Since the demand for programmers is increasing, programming courses are being offered widely. In this context, students' motivation can be damaged by difficulties they encounter in their programming courses. Altho...
详细信息
ISBN:
(纸本)9789869721493
Since the demand for programmers is increasing, programming courses are being offered widely. In this context, students' motivation can be damaged by difficulties they encounter in their programming courses. Although teachers' support is necessary to prevent such an issue, it is impossible for teachers to directly monitor all students' programming activities at the same time and determine which students have troubles withprogramming. therefore, several studies have been conducted to help teachers monitor students. However, these studies do not provide an understanding of the activities of students who do not run their code, which may lead researchers to miss students who are in trouble. In this paper, we propose an indicator for detecting students who need coding support by analyzing programming logs that are recorded even when the students do not run their code. this gives teachers deeper insight into the students' programming performance. Although further work remains, the validation of this indicator shows that it could detect those students who are in trouble.
the proceedings contain 104 papers. the topics discussed include: answering conceptual queries with ferret;specification patterns for probabilistic quality properties;existential live sequence charts revisited;symboli...
ISBN:
(纸本)9781605580791
the proceedings contain 104 papers. the topics discussed include: answering conceptual queries with ferret;specification patterns for probabilistic quality properties;existential live sequence charts revisited;symbolic mining of temporal specifications;testing pervasive software in the presence of context inconsistency resolution services;towards reusable components with aspects: an empirical study on modularity and obliviousness;early prediction of software component reliability;mining library specifications using inductive logicprogramming;temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems;precise memory leak detection for java software using container profiling;static detection of cross-site scripting vulnerabilities;and a comparative analysis of the efficiency of change metrics and static code attributes for defect prediction.
Learning from Interpretation Transition (LFIT) is an unsupervised learning algorithm which learns the dynamics just by observing state transitions. LFIT algorithms have mainly been implemented in the symbolic method, ...
详细信息
ISBN:
(数字)9783030974541
ISBN:
(纸本)9783030974541;9783030974534
Learning from Interpretation Transition (LFIT) is an unsupervised learning algorithm which learns the dynamics just by observing state transitions. LFIT algorithms have mainly been implemented in the symbolic method, but they are not robust to noisy or missing data. Recently, research works combining logical operations with neural networks are receiving a lot of attention, with most works taking an extraction based approach where a single neural network model is trained to solve the problem, followed by extracting a logic model from the neural network model. However most research work suffer from the combinatorial explosion problem when trying to scale up to solve larger problems. In particular a lot of the invariance that hold in the symbolic world are not getting utilized in the neural network field. In this work, we present a model that exploits symbolic invariance in our problem. We show that our model is able to scale up to larger tasks than previous work.
Power analysis attacks use power dissipation to find the secret key of cryptographic devices. Two of the main techniques used as the countermeasures of power analysis attacks are masking and balancing. this paper cons...
详细信息
ISBN:
(纸本)9781509057405
Power analysis attacks use power dissipation to find the secret key of cryptographic devices. Two of the main techniques used as the countermeasures of power analysis attacks are masking and balancing. this paper considers countermeasures with balancing only. All balancing methods proposed so far require a pre-charge (or a pre-clear) state for all registers in which the logic is initialized to logic '1' (or to logic '0') so that equal Hamming distances (HD) and Hamming weights (HW) are maintained. Pre-charging and pre clearing add additional clock cycles to the encryption algorithm. In this paper, for the first time, we present an algorithmic balancing technique (referred to as NORA;No Pre-charge) which does not require the pre-charge/pre-clear stage. the proposed balancing technique is explained as a generalized block cipher balancing technique and an Advanced Encryption Standard (AES) circuit is implemented as an example. Correlation power analysis attacks were carried out against 600,000 traces and Normalized Inter Class Variance (NICV) was used as the leakage evaluation methodology. the resulting circuit is the only complete AES circuit, which can balance both Hamming weights and Hamming distances without pre-charging or pre-clearing while resisting variability effects such as path imbalances and process variations. the circuit only consumes 8.1 x resources when compared to an unprotected AES circuit implemented on a Xilinx Kintex7-325T FPGA.
Computationally very expensive dynamic-program ming matching of data sequences has been directly implemented in a fully-parallel-architecture VLSI chip. the circuit operates as digital logic in the signal domain, whil...
