首页 > 最新文献

2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
Assessing and Improving the Quality of Generated Tests in the Context of Maintenance Tasks 在维护任务的背景下评估和改进生成测试的质量
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00072
Wesley B. R. Herculano, Everton L. G. Alves, Melina Mongiovi
Maintenance tasks often rely on failing test cases, highlighting the importance of well-designed tests for their success. While automatically generated tests can provide higher code coverage and detect faults, it is unclear whether they can be effective in guiding maintenance tasks or if developers fully accept them. In our recent work, we presented the results of a series of empirical studies that evaluated the practical support of generated tests. Our studies with 126 developers showed that automatically generated tests can effectively identify faults during maintenance tasks. Developers were equally effective in creating bug fixes when using manually-written, Evosuite, and Randoop tests. However, developers perceived generated tests as not well-designed and preferred refactored versions of Randoop tests. We plan to enhance Evosuite tests and propose an approach/tool that assesses the quality of generated tests and automatically enhances them. Our research may impact the design and use of generated tests in the context of maintenance tasks.
维护任务通常依赖于失败的测试用例,这突出了设计良好的测试对其成功的重要性。虽然自动生成的测试可以提供更高的代码覆盖率并检测错误,但它们在指导维护任务方面是否有效,或者开发人员是否完全接受它们,还不清楚。在我们最近的工作中,我们提出了一系列实证研究的结果,这些研究评估了生成测试的实际支持。我们对126名开发人员的研究表明,自动生成的测试可以有效地识别维护任务期间的错误。当使用手工编写、Evosuite和Randoop测试时,开发人员在创建bug修复方面同样有效。然而,开发人员认为生成的测试设计得不是很好,他们更喜欢重构版本的Randoop测试。我们计划增强Evosuite测试,并提出一种方法/工具来评估生成的测试的质量并自动增强它们。我们的研究可能会影响在维护任务上下文中生成测试的设计和使用。
{"title":"Assessing and Improving the Quality of Generated Tests in the Context of Maintenance Tasks","authors":"Wesley B. R. Herculano, Everton L. G. Alves, Melina Mongiovi","doi":"10.1109/COMPSAC57700.2023.00072","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00072","url":null,"abstract":"Maintenance tasks often rely on failing test cases, highlighting the importance of well-designed tests for their success. While automatically generated tests can provide higher code coverage and detect faults, it is unclear whether they can be effective in guiding maintenance tasks or if developers fully accept them. In our recent work, we presented the results of a series of empirical studies that evaluated the practical support of generated tests. Our studies with 126 developers showed that automatically generated tests can effectively identify faults during maintenance tasks. Developers were equally effective in creating bug fixes when using manually-written, Evosuite, and Randoop tests. However, developers perceived generated tests as not well-designed and preferred refactored versions of Randoop tests. We plan to enhance Evosuite tests and propose an approach/tool that assesses the quality of generated tests and automatically enhances them. Our research may impact the design and use of generated tests in the context of maintenance tasks.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121709928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Behavioral Health Cases from Sensitive Police Officer Narratives 从敏感警官叙述中发现行为健康案例
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00213
Martin Brown, Md Abdullah Khan, Dominic Thomas, Yong Pei, M. Nandan
Early detection of and intervention in behavioral health cases, including mental health, is crucial to prevent harm to one’s self and others. Police reports generated by officers on duty or in response to 911 calls remain an untapped resource for identifying such incidents. To expedite the detection process, we propose a workflow that involves collaboration between experts to manually annotate cases and correct model predictions. This approach can improve both initial annotation and model performance. Therefore, we advocate for the incorporation of manual annotations from experts, natural language processing (NLP), active learning, and advanced machine learning techniques to detect behavioral health cases within police reports. The experimentation suggests that a CNN-LSTM model achieves the best performance with an accuracy of 86.67% and an F1-score of 0.82 in detecting behavioral health issues.
