首页 > 最新文献

2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)最新文献

英文 中文
Extensions over OpenCL for Latency Reduction and Critical Applications 针对延迟减少和关键应用的OpenCL扩展
Grigore Lupescu, E. Slusanschi, N. Tapus
Hardware and software stack complexity make programming GPGPUs difficult and limit application portability. This article first discusses challenges imposed by the current hardware and software model in GPGPU systems which relies heavily on the HOST device (CPU). We then identify system bottlenecks both in the hardware design and in the software stack and present two ideas to extend the HOST and DEVICE side of the OpenCL API with the aim to improve latency and device safety. As a first goal we target HOST side latency reduction using user synchronization directives. Our second goal was to improve on DEVICE side latency and add safety through a software layer which manages kernel execution. For both HOST and DEVICE side latency reduction we present concrete performance results.
硬件和软件堆栈的复杂性使编程gpgpu变得困难,并限制了应用程序的可移植性。本文首先讨论了当前GPGPU系统中严重依赖主机设备(CPU)的硬件和软件模型所带来的挑战。然后,我们确定了硬件设计和软件堆栈中的系统瓶颈,并提出了扩展OpenCL API的HOST和DEVICE端的两个想法,目的是改善延迟和设备安全性。作为第一个目标,我们的目标是使用用户同步指令减少主机端的延迟。我们的第二个目标是通过管理内核执行的软件层改善设备端的延迟并增加安全性。对于主机端和设备端的延迟减少,我们给出了具体的性能结果。
{"title":"Extensions over OpenCL for Latency Reduction and Critical Applications","authors":"Grigore Lupescu, E. Slusanschi, N. Tapus","doi":"10.1109/SYNASC.2015.64","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.64","url":null,"abstract":"Hardware and software stack complexity make programming GPGPUs difficult and limit application portability. This article first discusses challenges imposed by the current hardware and software model in GPGPU systems which relies heavily on the HOST device (CPU). We then identify system bottlenecks both in the hardware design and in the software stack and present two ideas to extend the HOST and DEVICE side of the OpenCL API with the aim to improve latency and device safety. As a first goal we target HOST side latency reduction using user synchronization directives. Our second goal was to improve on DEVICE side latency and add safety through a software layer which manages kernel execution. For both HOST and DEVICE side latency reduction we present concrete performance results.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"213 1","pages":"379-385"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73113015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text Mining News System - Quantifying Certain Phenomena Effect on the Stock Market Behavior 文本挖掘新闻系统-量化某些现象对股票市场行为的影响
M. Tirea, V. Negru
Stock market prediction is influenced by manyinternal and external factors. One of these factors are the newsarticles and financial reports related to each listed company. This paper describes a system that is able to extract relevantinformation from this type of textual documents, correlate themwith the stock price movement and determine whether ornot a new released news can and in which proportion willinfluence the market behavior. Predefined ontologies are used forclassifying the news articles and automated ontology extractionfor classifying concepts and super - concepts, on an attempt tomake a semantic mining of the text news. The system is basedon a Multi-Agent Architecture that will investigate, extract andcorrelate the textual data message with the price evolution inorder to better determine buy/sell moments, the trend directionand optimize an investment portfolio. In order to validate ourmodel a prototype was developed and applied to the BucharestStock Exchange Market listed companies.
