首页 > 最新文献

2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
Interplanetary File System in Logistic Networks: a Review 物流网络中的行星际文件系统研究进展
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00268
Vittorio Capocasale, S. Musso, G. Perboli
Logistics 4.0 is a revolution based on information sharing and digitalization. Thus, Logistics 4.0 leads to the generation of huge amounts of data in short periods, and the data bloating problem must be addressed. One possible solution is the interplanetary file system (IPFS), which guarantees data replication and availability while limiting the storage of overlapping data. This study is the first literature review on IPFS and focuses on its application to the logistic sector. The main findings of this study are: the topic is gaining interest, but the solutions proposed in the literature were still in the early stages; IPFS was always coupled with the blockchain technology, and all of the authors used similar strategies to integrate them; the authors identified many advantages in the use of IPFS, but did not analyze in-depth the related disadvantages.
物流4.0是一场基于信息共享和数字化的革命。因此,物流4.0导致在短时间内产生大量数据,必须解决数据膨胀问题。一个可能的解决方案是星际文件系统(IPFS),它保证数据复制和可用性,同时限制重叠数据的存储。本研究首次对IPFS进行文献综述,重点研究IPFS在物流领域的应用。本研究的主要发现是:话题越来越受关注,但文献中提出的解决方案仍处于早期阶段;IPFS总是与区块链技术相结合,所有的作者都使用了类似的策略来整合它们;作者指出了IPFS使用的许多优点,但没有深入分析相关的缺点。
{"title":"Interplanetary File System in Logistic Networks: a Review","authors":"Vittorio Capocasale, S. Musso, G. Perboli","doi":"10.1109/COMPSAC54236.2022.00268","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00268","url":null,"abstract":"Logistics 4.0 is a revolution based on information sharing and digitalization. Thus, Logistics 4.0 leads to the generation of huge amounts of data in short periods, and the data bloating problem must be addressed. One possible solution is the interplanetary file system (IPFS), which guarantees data replication and availability while limiting the storage of overlapping data. This study is the first literature review on IPFS and focuses on its application to the logistic sector. The main findings of this study are: the topic is gaining interest, but the solutions proposed in the literature were still in the early stages; IPFS was always coupled with the blockchain technology, and all of the authors used similar strategies to integrate them; the authors identified many advantages in the use of IPFS, but did not analyze in-depth the related disadvantages.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Cross-sectional Regime Identification for Financial Market Prediction 金融市场预测的动态横截面制度识别
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00049
Rongbo Chen, Kunpeng Xun, Jean-Marc Patenaude, Shengrui Wang
We investigate issues related to dynamic cross-sectional regime identification for financial market prediction. A financial market can be viewed as an ecosystem regulated by regimes that may switch at different time points. In most existing regime-based prediction models, regimes can only switch, according to a static transition probability matrix, among a fixed set of regimes identified on training data due to the fact that they lack in mechanism of identifying new regimes on test data. This prevents them from being effective as the financial markets are time-evolving and may fall into a new regime at any future time. Moreover, most of them only handle single time series, and are not capable of dealing with multiple time series. These shortcomings prompted us to devise a dynamic cross-sectional regime identification model for time series prediction. The new model is defined on a multi-time-series system, with time-varying transition probabilities, and can identify new cross-sectional regimes dynamically from the time-evolving financial market. Experimental results on real-world financial datasets illustrate the promising performance and suitability of our model.