早期发现和干预行为健康案例,包括心理健康,对于防止伤害自己和他人至关重要。执勤人员或911报警电话生成的警察报告仍然是识别此类事件的未开发资源。为了加快检测过程,我们提出了一个工作流程,该工作流程涉及专家之间的协作,以手动注释案例并纠正模型预测。这种方法可以提高初始注释和模型性能。因此,我们提倡结合专家的手动注释、自然语言处理(NLP)、主动学习和先进的机器学习技术来检测警察报告中的行为健康案例。实验表明,CNN-LSTM模型对行为健康问题的检测准确率为86.67%,f1得分为0.82。
{"title":"Detection of Behavioral Health Cases from Sensitive Police Officer Narratives","authors":"Martin Brown, Md Abdullah Khan, Dominic Thomas, Yong Pei, M. Nandan","doi":"10.1109/COMPSAC57700.2023.00213","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00213","url":null,"abstract":"Early detection of and intervention in behavioral health cases, including mental health, is crucial to prevent harm to one’s self and others. Police reports generated by officers on duty or in response to 911 calls remain an untapped resource for identifying such incidents. To expedite the detection process, we propose a workflow that involves collaboration between experts to manually annotate cases and correct model predictions. This approach can improve both initial annotation and model performance. Therefore, we advocate for the incorporation of manual annotations from experts, natural language processing (NLP), active learning, and advanced machine learning techniques to detect behavioral health cases within police reports. The experimentation suggests that a CNN-LSTM model achieves the best performance with an accuracy of 86.67% and an F1-score of 0.82 in detecting behavioral health issues.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-Time Text Analysis System 实时文本分析系统
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00053
Chi Mai Nguyen, Phat Thai, Duy Khang Lam, Van Tuan Nguyen
We live in an age of information overload. Manual information processing is increasingly overwhelmed with the enormous amount of information created by the explosive growth of news portals and online social networks. Such a situation calls for an automatic system that can support the process of handling, analyzing, and filtering information, especially information from online sources. In this work, we proposed a text analysis system that automatically collects, extracts, and analyses information from public-source-text documents such as news portals and social media networks. The proposed system can handle both long and short-text documents. It also has real-time features and is not restricted by any input data domain. The system can be used in different domains, such as scientific research, marketing, and security-related domains. Moreover, the system is engineered in modules and is flexible. Each module is an independent micro-service that can be used as a separate standalone application. The system is also extensible since new modules can be added easily. Index Terms—text analysis system, data mining, natural language processing
我们生活在一个信息过载的时代。由于新闻门户网站和在线社交网络的爆炸式增长所产生的海量信息,人工信息处理越来越不堪重负。这种情况需要能够支持处理、分析和过滤信息过程的自动系统,特别是来自在线资源的信息。在这项工作中,我们提出了一个文本分析系统,该系统可以自动收集、提取和分析来自新闻门户和社交媒体网络等公共源文本文档的信息。所提出的系统可以处理长文本和短文本文档。它还具有实时性,不受任何输入数据域的限制。该系统可用于不同的领域,如科研、营销、安全等领域。此外,该系统采用模块化设计,具有一定的灵活性。每个模块都是一个独立的微服务,可以作为一个独立的应用程序使用。该系统还具有可扩展性,因为可以轻松添加新模块。索引术语-文本分析系统,数据挖掘,自然语言处理
{"title":"A Real-Time Text Analysis System","authors":"Chi Mai Nguyen, Phat Thai, Duy Khang Lam, Van Tuan Nguyen","doi":"10.1109/COMPSAC57700.2023.00053","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00053","url":null,"abstract":"We live in an age of information overload. Manual information processing is increasingly overwhelmed with the enormous amount of information created by the explosive growth of news portals and online social networks. Such a situation calls for an automatic system that can support the process of handling, analyzing, and filtering information, especially information from online sources. In this work, we proposed a text analysis system that automatically collects, extracts, and analyses information from public-source-text documents such as news portals and social media networks. The proposed system can handle both long and short-text documents. It also has real-time features and is not restricted by any input data domain. The system can be used in different domains, such as scientific research, marketing, and security-related domains. Moreover, the system is engineered in modules and is flexible. Each module is an independent micro-service that can be used as a separate standalone application. The system is also extensible since new modules can be added easily. Index Terms—text analysis system, data mining, natural language processing","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Risk and Attacks in AI: A Survey of Security and Privacy 人工智能中的安全风险和攻击:安全和隐私调查
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00284
Md Mostafizur Rahman, Aiasha Siddika Arshi, Md. Golam Moula Mehedi Hasan, Sumayia Farzana Mishu, H. Shahriar, Fan Wu
This survey paper provides an overview of the current state of AI attacks and risks for AI security and privacy as artificial intelligence becomes more prevalent in various applications and services. The risks associated with AI attacks and security breaches are becoming increasingly apparent and cause many financial and social losses. This paper will categorize the different types of attacks on AI models, including adversarial attacks, model inversion attacks, poisoning attacks, data poisoning attacks, data extraction attacks, and membership inference attacks. The paper also emphasizes the importance of developing secure and robust AI models to ensure the privacy and security of sensitive data. Through a systematic literature review, this survey paper comprehensively analyzes the current state of AI attacks and risks for AI security and privacy and detection techniques.
