首页 > 最新文献

Proceedings of the 2023 ACM Southeast Conference最新文献

英文 中文
Conti Ransomware Development Evaluation Conti勒索软件开发评估
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587004
S. Alzahrani, Yang Xiao, S. Asiri
The world has been witnessing an increase in malware attacks in recent years. Specifically, ransomware attacks, where attackers lock or encrypt victims' files and ask for a ransom to unlock or decrypt the files and restore the device's state. Ransomware dark market has become very profitable, and its cybercriminals make millions of dollars in revenue. One of the most active ransomware attacks in recent years is Conti ransomware. It works under a ransomware-as-a-service (RaaS) business model. The first beta version of Conti ransomware was seen in October 2019, and its first known attack was reported in July 2020 and has been operational since then. In this paper, we track the development of Conti ransomware, categorize its samples, and compare their features to understand its success and efficiency, which made it top the charts in terms of revenue and the number of attacks. First, we collect many Conti ransomware samples from its beta version to the latest known release. Then we analyze them in an isolated environment and categorize them into seven versions based on their release date and feature similarities. Finally, for each version, we list its features and the previous version's addition, deletion, and/or modification with our reasoning for these changes. This research shows that although Conti started as a beta version with minimal ransomware features, it gradually added new features or modified existing ones through the adoption of continuous development and delivery. For example, API hashing, API run-time loading, and efficient encryption mechanism area are all features added over time and have yet to exist in their earlier releases.
近年来,世界目睹了恶意软件攻击的增加。特别是勒索软件攻击,攻击者锁定或加密受害者的文件,并要求赎金解锁或解密文件并恢复设备状态。勒索软件黑市已经变得非常有利可图,其网络罪犯赚取了数百万美元的收入。近年来最活跃的勒索软件攻击之一是Conti勒索软件。它在勒索软件即服务(RaaS)的商业模式下工作。康提勒索软件的第一个测试版是在2019年10月发现的,其第一次已知攻击是在2020年7月报道的,从那时起就一直在运行。在本文中,我们跟踪了Conti勒索软件的发展,对其样本进行了分类,并比较了它们的特征,以了解它的成功和效率,这使得它在收入和攻击次数方面名列前茅。首先,我们收集了许多康提勒索软件样本,从它的测试版到最新的已知版本。然后,我们在一个孤立的环境中对它们进行分析,并根据它们的发布日期和功能相似性将它们分为七个版本。最后,对于每个版本,我们列出了它的功能和前一个版本的添加、删除和/或修改,以及我们对这些更改的原因。这项研究表明,尽管Conti最初是一个测试版,具有最少的勒索软件功能,但它通过采用持续的开发和交付逐渐添加新功能或修改现有功能。例如,API散列、API运行时加载和高效加密机制领域都是随着时间的推移而添加的功能,在早期版本中尚未存在。
{"title":"Conti Ransomware Development Evaluation","authors":"S. Alzahrani, Yang Xiao, S. Asiri","doi":"10.1145/3564746.3587004","DOIUrl":"https://doi.org/10.1145/3564746.3587004","url":null,"abstract":"The world has been witnessing an increase in malware attacks in recent years. Specifically, ransomware attacks, where attackers lock or encrypt victims' files and ask for a ransom to unlock or decrypt the files and restore the device's state. Ransomware dark market has become very profitable, and its cybercriminals make millions of dollars in revenue. One of the most active ransomware attacks in recent years is Conti ransomware. It works under a ransomware-as-a-service (RaaS) business model. The first beta version of Conti ransomware was seen in October 2019, and its first known attack was reported in July 2020 and has been operational since then. In this paper, we track the development of Conti ransomware, categorize its samples, and compare their features to understand its success and efficiency, which made it top the charts in terms of revenue and the number of attacks. First, we collect many Conti ransomware samples from its beta version to the latest known release. Then we analyze them in an isolated environment and categorize them into seven versions based on their release date and feature similarities. Finally, for each version, we list its features and the previous version's addition, deletion, and/or modification with our reasoning for these changes. This research shows that although Conti started as a beta version with minimal ransomware features, it gradually added new features or modified existing ones through the adoption of continuous development and delivery. For example, API hashing, API run-time loading, and efficient encryption mechanism area are all features added over time and have yet to exist in their earlier releases.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115715950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Decentralized Anonymous E-Voting Scheme 安全和分散的匿名电子投票方案
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587107
Allan B. Pedin, N. Siasi
Secure electronic voting (e-voting) schemes are an imperative topic in today's society as we transition to an increasingly online world. Conventional e-voting processes are centralized that heavily rely on a central aggregator which can raise privacy concerns. Hence, this paper proposes a novel decentralized e-voting scheme that uses the BGW protocol, secure multi-party computation (MPC), and secret sharing as part of a distributed computation mechanism among all the voters to generate a fair and safe e-voting system. Additionally, the proposed scheme provides fully decentralized vote counting, ensures anonymity to further enhance the security of the protocol, and delivers the results of the vote to users. The security of the proposed e-voting scheme is evaluated using prominent security theorems, where the analysis shows that the scheme satisfies several security attributes of secure e-voting, and is more secure and reliable than conventional e-voting protocols.
