2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)最新文献

筛选
英文 中文
Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments 面向不确定环境的自适应软件多层事件分析法
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00015
Xinyue Li, Wu Chen
{"title":"Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments","authors":"Xinyue Li, Wu Chen","doi":"10.1109/ICECCS54210.2022.00015","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00015","url":null,"abstract":"Adaptive software can autonomously adjust system parameters, structure, and behavior in response to possible anomalies. Event analysis, which is responsible for data perception and predictive analysis of the entire system, is the foundation of the entire adaptive process. However, as the size of software systems increases dramatically, the systems interact more closely with each other. This makes it difficult to guarantee the system in terms of recognition accuracy. And in a more dynamic and uncertain environment, event analysis has a lag, which is difficult to meet the tasks with high real-time requirements. Most of the existing event analysis methods are based on rule-based reasoning and ontology reasoning methods, which cannot well meet the requirements of event recognition accuracy and timeliness. To solve the above problems, this paper proposes an adaptive software multi-level event analysis method for uncertain environments. First, we use fuzzing to eliminate noise interference and other problems in the data collection process. Second, an event recognition method based on “anomaly detection and hybrid inference” is established to solve the inaccurate event mapping relationship and reduce the system overhead. Finally, an event prediction method based on dynamic multi-fault trees and multi-valued decision diagrams is established to meet the system's real-time requirements. The experimental results show that the proposed method can effectively ensure the effective detection of system anomalies and the accurate identification of abnormal events, and realize the reliable analysis of anomalies under uncertain environments.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameter Sensitive Pointer Analysis for Java Java的参数敏感指针分析
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00027
Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang
{"title":"Parameter Sensitive Pointer Analysis for Java","authors":"Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang","doi":"10.1109/ICECCS54210.2022.00027","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00027","url":null,"abstract":"Pointer analysis is an important tool for program analysis and program optimization procedures used in modern compilers and bug checkers. This paper introduces parameter-sensitivity, a new methodology that improves pointer analysis for object-oriented programming languages such as Java. In this approach, we construct a method context for a callee method by a list of objects including both the receiver object and the objects that are passed as parameters at a call site. We believe that such a context is able to represent a significant portion of the current abstract state before the method invocation. The algorithm has been implemented in the Soot framework, and it is evaluated on the benchmarks from DaCapo, compared with the standard object-sensitive pointer analysis algorithms. The preliminary result demonstrates that our parameter-sensitive pointer analysis can achieve better precision with less time consumption than the standard k-object-sensitive algorithms.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Model for Fault Tolerant Parallel Matrix Factorization 容错并行矩阵分解的形式化模型
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00016
Camille Coti, L. Petrucci, Daniel Alberto Torres González
{"title":"A Formal Model for Fault Tolerant Parallel Matrix Factorization","authors":"Camille Coti, L. Petrucci, Daniel Alberto Torres González","doi":"10.1109/ICECCS54210.2022.00016","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00016","url":null,"abstract":"As exascale platforms are in sight, high-performance computing needs to take failures into account and provide fault-tolerant applications and environments. Checkpoint-restart approaches do not require modifying the application, but are expensive at large scale. Application-based fault tolerance is more specific to the application and is expected to achieve better performance. In this paper, we address fault-tolerant matrix factorization with algorithms that present good performance, both during failure-free executions and when failures happen. A challenge when designing fault-tolerant algorithms is to make sure they are resilient to any failure scenario. Therefore, we design a model for these algorithms and prove they can tolerate failures at any moment, as long as enough processes are still alive.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134600148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/iceccs54210.2022.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iceccs54210.2022.00003","DOIUrl":"https://doi.org/10.1109/iceccs54210.2022.00003","url":null,"abstract":"","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126380637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page iii] 2022年第26届复杂计算机系统工程国际会议论文集[Title page iii]
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/iceccs54210.2022.00002
{"title":"Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page iii]","authors":"","doi":"10.1109/iceccs54210.2022.00002","DOIUrl":"https://doi.org/10.1109/iceccs54210.2022.00002","url":null,"abstract":"","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"583 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page i] 第26届复杂计算机系统工程国际会议论文集[Title page i]
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/iceccs54210.2022.00001
{"title":"Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page i]","authors":"","doi":"10.1109/iceccs54210.2022.00001","DOIUrl":"https://doi.org/10.1109/iceccs54210.2022.00001","url":null,"abstract":"","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Denotational and Algebraic Semantics for Cyber-physical Systems 网络物理系统的指称语义和代数语义