股票市场预测受许多内部和外部因素的影响。其中一个因素是与每个上市公司相关的新闻文章和财务报告。本文描述了一个系统,该系统能够从这类文本文件中提取相关信息,将它们与股票价格运动联系起来,并确定新发布的新闻是否能够影响市场行为,以及影响市场行为的比例。采用预定义本体对新闻文章进行分类,采用自动本体提取对概念和超概念进行分类,试图对文本新闻进行语义挖掘。该系统基于多代理体系结构,将调查、提取文本数据消息并将其与价格演变相关联,以便更好地确定买入/卖出时刻、趋势方向并优化投资组合。为了验证我们的模型,开发了一个原型,并应用于布加勒斯特证券交易所市场的上市公司。
{"title":"Text Mining News System - Quantifying Certain Phenomena Effect on the Stock Market Behavior","authors":"M. Tirea, V. Negru","doi":"10.1109/SYNASC.2015.65","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.65","url":null,"abstract":"Stock market prediction is influenced by manyinternal and external factors. One of these factors are the newsarticles and financial reports related to each listed company. This paper describes a system that is able to extract relevantinformation from this type of textual documents, correlate themwith the stock price movement and determine whether ornot a new released news can and in which proportion willinfluence the market behavior. Predefined ontologies are used forclassifying the news articles and automated ontology extractionfor classifying concepts and super - concepts, on an attempt tomake a semantic mining of the text news. The system is basedon a Multi-Agent Architecture that will investigate, extract andcorrelate the textual data message with the price evolution inorder to better determine buy/sell moments, the trend directionand optimize an investment portfolio. In order to validate ourmodel a prototype was developed and applied to the BucharestStock Exchange Market listed companies.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"5 1","pages":"391-398"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79319527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web Application Security Using JSFlow 使用JSFlow的Web应用程序安全性
Daniel Hedin, A. Sabelfeld
Web applications are often vulnerable to code injection attacks and to attacks through buggy or malicious libraries. Unfortunately, the current protection mechanisms are frequently ad-hoc, as a response to attacks after the fact. This had lead to a plethora of specialized protection mechanisms that are often brittle and insufficient to guarantee security. This extended abstract accompanies a tutorial on web application security using JSFlow, an information-flow aware interpreter for full non-strict ECMA-262(v.5). In contrast to access control, which most current protection mechanisms apply, information-flow control focuses on what applications are allowed to do with the information they access. This removes the inherent trust that access control places on entities that are granted access. Dispensing with this trust is key for the protection to withstand bypassing in the presence of untrustworthy 3rd party code and code injection attacks. Based on two practical attacks against an example web application Hrafn, we demonstrate the power of JSFlow. The attacks model the scenario where the current standards protection mechanism are bypassed or not applicable. By using a simple and natural security policy, we show how both attacks are prevented byJSFlow. Although information-flow control has not been tailor made to preventthis kind of attacks, it offers a uniform line of defense against untrustworthyand malicious code and ensures confidentiality of sensitive data.
Web应用程序经常容易受到代码注入攻击以及通过有缺陷或恶意库进行的攻击。不幸的是,当前的保护机制经常是临时的,作为事后对攻击的响应。这导致了过多的专门保护机制,这些机制往往很脆弱,不足以保证安全。这个扩展的摘要附带了一个关于使用JSFlow的web应用程序安全性的教程,JSFlow是一个完全非严格ECMA-262(v.5)的信息流感知解释器。与大多数当前保护机制应用的访问控制不同,信息流控制关注的是允许应用程序对它们访问的信息执行哪些操作。这消除了访问控制对被授予访问权限的实体的固有信任。放弃这种信任是在不可信的第三方代码和代码注入攻击存在的情况下抵御绕过的关键。基于对示例web应用程序Hrafn的两次实际攻击,我们演示了JSFlow的强大功能。攻击模拟了当前标准保护机制被绕过或不适用的场景。通过使用一个简单而自然的安全策略,我们展示了jsflow如何阻止这两种攻击。虽然信息流控制并不是专门用来防止这种攻击的,但它提供了一道统一的防线来抵御不可信的恶意代码,并确保敏感数据的机密性。
{"title":"Web Application Security Using JSFlow","authors":"Daniel Hedin, A. Sabelfeld","doi":"10.1109/SYNASC.2015.11","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.11","url":null,"abstract":"Web applications are often vulnerable to code injection attacks and to attacks through buggy or malicious libraries. Unfortunately, the current protection mechanisms are frequently ad-hoc, as a response to attacks after the fact. This had lead to a plethora of specialized protection mechanisms that are often brittle and insufficient to guarantee security. This extended abstract accompanies a tutorial on web application security using JSFlow, an information-flow aware interpreter for full non-strict ECMA-262(v.5). In contrast to access control, which most current protection mechanisms apply, information-flow control focuses on what applications are allowed to do with the information they access. This removes the inherent trust that access control places on entities that are granted access. Dispensing with this trust is key for the protection to withstand bypassing in the presence of untrustworthy 3rd party code and code injection attacks. Based on two practical attacks against an example web application Hrafn, we demonstrate the power of JSFlow. The attacks model the scenario where the current standards protection mechanism are bypassed or not applicable. By using a simple and natural security policy, we show how both attacks are prevented byJSFlow. Although information-flow control has not been tailor made to preventthis kind of attacks, it offers a uniform line of defense against untrustworthyand malicious code and ensures confidentiality of sensitive data.