随着人工智能在各种应用和服务中变得越来越普遍,本调查报告概述了人工智能攻击的现状以及人工智能安全和隐私的风险。与人工智能攻击和安全漏洞相关的风险正变得越来越明显,并造成许多经济和社会损失。本文将对针对AI模型的不同类型的攻击进行分类,包括对抗性攻击、模型反转攻击、中毒攻击、数据中毒攻击、数据提取攻击和成员推理攻击。本文还强调了开发安全可靠的人工智能模型以确保敏感数据的隐私和安全的重要性。本调查论文通过系统的文献综述,全面分析了人工智能攻击的现状以及人工智能安全和隐私以及检测技术的风险。
{"title":"Security Risk and Attacks in AI: A Survey of Security and Privacy","authors":"Md Mostafizur Rahman, Aiasha Siddika Arshi, Md. Golam Moula Mehedi Hasan, Sumayia Farzana Mishu, H. Shahriar, Fan Wu","doi":"10.1109/COMPSAC57700.2023.00284","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00284","url":null,"abstract":"This survey paper provides an overview of the current state of AI attacks and risks for AI security and privacy as artificial intelligence becomes more prevalent in various applications and services. The risks associated with AI attacks and security breaches are becoming increasingly apparent and cause many financial and social losses. This paper will categorize the different types of attacks on AI models, including adversarial attacks, model inversion attacks, poisoning attacks, data poisoning attacks, data extraction attacks, and membership inference attacks. The paper also emphasizes the importance of developing secure and robust AI models to ensure the privacy and security of sensitive data. Through a systematic literature review, this survey paper comprehensively analyzes the current state of AI attacks and risks for AI security and privacy and detection techniques.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resilient Portfolio Optimization using Traditional and Data-Driven Models for Cryptocurrencies and Stocks 使用传统和数据驱动模型对加密货币和股票进行弹性投资组合优化
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00204
Joylal Das, Sulalitha Bowala, R. Thulasiram, A. Thavaneswaran
Constructing resilient portfolios is of crucial and utmost importance to investment management. This study compares traditional and data-driven models for building resilient portfolios and analyzes their performance for stocks (S&P 500) and highly volatile cryptocurrency markets. The study investigates the performance of traditional models, such as mean-variance and constrained optimization, and a recently proposed data-driven resilient portfolio optimization model for stocks. Moreover, the study analyzes these methods with evolving S&P CME bitcoin futures index and the Crypto20 index. These analyses highlight the need for further investigation into traditional and data-driven approaches for resilient portfolio optimization, including higher-order moments, particularly under varying market conditions. This study provides valuable insights for investors and portfolio managers aiming to build resilient portfolios that could be used in different market environments.
构建弹性投资组合对投资管理至关重要。本研究比较了构建弹性投资组合的传统模型和数据驱动模型,并分析了它们在股票(标准普尔500指数)和高度波动的加密货币市场中的表现。本研究考察了均值方差和约束优化等传统模型的性能,以及最近提出的数据驱动的股票弹性投资组合优化模型。此外,该研究还用标准普尔CME比特币期货指数和Crypto20指数来分析这些方法。这些分析表明,需要进一步研究传统的和数据驱动的弹性投资组合优化方法,包括高阶矩,特别是在不同的市场条件下。本研究为投资者和投资组合经理提供了宝贵的见解,旨在建立可在不同市场环境中使用的弹性投资组合。
{"title":"Resilient Portfolio Optimization using Traditional and Data-Driven Models for Cryptocurrencies and Stocks","authors":"Joylal Das, Sulalitha Bowala, R. Thulasiram, A. Thavaneswaran","doi":"10.1109/COMPSAC57700.2023.00204","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00204","url":null,"abstract":"Constructing resilient portfolios is of crucial and utmost importance to investment management. This study compares traditional and data-driven models for building resilient portfolios and analyzes their performance for stocks (S&P 500) and highly volatile cryptocurrency markets. The study investigates the performance of traditional models, such as mean-variance and constrained optimization, and a recently proposed data-driven resilient portfolio optimization model for stocks. Moreover, the study analyzes these methods with evolving S&P CME bitcoin futures index and the Crypto20 index. These analyses highlight the need for further investigation into traditional and data-driven approaches for resilient portfolio optimization, including higher-order moments, particularly under varying market conditions. This study provides valuable insights for investors and portfolio managers aiming to build resilient portfolios that could be used in different market environments.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program Balancing in Compilation for Buffered Hybrid Dataflow Processors 缓冲混合数据流处理器编译中的程序平衡
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00018
Anoop Bhagyanath, K. Schneider
