首页 > 最新文献

Applied Computing Review最新文献

英文 中文
Prediction of readmissions in hospitalized children and adolescents by machine learning 利用机器学习预测住院儿童和青少年的再入院情况
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577592
Nayara Cristina da Silva, M. Albertini, A. R. Backes, G. Pena
Pediatric hospital readmission involves greater burdens for the patient and their family network, and for the health system. Machine learning can be a good strategy to expand knowledge in this area and to assist in the identification of patients at readmission risk. The objective of the study was to develop a predictive model to identify children and adolescents at high risk of potentially avoidable 30-day readmission using a machine learning approach. Retrospective cohort study with patients under 18 years old admitted to a tertiary university hospital. We collected demographic, clinical, and nutritional data from electronic databases. We apply machine learning techniques to build the predictive models. The 30-day hospital readmissions rate was 9.50%. The accuracy for CART model with bagging was 0.79, the sensitivity, and specificity were 76.30% and 64.40%, respectively. Machine learning approaches can predict avoidable 30-day pediatric hospital readmission into tertiary assistance.
儿科医院再入院给患者及其家庭网络以及卫生系统带来了更大的负担。机器学习可以是一个很好的策略来扩展这一领域的知识,并帮助识别有再入院风险的患者。该研究的目的是开发一种预测模型,以识别使用机器学习方法可能避免30天再入院的高风险儿童和青少年。回顾性队列研究在18岁以下的患者入院的第三大学医院。我们从电子数据库中收集了人口统计、临床和营养数据。我们运用机器学习技术来建立预测模型。30天再入院率为9.50%。带套袋的CART模型准确率为0.79,敏感性为76.30%,特异性为64.40%。机器学习方法可以预测可避免的30天儿科医院三级辅助再入院情况。
{"title":"Prediction of readmissions in hospitalized children and adolescents by machine learning","authors":"Nayara Cristina da Silva, M. Albertini, A. R. Backes, G. Pena","doi":"10.1145/3555776.3577592","DOIUrl":"https://doi.org/10.1145/3555776.3577592","url":null,"abstract":"Pediatric hospital readmission involves greater burdens for the patient and their family network, and for the health system. Machine learning can be a good strategy to expand knowledge in this area and to assist in the identification of patients at readmission risk. The objective of the study was to develop a predictive model to identify children and adolescents at high risk of potentially avoidable 30-day readmission using a machine learning approach. Retrospective cohort study with patients under 18 years old admitted to a tertiary university hospital. We collected demographic, clinical, and nutritional data from electronic databases. We apply machine learning techniques to build the predictive models. The 30-day hospital readmissions rate was 9.50%. The accuracy for CART model with bagging was 0.79, the sensitivity, and specificity were 76.30% and 64.40%, respectively. Machine learning approaches can predict avoidable 30-day pediatric hospital readmission into tertiary assistance.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"27 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91138581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Intersections as Agents: A model checking approach for analysing communicating agents 交通交叉口作为agent:一种分析通信agent的模型检验方法
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577720
Thamilselvam B, Y. Ramesh, S. Kalyanasundaram, M. Rao
The analysis of traffic policies, for instance, the duration of green and red phases at intersections, can be quite challenging. While the introduction of communication systems can potentially lead to better solutions, it is important to analyse and formulate policies in the presence of potential communication failures and delays. Given the stochastic nature of traffic, posing the problem as a model checking problem in probabilistic epistemic temporal logic seems promising. In this work, we propose an approach that uses epistemic modalities to model the effect of communication between multiple intersections and temporal modalities to model the progression of traffic volumes over time. We validate our approach in a non-stochastic setting, using the tool Model Checker for Multi-Agent Systems (MCMAS). We develop a Statistical Model Checking module and use it in conjunction with a tool chain that integrates a traffic simulator (SUMO) and a network simulator (OMNeT++/Veins) to study the impact of communications on traffic policies.
