首页 > 最新文献

Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

英文 中文
Deep-MSP: Morphological Sentence Pattern Recognition based on ConvNet 基于ConvNet的形态句模式识别
S. Park, Youngsub Han, Yanggon Kim
Sentiment analysis aims to observe and summarize a person's opinions or emotional states through textual data. Despite the demands of sentiment analysis methods for analyzing social media data, fundamental challenges still remained because user-generated data is unstructured, unlabeled, and "noisy". The morphological sentence pattern (MSP) model, an aspect-based lexicon building method, is proposed for dealing with the problems of the transitional sentiment analysis by recognizing the "aspect-expression" in a sentence. However, there are limitations on this model. Firstly, since the MSP model is based on the pattern matching, the sentences cannot be analyzed when the pattern does not exist in the lexicon. Secondly, the patterns should be continuously updated to maintain a high level of accuracy. In this paper, to compensate for the limitations of the MSP model, we proposed Deep-MSP, a deep learning approach based on multiple convolutional neural networks (ConvNet or CNN), designed to recognize whether or not the target part-of-speech has potential to be the aspect-expression from not only existing patterns but also new patterns.
情感分析的目的是通过文本数据观察和总结一个人的观点或情绪状态。尽管情感分析方法对分析社交媒体数据有需求,但由于用户生成的数据是非结构化的、未标记的和“嘈杂的”,基本挑战仍然存在。形态学句式(MSP)模型是一种基于方面的词汇构建方法,通过识别句子中的“方面表达”来解决过渡情感分析的问题。然而,这种模式也有局限性。首先,由于MSP模型是基于模式匹配的,当模式在词典中不存在时,就无法分析句子。其次,模式应该不断更新,以保持高水平的准确性。在本文中,为了弥补MSP模型的局限性,我们提出了deep -MSP,这是一种基于多个卷积神经网络(ConvNet或CNN)的深度学习方法,旨在从现有模式和新模式中识别目标词性是否有可能成为方面表达。
{"title":"Deep-MSP: Morphological Sentence Pattern Recognition based on ConvNet","authors":"S. Park, Youngsub Han, Yanggon Kim","doi":"10.1145/3129676.3129702","DOIUrl":"https://doi.org/10.1145/3129676.3129702","url":null,"abstract":"Sentiment analysis aims to observe and summarize a person's opinions or emotional states through textual data. Despite the demands of sentiment analysis methods for analyzing social media data, fundamental challenges still remained because user-generated data is unstructured, unlabeled, and \"noisy\". The morphological sentence pattern (MSP) model, an aspect-based lexicon building method, is proposed for dealing with the problems of the transitional sentiment analysis by recognizing the \"aspect-expression\" in a sentence. However, there are limitations on this model. Firstly, since the MSP model is based on the pattern matching, the sentences cannot be analyzed when the pattern does not exist in the lexicon. Secondly, the patterns should be continuously updated to maintain a high level of accuracy. In this paper, to compensate for the limitations of the MSP model, we proposed Deep-MSP, a deep learning approach based on multiple convolutional neural networks (ConvNet or CNN), designed to recognize whether or not the target part-of-speech has potential to be the aspect-expression from not only existing patterns but also new patterns.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128238788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Make Efficient Decoy Files for Ransomware Detection? 如何为勒索软件检测制作有效的诱饵文件?
Jong-Seop Lee, Jinwoo Lee, Jiman Hong
Recently, Ransomware has been rapidly increasing and is becoming far more dangerous than other common malware types. Unlike previous versions of Ransomware that infect email attachments or access certain sites, the new Ransomware, such as WannaCryptor, corrupts data even when the PC is connected to the Internet. Therefore, many studies are being conducted to detect and defend Ransomware. However, existing studies on Ransomware detection cannot effectively detect and defend the new Ransomware because it detects Ransomware using signature databases or monitoring specific activities of processes. In this paper, we propose a method to make decoy files for detecting Ransomwares efficiently. The proposed method is based on the analysis of the behaviors of existing Ransomwares at the source code level.
