With the development of Internet technology,a large portion of computersoftwares appear to run in a network-oriented,distributed-deployed,and self-evolving *** emerging wireless communication technologies broaden the...
详细信息
With the development of Internet technology,a large portion of computersoftwares appear to run in a network-oriented,distributed-deployed,and self-evolving *** emerging wireless communication technologies broaden the usage of software in mobile platforms,enabling the pervasive computing paradigm,where people can access information/service anytime and anywhere with portable *** the pervasive networking environment where mobile devices operate on the ad hoc mode and communicate with each other opportunistically without wireless infrastructures,distributing the evolving software updates to a set of mobile terminals is a challenging *** this paper,we address the problem of distributing multiple software updates in pervasive networks with storage and bandwidth constraints,and propose age-based solutions to tackle this *** basic idea is to introduce different age-based priority mechanisms for propagation decision making in order to resolve the contention of wireless bandwidth and storage *** investigate a number of update propagation strategies including random spread,youngest age,and golden *** models are derived to analyse the performance of the proposed *** is shown that the golden age strategy has the burst effect,which could be used to enhance the efficiency of software update *** principles for choosing golden age values are proposed aiming to optimize different utility *** simulations under various network parameters show that the golden age strategy outperforms other strategies for multi-source software updates propagation.
As large language models (LLMs) increasingly power web applications, including social networks, the challenge of moderating hate speech has become a critical concern for the Web. These LLM-powered applications, while ...
详细信息
ISBN:
(纸本)9798400712746
As large language models (LLMs) increasingly power web applications, including social networks, the challenge of moderating hate speech has become a critical concern for the Web. These LLM-powered applications, while offering near-human interaction capabilities, are vulnerable to harmful or biased content due to imperfect training data scraped from the Web. Current hate speech detection methods often struggle with limited annotated data, especially for real-time moderation on these platforms. This paper introduces Sentiment-Aided Hate Speech Detection (SAHSD), a novel approach designed to enhance hate speech detection specifically in LLM-powered web applications. By treating hate speech detection as a few-shot learning task, SAHSD utilizes sentiment analysis to refine pre-trained language models (LM) for improved accuracy in recognizing harmful content. SAHSD first employs publicly available sentiment datasets to train a sentiment analysis model, which is then fine-tuned by merging sentiment prompts with hate speech prompts, enabling efficient and accurate detection even with limited training samples. The effectiveness of SAHSD is demonstrated through experiments on widely used web-sourced datasets like SBIC and HateXplain. SAHSD achieves an exceptional F1-score of 0.99 with only 64 training samples and outperforms advanced techniques such as ToKen, MRP, and HARE, with significant improvements of 33% on SBIC and 95% on HateXplain. SAHSD surpasses GPT-4 in generalization performance across multiple datasets, showing an 8% improvement when trained on equal-sized samples. These results underscore SAHSD's potential to enhance content moderation in LLM-driven web platforms, contributing to a safer, more inclusive and accountable Web ecosystem.
An object on the Semantic Web is likely to be denoted with several URIs by different parties. Object core-ferencing is a process to identify "equivalent" URIs of objects for achieving a better Data Web. In this pape...
详细信息
An object on the Semantic Web is likely to be denoted with several URIs by different parties. Object core-ferencing is a process to identify "equivalent" URIs of objects for achieving a better Data Web. In this paper, we propose a bootstrapping approach for object coreferencing on the Semantic Web. For an object URI, we firstly establish a kernel that consists of semantically equivalent URIs from the same-as, (inverse) functional properties and (max-)cardinalities, and then extend the kernel with respect to the textual descriptions (e.g., labels and local names) of URIs. We also propose a trustworthiness-based method to rank the coreferent URIs in the kernel as well as a similarity-based method for ranking the URIs in the extension of the kernel. We implement the proposed approach, called ObjectCoref, on a large-scale dataset that contains 76 million URIs collected by the Falcons search engine until 2008. The evaluation on precision, relative recall and response time demonstrates the feasibility of our approach. Additionally, we apply the proposed approach to investigate the popularity of the URI alias phenomenon on the current Semantic Web.
The problem of reachability analysis of linear hybrid automata(LHA) is very *** paper considers to improve the efficiency of the reachability analysis by optimizing the structures of *** identify two types of loops ca...
详细信息
The problem of reachability analysis of linear hybrid automata(LHA) is very *** paper considers to improve the efficiency of the reachability analysis by optimizing the structures of *** identify two types of loops called the flexible loops and the zero loops,and present the techniques to replace the repetitions of those loops in the behavior of LHA with finite sequences of locations and in the meantime simplify the associated *** techniques work not only for the polyhedral computing based algorithms but also for the bounded model checkers.
software systems can be represented as complex networks and their artificial nature can be investigated with approaches developed in network *** maximization has been successfully applied on software networks to ident...
