首页 > 最新文献

2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)最新文献

英文 中文
Characterizing Java Streams in the Wild 在野外描述Java流
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00025
Eduardo Rosales, Andrea Rosà, Matteo Basso, A. Villazón, Adriana Orellana, Ángel Zenteno, Jhon Rivero, Walter Binder
Since Java 8, streams ease the development of data transformations using a declarative style based on functional programming. Some recent studies aim at shedding light on how streams are used. However, they consider only small sets of applications and mainly apply static analysis techniques, leaving the large-scale analysis of dynamic metrics focusing on stream processing an open research question. In this paper, we present the first large-scale empirical study on the use of streams in Java. We present a novel dynamic analysis for collecting runtime information and key metrics that enable the fine-grained characterization of sequential and parallel stream processing. We massively apply our dynamic analysis using a fully automated approach, supported by a distributed infrastructure to mine public software projects hosted on GitHub. Our findings advance the understanding of the use of streams, both confirming some of the results of previous studies at a much larger scale, as well as revealing previously unobserved findings in the use of streams.
自Java 8以来,流使用基于函数式编程的声明式风格简化了数据转换的开发。最近的一些研究旨在揭示河流是如何被利用的。然而,他们只考虑了小的应用集,主要应用静态分析技术,使得关注流处理的动态度量的大规模分析成为一个开放的研究问题。在本文中,我们提出了Java中使用流的第一个大规模实证研究。我们提出了一种新的动态分析方法,用于收集运行时信息和关键指标,从而能够对顺序和并行流处理进行细粒度表征。我们使用完全自动化的方法大规模应用动态分析,由分布式基础设施支持,以挖掘托管在GitHub上的公共软件项目。我们的研究结果促进了对河流使用的理解,既证实了以前在更大范围内研究的一些结果,也揭示了以前在河流使用中未被观察到的发现。
{"title":"Characterizing Java Streams in the Wild","authors":"Eduardo Rosales, Andrea Rosà, Matteo Basso, A. Villazón, Adriana Orellana, Ángel Zenteno, Jhon Rivero, Walter Binder","doi":"10.1109/ICECCS54210.2022.00025","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00025","url":null,"abstract":"Since Java 8, streams ease the development of data transformations using a declarative style based on functional programming. Some recent studies aim at shedding light on how streams are used. However, they consider only small sets of applications and mainly apply static analysis techniques, leaving the large-scale analysis of dynamic metrics focusing on stream processing an open research question. In this paper, we present the first large-scale empirical study on the use of streams in Java. We present a novel dynamic analysis for collecting runtime information and key metrics that enable the fine-grained characterization of sequential and parallel stream processing. We massively apply our dynamic analysis using a fully automated approach, supported by a distributed infrastructure to mine public software projects hosted on GitHub. Our findings advance the understanding of the use of streams, both confirming some of the results of previous studies at a much larger scale, as well as revealing previously unobserved findings in the use of streams.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126184631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Operational and Denotational Semantics of rMECal Calculus for Mobile Edge Computing 移动边缘计算中rMECal微积分的操作语义和指称语义
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00024
Jiaqi Yin, Huibiao Zhu
In the era of 5G, users are extremely sensitive to time delay and have strict reliability requirements. The architecture of MEC can effectively reduce or even eliminate the impact of return delay, whose core idea is to localize the data reasonably. Actually, most of the work still concentrated on the balance between the efficiency and energy consumption of task offloading strategy, but few work analyzed and expounded its offloading characteristics from the perspective of formal methods. Henceforth, In this paper, we propose a real-time secure hierarchical process calculus rMECal of task offloading for MEC. Then we show the operational semantics of this calculus from the process and network levels to describe how the program works, especially the parallel composition rule for many-to-many broadcast communication. In addition, we formalize the calculus and rules with real-time Maude, and adopt the example of Internet of Vehicles to illustrate the availability of the calculus and operational semantics. Moreover, we give the denotational semantics of this calculus to express what the program executes based on the Unifying Theories of Programming (UTP) approach, and show the fundamental algebraic properties. We believe that this paper can provide a guidance for exploring the formal theories in MEC.
