366 Hits in 4.4 sec


Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
Being integrated in large and complex environments, embedded systems need to support several communication protocols to interact with other devices or with their users.  ...  In this paper we propose a methodology to identify parsers and complex processing logic present in binary code without access to their source code or documentation.  ...  The system we propose, named PIE for Parser-like code Identification in Embedded Systems, first translates firmware images from binary code to the Low-Level Virtual Machine (LLVM) compiler intermediate  ... 
doi:10.1145/2818000.2818035 dblp:conf/acsac/CojocarZVBFB15 fatcat:ionhfyhch5dg3emqh6nngiw7ru

A Partial Integral Equation (PIE) Representation of Coupled Linear PDEs and Scalable Stability Analysis using LMIs [article]

Matthew M. Peet
2020 arXiv   pre-print
The second result is to show that for systems in this PIE representation, convex optimization may be used to verify stability without discretization.  ...  We present a new Partial Integral Equation (PIE) representation of Partial Differential Equations (PDEs) in which it is possible to use convex optimization to perform stability analysis with little or  ...  Moreover, the information which determines the relationship between x, x s and x ss is not embedded in the differential equation.  ... 
arXiv:1812.06794v4 fatcat:x3ekj6glvzgu7cftc7dx75sp2e

Casting a Wide Net: Robust Extraction of Potentially Idiomatic Expressions [article]

Hessel Haagsma and Malvina Nissim and Johan Bos
2019 arXiv   pre-print
In addition, larger corpora are a potential source for valuable linguistic insights into idiomatic expressions and their variability.  ...  Combining complementary PIE extraction methods increases reliability further, to over 92% F1-score.  ...  Table 8 PIE extraction performance in terms of precision, recall, and F1-score of the parser-based system, with different options, on the development set.  ... 
arXiv:1911.08829v1 fatcat:v2p3g6l3rbe5tinlb4xvrc2wua

Mining Logical Event Schemas From Pre-Trained Language Models [article]

Lane Lawley, Lenhart Schubert
2022 arXiv   pre-print
In lieu of a pre-made corpus of stories, our dataset is a continuous feed of "situation samples" from a pre-trained language model, which are then parsed into FrameNet frames, mapped into simple behavioral  ...  We present NESL (the Neuro-Episodic Schema Learner), an event schema learning system that combines large language models, FrameNet parsing, a powerful logical representation of language, and a set of simple  ...  A baker baked a pie. He sold the pie to a girl. A girl ate it.  ... 
arXiv:2204.05939v1 fatcat:sbi5l4wnxvfmjeoiv5ky7pvl7u

Building Embedded Systems Like It's 1996 [article]

Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu
2022 arXiv   pre-print
However, preliminary evidence shows that attack mitigations protecting our desktops/servers/phones are missing in embedded devices, posing a significant threat to embedded security.  ...  To this end, this paper presents an in-depth study on the adoption of common attack mitigations on embedded devices.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agency.  ... 
arXiv:2203.06834v1 fatcat:q6wlx2ug6vgvvmj3e6kl42vzue

APIExample: An effective web search based usage example recommendation system for java APIs

Lijie Wang, Lu Fang, Leye Wang, Ge Li, Bing Xie, Fuqing Yang
2011 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)  
Given a java API, the tool collects its related web pages from the Internet, extracts java code snippets and their surrounding descriptive texts embedded in the pages, then assembles them into usage examples  ...  Two kinds of user-interaction style, a web search portal and an Eclipse plug-in, are now both publicly available.  ...  The text content embedded in these tags is considered as a segment.  ... 
doi:10.1109/ase.2011.6100133 dblp:conf/kbse/WangFWLXY11 fatcat:3muewvxugzgfzdadneyjizxeuu

Lightweight predicate extraction for patient-level cancer information and ontology development

Muhammad Amith, Hsing-Yi Song, Yaoyun Zhang, Hua Xu, Cui Tao
2017 BMC Medical Informatics and Decision Making  
To alleviate these issues, especially for novices, automated tools from the natural language domain can assist in the development process of ontologies.  ...  Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Published: 5 July 2017  ...  Additionally, open information extraction systems, like OLLIE [24] or Reverb, either utilizes shallow parsing (parts of speech identification and chunking) techniques or very involved natural language  ... 
doi:10.1186/s12911-017-0465-x pmid:28699547 pmcid:PMC5506564 fatcat:iy6u7fjllvbr3hr274sz6cdqhe

Syntactic concordancing and multi-word expression detection

V. Seretan, E. Wehrli
2013 International Journal of Data Mining Modelling and Management  
In this article, we describe the underlying methodology and resources used by the system, its architecture, and its recently developed online version.  ...  Also called key word in context (KWIC), these tools are nowadays indispensable in the work of lexicographers, linguists, and translators.  ...  task-based evaluation performed in a machine translation setting suggested that in case of complete analysis, the identification of lexical items is very good, as well as the identification of the arguments  ... 
doi:10.1504/ijdmmm.2013.053694 fatcat:fqlfeitlzzcx7leqebca4idrlu