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00023
Ran Li, Huibiao Zhu, R. Banach
{"title":"Denotational and Algebraic Semantics for Cyber-physical Systems","authors":"Ran Li, Huibiao Zhu, R. Banach","doi":"10.1109/ICECCS54210.2022.00023","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00023","url":null,"abstract":"The cyber-physical system (CPS) is a dynamic system that contains both continuous and discrete behaviors. It has a wide range of applications in fields such as health care equipment, intelligent traffic control and environmental monitoring. However, the combination of continuous physical behavior and discrete control behavior may complicate the design of systems further. It is of great necessity to give an explicit formal language and its semantics for CPS. In this paper, we elaborate the modeling language for CPS based on our previous work. This language supports shared variables to model the interaction between the physical and the cyber. Additionally, we give it denotational semantics and algebraic semantics, especially focus on the continuous behavior and its composition with the discrete behavior. Throughout this paper, we also present some examples to illustrate the feasibility of the language and its semantics.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification HoS-ML:致力于人类脆弱性识别的社会技术系统ADL
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00010
Paul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, A. Beugnard
{"title":"HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification","authors":"Paul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, A. Beugnard","doi":"10.1109/ICECCS54210.2022.00010","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00010","url":null,"abstract":"Due to the increasing complexity of modern systems, the level of responsibility dedicated to the human operator has grown, particularly in Socio-Technical Systems (STS) where humans are considered as subsystems. Like every system, the human operator can fail by behaving in undesired ways, and consequently have a negative impact on the system. Thus, to improve the resilience of the overall system, it is necessary to manage the vulnerability of humans. In this paper we present an approach to assess human vulnerabilities in an STS through its architecture. We propose a model that describes the STS, based on human characteristics having a significant impact on human vulnerabilities. We define an assessment metric for each characteristic. We propose an approach allowing not only to assess the vulnerability of a specific human in the system, but also to understand how a vulnerability propagates through the system. We implemented this approach with a dedicated architecture description language, called Hos-ML, allowing the architect to deal with STS vulnerabilities.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks 基于状态重构的RDMA网络分布式显式状态空间探索
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00021
Sami Evangelista, L. Petrucci, L. Kristensen
{"title":"Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks","authors":"Sami Evangelista, L. Petrucci, L. Kristensen","doi":"10.1109/ICECCS54210.2022.00021","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00021","url":null,"abstract":"The inherent computational complexity of validating and verifying concurrent systems implies a need to be able to exploit parallel and distributed computing architectures. We present a new distributed algorithm for state space exploration of concurrent systems on computing clusters. Our algorithm relies on Remote Direct Memory Access (RDMA) for low-latency transfer of states between computing elements, and on state reconstruction trees for compact representation of states on the computing elements themselves. For the distribution of states between computing elements, we propose a concept of state stealing. We have implemented our proposed algorithm using the OpenSHMEM API for RDMA and experimentally evaluated it on the Grid'500 testbed with a set of benchmark models. The experimental results show that our algorithm scales well with the number of available computing elements, and that our state stealing mechanism generally provides a balanced workload distribution.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension-Compression Learning: A deep learning code search method that simulates reading habits 扩展压缩学习:一种模拟阅读习惯的深度学习代码搜索方法
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS) Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00032
Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong
{"title":"Extension-Compression Learning: A deep learning code search method that simulates reading habits","authors":"Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong","doi":"10.1109/ICECCS54210.2022.00032","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00032","url":null,"abstract":"To speed up the efficiency of software development, the ability to retrieve codes through natural language is fundamental. At present, the approach of code search based on deep learning has been extensively researched and achieved a lot of results. However, these models are much complex and the training relies on artificially extracted features. Different from other deep learning models, we simulate people's reading habit of expanding content first and then refining content when learning new knowledge and propose the concept of Extension-Compression Learning. The model can effectively express the features of code and natural language through Extension Learning and Compression Learning. We evaluate the effect of the approach on the code search task with a small dataset and a large dataset, and the results show that all indicators are better than those of other approaches that embed code and text into a joint vector space.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信