2019 22nd International Conference on Control Systems and Computer Science (CSCS)最新文献

筛选
英文 中文
Hardware and Software Architecture for Accelerating Hash Functions Based on SoC 基于SoC的哈希函数加速的软硬件架构
Ovidiu Panait, L. Dumitriu, I. Susnea
{"title":"Hardware and Software Architecture for Accelerating Hash Functions Based on SoC","authors":"Ovidiu Panait, L. Dumitriu, I. Susnea","doi":"10.1109/CSCS.2019.00031","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00031","url":null,"abstract":"This paper presents an architecture for fast prototyping of hardware designs aiming to accelerate cryptographic hash functions on Xilinx ZYNQ SoC. The design include both hardware and software components, using DMA and custom AXI4-Stream IPs for maximum performance and easy integration. The communication link between the hardware module that accelerates hash functions and the processor running Linux is accessible directly from the user-space, providing fast debugging/benchmarking capabilities. As a proof-of-concept, a custom, pipelined and optimized bitcoin miner module was developed in order to demonstrate the feasibility of this infrastructure, and to evaluate its performance. The proposed solution was implemented on an Arty Z7-20 development board.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Non-Functional Requirements to Identify Cross-Cutting Concerns 使用非功能性需求来识别横切关注点
C. Gal-Chis, B. Pârv
{"title":"Using Non-Functional Requirements to Identify Cross-Cutting Concerns","authors":"C. Gal-Chis, B. Pârv","doi":"10.1109/CSCS.2019.00050","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00050","url":null,"abstract":"Smart Home systems control a multitude of automated devices and bring together different types of stakeholders. From software perspective, this rises architecture and design challenges, as different stakeholder viewpoints are sources of different requirements. Apart from the functional requirements available in the initial product description, non-functional requirements and constrains are difficult to capture, and in addition, they are the main generator of cross-cutting requirements. The process presented here identifies cross-cutting concerns, as architectural aspects cross-cut quality attributes. Using a metric, we calculate cross-cutting coefficients, based on matching values mapped from non-functional requirements. The process generates a space cross-cutting matrix, which quantifies cross-cutting coefficients for architectural aspects and system quality attributes. The information generated about the cross-cutting concerns can be used in planning the software and system development, and in decisions related to the system architecture, design patterns.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121991080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Measurement of Pain Stimulus Effects in Skin Impedance 皮肤阻抗疼痛刺激效应的实验测量
M. Ghita, Mihaela Ghita, D. Copot, M. Neckebroek, C. Ionescu
{"title":"Experimental Measurement of Pain Stimulus Effects in Skin Impedance","authors":"M. Ghita, Mihaela Ghita, D. Copot, M. Neckebroek, C. Ionescu","doi":"10.1109/CSCS.2019.00093","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00093","url":null,"abstract":"The work presented here validates the hypothesis that skin impedance is a suitable tool for assessing and quantifying nociceptor stimulation (i.e. mechanical and thermal pain stimulus) in awake healthy volunteers in a laboratory environment. The impedance exhibits interesting features such as constant phase, typical of fractional order systems. Additionally, for the first time in the research community, we were able to detect and report the existence of pain memory in skin tissue.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122097813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CSCS 2019 Workshops
Catalin Negru
{"title":"CSCS 2019 Workshops","authors":"Catalin Negru","doi":"10.1109/cscs.2019.00007","DOIUrl":"https://doi.org/10.1109/cscs.2019.00007","url":null,"abstract":"International Workshop on Robots, Artificial Intelligence and Robotic Cloud/Edge Platforms (RoboEdge 2019) https://roboedge.hpc.pub.ro Workshop Organizers: Adina Magda Florea, University Politehnica of Bucharest, Romania Liviu Miclea, Technical University of Cluj-Napoca, Romania Florin Pop, University Politehnica of Bucharest, Romania and National Institute for Research and Development in Informatics (ICI) Bucharest, Romania","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Control Flow Obfuscation Based on Dynamic Entry Points Modification 基于动态入口点修改的Android控制流混淆
Xueyi Yang, Lingchen Zhang, Cunqing Ma, Zongbin Liu, Ping Peng
{"title":"Android Control Flow Obfuscation Based on Dynamic Entry Points Modification","authors":"Xueyi Yang, Lingchen Zhang, Cunqing Ma, Zongbin Liu, Ping Peng","doi":"10.1109/CSCS.2019.00054","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00054","url":null,"abstract":"With over 85% market share, Android remains the most popular mobile device platform and incurs endless attacks to steal application developers' intellectual property. Code obfuscation techniques have been conventionally used to prevent application reverse engineering or tampering, and to protect intellectual property. However, existing control-flow obfuscation techniques are not sufficiently efficient and complex to resist the growing reverse engineering techniques. This paper presents a new control-flow obfuscation scheme for Android apps at the Dalvik bytecode level. Our proposed scheme goes beyond the common control-flow obfuscation schemes and make it nearly impossible for static analysis to determine the actual program control flows. Firstly, our scheme transforms the original Dalvik bytecode to redirect its control flow transfers. The redirection is implemented by replacing the invoked method of an invocation instruction to another method. Then our scheme dynamically recovers the control transfers in the transformed code to the original control transfer targets. Hence the transformed code produces the same execution results with the original code. The recovery is implemented by dynamically modifying the entry points of the Dalvik methods during app running. Those entry points are maintained by Android Runtime system. Our analysis and evaluation show that the scheme can implement effective obfuscation to hinder reverse engineering and code analysis with reasonable size, execution time, and execution memory overheads.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128795332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Bayes' Probabilistic Decision Support with a Fuzzy Approach 用模糊方法增强贝叶斯概率决策支持
Panagiotis Christias, M. Mocanu