我们研究了与金融市场预测的动态横截面制度识别相关的问题。金融市场可以被视为一个生态系统,由可能在不同时间点发生变化的制度所监管。在现有的大多数基于状态的预测模型中,由于缺乏在测试数据上识别新状态的机制,状态只能根据静态转移概率矩阵在训练数据上识别的一组固定状态之间切换。这阻碍了它们的有效性,因为金融市场是随时间变化的,可能在未来的任何时候陷入新的体制。而且,它们大多只能处理单个时间序列,而不能处理多个时间序列。这些缺点促使我们设计一个动态横截面状态识别模型用于时间序列预测。该模型定义在具有时变过渡概率的多时间序列系统上,能够从时变金融市场中动态识别新的横截面制度。在真实金融数据集上的实验结果表明,我们的模型具有良好的性能和适用性。
{"title":"Dynamic Cross-sectional Regime Identification for Financial Market Prediction","authors":"Rongbo Chen, Kunpeng Xun, Jean-Marc Patenaude, Shengrui Wang","doi":"10.1109/COMPSAC54236.2022.00049","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00049","url":null,"abstract":"We investigate issues related to dynamic cross-sectional regime identification for financial market prediction. A financial market can be viewed as an ecosystem regulated by regimes that may switch at different time points. In most existing regime-based prediction models, regimes can only switch, according to a static transition probability matrix, among a fixed set of regimes identified on training data due to the fact that they lack in mechanism of identifying new regimes on test data. This prevents them from being effective as the financial markets are time-evolving and may fall into a new regime at any future time. Moreover, most of them only handle single time series, and are not capable of dealing with multiple time series. These shortcomings prompted us to devise a dynamic cross-sectional regime identification model for time series prediction. The new model is defined on a multi-time-series system, with time-varying transition probabilities, and can identify new cross-sectional regimes dynamically from the time-evolving financial market. Experimental results on real-world financial datasets illustrate the promising performance and suitability of our model.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129934891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Extention of Lazy Abstraction and Refinement for Program Verification 程序验证的延迟抽象和细化扩展
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00278
Haowei Liang, Chunyan Hou, Jinsong Wang, Chen Chen
Predicate abstraction techniques have been shown to be a powerful technique for verifying imperative programs, which can solve the problem of state space explosion pretty well. Among them, lazy abstraction with interpolation-based refinement also called the IMPACT approach has gained increasing popularity in the last years. However, despite its high efficiency, the IMPACT fails to work out some kinds of the programs because the interpolants produced by interpolant solver are so bad to make the verification divergent. According to the features of some of these programs, we extend the IMPACT method to make it applicable for them. In addition to its basic ones, two other operations are introduced to the IMPACT refinement to guide it produce reasonal interpolants which are helpful for the verification process to converge. The experiments on the benchmark of SV-COMP2020 show the potential of the extended approach.
谓词抽象技术是检验命令式程序的一种强有力的技术,它可以很好地解决状态空间爆炸问题。其中,基于插值的延迟抽象(也称为IMPACT)方法近年来越来越受欢迎。然而,尽管IMPACT的效率很高,但由于插值求解器产生的插值量很差,导致验证发散,因此无法求解出某些类型的程序。根据其中一些项目的特点,我们对IMPACT方法进行了扩展,使其适用于这些项目。在IMPACT精化的基础上,引入了另外两种操作,引导其产生合理的插值,有利于验证过程收敛。在SV-COMP2020基准上的实验表明了该扩展方法的潜力。
{"title":"An Extention of Lazy Abstraction and Refinement for Program Verification","authors":"Haowei Liang, Chunyan Hou, Jinsong Wang, Chen Chen","doi":"10.1109/COMPSAC54236.2022.00278","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00278","url":null,"abstract":"Predicate abstraction techniques have been shown to be a powerful technique for verifying imperative programs, which can solve the problem of state space explosion pretty well. Among them, lazy abstraction with interpolation-based refinement also called the IMPACT approach has gained increasing popularity in the last years. However, despite its high efficiency, the IMPACT fails to work out some kinds of the programs because the interpolants produced by interpolant solver are so bad to make the verification divergent. According to the features of some of these programs, we extend the IMPACT method to make it applicable for them. In addition to its basic ones, two other operations are introduced to the IMPACT refinement to guide it produce reasonal interpolants which are helpful for the verification process to converge. The experiments on the benchmark of SV-COMP2020 show the potential of the extended approach.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An architectural framework for enabling secure decentralized P2P messaging using DIDComm and Bluetooth Low Energy 一个架构框架,用于使用DIDComm和低功耗蓝牙实现安全的分散P2P消息传递
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00251
Alexander Heireth Enge, Abylay Satybaldy, M. Nowostawski
Self-sovereign identity (SSI) is an emerging concept that shifts the control of identity to the person or entity to whom it belongs to without the need to rely on any centralized administrative authority. Within the SSI model, a digital identity wallet enables a user to establish relationships and interact with third parties in a secure and trusted manner. However, in order to perform various operations such as messaging and credential exchange, these usually require internet access. In some situations, this is not possible, and entities should be able to communicate independently of any external infrastructure in an offline setting. The objective of this paper is to design a proof-of-concept that would allow for secure, trustworthy, and privacy-preserving decentralized peer-to-peer communication without the need for any external networking infrastructure. For this, we investigate a particular case involving DIDComm and Bluetooth LE. We identify requirements for the architecture and propose an architectural framework that allows two entities to securely communicate. To show our concept's feasibility, we evaluate the existing technologies that could be used in the proposed architecture. Our findings indicate that this approach has the potential to enable a wide range of interesting use cases and can be integrated into existing digital identity wallet solutions to extend the capabilities of offline messaging in a secure and decentralized manner that goes beyond the current models that often rely on Internet connectivity.
