Deep learning techniques have proved to be beneficial in many scientific disciplines and have beaten state-of-the-art approaches in many applications. The main aim of this article is to improve the success rate of dee...
详细信息
The METABODY project proposes an ontological critique of perceptual regimes, such as perspective and rationalized vision, which eventually underlie contemporary control society and imperial colonization projects, thus...
详细信息
The METABODY project proposes an ontological critique of perceptual regimes, such as perspective and rationalized vision, which eventually underlie contemporary control society and imperial colonization projects, thus being an ontological substrate of contemporary environmental problems. Metabody proposes relational and perceptual modes exceeding the ontological splits (subject-object divide) that account for colonization processes as well as for models of control based on quantification, prediction and modulation in the Big Data Era or Algoricene. These proposals become enacted in a novel architectural paradigm of dynamic self-construction techniques across the digital and physical for an indeterminate and emergent space, called METATOPIA.
In this paper, we present a new self-destructing data system, called retrograde storage. This system can randomly store messages into a storage pool built on frequently colliding hash table (FCHT) as an alternative wa...
详细信息
ISBN:
(纸本)9781538626672
In this paper, we present a new self-destructing data system, called retrograde storage. This system can randomly store messages into a storage pool built on frequently colliding hash table (FCHT) as an alternative way of DHT, and each message will be covered promptly after the expiry of validity period. This approach makes the message unrecoverable by multiple-pass Gutmann method and supports general secret sharing or encryption with counting control for personal data privacy. Moreover, we give a fundamental mathematical model of birth-death processes, in which we provide a detailed performance analysis by some theorems, including erasure distribution, recovery probability, secure erasure time, capacity of recycle pool. Experimental results indicated that our system is more efficient and accurate for controlling message self-destruction cycle, and makes it hard or impossible to recover data in a forensic investigation.
The proceedings contain 31 papers. The special focus in this conference is on . The topics include: A theory of encodings and expressiveness;a framework for parameterized monitorability;logics for bisimulation and div...
ISBN:
(纸本)9783319893655
The proceedings contain 31 papers. The special focus in this conference is on . The topics include: A theory of encodings and expressiveness;a framework for parameterized monitorability;logics for bisimulation and divergence;call-by-need, neededness and all that;fitch-style modal lambda calculi;Realizability interpretation and normalization of typed call-by-need λ-calculus with control;quotient inductive-inductive types;guarded traced categories;proper semirings and proper convex functors;from symmetric pattern-matching to quantum control;a trace semantics for system F parametric polymorphism;the complexity of graph-based reductions for reachability in markov decision processes;a hierarchy of scheduler classes for stochastic automata;symbolically quantifying response time in stochastic models using moments and semirings;comparator automata in quantitative verification;modular tableaux calculi for separation theories;differential calculus with imprecise input and its logical framework;the effects of adding reachability predicates in propositional separation logic;the equational theory of the natural join and inner union is decidable;minimization of graph weighted models over circular strings;games on graphs with a public signal monitoring;categorical combinatorics for non deterministic strategies on simple games;WQO dichotomy for 3-graphs;verifying higher-order functions with tree automata;a syntactic view of computational adequacy;a new linear logic for deadlock-free session-typed processes;a double category theoretic analysis of graded linear exponential comonads;depending on session-typed processes;FabULous interoperability for ML and a linear language;automata for true concurrency properties.
control-flow discovery algorithms of Process Mining are capable of generating excellent process models until the process is structured (less number of activities and paths connecting between them). Otherwise, process ...
详细信息
Cyber-Physical Systems (CPS) are interconnected, computational control systems which directly interact with the non-deterministic physical world. To manage the confronted uncertainty when dealing with non-deterministi...