In traditional von Neumann processors, the central register file is an inherent limiting factor in exploiting the instruction-level parallelism (ILP) of programs. To alleviate this problem, many processors follow a hybrid von Neumann/dataflow computing model in which specific instruction sequences are executed in dataflow order by communicating intermediate values directly from producer processing units (PUs) to consumer PUs without using a central register file. However, the intermediate values often reside in local registers of the PUs, which requires a synchronization of the data transports that still limits the exploitation of the ILP.To avoid the use of a central register file and the need for any synchronization between PUs, some newer architectures suggest first-in-first-out (FIFO) buffers instead of local registers at the input and output ports of the PUs. Since values are produced and consumed, and are thus never overwritten (as in registers), the compiler must determine the required number of copies of each value. Furthermore, it is necessary to control the number of copies of values to develop buffer size aware compilation methods. However, the number of variable uses in a sequential program may depend on the future execution. This paper presents transformations for ‘balancing’ a given program, i.e., transforming the program so that for all points in the program, the number of future uses of all variables can be accurately determined in order to allocate the required buffer sizes in the later compilation phases. The classical space-time trade-off is demonstrated by the experimental results which show an improvement of the processor performance with increasing buffer sizes and vice versa. More importantly, the experimental results demonstrate the potential of buffered hybrid dataflow architectures for a scalable use of ILP.
在传统的冯·诺依曼处理器中,中央寄存器文件是限制程序实现指令级并行性(ILP)的固有因素。为了缓解这个问题,许多处理器遵循冯·诺伊曼/数据流混合计算模型,在该模型中,特定指令序列按照数据流顺序执行,通过直接从生产者处理单元(pu)传递中间值到消费者处理器,而不使用中央寄存器文件。然而,中间值通常驻留在pu的本地寄存器中,这需要数据传输的同步,这仍然限制了ILP的利用。为了避免使用中央寄存器文件和需要在pu之间进行任何同步,一些较新的体系结构建议在pu的输入和输出端口使用先进先出(FIFO)缓冲区而不是本地寄存器。由于值是产生和消耗的,因此永远不会被覆盖(如在寄存器中),编译器必须确定每个值所需的副本数量。此外,有必要控制值的副本数量,以开发缓冲区大小感知的编译方法。然而,顺序程序中变量的使用数量可能取决于以后的执行。本文介绍了“平衡”给定程序的转换,即转换程序,以便对于程序中的所有点,所有变量的未来使用次数可以准确地确定,以便在稍后的编译阶段分配所需的缓冲区大小。实验结果证明了经典的时空权衡,表明处理器性能随着缓冲区大小的增加而提高,反之亦然。更重要的是,实验结果证明了缓冲混合数据流架构在可扩展使用ILP方面的潜力。
{"title":"Program Balancing in Compilation for Buffered Hybrid Dataflow Processors","authors":"Anoop Bhagyanath, K. Schneider","doi":"10.1109/COMPSAC57700.2023.00018","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00018","url":null,"abstract":"In traditional von Neumann processors, the central register file is an inherent limiting factor in exploiting the instruction-level parallelism (ILP) of programs. To alleviate this problem, many processors follow a hybrid von Neumann/dataflow computing model in which specific instruction sequences are executed in dataflow order by communicating intermediate values directly from producer processing units (PUs) to consumer PUs without using a central register file. However, the intermediate values often reside in local registers of the PUs, which requires a synchronization of the data transports that still limits the exploitation of the ILP.To avoid the use of a central register file and the need for any synchronization between PUs, some newer architectures suggest first-in-first-out (FIFO) buffers instead of local registers at the input and output ports of the PUs. Since values are produced and consumed, and are thus never overwritten (as in registers), the compiler must determine the required number of copies of each value. Furthermore, it is necessary to control the number of copies of values to develop buffer size aware compilation methods. However, the number of variable uses in a sequential program may depend on the future execution. This paper presents transformations for ‘balancing’ a given program, i.e., transforming the program so that for all points in the program, the number of future uses of all variables can be accurately determined in order to allocate the required buffer sizes in the later compilation phases. The classical space-time trade-off is demonstrated by the experimental results which show an improvement of the processor performance with increasing buffer sizes and vice versa. More importantly, the experimental results demonstrate the potential of buffered hybrid dataflow architectures for a scalable use of ILP.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain-Oriented Software Testing: A Preliminary Literature Review 面向区块链的软件测试:初步文献综述
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00134
S. Reddivari, James K. Orr, Reyansh Reddy
Blockchain-oriented software (BOS) is emerging rapidly, however, tailored software engineering techniques to assist software testing is one of the important and necessary phases of software development that plays a vital role in software quality assurance. Blockchain-oriented software testing (BOST) is another area that is still emerging. This paper conducts a preliminary literature review to assess the type of research published, where this research can be found, and the main themes of existing research in BOST. This study also introduces a framework for conducting an empirical study on BOS available on GitHub and proposes future work to expand the knowledge in this domain.