交通政策的分析,例如,十字路口的绿灯和红灯的持续时间,可能是相当具有挑战性的。虽然采用通讯系统可能导致更好的解决办法,但在可能出现通讯故障和延误的情况下分析和制订政策是很重要的。考虑到交通的随机性,将该问题作为概率认知时间逻辑中的模型检验问题似乎很有希望。在这项工作中,我们提出了一种方法,使用认知模式来模拟多个十字路口之间的通信影响,并使用时间模式来模拟交通量随时间的变化。我们在非随机设置中验证了我们的方法,使用工具模型检查器多代理系统(MCMAS)。我们开发了一个统计模型检查模块,并将其与集成了交通模拟器(SUMO)和网络模拟器(omnet++ / vein)的工具链结合使用,以研究通信对交通策略的影响。
{"title":"Traffic Intersections as Agents: A model checking approach for analysing communicating agents","authors":"Thamilselvam B, Y. Ramesh, S. Kalyanasundaram, M. Rao","doi":"10.1145/3555776.3577720","DOIUrl":"https://doi.org/10.1145/3555776.3577720","url":null,"abstract":"The analysis of traffic policies, for instance, the duration of green and red phases at intersections, can be quite challenging. While the introduction of communication systems can potentially lead to better solutions, it is important to analyse and formulate policies in the presence of potential communication failures and delays. Given the stochastic nature of traffic, posing the problem as a model checking problem in probabilistic epistemic temporal logic seems promising. In this work, we propose an approach that uses epistemic modalities to model the effect of communication between multiple intersections and temporal modalities to model the progression of traffic volumes over time. We validate our approach in a non-stochastic setting, using the tool Model Checker for Multi-Agent Systems (MCMAS). We develop a Statistical Model Checking module and use it in conjunction with a tool chain that integrates a traffic simulator (SUMO) and a network simulator (OMNeT++/Veins) to study the impact of communications on traffic policies.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"7 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87657020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mapping Strategies for Declarative Queries over Online Heterogeneous Biological Databases for Intelligent Responses 面向智能响应的在线异构生物数据库声明性查询映射策略
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577652
H. Jamil, Kallol Naha
The emergence of Alexa and Siri, and more recently, OpenAI's Chat-GPT, raises the question whether ad hoc biological queries can also be computed without end-users' active involvement in the code writing process. While advances have been made, current querying architectures for biological databases still assume some degree of computational competence and significant structural awareness of the underlying network of databases by biologists, if not active code writing. Given that biological databases are highly distributed and heterogeneous, and most are not FAIR compliant, a significant amount of expertise in data integration is essential for a query to be accurately crafted and meaningfully executed. In this paper, we introduce a flexible and intelligent query reformulation assistant, called Needle, as a back-end query execution engine of a natural language query interface to online biological databases. Needle leverages a data model called BioStar that leverages a meta-knowledgebase, called the schema graph, to map natural language queries to relevant databases and biological concepts. The implementation of Needle using BioStar is the focus of this article.
