1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g...
详细信息
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the graphs in the real world are constantly *** size of the real-time changes in these graphs is smaller and more *** graph algorithms[2,3]can deal with graph changes more efficiently[4]than the corresponding static graph ***,most studies on dynamic graph algorithms are limited to the single machine ***,a few parallel dynamic graph algorithms(such as the graph connectivity)in the MPC model[5]have been proposed and shown superiority over their parallel static counterparts.
Nowadays,enterprises need to continually adjust their business processes to adapt to the changes of business environments,especially when one business needs to be deployed in different application scenarios,which is c...
详细信息
Nowadays,enterprises need to continually adjust their business processes to adapt to the changes of business environments,especially when one business needs to be deployed in different application scenarios,which is called spatial variability in this *** the field of BPM(Business Process Management),configurable business process models have demonstrated their effectiveness in aspects of process modeling and model ***,we found that the existing techniques lead to complex configurable models,and are inadequate for model reuse especially for the spatial variability issue because they neglect the root impact of organizations on control flow.S-BPM(Subject-oriented Business Process Management)models provide a solid foundation for dealing with complex applications and help to bridge the gap between business and IT for process *** this paper,we propose an organization-driven business process configurable modeling approach for spatial variability by integrating both restriction and extension operations based on the S-BPM paradigm,in which business objects are also *** approach is validated with a general business process developed for the Real Estate Administration(REA)in a certain province of *** resulting configurable modeling framework can express the heterogeneous activity sequences for one business and has the potential to generate process models for uncertain environments in a new organization structure.
In this paper, the representability of a family of theories as the set of extensions of a default theory is studied. First, a new necessary condition is given for the representability by means of general default theor...
详细信息
In this paper, the representability of a family of theories as the set of extensions of a default theory is studied. First, a new necessary condition is given for the representability by means of general default theories; then a sufficient one is presented. The families of theories represented by default theories are also fully characterized. Finally, the paper gives an example of denumerable families of mutually inconsistent theories that are represented by a default theory but not by normal ones.
Fork-based symbolic execution would waste large amounts of computing time and resource on invulnerable paths when applied to vulnerability detection. In this paper, we propose a statically-guided fork-based symbolic e...
详细信息
ISBN:
(纸本)1891706373
Fork-based symbolic execution would waste large amounts of computing time and resource on invulnerable paths when applied to vulnerability detection. In this paper, we propose a statically-guided fork-based symbolic execution technique for vulnerability detection to mitigate this problem. In static analysis, we collect all valid jumps along vulnerable paths, and define the priority for each program branch based on the ratio of vulnerable paths over total paths in its subsequent program. In fork-based symbolic execution, path exploration can be restricted to vulnerable paths, and code segments with higher proportion of vulnerable paths can be analyzed in advance by utilizing the result of static analysis. We implement a prototype named SAF-SE and evaluate it with ten benchmarks from GNU Coreutils version 6.11. Experimental results show that SAF-SE outperforms KLEE in the efficiency and accuracy of vulnerability detection.
In this paper, the problem of checking a timed automaton for a Duration Cal-culus formula of the form Temporal Duration Property is addressed. It is shown that TemporalDuration Properties are in the class of discretis...
详细信息
In this paper, the problem of checking a timed automaton for a Duration Cal-culus formula of the form Temporal Duration Property is addressed. It is shown that TemporalDuration Properties are in the class of discretisable real-time properties of Timed Automata,and an algorithm is given to solve the problem based on linear programming techniques andthe depth-first search method in the integral region graph of the automaton. The complexityof the algorithm is in the same class as that of the solution of the reachability problem of timedautomata.
This paper studies the problem of selecting queries to efficiently crawl a deep web data source using a set of sample documents. Crawling deep web is the process of collecting data from search interfaces by issuing qu...
详细信息
The adoption of deep neural network(DNN)model as the integral part of real-world software systems necessitates explicit consideration of their quality-of-service(QoS).It is well-known that DNN models are prone to adve...
详细信息
The adoption of deep neural network(DNN)model as the integral part of real-world software systems necessitates explicit consideration of their quality-of-service(QoS).It is well-known that DNN models are prone to adversarial attacks,and thus it is vitally important to be aware of how robust a modeFs prediction is for a given input instance.A fragile prediction,even with high confidence,is not trustworthy in light of the possibility of adversarial *** propose that DNN models should produce a robustness value as an additional QoS indicator,along with the confidence value,for each prediction they *** approaches for robustness computation are based on adversarial searching,which are usually too expensive to be excised in real *** this paper,we propose to predict,rather than to compute,the robustness measure for each input ***,our approach inspects the output of the neurons of the target model and trains another DNN model to predict the *** focus on convolutional neural network(CNN)models in the current *** show that our approach is accurate,with only 10%-34%additional errors compared with the offline heavy-weight robustness *** also significantly outperforms some alternative *** further validate the effectiveness of the approach when it is applied to detect adversarial attacks and out-of-distribution *** approach demonstrates a better performance than,or at least is comparable to,the state-of-the-art techniques.
Message Sequence Chart (MSC) is a graphical and textual language for describing the interactions between system components, and MSC specifications (MSSs) are a combination of a set of basic MSCs (bMSCs) and a High-lev...
详细信息
Agents being a kind of restricted intelligent objects, it is a natuml way to research the inheritance feature of software agents and integmte inheritance mechanisms into AOP. Based on BDI model of agents, this paper a...
详细信息
Today's smartphones are equipped with precise motion sensors like accelerometer and gyroscope, which can measure tiny motion and rotation of devices. While they make mobile applications more functional, they also ...
详细信息
ISBN:
(纸本)9781450336239
Today's smartphones are equipped with precise motion sensors like accelerometer and gyroscope, which can measure tiny motion and rotation of devices. While they make mobile applications more functional, they also bring risks of leaking users' privacy. Researchers have found that tap locations on screen can be roughly inferred from motion data of the device. They mostly utilized this side-channel for inferring short input like PIN numbers and passwords, with repeated attempts to boost accuracy. In this work, we study further for longer input inference, such as chat record and email content, anything a user ever typed on a soft keyboard. Since people increasingly rely on smartphones for daily activities, their inputs directly or indirectly expose privacy about them. Thus, it is a serious threat if their input text is leaked. To make our attack practical, we utilize the shared memory side-channel for detecting window events and tap events of a soft keyboard. The up or down state of the keyboard helps triggering our Trojan service for collecting accelerometer and gyroscope data. Machine learning algorithms are used to roughly predict the input text from the raw data and language models are used to further correct the wrong predictions. We performed experiments on two real-life scenarios, which were writing emails and posting Twitter messages, both through mobile clients. Based on the experiments, we show the feasibility of inferring long user inputs to readable sentences from motion sensor data. By applying text mining technology on the inferred text, more sensitive information about the device owners can be exposed. Copyright 2015 ACM.
暂无评论