面向区块链的软件(BOS)正在迅速兴起,然而,辅助软件测试的定制软件工程技术是软件开发的重要和必要阶段之一,在软件质量保证中起着至关重要的作用。面向区块链的软件测试(BOST)是另一个仍在兴起的领域。本文进行了初步的文献综述,以评估发表的研究类型,本研究可以在哪里找到,以及现有研究的主题在BOST。本研究还介绍了对GitHub上可用的BOS进行实证研究的框架,并提出了未来的工作,以扩大这一领域的知识。
{"title":"Blockchain-Oriented Software Testing: A Preliminary Literature Review","authors":"S. Reddivari, James K. Orr, Reyansh Reddy","doi":"10.1109/COMPSAC57700.2023.00134","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00134","url":null,"abstract":"Blockchain-oriented software (BOS) is emerging rapidly, however, tailored software engineering techniques to assist software testing is one of the important and necessary phases of software development that plays a vital role in software quality assurance. Blockchain-oriented software testing (BOST) is another area that is still emerging. This paper conducts a preliminary literature review to assess the type of research published, where this research can be found, and the main themes of existing research in BOST. This study also introduces a framework for conducting an empirical study on BOS available on GitHub and proposes future work to expand the knowledge in this domain.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"115 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Expected Reactive algorithm for Heterogeneous Patrolling Systems based on Target Uncertainty 基于目标不确定性的异构巡逻系统自适应期望反应算法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00017
Niccolò De Bona, L. Santoro, D. Brunelli, D. Fontanelli
Multi-robot patrolling for dynamic coverage in flat environments is proposed, through a systematic simulative analysis between the Greedy Bayesian Strategy and the Expected Reactive algorithm based on the expected idleness. The two approaches are compared against unreliable communications, communication and sensing range, and number of conflicts. In addition, we introduce a new weighting-term for the regions close to a quantity of interest detected by robots, decreasing the passing-time for those regions. Combining the proposed control strategy and a traditional distributed and recursive Weighted Least Square estimation algorithm, the swarm is capable to compute the quantity of interest position with a desired target uncertainty. Extensive simulations and comparisons are reported.
通过对贪婪贝叶斯策略和基于期望空闲的期望反应算法的系统仿真分析,提出了平面环境下的多机器人动态覆盖巡逻。从不可靠通信、通信与传感距离、冲突数量等方面对两种方法进行了比较。此外,我们为机器人检测到的感兴趣量附近的区域引入了一个新的加权项,减少了这些区域的通过时间。将所提出的控制策略与传统的分布式递归加权最小二乘估计算法相结合,该算法能够计算出具有期望目标不确定性的感兴趣位置的数量。广泛的模拟和比较报告。
{"title":"Adaptive Expected Reactive algorithm for Heterogeneous Patrolling Systems based on Target Uncertainty","authors":"Niccolò De Bona, L. Santoro, D. Brunelli, D. Fontanelli","doi":"10.1109/COMPSAC57700.2023.00017","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00017","url":null,"abstract":"Multi-robot patrolling for dynamic coverage in flat environments is proposed, through a systematic simulative analysis between the Greedy Bayesian Strategy and the Expected Reactive algorithm based on the expected idleness. The two approaches are compared against unreliable communications, communication and sensing range, and number of conflicts. In addition, we introduce a new weighting-term for the regions close to a quantity of interest detected by robots, decreasing the passing-time for those regions. Combining the proposed control strategy and a traditional distributed and recursive Weighted Least Square estimation algorithm, the swarm is capable to compute the quantity of interest position with a desired target uncertainty. Extensive simulations and comparisons are reported.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems 物联网系统基于命名实体的免http认证和授权架构
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00139
Yong Jin, M. Tomoishi
Authentication and authorization are essential functionalities in Internet of Things (IoT) systems in the areas of device monitoring, access control, data sharing, and privacy preservation. The current authentication and authorization technologies are mainly based on ID/Password (credential), public key cryptography collaborating with multi-factor approaches, and manual basis static access control for data resources. However, they have disadvantages in terms of identity/credential management, privacy preservation, and the mandatory requirement of Trusted Third Party (TTP) Certificate Authorities (which are not cryptographically secure) for certificate verifications. The objective of this fast abstract is to present a novel idea for named-entity-based TTP-free authentication and authorization architecture in IoT systems. The proposed architecture is based on the collaboration of blockchain technology and DNS-based Authentication of Named Entity (DANE) protocol to provide secure and privacy-preserved authentication and authorization functionalities with considering effective device identity management and secure data access control in IoT systems.
