software-defined systems revolutionized the management of hardware devices but introduced quality assurance challenges that remain to be tackled. For example, software defined networks (SDNs) became a key technology f...
详细信息
software-defined systems revolutionized the management of hardware devices but introduced quality assurance challenges that remain to be tackled. For example, software defined networks (SDNs) became a key technology for the prompt reconfigurations of network services in many sectors including telecommunications, data centers, financial services, cloud providers, and manufacturing industry. Unfortunately, reconfigurations may lead to mistakes that compromise the dependability of the provided services. In this article, we focus on the reconfigurations of network services in the satellite communication sector, and target security requirements, which are often hard to verify;for example, although connectivity may function properly, confidentiality may be broken by packets forwarded to a wrong destination. We propose an approach for FIeld-based Security Testing of SDN Configurations Updates (FISTS). First, it probes the network before and after configuration updates. Then, using the collected data, it relies on unsupervised machine learning algorithms to prioritize the inspection of suspicious node responses, after identifying the network nodes that likely match across the two configurations. Our empirical evaluation has been conducted with network data from simulated and real SDN configuration updates for our industry partner, a world-leading satellite operator. Our results show that, when combined with K-Nearest Neighbor, FISTS leads to best results (up to 0.95 precision and 1.00 recall). Further, we demonstrated its scalability.
More program functions are no longer written in code but learned from a huge number of data samples using a machine learning (ML) algorithm. We present an overview of current techniques to manage complex software and ...
详细信息
More program functions are no longer written in code but learned from a huge number of data samples using a machine learning (ML) algorithm. We present an overview of current techniques to manage complex software and discuss how this applies to ML models.
The integration of solar Photovoltaic (PV) systems with Electric Vehicle (EV) technology is emerging as a sustainable and promising method to cope with increasing energy demands, mitigate environmental impact, and red...
详细信息
The integration of solar Photovoltaic (PV) systems with Electric Vehicle (EV) technology is emerging as a sustainable and promising method to cope with increasing energy demands, mitigate environmental impact, and reduce carbon emissions within residential and transportation sectors. This study focuses on the residential application of a grid-connected "PV+EV" system in Sydney, Australia, underscoring the benefits of using bi-directional vehicle batteries in conjunction with rooftop PV systems. In addition to heuristic price signal dispatch algorithms in the System Advisor Model (SAM) software tool, which rely on manual dispatch and peak shaving analyses, a novel Q-Learning-Based-Model (QLBM) algorithm within the domain of machine learning methodology is employed to enhance the understanding of system dynamics. This novel approach is designed to predict optimal energy efficiency by prioritizing the most cost-effective energy source, thereby alleviating grid stress, minimizing energy costs. The results are then compared to other techniques employed in this paper, affirming the superiority of the proposed algorithm.
We consider a decentralized formulation of the active hypothesis testing (AHT) problem, where multiple agents gather noisy observations from the environment with the purpose of identifying the correct hypothesis. At e...
详细信息
We consider a decentralized formulation of the active hypothesis testing (AHT) problem, where multiple agents gather noisy observations from the environment with the purpose of identifying the correct hypothesis. At each time step, agents have the option to select a sampling action. These different actions result in observations drawn from various distributions, each associated with a specific hypothesis. The agents collaborate to accomplish the task, where message exchanges between agents are allowed over a rate-limited communications channel. The objective is to devise a multi-agent policy that minimizes the Bayes risk. This risk comprises both the cost of sampling and the joint terminal cost incurred by the agents upon making a hypothesis declaration. Deriving optimal structured policies for AHT problems is generally mathematically intractable, even in the context of a single agent. As a result, recent efforts have turned to deep learning methodologies to address these problems, which have exhibited significant success in single-agent learning scenarios. In this paper, we tackle the multi-agent AHT formulation by introducing a novel algorithm rooted in the framework of deep multi-agent reinforcement learning. This algorithm, named Multi-Agent Reinforcement Learning for AHT (MARLA), operates at each time step by having each agent map its state to an action (sampling rule or stopping rule) using a trained deep neural network with the goal of minimizing the Bayes risk. We present a comprehensive set of experimental results that effectively showcase the agents' ability to learn collaborative strategies and enhance performance using MARLA. Furthermore, we demonstrate the superiority of MARLA over single-agent learning approaches. Finally, we provide an open-source implementation of the MARLA framework, for the benefit of researchers and developers in related domains.
The letter presents a novel solution to determine exposure and threshold values for cameras in motion capture systems without excessive interaction with the user. The solution is based on the divide and conquer method...
详细信息
The letter presents a novel solution to determine exposure and threshold values for cameras in motion capture systems without excessive interaction with the user. The solution is based on the divide and conquer method, which ensures a fast and efficient search of the values. As the results have shown, users without specialist knowledge can significantly improve the tracking capabilities of the motion capture system, especially for smaller passive markers. The tests have proved that for spherical markers with a diameter of 7.9 mm, the full time tracking capabilities can be ensured based on the settings determined with the proposed method, what is difficult to achieve with the default settings. Moreover, the cameras utilisation can be increased, which should have a positive effect on the overall tracking quality. This makes it possible to use smaller and lighter-weight markers, which is desirable for small flying units with payload capacity of a few grams only. The primary tests were performed in the laboratory equipped with 12 OptiTrack Prime(x) 13W cameras. The dedicated programming interfaces (Motive API and Camera SDK) were used. The validation tests included a DJI Tello EDU unit with four markers attached. In addition to analysis and considerations, the document includes pseudocodes that clearly explain the idea behind the algorithms and allow for an easy implementation of the solution.
