Although the use of APIs (Application programming Interfaces) in software program development can effectively improve development efficiency, developers still need to spend more time in finding suitable APIs. To impro...
详细信息
ISBN:
(纸本)9781665458139
Although the use of APIs (Application programming Interfaces) in software program development can effectively improve development efficiency, developers still need to spend more time in finding suitable APIs. To improve the overall development efficiency, many API recommendation approaches have been proposed. However, they could not make good use of the information in the source code, especially for the structural information. The PDG (Program Dependence Graph) of source code can contain both syntactic and structural information, which can be great representations of the source code. Based on the PDG, we propose a new approach, called JARST (Java API Recommendation combining Structural with Textual code information), which recommends the appropriate APIs by analyzing the structure information and text information of the source code. The JARST approach uses a graph neural network to learn source code structure information of PDG and uses a multi-modal approach to learn the text information in the source code. Finally, we combine the structural and textual information of the source code to implement API recommendations. We collect 625 open source Java projects from Github as our experimental objects. The experimental results show that JARST can provide accurate APIs to help software developers facilitate development activities. Moreover, it performs better than the cutting-edge studies including APIRes-CST and APIREC with higher top-k accuracy values. In detail, the improvement achieves up to 35.3%.
MOOCs (Massive open Online Courses) can be beneficial to universities in different ways. One use case of MOOC is to implement it in admission procedures. Our university offers an opportunity to study Computer Science ...
详细信息
ISBN:
(纸本)9781728160900
MOOCs (Massive open Online Courses) can be beneficial to universities in different ways. One use case of MOOC is to implement it in admission procedures. Our university offers an opportunity to study Computer Science (CS) to those students who have previous experience in programming based on the MOOC "Introduction to programming" organized by the university. In this paper, we investigate differences in study outcomes between students who applied for a study right using this programming MOOC and students who used the traditional application method. The results demonstrate that, overall, MOOC and non-MOOC students' learning outcomes do not differ, but MOOC students' performance in mathematics is lower than that of non-MOOC students. However, we argue that using a programming MOOC as an admission mechanism for the CS curriculum is beneficial for the university.
Space weather poses a tremendous threat to power systems: geomagnetic disturbances could result in widespread disruptions and long-duration blackouts, including severe damage to system components. To mitigate their im...
详细信息
ISBN:
(数字)9798350345308
ISBN:
(纸本)9798350345315
Space weather poses a tremendous threat to power systems: geomagnetic disturbances could result in widespread disruptions and long-duration blackouts, including severe damage to system components. To mitigate their impacts, a handful of strategies exist, with the most promising being the deployment of transformer neutral blocking devices. The high cost of these devices, however, precludes their installation at all substations; this motivates the development of effective solutions for the cost-effective placement of such devices. While the current state-of-the-art in blocker placement methods is insufficient to be applied to real-sized power grids, ongoing research continues to increase the size of networks for which the placement problem remains tractable. Along these lines, the contributions of this paper are two fold: first, a comprehensive overview of the current state-of-the-art in blocker placement methods is provided; and second, a complete optimization formulation – implemented and benchmarked in an open-source software – for the blocker placement problem is presented.
Microservices are a promising technology for future networks, and many research efforts have been devoted to optimally placing microservices in cloud data centers. However, microservices deployment in edge and in-netw...
详细信息
ISBN:
(纸本)9781665435413
Microservices are a promising technology for future networks, and many research efforts have been devoted to optimally placing microservices in cloud data centers. However, microservices deployment in edge and in-network devices is more expensive than the cloud. Additionally, several works do not consider the main requirements of microservice architecture, such as service registry, failure detection, and each microservice's specific database. This paper investigates the problem of placing components (i.e. microservices and their corresponding databases) while considering physical nodes' failure and the distance to service registries. We propose a Components-aware Microservices Placement for In-network Computing Cloud-Edge Continuum (CaMP-INC). We formulate an Integer Linear programming (ILP) problem with the objective of cost minimization. Due to the problem's $\mathcal{NP}$ -hardness, we propose a heuristic solution. Numerical results demonstrate that our proposed solution CaMP-INC reduces the total cost by 15.8% on average and has a superior performance in terms of latency minimization compared to benchmarks.
The evolution of mobile communication and its integration into our daily lives has led to a rapid increase in user data and new service innovations. The emergence of two new concepts Software Defined network (SDN) and...
详细信息
ISBN:
(纸本)9781728175652
The evolution of mobile communication and its integration into our daily lives has led to a rapid increase in user data and new service innovations. The emergence of two new concepts Software Defined network (SDN) and network Function Virtualization (NFV) has radically changed the evolution of network functions and the architectures. While these concepts are considered as drivers for designing low-cost cloud networkarchitectures, limited attention paid to architectural designs based on the harmony between and within the network layers that do not create vendor dependency for the system to operate end-to-end. open-source standards have been published to ensure interoperability, but the standards do not contain details for each use case. SDN solutions developed by vendors are designed for commercial purposes, and these architectures are wholly or partly vendor dependent. Telecommunication companies are entering a vicious circle in their architectural designs. With 5G Technology. offering more bandwidth, high demand of IoT (Internet of Things) increased the pressure of this vicious circle of telecommunication companies. In this paper, SDN Confederation architecture, which solves vendor dependence, is exemplified with Representational State Transfer Application Protocol Interface (REST API) and openFlow Experimenter messages working in harmony between and within the layers are presented.
Windows Communication Foundation (WCF) is a communication framework for building connected, serviceoriented applications, initially released by Microsoft as part *** Framework, but now open source. The WCF message-bas...
