首页 > 最新文献

Applied Computing Review最新文献

英文 中文
Model-Driven Integration and the OSLC Standard: a Mapping of Applied Studies 模型驱动的集成和OSLC标准:应用研究的映射
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577761
F. Basso, Bruno Marcelo Soares Ferreira, Rafael Torres, R. Z. Frantz, D. Kreutz, Maicon Bernardino, Elder de Macedo Rodrigues
Open Services for Lifecycle Collaboration (OSLC) is an open standard for tool interoperability, which allows data federation throughout Software Engineering (SE) application lifecycles. The OSLC community has been active since 2008, and there is still an open question: "What is the state-of-the-art and practice of OSLC for tool integration in Application Lifecycle Management (ALM) for Software Engineering environments?". Objective: To answer this question, our main goal is to map the state-of-the-art and practice on the adoption of OSLC in SE lifecycles. Method: This paper presents a Systematic Mapping Study (SMS) by analyzing 59 primary studies and addressing integration issues such as building SE toolchains. Results: Our findings show that OSLC has been mostly implemented with the development of adapters and MDE. Conclusions: The main advantages of OSLC are related to linked data, involving not only tool adapters for point-to-point integrations, but also proposing solutions for tool replacement in the toolchain, as well as including modifications of OSLC domain specifications and solutions for automated activities for tool integration.
生命周期协作的开放服务(OSLC)是工具互操作性的开放标准,它允许整个软件工程(SE)应用程序生命周期中的数据联合。自2008年以来,OSLC社区一直很活跃,并且仍然存在一个开放的问题:“软件工程环境中应用程序生命周期管理(ALM)中工具集成的OSLC的最新技术和实践是什么?”目的:为了回答这个问题,我们的主要目标是绘制在SE生命周期中采用OSLC的最新技术和实践。方法:本文通过分析59项主要研究并解决集成问题(如构建SE工具链),提出了系统映射研究(SMS)。结果:我们的研究结果表明,OSLC主要是随着适配器和MDE的发展而实现的。结论:OSLC的主要优势与链接数据有关,不仅涉及点对点集成的工具适配器,而且还涉及工具链中工具替换的建议解决方案,以及包括OSLC领域规范的修改和工具集成自动化活动的解决方案。
{"title":"Model-Driven Integration and the OSLC Standard: a Mapping of Applied Studies","authors":"F. Basso, Bruno Marcelo Soares Ferreira, Rafael Torres, R. Z. Frantz, D. Kreutz, Maicon Bernardino, Elder de Macedo Rodrigues","doi":"10.1145/3555776.3577761","DOIUrl":"https://doi.org/10.1145/3555776.3577761","url":null,"abstract":"Open Services for Lifecycle Collaboration (OSLC) is an open standard for tool interoperability, which allows data federation throughout Software Engineering (SE) application lifecycles. The OSLC community has been active since 2008, and there is still an open question: \"What is the state-of-the-art and practice of OSLC for tool integration in Application Lifecycle Management (ALM) for Software Engineering environments?\". Objective: To answer this question, our main goal is to map the state-of-the-art and practice on the adoption of OSLC in SE lifecycles. Method: This paper presents a Systematic Mapping Study (SMS) by analyzing 59 primary studies and addressing integration issues such as building SE toolchains. Results: Our findings show that OSLC has been mostly implemented with the development of adapters and MDE. Conclusions: The main advantages of OSLC are related to linked data, involving not only tool adapters for point-to-point integrations, but also proposing solutions for tool replacement in the toolchain, as well as including modifications of OSLC domain specifications and solutions for automated activities for tool integration.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89285469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Candlesticks and Multi-Time Windows for Forecasting Stock-Index Movements 探索烛台和多时间窗口预测股指走势
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577604
Kanghyeon Seo, Jihoon Yang
Stock-index movement prediction is an important research topic in FinTech because the index indicates the economic status of a whole country. With a set of daily candlesticks of the stock-index, investors could gain a meaningful basis for the prediction of the next day's movement. This paper proposes a stock-index price-movement prediction model, Combined Time-View TabNet (CTV-TabNet), a novel approach that utilizes attributes of the candlesticks data with multi-time windows. Our model comprises three modules: TabNet encoder, gated recurrent unit with a sequence control, and multi-time combiner. They work together to forecast the movements based on the sequential attributes of the candlesticks. CTV-TabNet not only outperforms baseline models in prediction performance on 20 stock-indices of 14 different countries but also yields higher returns of index-futures trading simulations when compared to the baselines. Additionally, our model provides comprehensive interpretations of the stock-index related to its inherent properties in predictive performance.