身份验证和授权是物联网(IoT)系统在设备监控、访问控制、数据共享和隐私保护领域的基本功能。目前的认证授权技术主要是基于ID/Password(凭证)、公钥加密协同多因素方法、基于手工的数据资源静态访问控制等。然而,它们在身份/凭证管理、隐私保护和可信第三方(TTP)证书颁发机构(不加密安全)的证书验证的强制要求方面存在缺点。这个快速抽象的目的是为物联网系统中基于命名实体的无http身份验证和授权架构提出一个新的想法。提出的架构基于区块链技术和基于dns的命名实体认证(DANE)协议的协作,在考虑物联网系统中有效的设备身份管理和安全数据访问控制的情况下,提供安全和隐私保护的认证和授权功能。
{"title":"A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems","authors":"Yong Jin, M. Tomoishi","doi":"10.1109/COMPSAC57700.2023.00139","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00139","url":null,"abstract":"Authentication and authorization are essential functionalities in Internet of Things (IoT) systems in the areas of device monitoring, access control, data sharing, and privacy preservation. The current authentication and authorization technologies are mainly based on ID/Password (credential), public key cryptography collaborating with multi-factor approaches, and manual basis static access control for data resources. However, they have disadvantages in terms of identity/credential management, privacy preservation, and the mandatory requirement of Trusted Third Party (TTP) Certificate Authorities (which are not cryptographically secure) for certificate verifications. The objective of this fast abstract is to present a novel idea for named-entity-based TTP-free authentication and authorization architecture in IoT systems. The proposed architecture is based on the collaboration of blockchain technology and DNS-based Authentication of Named Entity (DANE) protocol to provide secure and privacy-preserved authentication and authorization functionalities with considering effective device identity management and secure data access control in IoT systems.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GX-HUI: Global Explanations of AI Models based on High-Utility Itemsets GX-HUI:基于高效用项集的AI模型的全局解释
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00045
D.P.H. Napolitano, Luca Cagliero
Shapley Values are established concepts used to explain local and global contribution of individual features to the prediction of AI models. Currently, global Shapley-based explainers do not consider the co-occurrences of feature-value pairs in the analyzed data. This paper proposes a novel approach to leverage the High-Utility Itemset Mining framework to jointly consider Shapley-based feature-level contributions and feature-value pair co-occurrences. The results achieved on benchmark datasets show that the extracted patterns provide actionable knowledge, complementary to those of global Shapley Values.
Shapley值是用于解释单个特征对人工智能模型预测的局部和全局贡献的既定概念。目前,基于shapley的全局解释器没有考虑被分析数据中特征值对的共现。本文提出了一种利用高效用项集挖掘框架来联合考虑基于shapley的特征级贡献和特征值对共现的新方法。在基准数据集上取得的结果表明,提取的模式提供了可操作的知识,补充了全局Shapley值。
{"title":"GX-HUI: Global Explanations of AI Models based on High-Utility Itemsets","authors":"D.P.H. Napolitano, Luca Cagliero","doi":"10.1109/COMPSAC57700.2023.00045","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00045","url":null,"abstract":"Shapley Values are established concepts used to explain local and global contribution of individual features to the prediction of AI models. Currently, global Shapley-based explainers do not consider the co-occurrences of feature-value pairs in the analyzed data. This paper proposes a novel approach to leverage the High-Utility Itemset Mining framework to jointly consider Shapley-based feature-level contributions and feature-value pair co-occurrences. The results achieved on benchmark datasets show that the extracted patterns provide actionable knowledge, complementary to those of global Shapley Values.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1