Using Semantic Roles to Improve Question Answering

Dan Shen, Mirella Lapata
2007 Conference on Empirical Methods in Natural Language Processing  
Shallow semantic parsing, the automatic identification and labeling of sentential constituents, has recently received much attention.  ...  We introduce a general framework for answer extraction which exploits semantic role annotations in the FrameNet paradigm.  ...  The authors acknowledge the support of DFG (Shen; PhD studentship within the International Postgraduate College "Language Technology and Cognitive Systems") and EPSRC (Lapata; grant EP/C538447/1).  ... 
dblp:conf/emnlp/ShenL07 fatcat:vhloigrnibbppeq4vcjyyagyxm

Combining Dependency Parsing and a Lexical Network Based on Lexical Functions for the Identification of Collocations [chapter]

Alexsandro Fonseca, Fatiha Sadat, François Lareau
2017 Lecture Notes in Computer Science  
Examples of collocations: pay attention, easy as pie, strongly condemn, lend support, etc.  ...  In a dependency parsing, each word (dependent) is directly associated with its governor in a phrase.  ...  The use of a dependency parser can improve precision in the identification of collocations for two reasons.  ... 
doi:10.1007/978-3-319-69805-2_31 fatcat:7z4gj4lckbehbejny5zrlqmn5q

An RFID-based technology for electronic component and system Counterfeit detection and Traceability

Kun Yang, Domenic Forte, Mark Tehranipoor
2015 2015 IEEE International Symposium on Technologies for Homeland Security (HST)  
In this paper, we develop a novel RFID-based system suitable for electronic component and system Counterfeit detection and System Traceability called CST.  ...  The vulnerabilities in today's supply chain have raised serious concerns about the security and trustworthiness of electronic components and systems.  ...  The PIE decoder translates the commands and control parameters from the RFID reader, which is made up of a command parser and a packet parser.  ... 
doi:10.1109/ths.2015.7225279 fatcat:bd7xslz55fh7tbdqa6m5yulokm

An Effective Approach to Biomedical Information Extraction with Limited Training Data [article]

Siddhartha Jonnalagadda
2011 arXiv   pre-print
This approach renders all the advantages offered in other semi-supervised machine learning systems, and, unlike other proposed semi-supervised approaches, it can be used on top of different basic frameworks  ...  More information about the usage of PIE is available at PIE returns positive or negative for each sentence depending on whether or not it detects a PPI in it.  ...  For this reason, and the fact that it uses parse tree information, PIE (Kim et al., 2008) if PIE detects a PPI in either the original sentence or in its simplified version should, in theory, lead  ... 
arXiv:1107.5752v2 fatcat:n7rtfgpvarh7do2xar6opjec5q

VIPLFaceNet: An Open Source Deep Face Recognition SDK [article]

Xin Liu, and Meina Kan, and Wanglong Wu, and Shiguang Shan, Xilin Chen
2016 arXiv   pre-print
The SDK takes about 150ms to process one face image in a single thread on an i7 desktop CPU.  ...  Compared with the well-known AlexNet, our VIPLFaceNet takes only 20% training time and 60% testing time, but achieves 40\% drop in error rate on the real-world face recognition benchmark LFW.  ...  Main components in VIPLFaceNet SDK includes Blob, Command, Layer and Network Parser. Blob. The blob is a container to hold the matrix in deep convolutional neural network.  ... 
arXiv:1609.03892v1 fatcat:vg64x6gx75adxjf4kemkhgd57u

Triage of documents containing protein interactions affected by mutations using an NLP based machine learning approach

Jinchan Qu, Albert Steppi, Dongrui Zhong, Jie Hao, Jian Wang, Pei-Yau Lung, Tingting Zhao, Zhe He, Jinfeng Zhang
2020 BMC Genomics  
Results Our system makes use of latest NLP methods with a large number of engineered features including some based on pre-trained word embedding.  ...  In this study, we developed a natural language processing (NLP) based machine learning approach for extracting such information from literature.  ...  Acknowledgements We thank Yuhang Liu, Zihan Cui, and Linlin Sha for assistance in reading a selection of the abstracts and interpreting the prediction results.  ... 
doi:10.1186/s12864-020-07185-7 pmid:33167858 pmcid:PMC7654050 fatcat:5zx7433izjbnfcq6uehycfnsei

PERF: an exhaustive algorithm for ultra-fast and efficient identification of microsatellites from large DNA sequences

Akshay Kumar Avvaru, Divya Tej Sowpati, Rakesh Kumar Mishra, John Hancock
2017 Bioinformatics  
Results: We present a novel algorithm called PERF for extremely fast and comprehensive identification of microsatellites from DNA sequences of any size.  ...  Numerous studies have highlighted their functional roles in genome organization and gene regulation.  ...  In addition, PERF is OS-agnostic, and works the same on any system where Python can be installed.  ... 
doi:10.1093/bioinformatics/btx721 pmid:29121165 fatcat:q27qoir3tve2hnznt7reuemyre
« Previous Showing results 1 — 15 out of 366 results