首页 > 最新文献

Proceedings of the 16th ACM International Conference on Computing Frontiers最新文献

英文 中文
TIGER 老虎
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3321556
Anastasiia Butko, George Michelogiannakis, D. Donofrio, J. Shalf
Optimal mapping of a parallel code's communication graph is increasingly important as both system size and heterogeneity increase. However, the topology-aware task assignment problem is an NP-complete graph isomorphism problem. Existing task scheduling approaches are either heuristic or based on physical optimization algorithms, providing different speed and solution quality tradeoffs. Ising machines such as quantum and digital annealers have recently become available offering an alternative hardware solution to solve certain types of optimization problems. We propose an algorithm that allows expressing the problem for such machines and a domain specific partition strategy that enables to solve larger scale problems. TIGER - topology-aware task assignment mapper tool - implements the proposed algorithm and automatically integrates task - communication graph and an architecture graph into the quantum software environment. We use D-Wave's quantum annealer to demonstrate the solving algorithm and evaluate the proposed tool flow in terms of performance, partition efficiency and solution quality. Results show significant speed-up of the tool flow and reliable solution quality while using TIGER together with the proposed partition.
{"title":"TIGER","authors":"Anastasiia Butko, George Michelogiannakis, D. Donofrio, J. Shalf","doi":"10.1145/3310273.3321556","DOIUrl":"https://doi.org/10.1145/3310273.3321556","url":null,"abstract":"Optimal mapping of a parallel code's communication graph is increasingly important as both system size and heterogeneity increase. However, the topology-aware task assignment problem is an NP-complete graph isomorphism problem. Existing task scheduling approaches are either heuristic or based on physical optimization algorithms, providing different speed and solution quality tradeoffs. Ising machines such as quantum and digital annealers have recently become available offering an alternative hardware solution to solve certain types of optimization problems. We propose an algorithm that allows expressing the problem for such machines and a domain specific partition strategy that enables to solve larger scale problems. TIGER - topology-aware task assignment mapper tool - implements the proposed algorithm and automatically integrates task - communication graph and an architecture graph into the quantum software environment. We use D-Wave's quantum annealer to demonstrate the solving algorithm and evaluate the proposed tool flow in terms of performance, partition efficiency and solution quality. Results show significant speed-up of the tool flow and reliable solution quality while using TIGER together with the proposed partition.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123583636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of parallel programming frameworks for distributed GPU applications 分布式GPU应用并行编程框架的比较研究
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323071
Ruidong Gu, M. Becchi
Parallel programming frameworks such as MPI, OpenSHMEM, Charm++ and Legion have been widely used in many scientific domains (from bioinformatics, to computational physics, chemistry, among others) to implement distributed applications. While they have the same purpose, these frameworks differ in terms of programmability, performance, and scalability under different applications and cluster types. Hence, it is important for programmers to select the programming framework that is best suited to the characteristics of their application types (i.e. its computation and communication patterns) and the hardware setup of the target high-performance computing cluster. In this work, we consider several popular parallel programming frameworks for distributed applications. We first analyze their memory model, execution model, synchronization model and GPU support. We then compare their programmability, performance, scalability, and load-balancing capability on homogeneous computing cluster equipped with GPUs.
