Task-based programming models are gaining traction in scientific computing. IRIS is a portable runtime system that exploits multiple heterogeneous programming systems and can discover available resources and manage mu...
详细信息
ISBN:
(数字)9783031617638
ISBN:
(纸本)9783031617621;9783031617638
Task-based programming models are gaining traction in scientific computing. IRIS is a portable runtime system that exploits multiple heterogeneous programming systems and can discover available resources and manage multiple diverse programming systems (e.g., CUDA, Hexagon, HIP, Level Zero, OpenCL, and OpenMP) simultaneously. It accounts for the constraints of task dependencies and provides customizable scheduling policies to map those tasks to heterogeneous devices. In this paper, we present new capabilities added to IRIS to improve its portability for heterogeneous programming, build-friendliness, and performance efficiency. The new additions include vendor-specific kernel support, a runtime system with a foreign function interface to eliminate writing wrapper or boilerplate code for heterogeneous kernels, an easy-to-use and configurable CMake-based build environment, automatic and efficient data transfers and orchestration, and the Hunter and DAGGER toolchains to evaluate IRIS's task scheduling algorithms.
Many methods have been proposed to utilize software obfuscation techniques to steganographically embed certain code logic within a program, thereby enhancing the protection of software intellectual property. Currently...
详细信息
Many methods have been proposed to utilize software obfuscation techniques to steganographically embed certain code logic within a program, thereby enhancing the protection of software intellectual property. Currently, the protective effect of software obfuscation primarily focuses on safeguarding the native semantics of the target program, with little attention paid to the obfuscation of steganographic semantics. For instance, in the context of software copyright protection, code watermarks need to be embedded into the target program, and the ability to localize the watermark code becomes a critical means for attackers to bypass copyright protection. However, existing watermark code suffers from several shortcomings, such as low integration with the target program, weak resistance to dynamic reverse analysis, poor concealment, and ease of localization. This paper proposes a novel code semantic steganography scheme, DopSteg. The scheme leverages the principles of data-oriented programming, first determining the data-safe zones and semantic execution zones. Based on the semantic execution zones, the intermediate representation of the target software is partitioned. Through control flow flattening, reusable code fragments are encapsulated within the 'switch' branches of loop structures, thereby achieving code semantic steganography. A Turing completeness analysis of DopSteg demonstrates its capability to steganographically embed complex semantics. Experimental evaluations show that DopSteg increases instruction entropy by an average of approximately 140%, enabling deeper semantic steganography. Reverse analysis requires additional effort to analyze the steganographic semantic logic, significantly enhancing resistance to dynamic analysis while maintaining stable overhead. DopSteg provides a novel approach to software copyright protection.
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
This exploratory study attempted to examine the relationship between the level of performance of Bachelor of science in computerscience (BSCS) students in their on-the-job (OJT) course and their academic performance ...
详细信息
Examining middle school students' computational identity development, personal, situational variables and programming experiences through the lens of identity may offer an opportunity to explore the dynamic relati...
详细信息
Examining middle school students' computational identity development, personal, situational variables and programming experiences through the lens of identity may offer an opportunity to explore the dynamic relationship between individual, academic and social influences in computerscience and CI. The aim of this study is to examine the variables explaining middle school students' computational identities. The participants of this research consist of middle school students in Turkey. In this study, data were collected using a personal information form and 3 scales. As a result of the research, the programming actualization identity structure was prominent in middle school students. Students' programming variables and their levels are related to all aspects of CI. The results of the study have the potential to raise awareness among educators about which opportunities and experiences are more important to improve student participation and equity in computer and programming education.
Building Expert Systems is an attempt to capture the experience of people who are experts in a subject and incorporate it into computer programs. This task is based on finding out what they know and how they use their...
详细信息
ISBN:
(纸本)9783031341465;9783031341472
Building Expert Systems is an attempt to capture the experience of people who are experts in a subject and incorporate it into computer programs. This task is based on finding out what they know and how they use their knowledge to resolve problems. Law and legal reasoning is one of the new targets for Artificial Intelligence systems. This work is a continuation of previous work, where a prototype of Expert Systems called Experticia was designed and implemented by a public University of the Argentine Republic, aims to improve the resolution of judicial files, optimizing time and minimizing data loading errors. Experticia, in its first version, interacts with the Integral System of the Judicial Branch of the Province of Buenos Aires, in an asynchronous way. This article presents part of the work carried out within the framework of a research that aims to optimize the exchange of information between both systems. For this purpose, the use of Application programming Interfaces is proposed to synchronously access the information of the judicial files. First, the technologies used are described, then their specification and design, and finally, the implementation details and the tests performed are explained. The results indicate the feasibility of incorporating this technology in the new version of the Experticia.
