the kidney exchange problem (KEP) seeks to determine a constellation of exchanges that maximizes the number of possible transplants between a set of patients and their incompatible donors. Recently, Secure Multi-Party...
详细信息
ISBN:
(数字)9781665473989
ISBN:
(纸本)9781665473989
the kidney exchange problem (KEP) seeks to determine a constellation of exchanges that maximizes the number of possible transplants between a set of patients and their incompatible donors. Recently, Secure Multi-Party Computation (SMPC) techniques were used to devise privacy-preserving protocols that allow the solving of the KEP in a distributed fashion. However, these protocols lack sufficient performance in practice. In the non-privacy-preserving case, the most efficient algorithms solving the KEP are based on integer programming. It is in this context, that we propose a privacy-preserving protocol based on these integer programming techniques that efficiently solves the KEP in a privacy-preserving fashion. We prove the security of this protocol and analyze its complexity. Furthermore, we provide a comprehensive performance evaluation of an implementation of the protocol in the SMPC benchmarking framework MP-SPDZ.
the proceedings contain 11 papers. the topics discussed include: modeling black-box components with probabilistic synthesis;automated variability injection for graphical modeling languages;correctness-by-construction ...
ISBN:
(纸本)9781450381741
the proceedings contain 11 papers. the topics discussed include: modeling black-box components with probabilistic synthesis;automated variability injection for graphical modeling languages;correctness-by-construction for feature-oriented software product lines;multi-stage programming in the large with staged classes;reorganizing queries with grouping;manipulating GUI structures declaratively;PReGO: a generative methodology for satisfying real-time requirements on COTS-based systems: definition and experience report;VarSem: declarative expression and automated inference of variable usage semantics;fluid quotes: metaprogramming across abstraction boundaries with dependent types;a domain-specific language for filtering in application-level gateways;and eFLINT: a domain-specific language for executable norm specifications.
In this paper, we introduce a general methodology of reverse engineering for Xilinx FPGA devices using flash memory for programming. Based on the structural analysis of the flash memory used for the most recent 7-Seri...
详细信息
ISBN:
(纸本)9781665459716
In this paper, we introduce a general methodology of reverse engineering for Xilinx FPGA devices using flash memory for programming. Based on the structural analysis of the flash memory used for the most recent 7-Series FPGA, data extraction for reverse engineering is carried out targeting the flash memory withthe help of a logic analyzer. the accuracy of the extracted bitstream is finally verified using the in-house reverse engineering tool.
In this study, we address the multi-robot path planning problem for tasks specified by linear temporal logic (LTL) formulae. Unlike existing studies, we take into account the possibility of robot failures, where a fai...
详细信息
Production planning is a difficult and very complex issue;therefore, it is necessary to consider the enterprise as a whole, taking into account the relations between its elements. the paper presents the application of...
详细信息
We present the system ALASPO which implements Adaptive Large-neighbourhood search for Answer Set programming (ASP) Optimisation. Large-neighbourhood search (LNS) is a meta-heuristic where parts of a solution are destr...
详细信息
Arthur Schopenhauer was one of the first logicians of the 19th century to develop a visual representation of the sorites with which it is possible to depict multiple terms in one diagram. Withthe help of an example f...
详细信息
ISBN:
(纸本)9783031712906;9783031712913
Arthur Schopenhauer was one of the first logicians of the 19th century to develop a visual representation of the sorites with which it is possible to depict multiple terms in one diagram. Withthe help of an example from Seneca, he explains how the sorites diagram works and provides two reading interpretations for the diagram. Since Schopenhauer's sorites diagram in particular or sorites diagrams in general have never been dealt with in research before, this paper will introduce and analyse Schopenhauer's sorites diagram and its different reading possibilities. thereby, it will not only be shown how the sorites diagram can help to dissolve the sorites back into individual syllogisms, but also other topics such as the reading directions, the extension and intension of the sorites diagram will be discussed in more detail. It turns out that Schopenhauer's sorites was just the foundation for further works in his philosophical system.
Background and Context. Cognition, in all its forms, is inferential;inferential reasoning underlies processes like decision-making, problem-solving, argumentation and text comprehension. In the Psycholinguistics domai...
详细信息
ISBN:
(纸本)9781450399760
Background and Context. Cognition, in all its forms, is inferential;inferential reasoning underlies processes like decision-making, problem-solving, argumentation and text comprehension. In the Psycholinguistics domain, it is argued that the study of text comprehension - the way that a coherent representation or a mental model of the text is constructed - is a study of inference generation. In programming education, code comprehension has been considered a milestone for students' progression. An important goal of code comprehension tasks is for the readers to build coherent representations or mental models of the code. Objective-Hypothesis. A common activity during which code comprehension is required is studying a solved programming problem (SPP). there is a threefold comprehension process that takes place during SPP tasks: comprehension at the problem level, comprehension at the program level, and their relationship. these three processes guide the comprehension and the construction of a coherent mental representation of the whole example;drawing from Psycholinguistics, we hypothesize that differences in the way that students construct the mental model of a given SPP may be associated with differences in inference generation during these three processes. Method. through a mixed research design that brings together a theoretical-conceptual study and an empirical one, an inferential model for SPP is first developed based on scholarly research in Psycholinguistics and programming Education. the inferential model is then tested and further refined through a comparative case study during which we identify and compare the kind of inferences a proficient, an average, and a struggling first-year undergraduate student made during the comprehension of an SPP task after the end of the first semester. Findings. the results of this study demonstrate that the more advanced students employed specific inferential strategies during the three SPP comprehension processes: Global Bac
Investigating factors that influence the learning process of students is important, especially in online education. It can help course instructors to design the learning environment that really fits the course require...
详细信息
ISBN:
(数字)9781665485104
ISBN:
(纸本)9781665485104
Investigating factors that influence the learning process of students is important, especially in online education. It can help course instructors to design the learning environment that really fits the course requirements and students and to enhance the learning performance. this study focuses on identifying different learning styles and finding the relationships among learning styles, learning activities and performance of computer science students in a Java programming course. According to the results, students with balanced preference on receiving information obtained highest scores although most of them are visual learners in this aspect. It indicates that adding more visual presentations in teaching process will be helpful to enhance learning performance. As it is one of the very first programming courses, most students prefer to follow the instructors' steps in solving the problems and obviously they joined the class more regularly than others. therefore, concrete examples that involve well-defined procedures, facts, data, and experimentation are essential to teaching programming language. Moreover, the results confirmed that the number of assignment attempts and solving the in-class problems could considerably improve the achievement of the learning outcomes and also related to the understanding of the programming in a sequential manner. Consequently, students should be encouraged to do more assignments and practice problems in learning the programmingthrough online.
Return-oriented programming (ROP) is a technique for hijacking the control-flow of a program and forcing it to perform computations that were never originally intended. ROP is achieved by modifying the values of retur...
详细信息
ISBN:
(纸本)9781450393386
Return-oriented programming (ROP) is a technique for hijacking the control-flow of a program and forcing it to perform computations that were never originally intended. ROP is achieved by modifying the values of return addresses saved to memory, causing a failure of control-flow integrity. In the POWER10 processor, we have adopted a cryptographic mechanism for ROP protection. Return addresses are cryptographically hashed when control-flow enters a function and the hash is saved in memory. the hash is recomputed and compared to the saved value just before a return from the function. Any mismatch is flagged as a violation and generates an exception to the supervisor. POWER10 was augmented with instructions to generate and verify those hashes. We minimize performance impact on running programs by implementing the cryptographic hash with dedicated functional units.
暂无评论