首页 > 最新文献

Open Computer Science最新文献

英文 中文
A DSL for Resource Checking Using Finite State Automaton-Driven Symbolic Execution 一种利用有限状态自动机驱动符号执行进行资源检查的DSL
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0120
Endre Fülöp, Norbert Pataki
Abstract Static analysis is an essential way to find code smells and bugs. It checks the source code without execution and no test cases are required, therefore its cost is lower than testing. Moreover, static analysis can help in software engineering comprehensively, since static analysis can be used for the validation of code conventions, for measuring software complexity and for executing code refactorings as well. Symbolic execution is a static analysis method where the variables (e.g. input data) are interpreted with symbolic values. Clang Static Analyzer is a powerful symbolic execution engine based on the Clang compiler infrastructure that can be used with C, C++ and Objective-C. Validation of resources’ usage (e.g. files, memory) requires finite state automata (FSA) for modeling the state of resource (e.g. locked or acquired resource). In this paper, we argue for an approach in which automata are in-use during symbolic execution. The generic automaton can be customized for different resources. We present our domain-specific language to define automata in terms of syntactic and semantic rules. We have developed a tool for this approach which parses the automaton and generates Clang Static Analyzer checker that can be used in the symbolic execution engine. We show an example automaton in our domain-specific language and the usage of generated checker.
摘要静态分析是发现代码气味和错误的重要方法。它在不执行的情况下检查源代码,并且不需要测试用例,因此其成本低于测试。此外,静态分析可以全面帮助软件工程,因为静态分析可以用于验证代码约定、测量软件复杂性以及执行代码重构。符号执行是一种静态分析方法,其中变量(例如输入数据)用符号值进行解释。Clang静态分析器是一个强大的符号执行引擎,基于Clang编译器基础设施,可与C、C++和Objective-C一起使用。验证资源的使用情况(如文件、内存)需要有限状态自动机(FSA)来建模资源的状态(如锁定或获取的资源)。在本文中,我们提出了一种在符号执行过程中使用自动机的方法。通用自动机可以针对不同的资源进行定制。我们提出了我们的领域特定语言来根据句法和语义规则定义自动机。我们为这种方法开发了一个工具,它解析自动机并生成Clang静态分析器检查器,该检查器可用于符号执行引擎。我们展示了领域特定语言中的一个示例自动机以及生成检查器的用法。
{"title":"A DSL for Resource Checking Using Finite State Automaton-Driven Symbolic Execution","authors":"Endre Fülöp, Norbert Pataki","doi":"10.1515/comp-2020-0120","DOIUrl":"https://doi.org/10.1515/comp-2020-0120","url":null,"abstract":"Abstract Static analysis is an essential way to find code smells and bugs. It checks the source code without execution and no test cases are required, therefore its cost is lower than testing. Moreover, static analysis can help in software engineering comprehensively, since static analysis can be used for the validation of code conventions, for measuring software complexity and for executing code refactorings as well. Symbolic execution is a static analysis method where the variables (e.g. input data) are interpreted with symbolic values. Clang Static Analyzer is a powerful symbolic execution engine based on the Clang compiler infrastructure that can be used with C, C++ and Objective-C. Validation of resources’ usage (e.g. files, memory) requires finite state automata (FSA) for modeling the state of resource (e.g. locked or acquired resource). In this paper, we argue for an approach in which automata are in-use during symbolic execution. The generic automaton can be customized for different resources. We present our domain-specific language to define automata in terms of syntactic and semantic rules. We have developed a tool for this approach which parses the automaton and generates Clang Static Analyzer checker that can be used in the symbolic execution engine. We show an example automaton in our domain-specific language and the usage of generated checker.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0120","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45957105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On some innovations in teaching the formal semantics using software tools 软件工具在形式语义学教学中的一些创新
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0130
William Steingartner
Abstract In this work we discuss the motivation for innovations and need of a teaching tool for the visualization of the natural semantics method of imperative programming languages. We present the rôle of the teaching software, its design, development and use in the teaching process. Our software module is able to visualize the natural semantics evaluation of programs. It serves as a compiler with environment that can visually interpret simple programming language Jane statements and to depict them into a derivation tree that represents the semantic method of natural semantics. A formal definition of programming language Jane used in the teaching of formal semantics and production rules in natural semantics for that language are shown as well. We present, how the presented teaching tool can provide particular visual steps in the process of finding the meaning of well-structured input program and to depict complete natural-semantic representation of an input program.