最近,勒索软件一直在迅速增加,并且变得比其他常见的恶意软件类型更加危险。以前版本的勒索软件会感染电子邮件附件或访问某些网站,而新版本的勒索软件,如WannaCryptor,即使在电脑连接到互联网时也会破坏数据。因此,许多研究正在进行,以检测和防御勒索软件。然而,现有的勒索软件检测研究由于使用特征库或监控进程的特定活动来检测勒索软件,无法有效地检测和防御新型勒索软件。本文提出了一种有效检测勒索软件的诱饵文件制作方法。该方法基于对现有勒索软件在源代码级的行为分析。
{"title":"How to Make Efficient Decoy Files for Ransomware Detection?","authors":"Jong-Seop Lee, Jinwoo Lee, Jiman Hong","doi":"10.1145/3129676.3129713","DOIUrl":"https://doi.org/10.1145/3129676.3129713","url":null,"abstract":"Recently, Ransomware has been rapidly increasing and is becoming far more dangerous than other common malware types. Unlike previous versions of Ransomware that infect email attachments or access certain sites, the new Ransomware, such as WannaCryptor, corrupts data even when the PC is connected to the Internet. Therefore, many studies are being conducted to detect and defend Ransomware. However, existing studies on Ransomware detection cannot effectively detect and defend the new Ransomware because it detects Ransomware using signature databases or monitoring specific activities of processes. In this paper, we propose a method to make decoy files for detecting Ransomwares efficiently. The proposed method is based on the analysis of the behaviors of existing Ransomwares at the source code level.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Isolated Handwritten Arabic Character Recognition Using Freeman Chain Code and Tangent Line 使用Freeman链码和切线的孤立手写阿拉伯字符识别
Hassan Althobaiti, Kevat Shah, Chao Lu
Recognition of handwritten Arabic text is a difficult task since there are many challenges and obstacles that face any handwritten Arabic OCR system. Some of them include, but are not limited to: different handwriting styles, different characters that have similar contours, and the same character may have different forms according to its position in a sentence. Several approaches have been attempted to accurately recognize handwritten Arabic characters. However, the issue of the accuracy of Arabic OCR in handwritten text continues to be a dilemma. We will describe the general difficulties in handwritten Arabic language text, and propose a novel approach for identifying isolated handwritten Arabic characters using encoded Freeman chain code. We will also apply a novel approach of using change in tangents to classify characters. Several handwritten Arabic characters were trained and tested with our own dataset. The results showed the efficacy of our approach for recognizing isolated handwritten Arabic characters. The average accuracy rate of our method ranges from 92% to 97%.
手写阿拉伯语文本的识别是一项艰巨的任务,因为任何手写阿拉伯语OCR系统都面临许多挑战和障碍。其中包括但不限于:不同的书写风格,轮廓相似的不同字符,同一字符根据其在句子中的位置可能有不同的形式。人们尝试了几种方法来准确识别手写的阿拉伯字符。然而,阿拉伯语OCR在手写文本中的准确性问题仍然是一个难题。我们将描述手写阿拉伯语文本的一般困难,并提出一种使用编码弗里曼链码识别孤立手写阿拉伯语字符的新方法。我们还将应用一种使用切线变化对字符进行分类的新方法。我们用自己的数据集训练和测试了几个手写的阿拉伯字符。结果表明,我们的方法在识别孤立的手写阿拉伯字符方面是有效的。该方法的平均准确率在92% ~ 97%之间。
{"title":"Isolated Handwritten Arabic Character Recognition Using Freeman Chain Code and Tangent Line","authors":"Hassan Althobaiti, Kevat Shah, Chao Lu","doi":"10.1145/3129676.3129678","DOIUrl":"https://doi.org/10.1145/3129676.3129678","url":null,"abstract":"Recognition of handwritten Arabic text is a difficult task since there are many challenges and obstacles that face any handwritten Arabic OCR system. Some of them include, but are not limited to: different handwriting styles, different characters that have similar contours, and the same character may have different forms according to its position in a sentence. Several approaches have been attempted to accurately recognize handwritten Arabic characters. However, the issue of the accuracy of Arabic OCR in handwritten text continues to be a dilemma. We will describe the general difficulties in handwritten Arabic language text, and propose a novel approach for identifying isolated handwritten Arabic characters using encoded Freeman chain code. We will also apply a novel approach of using change in tangents to classify characters. Several handwritten Arabic characters were trained and tested with our own dataset. The results showed the efficacy of our approach for recognizing isolated handwritten Arabic characters. The average accuracy rate of our method ranges from 92% to 97%.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Extracting the Representative API Call Patterns of Malware Families Using Recurrent Neural Network 基于递归神经网络的恶意软件家族API调用模式提取