Alexa和Siri的出现,以及最近OpenAI的Chat-GPT的出现,提出了一个问题,即在没有最终用户积极参与代码编写过程的情况下,是否也可以计算特定的生物查询。虽然已经取得了进展,但目前的生物数据库查询体系结构仍然假设生物学家具有一定程度的计算能力和对数据库底层网络的重要结构意识,如果不是主动编写代码的话。鉴于生物数据库是高度分布式和异构的,而且大多数不符合FAIR标准,因此,要准确地编写查询并有意义地执行查询,就必须具备大量数据集成方面的专业知识。本文介绍了一种灵活智能的查询改写助手Needle,作为在线生物数据库自然语言查询接口的后端查询执行引擎。Needle利用了一个名为BioStar的数据模型,该模型利用了一个名为图式图的元知识库,将自然语言查询映射到相关数据库和生物学概念。使用BioStar实现Needle是本文的重点。
{"title":"Mapping Strategies for Declarative Queries over Online Heterogeneous Biological Databases for Intelligent Responses","authors":"H. Jamil, Kallol Naha","doi":"10.1145/3555776.3577652","DOIUrl":"https://doi.org/10.1145/3555776.3577652","url":null,"abstract":"The emergence of Alexa and Siri, and more recently, OpenAI's Chat-GPT, raises the question whether ad hoc biological queries can also be computed without end-users' active involvement in the code writing process. While advances have been made, current querying architectures for biological databases still assume some degree of computational competence and significant structural awareness of the underlying network of databases by biologists, if not active code writing. Given that biological databases are highly distributed and heterogeneous, and most are not FAIR compliant, a significant amount of expertise in data integration is essential for a query to be accurately crafted and meaningfully executed. In this paper, we introduce a flexible and intelligent query reformulation assistant, called Needle, as a back-end query execution engine of a natural language query interface to online biological databases. Needle leverages a data model called BioStar that leverages a meta-knowledgebase, called the schema graph, to map natural language queries to relevant databases and biological concepts. The implementation of Needle using BioStar is the focus of this article.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"2 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89067093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deduplication vs Privacy Tradeoffs in Cloud Storage 云存储中的重复数据删除与隐私权衡
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577711
Rodrigo de Magalhães Marques dos Santos Silva, Cláudio Correia, M. Correia, Luís Rodrigues
Users often encrypt files they store on cloud storage services to ensure data privacy. Unfortunately, without additional mechanisms, encrypting files prevents the use of server-side deduplication as two identical files will be different when encrypted. Encrypted deduplication techniques combines file encryption and data deduplication. This combination usually requires some form of direct or indirect coordination between the different clients. In this paper, we address the problem of reconciling the need to encrypt data with the advantages of deduplication. In particular, we study techniques that achieve this objective while avoiding frequency analysis attacks, i.e., attacks that infer the content of an encrypted file based on how frequently the file is stored and/or accessed. We propose a new protocol for assigning encryption keys to files that leverages the use of trusted execution environments to hide the frequencies of chunks from the adversary.
用户通常会对存储在云存储服务上的文件进行加密,以确保数据隐私。不幸的是,如果没有额外的机制,加密文件会防止使用服务器端重复数据删除,因为两个相同的文件在加密后会不同。加密重复数据删除技术将文件加密和重复数据删除相结合。这种组合通常需要不同客户之间进行某种形式的直接或间接协调。在本文中,我们解决了调和数据加密需求和重复数据删除优势的问题。特别是,我们研究实现这一目标的技术,同时避免频率分析攻击,即根据文件存储和/或访问的频率推断加密文件内容的攻击。我们提出了一个为文件分配加密密钥的新协议,该协议利用可信执行环境的使用来对对手隐藏块的频率。
{"title":"Deduplication vs Privacy Tradeoffs in Cloud Storage","authors":"Rodrigo de Magalhães Marques dos Santos Silva, Cláudio Correia, M. Correia, Luís Rodrigues","doi":"10.1145/3555776.3577711","DOIUrl":"https://doi.org/10.1145/3555776.3577711","url":null,"abstract":"Users often encrypt files they store on cloud storage services to ensure data privacy. Unfortunately, without additional mechanisms, encrypting files prevents the use of server-side deduplication as two identical files will be different when encrypted. Encrypted deduplication techniques combines file encryption and data deduplication. This combination usually requires some form of direct or indirect coordination between the different clients. In this paper, we address the problem of reconciling the need to encrypt data with the advantages of deduplication. In particular, we study techniques that achieve this objective while avoiding frequency analysis attacks, i.e., attacks that infer the content of an encrypted file based on how frequently the file is stored and/or accessed. We propose a new protocol for assigning encryption keys to files that leverages the use of trusted execution environments to hide the frequencies of chunks from the adversary.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"45 2 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86785354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hibernation Execution Interval based Hybrid Boot for Baseboard Management Controllers 基于休眠执行间隔的基板管理控制器混合启动
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577729
Ajung Kim, Gwangyong Kim, Bong-hoi Kim, Jiman Hong
The Baseboard Management Controller1 (BMC) reduces the operating cost of the server because it enables remote monitoring of the server. In order to reduce the boot time of the BMC, the hibernation technique has been applied for the fast boot of the BMC. However, it is difficult to apply the existing hibernation technique to the BMC as it is because the boot time may be longer than the cold boot since memory usage is not constant for each BMC. In this paper, we propose a hybrid boot technique that selects the faster boot between cold boot and hibernation-based boot based on the proper hibernation execution periodic interval. The proposed technique can perform boot at a point where the boot time is expected to be the minimum by checking memory usage. The experimental results show that the proposed hybrid boot technique can reduce the total boot time significantly compared to cold boot.
