The principle of information hiding has been very influential in software engineering since its inception in 1972. This principle prescribes that software modules hide implementation details from other modules in orde...
详细信息
The principle of information hiding has been very influential in software engineering since its inception in 1972. This principle prescribes that software modules hide implementation details from other modules in order to reduce their dependencies. This separation also decreases the dependency among software developers implementing these modules, thus simplifying the required coordination. A common instantiation of this principle widely used in the industry is in the form of application programming interfaces (APIs). While previous studies report on the general use and benefits of APIs, they have glossed over the detailed ways in which APIs facilitate the coordination of work. In order to unveil these mechanisms, we performed a qualitative study on how practitioners use APIs in their daily work. Using ethnographic data from two different software development teams, we identified three roles played by APIs in the coordination of software development projects. These roles are described using three metaphors: APIs as contracts, APIs as boundaries, and APIs as communication mechanisms. As contracts, APIs allow software developers to work in parallel and independently. As a communication mechanism, APIs facilitate communication among software developers by giving them something specific to talk about. At the same time, APIs establish the boundaries between developers, and, accordingly, what should be talked about. This paper also reports on problems the studied teams face when using APIs to coordinate their work. Based on these results, we draw theoretical implications for collaborative software engineering.
As the number of Android malware has been increased rapidly over the years, various malware detection methods have been proposed so far. Existing methods can be classified into two categories: static analysis-based me...
详细信息
As the number of Android malware has been increased rapidly over the years, various malware detection methods have been proposed so far. Existing methods can be classified into two categories: static analysis-based methods and dynamic analysis-based methods. Both approaches have some limitations: static analysis-based methods are relatively easy to be avoided through transformation techniques such as junk instruction insertions, code reordering, and so on. However, dynamic analysis-based methods also have some limitations that analysis overheads are relatively high and kernel modification might be required to extract dynamic features. In this paper, we propose a dynamic analysis framework for Android malware detection that overcomes the aforementioned shortcomings. The framework uses a suffix tree that contains API (applicationprogramming Interface) subtraces and their probabilistic confidence values that are generated using HMMs (Hidden Markov Model) to reduce the malware detection overhead, and we designed the framework with the client-server architecture since the suffix tree is infeasible to be deployed in mobile devices. In addition, an application rewriting technique is used to trace API invocations without any modifications in the Android kernel. In our experiments, we measured the detection accuracy and the computational overheads to evaluate its effectiveness and efficiency of the proposed framework.
PeCMan, the Personal Content Manager, is a content access gateway, aggregator, indexing, and sharing tool for all of a user's personally relevant content on the Internet, e.g., all the content a user has created, ...
详细信息
PeCMan, the Personal Content Manager, is a content access gateway, aggregator, indexing, and sharing tool for all of a user's personally relevant content on the Internet, e.g., all the content a user has created, content that was explicitly shared by others, or publicly available Internet content of specific interest. PeCMan aggregates access to multiple network-based storage systems, services, or other "objects" by their reference. Examples of such objects are photographs, music, e-mail, text documents, or any addressable object on the Internet. The aggregated storage acts as a virtual read-write drive in which PeCMan addresses individual objects by reference, typically encoded in uniform resource locators (URLs). To address content in Web applications such as Google Docs, Flickr, and You Tube, the URL is based on the corresponding applicationprogramming interface (API), while content on a user's home machine's disk is addressed via a locally installed software driver supporting Web-based distributed authoring and versioning (WebDAV). This paper describes the motivation, design, and implementation prototype of PeCMan. (C) 2010 Alcatel-Lucent.
Transport services (TAPS) is a working group of the the Internet Engineering Task Force (IETF). TAPS defines a new recommended API for the Internet's transport layer. This API gives access to a wide variety of ser...
详细信息
Transport services (TAPS) is a working group of the the Internet Engineering Task Force (IETF). TAPS defines a new recommended API for the Internet's transport layer. This API gives access to a wide variety of services from various protocols, and it is protocol-independent: the transport layer becomes adaptive, and applications are no longer statically bound to a particular protocol and/or network interface. We give an overview of the TAPS API, and we demonstrate its flexibility and ease of use with an example using a Python-based open source implementation.
We consider an inventory system in which both the arrival of items and the demand for those items are Poisson processes. The stored items have two phases of shelf-Life. If the item has nor been taken by a demand durin...
详细信息
We consider an inventory system in which both the arrival of items and the demand for those items are Poisson processes. The stored items have two phases of shelf-Life. If the item has nor been taken by a demand during the first phase it is inspected. With probability q it is removed and with probability p=1 -q it is transferred to the second phase. The blood bank model inspired this study. We compute ergodic limits for the number of items in the system, the lost demands. and the two types of outdating.
