the software packages of the Debian distribution include more than twenty-seven thousand maintainer scripts in total, almost all of them being written in the Posix shell language. these scripts are executed with root ...
详细信息
the software packages of the Debian distribution include more than twenty-seven thousand maintainer scripts in total, almost all of them being written in the Posix shell language. these scripts are executed with root privileges at installation, update, and removal of a package, which makes them critical for system maintenance. While the Debian policy provides guidance for package maintainers producing the scripts, only few tools exist to check the compliance of a script to that policy. We present CoLiS, a software platform for discovering violations of non-trivial properties required by the Debian policy in maintainer scripts. We describe our methodology which is based on symbolic execution and feature tree constraints, and we give an overview of the toolchain. We obtain promising results: our toolchain is effective in analysing a large set of Debian maintainer scripts, and it has already detected over 150 policy violations that have led to bug reports, more than two-third of them now being fixed.
the subway system has benefited the transportation in a lot of modern cities with advantages such as convenience, rapidity, large volume, etc. However, withthe construction of more and more subway systems, the underg...
详细信息
Withthe continuous progress of neural networks and mathematical optimization algorithms, their application in transportation and logistics network modeling has become a research trend. therefore, this study proposes ...
详细信息
Advancements in artificial intelligence (AI) are enabling the integration of explainable AI (XAI) models in Magnetic Resonance Imaging (MRI) to improve diagnostic accuracy and personalize prostate cancer treatment. th...
详细信息
Conceptual identification is one of the significant methods of conceptual knowledge processing, which allows knowledge-based systems to identify certain concepts and all their subconcepts and superconcepts. However, t...
详细信息
Medical applications using machine learning have gained importance;therefore, research on the applicability and adequacy of algorithms has also gained momentum. Investigating the performance of the algorithms is cruci...
详细信息
Indonesia needs effective project management for various infrastructure, technological advancements, and socio-economic initiatives. this study examines the implementation of Agile project management in Indonesia in m...
详细信息
An infinite particle system of independent jumping particles in infinite volume is considered. their construction is recalled, further properties are derived, the relation with hierarchical equations, Poissonian analy...
详细信息
An infinite particle system of independent jumping particles in infinite volume is considered. their construction is recalled, further properties are derived, the relation with hierarchical equations, Poissonian analysis, and second quantization are discussed. the hydrodynamic limit for a general initial distribution satisfying a mixing condition is derived. the long-time asymptotics is computed under an extra assumption. the relation withconstructions based on infinite volume limits is discussed.
We consider turn-based stochastic 2-player games on graphs with omega-regular winning conditions. We provide a direct symbolic algorithm for solving such games when the winning condition is formulated as a Rabin condi...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
We consider turn-based stochastic 2-player games on graphs with omega-regular winning conditions. We provide a direct symbolic algorithm for solving such games when the winning condition is formulated as a Rabin condition. For a stochastic Rabin game with k pairs over a game graph with n vertices, our algorithm runs in O(n(k+2) k!) symbolic steps, which improves the state of the art. We have implemented our symbolic algorithm, along with performance optimizations including parallellization and acceleration, in a BDD-based synthesis tool called Fairsyn. We demonstrate the superiority of Fairsyn compared to the state of the art on a set of synthetic benchmarks derived from the VLTS benchmark suite and on a control system benchmark from the literature. In our experiments, Fairsyn performed significantly faster with up to two orders of magnitude improvement in computation time.
the increasing adoption of IoT devices in home environments has raised significant concerns about security and privacy. Analyzing real IoT traffic is essential for understanding these implications, yet the process pos...
详细信息
暂无评论