在5G时代,用户对时延极其敏感,对可靠性要求严格。MEC的架构可以有效地减少甚至消除返回延迟的影响,其核心思想是对数据进行合理的定位。实际上,大部分工作仍然集中在任务卸载策略的效率与能耗之间的平衡上,很少有工作从形式化方法的角度分析和阐述其卸载特性。因此,在本文中,我们提出了一种实时安全的分层过程计算方法,用于MEC任务卸载。然后,我们从进程和网络层面展示了这种演算的操作语义,以描述程序的工作原理,特别是多对多广播通信的并行组合规则。此外,我们使用实时Maude将微积分和规则形式化,并以车联网为例说明了微积分和操作语义的可用性。此外,我们给出了该演算的指称语义,以表达基于程序设计统一理论(UTP)方法的程序执行,并显示了基本的代数性质。我们相信本文可以为MEC中形式理论的探索提供指导。
{"title":"The Operational and Denotational Semantics of rMECal Calculus for Mobile Edge Computing","authors":"Jiaqi Yin, Huibiao Zhu","doi":"10.1109/ICECCS54210.2022.00024","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00024","url":null,"abstract":"In the era of 5G, users are extremely sensitive to time delay and have strict reliability requirements. The architecture of MEC can effectively reduce or even eliminate the impact of return delay, whose core idea is to localize the data reasonably. Actually, most of the work still concentrated on the balance between the efficiency and energy consumption of task offloading strategy, but few work analyzed and expounded its offloading characteristics from the perspective of formal methods. Henceforth, In this paper, we propose a real-time secure hierarchical process calculus rMECal of task offloading for MEC. Then we show the operational semantics of this calculus from the process and network levels to describe how the program works, especially the parallel composition rule for many-to-many broadcast communication. In addition, we formalize the calculus and rules with real-time Maude, and adopt the example of Internet of Vehicles to illustrate the availability of the calculus and operational semantics. Moreover, we give the denotational semantics of this calculus to express what the program executes based on the Unifying Theories of Programming (UTP) approach, and show the fundamental algebraic properties. We believe that this paper can provide a guidance for exploring the formal theories in MEC.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130808456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks 保护卫星系统免受网络攻击的数字双运行时验证框架
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00022
Zhé Hóu, Qinyi Li, Ernest Foo, J. Dong, Paulo de Souza
This paper presents the conceptualisation of a framework that combines digital twins with runtime verification and applies the techniques in the context of security monitoring and verification for satellites. We focus on special considerations needed for space missions and satellites, and we discuss how digital twins in such applications can be developed and how the states of the twins should be synchronised. In particular, we present state synchronisation methods to ensure secure and efficient long-distance communication between the satellite and its digital twin on the ground. Building on top of this, we develop a runtime verification engine for the digital twin that can verify properties in multiple temporal logic languages. We end the paper with our proposal to develop a fully verified satellite digital twin system as future work.
本文提出了一个框架的概念化,该框架将数字孪生与运行时验证相结合,并将该技术应用于卫星的安全监测和验证。我们将重点讨论空间任务和卫星所需的特殊考虑因素,并讨论如何在此类应用中开发数字双胞胎,以及如何同步双胞胎的状态。特别是,我们提出了状态同步方法,以确保卫星与地面上的数字孪生体之间安全有效的远程通信。在此基础上,我们为数字孪生开发了一个运行时验证引擎,可以验证多种时态逻辑语言的属性。最后,我们提出了开发一个完全验证的卫星数字孪生系统作为未来工作的建议。
{"title":"A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks","authors":"Zhé Hóu, Qinyi Li, Ernest Foo, J. Dong, Paulo de Souza","doi":"10.1109/ICECCS54210.2022.00022","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00022","url":null,"abstract":"This paper presents the conceptualisation of a framework that combines digital twins with runtime verification and applies the techniques in the context of security monitoring and verification for satellites. We focus on special considerations needed for space missions and satellites, and we discuss how digital twins in such applications can be developed and how the states of the twins should be synchronised. In particular, we present state synchronisation methods to ensure secure and efficient long-distance communication between the satellite and its digital twin on the ground. Building on top of this, we develop a runtime verification engine for the digital twin that can verify properties in multiple temporal logic languages. We end the paper with our proposal to develop a fully verified satellite digital twin system as future work.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-adaptation in Microservice Architectures: A Case Study 微服务架构中的自适应:一个案例研究
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00014
Sree Ram Boyapati, Claudia Szabo
Most software companies deploy microservices be-hind API Gateways or load balancers to separate their business logic while at the same time serving their customers according to their SLAs. Today, internet companies serve an average of 150–200 million users efficiently in rapidly changing conditions, where autonomic self-adaptation solutions are critical. At such a large scale, self-adaptation has to address challenges related to high availability and reliability, in a variety of scenarios. In this industry experience report, we present the implementation of a self-adaptation approach for microservice architectures that can operate at a large scale and address availability and reliability concerns. Our prototype builds on current industry standards of observability tools used to track the system's internal state. We implement a lightweight MAPE-K loop that reduces the time taken to add self-adaptability and the total cost of ownership. Our case study focuses on dynamic rate limiting, where the implementation of our architecture was able to trigger and execute self-adaptation in under 1 second. We present our architecture, an overview of our prototype implementation and suite of tools used, and discuss our empirical observations.