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"30 1","pages":"16-19"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84467104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards an Automatic Tool for Multi-scale Model Derivation Illustrated with a Micro-mirror Array 一种以微镜阵列为例的多尺度模型自动推导工具
W. Belkhir, N. Ratier, D. Nguyen, Bin Yang, M. Lenczner, F. Zamkotsian, Horatiu Cirstea
This paper reports recent advances in the development of a symbolic asymptotic modeling software package, called MEMSALab, which will be used for automatic generation of asymptotic models for arrays of micro and nanosystems. More precisely, a model is a partial differential equation and an asymptotic method approximate it by another partial differential equation which can be numerically simulated in a reasonable time. The challenge consists in taking into account a wide range of different physical features and geometries e.g. thin structures, periodic structures, multiple nested scales etc. The main purpose of this software is to construct models incrementally so that model features can be included step by step. This idea, conceptualized under the name "by-extension-combination", is presented for the first time. A user friendly language recently introduced is also shortly discussed. We illustrate the mathematical operations that need to be implemented in MEMSALab by an example of an asymptotic model for the stationary heat equation in a Micro-Mirror Array developed for astrophysics.
本文报道了符号渐近建模软件包MEMSALab的最新进展,该软件包将用于微纳米系统阵列的渐近模型的自动生成。更确切地说,一个模型是一个偏微分方程,而渐近方法是用另一个偏微分方程来近似它,这个偏微分方程可以在合理的时间内进行数值模拟。挑战在于考虑到各种不同的物理特征和几何形状,例如薄结构,周期结构,多个嵌套尺度等。该软件的主要目的是增量地构建模型,以便逐步包含模型特征。这是第一次提出以“按扩展组合”的名称概念化的想法。本文还简要讨论了最近引入的一种用户友好的语言。我们通过为天体物理学开发的微镜阵列中固定热方程的渐近模型的例子来说明需要在MEMSALab中实现的数学运算。
{"title":"Towards an Automatic Tool for Multi-scale Model Derivation Illustrated with a Micro-mirror Array","authors":"W. Belkhir, N. Ratier, D. Nguyen, Bin Yang, M. Lenczner, F. Zamkotsian, Horatiu Cirstea","doi":"10.1109/SYNASC.2015.17","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.17","url":null,"abstract":"This paper reports recent advances in the development of a symbolic asymptotic modeling software package, called MEMSALab, which will be used for automatic generation of asymptotic models for arrays of micro and nanosystems. More precisely, a model is a partial differential equation and an asymptotic method approximate it by another partial differential equation which can be numerically simulated in a reasonable time. The challenge consists in taking into account a wide range of different physical features and geometries e.g. thin structures, periodic structures, multiple nested scales etc. The main purpose of this software is to construct models incrementally so that model features can be included step by step. This idea, conceptualized under the name \"by-extension-combination\", is presented for the first time. A user friendly language recently introduced is also shortly discussed. We illustrate the mathematical operations that need to be implemented in MEMSALab by an example of an asymptotic model for the stationary heat equation in a Micro-Mirror Array developed for astrophysics.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"10 1","pages":"47-54"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81339586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling Design Flaw Evolution Using Complex Systems 基于复杂系统的设计缺陷演化建模
George Ganea, Radu Marinescu
By modelling a software project as a complex system, its internal structure can be analyzed in order to asses its design quality. As a software system is being developed, the quality of its internal structure is evolving too, not always for the better. Flaws in the internal structure are usually indicators of code that is hard to understand, maintain and, in many cases, they are pointers of accumulated technical debt. While there are already methods and tools that enable design flaw detection, they only look at a snapshot of the code, they do not analyze how the design flaw evolved over time. We propose an approach which enhances design flaw detection with history information, in order to: (i) find patterns in the evolution of a design flaw, which could then be used to predict future activity, (ii) improve detection by eliminating false negatives, (iii) improve the recommendation system to provide better refactoring advices and a better ranking of design flaws, in order to address the most critical first.
