This paper focuses on positive computing using multimedia data called multimedia positive computing. The impression of multimedia data is used to change a person's mood. Presenting a piece of multimedia data induc...
详细信息
Being predominant in digital entertainment for decades, video games have been recognized as valuable software artifacts by the softwareengineering (SE) community just recently. Such an acknowledgment has unveiled sev...
详细信息
ISBN:
(纸本)9798350363982;9798400705878
Being predominant in digital entertainment for decades, video games have been recognized as valuable software artifacts by the softwareengineering (SE) community just recently. Such an acknowledgment has unveiled several research opportunities, spanning from empirical studies to the application of AI techniques for classification tasks. In this respect, several curated game datasets have been disclosed for research purposes even though the collected data are insufficient to support the application of advanced models or to enable interdisciplinary studies. Moreover, the majority of those are limited to PC games, thus excluding notorious gaming platforms, e.g., PlayStation, Xbox, and Nintendo. In this paper, we propose PlayMyData, a curated dataset composed of 99,864 multi-platform games gathered by the IGDB website. By exploiting a dedicated API, we collect relevant metadata for each game, e.g., description, genre, rating, gameplay video URLs, and screenshots. Furthermore, we enrich PlayMyData with the timing needed to complete each game by mining the HLTB website. To the best of our knowledge, this is the most comprehensive dataset in the domain that can be used to support different automated tasks in SE. More importantly, PlayMyData can be used to foster cross-domain investigations built on top of the provided multimedia data.
Affective computing plays a crucial role in the Human-Computer Interaction (HCI) field by enabling computers to recognize, interpret, process, and simulate emotions evoked by positive/negative events, objects, or situ...
详细信息
The increasing demand for bandwidth-intensive network applications, such as video streaming, multimedia, and Internet of Things (IoT) applications, necessitates improved resource management to protect the network with...
详细信息
As the scientific community is increasing the coverage of the quantum computing domain ranging from theoretical physics to financial applications, so does the number of quantum computing applications being developed f...
详细信息
ISBN:
(纸本)9798350304794
As the scientific community is increasing the coverage of the quantum computing domain ranging from theoretical physics to financial applications, so does the number of quantum computing applications being developed for quantum computing hardware that is available today. As this hardware evolves towards increased capacity in terms of qubit number and increased fidelity, so does the complexity of quantum computing applications that implement the state-of-the-art of (hybrid) quantum algorithms. With this comes an increased demand for quantum softwareengineering practices where testing is a crucial part of the development process. Hence, a robust approach that addresses certain challenges and peculiarities related to the quantum computing domain is needed for the testing process. This paper proposes a standard-ready testing pipeline that covers the requirements of testing in a continuous development cycle as part of a modern quantum softwareengineering lifecycle.
Thanks to the recent rapid development of 5G technology, multimedia communication services, such as live streaming and short movies, have attracted a lot of attention and are now a big component of people's daily ...
详细信息
Serverless computing, also known as Function-as-a-Service (FaaS), is a significant development trend in modern software system architecture. The workflow composition of multiple short-lived functions has emerged as a ...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Serverless computing, also known as Function-as-a-Service (FaaS), is a significant development trend in modern software system architecture. The workflow composition of multiple short-lived functions has emerged as a prominent pattern in FaaS, exposing a considerable resources configuration challenge compared to individual independent serverless functions. This challenge unfolds in two ways. Firstly, workflows frequently encounter dynamic and concurrent user workloads, increasing the risk of QoS violations. Secondly, the performance of a function can be affected by the resource reprovision of other functions within the workflow. With the popularity of the mode of concurrent processing in one single instance, concurrency limit as a critical configuration parameter imposes restrictions on the capacity of requests per instance. In this study, we present FaaSConf, a QoS-aware hybrid resource configuration approach that uses multi-agent reinforcement learning (MARL) to configure hybrid resources, including hardware resources and concurrency, thereby ensuring end-to-end QoS while minimizing resource costs. To enhance decision-making, we employ an attention technique in MARL to capture the complex performance dependencies between functions. We further propose a safe exploration strategy to mitigate QoS violations, resulting in a safer and efficient configuration exploration. The experimental results demonstrate that FaaSConf outperforms state-of-the-art approaches significantly. On average, it achieves a 26.5% cost reduction while exhibiting robustness to dynamic load changes.
