Filters








4,220 Hits in 4.8 sec

Seven Commandments for Benchmarking Semantic Flow Processing Systems [chapter]

Thomas Scharrenbach, Jacopo Urbani, Alessandro Margara, Emanuele Della Valle, Abraham Bernstein
2013 Lecture Notes in Computer Science  
Specifically, we identify three Key Performance Indicators (KPIs) and seven commandments that specify how to design the stress tests for system evaluation.  ...  Specifically, we identify three Key Performance Indicators (KPIs) and seven commandments that specify how to design the stress tests for system evaluation. Abstract.  ...  Related Work This section presents related work in the area of IFP and SFP systems, and in the area of benchmarks for flow-processing systems. Flow Processing Systems.  ... 
doi:10.1007/978-3-642-38288-8_21 fatcat:qndbpgfyh5g2jcp27kt7rtes44

Semantic Fusion for Natural Multimodal Interfaces using Concurrent Augmented Transition Networks

Chris Zimmerer, Martin Fischbach, Marc Latoschik
2018 Multimodal Technologies and Interaction  
We identify seven fundamental requirements for the implementation of semantic fusion: Action derivation, continuous feedback, context-sensitivity, temporal relation support, access to the interaction context  ...  Semantic fusion is a central requirement of many multimodal interfaces.  ...  The upper flow chart outlines the behavior of the CATN's parser upon receiving input. The bottom flow chart is a more in depth description of the Process Input step of the upper flow chart.  ... 
doi:10.3390/mti2040081 fatcat:xnatqujmufafpbtkw4fo6hsauu

HMTT: A Hybrid Hardware/Software Tracing System for Bridging Memory Trace's Semantic Gap [article]

Yungang Bao, Jinyong Zhang, Yan Zhu, Dan Tang, Yuan Ruan, Mingyu Chen, Jianping Fan
2011 arXiv   pre-print
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements.  ...  Compared with software-based approaches, memory traces collected by hardware-based approaches are usually lack of semantic information, such as process/function/loop identifiers, virtual address and I/  ...  Top-Level Design At the top-level, the HMTT tracing system mainly consists of seven procedures for memory trace tracking and replaying. Figure 4 shows the system framework and the seven procedures.  ... 
arXiv:1106.2568v1 fatcat:ubishigqbve5jlvmygza5lynda

SystemJ compilation using the tandem virtual machine approach

Avinash Malik, Zoran Salcic, Partha S. Roop
2009 ACM Transactions on Design Automation of Electronic Systems  
Initial compilation of SystemJ has been to standard Java executing on a Java Virtual Machine (JVM), which is both inefficient and bulky for small embedded systems.  ...  The benchmark results show that the TVM has code size improvements of over 60% on average and also a substantial improvement in execution speed over standard Java based compilation.  ...  It explicitly describes the complex control flow through seven primitive nodes. Signal emissions are represented using action nodes (rectangles) and state encoding with enter nodes (ellipses).  ... 
doi:10.1145/1529255.1529256 fatcat:kccw76d5vvbexdver3w2psan3q

Automated partitioning of android applications for trusted execution environments

Konstantin Rubinov, Lucia Rosculete, Tulika Mitra, Abhik Roychoudhury
2016 Proceedings of the 38th International Conference on Software Engineering - ICSE '16  
We also reduce the overhead due to transitions between the two worlds by choosing appropriate granularity for the TEE commands.  ...  We develop an approach for automated partitioning of critical Android applications into "client" code to be run in the "normal" world and "TEE commands" encapsulating the handling of confidential data  ...  Acknowledgments We thank Mingyuan Gao, Nithilan Meenakshi Karunakaran, and Manh Dung Nguyen for help with experimental setup.  ... 
doi:10.1145/2884781.2884817 dblp:conf/icse/RubinovRMR16 fatcat:h36gfymct5gnjg4z65iynkwxk4

On the Evolution of BPMN 2.0 Support and Implementation

Matthias Geiger, Simon Harrer, Jorg Lenhard, Guido Wirtz
2016 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)  
The expectation is that vendors of business process management systems (BPMS) will switch to the new standard and natively support its execution in process engines.  ...  The Business Process Model and Notation 2.0 (BPMN) standard has been hailed as a major step in business process modeling and automation. Recently, it has also been accepted as an ISO standard.  ...  ACKNOWLEDGMENTS We would like to thank the students of the University of Bamberg who contributed to the benchmarking system used in this paper during software development projects.  ... 
doi:10.1109/sose.2016.39 dblp:conf/sose/GeigerHLW16 fatcat:p4y4nbbazbbxda6habeioocusm

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps [chapter]

Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu
2015 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
App process details are extracted from the Android /proc file system [6].  ...  System call collection is performed via Strace [7], a low-latency utility for Linux and other Unix-like systems. Binder transactions are recorded by accessing Binder module logs via sysfs [8].  ...  NDroid [18] is a supplementary of TaintDroid, which is aware of the JNI semantic to track the data flow in the native code.  ... 
doi:10.1007/978-3-319-28865-9_4 fatcat:enuvfzcm7zcofn4csqsanmk3ve

YABench: A Comprehensive Framework for RDF Stream Processor Correctness and Performance Assessment [chapter]

