the proceedings contain 44 papers. the topics discussed include: automatic tag recommendation for news articles;are computational thinking skills measurable? an analysis;implementing a new interface for directed graph...
the proceedings contain 44 papers. the topics discussed include: automatic tag recommendation for news articles;are computational thinking skills measurable? an analysis;implementing a new interface for directed graph analysis by existing and new algorithms;classical heritage and text-based second language learning in three-dimensional virtual library environment;a comparative evaluation of big data frameworks for log processing;on possible approaches to differentiation of rough real functions;adversarial example free zones for specific inputs and neural networks;integration of incremental build systems into software comprehension tools;comprehensive evaluation of cross translation unit symbolic execution;machine learning techniques for the classification of product descriptions from darknet marketplaces;and automatic diacritic restoration with transformer model based neural machine translation for east-central European languages.
Model checking algorithms are typically complex graph algorithms, whose correctness is crucial for the usability of a model checker. However, establishing the correctness of such algorithms can be challenging and is o...
详细信息
ISBN:
(纸本)9783030451899;9783030451905
Model checking algorithms are typically complex graph algorithms, whose correctness is crucial for the usability of a model checker. However, establishing the correctness of such algorithms can be challenging and is often done manually. Mechanising the verification process is crucially important, because model checking algorithms are often parallelised for efficiency reasons, which makes them even more error-prone. this paper shows how the VerCors concurrency verifier is used to mechanically verify the parallel nested depth-first search (NDFS) graph algorithm of Laarman et al. [25]. We also demonstrate how having a mechanised proof supports the easy verification of various optimisations of parallel NDFS. As far as we are aware, this is the first automated deductive verification of a multi-core model checking algorithm.
As software verification is gaining traction in academia and industry the number and complexity of verification tools is growing constantly. this initiated research and interest into exchangeable verification witnesse...
详细信息
ISBN:
(纸本)9783030451899;9783030451905
As software verification is gaining traction in academia and industry the number and complexity of verification tools is growing constantly. this initiated research and interest into exchangeable verification witnesses as well as tools for automated witness validation. Initial witness validators used model checkers that were amended to benefit from guidance information provided by the witness. this approach comes with substantial overhead. Second-generation execution-based validators traded speed for reduced strength in case of incomplete and non-exact witnesses. this was done by extracting test harnesses and compiling them withthe original program. We present the nitwit tool, a new interpretation-based violation witness validator for C programs that is trimmed to be fast and memory efficient. It verifies a record number of witnesses of SV-COMP'20 in the ReachSafety category. Our novel tool exchanges initial compilation overhead and optimized execution for rapid startup performance. nitwit borrows C semantics from the compiler used for compilation. this offloads this hard-to-get-right task and enables using several compilers in parallel to inspect possible semantic differences.
In this article, the problem of monitoring of climatic and ecological condition of the region is considered. the authors propose an approach to the construction of such systems using the LoRaWAN (Long Range Wide Area ...
详细信息
In this article, the problem of monitoring of climatic and ecological condition of the region is considered. the authors propose an approach to the construction of such systems using the LoRaWAN (Long Range Wide Area Network) technology. this will make it possible to create easily scalable low-cost systems with high energy efficiency through the use of modern communication technologies. During the experiment, the authors have identified certain patterns in collected data, such as dependence on the time of year, weather, and the location of certain industrial facilities near the observed zone. (C) 2020 the Authors. Published by Elsevier B.V.
In many areas of computer science, we are given an unsatisfiable set of constraints withthe goal to provide an insight into the unsatisfiability. One of common approaches is to identify minimal unsatisfiable subsets ...
详细信息
ISBN:
(纸本)9783030451899;9783030451905
In many areas of computer science, we are given an unsatisfiable set of constraints withthe goal to provide an insight into the unsatisfiability. One of common approaches is to identify minimal unsatisfiable subsets (MUSes) of the constraint set. the more MUSes are identified, the better insight is obtained. However, since there can be up to exponentially many MUSes, their complete enumeration might be intractable. therefore, we focus on algorithmsthat enumerate MUSes online, i.e. one by one, and thus can find at least some MUSes even in the intractable cases. Since MUSes find applications in different constraint domains and new applications still arise, there have been proposed several domain agnostic algorithms. Such algorithms can be applied in any constraint domain and thus theoretically serve as ready-to-use solutions for all the emerging applications. However, there are almost no domain agnostic tools, i.e. toolsthat both implement domain agnostic algorithms and can be easily extended to support any constraint domain. In this work, we close this gap by introducing a domain agnostic tool called MUST. Our tool outperforms other existing domain agnostic tools and moreover, it is even competitive to fully domain specific solutions.
the article identifies the theoretical aspects of e-commerce as an economic category, the problems of the current state of the e-commerce market related to the COVID-19 pandemic, consumer distrust and less functionali...
