Workload prediction is critical in enabling proactive resource management of cloud *** workload prediction is valuable for cloud users and providers as it can effectively guide many practices,such as performance assur...
详细信息
Workload prediction is critical in enabling proactive resource management of cloud *** workload prediction is valuable for cloud users and providers as it can effectively guide many practices,such as performance assurance,cost reduction,and energy consumption ***,cloud workload prediction is highly challenging due to the complexity and dynamics of workloads,and various solutions have been proposed to enhance the prediction *** paper aims to provide an in-depth understanding and categorization of existing solutions through extensive literature *** existing surveys,for the first time,we comprehensively sort out and analyze the development landscape of workload prediction from a new perspective,i.e.,application-oriented rather than prediction methodologies per ***,we first introduce the basic features of workload prediction,and then analyze and categorize existing efforts based on two significant characteristics of cloud applications:variability and ***,we also investigate how workload prediction is applied to resource ***,open research opportunities in workload prediction are highlighted to foster further advancements.
Knowledge plays a critical role in artificial ***,the extensive success of pre-trained language models(PLMs)has raised significant attention about how knowledge can be acquired,maintained,updated and used by language ...
详细信息
Knowledge plays a critical role in artificial ***,the extensive success of pre-trained language models(PLMs)has raised significant attention about how knowledge can be acquired,maintained,updated and used by language *** the enormous amount of related studies,there is still a lack of a unified view of how knowledge circulates within language models throughout the learning,tuning,and application processes,which may prevent us from further understanding the connections between current progress or realizing existing *** this survey,we revisit PLMs as knowledge-based systems by dividing the life circle of knowledge in PLMs into five critical periods,and investigating how knowledge circulates when it is built,maintained and *** this end,we systematically review existing studies of each period of the knowledge life cycle,summarize the main challenges and current limitations,and discuss future directions.
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Ear...
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Earlier approaches treat the code as token sequences and use CNN, RNN, and the Transformer models to learn code representations.
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among de...
详细信息
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among decision variables is intricate,leading to large group sizes and suboptimal optimization effects;hence a large-scale multi-objective optimization algorithm based on weighted overlapping grouping of decision variables(MOEAWOD)is proposed in this ***,the decision variables are perturbed and categorized into convergence and diversity variables;subsequently,the convergence variables are subdivided into groups based on the interactions among different decision *** the size of a group surpasses the set threshold,that group undergoes a process of weighting and overlapping ***,the interaction strength is evaluated based on the interaction frequency and number of objectives among various decision *** decision variable with the highest interaction in the group is identified and disregarded,and the remaining variables are then reclassified into ***,the decision variable with the strongest interaction is added to each *** minimizes the interactivity between different groups and maximizes the interactivity of decision variables within groups,which contributed to the optimized direction of convergence and diversity exploration with different *** was subjected to testing on 18 benchmark large-scale optimization problems,and the experimental results demonstrate the effectiveness of our *** with the other algorithms,our method is still at an advantage.
Buffer overflow poses a serious threat to the memory security of modern operating *** overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-...
详细信息
Buffer overflow poses a serious threat to the memory security of modern operating *** overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-ment,and provides implementation space for various system attacks such as program control flow *** makes it a wide range of harms.A variety of security technologies have been proposed to deal with system security problems including buffer *** example,No eXecute(NX for short)is a memory management technology commonly used in Harvard *** can refuse the execution of code which residing in a specific memory,and can effectively suppress the abnormal impact of buffer overflow on control ***,in recent years,it has also been used in the field of system security,deriving a series of solutions based on NX technology,such as ExecShield,DEP,StackGuard,***,these security solutions often rely too much on the processor archi-tecture so that the protection coverage is insufficient and the accuracy is *** in the emerging system architecture field represented by RiSC-V,there is still a lack of effective solutions for buffer overflow *** the continuous rapid development of the system architecture,it is urgent to develop defense methods that are applicable to different system application environments and oriented to all executable memory spaces to meet the needs of system security ***,we propose BOP,A new system memory security design method based on RISC-V extended instructions,to build a RISC-V buffer overflow detection and defense system and deal with the buffer overflow threat in *** to this method,NX technology can be combined with program control flow analysis,and Nx bit mechanism can be used to manage the executability of memory space,so as to achieve a more granular detection and defense of buffer overflow attacks that may occur in RISC-V system
Code semantic learning serves as the basis of many program analysis tasks. Researchers have paid much effort to build robust and effective code representation models over the years. One line of work focuses on introdu...
Code semantic learning serves as the basis of many program analysis tasks. Researchers have paid much effort to build robust and effective code representation models over the years. One line of work focuses on introducing the code structure into the representations. To further improve the robustness of the code representation, approaches based on compiler intermediate representations(IRs) are proposed. However, these IR-based models suffer from heavy computational costs and memory overhead. How to represent program semantics effectively and efficiently still remains a challenge. To this end, we propose EECS, an effective and efficient code semantic representation approach based on compiler IRs and a hybrid attention mechanism. For input representation, to address the unlimited vocabulary size issue in IR, we propose a variable identification strategy to allocate each register variable to a new ID that can represent their relative positions. Besides, we also extract the data flow information among the code blocks. Then we build a hierarchical multi-layer Transformer encoder to capture the data dependency information as well as the code semantics through a hybrid attention mechanism. To enable EECS to learn code semantics and functionality better, we optimize three objectives jointly during the training *** results on three code semantic understanding tasks show that EECS performs better than the state-of-the-art techniques, demonstrating the remarkable capability of EECS on program semantics understanding.
Inner Product Functional Encryption (IPFE) offers strong privacy protection for smart devices by outputting only the results of function computations, minimizing data leakage. This makes it well-suited for privacy-pre...
详细信息
Node classification has a wide range of application scenarios such as citation analysis and social network *** many real-world attributed networks,a large portion of classes only contain limited labeled *** of the exi...
详细信息
Node classification has a wide range of application scenarios such as citation analysis and social network *** many real-world attributed networks,a large portion of classes only contain limited labeled *** of the existing node classification methods cannot be used for few-shot node *** train the model effectively and improve the robustness and reliability of the model with scarce labeled samples,in this paper,we propose a local adaptive discriminant structure learning(LADSL)method for few-shot node *** aims to properly represent the nodes in the attributed graphs and learn a metric space with a strong discriminating power by reducing the intra-class variations and *** conducted on various attributed networks datasets demonstrate that LADSL is superior to the other methods on few-shot node classification task.
The emergence of large language models (LLMs) has increasingly drawn attention to the use of LLMs for human-like planning. Existing work on LLM-based planning either focuses on leveraging the inherent language generat...
详细信息
With the exponential growth of big data and advancements in large-scale foundation model techniques, the field of machine learning has embarked on an unprecedented golden era. This period is characterized by significa...
详细信息
With the exponential growth of big data and advancements in large-scale foundation model techniques, the field of machine learning has embarked on an unprecedented golden era. This period is characterized by significant innovations across various aspects of machine learning, including data exploitation, network architecture development, loss function settings and algorithmic innovation.
暂无评论