随着我们过渡到一个日益网络化的世界,安全的电子投票(e-voting)计划在当今社会是一个迫切需要的话题。传统的电子投票过程是集中的,严重依赖于中央聚合器,这可能会引起隐私问题。因此,本文提出了一种新的去中心化电子投票方案,该方案将BGW协议、安全多方计算(MPC)和秘密共享作为所有选民之间分布式计算机制的一部分,以生成公平安全的电子投票系统。此外,该方案提供了完全去中心化的投票计数,保证了匿名性,进一步增强了协议的安全性,并将投票结果传递给用户。利用著名的安全定理对所提出的电子投票方案的安全性进行了评估,分析表明该方案满足安全电子投票的几个安全属性,比传统的电子投票协议更安全可靠。
{"title":"Secure and Decentralized Anonymous E-Voting Scheme","authors":"Allan B. Pedin, N. Siasi","doi":"10.1145/3564746.3587107","DOIUrl":"https://doi.org/10.1145/3564746.3587107","url":null,"abstract":"Secure electronic voting (e-voting) schemes are an imperative topic in today's society as we transition to an increasingly online world. Conventional e-voting processes are centralized that heavily rely on a central aggregator which can raise privacy concerns. Hence, this paper proposes a novel decentralized e-voting scheme that uses the BGW protocol, secure multi-party computation (MPC), and secret sharing as part of a distributed computation mechanism among all the voters to generate a fair and safe e-voting system. Additionally, the proposed scheme provides fully decentralized vote counting, ensures anonymity to further enhance the security of the protocol, and delivers the results of the vote to users. The security of the proposed e-voting scheme is evaluated using prominent security theorems, where the analysis shows that the scheme satisfies several security attributes of secure e-voting, and is more secure and reliable than conventional e-voting protocols.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"53 65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCNN-based Polyps Segmentation using Colonoscopy images 基于dcnn的结肠镜图像息肉分割
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587020
Ishita Paul, Divya Bhaskaracharya
Colorectal polyps, which are associated with colorectal cancer, can be detected using a colonoscopy. Using the data from colonoscopy images to segment polyps is crucial in medical practice because it provides critical data for identification and surgery. However, precise segmentation of polyps is difficult due to the following factors: the polyp-bordering mucosa boundary is not sharp, and polyps of the same type differ in texture, size, and color. We propose to use the DeepLabV3+ architecture for image segmentation for medical purposes by examining its segmentation results on colonoscopy images from the datasets Kvasir and CVC-ClinicDB. DeepLabV3+ generates an F1-score of 0.865 for CVC-ClinicDB on an NVIDIA A100 class Cloud-Based GPU. The model is divided into the following parts: an encoder that performs separable convolution on the input map and a decoder that up-samples the data provided by the encoder using transpose convolution. Our approach significantly enhances segmentation accuracy and offers a number of benefits with respect to generality and real-time segmentation efficiency, according to evaluations done quantitatively and qualitatively on the two datasets.