Geometric semantic genetic programming (GSGP) is a successful variant of genetic programming (GP), able to induce a unimodal error surface for all supervised learning problems. However, a limitation of GSGP is its ten...
详细信息
ISBN:
(纸本)9783031569562;9783031569579
Geometric semantic genetic programming (GSGP) is a successful variant of genetic programming (GP), able to induce a unimodal error surface for all supervised learning problems. However, a limitation of GSGP is its tendency to generate offspring larger than their parents, resulting in continually growing program sizes. This leads to the creation of models that are often too complex for human comprehension. This paper presents a novel GSGP variant, the Semantic Learning algorithm with Inflate and deflate Mutations (SLIM GSGP). SLIM GSGP retains the essential theoretical characteristics of traditional GSGP, including the induction of a unimodal error surface and introduces a novel geometric semantic mutation, the deflate mutation, which generates smaller off-spring than its parents. The study introduces four SLIM GSGP variants and presents experimental results demonstrating that, across six symbolic regression test problems, SLIM GSGP consistently evolves models with equal or superior performance on unseen data compared to traditional GSGP and standard GP. These SLIM GSGP models are significantly smaller than those produced by traditional GSGP and are either smaller or of comparable size to standard GP models. Notably, the compactness of SLIM GSGP models allows for human interpretation.
Fuzzy Pattern Trees (FPTs) are tree-based structures in which the internal nodes are fuzzy operators, and the leaves are fuzzy features. This work uses Genetic programming (GP) to evolve FPTs and assesses their perfor...
详细信息
ISBN:
(纸本)9783031569562;9783031569579
Fuzzy Pattern Trees (FPTs) are tree-based structures in which the internal nodes are fuzzy operators, and the leaves are fuzzy features. This work uses Genetic programming (GP) to evolve FPTs and assesses their performance on 20 benchmark classification problems. The results show improved accuracy for most of the problems in comparison with previous works using different approaches. Furthermore, we experiment using Lexicase Selection with FPTs and demonstrate that selection methods based on aggregate fitness, such as Tournament Selection, produce more accurate models before analysing why this is the case. We also propose new parsimony pressure methods embedded in Lexicase Selection, and analyse their ability to reduce the size of the solutions. The results show that for most problems, at least one method could reduce the size significantly while keeping a similar accuracy. We also introduce a new fuzzification scheme for categorical features with too many categories by using target encoding followed by the same scheme for numerical features, which is straightforward to implement, and avoids a much higher increase in the number of fuzzy features.
Today, computer technologies are becoming more accessible to everyone. Even at a young age, people are confronted with information technologies (IT) in their daily lives. Therefore, computerscience is becoming increa...
详细信息
ISBN:
(纸本)9783031856488;9783031856495
Today, computer technologies are becoming more accessible to everyone. Even at a young age, people are confronted with information technologies (IT) in their daily lives. Therefore, computerscience is becoming increasingly important, and its study is becoming more and more necessary. At Tallinn University of Technology (TalTech), the Study Centre for IT Foundations focuses on teaching IT fundamentals to first-year non-IT students from Estonia and abroad. Current computerscience teaching standards focus on developing the fundamental computational thinking and knowledge necessary for success in the digital age. At the same time, there are several private initiatives, such as IT bootcamps, online courses, hackathons, and programming competitions, as well as various technical communities where people can expand their IT skills. However, such standards are not adapted in all countries and are often adapted to the level of IT knowledge and needs of the country. In addition, private initiatives often focus only on the practical part without providing the details of the academic foundation. In TalTech students join the IT Foundations course from all over the world that complicates the usage of some specific teaching standard in computerscience education. In this paper, authors provide flexible student-oriented approach based on the analysis of first-year non-IT students entry knowledge level calculated with preliminary quizzes for constant improvement of the TalTech teaching standard in computerscience field. This approach enables agile changes in course while following the latest needs and standards in the IT industry.
Integration of introductory programming into higher education programs beyond computerscience has lead to an increase in the failure and drop out rates of programming courses. In this context, programming instructors...
详细信息
暂无评论