Iltaek Kwon, E. Im
With thousands of malware samples pouring out every day, how can we reduce malware analysis time and detect them effectively? Malware family classification provides one of good measures to predict characteristics of unknown malware since malware belonging to the same family can have similar features. Static analysis and dynamic analysis are techniques to obtain features to be used for classifying malware samples to their families. Static analysis performs analysis based on specific signatures included in the malware. Static analysis has the advantages that the scope of the analysis covers the entire code, and the analysis can be performed without executing the malware. However, it is very difficult to detect or classify malware variants with only the results of the static analysis, because malware developers use polymorphic or encryption techniques to avoid static analysis-based detection of anti-virus software. Dynamic analysis analyzes malware behaviors, so the results of dynamic analysis can be used to detect or classify malware variants. One of dynamic features that can be used to detect or classify malware variants is API call sequences. In this paper, we propose a novel method to extract representative API call patterns of malware families using Recurrent Neural Network (RNN). We conducted experiments with 787 malware samples belonging to 9 families. In our experiments, we extracted representative API call patterns of 9 malware families on 551 samples as a training set and performed classification on the 236 samples as a test set. Classification accuracy results using API call patterns extracted from RNN were measured as 71% on average. The results show the feasibility of our approach using RNN to extract representative API call pattern of malware families for malware family classification.
每天都有成千上万的恶意软件样本流出,我们如何减少恶意软件的分析时间并有效地检测它们?恶意软件家族分类是预测未知恶意软件特征的一种很好的方法,因为属于同一家族的恶意软件可能具有相似的特征。静态分析和动态分析是获取特征的技术,用于对恶意软件样本进行分类。静态分析基于恶意软件中包含的特定签名进行分析。静态分析的优点是分析的范围覆盖了整个代码,并且可以在不执行恶意软件的情况下执行分析。然而,仅用静态分析的结果来检测或分类恶意软件变体是非常困难的,因为恶意软件开发人员使用多态或加密技术来避免基于静态分析的反病毒软件检测。动态分析是对恶意软件的行为进行分析,可以利用动态分析的结果对恶意软件变种进行检测或分类。可用于检测或分类恶意软件变体的动态特性之一是API调用序列。本文提出了一种利用递归神经网络(RNN)提取具有代表性的恶意软件API调用模式的新方法。我们对9个家族的787个恶意软件样本进行了实验。在我们的实验中,我们在551个样本上提取了9个恶意软件家族的代表性API调用模式作为训练集,并在236个样本上进行分类作为测试集。使用从RNN中提取的API调用模式的分类精度结果平均为71%。结果表明,利用RNN提取具有代表性的恶意软件API调用模式进行恶意软件分类的方法是可行的。
{"title":"Extracting the Representative API Call Patterns of Malware Families Using Recurrent Neural Network","authors":"Iltaek Kwon, E. Im","doi":"10.1145/3129676.3129712","DOIUrl":"https://doi.org/10.1145/3129676.3129712","url":null,"abstract":"With thousands of malware samples pouring out every day, how can we reduce malware analysis time and detect them effectively? Malware family classification provides one of good measures to predict characteristics of unknown malware since malware belonging to the same family can have similar features. Static analysis and dynamic analysis are techniques to obtain features to be used for classifying malware samples to their families. Static analysis performs analysis based on specific signatures included in the malware. Static analysis has the advantages that the scope of the analysis covers the entire code, and the analysis can be performed without executing the malware. However, it is very difficult to detect or classify malware variants with only the results of the static analysis, because malware developers use polymorphic or encryption techniques to avoid static analysis-based detection of anti-virus software. Dynamic analysis analyzes malware behaviors, so the results of dynamic analysis can be used to detect or classify malware variants. One of dynamic features that can be used to detect or classify malware variants is API call sequences. In this paper, we propose a novel method to extract representative API call patterns of malware families using Recurrent Neural Network (RNN). We conducted experiments with 787 malware samples belonging to 9 families. In our experiments, we extracted representative API call patterns of 9 malware families on 551 samples as a training set and performed classification on the 236 samples as a test set. Classification accuracy results using API call patterns extracted from RNN were measured as 71% on average. The results show the feasibility of our approach using RNN to extract representative API call pattern of malware families for malware family classification.