结直肠息肉与结直肠癌有关,可通过结肠镜检查发现。利用结肠镜图像的数据来分割息肉在医疗实践中是至关重要的,因为它为识别和手术提供了关键数据。然而,由于息肉与粘膜边界不清晰,同类型息肉在质地、大小、颜色等方面存在差异,很难对息肉进行精确分割。我们建议将DeepLabV3+架构用于医学目的的图像分割,通过检查其对来自Kvasir和CVC-ClinicDB数据集的结肠镜图像的分割结果。DeepLabV3+在NVIDIA A100级云计算GPU上对CVC-ClinicDB产生的f1得分为0.865。该模型分为以下部分:对输入映射执行可分离卷积的编码器和使用转置卷积对编码器提供的数据进行上采样的解码器。根据对两个数据集进行的定量和定性评估,我们的方法显着提高了分割精度,并在一般性和实时分割效率方面提供了许多好处。
{"title":"DCNN-based Polyps Segmentation using Colonoscopy images","authors":"Ishita Paul, Divya Bhaskaracharya","doi":"10.1145/3564746.3587020","DOIUrl":"https://doi.org/10.1145/3564746.3587020","url":null,"abstract":"Colorectal polyps, which are associated with colorectal cancer, can be detected using a colonoscopy. Using the data from colonoscopy images to segment polyps is crucial in medical practice because it provides critical data for identification and surgery. However, precise segmentation of polyps is difficult due to the following factors: the polyp-bordering mucosa boundary is not sharp, and polyps of the same type differ in texture, size, and color. We propose to use the DeepLabV3+ architecture for image segmentation for medical purposes by examining its segmentation results on colonoscopy images from the datasets Kvasir and CVC-ClinicDB. DeepLabV3+ generates an F1-score of 0.865 for CVC-ClinicDB on an NVIDIA A100 class Cloud-Based GPU. The model is divided into the following parts: an encoder that performs separable convolution on the input map and a decoder that up-samples the data provided by the encoder using transpose convolution. Our approach significantly enhances segmentation accuracy and offers a number of benefits with respect to generality and real-time segmentation efficiency, according to evaluations done quantitatively and qualitatively on the two datasets.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125585985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Long Short-Term Memory Networks and Temporal Convolutional Networks for Sentiment Analysis 情感分析中长短期记忆网络与时间卷积网络的比较
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587000
Samuel Hekman, Meghan Brock, Md Abdullah Al Hafiz Khan, Xinyue Zhang
The use of AI to detect human emotion is growing rapidly with the need for human-like customer service without constant human interaction, conducting market research, monitoring opinions on social media, and so on. One model that is often used for this sentiment detection is a recurrent neural network with long short-term memory. Another, newer model that can be used is a temporal convolutional network, but the differences between these two models are under-researched. The goal of this project is to apply these models and compare their performance when detecting sentiment. This will provide some guidance to programmers, allowing them to be more aware of the implications of implementing one model over the other. We find that overall, a temporal convolutional network outperforms the recurrent neural network with long short-term memory for sentiment analysis; our temporal convolutional network achieves 72% accuracy when detecting sentiment.
利用人工智能来检测人类情感的需求正在迅速增长,因为需要像人类一样的客户服务,而不需要持续的人工互动,进行市场调查,监控社交媒体上的意见等等。通常用于这种情绪检测的一个模型是具有长短期记忆的循环神经网络。另一种可以使用的较新的模型是时间卷积网络,但这两种模型之间的差异尚未得到充分研究。这个项目的目标是应用这些模型,并在检测情绪时比较它们的表现。这将为程序员提供一些指导,使他们能够更加了解实现一个模型而不是另一个模型的含义。我们发现,总的来说,时间卷积网络在情感分析方面优于具有长短期记忆的递归神经网络;我们的时间卷积网络在检测情绪时达到72%的准确率。
{"title":"Comparison of Long Short-Term Memory Networks and Temporal Convolutional Networks for Sentiment Analysis","authors":"Samuel Hekman, Meghan Brock, Md Abdullah Al Hafiz Khan, Xinyue Zhang","doi":"10.1145/3564746.3587000","DOIUrl":"https://doi.org/10.1145/3564746.3587000","url":null,"abstract":"The use of AI to detect human emotion is growing rapidly with the need for human-like customer service without constant human interaction, conducting market research, monitoring opinions on social media, and so on. One model that is often used for this sentiment detection is a recurrent neural network with long short-term memory. Another, newer model that can be used is a temporal convolutional network, but the differences between these two models are under-researched. The goal of this project is to apply these models and compare their performance when detecting sentiment. This will provide some guidance to programmers, allowing them to be more aware of the implications of implementing one model over the other. We find that overall, a temporal convolutional network outperforms the recurrent neural network with long short-term memory for sentiment analysis; our temporal convolutional network achieves 72% accuracy when detecting sentiment.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigating the Design of Just-in-Time Adaptive Interventions (JITAIs) Messages Targeting Eating Behaviors 针对饮食行为的即时适应性干预(JITAIs)信息的设计研究
