首页 > 最新文献

Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

英文 中文
Mapping Study on Constraint Consistency Checking in Distributed Enterprise Systems 分布式企业系统约束一致性检查的映射研究
T. Cerný, Andrew Walker, J. Svacina, Vincent Bushong, Dipta Das, Karel Frajták, Miroslav Bures, Pavel Tisnovsky
Constraint consistency errors in distributed systems can lead to fatal consequences when left unobserved and undetected. The primary goal of quality engineers should be to avoid system inconsistencies in general. However, it is typically a much more straight forward process in monolith-like systems with one codebase than in distributed solutions where heterogeneity occurs across modules. In this paper, we raise the research question of what is the existing state-of-the-art and research literature practice when it comes to consistency checking in distributed systems. We conducted a systematic search for existing work and assess the evidence to categorize the approaches and to identify used techniques. Identified works offer interesting directions and achievements. Often the works share tool prototypes and instruments to build on the top of when performing further research in this direction and we share them in this paper. Finally, we discuss open challenges and gaps in this field to promote the interest of the research audience.
分布式系统中的约束一致性错误如果不加以观察和检测,可能会导致致命的后果。质量工程师的首要目标应该是避免系统不一致。然而,与跨模块异构的分布式解决方案相比,在具有一个代码库的单体系统中,这通常是一个更直接的过程。在本文中,我们提出了关于分布式系统一致性检查的现有技术和研究文献实践的研究问题。我们对现有的工作进行了系统的搜索,并评估了证据,对方法进行了分类,并确定了使用的技术。确定的作品提供了有趣的方向和成就。当在这个方向上进行进一步的研究时,这些作品经常共享工具原型和工具来构建,我们在本文中共享它们。最后,我们讨论了该领域的开放挑战和差距,以促进研究观众的兴趣。
{"title":"Mapping Study on Constraint Consistency Checking in Distributed Enterprise Systems","authors":"T. Cerný, Andrew Walker, J. Svacina, Vincent Bushong, Dipta Das, Karel Frajták, Miroslav Bures, Pavel Tisnovsky","doi":"10.1145/3400286.3418257","DOIUrl":"https://doi.org/10.1145/3400286.3418257","url":null,"abstract":"Constraint consistency errors in distributed systems can lead to fatal consequences when left unobserved and undetected. The primary goal of quality engineers should be to avoid system inconsistencies in general. However, it is typically a much more straight forward process in monolith-like systems with one codebase than in distributed solutions where heterogeneity occurs across modules. In this paper, we raise the research question of what is the existing state-of-the-art and research literature practice when it comes to consistency checking in distributed systems. We conducted a systematic search for existing work and assess the evidence to categorize the approaches and to identify used techniques. Identified works offer interesting directions and achievements. Often the works share tool prototypes and instruments to build on the top of when performing further research in this direction and we share them in this paper. Finally, we discuss open challenges and gaps in this field to promote the interest of the research audience.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PerfNet PerfNet
Chuan-Chi Wang, Ying-Chiao Liao, Ming-Chang Kao, Wen-Yew Liang, Shih-Hao Hung
The technology of deep learning has grown rapidly and been widely used in the industry. In addition to the accuracy of the deep learning (DL) models, system developers are also interested in comprehending their performance aspects to make sure that the hardware design and the systems deployed to meet the application demands. However, developing a performance model to serve the aforementioned purpose needs to take many issues into account, e.g. the DL model, the runtime software, and the system architecture, which is quite complex. In this work, we propose a multi-layer regression network, called PerfNet, to predict the performance of DL models on heterogeneous systems. To train the PerfNet, we develop a tool to collect the performance features and characteristics of DL models on a set of heterogeneous systems, including key hyper-parameters such as loss functions, network shapes, and dataset size, as well as the hardware specifications. Our experiments show that the results of our approach are more accurate than previously published methods. In the case of VGG16 on GTX1080Ti, PerfNet yields a mean absolute percentage error of 20%, while the referenced work constantly overestimates with errors larger than 200%.
