Modern automated program repair (APR) tools are well-tuned at repairing single fault programs (i.e., programs in which only one fault can occur at time). However, real-world software projects typically contain multipl...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Modern automated program repair (APR) tools are well-tuned at repairing single fault programs (i.e., programs in which only one fault can occur at time). However, real-world software projects typically contain multiple bugs at the same time, which can interact with and mask each other in a variety of ways. the complex interaction of faults in multi-fault programs makes the automated repair problem more challenging than the traditional practice of presuming that a program contains a single fault. this paper studies the repair problem of multi-fault programs and identifies the main obstacles that arise when handling such programs using current repair approaches. the paper also describes three repair approaches for multi-fault programs, namely iterative, parallel, and simultaneous. While the simultaneous repair strategy depends on using cutting-edge fault localization techniques that enable the APR approaches to locate many faults at once, the iterative and parallel repair approaches rely on adapting the existing repair techniques for single-fault programs to handle multi-fault programs. Finally, the paper discusses each approach's advantages and drawbacks as well as the conditions in which the approach can be used successfully. To our knowledge, this is the first paper to specifically study and address the repair problem of multi-fault programs.
In this paper, we propose a lattice-based certificateless signature scheme and certificateless aggregate signature which can be used to verify a large number of signatures simultaneously efficiently. To improve the se...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
In this paper, we propose a lattice-based certificateless signature scheme and certificateless aggregate signature which can be used to verify a large number of signatures simultaneously efficiently. To improve the security of our scheme, we have implemented our signature algorithm without trusted third parties. the security of our proposed signature algorithm can be reduced to the SIS problem under the random oracle model. Moreover, our construction only needs matrix multiplication and rejection sampling operation, so the algorithm is naturally simple and efficient. Besides, we've done some experiments using the NTL library, indicating our scheme has less time overhead and storage overhead than other schemes. To our best knowledge, we propose the first certificateless aggregate signature without trapdoors.
software accessibility, once relatively unknown, is now recognized as both crucial and legally mandated, accumulating significant research attention in Computer Science. While various guidelines, methods, and tools ha...
详细信息
ISBN:
(纸本)9783031628450;9783031628467
software accessibility, once relatively unknown, is now recognized as both crucial and legally mandated, accumulating significant research attention in Computer Science. While various guidelines, methods, and tools have been developed, practical implementation still faces challenges, with persistent barriers in many products. Research often focuses on requirements engineering and evaluation, neglecting the implementation phase. While acknowledging the necessity of including accessibility throughout the engineering process, research on comprehensive approaches has been sparse, primarily focusing on requirements engineering and evaluation, neglecting implementation phase. We see integrating accessibility support into the core of design and development as a crucial step for improvements, revealing a need for integrating accessibility evaluation support into integrated development environments (IDEs). this paper aims to present a collection of techniques, methods and tools that support accessibility involvement within different stages of the engineering process, and additionally to provide a theoretical foundation for research and development of incorporating accessibility evaluation support within IDEs. thereafter, we analyzed existing related Systematic Literature Reviews (SLRs) and complemented the findings with a new SLR. the study provides a solid base for advanced approaches in integrating accessibility into softwareengineering (SE).
the proceedings contain 11 papers. the special focus in this conference is on Data Science and knowledge Graph. the topics include: Environment-Aware and Human-Centric software Testing Framework for Cyber-Physical Sys...
ISBN:
(纸本)9783030512521
the proceedings contain 11 papers. the special focus in this conference is on Data Science and knowledge Graph. the topics include: Environment-Aware and Human-Centric software Testing Framework for Cyber-Physical Systems;Technical Invention Trend Analysis of Applicants Based on CPC Classification;a Study on Automatic Keyphrase Extraction and Its Refinement for Scientific Articles;a Study on the Characteristics of the Long-Term Web Forum Users Using Social Network Analysis;knowledge Exploration from Tables on the Web;context-Dependent Token-Wise Variational Autoencoder for Topic Modeling;extraction of Relations Between Entities from Human-Generated Content on Social Networks;social Networks as Communication Channels: A Logical Approach;dataset Anonyization on Cloud: Open Problems and Perspectives.
Withthe advancement of sensor networks, a variety of methods have been proposed in the field of bridge health monitoring to predict the lifespan of bridges. these methods can be divided into two categories: statistic...