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587028
Eric C Moses, Chris S. Crawford, E. Sazonov, M. McCrory, J. G. Thomas, J. Higgins
Obesity and being overweight is an ongoing issue and a pervasive concern in the United States. There are many programs available that try to assist with weight loss in a variety of forms which are sometimes reactive in their philosophies and methods. This paper discusses insights on the design of SMS messages that seek to provide users just-in-time feedback regarding energy intake (J1) and eating rate (J2). This was accomplished by surveying participants' responses to SMS messages via a study to ascertain whether they would comply with the direction provided via SMS to further their weight loss journey. Results from this study suggest that participants overall felt that the SMS messages designed to aid them in their weight loss journey are helpful and would result in compliance. Results also suggest that participants had higher levels of comprehension with numeric messages.
在美国,肥胖和超重是一个持续存在的问题,也是一个普遍关注的问题。有许多计划,试图以各种形式帮助减肥,有时在他们的哲学和方法是被动的。本文讨论了SMS消息的设计见解,旨在为用户提供有关能量摄入(J1)和进食率(J2)的及时反馈。这是通过调查参与者对短信的反应来完成的,通过一项研究来确定他们是否会遵守短信提供的指导来进一步减肥。这项研究的结果表明,参与者总体上认为,旨在帮助他们减肥的短信是有帮助的,并且会使他们遵守规定。结果还表明,参与者对数字信息的理解水平更高。
{"title":"Investigating the Design of Just-in-Time Adaptive Interventions (JITAIs) Messages Targeting Eating Behaviors","authors":"Eric C Moses, Chris S. Crawford, E. Sazonov, M. McCrory, J. G. Thomas, J. Higgins","doi":"10.1145/3564746.3587028","DOIUrl":"https://doi.org/10.1145/3564746.3587028","url":null,"abstract":"Obesity and being overweight is an ongoing issue and a pervasive concern in the United States. There are many programs available that try to assist with weight loss in a variety of forms which are sometimes reactive in their philosophies and methods. This paper discusses insights on the design of SMS messages that seek to provide users just-in-time feedback regarding energy intake (J1) and eating rate (J2). This was accomplished by surveying participants' responses to SMS messages via a study to ascertain whether they would comply with the direction provided via SMS to further their weight loss journey. Results from this study suggest that participants overall felt that the SMS messages designed to aid them in their weight loss journey are helpful and would result in compliance. Results also suggest that participants had higher levels of comprehension with numeric messages.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125130921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Query-Based Membership Inference Attack on the Medical Data 基于查询的医疗数据隶属推理攻击评价
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587027
Lakshmi Prasanna Pedarla, Xinyue Zhang, Liang Zhao, Hafiz Khan
In recent years, machine learning (ML) has achieved huge success in healthcare and medicine areas. However, recent work has demonstrated that ML is vulnerable to privacy leakage since it exhibits to overfit the training datasets. Especially, in healthcare and medical communities, there are concerns that medical images and electronic health records containing protected health information (PHI) are vulnerable to inference attacks. These PHI might be unwittingly leaked when the aforementioned data is used for training ML models to address necessary healthcare concerns. Given access to the trained ML model, the attacker is able to adopt membership inference attacks (MIA) to determine whether a specific data sample is used in the corresponding medical training dataset. In this paper, we concentrate on MIA and propose a new method to determine whether a sample was used to train the given ML model or not. Our method is based on the observation that a trained machine learning model usually is lesser sensitive to the feature value perturbations on its training samples compared with the non-training samples. The key idea of our method is to perturb a training sample's feature value in the corresponding feature space and then compute the relationship between each feature's perturbation and the corresponding prediction's change as features to train the attack model. We used publicly available medical datasets such as diabetes and heartbeat categorization data to evaluate our method. Our evaluation shows that the proposed attack can perform better than the existing membership inference attack method.