{"title":"PerfNet","authors":"Chuan-Chi Wang, Ying-Chiao Liao, Ming-Chang Kao, Wen-Yew Liang, Shih-Hao Hung","doi":"10.1145/3400286.3418245","DOIUrl":"https://doi.org/10.1145/3400286.3418245","url":null,"abstract":"The technology of deep learning has grown rapidly and been widely used in the industry. In addition to the accuracy of the deep learning (DL) models, system developers are also interested in comprehending their performance aspects to make sure that the hardware design and the systems deployed to meet the application demands. However, developing a performance model to serve the aforementioned purpose needs to take many issues into account, e.g. the DL model, the runtime software, and the system architecture, which is quite complex. In this work, we propose a multi-layer regression network, called PerfNet, to predict the performance of DL models on heterogeneous systems. To train the PerfNet, we develop a tool to collect the performance features and characteristics of DL models on a set of heterogeneous systems, including key hyper-parameters such as loss functions, network shapes, and dataset size, as well as the hardware specifications. Our experiments show that the results of our approach are more accurate than previously published methods. In the case of VGG16 on GTX1080Ti, PerfNet yields a mean absolute percentage error of 20%, while the referenced work constantly overestimates with errors larger than 200%.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends 脆弱性与安全日志分析:近期趋势的系统文献综述
J. Svacina, John E. Raffety, Connor Woodahl, Brooklynn Stone, T. Cerný, Miroslav Bures, Dongwan Shin, Karel Frajták, Pavel Tisnovsky
Log analysis is a technique of deriving knowledge from log files containing records of events in a computer system. A common application of log analysis is to derive critical information about a system's security issues and intrusions, which subsequently leads to being able to identify and potentially stop intruders attacking the system. However, many systems produce a high volume of log data with high frequency, posing serious challenges in analysis. This paper contributes with a systematic literature review and discusses current trends, advancements, and future directions in log security analysis within the past decade. We summarized current research strategies with respect to technology approaches from 34 current publications. We identified limitations that poses challenges to future research and opened discussion on issues towards logging mechanism in the software systems. Findings of this study are relevant for software systems as well as software parts of the Internet of Things (IoT) systems.
日志分析是一种从包含计算机系统事件记录的日志文件中获取知识的技术。日志分析的一个常见应用是获取关于系统安全问题和入侵的关键信息,这随后导致能够识别并潜在地阻止入侵者攻击系统。然而,许多系统产生大量高频率的测井数据,给分析带来了严峻的挑战。本文通过系统的文献综述,讨论了过去十年来日志安全分析的当前趋势、进展和未来方向。我们总结了目前34个出版物中关于技术方法的研究策略。我们确定了对未来研究构成挑战的局限性,并就软件系统中的日志机制问题展开了讨论。本研究的发现与软件系统以及物联网(IoT)系统的软件部分相关。
{"title":"On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends","authors":"J. Svacina, John E. Raffety, Connor Woodahl, Brooklynn Stone, T. Cerný, Miroslav Bures, Dongwan Shin, Karel Frajták, Pavel Tisnovsky","doi":"10.1145/3400286.3418261","DOIUrl":"https://doi.org/10.1145/3400286.3418261","url":null,"abstract":"Log analysis is a technique of deriving knowledge from log files containing records of events in a computer system. A common application of log analysis is to derive critical information about a system's security issues and intrusions, which subsequently leads to being able to identify and potentially stop intruders attacking the system. However, many systems produce a high volume of log data with high frequency, posing serious challenges in analysis. This paper contributes with a systematic literature review and discusses current trends, advancements, and future directions in log security analysis within the past decade. We summarized current research strategies with respect to technology approaches from 34 current publications. We identified limitations that poses challenges to future research and opened discussion on issues towards logging mechanism in the software systems. Findings of this study are relevant for software systems as well as software parts of the Internet of Things (IoT) systems.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Sequence to Sequence CycleGAN for Non-Parallel Sentiment Transfer with Identity Loss Pretraining 基于身份损失预训练的非并行情感转移的序列到序列循环gan
Ida Ayu Putu Ari Crisdayanti, Jee-Hyong Lee
Sentiment transfer has been explored as non-parallel transfer tasks in natural language processing. Previous works depend on a single encoder to disentangle either positive or negative style from its content and rely on a style representation to transfer the style attributes. Utilizing a single encoder to learn disentanglement in both styles might not sufficient due to the different characteristics of each sentiment represented by various vocabularies in the corresponding style. To this end, we propose a sequence to sequence CycleGAN which trains different text generators (encoder-decoder) for each style transfer direction. Learning disentangled latent representations leads previous works to high sentiment accuracy but suffer to preserve the content of the original sentences. In order to manage the content preservation, we pretrained our text generator as autoencoder using the identity loss. The model shows an improvement in sentiment accuracy and BLEU score which indicates better content preservation. It leads our model to a better overall performance compared to baselines.
