the proceedings contain 26 papers. the special focus in this conference is on Big Data Management and Service. the topics include: FAIth: A Fast, Accurate, and Lightweight Database-Agnostic Learned Cost Model;fas...
ISBN:
(纸本)9789819609130
the proceedings contain 26 papers. the special focus in this conference is on Big Data Management and Service. the topics include: FAIth: A Fast, Accurate, and Lightweight Database-Agnostic Learned Cost Model;fast Approximate Temporal Butterfly Counting on Bipartite Graphs via Edge Sampling;Financial-ICS: Identifying Peer Firms via LongBERT from 10K Reports;establishing a Decentralized Diamond Quality Management System: Advancing Towards Global Standardization;co-estimation of Data Types and their Positional Distribution;Enhancing Load Forecasting with VAE-GAN-Based Data Cleaning for Electric Vehicle Charging Loads;audio-Guided Visual Knowledge Representation;boundary Point Detection Combining Gravity and Outlier Detection Methods;A Meta-learning Approach for Category-Aware Sequential Recommendation on POIs;automatic Post-editing of Speech Recognition System Output Using Large Language Models;comparative analysis with Multiple Large-Scale Language Models for Automatic Generation of Funny Dialogues;effectiveness of the Programmed Visual Contents Comparison Method for Two Phase Collaborative Learning in Computer Programming Education: A Case Study;generating Achievement Relationship Graph Between Actions for Alternative Solution Recommendation;generating News Headline Containing Specific Person Name;Investigating Evidence in Sentence Similarity Using MASK in BERT;acceleration of Synopsis construction for Bounded Approximate Query Processing;Query Expansion in Food Review Search with Synonymous Phrase Generation by LLM;Question Answer Summary Generation from Unstructured Texts by Using LLMs;Real Estate Information Exploration in VR with LoD Control by Physical Distance;voices of Asynchronous Learning Students: Revealing Learning Characteristics through Vocabulary analysis of Notes Tagged in Videos;review Search Interface Based on Search Result Summarization Using Large Language Model;yes-No Flowchart Generation for Interactive Exploration of Personalized Health Improve
We consider linear dynamical systems under floating-point rounding. In these systems, a matrix is repeatedly applied to a vector, but the numbers are rounded into floating-point representation after each step (i.e., s...
详细信息
ISBN:
(纸本)9783031308222;9783031308239
We consider linear dynamical systems under floating-point rounding. In these systems, a matrix is repeatedly applied to a vector, but the numbers are rounded into floating-point representation after each step (i.e., stored as a fixed-precision mantissa and an exponent). the approach more faithfully models realistic implementations of linear loops, compared to the exact arbitrary-precision setting often employed in the study of linear dynamical systems. Our results are twofold: We show that for non-negative matrices there is a special structure to the sequence of vectors generated by the system: the mantissas are periodic and the exponents grow linearly. We leverage this to show decidability of.-regular temporal model checking against semialgebraic predicates. this contrasts withthe unrounded setting, where even the non-negative case encompasses the long-standing open Skolem and Positivity problems. On the other hand, when negative numbers are allowed in the matrix, we showthat the reachability problem is undecidable by encoding a two-counter machine. Again, this is in contrast withthe unrounded setting where point-to-point reachability is known to be decidable in polynomial time.
We present INFER-SV, a wrapper that adapts INFER for SV-COMP. INFER is a static-analysis tool for C and other languages, developed by Facebook and used by multiple large companies. It is strongly aimed at industry and...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
We present INFER-SV, a wrapper that adapts INFER for SV-COMP. INFER is a static-analysis tool for C and other languages, developed by Facebook and used by multiple large companies. It is strongly aimed at industry and the internal use at Facebook. Despite its popularity, there are no reported numbers on its precision and efficiency. With INFER-SV, we take a first step towards an objective comparison of INFER with other SV-COMP participants from academia and industry.
Eye-tracking technologies have been used for decades to assess the impact of technologies on clinical decision making in medical imaging. eHealth and telemedicine present new opportunities to integrate images and othe...
详细信息
As distributed energy sources become more prevalent, maintaining power grid stability is increasingly challenging. By integrating machine intelligence and communication technologies, traditional power networks could t...
详细信息
We sketch a sequentialization-based technique for bounded detection of data races under sequential consistency, and summarise the major improvements to our verification framework over the last years.
ISBN:
(纸本)9783030995270;9783030995263
We sketch a sequentialization-based technique for bounded detection of data races under sequential consistency, and summarise the major improvements to our verification framework over the last years.
SV-COMP 2021 is the 10th edition of the Competition on Software Verification (SV-COMP), which is an annual comparative evaluation of fully automatic software verifiers for C and Java programs. the competition provides...
详细信息
ISBN:
(纸本)9783030720124;9783030720131
SV-COMP 2021 is the 10th edition of the Competition on Software Verification (SV-COMP), which is an annual comparative evaluation of fully automatic software verifiers for C and Java programs. the competition provides a snapshot of the current state of the art in the area, and has a strong focus on reproducibility of its results. the competition was based on 15 201 verification tasks for C programs and 473 verification tasks for Java programs. Each verification task consisted of a program and a property (reachability, memory safety, overflows, termination). SV-COMP 2021 had 30 participating verification systems from 27 teams from 11 countries.
In this paper a novel approach for generating and optimizing regular expressions for genetic sequences is presented. the proposed technique introduces a systematic process to create initial regular expressions, compre...
详细信息
Recently, the use of the Internet and computer networks in general, has increased exponentially, leading to a high demand for cybersecurity to protect against all kinds of network attacks that are constantly evolving....
详细信息
ISBN:
(纸本)9783031686528;9783031686535
Recently, the use of the Internet and computer networks in general, has increased exponentially, leading to a high demand for cybersecurity to protect against all kinds of network attacks that are constantly evolving. Nowadays, Machine Learning (ML) is implemented in various cybersecurity tools, Intrusion Detection System-based ML brings more capabilities to improve the detection of cyber attacks. this study aims to perform a comparative analysis of a multiclass classification problem for cybersecurity attack detection. the comparative analysis is performed using six different machine learning algorithms: Naive Bayes, Decision Tree, Random Forest, Support Vector Machine, eXtreme Gradient Boosting, and Multi-Layer Perceptron, which are applied to the full NSL-KDD dataset, and three other subsets of datasets to confirm and verify the findings in terms of precision, accuracy, training time, and testing time. In all dataset subsets we worked on in addition to the NSL-KDD dataset, eXtreme Gradient Boosting significantly beat the other algorithms. From all the experimental results, it is concluded that XGBoost is a plausible choice for an intrusion detection system in terms of all the metrics compared to the other ML algorithms discussed.
GDART is an ensemble of tools allowing dynamic symbolic execution of JVM programs. the dynamic symbolic execution engine is decomposed into three different components: a symbolic decision engine (DSE), a concolic exec...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
GDART is an ensemble of tools allowing dynamic symbolic execution of JVM programs. the dynamic symbolic execution engine is decomposed into three different components: a symbolic decision engine (DSE), a concolic executor (SPouT), and a SMT solver backend allowing meta-strategy solving of SMT problems (JConstraints). the symbolic decision component is loosely coupled withthe executor by a newly introduced communication protocol. At SV-COMP 2022, GDART solved 471 of 586 tasks finding more correct false results (302) than correct true results (169). It scored fourth place.
暂无评论