并行编程框架,如MPI、OpenSHMEM、Charm++和Legion,已经广泛应用于许多科学领域(从生物信息学到计算物理、化学等)来实现分布式应用程序。虽然它们具有相同的目的,但在不同的应用程序和集群类型下,这些框架在可编程性、性能和可伸缩性方面有所不同。因此,对于程序员来说,选择最适合其应用程序类型特征(即其计算和通信模式)和目标高性能计算集群的硬件设置的编程框架是很重要的。在这项工作中,我们考虑了几个流行的分布式应用程序并行编程框架。我们首先分析了它们的内存模型、执行模型、同步模型和GPU支持。然后,我们比较了它们在配备gpu的同构计算集群上的可编程性、性能、可伸缩性和负载平衡能力。
{"title":"A comparative study of parallel programming frameworks for distributed GPU applications","authors":"Ruidong Gu, M. Becchi","doi":"10.1145/3310273.3323071","DOIUrl":"https://doi.org/10.1145/3310273.3323071","url":null,"abstract":"Parallel programming frameworks such as MPI, OpenSHMEM, Charm++ and Legion have been widely used in many scientific domains (from bioinformatics, to computational physics, chemistry, among others) to implement distributed applications. While they have the same purpose, these frameworks differ in terms of programmability, performance, and scalability under different applications and cluster types. Hence, it is important for programmers to select the programming framework that is best suited to the characteristics of their application types (i.e. its computation and communication patterns) and the hardware setup of the target high-performance computing cluster. In this work, we consider several popular parallel programming frameworks for distributed applications. We first analyze their memory model, execution model, synchronization model and GPU support. We then compare their programmability, performance, scalability, and load-balancing capability on homogeneous computing cluster equipped with GPUs.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129479182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Embedding principal component analysis for data reduction in structural health monitoring on low-cost IoT gateways 嵌入主成分分析在低成本物联网网关结构健康监测中的数据缩减
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3322822
A. Burrello, Alex Marchioni, D. Brunelli, L. Benini
Principal component analysis (PCA) is a powerful data reduction method for Structural Health Monitoring. However, its computational cost and data memory footprint pose a significant challenge when PCA has to run on limited capability embedded platforms in low-cost IoT gateways. This paper presents a memory-efficient parallel implementation of the streaming History PCA algorithm. On our dataset, it achieves 10x compression factor and 59x memory reduction with less than 0.15 dB degradation in the reconstructed signal-to-noise ratio (RSNR) compared to standard PCA. Moreover, the algorithm benefits from parallelization on multiple cores, achieving a maximum speedup of 4.8x on Samsung ARTIK 710.
主成分分析(PCA)是结构健康监测中一种强有力的数据约简方法。然而,当PCA必须在低成本物联网网关的有限功能嵌入式平台上运行时,其计算成本和数据内存占用构成了重大挑战。本文提出了一种高效内存的流历史PCA算法的并行实现。在我们的数据集上,与标准PCA相比,它实现了10倍的压缩系数和59倍的内存减少,重构信噪比(RSNR)的下降小于0.15 dB。此外,该算法受益于多核并行化,在三星ARTIK 710上实现了4.8倍的最大加速。
{"title":"Embedding principal component analysis for data reduction in structural health monitoring on low-cost IoT gateways","authors":"A. Burrello, Alex Marchioni, D. Brunelli, L. Benini","doi":"10.1145/3310273.3322822","DOIUrl":"https://doi.org/10.1145/3310273.3322822","url":null,"abstract":"Principal component analysis (PCA) is a powerful data reduction method for Structural Health Monitoring. However, its computational cost and data memory footprint pose a significant challenge when PCA has to run on limited capability embedded platforms in low-cost IoT gateways. This paper presents a memory-efficient parallel implementation of the streaming History PCA algorithm. On our dataset, it achieves 10x compression factor and 59x memory reduction with less than 0.15 dB degradation in the reconstructed signal-to-noise ratio (RSNR) compared to standard PCA. Moreover, the algorithm benefits from parallelization on multiple cores, achieving a maximum speedup of 4.8x on Samsung ARTIK 710.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
NPUFort: a secure architecture of DNN accelerator against model inversion attack NPUFort:一种DNN加速器抗模型反转攻击的安全架构
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323070
Xingbin Wang, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng
Deep neural network (DNN) models are widely used for inference in many application scenarios. DNN accelerators are not designed with security in mind, but for higher performance and lower energy consumption. Hence, they are suffering from the security risk of being attacked. The insecure design flaws of existing DNN accelerators can be exploited to recover the structure of DNN model from the plain instructions, thus the runtime environment can be controlled to obtain the weights of DNN model. Furthermore, the structure of DNN model running on the accelerator is acquired by the side channel information and interrupt status register. To protect general DNN accelerator from being attacked by model inversion attack, this paper proposes a secure and general architecture called NPUFort, which guarantees the confidentiality of the parameters of DNN model and mitigates side-channel information leakage. The experimental results demonstrate the feasibility and effectiveness of the secure architecture of DNN accelerators with negligible performance overhead.