通过将软件项目建模为一个复杂系统,可以分析其内部结构,从而评估其设计质量。随着软件系统的开发,其内部结构的质量也在不断发展,但并不总是朝着更好的方向发展。内部结构中的缺陷通常是代码难以理解和维护的指示器,在许多情况下,它们是积累技术债务的指针。虽然已经有方法和工具能够检测设计缺陷,但它们只查看代码的快照,而不分析设计缺陷是如何随时间演变的。我们提出了一种利用历史信息增强设计缺陷检测的方法,以便:(i)发现设计缺陷演变的模式,然后可以用来预测未来的活动,(ii)通过消除假阴性来改进检测,(iii)改进推荐系统以提供更好的重构建议和更好的设计缺陷排名,以便首先解决最关键的问题。
{"title":"Modeling Design Flaw Evolution Using Complex Systems","authors":"George Ganea, Radu Marinescu","doi":"10.1109/SYNASC.2015.70","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.70","url":null,"abstract":"By modelling a software project as a complex system, its internal structure can be analyzed in order to asses its design quality. As a software system is being developed, the quality of its internal structure is evolving too, not always for the better. Flaws in the internal structure are usually indicators of code that is hard to understand, maintain and, in many cases, they are pointers of accumulated technical debt. While there are already methods and tools that enable design flaw detection, they only look at a snapshot of the code, they do not analyze how the design flaw evolved over time. We propose an approach which enhances design flaw detection with history information, in order to: (i) find patterns in the evolution of a design flaw, which could then be used to predict future activity, (ii) improve detection by eliminating false negatives, (iii) improve the recommendation system to provide better refactoring advices and a better ranking of design flaws, in order to address the most critical first.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"6 1","pages":"433-436"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81667054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-agent Architecture for Ontology-Based Diagnosis of Mental Disorders 基于本体的精神障碍诊断的多智能体体系结构
Todor Ivascu, Bogdan Manate, V. Negru
This paper presents a Multi-agent system that facilitates the remote monitoring of the elderly patients which are susceptible to mental disorder diseases. In order to find early signs of health condition depreciation we have assessed four of the most common mental disorder diseases to find which kind of sensors can detect specific symptoms with the main purpose of creating an early warning system. The diagnosis component is based on an ontology that defines the relations between sensors, symptoms and diseases. Based on these relationships a specialized agent can inform the medical personnel about the detected symptoms.