近年来,机器学习(ML)在医疗保健和医学领域取得了巨大成功。然而,最近的研究表明,机器学习容易受到隐私泄露的影响,因为它表现出对训练数据集的过拟合。特别是在医疗保健和医疗界,人们担心包含受保护健康信息(PHI)的医疗图像和电子健康记录容易受到推理攻击。当上述数据用于训练ML模型以解决必要的医疗保健问题时,这些PHI可能会在不知不觉中泄露。给定对训练过的ML模型的访问权限,攻击者能够采用成员推理攻击(MIA)来确定相应的医学训练数据集中是否使用了特定的数据样本。在本文中,我们专注于MIA,并提出了一种新的方法来确定样本是否用于训练给定的ML模型。我们的方法是基于这样一种观察,即与非训练样本相比,经过训练的机器学习模型通常对其训练样本上的特征值扰动不太敏感。我们的方法的核心思想是在相应的特征空间中扰动训练样本的特征值,然后计算每个特征的扰动与相应的预测变化之间的关系作为特征来训练攻击模型。我们使用公开可用的医疗数据集,如糖尿病和心跳分类数据来评估我们的方法。我们的评估表明,所提出的攻击比现有的隶属推理攻击方法性能更好。
{"title":"Evaluation of Query-Based Membership Inference Attack on the Medical Data","authors":"Lakshmi Prasanna Pedarla, Xinyue Zhang, Liang Zhao, Hafiz Khan","doi":"10.1145/3564746.3587027","DOIUrl":"https://doi.org/10.1145/3564746.3587027","url":null,"abstract":"In recent years, machine learning (ML) has achieved huge success in healthcare and medicine areas. However, recent work has demonstrated that ML is vulnerable to privacy leakage since it exhibits to overfit the training datasets. Especially, in healthcare and medical communities, there are concerns that medical images and electronic health records containing protected health information (PHI) are vulnerable to inference attacks. These PHI might be unwittingly leaked when the aforementioned data is used for training ML models to address necessary healthcare concerns. Given access to the trained ML model, the attacker is able to adopt membership inference attacks (MIA) to determine whether a specific data sample is used in the corresponding medical training dataset. In this paper, we concentrate on MIA and propose a new method to determine whether a sample was used to train the given ML model or not. Our method is based on the observation that a trained machine learning model usually is lesser sensitive to the feature value perturbations on its training samples compared with the non-training samples. The key idea of our method is to perturb a training sample's feature value in the corresponding feature space and then compute the relationship between each feature's perturbation and the corresponding prediction's change as features to train the attack model. We used publicly available medical datasets such as diabetes and heartbeat categorization data to evaluate our method. Our evaluation shows that the proposed attack can perform better than the existing membership inference attack method.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-based Enrollment in a Group in a Distributed Setting 分布式设置中基于信任的组注册
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587014
K. Kyei, Yasmin Eady, A. Esterline, Joseph Shelton
We investigate how trust can be defined and exploited in the problem of accepting a candidate for enrollment in a group in a distributed setting. A simulation in Python using the NetworkX package has the servers (nodes) implement the WedID protocol. Each node has a profile document with a FOAF graph connecting the server to its neighbors via the foaf:knows property. We assume that the FOAF graphs have been assembled into a network tying together the group. Enrollment relies heavily on two novel notions of trust: one is the trust one node has in another, which we take to come from several kinds of sources, and the other is the trustworthiness a node enjoys because of its centrality. If someone objects to the candidate, there is a vote, a novel procedure that weights a node's votes by its trustworthiness and allows votes based on reference weighted by trust in the referrer. Our main contributions are the procedure for accepting a candidate and the two notions of trust. Results to date include the simulation mentioned; thirty-five test runs provided reasonable results. Work in progress is an implementation of the procedures on a group of servers implementing the WebID protocol.