Owing to the pervasiveness of software in our modern lives, software systems have evolved to be highly configurable. Combinatorial testing has emerged as a dominant paradigm for testing highly configurable systems. Of...
详细信息
Owing to the pervasiveness of software in our modern lives, software systems have evolved to be highly configurable. Combinatorial testing has emerged as a dominant paradigm for testing highly configurable systems. Often constraints are employed to define the environments where a given system is expected to work. Therefore, there has been a sustained interest in designing constraint-based test suite generation techniques. A significant goal of test suite generation techniques is to achieve t-wise coverage for higher values of t. Therefore, designing scalable techniques that can estimate t-wise coverage for a given set of tests and/or the estimation of maximum achievable t-wise coverage under a given set of constraints is of crucial importance. The existing estimation techniques face significant scalability hurdles. We designed scalable algorithms with mathematical guarantees to estimate (i) t-wise coverage for a given set of tests, and (ii) maximum t-wise coverage for a given set of constraints. In particular, ApproxCov takes in a test set U and returns an estimate of the t-wise coverage of U that is guaranteed to be within (1 +/- epsilon)-factor of the ground truth with probability at least 1-delta for a given tolerance parameter epsilon and a confidence parameter delta. A scalable framework ApproxMaxCov for a given formula F outputs an approximation which is guaranteed to be within (1 +/- epsilon) factor of the maximum achievable t-wise coverage under F , with probability >= 1 - delta for a given tolerance parameter epsilon and a confidence parameter delta. Our comprehensive evaluation demonstrates that ApproxCov and ApproxMaxCov can handle benchmarks that are beyond the reach of current state-of-the-art approaches. In this paper we present proofs of correctness of t.
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today's communic...
详细信息
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today's communication. Symmetric cryptography, such as AES, will withstand quantum attacks as long as the key sizes are doubled compared to today's key lengths. Asymmetric cryptographic procedures, e.g. RSA, however are broken. It is therefore necessary to change the way we assure our privacy by adopting and moving towards post-quantum cryptography (PQC) principles. In this work, we benchmark three PQC algorithms, Falcon, Dilithium, and Kyber. Moreover, we present an implementation of a PQC stack consisting of the algorithms Dilithium/Kyber and Falcon/Kyber which use hardware accelerators for some key functions and evaluate their performance and resource utilization. Regarding a classic server-client model, the computational load of the Dilithium/Kyber stack is distributed more equally among server and client. The stack Falcon/Kyber biases the computational challenges towards the server, hence relieving the client of performing costly operations. We found that Dilithium's advantage over Falcon is that Dilithium's execution is faster while the workload to be performed is distributed equally among client and server, whereas Falcon's advantage over Dilithium lies within the small signature sizes and the unequally distributed computational tasks. In a client server model with a performance limited client (i.e. Internet-of-Things - IoT - environments) Falcon could proof useful for it constrains the computational hard tasks to the server and leaves a minimal workload to the client. Furthermore, Falcon requires smaller bandwidth, making it a strong candidate for deep-edge or IoT applications.
Delta Debugging is a technique to simplify and isolate failure-inducing changes. Its most popular application is on program inputs, where it reduces a failure-inducing input to a minimal input that still triggers the ...
详细信息
Delta Debugging is a technique to simplify and isolate failure-inducing changes. Its most popular application is on program inputs, where it reduces a failure-inducing input to a minimal input that still triggers the failure. This paper provides a retrospective on Delta Debugging, discussing its origins, applications, and impact. We also discuss the limitations of Delta Debugging and suggest directions for future research.
In the early 2000s, software development was shifting from offline to online, and from command line to IDE. We discuss our 2004 paper examining the impact of this shift on developers' program comprehension behavio...
详细信息
In the early 2000s, software development was shifting from offline to online, and from command line to IDE. We discuss our 2004 paper examining the impact of this shift on developers' program comprehension behaviors, our motivation for the work, and it's impact on the last twenty years of empirical studies and developer tool innovations. We end with a discussion of the possible unintended impacts LLMs have on program comprehension in the coming decades.
The development of some instrumentation and measurement systems poses significant challenges due to their continuous interaction with environments that are both harsh and highly dynamic. They are often described as &q...
详细信息
The development of some instrumentation and measurement systems poses significant challenges due to their continuous interaction with environments that are both harsh and highly dynamic. They are often described as "Untestable" because their testing is sometimes expensive, time-consuming, and infeasible. One example is oil-spill measurement systems that aim to measure the thickness of oil floating on the water surface in open water environments. In contrast to analog sensors relying on calibration functions, such integrated measurement systems use algorithms with multiple inputs to produce their measurement. Intending to facilitate the development of such systems, we shed light on virtual testing methods designed for testing Cyber-physical Systems (CPSs). CPSs are smart and autonomous systems composed of collaborating computational elements (software) that control physical entities (hardware). Effective validation and verification techniques are required to confirm their correctness. These methods were applied to test continuous controllers in the automotive domain. In this article, we review some of these testing methods and provide a framework for applying them to measurement systems that are difficult to test in real life. We provide a case study based on an oil spill measurement system that relies on multiple sensors to estimate the oil thickness in open water environments. Applying this approach creates a reduced set of test cases to be applied in real field testing, reducing its cost and time.
暂无评论