深度神经网络(Deep neural network, DNN)模型在许多应用场景中被广泛用于推理。DNN加速器的设计并没有考虑到安全性,而是为了更高的性能和更低的能耗。因此,他们面临着被攻击的安全风险。利用现有DNN加速器的不安全设计缺陷,从普通指令中恢复DNN模型的结构,从而控制运行环境,获得DNN模型的权值。通过边信道信息和中断状态寄存器获取运行在加速器上的深度神经网络模型的结构。为了防止通用DNN加速器受到模型反演攻击,本文提出了一种安全通用的NPUFort架构,保证了DNN模型参数的保密性,减轻了侧信道信息的泄漏。实验结果证明了DNN加速器安全架构的可行性和有效性,且性能开销可以忽略不计。
{"title":"NPUFort: a secure architecture of DNN accelerator against model inversion attack","authors":"Xingbin Wang, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng","doi":"10.1145/3310273.3323070","DOIUrl":"https://doi.org/10.1145/3310273.3323070","url":null,"abstract":"Deep neural network (DNN) models are widely used for inference in many application scenarios. DNN accelerators are not designed with security in mind, but for higher performance and lower energy consumption. Hence, they are suffering from the security risk of being attacked. The insecure design flaws of existing DNN accelerators can be exploited to recover the structure of DNN model from the plain instructions, thus the runtime environment can be controlled to obtain the weights of DNN model. Furthermore, the structure of DNN model running on the accelerator is acquired by the side channel information and interrupt status register. To protect general DNN accelerator from being attacked by model inversion attack, this paper proposes a secure and general architecture called NPUFort, which guarantees the confidentiality of the parameters of DNN model and mitigates side-channel information leakage. The experimental results demonstrate the feasibility and effectiveness of the secure architecture of DNN accelerators with negligible performance overhead.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130484793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Run-time performance monitoring of hardware accelerators: POSTER 硬件加速器的运行时性能监控:POSTER
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323423
D. Madroñal, Tiziana Fanni
In the era of Cyber Physical Systems, designers need to offer support for run-time adaptivity considering different constraints, including the internal status of the system. This work proposes a run-time monitoring approach for hardware accelerators, based on the Performance Application Programming Interface.
在网络物理系统时代,设计人员需要考虑不同的约束条件,包括系统的内部状态,为运行时适应性提供支持。本工作提出了一种基于性能应用程序编程接口的硬件加速器运行时监控方法。
{"title":"Run-time performance monitoring of hardware accelerators: POSTER","authors":"D. Madroñal, Tiziana Fanni","doi":"10.1145/3310273.3323423","DOIUrl":"https://doi.org/10.1145/3310273.3323423","url":null,"abstract":"In the era of Cyber Physical Systems, designers need to offer support for run-time adaptivity considering different constraints, including the internal status of the system. This work proposes a run-time monitoring approach for hardware accelerators, based on the Performance Application Programming Interface.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation of variable bit-width units in a RISC-V processor for approximate computing RISC-V处理器中用于近似计算的可变位宽单元的评估
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323159
Geneviève Ndour, T. Jost, A. Molnos, Y. Durand, A. Tisserand
Among various power reduction methods, variable bit-width arithmetic units have been proposed in approximate computing literature. In this paper, we add a variable bit-width memory unit in a RISC-V processor. Integrating both computation and memory units with variable bit-width leads to a power reduction: from 7% to 29% for Sobel filter application and from 13% to 24% for an application that computes the position of a robotic arm (forwardk2j). We also propose a global energy model for a RISC-V processor with variable bit-width units (for computation and memory). This model allows us to evaluate the impact of various parameters in both the software application (e.g., the amount of instructions that can be executed with a reduced bit-width) and the hardware architecture (e.g., impact of potential reduction for each unit).