Intel's SGX is a confidential computing technique. It allows key functionalities of C/C++/native applications to be confidentially executed in hardware enclaves. However, numerous cloud applications are written in...
详细信息
ISBN:
(纸本)9781665457019
Intel's SGX is a confidential computing technique. It allows key functionalities of C/C++/native applications to be confidentially executed in hardware enclaves. However, numerous cloud applications are written in Java. For supporting their confidential computing, state-of-the-art approaches deploy Java Virtual Machines (JVMs) in enclaves and perform confidential computing on JVMs. Meanwhile, these JVM-in-enclave solutions still suffer from serious limitations, such as heavy overheads of running JVMs in enclaves, large attack surfaces, and deep computation stacks. To mitigate the above limitations, we formalize a Secure Closed-World (SCW) principle and then propose Lejacon, a lightweight and efficient approach to Java confidential computing. The key idea is, given a Java application, to (1) separately compile its confidential computing tasks into a bundle of Native Confidential computing (NCC) services;(2) run the NCC services in enclaves on the Trusted Execution Environment (TEE) side, and meanwhile run the non-confidential code on a JVM on the Rich Execution Environment (REE) side. The two sides interact with each other, protecting confidential computing tasks and as well keeping the Trusted computing Base (TCB) size small. We implement Lejacon and evaluate it against OcclumJ (a state-of-the-art JVM-in-enclave solution) on a set of benchmarks using the BouncyCastle cryptography library. The evaluation results clearly show the strengths of Lejacon: it achieves competitive performance in running Java confidential code in enclaves;compared with OcclumJ, Lejacon achieves speedups by up to 16.2x in running confidential code and also reduces the TCB sizes by 90+% on average.
Internet-connected smart devices are increasing at an exponential rate. These powerful devices have created a yet-untapped pool of idle resources that can be utilised, among others, for processing data in resource-dep...
详细信息
ISBN:
(纸本)9798350300390
Internet-connected smart devices are increasing at an exponential rate. These powerful devices have created a yet-untapped pool of idle resources that can be utilised, among others, for processing data in resource-depleted environments. The idea of bringing together a pool of smart devices for "crowd computing" (CC) has been studied in the recent past from an infrastructural feasibility perspective. However, for the CC paradigm to be successful, numerous socio-technical and softwareengineering (SE), specifically the requirements engineering (RE)-related factors are at play and have not been investigated in the literature. In this paper, we motivate the SE-related aspects of CC and the ideas for implementing mobile apps required for CC scenarios. We present the results of a preliminary study on understanding the human aspects, incentives that motivate users, and CC app requirements, and present our future development plan in this relatively new field of research for SE applications.
The evolution of artificial intelligence (AI) and machine learning presents both utility and security implications for our digital interactions. This study focuses on the transformative role of generative AI in social...
详细信息
ISBN:
(纸本)9798350354744;9798350354737
The evolution of artificial intelligence (AI) and machine learning presents both utility and security implications for our digital interactions. This study focuses on the transformative role of generative AI in social engineering attacks, specifically examining three pillars where it significantly amplifies their impact: advanced targeting and personification, genuine content creation, and automated attack infrastructure. The analysis forms a conceptual model named the generative AI social engineering framework. The research delves into human implications and measures to counter social engineering attacks, blending theoretical analysis with practical insights through case studies. Ethical considerations surrounding AI in malicious activities are discussed, emphasizing the importance of safe AI development, and various articles were reviewed to highlight social engineering attacks as a common threat. Two studies were conducted: a user testing study with 48 participants from diverse occupations and social engineering awareness, and an exploratory study collecting qualitative data from 40 social engineering attack victims. The user testing study revealed universal acceptance of the AI-based tool, irrespective of participants' occupations. Victim themes included reasons for falling prey to attacks, methods, prevention advice, and detection. The research concludes by highlighting AI-generated content as a key factor fueling social engineering attacks and bridging the gap between AI development and cybersecurity practices, highlighting the need for interdisciplinary approaches to address evolving challenges.
暂无评论