Baseboard Management Controller1 (BMC)降低了服务器的运营成本,因为它支持对服务器进行远程监控。为了缩短BMC的启动时间,采用休眠技术实现BMC的快速启动。但是,很难将现有的休眠技术应用于BMC,因为每个BMC的内存使用不是恒定的,因此启动时间可能比冷启动时间长。在本文中,我们提出了一种混合启动技术,基于适当的休眠执行周期间隔,在冷启动和基于休眠的启动之间选择更快的启动。所建议的技术可以通过检查内存使用情况,在预期引导时间最短的点执行引导。实验结果表明,与冷启动相比,混合启动技术能显著缩短系统总启动时间。
{"title":"Hibernation Execution Interval based Hybrid Boot for Baseboard Management Controllers","authors":"Ajung Kim, Gwangyong Kim, Bong-hoi Kim, Jiman Hong","doi":"10.1145/3555776.3577729","DOIUrl":"https://doi.org/10.1145/3555776.3577729","url":null,"abstract":"The Baseboard Management Controller1 (BMC) reduces the operating cost of the server because it enables remote monitoring of the server. In order to reduce the boot time of the BMC, the hibernation technique has been applied for the fast boot of the BMC. However, it is difficult to apply the existing hibernation technique to the BMC as it is because the boot time may be longer than the cold boot since memory usage is not constant for each BMC. In this paper, we propose a hybrid boot technique that selects the faster boot between cold boot and hibernation-based boot based on the proper hibernation execution periodic interval. The proposed technique can perform boot at a point where the boot time is expected to be the minimum by checking memory usage. The experimental results show that the proposed hybrid boot technique can reduce the total boot time significantly compared to cold boot.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"163 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73301163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Translating FOL-theories into SROIQ-Tboxes 将foll理论转化为sroiq - tbox
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577870
Fatima Danash, D. Ziébelin
Logical languages provide rigid formalisms for theories with varying expressive and scalable powers. In ontology engineering, it is popular to to provide a two-folded formalization of a theory; an expressive FOL formalization, and a decidable SROIQ fragment. Such a task requires a systematic and principled translation of the set of FOL formulas to achieve a maximally expressive decidable fragment. While no principled work exists for providing guidelines for the translation of FOL theories into SROIQ knowledge bases, this paper contributes with such a translation procedure.