股指走势预测是金融科技领域的一个重要研究课题,因为股指反映了一个国家的经济状况。有了一套每日的股指烛台,投资者就可以为预测第二天的走势提供一个有意义的基础。本文提出了一种利用多时间窗口烛台数据属性的股指价格走势预测模型——组合时间-视图TabNet (Combined Time-View TabNet, CTV-TabNet)。我们的模型包括三个模块:TabNet编码器、带序列控制的门控循环单元和多时间组合器。他们一起工作,根据烛台的顺序属性来预测运动。CTV-TabNet不仅在14个不同国家的20个股票指数的预测表现上优于基准模型,而且与基准模型相比,指数期货交易模拟的回报率更高。此外,我们的模型提供了与股票指数在预测性能中的固有属性相关的全面解释。
{"title":"Exploring Candlesticks and Multi-Time Windows for Forecasting Stock-Index Movements","authors":"Kanghyeon Seo, Jihoon Yang","doi":"10.1145/3555776.3577604","DOIUrl":"https://doi.org/10.1145/3555776.3577604","url":null,"abstract":"Stock-index movement prediction is an important research topic in FinTech because the index indicates the economic status of a whole country. With a set of daily candlesticks of the stock-index, investors could gain a meaningful basis for the prediction of the next day's movement. This paper proposes a stock-index price-movement prediction model, Combined Time-View TabNet (CTV-TabNet), a novel approach that utilizes attributes of the candlesticks data with multi-time windows. Our model comprises three modules: TabNet encoder, gated recurrent unit with a sequence control, and multi-time combiner. They work together to forecast the movements based on the sequential attributes of the candlesticks. CTV-TabNet not only outperforms baseline models in prediction performance on 20 stock-indices of 14 different countries but also yields higher returns of index-futures trading simulations when compared to the baselines. Additionally, our model provides comprehensive interpretations of the stock-index related to its inherent properties in predictive performance.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86773524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedFAME: A Data Augmentation Free Framework based on Model Contrastive Learning for Federated Semi-Supervised Learning 联邦半监督学习中基于模型对比学习的数据增强自由框架
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577613
Shubham Malaviya, Manish Shukla, Pratik Korat, S. Lodha
Federated learning has emerged as a privacy-preserving technique to learn a machine learning model without requiring users to share their data. Our paper focuses on Federated Semi-Supervised Learning (FSSL) setting wherein users do not have domain expertise or incentives to label data on their device, and the server has access to some labeled data that is annotated by experts. The existing work in FSSL require data augmentation for model training. However, data augmentation is not well defined for prevalent domains like text and graphs. Moreover, non independent and identically distributed (non-i.i.d.) data across users is a significant challenge in federated learning. We propose a generalized framework based on model contrastive learning called FedFAME which does not require data augmentation, thus making it easy to adapt to different domains. Our experiments on image and text datasets show the robustness of FedFAME towards non-i.i.d. data. We have validated our approach by varying data imbalance across users and the number of labeled instances on the server.