情感迁移是自然语言处理中的非并行迁移任务。以前的作品依赖于单个编码器从其内容中分离出积极或消极的风格,并依赖于风格表示来传递风格属性。使用单个编码器来学习两种风格的解纠缠可能是不够的,因为相应风格的各种词汇所代表的每种情感的不同特征。为此,我们提出了一个序列到序列的CycleGAN,它为每个风格转移方向训练不同的文本生成器(编码器-解码器)。通过对解纠缠潜在表征的学习,使得前人的研究获得了较高的情感准确性,但却难以保留原句子的内容。为了管理内容保存,我们利用身份损失将文本生成器预训练为自编码器。该模型在情感准确性和BLEU分数上都有提高,表明内容保存更好。与基线相比,它使我们的模型具有更好的整体性能。
{"title":"Sequence to Sequence CycleGAN for Non-Parallel Sentiment Transfer with Identity Loss Pretraining","authors":"Ida Ayu Putu Ari Crisdayanti, Jee-Hyong Lee","doi":"10.1145/3400286.3418249","DOIUrl":"https://doi.org/10.1145/3400286.3418249","url":null,"abstract":"Sentiment transfer has been explored as non-parallel transfer tasks in natural language processing. Previous works depend on a single encoder to disentangle either positive or negative style from its content and rely on a style representation to transfer the style attributes. Utilizing a single encoder to learn disentanglement in both styles might not sufficient due to the different characteristics of each sentiment represented by various vocabularies in the corresponding style. To this end, we propose a sequence to sequence CycleGAN which trains different text generators (encoder-decoder) for each style transfer direction. Learning disentangled latent representations leads previous works to high sentiment accuracy but suffer to preserve the content of the original sentences. In order to manage the content preservation, we pretrained our text generator as autoencoder using the identity loss. The model shows an improvement in sentiment accuracy and BLEU score which indicates better content preservation. It leads our model to a better overall performance compared to baselines.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Migration Manager between Cloud Edge Platforms 云边缘平台间迁移管理器的设计与实现
Taehyuk Heo, J. An, Younghwan Kim
Live migration is the process of moving an application of a running virtual machine between physical machines without disconnecting the client or application. In recent years, as cloud computing has developed at a rapid pace, numerous virtual systems have been developed, and container-type operating system level virtualization technology, which is attracting attention at a higher speed and lower resource consumption rate than a virtual machine which use Hypervisor. The tool that deploys and manages these containers is called a container orchestration tool, and the most widely used orchestration framework is Kubernetes. Currently, there is no function for live migration in Kubernetes. In this paper, we developed an environment where containers can be live migration in Kubernetes, and research was conducted to reduce downtime of live migration.