逻辑语言为具有不同表达能力和可扩展能力的理论提供了严格的形式。在本体工程中,提供一个理论的双折形式化是很流行的;表达FOL形式化,以及可确定的SROIQ片段。这样的任务需要对FOL公式集进行系统和有原则的翻译,以获得最大表达性的可决定片段。虽然目前还没有原则性的工作为将FOL理论翻译成SROIQ知识库提供指导,但本文提供了这样一个翻译过程。
{"title":"Translating FOL-theories into SROIQ-Tboxes","authors":"Fatima Danash, D. Ziébelin","doi":"10.1145/3555776.3577870","DOIUrl":"https://doi.org/10.1145/3555776.3577870","url":null,"abstract":"Logical languages provide rigid formalisms for theories with varying expressive and scalable powers. In ontology engineering, it is popular to to provide a two-folded formalization of a theory; an expressive FOL formalization, and a decidable SROIQ fragment. Such a task requires a systematic and principled translation of the set of FOL formulas to achieve a maximally expressive decidable fragment. While no principled work exists for providing guidelines for the translation of FOL theories into SROIQ knowledge bases, this paper contributes with such a translation procedure.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"3 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73402330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Authentication and Privacy Preservation Scheme for MQTT MQTT轻量级身份验证和隐私保护方案
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577817
Sijia Tian, V. Vassilakis
Message Queuing Telemetry Transport (MQTT) is a protocol commonly used in smart IoT applications. The protocol reduces the resource saturation but does not implement appropriate security mechanisms. There have been attempts to add security features to MQTT; however, they do not take into account the resource-constrained nature of IoT devices. The Cipher-text Policy Attribute-Based Encryption (CP-ABE) scheme provides fine-grained access to topic-related data and adequate data storage on MQTT server. In this work, we propose an Improved CP-ABE (ICP-ABE) scheme integrated with a lightweight symmetric encryption algorithm - PRESENT. The new scheme separates the roles of attribute auditing and key extraction. By using a blind key, MQTT servers verify the identity of sender nodes without knowing the sender's attributes. The PRESENT algorithm is employed in the proposed scheme in order to securely share such blind keys between clients. The efficiency of the scheme is evaluated in terms of throughput, packet delivery ratio, network delay, and execution time.
消息队列遥测传输(MQTT)是智能物联网应用中常用的协议。该协议降低了资源饱和,但没有实现适当的安全机制。已经有人尝试向MQTT添加安全特性;然而,他们没有考虑到物联网设备的资源限制性质。密文策略基于属性的加密(CP-ABE)方案提供对主题相关数据的细粒度访问,并在MQTT服务器上提供足够的数据存储。在这项工作中,我们提出了一种改进的CP-ABE (ICP-ABE)方案,该方案集成了轻量级对称加密算法- PRESENT。新方案分离了属性审计和密钥提取的角色。通过使用盲密钥,MQTT服务器可以在不知道发送方属性的情况下验证发送方节点的身份。为了在客户端之间安全地共享盲密钥,该方案采用了PRESENT算法。该方案的效率是根据吞吐量、数据包传送率、网络延迟和执行时间来评估的。
{"title":"A Lightweight Authentication and Privacy Preservation Scheme for MQTT","authors":"Sijia Tian, V. Vassilakis","doi":"10.1145/3555776.3577817","DOIUrl":"https://doi.org/10.1145/3555776.3577817","url":null,"abstract":"Message Queuing Telemetry Transport (MQTT) is a protocol commonly used in smart IoT applications. The protocol reduces the resource saturation but does not implement appropriate security mechanisms. There have been attempts to add security features to MQTT; however, they do not take into account the resource-constrained nature of IoT devices. The Cipher-text Policy Attribute-Based Encryption (CP-ABE) scheme provides fine-grained access to topic-related data and adequate data storage on MQTT server. In this work, we propose an Improved CP-ABE (ICP-ABE) scheme integrated with a lightweight symmetric encryption algorithm - PRESENT. The new scheme separates the roles of attribute auditing and key extraction. By using a blind key, MQTT servers verify the identity of sender nodes without knowing the sender's attributes. The PRESENT algorithm is employed in the proposed scheme in order to securely share such blind keys between clients. The efficiency of the scheme is evaluated in terms of throughput, packet delivery ratio, network delay, and execution time.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"64 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78336149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expressive and Systematic Risk Assessments with Instance-Centric Threat Models 基于实例中心威胁模型的表达性和系统性风险评估
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577668
Stef Verreydt, Dimitri Van Landuyt, W. Joosen
A threat modeling exercise involves systematically assessing the likelihood and potential impact of diverse threat scenarios. As threat modeling approaches and tools act at the level of a software architecture or design (e.g., a data flow diagram), they consider threat scenarios at the level of classes or types of system elements. More fine-grained analyses in terms of concrete instances of these elements are typically not conducted explicitly nor rigorously. This hinders (i) expressiveness, as threats that require articulation at the level of instances can not be expressed nor managed properly, and (ii) systematic risk calculation, as risk cannot be expressed and estimated with respect to instance-level properties. In this paper, we present a novel threat modeling approach that acts on two layers: (i) the design layer defines the classes and entity types in the system, and (ii) the instance layer models concrete instances and their properties. This, in turn, allows both rough risk estimates at the design-level, and more precise ones at the instance-level. Motivated by a connected vehicles application, we present the key challenges, the modeling approach and a tool prototype. The presented approach is a key enabler for more continuous and frequent threat (re-)assessment, the integration of threat analysis models in CI/CD pipelines and agile development environments on the one hand (development perspective), and in risk management approaches at run-time (operations perspective).
