The paper is devoted to the problem of deriving synchronizing and homing experiments for nondeterministic Input/Output automata;corresponding input sequences are widely used in testing (non-initialized) discrete event...
详细信息
The paper is devoted to the problem of deriving synchronizing and homing experiments for nondeterministic Input/Output automata;corresponding input sequences are widely used in testing (non-initialized) discrete event systems. In active testing, there is an opportunity to set a system under test into a known initial state;in passive testing, a known current state allows to reduce the number of properties to be checked. In the paper, we note that such experiments for Input/Output automata are different from so-called "gedanken" experiments with classical Finite State Machines;the existence check conditions of such experiments are established for a predefined discipline of applying inputs and a method for its derivation is proposed when such an experiment exists. The obtained results allow to reduce the problem of deriving synchronizing and homing experiments for Input/Output automata to the well developed problem of deriving such experiments for appropriate classes of Finite State Machines.
A wave attractor is a peculiar hydrodynamic structure that forms under certain conditions, including vertical stratification of water. Previous studies have mainly focused on wave attractors in fluids with a linear sa...
详细信息
A wave attractor is a peculiar hydrodynamic structure that forms under certain conditions, including vertical stratification of water. Previous studies have mainly focused on wave attractors in fluids with a linear salinity profile. However, more complex non-linear salinity profiles are typical of real water reservoirs. To gain a better understanding of natural wave attractors, it is necessary to study their formation in basins with stratification similar to that found in real oceans. This study aims to compare the properties of wave attractors formed under non-uniform stratification with those formed under linear stratification. Energy accumulation and instability development are studied to clarify the influence of the salinity profile shape on the formation of wave attractors and their properties.
The article describes a test system designed for verification of the real-time operating system (RTOS) for embedded systems, which was developed and used at the Scientific Research institute for system Analysis of the...
详细信息
The article describes a test system designed for verification of the real-time operating system (RTOS) for embedded systems, which was developed and used at the Scientific Research institute for system Analysis of the Russian Academy of Sciences (SRISA RAS). This Unix-like operating system is based on the POSIX and ARINC-653 programming standards. Of course, there exists specialized software for automation of testing of Unix-like systems: Avocado, LAVA, Linux Test Project, Linux Distribution Checker, Open POSIX Test Suite, UnixBench, etc. But the use of such ready-made software systems is not always convenient, because they either contain only highly specialized test suites, or support only certain hardware, or do not contain a flexible configuration system. Therefore, the researchers at the SRISA RAS developed their own original test system. The task was to create a convenient testing tool for both software testers and programmers. Many years of experience in using the test system has shown the effectiveness of its use to improve the quality of software products, reduction of time spent on testing and analysis of results, maximally automate software testing process, speed up the process of developing new software versions, and simplify the process of debugging, finding and fixing errors by software developers.
The authors consider the private information retrieval (PIR) problem, in particular, the problem of ensuring secure queries to a database. Previously, the authors considered this problem for a cloud database in the pr...
详细信息
The authors consider the private information retrieval (PIR) problem, in particular, the problem of ensuring secure queries to a database. Previously, the authors considered this problem for a cloud database in the presence of an active adversary who does not interfere with the execution of the PIR protocol but can carry out an attack with known open queries. In the proposed algorithms, bit number i is represented as an l-ary number with d digits. An algorithm for database placement on the cloud and an algorithm for bit querying with the use of permutations in the digits of a bit number, where bit number i is defined in a base-l number system, are proposed. The permutations are regarded as secret encryption keys. The communication complexity and the probability of guessing the bit number in a single attack with a known open query for bit number i, as well as in an attack with an unlimited number of known open queries, are estimated.
This article introduces a novel method for the precise and scalable detection of memory leaks comprising two primary stages. Initially, context-, flow-, and field-sensitive static analysis is used to identify potentia...
详细信息
This article introduces a novel method for the precise and scalable detection of memory leaks comprising two primary stages. Initially, context-, flow-, and field-sensitive static analysis is used to identify potential memory leaks. This includes an annotation system that allows specifying key properties of functions. Therefore, they do not need to be reanalyzed every time they are called. It also allows manual annotation of important library or system functions, thus enhancing analysis quality. The static analysis is conducted in reverse topological order on the call graph, enabling the parallel processing of functions within the same level of hierarchy. Subsequently, directed symbolic execution provides path-sensitivity and effectively filters out false positives. This process is performed concurrently for each bug detected by static analysis. This two-stage approach aims to enhance the efficiency and precision of memory leak detection in industrial software. The proposed method was implemented in the MLH (Memory Leak Hunter) tool, which identified numerous bugs in the open-source software, including OpenSSL, FFmpeg, and Radare2. These bugs were reported and confirmed by the community, thereby proving the effectiveness of the developed method.