大多数软件公司在API网关或负载平衡器后面部署微服务,以分离其业务逻辑,同时根据其sla为客户提供服务。如今,互联网公司在快速变化的环境中平均为1.5亿至2亿用户提供高效服务,其中自主自适应解决方案至关重要。在如此大规模的情况下,自适应必须在各种场景中解决与高可用性和可靠性相关的挑战。在这份行业经验报告中,我们为微服务架构提供了一种自适应方法的实现,这种方法可以大规模运行,并解决可用性和可靠性问题。我们的原型建立在当前可观察性工具的行业标准之上,用于跟踪系统的内部状态。我们实现了一个轻量级的MAPE-K循环,减少了添加自适应性所需的时间和总拥有成本。我们的案例研究侧重于动态速率限制,其中我们的体系结构的实现能够在1秒内触发并执行自适应。我们展示了我们的架构,我们的原型实现和使用的工具套件的概述,并讨论了我们的经验观察。
{"title":"Self-adaptation in Microservice Architectures: A Case Study","authors":"Sree Ram Boyapati, Claudia Szabo","doi":"10.1109/ICECCS54210.2022.00014","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00014","url":null,"abstract":"Most software companies deploy microservices be-hind API Gateways or load balancers to separate their business logic while at the same time serving their customers according to their SLAs. Today, internet companies serve an average of 150–200 million users efficiently in rapidly changing conditions, where autonomic self-adaptation solutions are critical. At such a large scale, self-adaptation has to address challenges related to high availability and reliability, in a variety of scenarios. In this industry experience report, we present the implementation of a self-adaptation approach for microservice architectures that can operate at a large scale and address availability and reliability concerns. Our prototype builds on current industry standards of observability tools used to track the system's internal state. We implement a lightweight MAPE-K loop that reduces the time taken to add self-adaptability and the total cost of ownership. Our case study focuses on dynamic rate limiting, where the implementation of our architecture was able to trigger and execute self-adaptation in under 1 second. We present our architecture, an overview of our prototype implementation and suite of tools used, and discuss our empirical observations.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127393723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study 使用Event-B和Sagemath构建正确的混合系统:以混合智能供暖系统为例
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00019
Meryem Afendi, A. Mammar, Régine Laleau
Cyber-physical systems allow interactions with the physical world using a network of sensors and actuators. They also form basis of future technologies via engaging in innovating within many crucial fields: health, transport, smart grid, etc. Modeling cyber-physical systems requires handling the evolution of continuous measurements. Generally this evolution is repre-sented by ordinary differential equations where the unknown variable denotes a set of functions that depend on a single independent variable. The aim of our work is to propose a correct-by-construction formal approach, based on the refinement technique of the Event-B method, to model and verify such systems. However, Event-B does not handle the resolution of ordinary differential equations. To overcome this limit, we suggest to combine Event-B with the differential equation solver SageMath. This paper presents our approach by means of the hybrid smart heating system case study.