在各种降功耗方法中,近似计算文献中提出了可变位宽算术单元。在本文中,我们在RISC-V处理器中增加了可变位宽存储器单元。将可变位宽的计算和存储单元集成在一起,可以降低功耗:对于索贝尔滤波器应用,功耗从7%降至29%;对于计算机械臂位置的应用,功耗从13%降至24% (forwardk2j)。我们还提出了具有可变位宽单元(用于计算和存储)的RISC-V处理器的全局能量模型。该模型允许我们评估软件应用程序(例如,可以使用减少的位宽执行的指令数量)和硬件架构(例如,每个单元的潜在减少的影响)中各种参数的影响。
{"title":"Evaluation of variable bit-width units in a RISC-V processor for approximate computing","authors":"Geneviève Ndour, T. Jost, A. Molnos, Y. Durand, A. Tisserand","doi":"10.1145/3310273.3323159","DOIUrl":"https://doi.org/10.1145/3310273.3323159","url":null,"abstract":"Among various power reduction methods, variable bit-width arithmetic units have been proposed in approximate computing literature. In this paper, we add a variable bit-width memory unit in a RISC-V processor. Integrating both computation and memory units with variable bit-width leads to a power reduction: from 7% to 29% for Sobel filter application and from 13% to 24% for an application that computes the position of a robotic arm (forwardk2j). We also propose a global energy model for a RISC-V processor with variable bit-width units (for computation and memory). This model allows us to evaluate the impact of various parameters in both the software application (e.g., the amount of instructions that can be executed with a reduced bit-width) and the hardware architecture (e.g., impact of potential reduction for each unit).","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
European processor initiative: the industrial cornerstone of EuroHPC for exascale era 欧洲处理器计划:百亿亿次时代欧洲高性能计算的工业基石
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323432
M. Kovač
EuroHPC Joint Undertaking is a new European Union's strategic entity focused on pooling of the Union's and national resources on HPC to acquire, build and deploy the most powerful supercomputers in the world within Europe. This talk explores the European Processor Initiative (EPI), one of the cornerstones of this European strategic plan, a joint collaboration between more than twenty partners, representing industrial companies, academia and research centres with the goal to build a production processor with drastically better performance and power in support of the EU's focus on delivering its own Exascale-systems built on EU IP and achieving processor independence. Launched in December, the first three years draws processor and platform design; embedded software, middleware, applications and usage experts from 10 EU countries together to co-design Europe's first HPC Systems on Chip and accelerator technologies. The EU-CPU family is targeted to debut in 2020 on a pre-exascale prototype system and production-ready by the 2021 timeframe.
EuroHPC Joint Undertaking是一个新的欧盟战略实体,专注于汇集欧盟和国家在HPC方面的资源,以在欧洲范围内获取、建造和部署世界上最强大的超级计算机。本次演讲探讨了欧洲处理器倡议(EPI),这是欧洲战略计划的基石之一,是20多个合作伙伴之间的联合合作,代表工业公司,学术界和研究中心,其目标是建立一个性能和功率大大提高的生产处理器,以支持欧盟专注于交付基于欧盟IP的自己的百亿亿级系统,并实现处理器独立性。12月推出,前三年绘制处理器和平台设计;来自10个欧盟国家的嵌入式软件、中间件、应用和使用专家共同设计了欧洲首个HPC芯片系统和加速器技术。欧盟cpu系列的目标是在2020年在一个pre-exascale原型系统上首次亮相,并在2021年的时间框架内准备好生产。
{"title":"European processor initiative: the industrial cornerstone of EuroHPC for exascale era","authors":"M. Kovač","doi":"10.1145/3310273.3323432","DOIUrl":"https://doi.org/10.1145/3310273.3323432","url":null,"abstract":"EuroHPC Joint Undertaking is a new European Union's strategic entity focused on pooling of the Union's and national resources on HPC to acquire, build and deploy the most powerful supercomputers in the world within Europe. This talk explores the European Processor Initiative (EPI), one of the cornerstones of this European strategic plan, a joint collaboration between more than twenty partners, representing industrial companies, academia and research centres with the goal to build a production processor with drastically better performance and power in support of the EU's focus on delivering its own Exascale-systems built on EU IP and achieving processor independence. Launched in December, the first three years draws processor and platform design; embedded software, middleware, applications and usage experts from 10 EU countries together to co-design Europe's first HPC Systems on Chip and accelerator technologies. The EU-CPU family is targeted to debut in 2020 on a pre-exascale prototype system and production-ready by the 2021 timeframe.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133077273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks 基于LVPSO算法的参数优化检测多步攻击
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323048
Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, W. Fan, Xiao Peng
How to detect intrusion attacks is a big challenge for network administrators since the attacks involve multi-step nowadays. The hidden markov model (HMM) is widely used in the field of multi-step attacks detection. However, the existing traditional Baum-Welch algorithm of HMM has two shortcomings: one is the number of attack states need to be determined in advance, the other is the algorithm may make the parameters converge to a local (not overall) optimal solution. In this paper, we propose a novel LVPSO-HMM algorithm based on variable length particle swarm optimization, which solves the shortcomings mentioned above. Concretely, it can optimize the number of attack states when the attacks state is unknown and it can make the model parameters converge to a global optimal solution. Then, we present a multi-step attack detection model architecture whose main idea is, when the number of attack states is unknown in the actual network environment LVPSO-HMM algorithm is used to solve the problem of relying on prior knowledge in current detection. Experiments on the well-known Darpa2000 dataset verify the efficiency of the method.