我们研究了如何定义信任,并利用信任来解决在分布式环境中接受候选人加入组的问题。在Python中使用NetworkX包进行模拟,使服务器(节点)实现WedID协议。每个节点都有一个配置文件文档,其中有一个FOAF图,通过FOAF:know属性将服务器连接到它的邻居。我们假设FOAF图已经组装成一个网络,将组连接在一起。注册在很大程度上依赖于两个新的信任概念:一个是一个节点对另一个节点的信任,我们认为这种信任来自多个来源;另一个是一个节点由于其中心性而享有的可信度。如果有人反对候选人,就会进行投票,这是一个新颖的过程,它根据节点的可信度对其投票进行加权,并允许基于对推荐人的信任加权的参考投票。我们的主要贡献是接受候选人的程序和信任的两个概念。迄今为止的结果包括上述模拟;35次测试运行提供了合理的结果。正在进行的工作是在一组实现webbid协议的服务器上实现这些过程。
{"title":"Trust-based Enrollment in a Group in a Distributed Setting","authors":"K. Kyei, Yasmin Eady, A. Esterline, Joseph Shelton","doi":"10.1145/3564746.3587014","DOIUrl":"https://doi.org/10.1145/3564746.3587014","url":null,"abstract":"We investigate how trust can be defined and exploited in the problem of accepting a candidate for enrollment in a group in a distributed setting. A simulation in Python using the NetworkX package has the servers (nodes) implement the WedID protocol. Each node has a profile document with a FOAF graph connecting the server to its neighbors via the foaf:knows property. We assume that the FOAF graphs have been assembled into a network tying together the group. Enrollment relies heavily on two novel notions of trust: one is the trust one node has in another, which we take to come from several kinds of sources, and the other is the trustworthiness a node enjoys because of its centrality. If someone objects to the candidate, there is a vote, a novel procedure that weights a node's votes by its trustworthiness and allows votes based on reference weighted by trust in the referrer. Our main contributions are the procedure for accepting a candidate and the two notions of trust. Results to date include the simulation mentioned; thirty-five test runs provided reasonable results. Work in progress is an implementation of the procedures on a group of servers implementing the WebID protocol.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connecting Programming to Mathematical Generalization: A Pilot Study of Professional Development and Instructional Materials 连结程式设计与数学泛化:专业发展与教材的初步研究
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587021
J. Jenkins, Cynthia L. Stenger, Jessica E. Stovall, Andrea D. Beesley, Jay L. Jackson, Mark G. Terwilliger
It is important to introduce computer programming concepts to K-12 students in preparation and motivation for college-level programming courses. Furthermore, generalization and abstraction are skills needed in computer science and other STEM majors. The Collaborative Partnership to teach mathematical Reasoning through Computer PRogramming (CPR2) Instructional Model (IM) was developed to use Python programming as a vehicle for explicit instruction in mathematical generalization and abstraction. Students are introduced to programming for the purpose of exploring mathematical concepts. They write code embedded with mathematical general expressions, observe the behavior of those expressions at scale in the execution of their programs, make conjectures about emerging patterns, and write convincing arguments to support these conjectures. During a two-week summer institute in 2020, middle school math teachers participated in professional development using the CPR2 instructional model. Teachers were provided with an introduction to programming and then shown how to apply the instructional model to math concepts while addressing computer science and math standards in the process. During the following fall and spring, the CPR2-trained teachers piloted lessons using Python programming to explore math concepts in their own classrooms. In this paper, details about the instructional model, the collaborative design research process used to refine professional development sessions, the key role of experienced teacher mentors in supporting new participants, and the incorporation of programming into the teachers' math classrooms are detailed. The results of design sessions and the pilot implementation are also discussed.