In their previous work [1], the authors presented a method of identifying the characteristics of a gaseous medium from measurements of the heat flux absorbed by the surface of a blunt body in a gas flow. The identific...
详细信息
In their previous work [1], the authors presented a method of identifying the characteristics of a gaseous medium from measurements of the heat flux absorbed by the surface of a blunt body in a gas flow. The identification problem was stated in an extreme formulation: the sought-for transport properties of a gaseous medium were determined via minimization of the objective function of the estimated and measured heat fluxes absorbed by the surface of a solid body. For minimization of the objective function, the Nelder-Mead method was used in combination with random restarts;the results of testing the algorithm in a model experiment are given. This paper presents the technique of conduction of experiment to verify the method for identification of the gas flow parameters. Experimental results are given for two different gas flow sources.
This paper addresses the problem of named entities recognition from source code reviews. The paper provides a comparative analysis of existing approaches and proposes its own methods to improve the quality of problem ...
详细信息
This paper addresses the problem of named entities recognition from source code reviews. The paper provides a comparative analysis of existing approaches and proposes its own methods to improve the quality of problem solving. Proposed and implemented improvements include: methods to deal with data imbalances, improved tokenization of input data, the use of large arrays of unlabeled data, and the use of additional binary classifiers. To assess quality, a new set of 3000 user code reviews was collected and manually labeled. It is shown that the proposed improvements can significantly increase the performance measured by quality metrics, calculated both at the token level (+22%) and at the entire entity level (+13%).
The optimal tool routing for cutting machines, also known as cutting path optimisation is an important problem in production research. This problem is relevant in various manufacturing environments such as aeronautic,...
详细信息
The optimal tool routing for cutting machines, also known as cutting path optimisation is an important problem in production research. This problem is relevant in various manufacturing environments such as aeronautic, automotive, garment and semiconductor industries. In this paper, we introduce a general solution framework for the discrete Cutting Path Problem which includes: (i) the universal approach to reduce numerous settings of this problem to the appropriate auxiliary instances of the well-known Precedence Constrained Generalized Traveling Salesman Problem;(ii) the proposition of efficient solution methods for finding (sub-) optimal solutions. We carry out extensive computational experiments in order to evaluate performance of the proposed framework and the obtained results demonstrate its efficiency for real-life industrial instances.
A review of software dynamic analysis methods is presented, mainly focusing on the methods supported by tools targeted on software security verification and applicable to system software. Fuzzing, runtime verification...
详细信息
A review of software dynamic analysis methods is presented, mainly focusing on the methods supported by tools targeted on software security verification and applicable to system software. Fuzzing, runtime verification and dynamic symbolic execution techniques are considered in detail. Dynamic taint data analysis methods and tools are excluded since gathering technical details on them is complicated. The review of fuzzing and dynamic symbolic execution is focused mostly on the techniques to solve various problems that arise during operation of the tools rather than the particular tools that amount to a number greater than 100. In addition, the fuzzing counteraction techniques are considered.
The paper presents an algorithm based on the quasi-gasdynamic approach for the solution of unsteady compressible flows over a wide range of Mach numbers. It is implemented on the AMReX open platform, which uses adapti...
详细信息
ISBN:
(纸本)9783031637858;9783031637834
The paper presents an algorithm based on the quasi-gasdynamic approach for the solution of unsteady compressible flows over a wide range of Mach numbers. It is implemented on the AMReX open platform, which uses adaptive mesh refinement technology to facilitate parallelization of computations on GPU architectures. To validate its effectiveness, the developed solver is applied to the numerical simulation of the shock-vortex interaction problem with flow parameter values of M-v = 0.9 and M-s = 1.5. Cross-validation to assess its performance is conducted with OpenFOAM-based solvers, specifically rhoCentralFoam and QGDFoam. Schlieren fields are used to evaluate oscillations of the numerical schemes and algorithms, while resolution capabilities of the algorithm are assessed by comparing density fields in five cross-sections with the reference values.
暂无评论