首页 > 最新文献

Electronic Notes in Theoretical Computer Science最新文献

英文 中文
Towards an Answer Set Programming Methodology for Constructing Programs Following a Semi-Automatic Approach – Extended and Revised version 基于半自动方法构建程序的答案集编程方法
Q3 Computer Science Pub Date : 2020-12-01 DOI: 10.1016/j.entcs.2020.10.004
Flavio Everardo , Mauricio Osorio

Answer Set Programming (ASP) is a successful rule-based formalism for modeling and solving knowledge-intense combinatorial (optimization) problems. Despite its success in both academic and industry, open challenges like automatic source code optimization, and software engineering remains. This is because a problem encoded into an ASP might not have the desired solving performance compared to an equivalent representation. Motivated by these two challenges, this paper has three main contributions. First, we propose a developing process towards a methodology to implement ASP programs, being faithful to existing methods. Second, we present ASP encodings that serve as the basis from the developing process. Third, we demonstrate the use of ASP to reverse the standard solving process. That is, knowing answer sets in advance, and desired strong equivalent properties, “we” exhaustively reconstruct ASP programs if they exist. This paper was originally motivated by the search of propositional formulas (if they exist) that represent the semantics of a new aggregate operator. Particularly, a parity aggregate. This aggregate comes as an improvement from the already existing parity (xor) constraints from xorro, where lacks expressiveness, even though these constraints fit perfectly for reasoning modes like sampling or model counting. To this end, this extended version covers the fundaments from parity constraints as well as the xorro system. Hence, we delve a little more in the examples and the proposed methodology over parity constraints. Finally, we discuss our results by showing the only representation available, that satisfies different properties from the classical logic xor operator, which is also consistent with the semantics of parity constraints from xorro.

答案集编程(ASP)是一种成功的基于规则的形式化方法,用于建模和解决知识密集型组合(优化)问题。尽管它在学术界和工业界都取得了成功,但像自动源代码优化和软件工程这样的开放挑战仍然存在。这是因为与等价表示相比,编码到ASP中的问题可能没有期望的求解性能。在这两个挑战的激励下,本文有三个主要贡献。首先,在忠实于现有方法的基础上,提出了ASP程序实现方法的开发过程。其次,我们从开发过程中提出作为基础的ASP编码。第三,我们演示了使用ASP来反转标准求解过程。也就是说,提前知道答案集,并期望强等效性质,“我们”详尽地重建ASP程序,如果它们存在的话。本文最初的动机是寻找表示新聚合算子语义的命题公式(如果存在的话)。特别是奇偶聚合。这种聚合是对xorro中已经存在的奇偶校验(xor)约束的改进,xorro缺乏表达性,尽管这些约束非常适合抽样或模型计数等推理模式。为此,这个扩展版本涵盖了奇偶约束和xorro系统的基本原理。因此,我们在示例和建议的方法中对宇称约束进行了更多的研究。最后,我们通过展示唯一可用的表示来讨论我们的结果,该表示满足与经典逻辑xor算子不同的性质,并且与xor算子的奇偶约束语义一致。
{"title":"Towards an Answer Set Programming Methodology for Constructing Programs Following a Semi-Automatic Approach – Extended and Revised version","authors":"Flavio Everardo ,&nbsp;Mauricio Osorio","doi":"10.1016/j.entcs.2020.10.004","DOIUrl":"10.1016/j.entcs.2020.10.004","url":null,"abstract":"<div><p>Answer Set Programming (ASP) is a successful rule-based formalism for modeling and solving knowledge-intense combinatorial (optimization) problems. Despite its success in both academic and industry, open challenges like automatic source code optimization, and software engineering remains. This is because a problem encoded into an ASP might not have the desired solving performance compared to an equivalent representation. Motivated by these two challenges, this paper has three main contributions. First, we propose a developing process towards a methodology to implement ASP programs, being faithful to existing methods. Second, we present ASP encodings that serve as the basis from the developing process. Third, we demonstrate the use of ASP to reverse the standard solving process. That is, knowing answer sets in advance, and desired strong equivalent properties, “we” exhaustively reconstruct ASP programs if they exist. This paper was originally motivated by the search of propositional formulas (if they exist) that represent the semantics of a new aggregate operator. Particularly, a parity aggregate. This aggregate comes as an improvement from the already existing parity (<span>xor</span>) constraints from <em>xorro</em>, where lacks expressiveness, even though these constraints fit perfectly for reasoning modes like sampling or model counting. To this end, this extended version covers the fundaments from parity constraints as well as the <em>xorro</em> system. Hence, we delve a little more in the examples and the proposed methodology over parity constraints. Finally, we discuss our results by showing the only representation available, that satisfies different properties from the classical logic <span>xor</span> operator, which is also consistent with the semantics of parity constraints from <em>xorro</em>.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"354 ","pages":"Pages 29-44"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.10.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building a Maximal Independent Set for the Vertex-coloring Problem on Planar Graphs 平面图上顶点着色问题的最大独立集的建立
Q3 Computer Science Pub Date : 2020-12-01 DOI: 10.1016/j.entcs.2020.10.007
Cristina López-Ramírez, Jorge Eduardo Gutiérrez Gómez, Guillermo De Ita Luna

