首页 > 最新文献

2020 Ivannikov Memorial Workshop (IVMEM)最新文献

英文 中文
Compact Interface Method Table Layout 紧凑的接口方法表布局
Pub Date : 2020-09-01 DOI: 10.1109/IVMEM51402.2020.00018
Ivan Trepakov, P. Pavlov
This article describes a novel interface method table (IMT) layout approach, which allocates interface method tables inside virtual method table (VMT), allowing for table entries to be shared between VMT and multiple IMTs. Similarly to VMT layout inheritance for classes, a heuristical IMT layout inheritance scheme is implemented for interfaces. Unlike prior schemes, proposed “all or nothing” heuristic achieves considerable total table size reduction without any dispatch overhead. Together with combined layout of IMT and VMT, interface layout inheritance opens up even more opportunities for IMT layout reuse and total table size reduction. Application of all techniques outlined in this article results in a significant reduction of overall executable size.
本文描述了一种新的接口方法表(IMT)布局方法,它在虚拟方法表(VMT)中分配接口方法表,从而允许表项在VMT和多个IMT之间共享。与类的VMT布局继承类似,对接口实现了启发式IMT布局继承方案。与之前的方案不同,建议的“全有或全无”启发式在没有任何调度开销的情况下实现了相当大的表总大小缩减。结合IMT和VMT的组合布局,接口布局继承为IMT布局重用和减少总表大小提供了更多的机会。应用本文中概述的所有技术可以显著减小可执行文件的总大小。
{"title":"Compact Interface Method Table Layout","authors":"Ivan Trepakov, P. Pavlov","doi":"10.1109/IVMEM51402.2020.00018","DOIUrl":"https://doi.org/10.1109/IVMEM51402.2020.00018","url":null,"abstract":"This article describes a novel interface method table (IMT) layout approach, which allocates interface method tables inside virtual method table (VMT), allowing for table entries to be shared between VMT and multiple IMTs. Similarly to VMT layout inheritance for classes, a heuristical IMT layout inheritance scheme is implemented for interfaces. Unlike prior schemes, proposed “all or nothing” heuristic achieves considerable total table size reduction without any dispatch overhead. Together with combined layout of IMT and VMT, interface layout inheritance opens up even more opportunities for IMT layout reuse and total table size reduction. Application of all techniques outlined in this article results in a significant reduction of overall executable size.","PeriodicalId":325794,"journal":{"name":"2020 Ivannikov Memorial Workshop (IVMEM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126489120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptation of the TOSCA standard model for the Kubernetes container environment 为Kubernetes容器环境调整TOSCA标准模型
Pub Date : 2020-09-01 DOI: 10.1109/IVMEM51402.2020.00008
A. Borisova, Valeriya Shvetcova, O. Borisenko
The main difference between container-based and virtualization-based cloud environments is the way of the virtualization methods for OS and auxiliary resources. Software applications can be both deployed in a cloud on virtual machines or in local data centres on physical machines. Containers are based on OS-level virtualization. So, container applications can be deployed on a virtual machine in the cloud too. To deal with the growth of various, but functionally similar cloud environments, the TOSCA [1] (Topology and Orchestration for Cloud Applications) standard was created. It allows to describe deployment resources in a TOSCA Domain-specific language that does not depend on the provider. Kubernetes [8] is an open-source system for deployment automation, scaling, and management of containerized applications. TOSCA standard was created to describe cloud applications, but the model may be suitable for describing container applications that Kubernetes orchestrate. This paper considers Kubernetes as a cloud provider and examines the applicability of the TOSCA standard for unifying deployment and orchestration not only of resources provided by virtualization-based clouds but also of containerized ones.