联邦学习已经成为一种隐私保护技术,可以在不需要用户共享数据的情况下学习机器学习模型。我们的论文关注的是联邦半监督学习(FSSL)设置,其中用户没有领域专业知识或动机在他们的设备上标记数据,服务器可以访问一些由专家注释的标记数据。现有的FSSL工作需要数据增强来进行模型训练。然而,对于文本和图形等流行领域,数据增强并没有很好地定义。此外,跨用户的非独立和同分布(non-i.i.d)数据是联邦学习中的一个重大挑战。我们提出了一个基于模型对比学习的广义框架,称为FedFAME,它不需要数据增强,从而使其易于适应不同的领域。我们在图像和文本数据集上的实验表明了FedFAME对非识别的鲁棒性。数据。我们通过改变用户之间的数据不平衡和服务器上标记实例的数量来验证我们的方法。
{"title":"FedFAME: A Data Augmentation Free Framework based on Model Contrastive Learning for Federated Semi-Supervised Learning","authors":"Shubham Malaviya, Manish Shukla, Pratik Korat, S. Lodha","doi":"10.1145/3555776.3577613","DOIUrl":"https://doi.org/10.1145/3555776.3577613","url":null,"abstract":"Federated learning has emerged as a privacy-preserving technique to learn a machine learning model without requiring users to share their data. Our paper focuses on Federated Semi-Supervised Learning (FSSL) setting wherein users do not have domain expertise or incentives to label data on their device, and the server has access to some labeled data that is annotated by experts. The existing work in FSSL require data augmentation for model training. However, data augmentation is not well defined for prevalent domains like text and graphs. Moreover, non independent and identically distributed (non-i.i.d.) data across users is a significant challenge in federated learning. We propose a generalized framework based on model contrastive learning called FedFAME which does not require data augmentation, thus making it easy to adapt to different domains. Our experiments on image and text datasets show the robustness of FedFAME towards non-i.i.d. data. We have validated our approach by varying data imbalance across users and the number of labeled instances on the server.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87588849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-layered Collaborative Framework for Evidence-driven Data Requirements Engineering for Machine Learning-based Safety-critical Systems 基于机器学习的安全关键系统证据驱动数据需求工程的多层协作框架
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577647
Sangeeta Dey, Seok-Won Lee
In the days of AI, data-centric machine learning (ML) models are increasingly used in various complex systems. While many researchers are focusing on specifying ML-specific performance requirements, not enough guideline is provided to engineer the data requirements systematically involving diverse stakeholders. Lack of written agreement about the training data, collaboration bottlenecks, lack of data validation framework, etc. are posing new challenges to ensuring training data fitness for safety-critical ML components. To reduce these gaps, we propose a multi-layered framework that helps to perceive and elicit data requirements. We provide a template for verifiable data requirements specifications. Moreover, we show how such requirements can facilitate an evidence-driven assessment of the training data quality based on the experts' judgments about the satisfaction of the requirements. We use Dempster Shafer's theory to combine experts' subjective opinions in the process. A preliminary case study on the CityPersons dataset for the pedestrian detection feature of autonomous cars shows the usefulness of the proposed framework for data requirements understanding and the confidence assessment of the dataset.