详细信息
ISBN:
(纸本)9781665426060
the article identifies the theoretical aspects of e-commerce as an economic category, the problems of the current state of the e-commerce market related to the COVID-19 pandemic, consumer distrust and less functionality in the choice of clothing units. the aim of the article is the generalization, development and implementation of an expert system that will increase the functionality and efficiency of e- business. Research methods are mathematical apparatus for solving classification problems, regression, discrete methods, artificial neural networks, decision trees and other machine learning algorithms for solving classification problems, statistical methods and tools for data processing and analysis, data visualization tools. the problems of developing an expert system to increase the functionality of e-commerce were solved using R and Python programming languages, data processing and analysis. Practical significance of the research is to identify and use an effective algorithm for emotional analysis of the text, improve the method of collaborative filtering and develop an information system to provide recommendations to customers. As a result, the functionality and efficiency of e-commerce will increase. the obtained research results can be used as a methodological reference by software developers during the design and development of recommendation systems.
Renewable energy plants integrated are obtained locally, including hydro, biogas, as well as solar. the construction of hydropower and biogas with while solar power plants were constructed. the primary issue is that a...
详细信息
ISBN:
(数字)9798350350357
ISBN:
(纸本)9798350350364
Renewable energy plants integrated are obtained locally, including hydro, biogas, as well as solar. the construction of hydropower and biogas with while solar power plants were constructed. the primary issue is that all current RE's energy sources Power plants are intermittent, meaning they are not always available. Solar power is only used in the daytime. Ultimately, significant concept is put into practice to preserve the supply-demand energy balance, lower grid electricity costs withthe penetration of renewable energy sources, and enhance the local grid's efficiency, security, and dependability. the concept is put into practice to preserve the supply-demand energy balance, lower grid electricity costs withthe penetration of renewable energy sources, and enhance the local grid's efficiency, security, and dependability. the availability of wind energy is subject to seasonal and meteorological fluctuations, making it unpredictable at times. the same is true of hydro energy sources, which are significantly less in the summer and quite abundant during the rainy season. the quantity of animals and the availability of feed have a significant impact on the source of biogas energy.
We show that symmetry transformations and caching can enable scalable, and possibly unbounded, verification of multi-agent systems. Symmetry transformations map any solution of the system to another solution. We show ...
详细信息
ISBN:
(纸本)9783030451899;9783030451905
We show that symmetry transformations and caching can enable scalable, and possibly unbounded, verification of multi-agent systems. Symmetry transformations map any solution of the system to another solution. We show that this property can be used to transform cached reachsets to compute new reachsets, for hybrid and multi-agent models. We develop a notion of a virtual system which defines symmetry transformations for a broad class of agent models that visit waypoint sequences. Using this notion of a virtual system, we present a prototype tool CacheReach that builds a cache of reachsets, in a way that is agnostic of the representation of the reachsets and the reachability analysis method used. Our experimental evaluation of CacheReach shows up to 64% savings in safety verification computation time on multi-agent systems with 3-dimensional linear and 4-dimensional nonlinear fixed-wing aircraft models following sequences of waypoints. these savings and our theoretical results illustrate the potential benefits of using symmetry-based caching in the safety verification of multi-agent systems.
Analyzing attacker behavior and generating realistic models to accurately capture the realities of cybersecurity threats is a very challenging task for researchers. Psychological personality and profiling studies prov...
详细信息
ISBN:
(数字)9783030687342
ISBN:
(纸本)9783030687335;9783030687342
Analyzing attacker behavior and generating realistic models to accurately capture the realities of cybersecurity threats is a very challenging task for researchers. Psychological personality and profiling studies provide a broad understanding of personality traits, but lack a level of interactive immersion that enables observers to collect concrete cybersecurity-relevant behavioral data. Participant's intricate actions and interactions with real computer systems are seldom captured in any cybersecurity studies. Our work focuses on capturing human actions and decisions to provide an empirical basis for these types of models. We provide a practical methodology that helps bridge the gap between theory and practice by facilitating construction, experimentation, and data collection for repeatable and scalable human experimentation with realistic cybersecurity scenarios. While our methodology is platform agnostic, we describe state of the art technologies that may be used to satisfy the objectives of each of the stages of the methodology.
tools and algorithms for the construction and analysis of systems : 5thinternationalconference, Tacas '99, Held as Part of the Joint European conferences on theory and Practice of Software, Etaps '99, Amster...
详细信息
tools and algorithms for the construction and analysis of systems : 5thinternationalconference, Tacas '99, Held as Part of the Joint European conferences on theory and Practice of Software, Etaps '99, Amsterdam, the Netherlands, March 22-28, 1999 : Proceedings by Tacas '99 (1999 : Amsterdam, Netherlands); Cleaveland, W. R. (Walter Rance), 1961-; Etaps '99 (1999 : Amsterdam, Netherlands); published by Berlin ; New York : Springer
暂无评论