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132871836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Novelty Detection Approach to Classification of Breast Tissue Containing Microcalcifications 一种新的乳腺组织微钙化分类检测方法
E. Avşar, Kurtuluş Buluş
Appearance of microcalcifications in mammograms is one of the early signs of breast cancer. In this work, one-class support vector machines (SVM), a novelty detection method, is utilized for detection of the mammogram samples containing microcalcifications. These samples are small regions of the mammograms with the size of 25x25 pixels. Each of the samples are represented by 25 features that are already proven to be accurate identifiers of the microcalcifications. Since the obtained classification performance of one-class SVM with all these 25 features is very low (accuracy = 0.5575, sensitivity = 0.2107, specificity = 0.9042), number of these features is reduced by using principal component analysis (PCA). Training a classifier only with the PCA features achieves an improved performance (accuracy = 0.9464, sensitivity = 1.0000, specificity = 0.8927) where the number of false negative samples is reduced from 206 to 0.
乳房x光检查中出现微钙化是乳腺癌的早期征兆之一。本文将一类支持向量机(SVM)作为一种新颖的检测方法,用于检测含有微钙化的乳房x光片样本。这些样本是乳房x光片的小区域,大小为25x25像素。每个样品都有25个特征,这些特征已经被证明是微钙化的准确标识符。由于这25个特征得到的单类支持向量机分类性能很低(准确率= 0.5575,灵敏度= 0.2107,特异性= 0.9042),因此采用主成分分析(PCA)减少这些特征的数量。仅使用PCA特征训练分类器可以获得更好的性能(准确率= 0.9464,灵敏度= 1.0000,特异性= 0.8927),其中假阴性样本的数量从206个减少到0个。
{"title":"A Novelty Detection Approach to Classification of Breast Tissue Containing Microcalcifications","authors":"E. Avşar, Kurtuluş Buluş","doi":"10.1145/3129676.3129680","DOIUrl":"https://doi.org/10.1145/3129676.3129680","url":null,"abstract":"Appearance of microcalcifications in mammograms is one of the early signs of breast cancer. In this work, one-class support vector machines (SVM), a novelty detection method, is utilized for detection of the mammogram samples containing microcalcifications. These samples are small regions of the mammograms with the size of 25x25 pixels. Each of the samples are represented by 25 features that are already proven to be accurate identifiers of the microcalcifications. Since the obtained classification performance of one-class SVM with all these 25 features is very low (accuracy = 0.5575, sensitivity = 0.2107, specificity = 0.9042), number of these features is reduced by using principal component analysis (PCA). Training a classifier only with the PCA features achieves an improved performance (accuracy = 0.9464, sensitivity = 1.0000, specificity = 0.8927) where the number of false negative samples is reduced from 206 to 0.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Resource-centric Services for Service Adaptation in Cyber Physical Systems 面向网络物理系统服务适应的资源中心服务建模
V. Alagar, Kaiyu Wan
The strategic application domains of Cyber Physical Systems (CPS) include health care, transportation, management of large-scale physical infrastructures, and power plants. In all these applications the systems need to adapt, depending upon the availability of reliable resources, in order to provide trustworthy services at every context of its execution. Hence, CPS is viewed as a large distributed system of service and supply chain management, in which services are resource-centric. For service adaptation, resource quality and availability are determining factors, especially during emergencies. In this paper an abstract service-oriented description of CPS is given with emphasis on resource and service providers and requesters, the context space created by them is defined, and adaptation rules that arise from the context constraints and contracts defined by them are explained.