详细信息
Cyber-Physical Systems (CPS) are interconnected, computational control systems which directly interact with the non-deterministic physical world. To manage the confronted uncertainty when dealing with non-deterministic environments, a constant feedback loop of monitoring the environment and consequent adjustment of the system is obligatory. Components of a CPS as well as the communication between its components are prone to malfunctioning leading to system failures. Therefore, to enable an effective integration of CPSs into arbitrary business processes, a conceptual modeling framework which enables the evaluation of the capabilities and functionalities of CPSs is needed. In this paper, such a conceptual modeling framework based on applied category theory is proposed to model CPSs in a given environment. Copyright 2018 for this paper by its authors.
In this paper, a novel formal language Z is adopted to describe the state spaces of workflow process models. We construct the state space for two aspects of workflow process: control flow and resource management. The ...
详细信息
The proceedings contain 13 papers. The special focus in this conference is on Verification and Evaluation of computer and Communication Systems. The topics include: Exploiting local persistency for reduced state space...
ISBN:
(纸本)9783030003586
The proceedings contain 13 papers. The special focus in this conference is on Verification and Evaluation of computer and Communication Systems. The topics include: Exploiting local persistency for reduced state space generation;Analysis of a road/tramway intersection by the ORIS Tool;toward implicit learning for the compositional verification of markov decision processes;Replacing store buffers by load buffers in TSO;orchestration synthesis for real-time service contracts;modelling and verification of dynamic role-based access control;performance evaluation of dynamic load balancing protocols based on formal models in cloud environments;a protocol for constraint automata execution in a synchronous network of processors;MBT/CPN: A tool for model-based software testing of distributed systems protocols using coloured petri nets;how to be sure a faulty system does not always appear healthy?;improving parallel state-space exploration using genetic algorithms.
Early supervised machine learning (ML) algorithms have used reliable labels from experts to build predictions. But recently, these algorithms have been increasingly receiving data from the general population in the fo...
详细信息
ISBN:
(纸本)9789897583308
Early supervised machine learning (ML) algorithms have used reliable labels from experts to build predictions. But recently, these algorithms have been increasingly receiving data from the general population in the form of labels, annotations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information, such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in interactive processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make biased predictions, known as algorithmic bias. We investigate three forms of iterated algorithmic bias and how they affect the performance of machine learning algorithms. Using controlled experiments on synthetic data, we found that the three different iterated bias modes do affect the models learned by ML algorithms. We also found that Iterated filter bias, which is prominent in personalized user interfaces, can limit humans’ ability to discover relevant data. Copyright 2018 by SCITEPRESS – science and Technology Publications, Lda. All rights reserved
The proceedings contain 45 papers. The topics discussed include: state dependent control of closed queueing networks;Dandelion++: lightweight cryptocurrency networking with formal anonymity guarantees: extended abstra...
ISBN:
(纸本)9781450358460
The proceedings contain 45 papers. The topics discussed include: state dependent control of closed queueing networks;Dandelion++: lightweight cryptocurrency networking with formal anonymity guarantees: extended abstract;bootstrapped graph diffusions: exposing the power of nonlinearity;the cost of uncertainty in curing epidemics;the price of fragmentation in mobility-on-demand services;new metrics and models for a post-ISA era: managing complexity;delay scaling in many-sources wireless networks without queue state information;practical bounds on optimal caching with variable object sizes;on resource pooling and separation for LRU caching;an optimal randomized online algorithm for QoS buffer management;minimizing queue length regret under adversarial network models;dynamic proportional sharing: a game-theoretic approach;SOAP: one clean analysis of all age-based scheduling policies;a Whittle's index based approach for QoE optimization in wireless networks;an optimal algorithm for online non-convex learning;asymptotic optimal control of Markov-modulated restless bandits;online learning of optimally diverse rankings;learning proportionally fair allocations with low regret;multi-armed bandit with additional observations;online learning in weakly coupled Markov decision processes: a convergence time study;working set size estimation techniques in virtualized environments: one size does not fit all;PreFix: switch failure prediction in datacenter networks;on non-preemptive VM scheduling in the cloud;and why some like it loud: timing power attacks in multi-tenant data centers using an acoustic side channel.
暂无评论