网络物理系统允许使用传感器和执行器网络与物理世界进行交互。他们还通过参与健康、交通、智能电网等许多关键领域的创新,形成了未来技术的基础。建模网络物理系统需要处理连续测量的演变。一般来说,这种演化是用常微分方程表示的,其中未知变量表示依赖于单个自变量的一组函数。我们工作的目的是提出一种基于Event-B方法的改进技术的按构造进行更正的形式化方法,以对此类系统进行建模和验证。但是,Event-B不处理常微分方程的解析。为了克服这个限制,我们建议将Event-B与微分方程求解器SageMath结合起来。本文以混合智能供暖系统为例,介绍了我们的方法。
{"title":"Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study","authors":"Meryem Afendi, A. Mammar, Régine Laleau","doi":"10.1109/ICECCS54210.2022.00019","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00019","url":null,"abstract":"Cyber-physical systems allow interactions with the physical world using a network of sensors and actuators. They also form basis of future technologies via engaging in innovating within many crucial fields: health, transport, smart grid, etc. Modeling cyber-physical systems requires handling the evolution of continuous measurements. Generally this evolution is repre-sented by ordinary differential equations where the unknown variable denotes a set of functions that depend on a single independent variable. The aim of our work is to propose a correct-by-construction formal approach, based on the refinement technique of the Event-B method, to model and verify such systems. However, Event-B does not handle the resolution of ordinary differential equations. To overcome this limit, we suggest to combine Event-B with the differential equation solver SageMath. This paper presents our approach by means of the hybrid smart heating system case study.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128388277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EB4EB: A Framework for Reflexive Event-B EB4EB:反身性事件的框架- b
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00017
Peter Riviere, N. Singh, Y. A. Ameur
Event-B is a correct-by-construction rigorous state-based method offering features for formal modelling and proof automation. An inductive proof schema allows to prove system properties, in particular invariants. In the current setup, verifying other properties such as deadlock-freeness, reachability, event scheduling, liveness, etc., requires adhoc modelling. These prop-erties can be established partially using model checkers or by using third party interactive provers. Other crucial aspects, such as deadlock-freeness, are difficult to express. The availabilty of a meta-modelling mechanism for explicit manipulation of Event-B concepts would allow to deal with higher order modelling concepts and to define generic properties and associated proof obligations. In this paper, we propose EB4EB, an Event-B based modelling framework allowing to manipulate Event- B features explicitly based on meta modelling concepts. This framework relies on a set of Event-B theories defining data-types, operators, well-defined conditions, theorems and proof rules. It preserves the core logical foundation, including semantics, of original Event- B models. Based on the instantiation of the introduced features at meta level, deep and shallow modelling approaches are proposed to exploit this framework. In addition, a case study is developed to demonstrate the use of our framework applying the deep and shallow embedding approaches. The whole framework is supported by the Rodin platform handling Event- B models and proofs.
Event-B是一种严格的基于状态的构造正确方法,提供了形式化建模和证明自动化的特性。归纳证明模式允许证明系统属性,特别是不变量。在当前的设置中,验证其他属性(如无死锁、可达性、事件调度、活动性等)需要特别建模。这些属性可以部分地使用模型检查器或使用第三方交互式证明器来建立。其他关键方面,如无死锁,则难以表达。用于显式操作Event-B概念的元建模机制的可用性将允许处理更高阶的建模概念,并定义一般属性和相关的证明义务。在本文中,我们提出了EB4EB,一个基于Event-B的建模框架,允许基于元建模概念显式地操作Event-B特征。该框架依赖于一组Event-B理论,这些理论定义了数据类型、运算符、定义良好的条件、定理和证明规则。它保留了原始Event- B模型的核心逻辑基础,包括语义。基于元层次特征的实例化,提出了深层和浅层建模方法来利用该框架。此外,还开发了一个案例研究来演示我们的框架应用深嵌入和浅嵌入方法的使用。整个框架由处理Event- B模型和证明的Rodin平台支持。
{"title":"EB4EB: A Framework for Reflexive Event-B","authors":"Peter Riviere, N. Singh, Y. A. Ameur","doi":"10.1109/ICECCS54210.2022.00017","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00017","url":null,"abstract":"Event-B is a correct-by-construction rigorous state-based method offering features for formal modelling and proof automation. An inductive proof schema allows to prove system properties, in particular invariants. In the current setup, verifying other properties such as deadlock-freeness, reachability, event scheduling, liveness, etc., requires adhoc modelling. These prop-erties can be established partially using model checkers or by using third party interactive provers. Other crucial aspects, such as deadlock-freeness, are difficult to express. The availabilty of a meta-modelling mechanism for explicit manipulation of Event-B concepts would allow to deal with higher order modelling concepts and to define generic properties and associated proof obligations. In this paper, we propose EB4EB, an Event-B based modelling framework allowing to manipulate Event- B features explicitly based on meta modelling concepts. This framework relies on a set of Event-B theories defining data-types, operators, well-defined conditions, theorems and proof rules. It preserves the core logical foundation, including semantics, of original Event- B models. Based on the instantiation of the introduced features at meta level, deep and shallow modelling approaches are proposed to exploit this framework. In addition, a case study is developed to demonstrate the use of our framework applying the deep and shallow embedding approaches. The whole framework is supported by the Rodin platform handling Event- B models and proofs.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131922419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Bounded Semantics for Improving the Efficiency of Bounded Model Checking 提高有界模型检验效率的有界语义