网络物理系统(CPS)的战略应用领域包括医疗保健、交通运输、大型物理基础设施管理和发电厂。在所有这些应用程序中,系统需要根据可靠资源的可用性进行调整,以便在其执行的每个上下文中提供可信的服务。因此,CPS被视为服务和供应链管理的大型分布式系统,其中服务以资源为中心。对于业务适应,资源质量和可用性是决定因素,特别是在紧急情况下。本文对CPS进行了面向服务的抽象描述,重点描述了资源和服务提供者以及请求者,定义了它们所创建的上下文空间,并解释了它们所定义的上下文约束和契约所产生的自适应规则。
{"title":"Modeling Resource-centric Services for Service Adaptation in Cyber Physical Systems","authors":"V. Alagar, Kaiyu Wan","doi":"10.1145/3129676.3129694","DOIUrl":"https://doi.org/10.1145/3129676.3129694","url":null,"abstract":"The strategic application domains of Cyber Physical Systems (CPS) include health care, transportation, management of large-scale physical infrastructures, and power plants. In all these applications the systems need to adapt, depending upon the availability of reliable resources, in order to provide trustworthy services at every context of its execution. Hence, CPS is viewed as a large distributed system of service and supply chain management, in which services are resource-centric. For service adaptation, resource quality and availability are determining factors, especially during emergencies. In this paper an abstract service-oriented description of CPS is given with emphasis on resource and service providers and requesters, the context space created by them is defined, and adaptation rules that arise from the context constraints and contracts defined by them are explained.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122839675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Framework supporting IPMI and DCMI based on Open BMC 基于Open BMC的支持IPMI和DCMI的框架设计
J. An, Younghwan Kim, Changkwon Park
This study aims at developing and applying a framework that supports IPMI(Intelligent Platform Management Interface) and DCMI(Data Center Manageability Interface) based on open BMC(Board Support Controller). The proposed framework includes IPMI 2.0-based control firmware and DCMI technology that enables server board management in the data center. The existing BMC has been provided in the form of a private binary by a third-party vendor, and needs to be consulted with vendors when changes such as addition / deletion are required. In addition, the functionality provided by BMC has been determined by vendor-specific characteristics. In this paper, the proposed open BMC provides BMC IDE environment as well as code release. Therefore, user (developer) can configure BMC function more easily, and it is designed to implement and delete additional function if necessary. The designed BMC IDE environment not only supports BMC Application development, but also helps board system providers to design and evaluate IPMI library and DCMI library.
本研究旨在开发和应用一个基于开放BMC(Board Support Controller)的支持IPMI(Intelligent Platform Management Interface)和DCMI(Data Center Manageability Interface)的框架。提出的框架包括基于IPMI 2.0的控制固件和支持数据中心服务器板管理的DCMI技术。现有的BMC已由第三方供应商以私有二进制文件的形式提供,当需要进行诸如添加/删除之类的更改时,需要与供应商协商。此外,BMC提供的功能是由特定于供应商的特性决定的。本文提出的开放式BMC提供BMC IDE环境和代码发布。因此,用户(开发人员)可以更轻松地配置BMC功能,并且可以根据需要实现和删除附加功能。所设计的BMC IDE环境不仅支持BMC应用程序的开发,还可以帮助板系统供应商设计和评估IPMI库和DCMI库。
{"title":"Design of Framework supporting IPMI and DCMI based on Open BMC","authors":"J. An, Younghwan Kim, Changkwon Park","doi":"10.1145/3129676.3129706","DOIUrl":"https://doi.org/10.1145/3129676.3129706","url":null,"abstract":"This study aims at developing and applying a framework that supports IPMI(Intelligent Platform Management Interface) and DCMI(Data Center Manageability Interface) based on open BMC(Board Support Controller). The proposed framework includes IPMI 2.0-based control firmware and DCMI technology that enables server board management in the data center. The existing BMC has been provided in the form of a private binary by a third-party vendor, and needs to be consulted with vendors when changes such as addition / deletion are required. In addition, the functionality provided by BMC has been determined by vendor-specific characteristics. In this paper, the proposed open BMC provides BMC IDE environment as well as code release. Therefore, user (developer) can configure BMC function more easily, and it is designed to implement and delete additional function if necessary. The designed BMC IDE environment not only supports BMC Application development, but also helps board system providers to design and evaluate IPMI library and DCMI library.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122285860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Classifying Dynamic Graph Bags 关于动态图袋分类的研究
Dong-Kyu Chae, B. Kim, Seung-Ho Kim, Sang-Wook Kim
In this paper, we introduce a novel problem of dynamic graph bag classification, and propose a method to solve this problem. Here, a graph bag (simply, bag) corresponds to a training object that contains one or multiple graphs. Dynamic bag classification aims to build a classification model for bags which are presented in a dynamic fashion, i.e., emerging of new bags or graphs. Our proposed solution for this problem can gradually update the classification model whenever such changes are made to a bag dataset, rather than building a model from the scratch. We demonstrate the effectiveness of our proposed method by our extensive evaluation on a real-world graph dataset.