基于容器的云环境和基于虚拟化的云环境之间的主要区别在于操作系统和辅助资源的虚拟化方法的方式。软件应用程序既可以部署在虚拟机上的云中,也可以部署在物理机上的本地数据中心中。容器基于操作系统级别的虚拟化。因此,容器应用程序也可以部署在云中的虚拟机上。为了应对各种功能相似的云环境的增长,创建了TOSCA[1](云应用的拓扑和编排)标准。它允许使用不依赖于提供者的TOSCA域特定语言描述部署资源。Kubernetes[8]是一个用于自动化部署、扩展和管理容器化应用程序的开源系统。创建TOSCA标准是为了描述云应用程序,但该模型可能适合描述Kubernetes编排的容器应用程序。本文将Kubernetes视为一个云提供商,并检查TOSCA标准在统一部署和编排方面的适用性,这些部署和编排不仅包括基于虚拟化的云提供的资源,还包括容器化的云。
{"title":"Adaptation of the TOSCA standard model for the Kubernetes container environment","authors":"A. Borisova, Valeriya Shvetcova, O. Borisenko","doi":"10.1109/IVMEM51402.2020.00008","DOIUrl":"https://doi.org/10.1109/IVMEM51402.2020.00008","url":null,"abstract":"The main difference between container-based and virtualization-based cloud environments is the way of the virtualization methods for OS and auxiliary resources. Software applications can be both deployed in a cloud on virtual machines or in local data centres on physical machines. Containers are based on OS-level virtualization. So, container applications can be deployed on a virtual machine in the cloud too. To deal with the growth of various, but functionally similar cloud environments, the TOSCA [1] (Topology and Orchestration for Cloud Applications) standard was created. It allows to describe deployment resources in a TOSCA Domain-specific language that does not depend on the provider. Kubernetes [8] is an open-source system for deployment automation, scaling, and management of containerized applications. TOSCA standard was created to describe cloud applications, but the model may be suitable for describing container applications that Kubernetes orchestrate. This paper considers Kubernetes as a cloud provider and examines the applicability of the TOSCA standard for unifying deployment and orchestration not only of resources provided by virtualization-based clouds but also of containerized ones.","PeriodicalId":325794,"journal":{"name":"2020 Ivannikov Memorial Workshop (IVMEM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115593752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Three-step Algorithms for Detection of High Degree Nodes in Online Social Networks 在线社交网络中高节点检测的三步算法
Pub Date : 2020-09-01 DOI: 10.1109/IVMEM51402.2020.00014
Danil Shaikhelislamov, Mikhail Drobyshevskiy, D. Turdakov, A. Yatskov, M. Varlamov, Denis Aivazov
This paper considers the problem of influential users detection in online social networks. Identifying of such key entities is of interest in many areas: marketing, politics, information security, business. The degree of the node of the corresponding graph is used as a popularity indicator in this work. Network query limitation is the main challenge in discovering their structure. Therefore, our task is to detect a percentage of the highest degree network nodes under a budget restriction. We propose a three-step crawling algorithm in two versions to solve the problem. We experimentally show its efficiency at various budget limits and superiority over known crawling strategies. For example, to detect top-1% of hubs with 90% precision, one needs to crawl 5% of graph nodes in average with our 3-StepBatch algorithm. We also show that our algorithm performs well for different target set sizes, from 0.01% to 10% of the graph.
本文研究在线社交网络中有影响力用户的检测问题。识别这些关键实体在许多领域都很重要:市场营销、政治、信息安全、商业。在这项工作中,使用相应图的节点度作为流行度指标。网络查询限制是发现其结构的主要挑战。因此,我们的任务是在预算限制下检测最高度网络节点的百分比。我们提出了一个分两个版本的三步爬行算法来解决这个问题。我们通过实验证明了它在各种预算限制下的效率和比已知爬行策略的优越性。例如,为了以90%的精度检测top-1%的hub,我们需要使用3-StepBatch算法平均抓取5%的图节点。我们还表明,我们的算法在不同的目标集大小(从图的0.01%到10%)上表现良好。
{"title":"Three-step Algorithms for Detection of High Degree Nodes in Online Social Networks","authors":"Danil Shaikhelislamov, Mikhail Drobyshevskiy, D. Turdakov, A. Yatskov, M. Varlamov, Denis Aivazov","doi":"10.1109/IVMEM51402.2020.00014","DOIUrl":"https://doi.org/10.1109/IVMEM51402.2020.00014","url":null,"abstract":"This paper considers the problem of influential users detection in online social networks. Identifying of such key entities is of interest in many areas: marketing, politics, information security, business. The degree of the node of the corresponding graph is used as a popularity indicator in this work. Network query limitation is the main challenge in discovering their structure. Therefore, our task is to detect a percentage of the highest degree network nodes under a budget restriction. We propose a three-step crawling algorithm in two versions to solve the problem. We experimentally show its efficiency at various budget limits and superiority over known crawling strategies. For example, to detect top-1% of hubs with 90% precision, one needs to crawl 5% of graph nodes in average with our 3-StepBatch algorithm. We also show that our algorithm performs well for different target set sizes, from 0.01% to 10% of the graph.","PeriodicalId":325794,"journal":{"name":"2020 Ivannikov Memorial Workshop (IVMEM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132014494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of thread-local garbage collection 线程本地垃圾收集的评估
Pub Date : 2020-09-01 DOI: 10.1109/IVMEM51402.2020.00009
A. Filatov, V. Mikheev
This paper discusses thread-local garbage collection (GC), a technique of automatic memory management aimed at improving GC throughput and reducing GC pauses in managed runtimes. It exploits the observation that most objects do not escape the scope of the thread that allocated them; therefore, memory occupied by those objects can be reclaimed locally within the thread. Performance measurements demonstrate that the proposed scheme has an advantage over a highly optimized stop-the-world collector used in an experimental JVM on some throughput-oriented benchmarks.
