We present LANG-N-SEND, a π-calculus that is equipped with language definitions. Processes can define languages in operational semantics, and use them to execute programs. Furthermore, processes can send and receive ...
详细信息
Representation learning of source code is essential for applying machine learning to software engineering tasks. Learning code representation from a multilingual source code dataset has been shown to be more effective...
详细信息
We present a robotic development framework called ROSPPL, which can accomplish many of the essential probabilistic tasks that comprise modern autonomous systems and is based on a general purpose probabilistic programm...
详细信息
ISBN:
(数字)9781728164229
ISBN:
(纸本)9781728164236
We present a robotic development framework called ROSPPL, which can accomplish many of the essential probabilistic tasks that comprise modern autonomous systems and is based on a general purpose probabilistic programming language (PPL). Benefiting from ROS integration, a short PPL program in our framework is capable of controlling a robotic system, estimating its current state online, as well as automatically calibrating parameters and detecting errors, simply through probabilistic model and policy specification. The advantage of our approach lies in its generality which makes it useful for quickly designing and prototyping of new robots. By directly modeling the interconnection of random variables, decoupled from the inference engine, our design benefits from robustness, re-usability, upgradability, and ease of specification. In this paper, we use a SDV as an example of a complex autonomous system, to show how different sub-components of such system could be implemented using a probabilistic programming language, in a way that the system is capable of reasoning about itself. Our set of use-cases include localization, mapping, fault detection, calibration, and planning.
In this paper we propose a calculus for expressing algorithms for programminglanguages transformations. We present the type system and operational semantics of the calculus, and we prove that it is type sound. We hav...
详细信息
ISBN:
(纸本)9783030389192;9783030389185
In this paper we propose a calculus for expressing algorithms for programminglanguages transformations. We present the type system and operational semantics of the calculus, and we prove that it is type sound. We have implemented our calculus, and we demonstrate its applicability with common examples in programminglanguages. As our calculus manipulates inference systems, our work can, in principle, be applied to logical systems.
We present the Splash programming framework to support the effective implementation of multisensor data fusion. Multisensor data fusion has been widely exploited in autonomous machines since it outperforms algorithms ...
详细信息
ISBN:
(纸本)9781728157153
We present the Splash programming framework to support the effective implementation of multisensor data fusion. Multisensor data fusion has been widely exploited in autonomous machines since it outperforms algorithms using only a single sensor, in terms of accuracy, reliability and robustness. Knowing that developers have long been lacking programming language support for multisensor data fusion, we offer a dedicated Splash language construct along with formal semantics for multisensor data fusion. Specifically, we analyze the structural characteristics of multisensor data fusion algorithms and derive technical issues that the language construct must tackle. We then give a detailed account of the language construct along with its formal semantics. Finally, we validate its utility and effectiveness via its application to a lane keeping assist system.
Automated processing. analysis, and generation of source code are among the key activities in software and system life-cycle. To this end, while deep learning (DL) exhibits a certain level of capability in handling th...
详细信息
ISBN:
(纸本)9781577358350
Automated processing. analysis, and generation of source code are among the key activities in software and system life-cycle. To this end, while deep learning (DL) exhibits a certain level of capability in handling these tasks, the current state-of-the-art DL models still suffer from non-robust issues and can be easily fooled by adversarial attacks. Different from adversarial attacks for image, audio, and natural languages, the structured nature of programminglanguages brings new challenges. In this paper, we propose a Metropolis-Hastings sampling-based identifier renaming technique, named Metropolis-Hastings Modifier (MHM), which generates adversarial examples for DL models specialized for source code processing. Our in-depth evaluation on a functionality classification benchmark demonstrates the effectiveness of MHM in generating adversarial examples of source code. The higher robustness and performance enhanced through our adversarial training with MHM further confirms the usefulness of DL models-based method for future fully automated source code processing.
In order to realize the requirements of the down-line test of the articulated disk spectrum produced by an enterprise, this paper designs a set of automatic test system for the articulated disk. The working principle ...
详细信息
In order to realize the requirements of the down-line test of the articulated disk spectrum produced by an enterprise, this paper designs a set of automatic test system for the articulated disk. The working principle of the system is elaborated. The fuzzy PID algorithm is used to realize the precise control of the angle through the LabVIEW software platform. The CAN bus is used to realize the communication between the test bench and the articulated disk under test. Finally, the reliability of the test system is verified by the actual test, and the final test bench meets the requirements of the company and is accepted successfully.
This paper presents a static vulnerability detection and patching framework at both source code and binary level. It automatically identifies and collects known vulnerability information to build the signature. It mat...
详细信息
ISBN:
(纸本)9781450367684
This paper presents a static vulnerability detection and patching framework at both source code and binary level. It automatically identifies and collects known vulnerability information to build the signature. It matches vulnerable functions with similar signatures and filters out the ones that have been patched in the target program. For the vulnerable functions, the framework tries to generate hot patches by learning from the source code.
Path dependent types have long served as an expressive component of the Scala programming language. They allow for the modelling of both bounded polymorphism and a degree of nominal subtyping. Nominality in turn provi...
详细信息
This article is devoted to the construction of a hardware-software solution for testing relay protection devices in a closed Dommel loop [1]. A flexible solution is proposed for the use of hardware OMICRON CMC-356 [2]...
详细信息
暂无评论