本文提出了一种多智能体系统,便于对老年精神障碍易感患者进行远程监控。为了发现健康状况恶化的早期迹象,我们评估了四种最常见的精神障碍疾病,以找出哪种传感器可以检测到特定症状,其主要目的是创建一个早期预警系统。诊断组件基于定义传感器、症状和疾病之间关系的本体。基于这些关系,一个专门的代理可以将检测到的症状通知医务人员。
{"title":"A Multi-agent Architecture for Ontology-Based Diagnosis of Mental Disorders","authors":"Todor Ivascu, Bogdan Manate, V. Negru","doi":"10.1109/SYNASC.2015.69","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.69","url":null,"abstract":"This paper presents a Multi-agent system that facilitates the remote monitoring of the elderly patients which are susceptible to mental disorder diseases. In order to find early signs of health condition depreciation we have assessed four of the most common mental disorder diseases to find which kind of sensors can detect specific symptoms with the main purpose of creating an early warning system. The diagnosis component is based on an ontology that defines the relations between sensors, symptoms and diseases. Based on these relationships a specialized agent can inform the medical personnel about the detected symptoms.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"26 1","pages":"423-430"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82264262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Framework for Integrating Heterogeneous Agent Communication Platforms 集成异构代理通信平台的框架
Andrei Olaru, A. Florea
When developing multi-agent systems, the initial choice of deployment platform has a long-term impact on the project, as it many times restricts the architecture of agents, the communication protocols used, and the available services. The goal of this paper is to present the architecture of tATAmI-2.5, a framework that is able to integrate agents deployed using different environments, and communicating using different communication platforms. This framework is based on the tATAmI-2 agent development and deployment framework, which allows agents to be deployed on various communication platforms without modifying the agent code. The details of the proposed architecture are presented, including insights into the bootstrap process and the routing of messages.
在开发多代理系统时,最初选择的部署平台会对项目产生长期影响,因为它经常会限制代理的体系结构、使用的通信协议和可用的服务。本文的目标是介绍tATAmI-2.5的体系结构,该框架能够集成使用不同环境部署的代理,并使用不同的通信平台进行通信。该框架基于tATAmI-2代理开发和部署框架,该框架允许在不修改代理代码的情况下在各种通信平台上部署代理。介绍了所建议的体系结构的细节,包括对引导过程和消息路由的见解。
{"title":"A Framework for Integrating Heterogeneous Agent Communication Platforms","authors":"Andrei Olaru, A. Florea","doi":"10.1109/SYNASC.2015.66","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.66","url":null,"abstract":"When developing multi-agent systems, the initial choice of deployment platform has a long-term impact on the project, as it many times restricts the architecture of agents, the communication protocols used, and the available services. The goal of this paper is to present the architecture of tATAmI-2.5, a framework that is able to integrate agents deployed using different environments, and communicating using different communication platforms. This framework is based on the tATAmI-2 agent development and deployment framework, which allows agents to be deployed on various communication platforms without modifying the agent code. The details of the proposed architecture are presented, including insights into the bootstrap process and the routing of messages.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"1 1","pages":"399-406"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82353774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feature Extraction Using Genetic Programming with Applications in Malware Detection 遗传编程特征提取及其在恶意软件检测中的应用
Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea, H. Luchian
This paper extends the authors' previous research on a malware detection method, focusing on improving the accuracy of the perceptron based - One Side Class Perceptron algorithm via the use of Genetic Programming. We are concerned with finding a proper balance between the three basic requirements for malware detection algorithms: (a) that their training time on large datasets falls below acceptable upper limits; (b) that their false positive rate (clean/legitimate files/software wrongly classified as malware) is as close as possible to 0 and (c) that their detection rate is as close as possible to 1. When the first two requirements are set as objectives for the design of detection algorithms, it often happens that the third objective is missed: the detection rate is low. This study focuses on improving the detection rate while preserving the small training time and the low rate of false positives. Another concern is to use the perceptron-based algorithm's good performance on linearly separable data, by extracting features from existing ones. In order to keep the overall training time low, the huge search space of possible extracted features is efficiently explored in terms of time and memory foot-print using Genetic Programming; better separability is sought for. For experiments we used a dataset consisting of 350,000 executable files with an initial set of 300 Boolean features describing each of them. The feature-extraction algorithm is implemented in a parallel manner in order to cope with the size of the data set. We also tested different ways of controlling the growth in size of the variable-length chromosomes. The experimental results show that the features produced by this method are better than the best ones obtained through mapping allowing for an increase in detection rate.