动态迁移是在不断开客户端或应用程序连接的情况下在物理机器之间移动正在运行的虚拟机的应用程序的过程。近年来,随着云计算的飞速发展,大量虚拟系统被开发出来,容器型操作系统级虚拟化技术以其比使用Hypervisor的虚拟机更快的速度和更低的资源消耗率受到人们的关注。部署和管理这些容器的工具称为容器编排工具,最广泛使用的编排框架是Kubernetes。目前,Kubernetes中没有实时迁移功能。在本文中,我们开发了一个可以在Kubernetes中实时迁移容器的环境,并进行了减少实时迁移停机时间的研究。
{"title":"Design and Implementation of Migration Manager between Cloud Edge Platforms","authors":"Taehyuk Heo, J. An, Younghwan Kim","doi":"10.1145/3400286.3418279","DOIUrl":"https://doi.org/10.1145/3400286.3418279","url":null,"abstract":"Live migration is the process of moving an application of a running virtual machine between physical machines without disconnecting the client or application. In recent years, as cloud computing has developed at a rapid pace, numerous virtual systems have been developed, and container-type operating system level virtualization technology, which is attracting attention at a higher speed and lower resource consumption rate than a virtual machine which use Hypervisor. The tool that deploys and manages these containers is called a container orchestration tool, and the most widely used orchestration framework is Kubernetes. Currently, there is no function for live migration in Kubernetes. In this paper, we developed an environment where containers can be live migration in Kubernetes, and research was conducted to reduce downtime of live migration.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126975721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and low computation authentication protocol for Wireless Body Area Network with ECC and 2D hash chain 基于ECC和2D哈希链的无线体域网络安全低计算认证协议
Soohyeon Choi, Sangwon Shin, Xiaozhu Jin, Sung Shin
Wireless Body Area Network(WBAN) has developed as a technique for healthcare systems. In WBAN, patients can be remotely and constantly monitored by tiny wearable and portable sensors. The sensors collect patients' vital activity and movement data. Afterwards the data is sent via short-range wireless communication techniques to a data reader device which is called as a server. Since it is using shared wireless network, it may have chances to be attacked by unexpected adversaries. Therefore, security issues of WBAN are rapidly growing in the field of healthcare. Moreover, we need to care about the sensors' battery consumption and computation power because of resource-constrained WBAN. The sensors should be small and compact since they are located in, on, and around the patient's body for a long time. As a result, it is difficult to give a large battery capacity and strong computational power to the sensors. Thus, this paper proposes an authentication protocol which provides high level security and requires significantly low computation power on sensors for WBAN by using Elliptic Curves Cryptography(ECC) and two-dimensional hash chain techniques. The authentication procedure is very simple especially on the sensor side and 2D hash chain's key pool generation is also simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in WBAN.
无线体域网络(WBAN)已经发展成为一种用于医疗保健系统的技术。在无线宽带网络中,患者可以通过微型可穿戴和便携式传感器进行远程持续监控。传感器收集病人的重要活动和运动数据。然后,数据通过短距离无线通信技术发送到数据读取器设备,该设备被称为服务器。由于它使用的是共享无线网络,因此可能有机会受到意想不到的对手的攻击。因此,无线宽带网络在医疗领域的安全问题日益突出。此外,由于无线宽带网络的资源限制,我们需要关注传感器的电池消耗和计算能力。传感器应该小而紧凑,因为它们要长时间放置在病人体内、体表和周围。因此,很难给传感器提供大容量的电池和强大的计算能力。为此,本文提出了一种基于椭圆曲线加密技术(ECC)和二维哈希链技术的WBAN认证协议,该协议既具有较高的安全性,又显著降低了传感器的计算能力。验证过程非常简单,特别是在传感器端,2D哈希链的密钥池生成也非常简单高效。因此,我们的协议可以很容易地在WBAN中功率和资源受限的传感器节点中实现。