本文提出了一种新的动态图袋分类问题,并提出了一种解决该问题的方法。这里,图包(简称为袋)对应于包含一个或多个图的训练对象。动态袋分类的目的是对以动态方式呈现的袋建立分类模型,即出现新的袋或图。我们针对这个问题提出的解决方案可以在对袋子数据集进行此类更改时逐步更新分类模型,而不是从头开始构建模型。我们通过对真实世界的图形数据集进行广泛的评估来证明我们提出的方法的有效性。
{"title":"On Classifying Dynamic Graph Bags","authors":"Dong-Kyu Chae, B. Kim, Seung-Ho Kim, Sang-Wook Kim","doi":"10.1145/3129676.3129730","DOIUrl":"https://doi.org/10.1145/3129676.3129730","url":null,"abstract":"In this paper, we introduce a novel problem of dynamic graph bag classification, and propose a method to solve this problem. Here, a graph bag (simply, bag) corresponds to a training object that contains one or multiple graphs. Dynamic bag classification aims to build a classification model for bags which are presented in a dynamic fashion, i.e., emerging of new bags or graphs. Our proposed solution for this problem can gradually update the classification model whenever such changes are made to a bag dataset, rather than building a model from the scratch. We demonstrate the effectiveness of our proposed method by our extensive evaluation on a real-world graph dataset.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129736937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Virtual CPU Scheduling Model for I/O Performance in Paravirtualized Environments 半虚拟化环境下I/O性能的虚拟CPU调度模型
Jinmang Jung, Jisu Park, Seoyeon Kim, Mhanwoo Heo, Jiman Hong
Paravirtualization manages virtual machines and virtual resources efficiently by the communication between the virtualization layer and modified guest OSes. In a paravirtual environment, the I/O response of a virtual machine is hard to approach that of a native OS because a virtual I/O is asynchronously processed by the virtualization layer without hardware supports. Virtual CPU scheduling algorithms have been proposed to improve the I/O performance. However, existing solutions lack the I/O fairness when virtual machines have various or skewed of workloads because they put the I/O performance of latency-sensitive vCPUs before vCPUs that are not. In this paper, we design a credit based vCPU scheduling model for I/O performance of virtual machines by using a loan and repayment system. Credit rating of each virtual CPU is periodically evaluated by observing its resource consumption pattern and a virtual CPU cannot be allocated more resources until the repayment is finished.