本文扩展了作者之前对恶意软件检测方法的研究,重点是通过使用遗传规划来提高基于感知机的单边类感知机算法的准确性。我们关注的是在恶意软件检测算法的三个基本要求之间找到适当的平衡:(a)它们在大数据集上的训练时间低于可接受的上限;(b)它们的误报率(干净/合法文件/软件被错误归类为恶意软件)尽可能接近于0,(c)它们的检测率尽可能接近于1。当将前两个要求作为检测算法设计的目标时,往往会忽略第三个目标:检测率低。本研究的重点是提高检测率,同时保持较短的训练时间和较低的误报率。另一个问题是利用基于感知器的算法在线性可分数据上的良好性能,从现有数据中提取特征。为了保持较低的整体训练时间,利用遗传规划从时间和内存占用两方面有效地挖掘了可能提取的特征的巨大搜索空间;寻求更好的可分离性。在实验中,我们使用了一个由350,000个可执行文件组成的数据集,初始集有300个布尔特征来描述每个文件。为了应对数据集的规模,特征提取算法采用并行方式实现。我们还测试了控制变长染色体生长的不同方法。实验结果表明,该方法产生的特征比通过映射获得的最佳特征更好,从而提高了检测率。
{"title":"Feature Extraction Using Genetic Programming with Applications in Malware Detection","authors":"Cristina Vatamanu, Dragos Gavrilut, Razvan Benchea, H. Luchian","doi":"10.1109/SYNASC.2015.43","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.43","url":null,"abstract":"This paper extends the authors' previous research on a malware detection method, focusing on improving the accuracy of the perceptron based - One Side Class Perceptron algorithm via the use of Genetic Programming. We are concerned with finding a proper balance between the three basic requirements for malware detection algorithms: (a) that their training time on large datasets falls below acceptable upper limits; (b) that their false positive rate (clean/legitimate files/software wrongly classified as malware) is as close as possible to 0 and (c) that their detection rate is as close as possible to 1. When the first two requirements are set as objectives for the design of detection algorithms, it often happens that the third objective is missed: the detection rate is low. This study focuses on improving the detection rate while preserving the small training time and the low rate of false positives. Another concern is to use the perceptron-based algorithm's good performance on linearly separable data, by extracting features from existing ones. In order to keep the overall training time low, the huge search space of possible extracted features is efficiently explored in terms of time and memory foot-print using Genetic Programming; better separability is sought for. For experiments we used a dataset consisting of 350,000 executable files with an initial set of 300 Boolean features describing each of them. The feature-extraction algorithm is implemented in a parallel manner in order to cope with the size of the data set. We also tested different ways of controlling the growth in size of the variable-length chromosomes. The experimental results show that the features produced by this method are better than the best ones obtained through mapping allowing for an increase in detection rate.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"157 1","pages":"224-231"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76432133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Arithmetic of Even-Odd Trees 奇偶树的算术
Paul Tarau
Even-Odd Trees are a canonical tree-based number representation derived from a bijection between trees defined by the data type equation T = 1+T *T* +T *T* and positive natural numbers seen as iterated applications of o(x) = 2x and i(x) = 2x + 1 starting from 1. This paper introduces purely functional arithmetic algorithms for operations on Even-Odd Trees. While within constant factors from their traditional counterparts for their average case behavior, our algorithms make tractable important computations that are impossible with traditional number representations.