{"title":"Secure and low computation authentication protocol for Wireless Body Area Network with ECC and 2D hash chain","authors":"Soohyeon Choi, Sangwon Shin, Xiaozhu Jin, Sung Shin","doi":"10.1145/3400286.3418256","DOIUrl":"https://doi.org/10.1145/3400286.3418256","url":null,"abstract":"Wireless Body Area Network(WBAN) has developed as a technique for healthcare systems. In WBAN, patients can be remotely and constantly monitored by tiny wearable and portable sensors. The sensors collect patients' vital activity and movement data. Afterwards the data is sent via short-range wireless communication techniques to a data reader device which is called as a server. Since it is using shared wireless network, it may have chances to be attacked by unexpected adversaries. Therefore, security issues of WBAN are rapidly growing in the field of healthcare. Moreover, we need to care about the sensors' battery consumption and computation power because of resource-constrained WBAN. The sensors should be small and compact since they are located in, on, and around the patient's body for a long time. As a result, it is difficult to give a large battery capacity and strong computational power to the sensors. Thus, this paper proposes an authentication protocol which provides high level security and requires significantly low computation power on sensors for WBAN by using Elliptic Curves Cryptography(ECC) and two-dimensional hash chain techniques. The authentication procedure is very simple especially on the sensor side and 2D hash chain's key pool generation is also simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in WBAN.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward Fast Platform-Aware Neural Architecture Search for FPGA-Accelerated Edge AI Applications 面向fpga加速边缘人工智能应用的快速平台感知神经架构搜索
Yi-Chuan Liang, Ying-Chiao Liao, Chen-Ching Lin, Shih-Hao Hung
Neural Architecture Search (NAS) is a technique for finding suitable neural network architecture models for given applications. Previously, such search methods are usually based on reinforcement learning, with a recurrent neural network to generate neural network models. However, most NAS methods aim to find a set of candidates with best cost-performance ratios, e.g. high accuracy and low computing time, based on rough estimates derived from the workload generically. As today's deep learning chips accelerate neural network operations with a variety of hardware tricks such as vectors and low-precision data formats, the estimated metrics derived from generic computing operations such as float-point operations (FLOPS) would be very different from the actual latency, throughput, power consumption, etc., which are highly sensitive to the hardware design and even the software optimization in edge AI applications. Thus, instead of taking a long time to pick and train so called good candidates repeatedly based on unreliable estimates, we propose a NAS framework which accelerates the search process by including the actual performance measurements in the search process. The inclusion of actual measurements enables the proposed NAS framework to find candidates based on correct information and reduce the possibility of selecting wrong candidates and wasting search time on wrong candidates. To illustrate the effectiveness of our framework, we prototyped the framework to work with Intel OpenVINO and Field Programmable Gate Arrays (FPGA) to meet the accuracy and latency required by the user. The framework takes the dataset, accuracy and latency requirements from the user and automatically search for candidates to meet the requirements. Case studies and experimental results are presented in this paper to evaluate the effectiveness of our framework for Edge AI applications in real-time image classification.
神经结构搜索(NAS)是一种为给定应用寻找合适的神经网络结构模型的技术。以前,这种搜索方法通常是基于强化学习,用递归神经网络生成神经网络模型。然而,大多数NAS方法的目标是找到一组具有最佳性价比的候选方法,例如,基于从一般工作负载中得出的粗略估计,高精度和低计算时间。由于当今的深度学习芯片通过各种硬件技巧(如矢量和低精度数据格式)加速神经网络运算,因此浮点运算(FLOPS)等通用计算运算得出的估计指标与实际的延迟、吞吐量、功耗等指标存在很大差异,这些指标对边缘人工智能应用中的硬件设计甚至软件优化都非常敏感。因此,我们提出了一个NAS框架,它通过在搜索过程中包含实际性能测量来加速搜索过程,而不是花费很长时间来根据不可靠的估计反复挑选和训练所谓的优秀候选者。实际测量的包含使所提出的NAS框架能够根据正确的信息找到候选项,并减少选择错误候选项和在错误候选项上浪费搜索时间的可能性。为了说明我们的框架的有效性,我们对框架进行了原型设计,使其与Intel OpenVINO和现场可编程门阵列(FPGA)一起工作,以满足用户所需的精度和延迟。该框架从用户那里获取数据集、精度和延迟要求,并自动搜索满足要求的候选数据。本文给出了案例研究和实验结果,以评估我们的边缘人工智能框架在实时图像分类中的有效性。