在人工智能时代,以数据为中心的机器学习(ML)模型越来越多地用于各种复杂系统。虽然许多研究人员专注于指定特定于ml的性能需求,但没有提供足够的指南来系统地设计涉及不同利益相关者的数据需求。缺乏关于训练数据的书面协议、协作瓶颈、缺乏数据验证框架等,都对确保训练数据适合安全关键的ML组件构成了新的挑战。为了减少这些差距,我们提出了一个多层框架来帮助感知和引出数据需求。我们为可验证的数据需求规范提供了一个模板。此外,我们展示了这些需求如何能够促进基于专家对需求满意度的判断的训练数据质量的证据驱动评估。我们运用Dempster Shafer的理论,结合专家的主观意见。对自动驾驶汽车行人检测特征的CityPersons数据集的初步案例研究表明,所提出的框架对于数据需求理解和数据集置信度评估的有用性。
{"title":"A Multi-layered Collaborative Framework for Evidence-driven Data Requirements Engineering for Machine Learning-based Safety-critical Systems","authors":"Sangeeta Dey, Seok-Won Lee","doi":"10.1145/3555776.3577647","DOIUrl":"https://doi.org/10.1145/3555776.3577647","url":null,"abstract":"In the days of AI, data-centric machine learning (ML) models are increasingly used in various complex systems. While many researchers are focusing on specifying ML-specific performance requirements, not enough guideline is provided to engineer the data requirements systematically involving diverse stakeholders. Lack of written agreement about the training data, collaboration bottlenecks, lack of data validation framework, etc. are posing new challenges to ensuring training data fitness for safety-critical ML components. To reduce these gaps, we propose a multi-layered framework that helps to perceive and elicit data requirements. We provide a template for verifiable data requirements specifications. Moreover, we show how such requirements can facilitate an evidence-driven assessment of the training data quality based on the experts' judgments about the satisfaction of the requirements. We use Dempster Shafer's theory to combine experts' subjective opinions in the process. A preliminary case study on the CityPersons dataset for the pedestrian detection feature of autonomous cars shows the usefulness of the proposed framework for data requirements understanding and the confidence assessment of the dataset.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89390161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI4CITY - An Automated Machine Learning Platform for Smart Cities AI4CITY——智能城市的自动机器学习平台
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578740
P. Pereira, Carlos Gonçalves, Lara Lopes Nunes, P. Cortez, A. Pilastri
Nowadays, the general interest in Machine Learning (ML) based solutions is increasing. However, to develop and deploy a ML solution often requires experience and it involves developing large code scripts. In this paper, we propose AI4CITY, an automated technological platform that aims to reduce the complexity of designing ML solutions, with a particular focus on Smart Cities applications. We compare our solution with popular Automated ML (AutoML) tools (e.g., H2O, AutoGluon) and the results achieved by AI4CITY were quite interesting and competitive.
如今,人们对基于机器学习(ML)的解决方案越来越感兴趣。然而,开发和部署ML解决方案通常需要经验,并且涉及开发大型代码脚本。在本文中,我们提出了AI4CITY,这是一个自动化技术平台,旨在降低设计机器学习解决方案的复杂性,特别关注智慧城市应用。我们将我们的解决方案与流行的自动化机器学习(AutoML)工具(例如H2O, AutoGluon)进行了比较,AI4CITY获得的结果非常有趣且具有竞争力。
{"title":"AI4CITY - An Automated Machine Learning Platform for Smart Cities","authors":"P. Pereira, Carlos Gonçalves, Lara Lopes Nunes, P. Cortez, A. Pilastri","doi":"10.1145/3555776.3578740","DOIUrl":"https://doi.org/10.1145/3555776.3578740","url":null,"abstract":"Nowadays, the general interest in Machine Learning (ML) based solutions is increasing. However, to develop and deploy a ML solution often requires experience and it involves developing large code scripts. In this paper, we propose AI4CITY, an automated technological platform that aims to reduce the complexity of designing ML solutions, with a particular focus on Smart Cities applications. We compare our solution with popular Automated ML (AutoML) tools (e.g., H2O, AutoGluon) and the results achieved by AI4CITY were quite interesting and competitive.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83469896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Controllability of Parameterized CSTNUs 参数化CSTNUs的动态可控性
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577618
M. Franceschetti, Roberto Posenato, Carlo Combi, Johann Eder
A Conditional Simple Temporal Network with Uncertainty (CSTNU) models temporal constraint satisfaction problems in which the environment sets uncontrollable timepoints and conditions. The executor observes and reacts to such uncontrollable assignments as time advances with the CSTNU execution. However, there exist scenarios in which the occurrence of some future timepoints must be fixed as soon as the execution starts. We call these timepoints parameters. For a correct execution, parameters must assume values that guarantee the possibility of satisfying all temporal constraints, whatever the environment decides the execution time for uncontrollable timepoints and the truth value of conditions, i.e., dynamic controllability (DC). Here, we formalize the extension of the CSTNU with parameters. Furthermore, we define a set of rules to check the DC of such extended CSTNU. These rules additionally solve the problem inverse to checking DC: computing restrictions on parameter values that yield DC guarantees. The proposed rules can be composed into a sound and complete procedure.