奇偶树是一种规范的基于树的数字表示,它来源于数据类型方程T = 1+T *T* +T *T*定义的树之间的双射,而正自然数被视为从1开始的o(x) = 2x和i(x) = 2x + 1的迭代应用。本文介绍了奇偶树运算的纯泛函算法。虽然在其平均情况行为的传统对立物的恒定因素内,我们的算法可以进行传统数字表示不可能进行的易于处理的重要计算。
{"title":"The Arithmetic of Even-Odd Trees","authors":"Paul Tarau","doi":"10.1109/SYNASC.2015.23","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.23","url":null,"abstract":"Even-Odd Trees are a canonical tree-based number representation derived from a bijection between trees defined by the data type equation T = 1+T *T* +T *T* and positive natural numbers seen as iterated applications of o(x) = 2x and i(x) = 2x + 1 starting from 1. This paper introduces purely functional arithmetic algorithms for operations on Even-Odd Trees. While within constant factors from their traditional counterparts for their average case behavior, our algorithms make tractable important computations that are impossible with traditional number representations.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"6 1","pages":"90-97"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90844512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rigorous Generic Branch and Bound Solver for Nonlinear Problems 非线性问题的一个严格的一般分支定界求解器
Andrew P. Smith, C. Muñoz, Anthony Narkawicz, Mantas Markevicius
Recursive branch and bound algorithms are often used, either rigorouslyor non-rigorously, to refine and isolate solutions to global optimizationproblems or systems of equations and inequalities involving nonlinearfunctions. The presented software library, Kodiak, integrates numericand symbolic computation into a generic framework for the solution of suchproblems over hyper-rectangular variable and parameter domains. Thecorrectness of both the generic branch and bound algorithm and the self-validating enclosure methods used, namely interval arithmetic and, for polynomials and rational functions, Bernstein expansion, has beenformally verified. The algorithm has three main instantiations, forsystems of equations and inequalities, for constrained global optimization, and for the computation of equilibria and bifurcation sets for systems ofordinary differential equations. For the latter category, and to enablethe computation of bisection heuristics to reduce the branching factor, advantage is taken of the partial derivatives of the constraint functions, which are symbolically manipulated. Pavings (unions of box subsets)for a continuum of solutions to underdetermined systems mayalso be produced. The capabilities of the software tool are outlined, andcomputational examples are presented.
递归分支和定界算法经常被严格或非严格地用于细化和分离全局优化问题或涉及非线性函数的方程和不等式系统的解决方案。提出的软件库Kodiak将数值和符号计算集成到一个通用框架中,用于解决超矩形变量和参数域上的此类问题。一般的分支定界算法和所使用的自验证封闭方法的正确性,即区间算法和多项式和有理函数的伯恩斯坦展开,都已得到正式验证。该算法有三个主要实例:方程和不等式系统,约束全局优化,以及常微分方程系统的平衡点和分岔集的计算。对于后一类,为了使二分启发式的计算能够减少分支因子,利用了约束函数的偏导数,并对其进行了符号化处理。欠定系统的连续解的铺装(盒子集的并集)也可以产生。概述了该软件工具的功能,并给出了计算实例。
{"title":"A Rigorous Generic Branch and Bound Solver for Nonlinear Problems","authors":"Andrew P. Smith, C. Muñoz, Anthony Narkawicz, Mantas Markevicius","doi":"10.1109/SYNASC.2015.20","DOIUrl":"https://doi.org/10.1109/SYNASC.2015.20","url":null,"abstract":"Recursive branch and bound algorithms are often used, either rigorouslyor non-rigorously, to refine and isolate solutions to global optimizationproblems or systems of equations and inequalities involving nonlinearfunctions. The presented software library, Kodiak, integrates numericand symbolic computation into a generic framework for the solution of suchproblems over hyper-rectangular variable and parameter domains. Thecorrectness of both the generic branch and bound algorithm and the self-validating enclosure methods used, namely interval arithmetic and, for polynomials and rational functions, Bernstein expansion, has beenformally verified. The algorithm has three main instantiations, forsystems of equations and inequalities, for constrained global optimization, and for the computation of equilibria and bifurcation sets for systems ofordinary differential equations. For the latter category, and to enablethe computation of bisection heuristics to reduce the branching factor, advantage is taken of the partial derivatives of the constraint functions, which are symbolically manipulated. Pavings (unions of box subsets)for a continuum of solutions to underdetermined systems mayalso be produced. The capabilities of the software tool are outlined, andcomputational examples are presented.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"480 1","pages":"71-78"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89649549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1