威胁建模工作包括系统地评估各种威胁情景的可能性和潜在影响。当威胁建模方法和工具在软件架构或设计(例如,数据流图)级别上工作时,它们在类或系统元素类型级别上考虑威胁场景。就这些元素的具体实例而言,更细粒度的分析通常不明确也不严格地进行。这阻碍了(i)可表达性,因为需要在实例级别上表达的威胁无法被表达或妥善管理,以及(ii)系统性风险计算,因为风险无法根据实例级别的属性来表达和估计。在本文中,我们提出了一种新的威胁建模方法,它作用于两个层:(i)设计层定义系统中的类和实体类型,(ii)实例层对具体实例及其属性建模。反过来,这既允许在设计级别进行粗略的风险估计,也允许在实例级别进行更精确的风险估计。在车联网应用的激励下,我们提出了关键挑战、建模方法和工具原型。所提出的方法是实现更持续和频繁的威胁(重新)评估的关键,一方面是在CI/CD管道和敏捷开发环境(开发角度)中集成威胁分析模型,另一方面是在运行时的风险管理方法(操作角度)中集成威胁分析模型。
{"title":"Expressive and Systematic Risk Assessments with Instance-Centric Threat Models","authors":"Stef Verreydt, Dimitri Van Landuyt, W. Joosen","doi":"10.1145/3555776.3577668","DOIUrl":"https://doi.org/10.1145/3555776.3577668","url":null,"abstract":"A threat modeling exercise involves systematically assessing the likelihood and potential impact of diverse threat scenarios. As threat modeling approaches and tools act at the level of a software architecture or design (e.g., a data flow diagram), they consider threat scenarios at the level of classes or types of system elements. More fine-grained analyses in terms of concrete instances of these elements are typically not conducted explicitly nor rigorously. This hinders (i) expressiveness, as threats that require articulation at the level of instances can not be expressed nor managed properly, and (ii) systematic risk calculation, as risk cannot be expressed and estimated with respect to instance-level properties. In this paper, we present a novel threat modeling approach that acts on two layers: (i) the design layer defines the classes and entity types in the system, and (ii) the instance layer models concrete instances and their properties. This, in turn, allows both rough risk estimates at the design-level, and more precise ones at the instance-level. Motivated by a connected vehicles application, we present the key challenges, the modeling approach and a tool prototype. The presented approach is a key enabler for more continuous and frequent threat (re-)assessment, the integration of threat analysis models in CI/CD pipelines and agile development environments on the one hand (development perspective), and in risk management approaches at run-time (operations perspective).","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78860802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A General and NLP-based Architecture to perform Recommendation: A Use Case for Online Job Search and Skills Acquisition 执行推荐的通用和基于nlp的架构:用于在线工作搜索和技能获取的用例
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577844
Rubén Alonso, D. Dessí, Antonello Meloni, Diego Reforgiato Recupero
Natural Language Processing (NLP) is crucial to perform recommendations of items that can be only described by natural language. However, NLP usage within recommendation modules is difficult and usually requires a relevant initial effort, thus limiting its widespread adoption. To overcome this limitation, we introduce FORESEE, a novel architecture that can be instantiated with NLP and Machine Learning (ML) modules to perform recommendations of items that are described by natural language features. Furthermore, we describe an instantiation of such architecture to provide a service for the job market where applicants can verify whether their curriculum vitae (CV) is eligible for a given job position, can receive suggestions about which skills and abilities they should obtain, and finally, can obtain recommendations about online resources which might strengthen their CVs.