一种具有不确定性的条件简单时间网络(CSTNU)对环境设置不可控时间点和条件的时间约束满足问题进行建模。随着CSTNU执行时间的推移,执行者观察并对这些不可控的分配作出反应。但是,在某些情况下,必须在执行开始时立即确定某些未来时间点的出现。我们称这些时间点为参数。为了正确执行,无论环境如何决定不可控时间点的执行时间和条件的真值,即动态可控性(DC),参数必须具有保证满足所有时间约束的可能性的值。在这里,我们用参数形式化了CSTNU的扩展。此外,我们还定义了一套规则来检验这种扩展的CSTNU的DC。这些规则还解决了与检查DC相反的问题:计算产生DC保证的参数值的限制。建议的规则可以组成一个健全完整的程序。
{"title":"Dynamic Controllability of Parameterized CSTNUs","authors":"M. Franceschetti, Roberto Posenato, Carlo Combi, Johann Eder","doi":"10.1145/3555776.3577618","DOIUrl":"https://doi.org/10.1145/3555776.3577618","url":null,"abstract":"A Conditional Simple Temporal Network with Uncertainty (CSTNU) models temporal constraint satisfaction problems in which the environment sets uncontrollable timepoints and conditions. The executor observes and reacts to such uncontrollable assignments as time advances with the CSTNU execution. However, there exist scenarios in which the occurrence of some future timepoints must be fixed as soon as the execution starts. We call these timepoints parameters. For a correct execution, parameters must assume values that guarantee the possibility of satisfying all temporal constraints, whatever the environment decides the execution time for uncontrollable timepoints and the truth value of conditions, i.e., dynamic controllability (DC). Here, we formalize the extension of the CSTNU with parameters. Furthermore, we define a set of rules to check the DC of such extended CSTNU. These rules additionally solve the problem inverse to checking DC: computing restrictions on parameter values that yield DC guarantees. The proposed rules can be composed into a sound and complete procedure.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76157391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CEM: an Ontology for Crime Events in Newspaper Articles 报纸文章中犯罪事件的本体
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577862
Federica Rollo, Laura Po, Alessandro Castellucci
The adoption of semantic technologies for the representation of crime events can help law enforcement agencies (LEAs) in crime prevention and investigation. Moreover, online newspapers and social networks are valuable sources for crime intelligence gathering. In this paper, we propose a new lightweight ontology to model crime events as they are usually described in online news articles. The Crime Event Model (CEM) can integrate specific data about crimes, i.e., where and when they occurred, who is involved (author, victim, and other subjects involved), which is the reason for the occurrence, and details about the source of information (e.g., the news article). Extracting structured data from multiple online sources and interconnecting them in a Knowledge Graph using CEM allow events relationships extraction, patterns and trends identification, and event recommendation. The CEM ontology is available at https://w3id.org/CEMontology.