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00020
Wenhui Zhang, Ya Gao
One of the main concerns of automated verification and error detection of software designs is the efficiency. Although bounded model checking (BMC) has been proven to be effective for error detection, further improvement of the efficiency is of great importance to the practical application of such methods. The development of BMC approaches is based on bounded semantics of temporal logics. Therefore the design of bounded semantics is essential for the subsequent BMC approaches. In this work, we propose a non-monotone bounded semantics for the linear temporal logic (LTL), and consequently a non-monotone BMC approach for improving the efficiency of bounded model checking. To this end, the information that a formula is unsatisfiable in an early step of checking is partly taken into consideration in a later one (in the sequence) in order to provide possibility for dismissing some of the irrelevant paths quickly in checking the later more complicated bounded model. The experimental results have shown that this approach has clear advantage over the traditional one on the test cases with respect to the efficiency. A comparison of such a non-monotone BMC approach with the traditional one implemented in the well-known model checking tools NuSMV and nuXmv is also reported.
软件设计的自动验证和错误检测的主要关注点之一是效率。虽然有界模型检查(BMC)已被证明是有效的错误检测方法,但进一步提高其效率对于此类方法的实际应用具有重要意义。BMC方法的发展是基于时间逻辑的有界语义。因此,有界语义的设计对后续的BMC方法至关重要。在这项工作中,我们提出了线性时间逻辑(LTL)的非单调有界语义,从而提出了一种非单调BMC方法来提高有界模型检查的效率。为此,在后面的步骤中(在序列中)部分考虑到公式在早期检查中不能满足的信息,以便在检查后面更复杂的有界模型时提供快速排除一些不相关路径的可能性。实验结果表明,该方法在测试用例的效率方面明显优于传统方法。本文还报道了这种非单调BMC方法与著名的模型检测工具NuSMV和nuXmv中实现的传统BMC方法的比较。
{"title":"A Bounded Semantics for Improving the Efficiency of Bounded Model Checking","authors":"Wenhui Zhang, Ya Gao","doi":"10.1109/ICECCS54210.2022.00020","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00020","url":null,"abstract":"One of the main concerns of automated verification and error detection of software designs is the efficiency. Although bounded model checking (BMC) has been proven to be effective for error detection, further improvement of the efficiency is of great importance to the practical application of such methods. The development of BMC approaches is based on bounded semantics of temporal logics. Therefore the design of bounded semantics is essential for the subsequent BMC approaches. In this work, we propose a non-monotone bounded semantics for the linear temporal logic (LTL), and consequently a non-monotone BMC approach for improving the efficiency of bounded model checking. To this end, the information that a formula is unsatisfiable in an early step of checking is partly taken into consideration in a later one (in the sequence) in order to provide possibility for dismissing some of the irrelevant paths quickly in checking the later more complicated bounded model. The experimental results have shown that this approach has clear advantage over the traditional one on the test cases with respect to the efficiency. A comparison of such a non-monotone BMC approach with the traditional one implemented in the well-known model checking tools NuSMV and nuXmv is also reported.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"26 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Intelligent-Building-Fire-Risk Classification Method* 一种新的智能建筑火灾风险分类方法*
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00028
Weilin Wu, Na Wang, Yixiang Chen
In order to assess the fire risk of the intelligent buildings, a trustworthy classification model was developed, which provides model supporting for the classification assessment of fire risk in intelligent buildings under the urban intelligent firefight construction. The model integrates Bayesian Network (BN) and software trustworthy computing theory and method, designs metric elements and attributes to assess fire risk from four dimensions of fire situation, building, environment and personnel; BN is used to calculate the risk value of fire attributes; Then, the fire risk attribute value is fused into the fire risk trustworthy value by using the trustworthy assessment model; This paper constructs a trustworthy classification model for intelligent building fire risk, and classifies the fire risk into five ranks according to the trustworthy value and attribute value. Taking the Shanghai Jing'an 11.15 fire as an example case, the result shows that the method provided in this paper can perform fire risk assessment and classification.