We analyze the vertex-coloring problem restricted to planar graphs and propose to consider classic wheels and polyhedral wheels as basic patterns for the planar graphs. We analyze the colorability of the composition among wheels and introduce a novel algorithm based on three rules for the vertex-coloring problem. These rules are: 1) Selecting vertices in the frontier. 2) Processing subsumed wheels. 3) Processing centers of the remaining wheels. Our method forms a maximal independent set S1V (G) consisting of wheel's centers, and a maximum number of vertices in the frontier of the planar graph. Thus, we show that if the resulting graph G′ = (G − S1) is 3-colorable, then this implies the existence of a valid 4-coloring for G.

分析了局限于平面图的顶点着色问题,提出将经典轮和多面体轮作为平面图的基本图案。分析了车轮间构图的可着色性,提出了一种基于三条规则的顶点着色算法。这些规则是:1)选择边界中的顶点。2)加工分体车轮。3)剩余车轮加工中心。我们的方法形成了一个由车轮中心和平面图边界上最大顶点数组成的最大独立集S1∧V (G)。因此,我们证明了如果结果图G ' = (G−S1)是3色的,那么这意味着G存在有效的4色。
{"title":"Building a Maximal Independent Set for the Vertex-coloring Problem on Planar Graphs","authors":"Cristina López-Ramírez,&nbsp;Jorge Eduardo Gutiérrez Gómez,&nbsp;Guillermo De Ita Luna","doi":"10.1016/j.entcs.2020.10.007","DOIUrl":"10.1016/j.entcs.2020.10.007","url":null,"abstract":"<div><p>We analyze the vertex-coloring problem restricted to planar graphs and propose to consider classic wheels and polyhedral wheels as basic patterns for the planar graphs. We analyze the colorability of the composition among wheels and introduce a novel algorithm based on three rules for the vertex-coloring problem. These rules are: 1) Selecting vertices in the frontier. 2) Processing subsumed wheels. 3) Processing centers of the remaining wheels. Our method forms a maximal independent set <em>S</em><sub>1</sub> ⊂ <em>V</em> (<em>G</em>) consisting of wheel's centers, and a maximum number of vertices in the frontier of the planar graph. Thus, we show that if the resulting graph <em>G</em>′ = (<em>G − S</em><sub>1</sub>) is 3-colorable, then this implies the existence of a valid 4-coloring for <em>G</em>.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"354 ","pages":"Pages 75-89"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.10.007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84667858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Performance Evaluation of Security Monitoring in Multitenant Cloud Applications 多租户云应用安全监控性能评估研究
Q3 Computer Science Pub Date : 2020-11-01 DOI: 10.1016/j.entcs.2020.09.020
Lelio Campanile, Mauro Iacono, Stefano Marrone, Michele Mastroianni