采用语义技术表示犯罪事件可以帮助执法机构预防和调查犯罪。此外,在线报纸和社交网络是收集犯罪情报的宝贵来源。在本文中,我们提出了一种新的轻量级本体来建模犯罪事件,因为它们通常在在线新闻文章中描述。犯罪事件模型(CEM)可以集成有关犯罪的具体数据,即,犯罪发生的地点和时间,涉及的对象(作者、受害者和涉及的其他主体),发生的原因,以及有关信息来源的详细信息(例如,新闻文章)。从多个在线资源中提取结构化数据,并使用CEM将它们连接到知识图中,从而可以提取事件关系、识别模式和趋势以及推荐事件。CEM本体可在https://w3id.org/CEMontology上获得。
{"title":"CEM: an Ontology for Crime Events in Newspaper Articles","authors":"Federica Rollo, Laura Po, Alessandro Castellucci","doi":"10.1145/3555776.3577862","DOIUrl":"https://doi.org/10.1145/3555776.3577862","url":null,"abstract":"The adoption of semantic technologies for the representation of crime events can help law enforcement agencies (LEAs) in crime prevention and investigation. Moreover, online newspapers and social networks are valuable sources for crime intelligence gathering. In this paper, we propose a new lightweight ontology to model crime events as they are usually described in online news articles. The Crime Event Model (CEM) can integrate specific data about crimes, i.e., where and when they occurred, who is involved (author, victim, and other subjects involved), which is the reason for the occurrence, and details about the source of information (e.g., the news article). Extracting structured data from multiple online sources and interconnecting them in a Knowledge Graph using CEM allow events relationships extraction, patterns and trends identification, and event recommendation. The CEM ontology is available at https://w3id.org/CEMontology.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78904472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Student Research Abstract: A Hybrid Approach to Design Embedded Software Using JavaScript's Non-blocking Principle 学生研究摘要:利用JavaScript的非阻塞原理设计嵌入式软件的混合方法
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577210
Fernando L. Oliveira
Embedded Systems (ES) are present in several domains like automotive, smart homes, smart cities, industry, and healthcare, to name but a few. ES brings new challenges to designing embedded software that requires a high level of abstraction and being aware of resource consumption, mainly on resource-constrained devices. Modern programming languages like JavaScript (JS) can help solve these issues. However, JS is an interpreted language that demands attention to develop applications considering the balance between performance and resource consumption. In this scenario, this paper introduces an architecture design that proposes to model software for embedded systems as event-driven applications. Our design combines traditional architectures traits of Time-triggered (TT) and Event-triggered (ET) into a framework named JSEVAsync, promoting a hybrid system that explores JavaScript's non-blocking concept as a development interface to structure the algorithms into asynchronous units. As a result, we aid the development of applications with high abstraction levels and better resource consumption. To validate it, we compare C- and JavaScript-based applications, analyze the source code (static code analysis) to extract software quality metrics, and explore the results from the energy consumption perspective. We found that writing code through JSEVAsync can be up to 21% more energy efficient than the traditional method and can improve design-time metrics.
嵌入式系统(ES)存在于汽车、智能家居、智能城市、工业和医疗保健等多个领域,仅举几例。ES给嵌入式软件的设计带来了新的挑战,这些软件需要高度的抽象和对资源消耗的意识,主要是在资源受限的设备上。像JavaScript (JS)这样的现代编程语言可以帮助解决这些问题。然而,JS是一种解释性语言,在开发应用程序时需要考虑性能和资源消耗之间的平衡。在这种情况下,本文介绍了一种架构设计,该设计建议将嵌入式系统的软件建模为事件驱动的应用程序。我们的设计将时间触发(TT)和事件触发(ET)的传统架构特征结合到一个名为JSEVAsync的框架中,促进了一个混合系统,该系统将JavaScript的非阻塞概念作为开发接口,将算法构建为异步单元。因此,我们帮助开发具有高抽象级别和更好的资源消耗的应用程序。为了验证它,我们比较了基于C和javascript的应用程序,分析源代码(静态代码分析)以提取软件质量度量,并从能耗的角度探索结果。我们发现,通过JSEVAsync编写代码可以比传统方法节省高达21%的能源效率,并且可以改善设计时指标。