向K-12年级的学生介绍计算机编程概念,为大学水平的编程课程做准备和激励是很重要的。此外,概括和抽象是计算机科学和其他STEM专业所需要的技能。通过计算机编程教授数学推理的协作伙伴关系(CPR2)教学模型(IM)的开发是为了使用Python编程作为数学泛化和抽象的明确教学的工具。为了探索数学概念,向学生介绍编程。他们编写嵌入数学通用表达式的代码,在程序执行过程中大规模观察这些表达式的行为,对新出现的模式进行猜测,并编写令人信服的论据来支持这些猜测。在2020年为期两周的暑期学院期间,中学数学教师使用CPR2教学模式参与了专业发展。教师们首先介绍了编程,然后展示了如何将这种教学模式应用于数学概念,同时在此过程中讲解计算机科学和数学标准。在接下来的秋季和春季,经过cpr2培训的教师在自己的课堂上使用Python编程来探索数学概念。在本文中,详细介绍了教学模式、用于完善专业发展课程的协作设计研究过程、经验丰富的教师导师在支持新参与者方面的关键作用,以及将编程纳入教师的数学课堂。设计会议的结果和试点实施也进行了讨论。
{"title":"Connecting Programming to Mathematical Generalization: A Pilot Study of Professional Development and Instructional Materials","authors":"J. Jenkins, Cynthia L. Stenger, Jessica E. Stovall, Andrea D. Beesley, Jay L. Jackson, Mark G. Terwilliger","doi":"10.1145/3564746.3587021","DOIUrl":"https://doi.org/10.1145/3564746.3587021","url":null,"abstract":"It is important to introduce computer programming concepts to K-12 students in preparation and motivation for college-level programming courses. Furthermore, generalization and abstraction are skills needed in computer science and other STEM majors. The Collaborative Partnership to teach mathematical Reasoning through Computer PRogramming (CPR2) Instructional Model (IM) was developed to use Python programming as a vehicle for explicit instruction in mathematical generalization and abstraction. Students are introduced to programming for the purpose of exploring mathematical concepts. They write code embedded with mathematical general expressions, observe the behavior of those expressions at scale in the execution of their programs, make conjectures about emerging patterns, and write convincing arguments to support these conjectures. During a two-week summer institute in 2020, middle school math teachers participated in professional development using the CPR2 instructional model. Teachers were provided with an introduction to programming and then shown how to apply the instructional model to math concepts while addressing computer science and math standards in the process. During the following fall and spring, the CPR2-trained teachers piloted lessons using Python programming to explore math concepts in their own classrooms. In this paper, details about the instructional model, the collaborative design research process used to refine professional development sessions, the key role of experienced teacher mentors in supporting new participants, and the incorporation of programming into the teachers' math classrooms are detailed. The results of design sessions and the pilot implementation are also discussed.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124239824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scan Stack: A Search-based Concurrent Stack for GPU 扫描堆栈:一个基于搜索的GPU并发堆栈
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587018
Noah South, B. Jang
Concurrent data structures play a critical role in the overall performance of GPGPU applications. Stack is one of the basic data structures and finds numerous applications where data is processed in a Last In First Out (LIFO) fashion. Although concurrent stack is well researched for multi-core CPUs, there is little research pointing to the conversion of CPU stacks into a GPU-friendly form. In this paper, we propose a concurrent search-based GPU stack named Scan Stack. The proposed stack is designed to take advantage of GPU memory access patterns, memory coalescence, and thread structures (i.e., warps) to increase throughput. Our experiments on an NVIDIA RTX 3090 show that our proposed scan stack significantly improves the throughput and scalability for all benchmarks when reducing the search area. However, the greatest improvements are shown when elimination is possible, and this improvement reaches nearly 39 times what a non-optimized structure is capable of.
