When tweeting on a topic, Twitter users often post messages that convey the same or similar meaning. We describe TweetingJay, a system for detecting paraphrases and semantic similarity of tweets, with which we partici...
详细信息
A new method for automatically identifying rare features in fingerprints based on a combination of level 1 features and minutia-based triangular descriptors is described. A feature is considered rare if it is statisti...
详细信息
A new method for automatically identifying rare features in fingerprints based on a combination of level 1 features and minutia-based triangular descriptors is described. A feature is considered rare if it is statistically uncommon; for example, such a rare feature should be unique among N>1000 randomly sampled prints. A fingerprint feature that is rare has higher discriminatory power when it is identified in a print (latent or otherwise), and multiple rare features in a single print can increase discriminatory power dramatically. In the case of latent matching, such information can be significant for reaching a decision. The new approach was tested experimentally using the NIST SD-27 database and an FBI database of 11,036 unique fingerprints. The results indicated that every randomly selected fingerprint from the composite database has a small set of highly distinctive statistically rare features, some of with occurrence of 1 in 1000 fingerprints.
We introduce new methods for the automatic vulnerability analysis of power grids under false data injection attacks against nonlinear (AC) state estimation. We encode the analysis problems as logical decision problems...
详细信息
ISBN:
(纸本)9781479978878
We introduce new methods for the automatic vulnerability analysis of power grids under false data injection attacks against nonlinear (AC) state estimation. We encode the analysis problems as logical decision problems that can be solved automatically by SMT solvers. To do so, we propose an analysis technique named "symbolic propagation," which is inspired by symbolic execution methods for finding bugs and exploits in software programs. We show that the proposed methods can successfully analyze vulnerability of AC state estimation in realistic power grid models. Our approach is generalizable towards many other applications such as power flow analysis and state estimation.
To maximize the overall performance yield, variation-aware analysis is becoming a key step in Multiprocessor System-on-Chip (MP-SoC) Task Allocation and Scheduling (TAS). Although various approaches have been investig...
详细信息
ISBN:
(纸本)9783981537048
To maximize the overall performance yield, variation-aware analysis is becoming a key step in Multiprocessor System-on-Chip (MP-SoC) Task Allocation and Scheduling (TAS). Although various approaches have been investigated to improve performance yields, most of them cannot perform quantitative comparison among existing TAS heuristics, which is important for MPSoC designers to make decisions. Based on the statistical model checker UPPAAL-SMC, we propose a framework that can automatically evaluate the performance yield of TAS strategies under time and power constraints with variations. Experimental results show that our approach can not only filter inferior strategies efficiently, but also support the automated tuning of architecture and constraint parameters to achieve the required performance yield.
暂无评论