自我主权身份(Self-sovereign identity, SSI)是一个新兴的概念,它将身份的控制权转移到它所属的个人或实体,而不需要依赖任何集中的管理机构。在SSI模型中,数字身份钱包使用户能够以安全和可信的方式与第三方建立关系并进行交互。然而,为了执行诸如消息传递和凭证交换之类的各种操作,通常需要访问internet。在某些情况下,这是不可能的,实体应该能够在脱机设置中独立于任何外部基础设施进行通信。本文的目标是设计一个概念验证,允许安全、可信和保护隐私的去中心化点对点通信,而不需要任何外部网络基础设施。为此,我们调查了一个涉及DIDComm和Bluetooth LE的特定案例。我们确定了体系结构的需求,并提出了一个允许两个实体安全通信的体系结构框架。为了展示我们的概念的可行性,我们评估了可以在提议的体系结构中使用的现有技术。我们的研究结果表明,这种方法有可能实现广泛的有趣用例,并且可以集成到现有的数字身份钱包解决方案中,以安全和分散的方式扩展离线消息传递的功能,超越当前通常依赖于互联网连接的模型。
{"title":"An architectural framework for enabling secure decentralized P2P messaging using DIDComm and Bluetooth Low Energy","authors":"Alexander Heireth Enge, Abylay Satybaldy, M. Nowostawski","doi":"10.1109/COMPSAC54236.2022.00251","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00251","url":null,"abstract":"Self-sovereign identity (SSI) is an emerging concept that shifts the control of identity to the person or entity to whom it belongs to without the need to rely on any centralized administrative authority. Within the SSI model, a digital identity wallet enables a user to establish relationships and interact with third parties in a secure and trusted manner. However, in order to perform various operations such as messaging and credential exchange, these usually require internet access. In some situations, this is not possible, and entities should be able to communicate independently of any external infrastructure in an offline setting. The objective of this paper is to design a proof-of-concept that would allow for secure, trustworthy, and privacy-preserving decentralized peer-to-peer communication without the need for any external networking infrastructure. For this, we investigate a particular case involving DIDComm and Bluetooth LE. We identify requirements for the architecture and propose an architectural framework that allows two entities to securely communicate. To show our concept's feasibility, we evaluate the existing technologies that could be used in the proposed architecture. Our findings indicate that this approach has the potential to enable a wide range of interesting use cases and can be integrated into existing digital identity wallet solutions to extend the capabilities of offline messaging in a secure and decentralized manner that goes beyond the current models that often rely on Internet connectivity.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving the Derivation of Sound Security Metrics 改进可靠安全度量的推导
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00287
George Yee
We continue to tackle the problem of poorly defined security metrics by building on and improving our previous work on designing sound security metrics. We reformulate the previous method into a set of conditions that are clearer and more widely applicable for deriving sound security metrics. We also modify and enhance some concepts that led to an unforeseen weakness in the previous method that was subsequently found by users, thereby eliminating this weakness from the conditions. We present examples showing how the conditions can be used to obtain sound security metrics. To demonstrate the conditions' versatility, we apply them to show that an aggregate security metric made up of sound security metrics is also sound. This is useful where the use of an aggregate measure may be preferred, to more easily understand the security of a system.