摘要在这项工作中,我们讨论了命令式编程语言的自然语义方法可视化的创新动机和教学工具的需求。我们介绍了教学软件的设计、开发以及在教学过程中的使用。我们的软件模块能够可视化程序的自然语义评估。它是一个编译器,其环境可以直观地解释简单的编程语言Jane语句,并将它们描述为表示自然语义的语义方法的派生树。还展示了Jane在形式语义教学中使用的编程语言的形式定义以及该语言的自然语义中的生成规则。我们介绍了所提供的教学工具如何在寻找结构良好的输入程序的含义的过程中提供特定的视觉步骤,并描述输入程序的完整自然语义表示。
{"title":"On some innovations in teaching the formal semantics using software tools","authors":"William Steingartner","doi":"10.1515/comp-2020-0130","DOIUrl":"https://doi.org/10.1515/comp-2020-0130","url":null,"abstract":"Abstract In this work we discuss the motivation for innovations and need of a teaching tool for the visualization of the natural semantics method of imperative programming languages. We present the rôle of the teaching software, its design, development and use in the teaching process. Our software module is able to visualize the natural semantics evaluation of programs. It serves as a compiler with environment that can visually interpret simple programming language Jane statements and to depict them into a derivation tree that represents the semantic method of natural semantics. A formal definition of programming language Jane used in the teaching of formal semantics and production rules in natural semantics for that language are shown as well. We present, how the presented teaching tool can provide particular visual steps in the process of finding the meaning of well-structured input program and to depict complete natural-semantic representation of an input program.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44963575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LIRKIS Global Collaborative Virtual Environments: Current State and Utilization Perspective LIRKIS全球协作虚拟环境:现状与利用前景
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0124
M. Hudák, Š. Korečko, B. Sobota
Abstract Recent advances in the field of web technologies, including the increasing support of virtual reality hardware, have allowed for shared virtual environments, reachable by just entering a URL in a browser. One contemporary solution that provides such a shared virtual reality is LIRKIS Global Collaborative Virtual Environments (LIRKIS G-CVE). It is a web-based software system, built on top of the A-Frame and Networked-Aframe frameworks. This paper describes LIRKIS G-CVE and introduces its two original components. The first one is the Smart-Client Interface, which turns smart devices, such as smartphones and tablets, into input devices. The advantage of this component over the standard way of user input is demonstrated by a series of experiments. The second component is the Enhanced Client Access layer, which provides access to positions and orientations of clients that share a virtual environment. The layer also stores a history of connected clients and provides limited control over the clients. The paper also outlines an ongoing experiment aimed at an evaluation of LIRKIS G-CVE in the area of virtual prototype testing.
摘要网络技术领域的最新进展,包括对虚拟现实硬件的日益支持,已经允许共享虚拟环境,只需在浏览器中输入URL即可访问。提供这种共享虚拟现实的一个当代解决方案是LIRKIS全球协作虚拟环境(LIRKIS G-CVE)。它是一个基于网络的软件系统,建立在a-Frame和Networked Aframe框架之上。本文介绍了LIRKIS G-CVE,并介绍了它的两个原始组件。第一个是智能客户端接口,它将智能手机和平板电脑等智能设备变成输入设备。通过一系列实验证明了该组件相对于标准用户输入方式的优势。第二个组件是增强型客户端访问层,它提供对共享虚拟环境的客户端的位置和方向的访问。该层还存储连接的客户端的历史记录,并提供对客户端的有限控制。本文还概述了一项正在进行的实验,旨在评估LIRKIS G-CVE在虚拟样机测试领域的性能。
{"title":"LIRKIS Global Collaborative Virtual Environments: Current State and Utilization Perspective","authors":"M. Hudák, Š. Korečko, B. Sobota","doi":"10.1515/comp-2020-0124","DOIUrl":"https://doi.org/10.1515/comp-2020-0124","url":null,"abstract":"Abstract Recent advances in the field of web technologies, including the increasing support of virtual reality hardware, have allowed for shared virtual environments, reachable by just entering a URL in a browser. One contemporary solution that provides such a shared virtual reality is LIRKIS Global Collaborative Virtual Environments (LIRKIS G-CVE). It is a web-based software system, built on top of the A-Frame and Networked-Aframe frameworks. This paper describes LIRKIS G-CVE and introduces its two original components. The first one is the Smart-Client Interface, which turns smart devices, such as smartphones and tablets, into input devices. The advantage of this component over the standard way of user input is demonstrated by a series of experiments. The second component is the Enhanced Client Access layer, which provides access to positions and orientations of clients that share a virtual environment. The layer also stores a history of connected clients and provides limited control over the clients. The paper also outlines an ongoing experiment aimed at an evaluation of LIRKIS G-CVE in the area of virtual prototype testing.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0124","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45480255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Selected tools for Java class and bytecode inspection in the educational environment 教育环境中用于Java类和字节码检查的选定工具
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0170
T. Dobravec