In this paper we present a modeling approach suitable for practical evaluation of the delays that may affect security monitoring systems in (multitenant) cloud based architecture, and in general to support professionals in planning and evaluating relevant parameters in dealing with new designs or migration projects. The approach is based on modularity and multiformalism techniques to manage complexity and guide designers in an incremental process, to help transferring technical knowledge into modeling practice and to help easing the use of simulation. We present a case study based on a real experience, triggered by a new legal requirement that Italian Public Administration should comply about their datacenters.

在本文中,我们提出了一种建模方法,适合于对可能影响(多租户)基于云架构的安全监控系统的延迟进行实际评估,并且通常支持专业人员在处理新设计或迁移项目时规划和评估相关参数。该方法基于模块化和多形式技术来管理复杂性,并在增量过程中指导设计师,以帮助将技术知识转移到建模实践中,并帮助简化模拟的使用。我们提出了一个基于真实经验的案例研究,该案例是由意大利公共管理部门应该遵守的有关其数据中心的新法律要求引发的。
{"title":"On Performance Evaluation of Security Monitoring in Multitenant Cloud Applications","authors":"Lelio Campanile,&nbsp;Mauro Iacono,&nbsp;Stefano Marrone,&nbsp;Michele Mastroianni","doi":"10.1016/j.entcs.2020.09.020","DOIUrl":"10.1016/j.entcs.2020.09.020","url":null,"abstract":"<div><p>In this paper we present a modeling approach suitable for practical evaluation of the delays that may affect security monitoring systems in (multitenant) cloud based architecture, and in general to support professionals in planning and evaluating relevant parameters in dealing with new designs or migration projects. The approach is based on modularity and multiformalism techniques to manage complexity and guide designers in an incremental process, to help transferring technical knowledge into modeling practice and to help easing the use of simulation. We present a case study based on a real experience, triggered by a new legal requirement that Italian Public Administration should comply about their datacenters.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"353 ","pages":"Pages 107-127"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.09.020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89682479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the Safety of Crowds in Enclosed Spaces by Markovian Agents 用马尔可夫智能体评价封闭空间中人群的安全性
Q3 Computer Science Pub Date : 2020-11-01 DOI: 10.1016/j.entcs.2020.09.019
Enrico Barbierato, Marco Gribaudo, Mauro Iacono, Alexander H. Levis

Different paradigms have been used to model the behaviour of pedestrians in a crowd. While some approaches analyze the modelization of crowd motion from a physical perspective, other techniques prefer to focus on similar abstractions following classic paradigms, such as mobile agents or cellular automata, or even from the point of view of social forces interaction. Particular interest has emerged around the topic of crowd behaviour under condition of stress caused by a dramatic event, such as an earthquake, a terrorist attack or a fire. This paper presents a novel approach including a GSPN to describe the behaviour of an individual, which is subsequently translated into a set of Markovian Agents. The model under study reproduces a scenario where a fire, developed in a closed environment, triggers erratic crowd behaviour. It is possible to perceive that a panic situation can be mitigated by enforcing certain measures involving human leaders or small embedded systems (such as Internet-of-things enabled devices), reducing the level of risk related to safety.