{"title":"Toward Fast Platform-Aware Neural Architecture Search for FPGA-Accelerated Edge AI Applications","authors":"Yi-Chuan Liang, Ying-Chiao Liao, Chen-Ching Lin, Shih-Hao Hung","doi":"10.1145/3400286.3418240","DOIUrl":"https://doi.org/10.1145/3400286.3418240","url":null,"abstract":"Neural Architecture Search (NAS) is a technique for finding suitable neural network architecture models for given applications. Previously, such search methods are usually based on reinforcement learning, with a recurrent neural network to generate neural network models. However, most NAS methods aim to find a set of candidates with best cost-performance ratios, e.g. high accuracy and low computing time, based on rough estimates derived from the workload generically. As today's deep learning chips accelerate neural network operations with a variety of hardware tricks such as vectors and low-precision data formats, the estimated metrics derived from generic computing operations such as float-point operations (FLOPS) would be very different from the actual latency, throughput, power consumption, etc., which are highly sensitive to the hardware design and even the software optimization in edge AI applications. Thus, instead of taking a long time to pick and train so called good candidates repeatedly based on unreliable estimates, we propose a NAS framework which accelerates the search process by including the actual performance measurements in the search process. The inclusion of actual measurements enables the proposed NAS framework to find candidates based on correct information and reduce the possibility of selecting wrong candidates and wasting search time on wrong candidates. To illustrate the effectiveness of our framework, we prototyped the framework to work with Intel OpenVINO and Field Programmable Gate Arrays (FPGA) to meet the accuracy and latency required by the user. The framework takes the dataset, accuracy and latency requirements from the user and automatically search for candidates to meet the requirements. Case studies and experimental results are presented in this paper to evaluate the effectiveness of our framework for Edge AI applications in real-time image classification.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115634818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning Multi-modal Representations of Narrative Multimedia: a Case Study of Webtoons 学习叙事多媒体的多模态表现:以网络漫画为例
O-Joun Lee, Jin-Taek Kim
This study aims to learn task-agnostic representations of narrative multimedia. The existing studies focused on only stories in the narrative multimedia without considering their physical features. We propose a method for incorporating multi-modal features of the narrative multimedia into a unified vector representation. For narrative features, we embed character networks as with the existing studies. Textual features can be represented using the LSTM (Long-Short Term Memory) autoencoder. We apply the convolutional autoencoder to visual features. The convolutional autoencoder also can be used for the spectrograms of audible features. To combine these features, we propose two methods: early fusion and late fusion. The early fusion method composes representations of features on each scene. Then, we learn representations of a narrative work by predicting time-sequential changes in the features. The late fusion method concatenates feature vectors that are trained for allover the narrative work. Finally, we apply the proposed methods on webtoons (i.e., comics that are serially published through the web). The proposed methods have been evaluated by applying the vector representations to predicting the preferences of users for the webtoons.