Abstract Java is not only a modern, powerful, and frequently used programming language, but together with Java Virtual Machine it represents a novel dynamic approach of writing and executing computer programs. The fact that Java programs are executed in a controlled environment has several important implications that define the nature of the language and makes it different from the traditional C-like languages. Knowing the detailed differences between the two types of languages and execution environments is a part of the holistic education of a computer engineer. In this paper, we present some behind-the-scene details about the Java Virtual Machine and we show how these details could be used in the educational process to demonstrate the differences and to emphasise the advantages of the dynamic programming approach when compared to the static one. After presenting some information about class files and about the internal structure and operation of the Java Virtual Machine we demonstrate the usage of public domain programs that could be used in the educational process to put these theoretical concepts into practice.
抽象Java不仅是一种现代、强大且经常使用的编程语言,而且它与Java虚拟机一起代表了一种编写和执行计算机程序的新型动态方法。Java程序在受控环境中执行这一事实有几个重要的含义,这些含义定义了语言的性质,并使其与传统的类C语言不同。了解这两种类型的语言和执行环境之间的详细差异是计算机工程师整体教育的一部分。在本文中,我们介绍了Java虚拟机的一些幕后细节,并展示了如何在教育过程中使用这些细节来展示差异,并强调动态编程方法与静态编程方法相比的优势。在介绍了一些关于类文件以及Java虚拟机的内部结构和操作的信息后,我们展示了在教育过程中可以使用的公共领域程序的用法,以将这些理论概念付诸实践。
{"title":"Selected tools for Java class and bytecode inspection in the educational environment","authors":"T. Dobravec","doi":"10.1515/comp-2020-0170","DOIUrl":"https://doi.org/10.1515/comp-2020-0170","url":null,"abstract":"Abstract Java is not only a modern, powerful, and frequently used programming language, but together with Java Virtual Machine it represents a novel dynamic approach of writing and executing computer programs. The fact that Java programs are executed in a controlled environment has several important implications that define the nature of the language and makes it different from the traditional C-like languages. Knowing the detailed differences between the two types of languages and execution environments is a part of the holistic education of a computer engineer. In this paper, we present some behind-the-scene details about the Java Virtual Machine and we show how these details could be used in the educational process to demonstrate the differences and to emphasise the advantages of the dynamic programming approach when compared to the static one. After presenting some information about class files and about the internal structure and operation of the Java Virtual Machine we demonstrate the usage of public domain programs that could be used in the educational process to put these theoretical concepts into practice.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0170","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43238530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface to Special Issue “Informatics 2019” 《信息学2019》特刊前言
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0216
William Steingartner
The conference was held in Poprad, Slovakia, November 20-22, 2019. It became a significant international forum for academic scientists, engineers, researchers and young IT experts together to exchange and share their experiences and research results about most aspects of science and social research, discuss the practical challenges encountered and the solutions adopted and bringing new ideas. The research in computer science and technology has been growing so exponentially over the recent years. Computer science has a large potential impact on interdisciplinary collaboration. Moreover, computer technologies are often central to much scientific research. The main purpose of the conference was, in particular, to bring together people active in the area of computer science and related sciences and to present new research results. A lot of interesting papers were presented at the conference, so the selection process was not easy. The program committee formulated criteria for the first round of the selections process, then the selectionswere confirmedby sessions chairs in the second round. After the careful selection process for this special issue, 19 articles were recommended for further publishing. All articles in this edition have been significantly expanded by the authors with new scientific results and have been reviewed again. The topics covered in this special issue include theoretical computer science, artificial intelligence, programming paradigms, software engineering, applied informatics, computer networks, simulation, computer graphics and virtual reality. This volume focuses on actual problems in computer science and related fields, and it presents both theoretical and practical results and applications thus exploiting the innovative approaches. It reflects the main thrust of research in computer science and related fields and establishes contactswith experts of these fields. I would like to express my appreciation to the authors of all papers for their important contribution. Due to their fruitful research andhelpful cooperation, it was possible to provide such broad coverage of this area of scientific research. I also would like to thank all reviewers for their valuable opinions and recommendations. Thanks to their expertise andexperience, theyhave contributed to increasing the impact of the submitted articles. My special thanks go to the journal’s management for their kind cooperation and willingness to helpwith this special issue, as well as for thewonderful cooperation, which has become a nice tradition.