详细信息
software systems can be represented as complex networks and their artificial nature can be investigated with approaches developed in network *** maximization has been successfully applied on software networks to identify the important nodes that have the maximum influence on the other ***,research is open to study the effects of network fabric on the influence behavior of the highly influential *** this paper,we construct class dependence graph(CDG)networks based on eight practical Java software systems,and apply the procedure of influence maximization to study empirically the correlations between the characteristics of maximum influence and the degree distributions in the software *** demonstrate that the artificial nature of CDG networks is reflected partly from the scale free behavior:the in-degree distribution follows power law,and the out-degree distribution is *** the influence behavior,the expected influence spread of the maximum influence set identified by the greedy method correlates significantly with the degree *** addition,the identified influence set contains influential classes that are complex in both the number of methods and the lines of code(LOC).For the applications in software engineering,the results provide possibilities of new approaches in designing optimization procedures of software systems.
An approach based on adaptive congestion control and adaptive error recovery with RS (Reed-Solomon) coding method is presented for efficient video transmission over the Internet. Featured by weighted moving average ra...
详细信息
An approach based on adaptive congestion control and adaptive error recovery with RS (Reed-Solomon) coding method is presented for efficient video transmission over the Internet. Featured by weighted moving average rate control and TCP-friendliness, AVSP, a novel adaptive video streaming protocol, is designed with adjustable rate control parameters so as to respond quickly to the QoS status fluctuation during video transmission over the Internet. Combined with congestion control policy, an adaptive RS coding error recovery scheme with variable parameters is presented to enhance the robustness of MPEG video transmission over the Internet with restriction to the total system bandwidth .
An element may have heterogeneous semantic interpretations in different ontologies. Therefore, understanding the real local meanings of elements is very useful for ontology operations such as querying and reasoning, w...
详细信息
An element may have heterogeneous semantic interpretations in different ontologies. Therefore, understanding the real local meanings of elements is very useful for ontology operations such as querying and reasoning, which are the foundations for many applications including semantic searching, ontology matching, and linked data analysis. However, since different ontologies have different preferences to describe their elements, obtaining the semantic context of an element is an open problem. A semantic subgraph was proposed to capture the real meanings of ontology elements. To extract the semantic subgraphs, a hybrid ontology graph is used to represent the semantic relations between elements. An extracting algorithm based on an electrical circuit model is then used with new conductivity calculation rules to improve the quality of the semantic subgraphs. The evaluation results show that the semantic subgraphs properly capture the local meanings of elements. Ontology matching based on semantic subgraphs also demonstrates that the semantic subgraph is a promising technique for ontology applications.
Automated test generation tools enable test automation and further alleviate the low efficiency caused by writing hand-crafted test ***,existing automated tools are not mature enough to be widely used by software test...
详细信息
Automated test generation tools enable test automation and further alleviate the low efficiency caused by writing hand-crafted test ***,existing automated tools are not mature enough to be widely used by software testing *** paper conducts an empirical study on the state-of-the-art automated tools for Java,i.e.,EvoSuite,Randoop,JDoop,JTeXpert,T3,and *** design a test workflow to facilitate the process,which can automatically run tools for test generation,collect data,and evaluate various ***,we conduct empirical analysis on these six tools and their related techniques from different aspects,i.e.,code coverage,mutation score,test suite size,readability,and real fault detection *** discuss about the benefits and drawbacks of hybrid techniques based on experimental ***,we introduce our experience in setting up and executing these tools,and summarize their usability and ***,we give some insights into automated tools in terms of test suite readability improvement,meaningful assertion generation,test suite reduction for random testing tools,and symbolic execution integration.
With the Internet of Things (IoT) fostering seamless device-to-human and device-to-device interactions, the domain of intelligent lighting systems have evolved beyond simple occupancy and daylight sensing towards auto...
详细信息
The quality of internetware software is significantly associated with class *** software evolves,changes often introduce many unrelated responsibilities to the same classes or distribute tightly-related methods in dif...
详细信息
The quality of internetware software is significantly associated with class *** software evolves,changes often introduce many unrelated responsibilities to the same classes or distribute tightly-related methods in different *** changes make the classes difficult to understand and *** class refactoring is an effective technique to improve the quality of software structure by decomposing unrelated methods in one class to create new classes or extracting tightly-related methods from different *** this paper,we propose a novel approach for class extraction from internetware source *** approach leverages a community structure detection technique to partition software into clusters and extracts classes from the resulting *** experimental results,which investigate the public well-known internetware PKUAS,indicate that:(1)the proposed approach is much faster than existing search-based clustering approaches(Hillclimbing and Genetic algorithm)and is thus applicable for large-scale internetware;(2)the proposed approach can identify meaningful class extractions for internetware;and(3)Extract Class refactoring candidates identified by the proposed approach significantly improve class cohesion of internetware.
暂无评论