为了对智能建筑的火灾风险进行评估,建立了可信赖分类模型,为城市智能消防建设下的智能建筑火灾风险分类评估提供了模型支持。该模型将贝叶斯网络(BN)与软件可信计算理论和方法相结合,从火情、建筑、环境和人员四个维度设计度量元素和属性,对火灾风险进行评估;用BN计算火灾属性的风险值;然后,利用可信评估模型将火灾风险属性值融合为火灾风险可信值;本文构建了智能建筑火灾风险可信分类模型,并根据火灾风险的可信值和属性值将火灾风险分为五个等级。以上海静安11.15火灾为例,结果表明本文所提供的方法可以进行火灾风险评估和分类。
{"title":"A Novel Intelligent-Building-Fire-Risk Classification Method*","authors":"Weilin Wu, Na Wang, Yixiang Chen","doi":"10.1109/ICECCS54210.2022.00028","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00028","url":null,"abstract":"In order to assess the fire risk of the intelligent buildings, a trustworthy classification model was developed, which provides model supporting for the classification assessment of fire risk in intelligent buildings under the urban intelligent firefight construction. The model integrates Bayesian Network (BN) and software trustworthy computing theory and method, designs metric elements and attributes to assess fire risk from four dimensions of fire situation, building, environment and personnel; BN is used to calculate the risk value of fire attributes; Then, the fire risk attribute value is fused into the fire risk trustworthy value by using the trustworthy assessment model; This paper constructs a trustworthy classification model for intelligent building fire risk, and classifies the fire risk into five ranks according to the trustworthy value and attribute value. Taking the Shanghai Jing'an 11.15 fire as an example case, the result shows that the method provided in this paper can perform fire risk assessment and classification.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing Malware labeling Efforts Through Efficient Prototype Selection 通过有效的原型选择减少恶意软件标记工作
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00011
Guanhong Chen, Shuang Liu
Malware detection and malware family classification are of great importance to network and system security. Currently, the wide adoption of deep learning models has greatly improved the performance of those tasks. However, deep-learning-based methods greatly rely on large-scale high-quality datasets, which require manual labeling. Obtaining a large-scale high-quality labeled dataset is extremely difficult for malware due to the domain knowledge required. In this work, we propose to reduce the manual labeling efforts by selecting a representative subset of instances, which has the same distribution as the original full dataset. Our method effectively reduces the workload of labeling while maintaining the accuracy degradation of the classification model within an acceptable threshold. We compare our method with the random sampling method on two widely adopted datasets and the evaluation results show that our method achieves significant improvements over the baseline method. In particular, with only 20% of the data selected, our method has only a 2.68 % degradation in classification performance compared to the full set, while the baseline method has a 6.78 % performance loss. We also compare the effects of factors such as training strategy and model structure on the final results, providing some guidance for subsequent research.
恶意软件检测和分类对网络和系统安全具有重要意义。目前,深度学习模型的广泛采用大大提高了这些任务的性能。然而,基于深度学习的方法在很大程度上依赖于大规模的高质量数据集,这需要人工标记。由于需要领域知识,获得大规模高质量的标记数据集对于恶意软件来说是极其困难的。在这项工作中,我们建议通过选择与原始完整数据集具有相同分布的具有代表性的实例子集来减少人工标记工作。我们的方法有效地减少了标注工作量,同时将分类模型的精度退化保持在可接受的阈值内。我们在两个广泛采用的数据集上与随机抽样方法进行了比较,评估结果表明,我们的方法比基线方法有了显著的改进。特别是,在只选择了20%的数据的情况下,我们的方法在分类性能上只比完整集下降了2.68%,而基线方法的性能损失为6.78%。我们还比较了训练策略和模型结构等因素对最终结果的影响,为后续研究提供一定的指导。
{"title":"Reducing Malware labeling Efforts Through Efficient Prototype Selection","authors":"Guanhong Chen, Shuang Liu","doi":"10.1109/ICECCS54210.2022.00011","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00011","url":null,"abstract":"Malware detection and malware family classification are of great importance to network and system security. Currently, the wide adoption of deep learning models has greatly improved the performance of those tasks. However, deep-learning-based methods greatly rely on large-scale high-quality datasets, which require manual labeling. Obtaining a large-scale high-quality labeled dataset is extremely difficult for malware due to the domain knowledge required. In this work, we propose to reduce the manual labeling efforts by selecting a representative subset of instances, which has the same distribution as the original full dataset. Our method effectively reduces the workload of labeling while maintaining the accuracy degradation of the classification model within an acceptable threshold. We compare our method with the random sampling method on two widely adopted datasets and the evaluation results show that our method achieves significant improvements over the baseline method. In particular, with only 20% of the data selected, our method has only a 2.68 % degradation in classification performance compared to the full set, while the baseline method has a 6.78 % performance loss. We also compare the effects of factors such as training strategy and model structure on the final results, providing some guidance for subsequent research.