An existing computational fluid dynamics (CFD) computer code was converted from a single process execution mode to one employing both massively parallel processing (MPP) on an nCUBE MPP computer using the native nCUBE...
详细信息
An existing computational fluid dynamics (CFD) computer code was converted from a single process execution mode to one employing both massively parallel processing (MPP) on an nCUBE MPP computer using the native nCUBE message passing application programmers interface (API) and distributed processing (DP) on a cluster of workstations using the Parallel Virtual Machine (PVM) API for message passing. Specifications for the conversion included the ability to easily incorporate new message passing API's, automatic decomposition and distribution of a problem to the different processors, direct node to node communication, and the same user interface as in the single process mode. There was also a strong desire to have a single code which could be compiled to run in any programmed message passing API, in the multitasking parallel processing mode already in the code, and in single process mode. These criteria produced a single code which eliminates the concern associated with maintaining multiple versions of a code, provides efficient communication, and minimizes the learning curve for users not conversant with the mechanics of distributed processing. (C) 1998 Published by Elsevier Science Limited. All rights reserved.
Deals with the design and architecture of distribute and Internet-based computer music applications. Hypertext Markup Language; Graphical user interface; Client or server technology and distributed computing in comput...
详细信息
Deals with the design and architecture of distribute and Internet-based computer music applications. Hypertext Markup Language; Graphical user interface; Client or server technology and distributed computing in computer music.
Recently, advancements in Cyber-Physical Production Systems (CPPS) have facilitated the amalgamation of physical production processes with digital systems, culminating in an interconnected and efficient manufacturing ...
详细信息
Recently, advancements in Cyber-Physical Production Systems (CPPS) have facilitated the amalgamation of physical production processes with digital systems, culminating in an interconnected and efficient manufacturing environment. Measurement and sensing systems represent crucial components of CPPS, as they provide real-time data from physical systems and the surrounding environment to optimize production processes. Nevertheless, these systems' security is paramount, given that malware attacks can significantly undermine the accuracy and reliability of data acquired by CPPS. This paper proposes a comprehensive methodology for securing Industry 4.0 systems against cyber-attacks, involving three main sections: applicationprogramming Interface (API) deployment, cloud filtering, and intelligence and data processing. Deploying APIs in the sensor network facilitates data utilization and promotes data integrity and confidentiality. Cloud services filter data and create a new dataset for analysis and decision-making, while intelligence and data processing techniques are employed for malware detection and analysis. The methodology also uses a secure research laboratory for detailed malware analysis and encrypted multimedia channels for communication between security experts and researchers. The findings suggest that the reinforcement learning-based approach proposed in this study effectively identifies cyber-attacks in Industry 4.0 systems, and the diagram provides insights into the correlations between different performance metrics and how they relate to the agent's performance. The methodology offers robust protection against cyber-attacks and ensures the confidentiality and integrity of sensitive data.
Compressed prompts aid instruction-tuned language models (LMs) in overcoming context window limitations and reducing computational costs. Existing methods, which are primarily based on training embeddings, face variou...
详细信息
Compressed prompts aid instruction-tuned language models (LMs) in overcoming context window limitations and reducing computational costs. Existing methods, which are primarily based on training embeddings, face various challenges associated with interpretability, the fixed number of embedding tokens, reusability across different LMs, and inapplicability when interacting with black-box APIs. This study proposes prompt compression with reinforcement learning (PCRL), which is a discrete prompt compression method that addresses these issues. The proposed PCRL method utilizes a computationally efficient policy network that edits prompts directly. The training approach employed in the proposed PCRLs can be applied flexibly to various types of LMs, including both decoder-only and encoder-decoder architecture and it can be trained without gradient access to the LMs or labeled data. The proposed PCRL achieves an average reduction of 24.6% in terms of the token count across various instruction prompts while maintaining sufficient performance. In addition, we demonstrate that the learned policy can be transferred to larger LMs, and through a comprehensive analysis, we explore the token importance within the prompts. The source code is available at https://***/nenomigami/PromptCompressor.
When the authors asked users to test an API early in the development life cycle, the users' questions about how the API works and in what contexts turned out to be extremely helpful. Iterative API design and testi...
详细信息
When the authors asked users to test an API early in the development life cycle, the users' questions about how the API works and in what contexts turned out to be extremely helpful. Iterative API design and testing, along with feedback from real users, contribute to cleaner design and a more helpful reference manual.
暂无评论