会议于2019年11月20日至22日在斯洛伐克波普拉德举行。它成为一个重要的国际论坛,学术科学家、工程师、研究人员和年轻的It专家可以在这里交流和分享他们在科学和社会研究的大多数方面的经验和研究成果,讨论遇到的实际挑战和采用的解决方案,并带来新的想法。近年来,计算机科学和技术的研究呈指数级增长。计算机科学对跨学科合作具有巨大的潜在影响。此外,计算机技术往往是许多科学研究的核心。会议的主要目的尤其是将活跃在计算机科学和相关科学领域的人们聚集在一起,并介绍新的研究成果。会议上发表了许多有趣的论文,所以评选过程并不容易。项目委员会为第一轮选拔过程制定了标准,然后由第二轮会议主席确认了选拔结果。本期特刊经过精心挑选,共推荐19篇文章发表。本版中的所有文章都由作者以新的科学成果进行了显著扩展,并再次进行了审查。本期特刊涵盖的主题包括理论计算机科学、人工智能、编程范式、软件工程、应用信息学、计算机网络、仿真、计算机图形学和虚拟现实。本卷聚焦于计算机科学及相关领域的实际问题,介绍了理论和实践结果及应用,从而开拓了创新的方法。它反映了计算机科学及相关领域的研究重点,并与这些领域的专家建立了联系。我想对所有论文的作者的重要贡献表示感谢。由于他们富有成果的研究和有益的合作,有可能在这一科学研究领域提供如此广泛的覆盖范围。我还要感谢所有审查人员提出的宝贵意见和建议。由于他们的专业知识和经验,他们为增加提交文章的影响力做出了贡献。我特别感谢该杂志的管理层,感谢他们的友好合作和愿意为这期特刊提供帮助,也感谢他们的长期合作,这已成为一种良好的传统。
{"title":"Preface to Special Issue “Informatics 2019”","authors":"William Steingartner","doi":"10.1515/comp-2020-0216","DOIUrl":"https://doi.org/10.1515/comp-2020-0216","url":null,"abstract":"The conference was held in Poprad, Slovakia, November 20-22, 2019. It became a significant international forum for academic scientists, engineers, researchers and young IT experts together to exchange and share their experiences and research results about most aspects of science and social research, discuss the practical challenges encountered and the solutions adopted and bringing new ideas. The research in computer science and technology has been growing so exponentially over the recent years. Computer science has a large potential impact on interdisciplinary collaboration. Moreover, computer technologies are often central to much scientific research. The main purpose of the conference was, in particular, to bring together people active in the area of computer science and related sciences and to present new research results. A lot of interesting papers were presented at the conference, so the selection process was not easy. The program committee formulated criteria for the first round of the selections process, then the selectionswere confirmedby sessions chairs in the second round. After the careful selection process for this special issue, 19 articles were recommended for further publishing. All articles in this edition have been significantly expanded by the authors with new scientific results and have been reviewed again. The topics covered in this special issue include theoretical computer science, artificial intelligence, programming paradigms, software engineering, applied informatics, computer networks, simulation, computer graphics and virtual reality. This volume focuses on actual problems in computer science and related fields, and it presents both theoretical and practical results and applications thus exploiting the innovative approaches. It reflects the main thrust of research in computer science and related fields and establishes contactswith experts of these fields. I would like to express my appreciation to the authors of all papers for their important contribution. Due to their fruitful research andhelpful cooperation, it was possible to provide such broad coverage of this area of scientific research. I also would like to thank all reviewers for their valuable opinions and recommendations. Thanks to their expertise andexperience, theyhave contributed to increasing the impact of the submitted articles. My special thanks go to the journal’s management for their kind cooperation and willingness to helpwith this special issue, as well as for thewonderful cooperation, which has become a nice tradition.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0216","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42113514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-standard situation detection in smart water metering 智能水表中的非标准状态检测
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0190
O. Kainz, E. Karpiel, R. Petija, M. Michalko, F. Jakab
Abstract In this paper an algorithm for detection of nonstandard situations in smart water metering based on machine learning is designed. The main categories for nonstandard situation or anomaly detection and two common methods for anomaly detection are analyzed. The proposed solution needs to fit the requirements for correct, efficient and real-time detection of non-standard situations in actual water consumption with minimal required consumer intervention to its operation. Moreover, a proposal to extend the original hardware solution is described and implemented to accommodate the needs of the detection algorithm. The final implemented and tested solution evaluates anomalies in water consumption for a given time in specific day and month using machine learning with a semi-supervised approach.
