数(即最小化测试用例的数量)和最大覆盖率(即它们保证覆盖输入参数之间一定大小的所有组合)的特征。只有在少数情况下,才有已知的最优解来构造ca,但一般来说,构造最优ca的问题是一个困难的组合优化问题。为此,人们开发了许多解决覆盖阵列构造问题的方法。本文综述了构造覆盖阵列方法的研究现状。所分析的方法分为四类:精确方法(第II节)、贪婪方法(第III节)、元启发式方法(第IV节)和代数方法(第V节)。论文最后对所分析的方法进行了总结。
{"title":"Survey of Covering Arrays","authors":"J. Torres-Jiménez, Idelfonso Izquierdo","doi":"10.1109/SYNASC.2013.10","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.10","url":null,"abstract":"Covering Arrays(CA) are combinatorial objects that have been used succesfully to automate the generation of test cases for software testing. The CAs have the features of being of minimal cardinality (i.e. minimize the number of test cases), and maximum coverage (i.e. they guarantee to cover all combinations of certain size between the input parameters). Only in few cases there is known an optimal solution to construct CAs, but in general the problem of constructing optimal CAs is a hard combinatorial optimization problem. For this reason, a number of methods to solve the construction of covering arrays have been developed. This paper gives a survey of the state of the art of the methods to construct covering arrays. The methods analyzed were grouped in four categories: exact methods (Section II), greedy methods (Section III), metaheuristic methods (Section IV), and algebraic methods (Section V). The paper ends with a summary of the methods analyzed.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
MPI-Based Asynchronous Simulation of Spiking Neural Networks on the Grid 网格上基于mpi的脉冲神经网络异步仿真
M. Joldos, Octavian Vinteler, R. Peter, I. Muntean
Brain microcircuits exhibit an almost chaotic behavior. This is of high interest in developing new computational models or designing high capacity storage systems. Therefore, the simulation of such microcircuits must preserve the brain dynamic behavior. But investigating the dynamics analysis of such systems is a complex computational task due to the large number of neurons and synapses in the network, the large number of simulation scenarios that need to be computed, and to their model representation. To address the first challenge, we propose in this paper an MPI-based parallelization scheme of the asynchronous spiking neural network simulation algorithm. Due to the partitioning method, we can compute scenarios with more than 50.000 neurons and 300 millions synapses. The proposed solution has been evaluated on production HPC systems, employing up to 512 parallel processes. We contribute to the second challenge by extending the fACIBiNET framework with client-side capabilities for the Globus Online service. As such, scenarios with both high-throughput and high-performance computing requirements are managed in an efficient manner from within the framework, using grid technologies.
大脑微电路表现出一种近乎混沌的行为。这对于开发新的计算模型或设计高容量存储系统非常重要。因此,这种微电路的模拟必须保持大脑的动态行为。但是,由于网络中有大量的神经元和突触,需要计算大量的模拟场景,以及它们的模型表示,研究此类系统的动态分析是一项复杂的计算任务。为了解决第一个挑战,本文提出了一种基于mpi的异步尖峰神经网络仿真算法并行化方案。由于分区方法,我们可以计算超过50,000个神经元和3亿个突触的场景。所提出的解决方案已在采用多达512个并行进程的生产HPC系统上进行了评估。我们通过为Globus Online服务扩展带有客户端功能的fACIBiNET框架来应对第二个挑战。因此,具有高吞吐量和高性能计算需求的场景在框架内使用网格技术以一种有效的方式进行管理。
{"title":"MPI-Based Asynchronous Simulation of Spiking Neural Networks on the Grid","authors":"M. Joldos, Octavian Vinteler, R. Peter, I. Muntean","doi":"10.1109/SYNASC.2013.69","DOIUrl":"https://doi.org/10.1109/SYNASC.2013.69","url":null,"abstract":"Brain microcircuits exhibit an almost chaotic behavior. This is of high interest in developing new computational models or designing high capacity storage systems. Therefore, the simulation of such microcircuits must preserve the brain dynamic behavior. But investigating the dynamics analysis of such systems is a complex computational task due to the large number of neurons and synapses in the network, the large number of simulation scenarios that need to be computed, and to their model representation. To address the first challenge, we propose in this paper an MPI-based parallelization scheme of the asynchronous spiking neural network simulation algorithm. Due to the partitioning method, we can compute scenarios with more than 50.000 neurons and 300 millions synapses. The proposed solution has been evaluated on production HPC systems, employing up to 512 parallel processes. We contribute to the second challenge by extending the fACIBiNET framework with client-side capabilities for the Globus Online service. As such, scenarios with both high-throughput and high-performance computing requirements are managed in an efficient manner from within the framework, using grid technologies.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131606049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1