准虚拟化通过虚拟化层和修改后的来宾操作系统之间的通信,有效地管理虚拟机和虚拟资源。在半虚拟环境中,虚拟机的I/O响应很难接近本机操作系统,因为虚拟I/O是由虚拟化层异步处理的,没有硬件支持。为了提高I/O性能,提出了虚拟CPU调度算法。然而,当虚拟机具有各种或倾斜的工作负载时,现有的解决方案缺乏I/O公平性,因为它们将对延迟敏感的vcpu的I/O性能放在不敏感的vcpu之前。本文设计了一种基于信用的虚拟机I/O性能调度模型,该模型采用贷款和还款系统。通过观察每个虚拟CPU的资源消耗模式,定期评估每个虚拟CPU的信用等级,并且在偿还完成之前,不能为虚拟CPU分配更多的资源。
{"title":"A Virtual CPU Scheduling Model for I/O Performance in Paravirtualized Environments","authors":"Jinmang Jung, Jisu Park, Seoyeon Kim, Mhanwoo Heo, Jiman Hong","doi":"10.1145/3129676.3131703","DOIUrl":"https://doi.org/10.1145/3129676.3131703","url":null,"abstract":"Paravirtualization manages virtual machines and virtual resources efficiently by the communication between the virtualization layer and modified guest OSes. In a paravirtual environment, the I/O response of a virtual machine is hard to approach that of a native OS because a virtual I/O is asynchronously processed by the virtualization layer without hardware supports. Virtual CPU scheduling algorithms have been proposed to improve the I/O performance. However, existing solutions lack the I/O fairness when virtual machines have various or skewed of workloads because they put the I/O performance of latency-sensitive vCPUs before vCPUs that are not. In this paper, we design a credit based vCPU scheduling model for I/O performance of virtual machines by using a loan and repayment system. Credit rating of each virtual CPU is periodically evaluated by observing its resource consumption pattern and a virtual CPU cannot be allocated more resources until the repayment is finished.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Synthetic Light Field Rendering on Heterogeneous Systems Using a Pipeline-Based Runtime Design 基于流水线的运行时设计在异构系统上高效合成光场渲染
Chih-Chen Kao, Liang-Chi Tseng, W. Hsu
The research interest of real-time global illumination has increased due to the growing demand of graphics applications such as virtual reality. Recently, the design that combines Image-based rendering (IBR) and Ray-Tracing to create Synthetic Light Field (SLF) has been widely adopted to provide delicate visual experience for multiple viewpoints at an acceptable frame rate. However, despite its parallel characteristic, constructing a SLF is still inefficient on modern Graphics Processing Unit (GPU) due to the irregularities. For instance, the issues caused by branch divergence, early-termination and irregular memory access prolong the execution time that cannot be simply resolved by workload merging. In this paper, we proposed a Runtime design that reorganizes the execution into a pipeline-based pattern with grouping of primary rays. With this approach, the number of valid rays can be maintained at a high level with less divergence of paths. Based on the experiment on a heterogeneous system, the throughput becomes 2.48 times higher than the original on average.
由于虚拟现实等图形应用的需求日益增长,实时全局照明的研究兴趣日益增加。近年来,结合基于图像的渲染(IBR)和光线追踪(Ray-Tracing)来创建合成光场(SLF)的设计已被广泛采用,以在可接受的帧速率下为多视点提供精致的视觉体验。然而,尽管具有并行特性,由于不规则性,在现代图形处理单元(GPU)上构建SLF仍然效率低下。例如,分支分歧、提前终止和不规则内存访问导致的问题会延长执行时间,而这些问题不能简单地通过工作负载合并来解决。在本文中,我们提出了一种运行时设计,该设计将执行重新组织为基于管道的模式,并对初级射线进行分组。通过这种方法,有效射线的数量可以保持在一个较高的水平,并且路径的散度较小。通过在异构系统上的实验,吞吐量平均提高了2.48倍。
{"title":"Efficient Synthetic Light Field Rendering on Heterogeneous Systems Using a Pipeline-Based Runtime Design","authors":"Chih-Chen Kao, Liang-Chi Tseng, W. Hsu","doi":"10.1145/3129676.3129677","DOIUrl":"https://doi.org/10.1145/3129676.3129677","url":null,"abstract":"The research interest of real-time global illumination has increased due to the growing demand of graphics applications such as virtual reality. Recently, the design that combines Image-based rendering (IBR) and Ray-Tracing to create Synthetic Light Field (SLF) has been widely adopted to provide delicate visual experience for multiple viewpoints at an acceptable frame rate. However, despite its parallel characteristic, constructing a SLF is still inefficient on modern Graphics Processing Unit (GPU) due to the irregularities. For instance, the issues caused by branch divergence, early-termination and irregular memory access prolong the execution time that cannot be simply resolved by workload merging. In this paper, we proposed a Runtime design that reorganizes the execution into a pipeline-based pattern with grouping of primary rays. With this approach, the number of valid rays can be maintained at a high level with less divergence of paths. Based on the experiment on a heterogeneous system, the throughput becomes 2.48 times higher than the original on average.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"31 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the International Conference on Research in Adaptive and Convergent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1