{"title":"Student Research Abstract: A Hybrid Approach to Design Embedded Software Using JavaScript's Non-blocking Principle","authors":"Fernando L. Oliveira","doi":"10.1145/3555776.3577210","DOIUrl":"https://doi.org/10.1145/3555776.3577210","url":null,"abstract":"Embedded Systems (ES) are present in several domains like automotive, smart homes, smart cities, industry, and healthcare, to name but a few. ES brings new challenges to designing embedded software that requires a high level of abstraction and being aware of resource consumption, mainly on resource-constrained devices. Modern programming languages like JavaScript (JS) can help solve these issues. However, JS is an interpreted language that demands attention to develop applications considering the balance between performance and resource consumption. In this scenario, this paper introduces an architecture design that proposes to model software for embedded systems as event-driven applications. Our design combines traditional architectures traits of Time-triggered (TT) and Event-triggered (ET) into a framework named JSEVAsync, promoting a hybrid system that explores JavaScript's non-blocking concept as a development interface to structure the algorithms into asynchronous units. As a result, we aid the development of applications with high abstraction levels and better resource consumption. To validate it, we compare C- and JavaScript-based applications, analyze the source code (static code analysis) to extract software quality metrics, and explore the results from the energy consumption perspective. We found that writing code through JSEVAsync can be up to 21% more energy efficient than the traditional method and can improve design-time metrics.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79933869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The EVIL Machine: Encode, Visualize and Interpret the Leakage 邪恶的机器:编码,可视化和解释泄漏
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577688
Valence Cristiani, Maxime Lecomte, P. Maurine
Unsupervised side-channel attacks allow extracting secret keys manipulated by cryptographic primitives through leakages of their physical implementations. As opposed to supervised attacks, they do not require a preliminary profiling of the target, constituting a broader threat since they imply weaker assumptions on the adversary model. Their downside is their requirement for some a priori knowledge on the leakage model of the device. On one hand, stochastic attacks such as the Linear Regression Analysis (LRA) allow for a flexible a priori, but are mostly limited to a univariate treatment of the traces. On the other hand, model-based attacks require an explicit formulation of the leakage model but have recently been extended to multidimensional versions allowing to benefit from the potential of Deep Learning (DL) techniques. The EVIL Machine Attack (EMA), introduced in this paper, aims at taking the best of both worlds. Inspired by generative adversarial networks, its architecture is able to recover a representation of the leakage model, which is then turned into a key distinguisher allowing flexible a priori. In addition, state-of-the-art DL techniques require 256 network trainings to conduct the attack. EMA requires only one, scaling down the time complexity of such attacks by a considerable factor. Simulations and real experiments show that EMA is applicable in cases where the adversary has very low knowledge on the leakage model, while significantly reducing the required number of traces compared to a classical LRA. Eventually, a generalization of EMA, able to deal with masked implementation is introduced.
无监督的侧信道攻击允许通过泄漏加密原语的物理实现来提取由其操纵的秘密密钥。与监督式攻击相反,它们不需要对目标进行初步分析,从而构成更广泛的威胁,因为它们对对手模型的假设较弱。它们的缺点是它们需要一些关于设备泄漏模型的先验知识。一方面,随机攻击,如线性回归分析(LRA)允许灵活的先验,但大多限于对轨迹的单变量处理。另一方面,基于模型的攻击需要明确的泄漏模型公式,但最近已经扩展到多维版本,允许从深度学习(DL)技术的潜力中受益。本文介绍的EVIL Machine Attack (EMA)旨在两全其美。受生成对抗网络的启发,其架构能够恢复泄漏模型的表示,然后将其转换为允许灵活先验的关键区分符。此外,最先进的深度学习技术需要256个网络训练才能进行攻击。EMA只需要一个,这大大降低了此类攻击的时间复杂度。仿真和实际实验表明,EMA适用于对手对泄漏模型的了解非常少的情况,同时与经典的LRA相比,显着减少了所需的走线数量。最后,介绍了一种能够处理掩码实现的泛化算法。