由于入侵攻击涉及多个步骤,如何检测入侵攻击成为网络管理员面临的一大挑战。隐马尔可夫模型(HMM)广泛应用于多步攻击检测领域。然而,现有的传统HMM的Baum-Welch算法存在两个缺点:一是需要提前确定攻击状态的数量,二是算法可能使参数收敛到局部(而不是整体)最优解。本文提出了一种基于变长粒子群优化的LVPSO-HMM算法,解决了上述不足。具体来说,它可以在攻击状态未知的情况下优化攻击状态的个数,使模型参数收敛到全局最优解。然后,我们提出了一种多步攻击检测模型体系结构,其主要思想是在实际网络环境中攻击状态数未知的情况下,采用LVPSO-HMM算法解决当前检测中依赖先验知识的问题。在著名的Darpa2000数据集上的实验验证了该方法的有效性。
{"title":"The parameter optimization based on LVPSO algorithm for detecting multi-step attacks","authors":"Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, W. Fan, Xiao Peng","doi":"10.1145/3310273.3323048","DOIUrl":"https://doi.org/10.1145/3310273.3323048","url":null,"abstract":"How to detect intrusion attacks is a big challenge for network administrators since the attacks involve multi-step nowadays. The hidden markov model (HMM) is widely used in the field of multi-step attacks detection. However, the existing traditional Baum-Welch algorithm of HMM has two shortcomings: one is the number of attack states need to be determined in advance, the other is the algorithm may make the parameters converge to a local (not overall) optimal solution. In this paper, we propose a novel LVPSO-HMM algorithm based on variable length particle swarm optimization, which solves the shortcomings mentioned above. Concretely, it can optimize the number of attack states when the attacks state is unknown and it can make the model parameters converge to a global optimal solution. Then, we present a multi-step attack detection model architecture whose main idea is, when the number of attack states is unknown in the actual network environment LVPSO-HMM algorithm is used to solve the problem of relying on prior knowledge in current detection. Experiments on the well-known Darpa2000 dataset verify the efficiency of the method.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115853533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The german informatics society's new ethical guidelines: POSTER 德国信息学协会的新伦理准则:POSTER
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323428
C. Trinitis, C. Class, Stefan Ullrich
On June 28, 2018, he board of directors of the German Informatics Society (GI) adopted new ethical guidelines. Throughout the development process, the main authors, mainly members of GI's "Informatics and Ethics" special interest group in close cooperation with the president of GI, incorporated feedback and suggestions from numerous GI members on the draft.