不同的范式被用来模拟人群中行人的行为。虽然一些方法从物理角度分析人群运动的建模,但其他技术更倾向于关注遵循经典范式的类似抽象,例如移动代理或细胞自动机,甚至从社会力量相互作用的角度出发。人们对由地震、恐怖袭击或火灾等戏剧性事件引起的压力下的人群行为这一话题特别感兴趣。本文提出了一种包括GSPN来描述个体行为的新方法,该方法随后被转化为一组马尔可夫智能体。正在研究的模型再现了一个场景,在一个封闭的环境中发生的火灾引发了不稳定的人群行为。有可能认为,通过实施涉及人类领导者或小型嵌入式系统(如启用物联网的设备)的某些措施,可以减轻恐慌情况,从而降低与安全相关的风险水平。
{"title":"Evaluating the Safety of Crowds in Enclosed Spaces by Markovian Agents","authors":"Enrico Barbierato,&nbsp;Marco Gribaudo,&nbsp;Mauro Iacono,&nbsp;Alexander H. Levis","doi":"10.1016/j.entcs.2020.09.019","DOIUrl":"10.1016/j.entcs.2020.09.019","url":null,"abstract":"<div><p>Different paradigms have been used to model the behaviour of pedestrians in a crowd. While some approaches analyze the modelization of crowd motion from a physical perspective, other techniques prefer to focus on similar abstractions following classic paradigms, such as mobile agents or cellular automata, or even from the point of view of social forces interaction. Particular interest has emerged around the topic of crowd behaviour under condition of stress caused by a dramatic event, such as an earthquake, a terrorist attack or a fire. This paper presents a novel approach including a GSPN to describe the behaviour of an individual, which is subsequently translated into a set of Markovian Agents. The model under study reproduces a scenario where a fire, developed in a closed environment, triggers erratic crowd behaviour. It is possible to perceive that a panic situation can be mitigated by enforcing certain measures involving human leaders or small embedded systems (such as Internet-of-things enabled devices), reducing the level of risk related to safety.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"353 ","pages":"Pages 61-75"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.09.019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89638563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Consumption by Servers under Unknown Service Demand 未知服务需求下服务器的能耗
Q3 Computer Science Pub Date : 2020-11-01 DOI: 10.1016/j.entcs.2020.09.017
Ali Alssaiari, Nigel Thomas

We evaluate energy consumption under unknown service demands using three policies: task assignment based on guessing size (TAGS), the shortest queue strategy and random allocation in a homogeneous environment. We modelled these policies using performance evaluation processing algebra (PEPA) to derive numerical solutions. Our results show that servers running under TAGS consumes more energy than other policies in terms of total energy consumption. In contrast, TAGS consumes less energy than random allocation in terms of energy per job when the arrival rate is high and the job size is variable.

我们使用三种策略来评估未知服务需求下的能源消耗:基于猜测大小的任务分配(TAGS)、最短队列策略和均匀环境下的随机分配。我们使用性能评估处理代数(PEPA)对这些策略进行建模,以推导数值解。我们的结果表明,就总能耗而言,在TAGS下运行的服务器比其他策略消耗更多的能量。相比之下,当作业到达率较高且作业大小可变时,TAGS比随机分配的每个作业消耗的能量更少。
{"title":"Energy Consumption by Servers under Unknown Service Demand","authors":"Ali Alssaiari,&nbsp;Nigel Thomas","doi":"10.1016/j.entcs.2020.09.017","DOIUrl":"10.1016/j.entcs.2020.09.017","url":null,"abstract":"<div><p>We evaluate energy consumption under unknown service demands using three policies: task assignment based on guessing size (TAGS), the shortest queue strategy and random allocation in a homogeneous environment. We modelled these policies using performance evaluation processing algebra (PEPA) to derive numerical solutions. Our results show that servers running under TAGS consumes more energy than other policies in terms of total energy consumption. In contrast, TAGS consumes less energy than random allocation in terms of energy per job when the arrival rate is high and the job size is variable.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"353 ","pages":"Pages 21-38"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.09.017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114114684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Modelling of the Impact of Cyber Attacks on a Web-based Sales System 网络攻击对基于网络的销售系统影响的性能建模
Q3 Computer Science Pub Date : 2020-11-01 DOI: 10.1016/j.entcs.2020.09.016
Ohud Almutairi, Nigel Thomas

In this paper we present two performance models of a web-based sales system, one without the presence of an attack and the other with the presence of a denial of service attack. Models are formulated using the PEPA formalism. The PEPA eclipse plug-in is used to support the creation of the PEPA models for the web-based sales system and the automatic calculation of the performance measures identified to evaluate the models. The evaluation of the models illustrates how the performance of the warehouse's sale is negatively affected by denial of service attack through preventing some or all customers' orders from being fulfilled. The resultant delay on selling perishable products would result on products being discarded.