我们继续解决定义不清的安全度量的问题,方法是建立和改进我们以前在设计可靠的安全度量方面的工作。我们将以前的方法重新表述为一组条件,这些条件更清晰,更广泛地适用于推导可靠的安全度量。我们还修改和增强了一些概念,这些概念导致了用户随后发现的先前方法中不可预见的弱点,从而从条件中消除了这个弱点。我们将提供一些示例,说明如何使用这些条件来获得可靠的安全度量。为了演示条件的多功能性,我们应用它们来显示由可靠的安全性度量组成的聚合安全性度量也是可靠的。在更容易理解系统安全性的情况下,使用聚合度量是很有用的。
{"title":"Improving the Derivation of Sound Security Metrics","authors":"George Yee","doi":"10.1109/COMPSAC54236.2022.00287","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00287","url":null,"abstract":"We continue to tackle the problem of poorly defined security metrics by building on and improving our previous work on designing sound security metrics. We reformulate the previous method into a set of conditions that are clearer and more widely applicable for deriving sound security metrics. We also modify and enhance some concepts that led to an unforeseen weakness in the previous method that was subsequently found by users, thereby eliminating this weakness from the conditions. We present examples showing how the conditions can be used to obtain sound security metrics. To demonstrate the conditions' versatility, we apply them to show that an aggregate security metric made up of sound security metrics is also sound. This is useful where the use of an aggregate measure may be preferred, to more easily understand the security of a system.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EtherGIS: A Vulnerability Detection Framework for Ethereum Smart Contracts Based on Graph Learning Features EtherGIS:基于图学习特征的以太坊智能合约漏洞检测框架
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00277
Qingren Zeng, Jiahao He, Gansen Zhao, Shuangyin Li, Jingji Yang, Hua Tang, Haoyu Luo
The financial property of Ethereum makes smart contract attacks frequently bring about tremendous economic loss. Method for effective detection of vulnerabilities in contracts imperative. Existing efforts for contract security analysis heavily rely on rigid rules defined by experts, which are labor-intensive and non-scalable. There is still a lack of effort that considers combining expert-defined security patterns with deep learning. This paper proposes EtherGIS, a vulnerability detection framework that utilizes graph neural networks (GNN) and expert knowledge to extract the graph feature from smart contract control flow graphs (CFG). To gain multi-dimensional contract information and reinforce the attention of vulnerability-related graph features, sensitive EVM instruction corpora are constructed by analyzing EVM underlying logic and diverse vulnerability triggering mechanisms. The characteristic of nodes and edges in a CFG is initially confirmed according to the corpora, generating the corresponding attribute graph. GNN is adopted to aggregate the whole graph's attribute and structure information, bridging the semantic gap between low-level graph features and high-level contract features. The feature representation of the graph is finally input into the graph classification model for vulnerability detection. Furthermore, automated machine learning (AutoML) is adopted to automate the entire deep learning process. Data for this research was collected from Ethereum to build up a dataset of six vulnerabilities for evaluation. Experimental results demonstrate that EtherGIS can productively detect vulnerabilities in Ethereum smart contracts in terms of accuracy, precision, recall, and F1-score. All aspects outperform the existing work.
以太坊的金融属性使得智能合约攻击频繁,造成巨大的经济损失。有效检测合同漏洞的方法势在必行。现有的合同安全分析工作严重依赖于专家定义的严格规则,这些规则是劳动密集型的,不可扩展的。目前仍缺乏将专家定义的安全模式与深度学习相结合的研究。提出了一种利用图神经网络(GNN)和专家知识从智能合约控制流图(CFG)中提取图特征的漏洞检测框架EtherGIS。为了获得多维契约信息,加强对漏洞相关图特征的关注,通过分析EVM底层逻辑和多种漏洞触发机制,构建了EVM敏感指令语料库。根据语料库初步确定CFG中节点和边的特征,生成相应的属性图。采用GNN对整个图的属性和结构信息进行聚合,弥合了低级图特征和高级图契约特征之间的语义鸿沟。最后将图的特征表示输入到图分类模型中进行漏洞检测。此外,采用自动化机器学习(AutoML)实现整个深度学习过程的自动化。这项研究的数据是从以太坊收集的,以建立一个包含六个漏洞的数据集进行评估。实验结果表明,EtherGIS可以在准确性、精密度、召回率和f1分数方面有效地检测以太坊智能合约中的漏洞。各方面都优于现有的工作。
{"title":"EtherGIS: A Vulnerability Detection Framework for Ethereum Smart Contracts Based on Graph Learning Features","authors":"Qingren Zeng, Jiahao He, Gansen Zhao, Shuangyin Li, Jingji Yang, Hua Tang, Haoyu Luo","doi":"10.1109/COMPSAC54236.2022.00277","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00277","url":null,"abstract":"The financial property of Ethereum makes smart contract attacks frequently bring about tremendous economic loss. Method for effective detection of vulnerabilities in contracts imperative. Existing efforts for contract security analysis heavily rely on rigid rules defined by experts, which are labor-intensive and non-scalable. There is still a lack of effort that considers combining expert-defined security patterns with deep learning. This paper proposes EtherGIS, a vulnerability detection framework that utilizes graph neural networks (GNN) and expert knowledge to extract the graph feature from smart contract control flow graphs (CFG). To gain multi-dimensional contract information and reinforce the attention of vulnerability-related graph features, sensitive EVM instruction corpora are constructed by analyzing EVM underlying logic and diverse vulnerability triggering mechanisms. The characteristic of nodes and edges in a CFG is initially confirmed according to the corpora, generating the corresponding attribute graph. GNN is adopted to aggregate the whole graph's attribute and structure information, bridging the semantic gap between low-level graph features and high-level contract features. The feature representation of the graph is finally input into the graph classification model for vulnerability detection. Furthermore, automated machine learning (AutoML) is adopted to automate the entire deep learning process. Data for this research was collected from Ethereum to build up a dataset of six vulnerabilities for evaluation. Experimental results demonstrate that EtherGIS can productively detect vulnerabilities in Ethereum smart contracts in terms of accuracy, precision, recall, and F1-score. All aspects outperform the existing work.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125531413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of floating objects in liquids 液体中漂浮物的检测