Maxim Kolchin, Peter Wetz, Elmar Kiesling, A Min Tjoa
2016 Lecture Notes in Computer Science  
In this paper, we introduce YABench, a novel benchmarking framework for RSP engines.  ...  RDF stream processing (RSP) has become a vibrant area of research in the semantic web community.  ...  Due to the focus on functional aspects, SRBench does not recognize differences in the operational semantics of the benchmarked systems.  ... 
doi:10.1007/978-3-319-38791-8_16 fatcat:mclqdno75zgvpaqpy6ofm56s3a

Free Supervision from Video Games

Philipp Krahenbuhl
2018 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition  
This code produces ground truth labels for instance segmentation, semantic labeling, depth estimation, optical flow, intrinsic image decomposition, and instance tracking.  ...  Deep networks are extremely hungry for data. They devour hundreds of thousands of labeled images to learn robust and semantically meaningful feature representations.  ...  Acknowledgment We would like to thank Angela Lin and Thomas Crosley for helpful discussions. This work was supported in part by Berkeley DeepDrive and an equipment grant from Nvidia.  ... 
doi:10.1109/cvpr.2018.00312 dblp:conf/cvpr/Krahenbuhl18 fatcat:ozb754jynrbwvailfz7lnr5fmy

Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security [article]

Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer
2020 arXiv   pre-print
For ML to make more of an impact in the InfoSec community requires a change in the data (including the features and labels) that is used to bridge the current semantic gap.  ...  In this paper, we survey existing datasets used for classifying malware by ML algorithms and the features that are extracted from the data.  ...  ., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525. SAND2020-4695 C  ... 
arXiv:2005.01800v1 fatcat:jak3m7fom5fu5lziqcadh5tmsa

Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems

Mohamad El Hariri, Samy Faddel, Osama Mohammed
2018 Sensors  
The output of the AI is processed through an expert system to verify that incoming control commands do not violate the physical system operational constraints and do not put the power system in an insecure  ...  The proposed content-aware IDS is tested in simulation on a 14-bus IEEE benchmark system.  ...  In [1], a semantic analysis framework, which integrates network IDS with power flow analysis was proposed to detect malicious control commands.  ... 
doi:10.3390/s18082478 pmid:30065218 fatcat:kf523ujiy5apbatzs3uymyvqwi

CheckerCore

Jin Ouyang, Raghuveer Raghavendra, Sibin Mohan, Tao Zhang, Yuan Xie, Frank Mueller
2009 Proceedings of the 2009 international conference on Compilers, architecture, and synthesis for embedded systems - CASES '09  
This section gives an overview of the process of determining the WCET for a program section and the commands exchanged between the TA and the CheckerCore during the process.  ...  Cost is secondary as the timing process may be performed in the background overnight, i.e., this process does not affect the actual runtime behavior of the embedded system on deployment.  ... 
doi:10.1145/1629395.1629421 dblp:conf/cases/OuyangRMZXM09 fatcat:vvzn4gupfjhollfvhnpbidvapu

Compilation for explicitly managed memory hierarchies

Timothy J. Knight, Ji Young Park, Manman Ren, Mike Houston, Mattan Erez, Kayvon Fatahalian, Alex Aiken, William J. Dally, Pat Hanrahan
2007 Proceedings of the 12th ACM SIGPLAN symposium on Principles and practice of parallel programming - PPoPP '07  
We evaluate the performance of our compiler using several benchmarks running on a Cell processor.  ...  We present a compiler for machines with an explicitly managed memory hierarchy and suggest that a primary role of any compiler for such architectures is to manipulate and schedule a hierarchy of bulk operations  ...  Acknowledgements We would like to thank Daniel Reiter Horn for his assistance with the HMMER application.  ... 
doi:10.1145/1229428.1229477 dblp:conf/ppopp/KnightPRHEFADH07 fatcat:kpaghmbhfrh73dnl2r5gniv5tm

Magma: A Ground-Truth Fuzzing Benchmark [article]

Ahmad Hazimeh, Adrian Herrera, Mathias Payer
2020 arXiv   pre-print
Magma is an open benchmark consisting of seven targets that perform a variety of input manipulations and complex computations, presenting a challenge to state-of-the-art fuzzers.  ...  High scalability and low running costs have made fuzz testing the de facto standard for discovering software bugs.  ...  ., system calls, libraries, file system).  ... 
arXiv:2009.01120v1 fatcat:5uskgzhfnjhejask3ymynh6sha

Parallel gesture recognition with soft real-time guarantees

Stefan Marr, Thierry Renaux, Lode Hoste, Wolfgang De Meuter
2015 Science of Computer Programming  
We propose PARTE, a parallel scalable complex event processing engine which allows a declarative definition of event patterns and provides soft real-time guarantees for their recognition.  ...  In our benchmarks, we measured scalability up to 8 cores, outperforming highly optimized sequential implementations.  ...  We used 13 different benchmarks for the evaluation. Each benchmark consists of a set of rules and a set of pregenerated events to be fed into the system.  ... 
doi:10.1016/j.scico.2014.02.012 fatcat:afliqgmml5habpsbhzxsozr3ly
« Previous Showing results 1 — 15 out of 4,220 results