在本文中,我们提出了基于web的销售系统的两个性能模型,一个没有存在攻击,另一个存在拒绝服务攻击。模型是使用PEPA的形式体系制定的。PEPA eclipse插件用于支持为基于web的销售系统创建PEPA模型,并支持为评估模型而确定的性能度量的自动计算。模型的评估说明了拒绝服务攻击如何通过阻止部分或全部客户的订单得到满足而对仓库的销售性能产生负面影响。由此导致的易腐产品销售延迟将导致产品被丢弃。
{"title":"Performance Modelling of the Impact of Cyber Attacks on a Web-based Sales System","authors":"Ohud Almutairi,&nbsp;Nigel Thomas","doi":"10.1016/j.entcs.2020.09.016","DOIUrl":"10.1016/j.entcs.2020.09.016","url":null,"abstract":"<div><p>In this paper we present two performance models of a web-based sales system, one without the presence of an attack and the other with the presence of a denial of service attack. Models are formulated using the PEPA formalism. The PEPA eclipse plug-in is used to support the creation of the PEPA models for the web-based sales system and the automatic calculation of the performance measures identified to evaluate the models. The evaluation of the models illustrates how the performance of the warehouse's sale is negatively affected by denial of service attack through preventing some or all customers' orders from being fulfilled. The resultant delay on selling perishable products would result on products being discarded.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"353 ","pages":"Pages 5-20"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.09.016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling Load-Changing Attacks in Cyber-Physical Systems 网络物理系统中负载变化攻击的建模
Q3 Computer Science Pub Date : 2020-11-01 DOI: 10.1016/j.entcs.2020.09.018
Luca Arnaboldi , Ricardo M. Czekster, Charles Morisset, Roberto Metere

Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples are Internet-of-Things (IoT) or sensing software embedded in appliances or even specialised meters that measure and respond to electricity demands in smart grids. Due to their pervasive nature, they are usually chosen as recipients for larger scope cyber-security attacks. Those promote system-wide disruptions and are directed towards one key aspect such as confidentiality, integrity, availability or a combination of those characteristics. Our paper focuses on a particular and distressing attack where coordinated malware infected IoT units are maliciously employed to synchronously turn on or off high-wattage appliances, affecting the grid's primary control management. Our model could be extended to larger (smart) grids, Active Buildings as well as similar infrastructures. Our approach models Coordinated Load-Changing Attacks (CLCA) also referred as GridLock or BlackIoT, against a theoretical power grid, containing various types of power plants. It employs Continuous-Time Markov Chains where elements such as Power Plants and Botnets are modelled under normal or attack situations to evaluate the effect of CLCA in power reliant infrastructures. We showcase our modelling approach in the scenario of a power supplier (e.g. power plant) being targeted by a botnet. We demonstrate how our modelling approach can quantify the impact of a botnet attack and be abstracted for any CPS system involving power load management in a smart grid. Our results show that by prioritising the type of power-plants, the impact of the attack may change: in particular, we find the most impacting attack times and show how different strategies impact their success. We also find the best power generator to use depending on the current demand and strength of attack.