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00265
Anna Sabatini, E. Nicolai, L. Vollero
The identification of floating particles in liquids in order to characterize their purity and quality is a topic of growing interest in the face of the increasing attention being paid to product quality control and the rising tide of pollution in primary goods such as the drinking water. The problem of microplastics spread in water and food is one of the main issues of attention today, mainly because of the effects on people's health who consume these goods. The monitoring of large volumes of water represents one of the main issues of interest that is driving the development of non-invasive and non-destructive high-precision techniques. Among the most interesting methods of performing this monitoring, optical systems represent a solution of great interest given their negligible, if any, impact on the monitored products and their ability to continuously analyzing the compound of interest. Given a high-quality optical recording system, it is necessary to complement it with a highly reliable and fast detection system to allow large volumes to be monitored in a relatively short time. In this scenario, the current paper brings three main contributions: (i) it defines and models a detection system with controllable reliability, (ii) it presents an online detection algorithm and (iii) it tests the suitability of the proposed system for integration into existing monitoring devices.
随着人们对产品质量控制的日益重视和饮用水等初级产品污染的日益严重,对液体中的浮动颗粒进行鉴定,以确定其纯度和质量特征,已成为人们日益关注的话题。微塑料在水和食物中扩散的问题是当今人们关注的主要问题之一,主要是因为食用这些商品对人们的健康产生了影响。对大量水的监测是推动非侵入性和非破坏性高精度技术发展的主要问题之一。在执行这种监测的最有趣的方法中,光学系统代表了一个非常有趣的解决方案,因为它们对被监测产品的影响可以忽略不计(如果有的话),并且它们能够连续分析感兴趣的化合物。鉴于高质量的光学记录系统,有必要与高度可靠和快速的检测系统相辅相成,以便在相对较短的时间内监测大量。在这种情况下,本文带来了三个主要贡献:(i)它定义和建模了一个具有可控可靠性的检测系统,(ii)它提出了一个在线检测算法,(iii)它测试了拟议系统集成到现有监测设备中的适用性。
{"title":"Detection of floating objects in liquids","authors":"Anna Sabatini, E. Nicolai, L. Vollero","doi":"10.1109/COMPSAC54236.2022.00265","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00265","url":null,"abstract":"The identification of floating particles in liquids in order to characterize their purity and quality is a topic of growing interest in the face of the increasing attention being paid to product quality control and the rising tide of pollution in primary goods such as the drinking water. The problem of microplastics spread in water and food is one of the main issues of attention today, mainly because of the effects on people's health who consume these goods. The monitoring of large volumes of water represents one of the main issues of interest that is driving the development of non-invasive and non-destructive high-precision techniques. Among the most interesting methods of performing this monitoring, optical systems represent a solution of great interest given their negligible, if any, impact on the monitored products and their ability to continuously analyzing the compound of interest. Given a high-quality optical recording system, it is necessary to complement it with a highly reliable and fast detection system to allow large volumes to be monitored in a relatively short time. In this scenario, the current paper brings three main contributions: (i) it defines and models a detection system with controllable reliability, (ii) it presents an online detection algorithm and (iii) it tests the suitability of the proposed system for integration into existing monitoring devices.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116136090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercises MRehab:评估中风和心脏康复运动的多模式数据采集和建模框架
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00086
Md Abdullah Khan, H. Shahriar
Post-stroke rehabilitation is always stressful in-home settings due to the unaccustomed environment, irregular sleep, and undergoing rehabilitation exercises. Usually, the intensity and difficulty of the exercise are inherent complex problems for the patients to manage daily. Physical rehabilitation is essential for all stroke patients to recover. Therefore, an automated in-home rehabilitation system with feedback support both for patient and therapist could assist post-stroke patients in managing and assessing exercise daily to recover faster. This work proposes a data acquisition and analysis framework named “MRehab” that helps collect multimodal sensor signals while patients perform both voluntary and non-voluntary (prescribed) exercises. “MRe-hab” assesses the exercise and physiological states of the patients through signal processing and multiple machine learning models. This framework monitors repetition, patient fatigue, and exercise quality and recommends frequency and intensity.