2018年6月28日,德国信息学学会(GI)董事会通过了新的伦理准则。在整个开发过程中,主要作者(主要是GI“信息学和伦理学”特别兴趣小组的成员)与GI总裁密切合作,将众多GI成员对草案的反馈和建议纳入其中。
{"title":"The german informatics society's new ethical guidelines: POSTER","authors":"C. Trinitis, C. Class, Stefan Ullrich","doi":"10.1145/3310273.3323428","DOIUrl":"https://doi.org/10.1145/3310273.3323428","url":null,"abstract":"On June 28, 2018, he board of directors of the German Informatics Society (GI) adopted new ethical guidelines. Throughout the development process, the main authors, mainly members of GI's \"Informatics and Ethics\" special interest group in close cooperation with the president of GI, incorporated feedback and suggestions from numerous GI members on the draft.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of reconfigurable systems in unceRtain hybRid envirOnments: Invited paper: CERBERO teams from UniSS, UniCA, IBM Research, TASE, INSA-Rennes, UPM, USI, Abinsula, AmbieSense, TNO, S&T, CRF CERBERO:不确定混合环境下可重构系统多目标设计的跨层模型框架:特邀论文:来自UniSS、UniCA、IBM研究院、TASE、INSA-Rennes、UPM、USI、Abinsula、AmbieSense、TNO、S&T、CRF的CERBERO团队
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323436
F. Palumbo, Tiziana Fanni, Carlo Sau, Luca Pulina, L. Raffo, M. Masin, Evgeny Shindin, P. S. Rojas, K. Desnos, M. Pelcat, Alfonso Rodríguez, E. Juárez, F. Regazzoni, G. Meloni, Katiuscia Zedda, H. Myrhaug, Leszek Kaliciak, Joost Andriaanse, Julio A. de Oliveira Filho, Pablo Muñoz, A. Toffetti
Cyber-Physical Systems (CPS) are embedded computational collaborating devices, capable of sensing and controlling physical elements and, often, responding to humans. Designing and managing systems able to respond to different, concurrent requirements during operation is not straightforward, and introduce the need of proper support at design-time and run-time. The Cross-layer modEl-based fRamework for multi-oBjective dEsign of Reconfigurable systems in unceRtain hybRid envirOnments (CERBERO) EU project has developed a design environment for adaptive CPS. CERBERO approach leverages on model-based methodologies including different technologies and tools developed to cover design and operation from user interactions down to low level computing layer implementation.
信息物理系统(CPS)是嵌入式计算协作设备,能够感知和控制物理元素,并且通常对人类做出响应。设计和管理能够在运行期间响应不同的并发需求的系统并不简单,并且需要在设计时和运行时提供适当的支持。欧盟“不确定混合环境下可重构系统多目标设计跨层模型框架”(CERBERO)项目开发了一种自适应CPS设计环境。CERBERO方法利用基于模型的方法,包括开发的不同技术和工具,涵盖从用户交互到低层计算层实现的设计和操作。
{"title":"CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of reconfigurable systems in unceRtain hybRid envirOnments: Invited paper: CERBERO teams from UniSS, UniCA, IBM Research, TASE, INSA-Rennes, UPM, USI, Abinsula, AmbieSense, TNO, S&T, CRF","authors":"F. Palumbo, Tiziana Fanni, Carlo Sau, Luca Pulina, L. Raffo, M. Masin, Evgeny Shindin, P. S. Rojas, K. Desnos, M. Pelcat, Alfonso Rodríguez, E. Juárez, F. Regazzoni, G. Meloni, Katiuscia Zedda, H. Myrhaug, Leszek Kaliciak, Joost Andriaanse, Julio A. de Oliveira Filho, Pablo Muñoz, A. Toffetti","doi":"10.1145/3310273.3323436","DOIUrl":"https://doi.org/10.1145/3310273.3323436","url":null,"abstract":"Cyber-Physical Systems (CPS) are embedded computational collaborating devices, capable of sensing and controlling physical elements and, often, responding to humans. Designing and managing systems able to respond to different, concurrent requirements during operation is not straightforward, and introduce the need of proper support at design-time and run-time. The Cross-layer modEl-based fRamework for multi-oBjective dEsign of Reconfigurable systems in unceRtain hybRid envirOnments (CERBERO) EU project has developed a design environment for adaptive CPS. CERBERO approach leverages on model-based methodologies including different technologies and tools developed to cover design and operation from user interactions down to low level computing layer implementation.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 16th ACM International Conference on Computing Frontiers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1