2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)最新文献

筛选
英文 中文
Real-time multi-task simulation in Forth 实时多任务仿真
S. Baranov
{"title":"Real-time multi-task simulation in Forth","authors":"S. Baranov","doi":"10.1109/FRUCT-ISPIT.2016.7561503","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561503","url":null,"abstract":"Gained experience to rapid developing of software tools for investigating real-time multi-tasking through simulation of the behavior of respective formal models is described. The approach is based on using the interpretative programming language Forth which opens a wide range of options to properly tailor the tool for particular purposes and seems to have a much broader scope if properly used.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of thread synchronization strategies in concurrent data structures based on flat-combining 基于平面组合的并发数据结构中线程同步策略的性能分析
Marsel Galimullin, Eugeny Kalishenko, Nikolay Rapotkin
{"title":"Performance analysis of thread synchronization strategies in concurrent data structures based on flat-combining","authors":"Marsel Galimullin, Eugeny Kalishenko, Nikolay Rapotkin","doi":"10.1109/FRUCT-ISPIT.2016.7561508","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561508","url":null,"abstract":"The article deals with the development of threads synchronizing strategies based on the creation of concurrent “flat-combining” data structures as well as research of their performance. The paper considers “flat-combining” approach and its implementation in the library libcds, the development of thread synchronization strategy and its possible implementations. The efficiency of synchronization strategies usage is researched on the example of the open source library libcds. The research revealed the strategy with the lowest operation execution time on a container and the lowest amount of CPU resources, and identifies use cases of the developed strategies. A mechanism with the developed synchronization strategy to build concurrent data structures was implemented. The implemented strategies were integrated in the cross-platform open source library libcds.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132999266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The application of neural network and spline wavelet models in the electroencephalogram analysis automation process 神经网络和样条小波模型在脑电图分析自动化过程中的应用
Andrey B. Stepanov
{"title":"The application of neural network and spline wavelet models in the electroencephalogram analysis automation process","authors":"Andrey B. Stepanov","doi":"10.1109/FRUCT-ISPIT.2016.7561545","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561545","url":null,"abstract":"The article focuses on the use of synthesized wavelets in the electroencephalogram analysis automation process. It describes the procedures for obtaining neural network and spline models proposed by the author. The advantages and disadvantages of the method are shown. The paper proposes a system of electroencephalogram analysis automation process based on the use of two levels of continuous wavelet transform. A detailed description of its operation is given. The paper describes a software package developed on the basis of the system. During the tests, the software feature detection accuracy (eye artifacts and pathological components) in the signal was 81.5%. It suggests the main areas for the developed system and package application, as well as ways for their further improvement.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"155 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automated extraction of concept matcher thesaurus from semi-structured catalogue-like sources of data on the web 从网络上半结构化的类目录数据源自动提取概念匹配词库
Maxim Lapaev
{"title":"Automated extraction of concept matcher thesaurus from semi-structured catalogue-like sources of data on the web","authors":"Maxim Lapaev","doi":"10.1109/FRUCT-ISPIT.2016.7561521","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561521","url":null,"abstract":"Ontology design and the process of populating a data-set with knowledge following the chosen or developed ontology to fit the principles of Semantic Web and Linked Open Data is a time-consuming and iterative process, requiring either expert knowledge or a set of tools for data scraping from web. A valid and consistent ontology and knowledge withing the data-set require unification of concepts which means overcoming ambiguity and synonymy of terms which become individuals of ontology. In this paper we spot on techniques used for organising a Russian food product data-set under a light-weight FOOD Ontology and concept matching in particular. Main approaches to data-set concept unification, synonymic term matching and ways to collect dictionaries for matcher are mentioned. The tool for catalogue-like semi-structured resources parsing and thesaurus extraction is developed and introduced for the task of on-the-fly concept matching.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133473304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bi-deniable public-encryption protocols based on standard PKI 基于标准PKI的双否认公开加密协议
N. Moldovyan, A. N. Berezin, A. Kornienko, A. Moldovyan
{"title":"Bi-deniable public-encryption protocols based on standard PKI","authors":"N. Moldovyan, A. N. Berezin, A. Kornienko, A. Moldovyan","doi":"10.1109/FRUCT-ISPIT.2016.7561530","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561530","url":null,"abstract":"The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Platform-independent reverse debugging of the virtual machines 独立于平台的虚拟机反向调试