信息物理系统(CPS)存在于解决无数目的的许多设置中。例如物联网(IoT)或嵌入电器中的传感软件,甚至是测量和响应智能电网电力需求的专用仪表。由于他们的普遍性,他们通常被选为更大范围的网络安全攻击的接收者。它们会造成全系统的中断,并针对一个关键方面,如保密性、完整性、可用性或这些特征的组合。我们的论文关注的是一种特殊的令人痛苦的攻击,其中协同恶意软件感染的物联网单元被恶意地用于同步打开或关闭高瓦数设备,影响电网的主要控制管理。我们的模型可以扩展到更大的(智能)电网、主动建筑以及类似的基础设施。我们的方法模拟协调负载变化攻击(CLCA),也称为GridLock或BlackIoT,针对包含各种类型发电厂的理论电网。它采用连续时间马尔可夫链,其中电厂和僵尸网络等元素在正常或攻击情况下建模,以评估CLCA在电力依赖基础设施中的影响。我们在电力供应商(例如发电厂)被僵尸网络攻击的场景中展示了我们的建模方法。我们演示了我们的建模方法如何量化僵尸网络攻击的影响,并将其抽象为涉及智能电网中电力负载管理的任何CPS系统。我们的研究结果表明,通过对发电厂的类型进行优先排序,攻击的影响可能会发生变化:特别是,我们发现了最具影响力的攻击时间,并显示了不同的策略如何影响它们的成功。我们还根据当前的需求和攻击强度找到最佳的发电机。
{"title":"Modelling Load-Changing Attacks in Cyber-Physical Systems","authors":"Luca Arnaboldi ,&nbsp;Ricardo M. Czekster,&nbsp;Charles Morisset,&nbsp;Roberto Metere","doi":"10.1016/j.entcs.2020.09.018","DOIUrl":"10.1016/j.entcs.2020.09.018","url":null,"abstract":"<div><p>Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples are Internet-of-Things (IoT) or sensing software embedded in appliances or even specialised meters that measure and respond to electricity demands in smart grids. Due to their pervasive nature, they are usually chosen as recipients for larger scope cyber-security attacks. Those promote system-wide disruptions and are directed towards one key aspect such as confidentiality, integrity, availability or a combination of those characteristics. Our paper focuses on a particular and distressing attack where coordinated malware infected IoT units are maliciously employed to synchronously turn on or off high-wattage appliances, affecting the grid's primary control management. Our model could be extended to larger (smart) grids, Active Buildings as well as similar infrastructures. Our approach models Coordinated Load-Changing Attacks (CLCA) also referred as GridLock or BlackIoT, against a theoretical power grid, containing various types of power plants. It employs Continuous-Time Markov Chains where elements such as Power Plants and Botnets are modelled under normal or attack situations to evaluate the effect of CLCA in power reliant infrastructures. We showcase our modelling approach in the scenario of a power supplier (e.g. power plant) being targeted by a botnet. We demonstrate how our modelling approach can quantify the impact of a botnet attack and be abstracted for any CPS system involving power load management in a smart grid. Our results show that by prioritising the type of power-plants, the impact of the attack may change: in particular, we find the most impacting attack times and show how different strategies impact their success. We also find the best power generator to use depending on the current demand and strength of attack.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"353 ","pages":"Pages 39-60"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.09.018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84466979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Compositional Model Checking and Model Repair for a Class of Product Form Models 一类产品形态模型的成分模型检验与模型修复
Q3 Computer Science Pub Date : 2020-11-01 DOI: 10.1016/j.entcs.2020.09.021
Amin Soltanieh, Markus Siegle

In the area of Markovian quantitative modelling, compositional model specification techniques such as Stochastic Process Algebra are widely used. However, exploiting a model's compositional structure for efficient analysis is still a difficult problem and mostly limited to special cases. This paper addresses some important issues in the area of compositional model checking of Markovian models for models with Boucherie-type product form. It closes a long-standing gap concerning the question whether compositional model checking of so-called global time-unbounded Until formulas is possible. The answer to this turns out to be negative. The paper then turns to the area of model repair, i.e. the question of how to fix a model in case it violates a given requirement. Here another general result and a useful proposition for compositional model repair are provided.