详细信息
ISBN:
(纸本)9781665449953
Windows Communication Foundation (WCF) is a communication framework for building connected, serviceoriented applications, initially released by Microsoft as part *** Framework, but now open source. The WCF message-based communication is a very popular solution used for sending asynchronous messages from one service endpoint to another. Because WCF provides many functionalities it has a largeconsuming development model and often the security measures implemented in applications are not proper. In this study we propose a methodology for offensive security analysis of an WCF endpoint or service, from red team perspective. A step by step approach, empirical information, and detailed analysis report of WCF vulnerabilities are presented. We conclude by proposing recommendations for mitigating attacks and securing endpoints.
Properties in material composition and crystal structures have been explored by density functional theory (DFT) calculations, using databases such as the open Quantum Materials Database (OQMD). Databases like these ha...
详细信息
ISBN:
(纸本)9781728162515
Properties in material composition and crystal structures have been explored by density functional theory (DFT) calculations, using databases such as the open Quantum Materials Database (OQMD). Databases like these have been used currently for the training of advanced machine learning and deep neural network models, the latter providing higher performance when predicting properties of materials. However, current alternatives have shown a deterioration in accuracy when increasing the number of layers in their architecture (over-fitting problem). As an alternative method to address this problem, we have implemented residual neural networkarchitectures based on Merge and Run networks, IRNet and UNet to improve performance while relaxing the observed network depth limitation. The evaluation of the proposed architectures include a 9:1 ratio to train and test as well as 10 fold cross validation. In the experiments we found that our proposed architectures based on IRNet and UNet are able to obtain a lower Mean Absolute Error (MAE) than current strategies. The full implementation (Python, Tensorflow and Keras) and the trained networks will be available online for community validation and advancing the state of the art from our findings.
High-Performance Big Data Analytics (HPDA) applications are characterized by huge volumes of distributed and heterogeneous data that require efficient computation for knowledge extraction and decision making. Designer...
详细信息
ISBN:
(纸本)9783981926354
High-Performance Big Data Analytics (HPDA) applications are characterized by huge volumes of distributed and heterogeneous data that require efficient computation for knowledge extraction and decision making. Designers are moving towards a tight integration of computing systems combining HPC, Cloud, and IoT solutions with artificial intelligence (AI). Matching the application and data requirements with the characteristics of the underlying hardware is a key element to improve the predictions thanks to high performance and better use of resources. We present EVEREST, a novel H2020 project started on October 1, 2020, that aims at developing a holistic environment for the co-design of HPDA applications on heterogeneous, distributed, and secure platforms. EVEREST focuses on programmability issues through a data-driven design approach, the use of hardware-accelerated AI, and an efficient runtime monitoring with virtualization support. In the different stages, EVEREST combines state-of-the-art programming models, emerging communication standards, and novel domain-specific extensions. We describe the EVEREST approach and the use cases that drive our research.
The opennetwork (TON), designed to support Telegram's extensive user base of hundreds of millions, has garnered considerable attention since its launch in 2022. FunC is the most popular programming language for w...
详细信息
ISBN:
(数字)9798331505691
ISBN:
(纸本)9798331505707
The opennetwork (TON), designed to support Telegram's extensive user base of hundreds of millions, has garnered considerable attention since its launch in 2022. FunC is the most popular programming language for writing smart contracts on TON. It is distinguished by a unique syntax compared to other smart contract languages. Despite growing interest, research on the practical defects of TON smart contracts is still in its early stages. In this paper, we summarize eight smart contract defects identified from TON's official blogs and audit reports, each with detailed definitions and code examples. Furthermore, we propose a static analysis framework called TONScanner to facilitate the detection of these defects. Specifically, TONScanner reuses FunC compiler's frontend code to transform the FunC source code into FunC intermediate representation (IR) in the form of a directed acyclic graph (DAG). Based on this IR, TONScanner constructs a control flow graph (CFG), then transforms it into a static single assignment (SSA) form to simplify further analysis. TONScanner also integrates Data Dependency, Call Graph, Taint Analysis, and Cell Construct, which are specifically tailored for TON blockchain's unique data structures. These components finally facilitate the identification of the eight defects. We evaluate the effectiveness of TONScanner by applying it to 1,640 smart contracts and find a total of 14,995 defects. Through random sampling and manual labeling, we find that TONScanner achieves an overall precision of 97.49%. The results reveal that current TON contracts contain numerous defects, indicating that developers are prone to making errors. TONScanner has proven its ability to accurately identify these defects, thereby aiding in their correction.
With the trend towards automated driving, Controller Area network (CAN) is migrating to CAN with Flexible Data-Rate (CAN-FD), where frame packing (i.e., packing signals of various periods, deadlines, and payloads into...
详细信息
ISBN:
(纸本)9783981926354
With the trend towards automated driving, Controller Area network (CAN) is migrating to CAN with Flexible Data-Rate (CAN-FD), where frame packing (i.e., packing signals of various periods, deadlines, and payloads into frames following the standard CAN-FD format) is critical to address the high bandwidth demand with limited resources. Existing works have applied Integer Linear programming (ILP), which easily gets intractable as the number of signals to be packed increases, or proposed heuristics, which are not able to obtain the optimal solution. In addition, the security model employed does not meet the AUTOSAR SecOC specification. This paper reports a novel frame packing approach for CAN-FD with an AUTOSAR-compliant security model. We establish the theory that extending the existing frame to pack signals with the same period leads to shorter WCTT (worst-case transmission time) and thus lower bus utilization compared to creating a new frame. Following this principle, the design space is tremendously pruned. As shown in the comprehensive experiments, only 10(-9) of the original size or even a smaller portion needs to be explored, while the optimality is kept. The computational time is correspondingly reduced, generating solutions within 15 minutes to large-scale problems that are otherwise intractable with ILP.
暂无评论