并发数据结构在GPGPU应用程序的整体性能中起着至关重要的作用。堆栈是一种基本的数据结构,在许多应用中,数据以后进先出(LIFO)的方式处理。尽管对多核CPU的并发堆栈进行了很好的研究,但很少有研究指出将CPU堆栈转换为gpu友好的形式。本文提出了一种基于并发搜索的GPU堆栈——扫描堆栈。所提出的堆栈旨在利用GPU内存访问模式、内存合并和线程结构(即warp)来提高吞吐量。我们在NVIDIA RTX 3090上的实验表明,当减少搜索区域时,我们提出的扫描堆栈显着提高了所有基准测试的吞吐量和可扩展性。然而,最大的改进是在可以消除的情况下显示出来的,这种改进达到了非优化结构能力的近39倍。
{"title":"Scan Stack: A Search-based Concurrent Stack for GPU","authors":"Noah South, B. Jang","doi":"10.1145/3564746.3587018","DOIUrl":"https://doi.org/10.1145/3564746.3587018","url":null,"abstract":"Concurrent data structures play a critical role in the overall performance of GPGPU applications. Stack is one of the basic data structures and finds numerous applications where data is processed in a Last In First Out (LIFO) fashion. Although concurrent stack is well researched for multi-core CPUs, there is little research pointing to the conversion of CPU stacks into a GPU-friendly form. In this paper, we propose a concurrent search-based GPU stack named Scan Stack. The proposed stack is designed to take advantage of GPU memory access patterns, memory coalescence, and thread structures (i.e., warps) to increase throughput. Our experiments on an NVIDIA RTX 3090 show that our proposed scan stack significantly improves the throughput and scalability for all benchmarks when reducing the search area. However, the greatest improvements are shown when elimination is possible, and this improvement reaches nearly 39 times what a non-optimized structure is capable of.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115099879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-Creating Well-Being and Health Options Using Internet Technologies 利用互联网技术共同创造幸福和健康选择
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587010
M. E. Villapol, K. Petrova
This research explores the emergence of community oriented technology supported ecosystems of value creation and co-creation interactions, to devise and utilise opportunities for safe physical activity during lockdown periods. Qualitative data coding and analysis methods were deployed to investigate, from a value co-creation perspective, customer experiences in using online fitness classes organised by community fitness instructors. The adoption of the technological solutions to deliver online fitness classes was explored by applying the Technology-Organization-Environment (TOE) framework. The analysis of the data gathered from social media sites showed that most of the participants in the online classes found the service very valuable, and actively contributed to the development of the fitness service delivery model with suggestions and comments. The main causes of value destruction were poor Internet connectivity and technical problems with computer devices. Fitness providers adopted live stream and video conferencing tools, with Zoom emerging as the preferred platform for online session support. The study found that the global pandemic crisis had accelerated the adoption of already existing technologies to promote physical activity to the larger community when face-to-face participation was hampered or untenable. It also highlighted the importance of offering a service experience comparable to face-to-face fitness sessions through more advanced technology solutions.
本研究探讨了以社区为导向的技术支持的价值创造和共同创造互动生态系统的出现,以设计和利用在封锁期间进行安全体育活动的机会。采用定性数据编码和分析方法,从价值共同创造的角度调查客户使用社区健身教练组织的在线健身课程的体验。运用技术-组织-环境(TOE)框架,探讨了在线健身课程的技术解决方案。从社交媒体网站收集的数据分析显示,大多数在线课程的参与者认为这项服务非常有价值,并积极地为健身服务交付模式的发展做出贡献,并提出建议和评论。价值破坏的主要原因是互联网连接不良和计算机设备的技术问题。健身提供商采用了直播和视频会议工具,Zoom成为在线会议支持的首选平台。研究发现,当面对面的参与受到阻碍或无法维持时,全球大流行危机加速了现有技术的采用,以促进更大社区的体育活动。它还强调了通过更先进的技术解决方案提供与面对面健身课程相当的服务体验的重要性。
{"title":"Co-Creating Well-Being and Health Options Using Internet Technologies","authors":"M. E. Villapol, K. Petrova","doi":"10.1145/3564746.3587010","DOIUrl":"https://doi.org/10.1145/3564746.3587010","url":null,"abstract":"This research explores the emergence of community oriented technology supported ecosystems of value creation and co-creation interactions, to devise and utilise opportunities for safe physical activity during lockdown periods. Qualitative data coding and analysis methods were deployed to investigate, from a value co-creation perspective, customer experiences in using online fitness classes organised by community fitness instructors. The adoption of the technological solutions to deliver online fitness classes was explored by applying the Technology-Organization-Environment (TOE) framework. The analysis of the data gathered from social media sites showed that most of the participants in the online classes found the service very valuable, and actively contributed to the development of the fitness service delivery model with suggestions and comments. The main causes of value destruction were poor Internet connectivity and technical problems with computer devices. Fitness providers adopted live stream and video conferencing tools, with Zoom emerging as the preferred platform for online session support. The study found that the global pandemic crisis had accelerated the adoption of already existing technologies to promote physical activity to the larger community when face-to-face participation was hampered or untenable. It also highlighted the importance of offering a service experience comparable to face-to-face fitness sessions through more advanced technology solutions.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2023 ACM Southeast Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1