由于不习惯的环境、不规律的睡眠和正在进行的康复训练,中风后的康复总是在家庭环境中压力很大。通常,运动的强度和难度是患者日常管理的固有复杂问题。身体康复对所有脑卒中患者的康复至关重要。因此,为患者和治疗师提供反馈支持的自动化家庭康复系统可以帮助中风后患者管理和评估日常运动,以更快地恢复。这项工作提出了一个名为“MRehab”的数据采集和分析框架,该框架有助于在患者进行自愿和非自愿(规定)锻炼时收集多模态传感器信号。“MRe-hab”通过信号处理和多种机器学习模型来评估患者的运动和生理状态。该框架监测重复、患者疲劳和运动质量,并建议频率和强度。
{"title":"MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercises","authors":"Md Abdullah Khan, H. Shahriar","doi":"10.1109/COMPSAC54236.2022.00086","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00086","url":null,"abstract":"Post-stroke rehabilitation is always stressful in-home settings due to the unaccustomed environment, irregular sleep, and undergoing rehabilitation exercises. Usually, the intensity and difficulty of the exercise are inherent complex problems for the patients to manage daily. Physical rehabilitation is essential for all stroke patients to recover. Therefore, an automated in-home rehabilitation system with feedback support both for patient and therapist could assist post-stroke patients in managing and assessing exercise daily to recover faster. This work proposes a data acquisition and analysis framework named “MRehab” that helps collect multimodal sensor signals while patients perform both voluntary and non-voluntary (prescribed) exercises. “MRe-hab” assesses the exercise and physiological states of the patients through signal processing and multiple machine learning models. This framework monitors repetition, patient fatigue, and exercise quality and recommends frequency and intensity.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What is a (Digital) Identity Wallet? A Systematic Literature Review 何谓(数码)身份钱包?系统文献综述
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00131
Blaž Podgorelec, Lukas Alber, Thomas Zefferer
Identity management is crucial for any electronic service that needs to authenticate its users. Different identity-management models have been introduced and rolled out on a large scale during the past decades. Key distinguishing criteria of these models are the storage location of users' identity data and the degree of involvement of central entities such as identity providers, which can potentially track user behavior. Growing privacy awareness has led to a renaissance of user-centric identity-management models during the past few years. In this context, especially the concept of wallets applied to the digital identity domain has recently attracted attention, putting users into direct control of their identity data. Various approaches and solutions relying on this concept have been introduced recently. However, no generally accepted definitions of the concept “digital identity wallet” and of its related features and implementations exist so far, leading to considerable confusion in this domain. This paper addresses this issue by providing a systematic literature review on wallets applied to the digital identity domain to identify, analyze, and compare existing definitions, features, and capabilities of such solutions. By means of two research questions, this paper thereby contributes to a better understanding of identity wallets and the various recent developments in this domain.