摘要本文设计了一种基于机器学习的智能水表非标准情况检测算法。分析了非标准状态或异常检测的主要类别以及两种常见的异常检测方法。所提出的解决方案需要满足在实际用水量中正确、高效和实时检测非标准情况的要求,同时对其操作进行最少的消费者干预。此外,描述并实现了扩展原始硬件解决方案的建议,以满足检测算法的需求。最终实现和测试的解决方案使用机器学习和半监督方法评估特定日期和月份给定时间的用水量异常。
{"title":"Non-standard situation detection in smart water metering","authors":"O. Kainz, E. Karpiel, R. Petija, M. Michalko, F. Jakab","doi":"10.1515/comp-2020-0190","DOIUrl":"https://doi.org/10.1515/comp-2020-0190","url":null,"abstract":"Abstract In this paper an algorithm for detection of nonstandard situations in smart water metering based on machine learning is designed. The main categories for nonstandard situation or anomaly detection and two common methods for anomaly detection are analyzed. The proposed solution needs to fit the requirements for correct, efficient and real-time detection of non-standard situations in actual water consumption with minimal required consumer intervention to its operation. Moreover, a proposal to extend the original hardware solution is described and implemented to accommodate the needs of the detection algorithm. The final implemented and tested solution evaluates anomalies in water consumption for a given time in specific day and month using machine learning with a semi-supervised approach.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45633156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimental evaluation of refinement techniques for the subgraph isomorphism backtracking algorithms 子图同构回溯算法改进技术的实验评价
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0149
J. Mihelic, U. Cibej
Abstract In this paper, we study a well-known computationally hard problem, called the subgraph isomorphism problem where the goal is for a given pattern and target graphs to determine whether the pattern is a subgraph of the target graph. Numerous algorithms for solving the problem exist in the literature and most of them are based on the backtracking approach. Since straightforward backtracking is usually slow, many algorithmic refinement techniques are used in practical algorithms. The main goal of this paper is to study such refinement techniques and to determine their ability to speed up backtracking algorithms. To do this we use a methodology of experimental algorithmics. We perform an experimental evaluation of the techniques and their combinations and, hence, demonstrate their usefulness in practice.
摘要本文研究了子图同构问题,该问题的目标是给定的模式和目标图是否为目标图的子图。文献中存在许多求解该问题的算法,其中大多数都是基于回溯方法。由于直接回溯通常很慢,因此在实际算法中使用了许多算法改进技术。本文的主要目标是研究这种细化技术,并确定它们加速回溯算法的能力。为了做到这一点,我们使用实验算法的方法。我们对这些技术及其组合进行了实验评估,从而证明了它们在实践中的实用性。
{"title":"An experimental evaluation of refinement techniques for the subgraph isomorphism backtracking algorithms","authors":"J. Mihelic, U. Cibej","doi":"10.1515/comp-2020-0149","DOIUrl":"https://doi.org/10.1515/comp-2020-0149","url":null,"abstract":"Abstract In this paper, we study a well-known computationally hard problem, called the subgraph isomorphism problem where the goal is for a given pattern and target graphs to determine whether the pattern is a subgraph of the target graph. Numerous algorithms for solving the problem exist in the literature and most of them are based on the backtracking approach. Since straightforward backtracking is usually slow, many algorithmic refinement techniques are used in practical algorithms. The main goal of this paper is to study such refinement techniques and to determine their ability to speed up backtracking algorithms. To do this we use a methodology of experimental algorithmics. We perform an experimental evaluation of the techniques and their combinations and, hence, demonstrate their usefulness in practice.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0149","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45945038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weak Berge Equilibrium in Finite Three-person Games: Conception and Computation 有限三人对策中的弱Berge平衡:概念与计算
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0210
K. Kudryavtsev, U. Malkov
Abstract The paper proposes the concept of a weak Berge equilibrium. Unlike the Berge equilibrium, the moral basis of this equilibrium is the Hippocratic Oath “First do no harm”. On the other hand, any Berge equilibrium is a weak Berge equilibrium. But, there are weak Berge equilibria, which are not the Berge equilibria. The properties of the weak Berge equilibrium have been investigated. The existence of the weak Berge equilibrium in mixed strategies has been established for finite games. The weak Berge equilibria for finite three-person non-cooperative games are computed.