本研究旨在了解叙事多媒体的任务不可知论表征。现有的研究只关注叙事多媒体中的故事,没有考虑故事的物理特征。我们提出了一种将叙事多媒体的多模态特征纳入统一矢量表示的方法。对于叙事特征,我们像现有的研究一样嵌入角色网络。文本特征可以使用LSTM(长短期记忆)自动编码器来表示。我们将卷积自编码器应用于视觉特征。卷积自编码器也可用于声音特征的谱图。为了结合这些特点,我们提出了两种方法:早期融合和晚期融合。早期的融合方法由每个场景的特征表示组成。然后,我们通过预测特征的时间顺序变化来学习叙事作品的表征。后期融合方法将为整个叙事工作训练的特征向量连接在一起。最后,我们将提出的方法应用于网络漫画(即通过网络连续发布的漫画)。通过应用向量表示来预测用户对网络漫画的偏好,对所提出的方法进行了评估。
{"title":"Learning Multi-modal Representations of Narrative Multimedia: a Case Study of Webtoons","authors":"O-Joun Lee, Jin-Taek Kim","doi":"10.1145/3400286.3418216","DOIUrl":"https://doi.org/10.1145/3400286.3418216","url":null,"abstract":"This study aims to learn task-agnostic representations of narrative multimedia. The existing studies focused on only stories in the narrative multimedia without considering their physical features. We propose a method for incorporating multi-modal features of the narrative multimedia into a unified vector representation. For narrative features, we embed character networks as with the existing studies. Textual features can be represented using the LSTM (Long-Short Term Memory) autoencoder. We apply the convolutional autoencoder to visual features. The convolutional autoencoder also can be used for the spectrograms of audible features. To combine these features, we propose two methods: early fusion and late fusion. The early fusion method composes representations of features on each scene. Then, we learn representations of a narrative work by predicting time-sequential changes in the features. The late fusion method concatenates feature vectors that are trained for allover the narrative work. Finally, we apply the proposed methods on webtoons (i.e., comics that are serially published through the web). The proposed methods have been evaluated by applying the vector representations to predicting the preferences of users for the webtoons.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Three-Factor Mutual Authentication Scheme for Cyber-Physical Systems 一种网络物理系统的三因素相互认证方案
Yung-Feng Lu, Chin-Fu Kuo, Hung-Ming Chen, Hsueh-Wen Tseng, Shih-Chun Chou, Yu-Ming Liao
Identity verification, security and confidentiality are the most important topics in computer system security. Many solutions have been proposed to users to enhance the security of authentication methods based on login passwords. Mainly through the use of two-factor authentication methods. Complex systems are difficult to build and to manage, one of the major problems for cyber-physical systems is the vulnerability of authentication and provide a high efficient tunnel to transmit the program or service data. Using more features for identification will increase the difficulty of fraud. The vigorous development of biometric identification technology in recent years has also made the identification of multiple traits more feasible. This paper presents a three-factor authentication with key agreement scheme for cyber-physical systems. The proposed mechanism integrates biometrics information, IMSI identifier and identity-based remote mutual authentication scheme on elliptic curve cryptography (ECC). It supports flawless three-factor and mutual authentication of participants and agreement of session key. The proposed mechanism does not require modifying the software of clients; thus, it is highly flexible. We believe the proposed mechanism is usable for cyber-physical systems applications.
身份验证、安全性和保密性是计算机系统安全的重要课题。为了提高基于登录密码的认证方法的安全性,人们提出了许多解决方案。主要通过使用双因素认证的方法。复杂的系统是难以构建和管理的,网络物理系统的主要问题之一是身份验证的脆弱性和提供一个高效的隧道来传输程序或业务数据。使用更多的特征进行识别将增加欺诈的难度。近年来生物特征识别技术的蓬勃发展也使得多性状的识别变得更加可行。提出了一种基于密钥协议的网络物理系统三因素认证方案。该机制集成了生物特征信息、IMSI标识符和基于身份的椭圆曲线密码(ECC)远程相互认证方案。它支持参与者完美的三因素互认证和会话密钥协议。提出的机制不需要修改客户端软件;因此,它是高度灵活的。我们相信所提出的机制可用于网络物理系统应用。
{"title":"A Three-Factor Mutual Authentication Scheme for Cyber-Physical Systems","authors":"Yung-Feng Lu, Chin-Fu Kuo, Hung-Ming Chen, Hsueh-Wen Tseng, Shih-Chun Chou, Yu-Ming Liao","doi":"10.1145/3400286.3418236","DOIUrl":"https://doi.org/10.1145/3400286.3418236","url":null,"abstract":"Identity verification, security and confidentiality are the most important topics in computer system security. Many solutions have been proposed to users to enhance the security of authentication methods based on login passwords. Mainly through the use of two-factor authentication methods. Complex systems are difficult to build and to manage, one of the major problems for cyber-physical systems is the vulnerability of authentication and provide a high efficient tunnel to transmit the program or