在马尔可夫定量建模领域,组合模型规范技术如随机过程代数被广泛应用。然而,利用模型的组合结构进行有效的分析仍然是一个难题,而且大多局限于特殊情况。本文讨论了具有布歇里型产品形式的模型在马尔可夫模型组成模型检验中的几个重要问题。它解决了一个长期存在的问题,即是否可能对所谓的全局时间无界Until公式进行组合模型检查。答案是否定的。然后,本文转向模型修复领域,即在模型违反给定需求的情况下如何修复模型的问题。这里提供了另一个一般结果和一个有用的命题来修复组合模型。
{"title":"Compositional Model Checking and Model Repair for a Class of Product Form Models","authors":"Amin Soltanieh,&nbsp;Markus Siegle","doi":"10.1016/j.entcs.2020.09.021","DOIUrl":"10.1016/j.entcs.2020.09.021","url":null,"abstract":"<div><p>In the area of Markovian quantitative modelling, compositional model specification techniques such as Stochastic Process Algebra are widely used. However, exploiting a model's compositional structure for efficient analysis is still a difficult problem and mostly limited to special cases. This paper addresses some important issues in the area of compositional model checking of Markovian models for models with Boucherie-type product form. It closes a long-standing gap concerning the question whether compositional model checking of so-called global time-unbounded Until formulas is possible. The answer to this turns out to be negative. The paper then turns to the area of model repair, i.e. the question of how to fix a model in case it violates a given requirement. Here another general result and a useful proposition for compositional model repair are provided.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"353 ","pages":"Pages 129-148"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.09.021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85998616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic Bounds for the Max Flow in a Network with Discrete Random Capacities 离散随机容量网络中最大流量的随机边界
Q3 Computer Science Pub Date : 2020-11-01 DOI: 10.1016/j.entcs.2020.10.014
L. Echabbi , J.M. Fourneau , O. Gacem , H. Lotfi , N. Pekergin

We show how to obtain stochastic bounds for the strong stochastic ordering and the concave ordering of the maximal flow in a network where the capacities are non negative discrete random variables. While the deterministic problem is polynomial, the stochastic version with discrete random variables is NP-hard. The monotonicity of the Min-Cut problem for these stochastic orderings allows us to simplify the input distributions and obtain bounds on the results. Thus we obtain a tradeoff between the complexity of the computations and the precision of the bounds. We illustrate the approach with some examples.

给出了容量为非负离散随机变量的网络中最大流的强随机有序和凹有序的随机界。确定性问题是多项式问题,而具有离散随机变量的随机问题是np困难问题。这些随机排序的最小割问题的单调性使我们能够简化输入分布并获得结果的界。因此,我们在计算的复杂性和边界的精度之间进行了权衡。我们用一些例子来说明这种方法。
{"title":"Stochastic Bounds for the Max Flow in a Network with Discrete Random Capacities","authors":"L. Echabbi ,&nbsp;J.M. Fourneau ,&nbsp;O. Gacem ,&nbsp;H. Lotfi ,&nbsp;N. Pekergin","doi":"10.1016/j.entcs.2020.10.014","DOIUrl":"10.1016/j.entcs.2020.10.014","url":null,"abstract":"<div><p>We show how to obtain stochastic bounds for the strong stochastic ordering and the concave ordering of the maximal flow in a network where the capacities are non negative discrete random variables. While the deterministic problem is polynomial, the stochastic version with discrete random variables is NP-hard. The monotonicity of the Min-Cut problem for these stochastic orderings allows us to simplify the input distributions and obtain bounds on the results. Thus we obtain a tradeoff between the complexity of the computations and the precision of the bounds. We illustrate the approach with some examples.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"353 ","pages":"Pages 77-105"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.10.014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78657419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Eilenberg-Kelly Reloaded Eilenberg-Kelly重新加载
Q3 Computer Science Pub Date : 2020-10-01 DOI: 10.1016/j.entcs.2020.09.012
Tarmo Uustalu, Niccolò Veltri, Noam Zeilberger