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121163016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DLGR: A Rule-Based Approach to Graph Replacement for Deep Learning DLGR:基于规则的深度学习图替换方法
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00030
Enze Ma
In deep learning libraries like TensorFlow, compu-tations are manually batched as computation graphs. Graph replacement is then an optimization that replaces one subgraph of a computation graph with another whilst keeping the graphs before and after replacement functionally equivalent. Meanwhile, in practice, it remains a challenge how graph replacements can be performed efficiently: graph replacement is usually conducted by human engineers, and thus it incurs many human efforts since a variety of deep learning models do exist and a number of model-specific replacements can be performed; the functionality equivalence of graphs before and after replacement is also not easy to guarantee. To tackle with this challenge, we introduce in this paper DLGR, a rule-based approach to graph replacement for deep learning. The core idea of DLGR is to define a set of replacement rules, each of which specifies the source and the tar-get graph patterns and constraints on graph replacement. Given a computation graph, DLGR then performs an iterative process of matching and replacing subgraphs in the source graph, and generates a replaced, and usually optimized computation graph. We conduct experiments to evaluate the capabilities of DLGR. The results clearly show the strengths of DLGR: compared with two existing graph replacement techniques, it provides with more replacement rules and saves engineers' development efforts in reducing up to 68 % lines of code.
在像TensorFlow这样的深度学习库中,计算被手动批处理为计算图。图替换是一种优化,它将计算图的一个子图替换为另一个子图,同时保持替换前后的图在功能上相等。同时,在实践中,如何有效地执行图替换仍然是一个挑战:图替换通常由人类工程师进行,因此由于存在各种深度学习模型,并且可以执行许多特定于模型的替换,因此它会引起许多人类的努力;替换前后图形的功能等价性也不容易保证。为了应对这一挑战,我们在本文中引入了DLGR,一种基于规则的深度学习图替换方法。DLGR的核心思想是定义一组替换规则,每条规则指定源图和目标图模式以及图替换的约束。给定计算图,DLGR对源图中的子图进行匹配和替换的迭代过程,生成替换后的、通常是优化后的计算图。我们通过实验来评估DLGR的能力。结果清楚地显示了DLGR的优势:与两种现有的图替换技术相比,它提供了更多的替换规则,并节省了工程师的开发工作,减少了多达68%的代码行。
{"title":"DLGR: A Rule-Based Approach to Graph Replacement for Deep Learning","authors":"Enze Ma","doi":"10.1109/ICECCS54210.2022.00030","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00030","url":null,"abstract":"In deep learning libraries like TensorFlow, compu-tations are manually batched as computation graphs. Graph replacement is then an optimization that replaces one subgraph of a computation graph with another whilst keeping the graphs before and after replacement functionally equivalent. Meanwhile, in practice, it remains a challenge how graph replacements can be performed efficiently: graph replacement is usually conducted by human engineers, and thus it incurs many human efforts since a variety of deep learning models do exist and a number of model-specific replacements can be performed; the functionality equivalence of graphs before and after replacement is also not easy to guarantee. To tackle with this challenge, we introduce in this paper DLGR, a rule-based approach to graph replacement for deep learning. The core idea of DLGR is to define a set of replacement rules, each of which specifies the source and the tar-get graph patterns and constraints on graph replacement. Given a computation graph, DLGR then performs an iterative process of matching and replacing subgraphs in the source graph, and generates a replaced, and usually optimized computation graph. We conduct experiments to evaluate the capabilities of DLGR. The results clearly show the strengths of DLGR: compared with two existing graph replacement techniques, it provides with more replacement rules and saves engineers' development efforts in reducing up to 68 % lines of code.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130160013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1