{"title":"The EVIL Machine: Encode, Visualize and Interpret the Leakage","authors":"Valence Cristiani, Maxime Lecomte, P. Maurine","doi":"10.1145/3555776.3577688","DOIUrl":"https://doi.org/10.1145/3555776.3577688","url":null,"abstract":"Unsupervised side-channel attacks allow extracting secret keys manipulated by cryptographic primitives through leakages of their physical implementations. As opposed to supervised attacks, they do not require a preliminary profiling of the target, constituting a broader threat since they imply weaker assumptions on the adversary model. Their downside is their requirement for some a priori knowledge on the leakage model of the device. On one hand, stochastic attacks such as the Linear Regression Analysis (LRA) allow for a flexible a priori, but are mostly limited to a univariate treatment of the traces. On the other hand, model-based attacks require an explicit formulation of the leakage model but have recently been extended to multidimensional versions allowing to benefit from the potential of Deep Learning (DL) techniques. The EVIL Machine Attack (EMA), introduced in this paper, aims at taking the best of both worlds. Inspired by generative adversarial networks, its architecture is able to recover a representation of the leakage model, which is then turned into a key distinguisher allowing flexible a priori. In addition, state-of-the-art DL techniques require 256 network trainings to conduct the attack. EMA requires only one, scaling down the time complexity of such attacks by a considerable factor. Simulations and real experiments show that EMA is applicable in cases where the adversary has very low knowledge on the leakage model, while significantly reducing the required number of traces compared to a classical LRA. Eventually, a generalization of EMA, able to deal with masked implementation is introduced.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77580079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Pain Assessment with Ultra-short Electrodermal Activity Signal 超短皮肤电活动信号自动疼痛评估
IF 1 Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577721
Xinwei Ji, Tianming Zhao, Wei Li, Albert Y. Zomaya
Automatic pain assessment systems can help patients get timely and effective pain relief treatment whenever needed. Such a system aims to provide the service with pain identification and pain intensity rating functions. Among the physiological signals, the electrodermal activity (EDA) signal emerges as a promising feature to support both functions in pain assessment. In this work, we propose a machine learning framework to implement pain identification and pain intensity rating using only EDA and its derived features. Our solution also explores the feasibility of using ultra-short EDA segmentation of about 5 seconds to meet real-time requirements. We evaluate our system on two datasets: Biovid, a publicly available dataset, and Apon, the one we build. Experimental results demonstrate that using just the ultra-short EDA signal as input, our algorithm outperforms state-of-the-art baselines and achieves a low regression error of 0.90.
自动疼痛评估系统可以帮助患者在需要时得到及时有效的疼痛缓解治疗。该系统旨在为该服务提供疼痛识别和疼痛强度评级功能。在生理信号中,皮电活动(EDA)信号作为一种有前景的特征在疼痛评估中支持这两种功能。在这项工作中,我们提出了一个机器学习框架,仅使用EDA及其衍生特征来实现疼痛识别和疼痛强度评级。我们的解决方案还探索了使用5秒左右的超短EDA分割来满足实时需求的可行性。我们在两个数据集上评估我们的系统:Biovid(一个公开可用的数据集)和Apon(我们构建的数据集)。实验结果表明,仅使用超短EDA信号作为输入,我们的算法优于最先进的基线,并实现了0.90的低回归误差。
{"title":"Automatic Pain Assessment with Ultra-short Electrodermal Activity Signal","authors":"Xinwei Ji, Tianming Zhao, Wei Li, Albert Y. Zomaya","doi":"10.1145/3555776.3577721","DOIUrl":"https://doi.org/10.1145/3555776.3577721","url":null,"abstract":"Automatic pain assessment systems can help patients get timely and effective pain relief treatment whenever needed. Such a system aims to provide the service with pain identification and pain intensity rating functions. Among the physiological signals, the electrodermal activity (EDA) signal emerges as a promising feature to support both functions in pain assessment. In this work, we propose a machine learning framework to implement pain identification and pain intensity rating using only EDA and its derived features. Our solution also explores the feasibility of using ultra-short EDA segmentation of about 5 seconds to meet real-time requirements. We evaluate our system on two datasets: Biovid, a publicly available dataset, and Apon, the one we build. Experimental results demonstrate that using just the ultra-short EDA signal as input, our algorithm outperforms state-of-the-art baselines and achieves a low regression error of 0.90.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91301899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1