The problem of technical debt arises when part of software source code is upgrading not directly, but is fixed in the second place as outdated. Three corresponding models are presented. Machine learning is used to fin...
详细信息
The problem of technical debt arises when part of software source code is upgrading not directly, but is fixed in the second place as outdated. Three corresponding models are presented. Machine learning is used to find code smells. The effectiveness of the approach for specific data is established and the prospect of expanding to a greater number of different cases is outlined.
In Real-Time Bidding, advertisers aim to optimally bid within a limited budget constraint. Effective bidding strategies require bid landscape forecasting to predict the probability distribution of market price for eac...
详细信息
In Real-Time Bidding, advertisers aim to optimally bid within a limited budget constraint. Effective bidding strategies require bid landscape forecasting to predict the probability distribution of market price for each advertisement auction. This distribution has a complicated form with many peaks. Moreover, all probabilities of bids depend on each other. Most existing solutions mainly focus on learning a parameterized model based on some heuristic assumptions of distribution forms. In this paper, we propose a Transformer model that takes into account dependencies between bids improving the bid landscape forecasting. We also increase the quality of model prediction on the advertisement cold start for the cases of insufficient data. Our experiments on two real-world industrial datasets prove that the proposed model statistically significantly outperforms the state-of-the-art solutions both in terms of ANLP metrics by 8.75% and ROC-AUC by 1.1%. In addition, we show the industrial applicability of our approach.
The vehicle-to-grid feature of today's electric vehicles suggests using them as batteries for stabilizing the power grid besides using them to fulfill mobility needs. In the context of car-sharing, the car-sharing...
详细信息
ISBN:
(纸本)9783031610332;9783031610349
The vehicle-to-grid feature of today's electric vehicles suggests using them as batteries for stabilizing the power grid besides using them to fulfill mobility needs. In the context of car-sharing, the car-sharing provider may thus try to foster two goals: they may be interested in stabilizing the grid and ensuring the usage of as much green energy as possible. At the same time, they try to maximize satisfaction of the customer's requests. As such, each car-sharing provider has to implement a policy on how to react to booking requests. On the other hand, customers may react to how mobility needs are fulfilled and adapt their booking strategy. In this paper, we study the problem of how to model elements of car-sharing providers as well as those of customers in a multi-agent simulation. We identify the principal elements and targets while leaving concrete simulations as future work.
We present novel empirical assessments of prominent finite state machine (FSM) conformance test derivation methods against their coverage of code faults. We consider a number of realistic extended FSM examples with th...
详细信息
We present novel empirical assessments of prominent finite state machine (FSM) conformance test derivation methods against their coverage of code faults. We consider a number of realistic extended FSM examples with their related Java implementations and derive for these examples complete test suites using the W method and its HSI and H derivatives considering the case when the implementation under test (IUT) has the same number of states as the specification FSM. We also consider W ++ , HSI ++ , and H ++ test suites derived considering the case when the IUT can have one more extra state. For each pair of considered test suites, we determine if there is a difference between the pair in covering the implementations faults. If the difference is significant, we determine which test suite outperforms the other. We run two other assessments which show that the obtained results are not due to the size or length of the test suites. In addition, we conduct assessments to determine whether each of the methods has better coverage of certain classes of faults than others and whether the W outperforms the HSI and H methods over only certain classes of faults. The results and outcomes of conducted experiments are summarized. Major artifacts used in the assessments are provided as benchmarks for further studies.
Correlations for calculation of heat loads during a return of spacecraft at the second cosmic velocity are given. Analysis of the heat transfer for a model descent trajectory has been carried out. The convective and r...
详细信息
Correlations for calculation of heat loads during a return of spacecraft at the second cosmic velocity are given. Analysis of the heat transfer for a model descent trajectory has been carried out. The convective and radiative heat fluxes, the relative heat transfer coefficient, and the radiative-equilibrium surface temperature have been calculated. The results obtained are a basis for design and optimization of the heat shield of spacecraft.
Currently, digital technologies for modeling buildings and infrastructure are successfully used in international and national practice for the implementation of complex construction projects and large-scale programmes...