摘要提出了弱Berge均衡的概念。与Berge均衡不同,这种均衡的道德基础是希波克拉底誓言“首先不伤害”。另一方面,任何贝尔热均衡都是弱贝尔热均衡。但也有弱贝尔热均衡,不是贝尔热均衡。研究了弱Berge平衡的性质。证明了有限对策下混合策略弱Berge均衡的存在性。计算了有限三人非合作对策的弱Berge均衡。
{"title":"Weak Berge Equilibrium in Finite Three-person Games: Conception and Computation","authors":"K. Kudryavtsev, U. Malkov","doi":"10.1515/comp-2020-0210","DOIUrl":"https://doi.org/10.1515/comp-2020-0210","url":null,"abstract":"Abstract The paper proposes the concept of a weak Berge equilibrium. Unlike the Berge equilibrium, the moral basis of this equilibrium is the Hippocratic Oath “First do no harm”. On the other hand, any Berge equilibrium is a weak Berge equilibrium. But, there are weak Berge equilibria, which are not the Berge equilibria. The properties of the weak Berge equilibrium have been investigated. The existence of the weak Berge equilibrium in mixed strategies has been established for finite games. The weak Berge equilibria for finite three-person non-cooperative games are computed.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0210","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42674173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unit Under Test Identification Using Natural Language Processing Techniques 利用自然语言处理技术识别被测单元
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0150
Matej Madeja, J. Porubän
Abstract Unit under test identification (UUT) is often difficult due to test smells, such as testing multiple UUTs in one test. Because the tests best reflect the current product specification they can be used to comprehend parts of the production code and the relationships between them. Because there is a similar vocabulary between the test and UUT, five NLP techniques were used on the source code of 5 popular Github projects in this paper. The collected results were compared with the manually identified UUTs. The tf-idf model achieved the best accuracy of 22% for a right UUT and 57% with a tolerance up to fifth place of manual identification. These results were obtained after preprocessing input documents with java keywords removal and word split. The tf-idf model achieved the best model training time and the index search takes within 1s per request, so it could be used in an Integrated Development Environment (IDE) as a support tool in the future. At the same time, it has been found that, for document preprocessing, word splitting improves accuracy best and removing java keywords has just a small improvement for tf-idf model results. Removing comments only slightly worsens the accuracy of Natural Language Processing (NLP) models. The best speed provided the word splitting with average 0.3s preprocessing time per all documents in a project.