自然语言处理(NLP)对于执行只能用自然语言描述的项目的推荐至关重要。然而,在推荐模块中使用NLP是困难的,通常需要相关的初始努力,从而限制了它的广泛采用。为了克服这一限制,我们引入了FORESEE,这是一种新颖的架构,可以用NLP和机器学习(ML)模块实例化,以执行由自然语言特征描述的项目的推荐。此外,我们描述了这种架构的一个实例,为就业市场提供服务,申请人可以验证他们的简历(CV)是否符合给定的工作职位,可以收到关于他们应该获得哪些技能和能力的建议,最后可以获得有关在线资源的建议,这可能会加强他们的简历。
{"title":"A General and NLP-based Architecture to perform Recommendation: A Use Case for Online Job Search and Skills Acquisition","authors":"Rubén Alonso, D. Dessí, Antonello Meloni, Diego Reforgiato Recupero","doi":"10.1145/3555776.3577844","DOIUrl":"https://doi.org/10.1145/3555776.3577844","url":null,"abstract":"Natural Language Processing (NLP) is crucial to perform recommendations of items that can be only described by natural language. However, NLP usage within recommendation modules is difficult and usually requires a relevant initial effort, thus limiting its widespread adoption. To overcome this limitation, we introduce FORESEE, a novel architecture that can be instantiated with NLP and Machine Learning (ML) modules to perform recommendations of items that are described by natural language features. Furthermore, we describe an instantiation of such architecture to provide a service for the job market where applicants can verify whether their curriculum vitae (CV) is eligible for a given job position, can receive suggestions about which skills and abilities they should obtain, and finally, can obtain recommendations about online resources which might strengthen their CVs.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"158 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80721294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Type-based Termination Analysis for Parsing Expression Grammars 基于类型的表达式语法终止分析
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577620
Elton M. Cardoso, Regina De Paula, D. Pereira, L. Reis, R. Ribeiro
Parsing expressions grammars (PEGs) are a recognition-based formalism for language specification, which has been the subject of several research works. A PEG that succeeds or rejects every input string is said to be complete. However, checking if an arbitrary PEG is complete is an undecidable problem. In this work we propose a sound type-based termination analysis for PEGs as a type inference algorithm.
解析表达式语法(peg)是一种基于识别的语言规范形式,已经成为许多研究工作的主题。成功或拒绝每个输入字符串的PEG被称为完整的。然而,检查任意PEG是否完整是一个无法确定的问题。在这项工作中,我们提出了一种基于类型的peg终止分析作为类型推断算法。
{"title":"Type-based Termination Analysis for Parsing Expression Grammars","authors":"Elton M. Cardoso, Regina De Paula, D. Pereira, L. Reis, R. Ribeiro","doi":"10.1145/3555776.3577620","DOIUrl":"https://doi.org/10.1145/3555776.3577620","url":null,"abstract":"Parsing expressions grammars (PEGs) are a recognition-based formalism for language specification, which has been the subject of several research works. A PEG that succeeds or rejects every input string is said to be complete. However, checking if an arbitrary PEG is complete is an undecidable problem. In this work we propose a sound type-based termination analysis for PEGs as a type inference algorithm.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81500528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1