service data. Using more features for identification will increase the difficulty of fraud. The vigorous development of biometric identification technology in recent years has also made the identification of multiple traits more feasible. This paper presents a three-factor authentication with key agreement scheme for cyber-physical systems. The proposed mechanism integrates biometrics information, IMSI identifier and identity-based remote mutual authentication scheme on elliptic curve cryptography (ECC). It supports flawless three-factor and mutual authentication of participants and agreement of session key. The proposed mechanism does not require modifying the software of clients; thus, it is highly flexible. We believe the proposed mechanism is usable for cyber-physical systems applications.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling User Loyalty for Korean Political YouTube Channels 韩国YouTube政治频道的用户忠诚度模型
Giang T. C. Tran, Luong Vuong Nguyen, Jason J. Jung, Jeonghun Han
In this paper, we propose a model based on user loyalty to understand user behavior. User loyalty is defined based on three factors, which are coverage, duration, and enthusiasm. In particular, we focus on a case study of user loyalty involving South Korean politics in online social networks. Our purpose is to understand user behaviors to help governments and politicians in decision-making. We deploy a web-based system (called TubePlunger) to collect information from Youtube videos and corresponding comments. Our system collects approximately 3M comments of more than 300K users from six channels for the initial dataset and 23 channels for testing the model. Firstly, we separate six channels into two sides: left-wing and right-wing. Based on their comments information in videos of the channel, we recognize the loyalty distribution of users who engaged in online political platforms is sharply polarized. In this step, we only consider the usernames instead of video and comment contents. Secondly, we apply the user loyalty model not only to define which channels of 23 testing channels belong to left-wing or right-wing but also to present the user loyalty distribution. The experimental results show the absolute consistency in user loyalty distribution with left-wing and right-wing in all three mentioned factors.
在本文中,我们提出了一个基于用户忠诚度的模型来理解用户行为。用户忠诚度的定义基于三个因素,即覆盖范围、持续时间和热情。特别地,我们专注于在线社交网络中涉及韩国政治的用户忠诚度的案例研究。我们的目的是了解用户行为,以帮助政府和政治家决策。我们部署了一个基于网络的系统(称为TubePlunger),从Youtube视频和相应的评论中收集信息。我们的系统从初始数据集的6个渠道和模型测试的23个渠道中收集了超过30万用户的大约3M条评论。首先,我们把六个渠道分成两个方面:左翼和右翼。根据他们在该频道视频中的评论信息,我们发现从事网络政治平台的用户的忠诚度分布出现了急剧的两极分化。在这一步中,我们只考虑用户名,而不考虑视频和评论内容。其次,运用用户忠诚度模型,界定了23个测试渠道中哪些渠道属于左翼,哪些渠道属于右翼,并给出了用户忠诚度的分布。实验结果表明,在上述三个因素中,左翼和右翼的用户忠诚度分布是绝对一致的。
{"title":"Modeling User Loyalty for Korean Political YouTube Channels","authors":"Giang T. C. Tran, Luong Vuong Nguyen, Jason J. Jung, Jeonghun Han","doi":"10.1145/3400286.3418254","DOIUrl":"https://doi.org/10.1145/3400286.3418254","url":null,"abstract":"In this paper, we propose a model based on user loyalty to understand user behavior. User loyalty is defined based on three factors, which are coverage, duration, and enthusiasm. In particular, we focus on a case study of user loyalty involving South Korean politics in online social networks. Our purpose is to understand user behaviors to help governments and politicians in decision-making. We deploy a web-based system (called TubePlunger) to collect information from Youtube videos and corresponding comments. Our system collects approximately 3M comments of more than 300K users from six channels for the initial dataset and 23 channels for testing the model. Firstly, we separate six channels into two sides: left-wing and right-wing. Based on their comments information in videos of the channel, we recognize the loyalty distribution of users who engaged in online political platforms is sharply polarized. In this step, we only consider the usernames instead of video and comment contents. Secondly, we apply the user loyalty model not only to define which channels of 23 testing channels belong to left-wing or right-wing but also to present the user loyalty distribution. The experimental results show the absolute consistency in user loyalty distribution with left-wing and right-wing in all three mentioned factors.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the International Conference on Research in Adaptive and Convergent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1