本文讨论了线程本地垃圾收集(GC),这是一种自动内存管理技术,旨在提高GC吞吐量并减少托管运行时的GC暂停。它利用了大多数对象不会逃离分配它们的线程的作用域的观察结果;因此,这些对象占用的内存可以在线程内部局部回收。性能测量表明,在一些面向吞吐量的基准测试中,与实验性JVM中使用的高度优化的stop-the-world收集器相比,所提出的方案具有优势。
{"title":"Evaluation of thread-local garbage collection","authors":"A. Filatov, V. Mikheev","doi":"10.1109/IVMEM51402.2020.00009","DOIUrl":"https://doi.org/10.1109/IVMEM51402.2020.00009","url":null,"abstract":"This paper discusses thread-local garbage collection (GC), a technique of automatic memory management aimed at improving GC throughput and reducing GC pauses in managed runtimes. It exploits the observation that most objects do not escape the scope of the thread that allocated them; therefore, memory occupied by those objects can be reclaimed locally within the thread. Performance measurements demonstrate that the proposed scheme has an advantage over a highly optimized stop-the-world collector used in an experimental JVM on some throughput-oriented benchmarks.","PeriodicalId":325794,"journal":{"name":"2020 Ivannikov Memorial Workshop (IVMEM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127366993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page III 第三页
Pub Date : 2020-09-01 DOI: 10.1109/ivmem51402.2020.00002
{"title":"Title Page III","authors":"","doi":"10.1109/ivmem51402.2020.00002","DOIUrl":"https://doi.org/10.1109/ivmem51402.2020.00002","url":null,"abstract":"","PeriodicalId":325794,"journal":{"name":"2020 Ivannikov Memorial Workshop (IVMEM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying cryptographic protocols by Tamarin Prover 验证加密协议的塔玛琳证明
Pub Date : 2020-09-01 DOI: 10.1109/IVMEM51402.2020.00019
Evgenii M. Vinarskii, A. Demakov, A. Kamkin, N. Yevtushenko
Cryptographic protocols are utilized for establishing a secure session between “honest” agents which communicate strictly according to the protocol rules as well as for ensuring the authenticated and confidential transmission of messages. The specification of a cryptographic protocol is usually presented as a set of requirements for the sequences of transmitted messages including the format of such messages. Note that protocol can describe several execution scenarios. All these requirements lead to a huge formal specification for a real cryptographic protocol and therefore, it is difficult to verify the security of the whole cryptographic protocol at once. In this paper, to overcome this problem, we suggest verifying the protocol security for its fragments. Namely, we verify the security properties for a special set of so-called traces of the cryptographic protocol. Intuitively, a trace of the cryptographic protocol is a sequence of computations, value checks, and transmissions on the sides of “honest” agents permitted by the protocol. In order to choose such set of traces, we introduce an Adversary model and the notion of a similarity relation for traces. We then verify the security properties of selected traces with Tamarin Prover. Experimental results for the EAP and Noise protocols clearly show that this approach can be promising for automatic verification of large protocols.
加密协议用于在严格按照协议规则进行通信的“诚实”代理之间建立安全会话,并确保消息的认证和机密传输。加密协议的规范通常表现为对传输消息序列的一组要求,包括这些消息的格式。请注意,协议可以描述几个执行场景。所有这些需求导致一个真实的加密协议有一个庞大的形式化规范,因此很难一次验证整个加密协议的安全性。为了克服这个问题,我们建议对协议的分片进行安全性验证。也就是说,我们验证一组所谓的加密协议跟踪的安全属性。直观地说,加密协议的跟踪是协议允许的“诚实”代理方的一系列计算、值检查和传输。为了选择这样的轨迹集,我们引入了对手模型和轨迹相似关系的概念。然后,我们使用Tamarin Prover验证所选跟踪的安全属性。EAP和Noise协议的实验结果清楚地表明,该方法可以用于大型协议的自动验证。
{"title":"Verifying cryptographic protocols by Tamarin Prover","authors":"Evgenii M. Vinarskii, A. Demakov, A. Kamkin, N. Yevtushenko","doi":"10.1109/IVMEM51402.2020.00019","DOIUrl":"https://doi.org/10.1109/IVMEM51402.2020.00019","url":null,"abstract":"Cryptographic protocols are utilized for establishing a secure session between “honest” agents which communicate strictly according to the protocol rules as well as for ensuring the authenticated and confidential transmission of messages. The specification of a cryptographic protocol is usually presented as a set of requirements for the sequences of transmitted messages including the format of such messages. Note that protocol can describe several execution scenarios. All these requirements lead to a huge formal specification for a real cryptographic protocol and therefore, it is difficult to verify the security of the whole cryptographic protocol at once. In this paper, to overcome this problem, we suggest verifying the protocol security for its fragments. Namely, we verify the security properties for a special set of so-called traces of the cryptographic protocol. Intuitively, a trace of the cryptographic protocol is a sequence of computations, value checks, and transmissions on the sides of “honest” agents permitted by the protocol. In order to choose such set of traces, we introduce an Adversary model and the notion of a similarity relation for traces. We then verify the security properties of selected traces with Tamarin Prover. Experimental results for the EAP and Noise protocols clearly show that this approach can be promising for automatic verification of large protocols.","PeriodicalId":325794,"journal":{"name":"2020 Ivannikov Memorial Workshop (IVMEM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 Ivannikov Memorial Workshop (IVMEM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1