摘要被测单元识别(UUT)通常由于测试气味而困难,例如在一次测试中测试多个UUT。因为测试最能反映当前的产品规范,所以它们可以用来理解生产代码的各个部分以及它们之间的关系。由于测试和UUT之间有相似的词汇,本文在5个流行的Github项目的源代码中使用了五种NLP技术。将收集的结果与手动识别的UUT进行比较。对于右侧UUT,tf-idf模型实现了22%的最佳精度,并且在手动识别的公差高达第五位的情况下实现了57%的最佳精度。这些结果是在对输入文档进行java关键词去除和分词预处理后获得的。tf-idf模型实现了最佳的模型训练时间,每个请求的索引搜索时间在1秒内,因此它可以在集成开发环境(IDE)中用作未来的支持工具。同时,研究发现,对于文档预处理,分词能最好地提高准确性,而去除java关键字对tf-idf模型结果的改善很小。删除注释只会略微恶化自然语言处理(NLP)模型的准确性。最佳速度提供了一个项目中每个文档平均0.3秒的预处理时间的分词。
{"title":"Unit Under Test Identification Using Natural Language Processing Techniques","authors":"Matej Madeja, J. Porubän","doi":"10.1515/comp-2020-0150","DOIUrl":"https://doi.org/10.1515/comp-2020-0150","url":null,"abstract":"Abstract Unit under test identification (UUT) is often difficult due to test smells, such as testing multiple UUTs in one test. Because the tests best reflect the current product specification they can be used to comprehend parts of the production code and the relationships between them. Because there is a similar vocabulary between the test and UUT, five NLP techniques were used on the source code of 5 popular Github projects in this paper. The collected results were compared with the manually identified UUTs. The tf-idf model achieved the best accuracy of 22% for a right UUT and 57% with a tolerance up to fifth place of manual identification. These results were obtained after preprocessing input documents with java keywords removal and word split. The tf-idf model achieved the best model training time and the index search takes within 1s per request, so it could be used in an Integrated Development Environment (IDE) as a support tool in the future. At the same time, it has been found that, for document preprocessing, word splitting improves accuracy best and removing java keywords has just a small improvement for tf-idf model results. Removing comments only slightly worsens the accuracy of Natural Language Processing (NLP) models. The best speed provided the word splitting with average 0.3s preprocessing time per all documents in a project.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0150","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42762344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimality and Complexity Analysis of a Branch-and-Bound Method in Solving Some Instances of the Subset Sum Problem 分支定界法求解子集和问题若干实例的最优性和复杂性分析
IF 1.5 Q2 Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0212
R. Kolpakov, M. Posypkin
Abstract In this paper we study the question of parallelization of a variant of Branch-and-Bound method for solving of the subset sum problem which is a special case of the Boolean knapsack problem. The following natural approach to the solution of this question is considered. At the first stage one of the processors (control processor) performs some number of algorithm steps of solving a given problem with generating some number of subproblems of the problem. In the second stage the generated subproblems are sent to other processors for solving (one subproblem per processor). Processors solve completely the received subproblems and return their solutions to the control processor which chooses the optimal solution of the initial problem from these solutions. For this approach we define formally a model of parallel computing (frontal parallelization scheme) and the notion of complexity of the frontal scheme. We study the asymptotic behavior of the complexity of the frontal scheme for two special cases of the subset sum problem.
摘要本文研究了布尔背包问题的一个特例——子集和问题的分支定界法的一个变种的并行化问题。以下是解决这个问题的自然方法。在第一阶段,其中一个处理器(控制处理器)执行一定数量的算法步骤来解决给定问题,同时生成该问题的一定数量的子问题。在第二阶段,生成的子问题被发送到其他处理器进行求解(每个处理器一个子问题)。处理器完全解决接收到的子问题,并将它们的解返回给控制处理器,控制处理器从这些解中选择初始问题的最优解。对于这种方法,我们正式定义了并行计算的模型(前沿并行化方案)和前沿方案的复杂性概念。我们研究了子集和问题的两个特殊情况下,前沿格式复杂性的渐近行为。
{"title":"Optimality and Complexity Analysis of a Branch-and-Bound Method in Solving Some Instances of the Subset Sum Problem","authors":"R. Kolpakov, M. Posypkin","doi":"10.1515/comp-2020-0212","DOIUrl":"https://doi.org/10.1515/comp-2020-0212","url":null,"abstract":"Abstract In this paper we study the question of parallelization of a variant of Branch-and-Bound method for solving of the subset sum problem which is a special case of the Boolean knapsack problem. The following natural approach to the solution of this question is considered. At the first stage one of the processors (control processor) performs some number of algorithm steps of solving a given problem with generating some number of subproblems of the problem. In the second stage the generated subproblems are sent to other processors for solving (one subproblem per processor). Processors solve completely the received subproblems and return their solutions to the control processor which chooses the optimal solution of the initial problem from these solutions. For this approach we define formally a model of parallel computing (frontal parallelization scheme) and the notion of complexity of the frontal scheme. We study the asymptotic behavior of the complexity of the frontal scheme for two special cases of the subset sum problem.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0212","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44053560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1