详细信息
ISBN:
(纸本)9798350365924;9798350365917
Withthe advancement of sensor networks, a variety of methods have been proposed in the field of bridge health monitoring to predict the lifespan of bridges. these methods can be divided into two categories: statistical methods and machine learning methods. statistical methods are static techniques so that fail to capture real-time changes in bridge health. machine learning methods are better to take into account the temporal variations but require high-quality datasets. In practical engineering applications, missing or excessive data often result in over-fitting or under-fitting issues. this study propose a new approach that modifies the parameter structure of the Long Short-Term Memory (LSTM) model. By changing the parameter structure from vectors to matrices, the author enables shared learning of both local and global bridge lifespans. To evaluate the effectiveness of this approach, a series of experiments were conducted on several bridges built withthe ANSYS platform. this approach has several advantages over existing methods. (i) it provides a set of physical formulas to reduce data dimensionality, making it applicable to bridges with different sensor data;(ii) by using LSTM to consider the temporal characteristics of bridge health, our approach enhances the accuracy of lifespan prediction;(iii) the authors introduce a method that partitions bridges into multiple local regions for sensor data processing, enabling the acquisition of both local and global lifespan information. these features greatly improve the applicability of our approach in practical engineering scenarios.
Withthe rise of artificial intelligence (AI) tools to support the work of numerous disciplines, we describe a preliminary investigation into the benefits and drawbacks of large language model (LLM) use as part of a t...
详细信息
ISBN:
(纸本)9798350365924;9798350365917
Withthe rise of artificial intelligence (AI) tools to support the work of numerous disciplines, we describe a preliminary investigation into the benefits and drawbacks of large language model (LLM) use as part of a traditional systems engineering and design workflow. To explore this, we tasked a group of systems engineers to each create a list of requirements and use case diagram to satisfy a systems of systems user scenario presented in a proposal document. Participants created models of a healthcare setting in which clinicians resolved discrepancies with patient care by consulting additional sources of record, demonstrating the importance of integrating new systems within the larger healthcare system of systems. the first group were provided open access to an LLM, the second group were provided draft materials generated by an LLM, and the third followed their normal workflow. A subject matter expert (SME) evaluator then scored each model according to its completeness, consistency, correctness, simplicity, and traceability. through this, we show that although LLMs are not a replacement for a trained systems engineer, they can contribute in two primary ways to the modeling process: first, they can generate a significant portion of the information necessary to create a minimum viable product (MVP) model within a fraction of the time, offering a promising way to accelerate the overall model development process. Second, they can answer detailed, domain-specific questions and reduce the time spent on external research.
Artificial intelligence (AI) is revolutionizing software development by enabling high-quality products at lower costs and faster delivery. While existing research highlights ChatGPT’s role in various phases of softwa...
详细信息
this paper introduces CertGraph, a knowledge graph-based approach designed to streamline security certification which integrates evidence from multiple sources. Unlike existing approaches, we consider the complete sta...
详细信息
ISBN:
(纸本)9798400706226
this paper introduces CertGraph, a knowledge graph-based approach designed to streamline security certification which integrates evidence from multiple sources. Unlike existing approaches, we consider the complete stack from software to policies, and enable the fusion of evidence from different views and sources. Its extensible ontology is designed to accommodate multiple domains, including cloud security, AI models, and source code. By providing an automated and systematic approach to build an ontology, CertGraph aims to facilitate more effective security certification and compliance verification.
this paper focuses on the critical role of dataset accuracy in the context of machinery functional safety within an AI-based predictive maintenance system in a manufacturing setting. through experiments introducing pe...
详细信息
Rapid advances of connected and autonomous vehicle technology have led to an increase in cyber-attacks. this in turn has driven the development of the ISO 21434 standard aimed at supporting the management of cybersecu...
详细信息
ISBN:
(纸本)9798350359718;9788396960160
Rapid advances of connected and autonomous vehicle technology have led to an increase in cyber-attacks. this in turn has driven the development of the ISO 21434 standard aimed at supporting the management of cybersecurity risks in the automotive industry. there is, however, a disconnect between the standard and the currently applied model-based development approaches that are increasingly applied for systems and software development. In this paper, we present tool support created for model-based automotive cybersecurity engineering. this tool is built upon the existing automotive systems development language, EAST-ADL, with extensions to address security in accordance withthe ISO 21434 standard covering modeling support, calculation of security-related metrics such as impact, risk, and attack feasibility, and generation of ISO 21434 compliant security threat reports. Meeting the requirements of cybersecurity engineeering according to ISO 21434 are demonstrated with two examples.
暂无评论