{"title":"Enhancing Bayes' Probabilistic Decision Support with a Fuzzy Approach","authors":"Panagiotis Christias, M. Mocanu","doi":"10.1109/CSCS.2019.00049","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00049","url":null,"abstract":"This paper proposes an enhancement to a traditional decision making approach based on Bayes' mathematical theory. The objective is to develop an effective decision support under conditions of uncertainty while exploiting low measured or audited information. The case study will be the application of alternative interventions to buildings in order to improve their energy consumption. A fuzzy approach is examined which attempts to formulate a 'fair' membership function in order to produce weights and assist Bayes' method.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Modular Framework for Human-Robot Interaction and Collaboration 面向人机交互与协作的模块化框架
Alexandru Gavril, Alexandra Stefania Ghita, Alexandru Sorici, A. Florea
{"title":"Towards a Modular Framework for Human-Robot Interaction and Collaboration","authors":"Alexandru Gavril, Alexandra Stefania Ghita, Alexandru Sorici, A. Florea","doi":"10.1109/CSCS.2019.00120","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00120","url":null,"abstract":"The field of socially assistive robotics is advancing steadily, finding an increasing number of applications in domains such as health and home care, public servicing, tourism or entertainment. The diversity of robotic units poses a challenge in terms of their programming, since application designers must either use manufacturer code, or build their own suite of behavior modules from ground up, using open-source platforms such as the Robot Operating System (ROS). The trade-off for design flexibility of the latter option is that there is a lack of ROS-based frameworks for building a behavioral life-cycle for assistive robots, or which allow them to be contextually connected to their environments. In this paper, we introduce the foundational work for AMIRO, a ROS-based framework for the development of assistive robotics applications. We present details of the core behavioral models for navigation, person recognition and communication and detail the means for organizing them into coherent complex behaviors. We further discuss the provisioning for context-aware decision making. The core behavior models are analyzed individually from a performance perspective and two very different evaluation scenarios are described showcasing the versatility of the proposed framework.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dedicated Algorithms for Risk Minimization in Suspicious Financial Transactions 可疑金融交易风险最小化的专用算法
C. Şerban, Cosmin Popa, S. Mocanu, Daniela Saru
{"title":"Dedicated Algorithms for Risk Minimization in Suspicious Financial Transactions","authors":"C. Şerban, Cosmin Popa, S. Mocanu, Daniela Saru","doi":"10.1109/CSCS.2019.00107","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00107","url":null,"abstract":"Under EU Directive 2015/849 of the European Parliament and of the Council on the prevention of the use of the financial system for the purpose of money laundering or terrorist financing, it is necessary to identify both individuals and transactions of a certain degree of risk. The process of identifying the risk of both customers and transactions considered suspicious lies at the root of systems aimed at preventing money laundering and terrorist financing. Such systems are called AML (Anti-Money Laundering) systems. An important step in calculating a client's risk is to check his / her existence in lists of suspicious or possibly suspicious persons, also called sanction lists. Classic search methods involve large processing capabilities. Taking into account the obligation of all financial institutions to implement these methods, there is a need to implement a fast and secure search flow. Therefore, the attention was drawn to the searching techniques for artificial intelligence. These kinds of methods include advanced machine learning for optimizing the whole searching process: the system is able to detect certain patterns and identify new ones based on certain characteristics of the search query and by identifying similarities between words.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115145930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Min-Max Coalitional Model Predictive Control Algorithm 最小-最大联合模型预测控制算法
A. Maxim, J. Maestre, C. Caruntu, C. Lazar
{"title":"Min-Max Coalitional Model Predictive Control Algorithm","authors":"A. Maxim, J. Maestre, C. Caruntu, C. Lazar","doi":"10.1109/CSCS.2019.00012","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00012","url":null,"abstract":"This paper proposes a coalitional model predictive control algorithm with feasibility guarantees for systems with bounded additive uncertainties. This formulation, suitable for sub-systems coupled through the inputs, assumes the coupling variables as disturbances and ensures a robust consensus with minimum information exchange. The simulation results show that the coalitional method has similar behaviour to the fully centralized algorithm and improved performance with respect to the decentralized and the iterative min-max distributed model predictive controllers.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127934868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent Wireless Sensor Network Applications in Cloud Era 云时代的智能无线传感器网络应用
V. Tovarniţchi
{"title":"Intelligent Wireless Sensor Network Applications in Cloud Era","authors":"V. Tovarniţchi","doi":"10.1109/CSCS.2019.00089","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00089","url":null,"abstract":"Rapid evolution of digital technologies has pushed the requirements for the monitoring-related systems far more beyond to what we could imagine not so long ago. Even if the main requirements for the input in any monitoring system are \"correctness\" and \"real-time\" data characteristics, and the expected output are some decisions and actions, these are not enough anymore. Data and digitalization are the causes of the Industry 4.0 (r) evolution, while the effect is data-driven manufacturing. Due to globalization and fierce competition in the markets, to gain higher results, players from any industrial sector must take care of plenty of factors. Among them, the data play a crucial role, but not as a raw value but as a (valuable) asset. To become such an asset, it matters how it is leveraged (acquired, transported, processed, harnessed etc.), since of its efficient collection and processing depends the optimality of taken decisions and performed actions. The basic purpose of monitoring is to control and supervise some system at all or some of its parameters to decide later upon actions that follows [1]. Using information technologies in monitoring activities opens many possibilities in such important areas as health and security, industrial sectors, military etc. Wireless Sensor Networks in industrial automation play a key role in supporting communication. Since they can be quickly deployed, these offer a high level of flexibility. On the other hand, to get the best possible outcome from gathered data, there is a mandatory to appeal to the appropriate digital technologies. In modern era, the primary choice for such kind of requirements start from \"The Cloud\".","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134013105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信