The Eilenberg-Kelly theorem states that a category C with an object I and two functors :C×CC and :Cop×CC related by an adjunction BB natural in B is monoidal iff it is closed and moreover the adjunction holds internally. We dissect the proof of this theorem and observe that the necessity for a side condition on closedness arises because the standard definition of closed category is left-skew in regards to associativity. We analyze Street's observation that left-skew monoidality is equivalent to left-skew closedness and establish that monoidality is equivalent to closedness unconditionally under an adjusted definition of closedness that requires normal associativity. We also work out a definition of right-skew closedness equivalent to right-skew monoidality. We give examples of each type of structure; in particular, we look at the Kleisli category of a left-strong monad on a left-skew closed category and the Kleisli category of a lax closed monad on a right-skew closed category. We also view skew and normal monoidal and closed categories as special cases of skew and normal promonoidal categories and take a brief look at left-skew prounital-closed categories.

Eilenberg-Kelly定理证明了一类具有对象I和两个函子⊗:C×C→C和⊗:Cop×C→C的范畴C,如果它是闭合的,并且该共轭在内部成立,则它是一元的。我们对这个定理的证明进行了剖析,并观察到由于闭范畴的标准定义在结合性方面是左偏的,所以有必要在闭范畴上存在一个边条件。我们分析了Street关于左偏单单调性等价于左偏封闭性的观察,并在需要正常结合性的调整的封闭性定义下,建立了单单调性无条件等价于封闭性。我们也给出了一个等价于右偏单单调的右偏封闭性的定义。我们给出了每种结构的例子;特别地,我们研究左偏闭范畴上的左强单子的Kleisli范畴和右偏闭范畴上的松弛单子的Kleisli范畴。我们也把倾斜和正常的单形和闭范畴看作是倾斜和正常的原形范畴的特殊情况,并简要地看一下左倾斜的单形-闭范畴。
{"title":"Eilenberg-Kelly Reloaded","authors":"Tarmo Uustalu,&nbsp;Niccolò Veltri,&nbsp;Noam Zeilberger","doi":"10.1016/j.entcs.2020.09.012","DOIUrl":"10.1016/j.entcs.2020.09.012","url":null,"abstract":"<div><p>The Eilenberg-Kelly theorem states that a category <span><math><mi>C</mi></math></span> with an object <strong>I</strong> and two functors <span><math><mo>⊗</mo><mo>:</mo><mi>C</mi><mo>×</mo><mi>C</mi><mo>→</mo><mi>C</mi></math></span> and <span><math><mo>⊸</mo><mo>:</mo><msup><mrow><mi>C</mi></mrow><mrow><mi>op</mi></mrow></msup><mo>×</mo><mi>C</mi><mo>→</mo><mi>C</mi></math></span> related by an adjunction <span><math><mo>−</mo><mo>⊗</mo><mi>B</mi><mo>⊣</mo><mi>B</mi><mo>⊸</mo><mo>−</mo></math></span> natural in <em>B</em> is monoidal iff it is closed and moreover the adjunction holds internally. We dissect the proof of this theorem and observe that the necessity for a side condition on closedness arises because the standard definition of closed category is left-skew in regards to associativity. We analyze Street's observation that left-skew monoidality is equivalent to left-skew closedness and establish that monoidality is equivalent to closedness unconditionally under an adjusted definition of closedness that requires normal associativity. We also work out a definition of right-skew closedness equivalent to right-skew monoidality. We give examples of each type of structure; in particular, we look at the Kleisli category of a left-strong monad on a left-skew closed category and the Kleisli category of a lax closed monad on a right-skew closed category. We also view skew and normal monoidal and closed categories as special cases of skew and normal promonoidal categories and take a brief look at left-skew prounital-closed categories.</p></div>","PeriodicalId":38770,"journal":{"name":"Electronic Notes in Theoretical Computer Science","volume":"352 ","pages":"Pages 233-256"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.entcs.2020.09.012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122656840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Electronic Notes in Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1