身份管理对于任何需要对其用户进行身份验证的电子服务都是至关重要的。在过去的几十年里,不同的身份管理模型被大规模地引入和推广。这些模型的关键区分标准是用户身份数据的存储位置和中央实体(如身份提供者)的参与程度,这些实体可以潜在地跟踪用户行为。在过去几年中,日益增长的隐私意识导致了以用户为中心的身份管理模式的复兴。在这种背景下,特别是应用于数字身份领域的钱包概念最近引起了人们的关注,用户可以直接控制自己的身份数据。基于这一概念的各种方法和解决方案最近被引入。然而,到目前为止,“数字身份钱包”的概念及其相关功能和实现还没有被普遍接受的定义,这导致了该领域相当大的混乱。本文通过对应用于数字身份领域的钱包进行系统的文献综述来解决这个问题,以识别、分析和比较这些解决方案的现有定义、特征和功能。通过两个研究问题,本文有助于更好地理解身份钱包和该领域的各种最新发展。
{"title":"What is a (Digital) Identity Wallet? A Systematic Literature Review","authors":"Blaž Podgorelec, Lukas Alber, Thomas Zefferer","doi":"10.1109/COMPSAC54236.2022.00131","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00131","url":null,"abstract":"Identity management is crucial for any electronic service that needs to authenticate its users. Different identity-management models have been introduced and rolled out on a large scale during the past decades. Key distinguishing criteria of these models are the storage location of users' identity data and the degree of involvement of central entities such as identity providers, which can potentially track user behavior. Growing privacy awareness has led to a renaissance of user-centric identity-management models during the past few years. In this context, especially the concept of wallets applied to the digital identity domain has recently attracted attention, putting users into direct control of their identity data. Various approaches and solutions relying on this concept have been introduced recently. However, no generally accepted definitions of the concept “digital identity wallet” and of its related features and implementations exist so far, leading to considerable confusion in this domain. This paper addresses this issue by providing a systematic literature review on wallets applied to the digital identity domain to identify, analyze, and compare existing definitions, features, and capabilities of such solutions. By means of two research questions, this paper thereby contributes to a better understanding of identity wallets and the various recent developments in this domain.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Failure modes and failure mitigation in GPGPUs: a reference model and its application gpgpu的故障模式和故障缓解:参考模型及其应用
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00018
Francesco Terrosi, A. Ceccarelli, A. Bondavalli
General Purpose GPUs (GPGPUs) are highly susceptible to both transient and permanent faults. This is a serious concern for their safe and reliable usage in many domains, from autonomous driving to High Performance Computing. The research and industrial community responded fiercely to this issue, by analyzing failures impact and devising failure mitigation strategies. This led to the definition of several failure modes and mitigation approaches. Unfortunately, these are often based on different foundations, and it is not easy to position them in a consistent view. This work elaborates a GPGPU failures model, identifying relations between the GPGPU failure modes and components, and then it analyzes mitigations proposed in the literature. By proposing a unified view on failures and mitigations, the resulting model i) positions each research on the subject, ii) easily identifies the current gaps, and iii) sets the basis for further research on GPGPU failures.
gpgpu (General Purpose gpu)是一种易受瞬时故障和永久故障影响的器件。从自动驾驶到高性能计算,这对它们在许多领域的安全和可靠使用都是一个严重的问题。通过分析故障影响和设计故障缓解策略,研究和工业界对此问题作出了激烈反应。这导致了几种失效模式和缓解方法的定义。不幸的是,这些通常是基于不同的基础,很难将它们定位在一致的观点中。本文阐述了GPGPU故障模型,确定了GPGPU故障模式和组件之间的关系,然后分析了文献中提出的缓解措施。通过提出关于故障和缓解措施的统一观点,由此产生的模型i)定位了该主题的每个研究,ii)容易识别当前的差距,iii)为进一步研究GPGPU故障奠定了基础。
{"title":"Failure modes and failure mitigation in GPGPUs: a reference model and its application","authors":"Francesco Terrosi, A. Ceccarelli, A. Bondavalli","doi":"10.1109/COMPSAC54236.2022.00018","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00018","url":null,"abstract":"General Purpose GPUs (GPGPUs) are highly susceptible to both transient and permanent faults. This is a serious concern for their safe and reliable usage in many domains, from autonomous driving to High Performance Computing. The research and industrial community responded fiercely to this issue, by analyzing failures impact and devising failure mitigation strategies. This led to the definition of several failure modes and mitigation approaches. Unfortunately, these are often based on different foundations, and it is not easy to position them in a consistent view. This work elaborates a GPGPU failures model, identifying relations between the GPGPU failure modes and components, and then it analyzes mitigations proposed in the literature. By proposing a unified view on failures and mitigations, the resulting model i) positions each research on the subject, ii) easily identifies the current gaps, and iii) sets the basis for further research on GPGPU failures.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1