详细信息
Computationally very expensive dynamic-program ming matching of data sequences has been directly implemented in a fully-parallel-architecture VLSI chip. the circuit operates as digital logic in the signal domain, while analog processing is carried out in the time domain based on the delay-encoding-logic scheme. As a result, a high-speed low-power best-match-sequence search has been established with a small chip area. the typical matching time of 80 ns withthe power dissipation of 2 mW has been demonstrated with fabricated prototype chips.
Industry leaders provide concurrent libraries because asynchronous & parallel programming are increasingly in demand: responsiveness, scalability, and high-throughput are key elements of all modern applications. H...
详细信息
ISBN:
(纸本)9781509000258
Industry leaders provide concurrent libraries because asynchronous & parallel programming are increasingly in demand: responsiveness, scalability, and high-throughput are key elements of all modern applications. However, we know little about how developers use these concurrent libraries in practice and the developer's toolbox for concurrency is very limited. We present the first study that analyzes the usage of concurrent libraries in large codebases, such as 2258 open-source C# apps comprising 54M SLOC and 1378 open-source Windows Phone apps comprising 12M SLOC. Using this data, we find important problems about use and misuse of concurrency. Inspired by our findings, we designed, evaluated, and implemented several static analyses and refactoring tools.
Dynamic programming has previously been used when measuring Lumen Diameter (LD) and Intima-Media thickness (IMT) in single frame ultrasound carotid artery images [1]. An extension to multiframe detection of that proce...
详细信息
ISBN:
(纸本)9781424418145
Dynamic programming has previously been used when measuring Lumen Diameter (LD) and Intima-Media thickness (IMT) in single frame ultrasound carotid artery images [1]. An extension to multiframe detection of that procedure is proposed in this paper. Our new method transforms a three dimensional problem into multiple two dimensional problems that can again be solved by dynamic programming. First, several "candidate boundaries" are detected in each image. then, one boundary from each image in the sequence is selected in such a way that the sequence of boundaries is optimal among the considered possibilities. A model of the movements of the boundaries is used in the second step. Our proposed method shows promising performance on both synthetic and real ultrasound data.
Power consumption reduction is a very critical challenge in nowadays nanoscale circuits. In this paper, a new power reduction approach is demonstrated. this approach is originally based on the idea of TSV multiplexing...
详细信息
ISBN:
(纸本)9781538640340
Power consumption reduction is a very critical challenge in nowadays nanoscale circuits. In this paper, a new power reduction approach is demonstrated. this approach is originally based on the idea of TSV multiplexing in 3D-ICs where two or more signals can flow through one TSV instead of multiple TSVs. Based on that behavior, the possibility of power reduction of this circuit is discovered and its generalization to any wire, i.e., wire multiplexing, is detailed. Also, an analytical power model for this circuit is developed to predict its power consumption behavior. Further, and by means of Cadence-Spectre simulations on 65 nm technology and also using the developed analytical model, the power reduction of wire multiplexing technique could be proved and verified.
Fast downscaling of technology features in CMOS fabrication processes have resulted in numerous insurmountable challenges, which prompted researchers to explore alternative storage and computing technologies. Resistiv...
详细信息
ISBN:
(纸本)9781509057405
Fast downscaling of technology features in CMOS fabrication processes have resulted in numerous insurmountable challenges, which prompted researchers to explore alternative storage and computing technologies. Resistive RAM (ReRAM) is a promising non-volatile storage technology with high endurance, high retention capacity and compatibility with CMOS manufacturing flow. More importantly, ReRAM devices exhibit capability to perform logic operations and therefore, provides an excellent platform for in-memory computing paradigm. Several prominent arithmetic and data analytic applications have been mapped on ReRAM crossbar array so far. Along this line of research, we undertake, for the first time, the mapping of binary-valued matrix-vector operations for ReRAM crossbar array. these linear algebra operations form the key component of diverse applications ranging from graph mining, image processing to bio-informatics. We perform detailed design exploration to obtain an efficient mapping, demonstrate the working flow and finally, present the impact of crossbar dimensions on performance.
this paper presents the idea how to use fuzzy active rules within biometric systems. We have already shown how the concept of complex events presented in the active database theory could be used in order to build a bi...
详细信息
ISBN:
(纸本)9789537138127
this paper presents the idea how to use fuzzy active rules within biometric systems. We have already shown how the concept of complex events presented in the active database theory could be used in order to build a biometric system. We especially explored the paradigm of active rules and complex events and experimental results were encouraging. Fuzzy logic is very good when dealing with imprecision and uncertainty and hence it is suitable to be used in biometric systems. We will discuss how to apply fuzzy active rules in order to deal with imprecise decision making in multimodal biometric systems.
暂无评论