P. Dovgalyuk, D. Dmitriev, V. Makarov
{"title":"Platform-independent reverse debugging of the virtual machines","authors":"P. Dovgalyuk, D. Dmitriev, V. Makarov","doi":"10.1109/FRUCT-ISPIT.2016.7561506","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561506","url":null,"abstract":"Prototyping and debugging of operating systems and drivers are very tough tasks because of hardware volatility, kernel panics, blue screens of death, long periods of time required to expose the bug, perturbation of the drivers by the debugger, and non-determinism of multi-threaded environment. This paper shows how the deterministic replay of the virtual machine execution can be used to reduce the impact of these factors to the process of debugging. We present an approach to reverse debugging which allows creating multi-target whole-system debugger. Using this debugger one can investigate the failures affecting behavior of virtual hardware and guest software. Our debugger is capable of replaying whole virtual machine execution with reproducing internal state of all virtual devices. Although reverse debugging was a subject of many previous researches, there is no widely available practical tool for debugging software on different platforms. We present reverse debugger as a practical tool, which was tested for Í386, x86-64, MIPS, and ARM platforms, for Windows and Linux guest operating systems. One can use this debugger to debug user-and kernel-level code, deterministic functional modelling of peripheral devices and hardware platforms. We show that this tool incurs 15-40% recording overhead, which allows using our tool for debugging time-sensitive applications. We presented reverse execution implementation as a set of patches. Some of the patches were already included into mainline QEMU.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Next generation FPGA-based platform for network security 下一代fpga网络安全平台
Alexander P. Antonov, Alexey S. Filippov, Olga V. Mamoutova
{"title":"Next generation FPGA-based platform for network security","authors":"Alexander P. Antonov, Alexey S. Filippov, Olga V. Mamoutova","doi":"10.1109/FRUCT-ISPIT.2016.7561501","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561501","url":null,"abstract":"The driving forces for this project are demands for a hardware, reconfigurable, high performance, low cost and low power solution that could be used in a widest range of Internet of Things (IoT) devices. The solution should be able to secure computer networks against emerging threats and vulnerabilities, sustaining privacy and trust This paper presents an approach for developing a novel hardware platform for Ethernet-based network firewall security services for IP networks. The article highlights functional and structural levels of the proposed hardware architecture, performance estimations and a trade-off between performance and hardware cost. Some implementation details, including HDL used, testing approaches and design tools are provided as well.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129286745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Surgery scene representation in 3D simulation training SDK 手术场景表示3D仿真训练SDK
A. Ivashchenko, Nikolay Gorbachenko, A. Kolsanov, A. Kuzmin
{"title":"Surgery scene representation in 3D simulation training SDK","authors":"A. Ivashchenko, Nikolay Gorbachenko, A. Kolsanov, A. Kuzmin","doi":"10.1109/FRUCT-ISPIT.2016.7561511","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561511","url":null,"abstract":"This paper introduces a software development kit (SDK) to provide IT developers and medical community a platform to build new simulation technologies for surgery training. There is described a formal model for simulation objects, scenes and scenarios representation and a software solution for objects interaction modeling and surgery scene simulating. The results are illustrated by the simulation suite for laparoscopy surgery training delivered and installed at Samara State Medical University.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On physical web browser 在物理web浏览器上
D. Namiot, M. Schneps-Schneppe
{"title":"On physical web browser","authors":"D. Namiot, M. Schneps-Schneppe","doi":"10.1109/FRUCT-ISPIT.2016.7561531","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561531","url":null,"abstract":"In this paper, we present the Physical Web Browser project for web applications depending on the environment. At this moment, many of users all over the world visit websites using their mobile devices only. Any mobile device (e.g., smartphone) has sensors to capture the environmental information. This information (context) could be analyzed and used within the web applications. There are, at least, two models for using this information. Firstly, we can use context information for data gathering requests in a web application. In this case, the output depends on the context. It is the classical model for context-aware data retrieval. In the second model, we can use context-aware data for improving user experience (for changing and tuning user interfaces). In other words, we present a way for the adaptation of web applications depending on the environment.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114791703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信