详细信息
Currently, digital technologies for modeling buildings and infrastructure are successfully used in international and national practice for the implementation of complex construction projects and large-scale programmes. At the same time, the transition to machine-readable standards, implemented in many countries to improve the quality of design documentation and automate its verification, faces serious methodological and technical challenges. First of all, these challenges are due to the complexity of digital models, as well as the variety of requirements formulated in natural languages and imposed on these models at the state, regional, departmental, and corporate levels. Attempts to create catalogs of requirements and software tools for their management and use generally have specific purposes and do not provide necessary completeness, normalization, consistency, interconnectedness, unambiguity, traceability, and validability of requirements description. In this regard, it seems reasonable to use formal methods for specification and verification of requirements that have proven themselves in system and software engineering. This paper provides a comparative analysis of software tools for automated verification of regulatory requirements in the construction domain. There is a growing interest in tools focused on international standards, such as Industry Foundation Classes (IFC) and Information Delivery Specification (IDS), that allow one to control the completeness of the object and attribute composition of models, as well as the clarification of acceptable domains of values values. However, the IDS standard is not formalized and does not enable the specification of requirements expressed in terms of arbitrary algebraic conditions. The EXPRESS object-oriented data modeling language, in which the IFC data schema is specified, seems promising for the formal specification and verification of requirements for digital models used in the construction industry. As a substa
This paper focuses on the distributed optimization of stochastic saddle point problems. The first part of the paper is devoted to lower bounds for the centralized and decentralized distributed methods for smooth (stro...
详细信息
This paper focuses on the distributed optimization of stochastic saddle point problems. The first part of the paper is devoted to lower bounds for the centralized and decentralized distributed methods for smooth (strongly) convex-(strongly) concave saddle point problems, as well as the near-optimal algorithms by which these bounds are achieved. Next, we present a new federated algorithm for centralized distributed saddle-point problems - Extra Step Local SGD. The theoretical analysis of the new method is carried out for strongly convex-strongly concave and non-convex-non-concave problems. In the experimental part of the paper, we show the effectiveness of our method in practice. In particular, we train GANs in a distributed manner.
An overview of modern approaches to cloud confidential data processing is given. A significant part of data warehouse and data processing systems are based on cloud services. Users and organizations consider such serv...
详细信息
An overview of modern approaches to cloud confidential data processing is given. A significant part of data warehouse and data processing systems are based on cloud services. Users and organizations consider such services as a service provider. In this case, they do not need to purchase, install and maintain expensive equipment, and they can access their data and computation results from any device. Such use of cloud services carries certain risks, since one of the participants of the protocol for securing access to cloud data storage can be an adversary. This leads to the threat of confidential information leakage. The approaches considered in this paper are intended for databases in which information is stored in encrypted form, and on the other hand they make it possible to work in the familiar paradigm of SQL queries. Despite their advantages, such approaches have some limitations. It is necessary to choose an encryption method and to maintain a balance between the reliability of encryption and the set of queries required by users. In the case when users are not limited by the framework of SQL queries, another way of implementing cloud computing over confidential data using free software is proposed. It is based on lambda architecture combined with certain restrictions on allowed deductively secure database queries.
The paper presents a study of synchronization issues for one of non-classical state models, i.e., a state identification problem widely used in the area of Model based Testing (MBT) and run-time verification / monitor...
详细信息
ISBN:
(纸本)9789897586477
The paper presents a study of synchronization issues for one of non-classical state models, i.e., a state identification problem widely used in the area of Model based Testing (MBT) and run-time verification / monitoring. We consider Finite Automata (FA) augmented with the context variables and their related updates when the transitions are executed. For such Extended Automata (EA) we define the notions of merging and synchronizing sequences that serve as reset words in MBT, and show that under certain conditions and when every context variable is defined over a ring, it is possible for the extended automata of the studied class to 'repeat' the necessary and sufficient conditions established for the classical automata. Otherwise, in a general case, the problem can be reduced to deriving reset words for classical FA that represent corresponding EA slices.
The widespread availability of scientific documents in multiple languages, coupled with the development of automatic translation and editing tools, has created a demand for efficient methods that can detect plagiarism...
详细信息
The widespread availability of scientific documents in multiple languages, coupled with the development of automatic translation and editing tools, has created a demand for efficient methods that can detect plagiarism across different languages. In this paper, we present a novel cross-lingual plagiarism detection approach. The algorithm is based on the merger of two existing approaches that in turn achieve state-of-the-art (SOTA) or comparable to SOTA results on different benchmarks. The detailed analysis stages of existing approaches were sequentially merged levelling out the disadvantages of the approaches. The obtained algorithm significantly outperforms the ones it was merged of surpassing them by from 23 to 33% Plagdet Score, depending on different language pairs. The comparison between observed approaches was evaluated on a newly generated multilingual (English, Russian, Spanish, Armenian) test collection, where each suspicious document could contain plagiarised fragments from several languages. The merged method is applicable to various under-resourced languages which is shown on the example of the Armenian language.
暂无评论