5,529 research outputs found
Witt vector rings and quotients of monoid algebras
In a previous paper Cuntz and Deninger introduced the ring for a
perfect -algebra . The ring is canonically isomorphic
to the -typical Witt ring . In fact there exist canonical isomorphisms
. In this paper we
give explicit descriptions of the isomorphisms for if
.Comment: 6 page
An Efficient Loop-free Version of AODVv2
Ad hoc On Demand distance Vector (AODV) routing protocol is one of the most
prominent routing protocol used in Mobile Ad-hoc Networks (MANETs). Due to the
mobility of nodes, there exists many revisions as scenarios leading to the loop
formation were found. We demonstrate the loop freedom property violation of
AODVv2-11, AODVv2-13, and AODVv2-16 through counterexamples. We present our
proposed version of AODVv2 precisely which not only ensures loop freedom but
also improves the performance
Combinatorial Entropy Power Inequalities: A Preliminary Study of the Stam region
We initiate the study of the Stam region, defined as the subset of the
positive orthant in that arises from considering entropy
powers of subset sums of independent random vectors in a Euclidean space of
finite dimension. We show that the class of fractionally superadditive set
functions provides an outer bound to the Stam region, resolving a conjecture of
A. R. Barron and the first author. On the other hand, the entropy power of a
sum of independent random vectors is not supermodular in any dimension. We also
develop some qualitative properties of the Stam region, showing for instance
that its closure is a logarithmically convex cone.Comment: 16 page
Hybrid Rebeca: Modeling and Analyzing of Cyber-Physical Systems
In cyber-physical systems like automotive systems, there are components like
sensors, actuators, and controllers that communicate asynchronously with each
other. The computational model of actor supports modeling distributed
asynchronously communicating systems. We propose Hybrid Rebeca language to
support modeling of cyber-physical systems. Hybrid Rebeca is an extension of
actor-based language Rebeca. In this extension, physical actors are introduced
as new computational entities to encapsulate physical behaviors. To support
various means of communication among the entities, the network is explicitly
modeled as a separate entity from actors. We derive hybrid automata as the
basis for analysis of Hybrid Rebeca models. We demonstrate the applicability of
our approach through a case study in the domain of automotive systems. We use
SpaceEx framework for the analysis of the case study
Modeling and Efficient Verification of Wireless Ad hoc Networks
Wireless ad hoc networks, in particular mobile ad hoc networks (MANETs), are
growing very fast as they make communication easier and more available.
However, their protocols tend to be difficult to design due to topology
dependent behavior of wireless communication, and their distributed and
adaptive operations to topology dynamism. Therefore, it is desirable to have
them modeled and verified using formal methods. In this paper, we present an
actor-based modeling language with the aim to model MANETs. We address main
challenges of modeling wireless ad hoc networks such as local broadcast,
underlying topology, and its changes, and discuss how they can be efficiently
modeled at the semantic level to make their verification amenable. The new
framework abstracts the data link layer services by providing asynchronous
(local) broadcast and unicast communication, while message delivery is in order
and is guaranteed for connected receivers. We illustrate the applicability of
our framework through two routing protocols, namely flooding and AODVv2-11, and
show how efficiently their state spaces can be reduced by the proposed
techniques. Furthermore, we demonstrate a loop formation scenario in AODV,
found by our analysis tool
The Use of Autoencoders for Discovering Patient Phenotypes
We use autoencoders to create low-dimensional embeddings of underlying
patient phenotypes that we hypothesize are a governing factor in determining
how different patients will react to different interventions. We compare the
performance of autoencoders that take fixed length sequences of concatenated
timesteps as input with a recurrent sequence-to-sequence autoencoder. We
evaluate our methods on around 35,500 patients from the latest MIMIC III
dataset from Beth Israel Deaconess Hospital
ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps
In this paper, we present a concolic execution technique for detecting SQL
injection vulnerabilities in Android apps, with a new tool we called
ConsiDroid. We extend the source code of apps with mocking technique, such that
the execution of original source code is not affected. The extended source code
can be treated as Java applications and may be executed by SPF with concolic
execution. We automatically produce a DummyMain class out of static analysis
such that the essential functions are called sequentially and, the events
leading to vulnerable functions are triggered. We extend SPF with taint
analysis in ConsiDroid. For making taint analysis possible, we introduce a new
technique of symbolic mock classes in order to ease the propagation of tainted
values in the code. An SQL injection vulnerability is detected through
receiving a tainted value by a vulnerable function. Besides, ConsiDroid takes
advantage of static analysis to adjust SPF in order to inspect only suspicious
paths. To illustrate the applicability of ConsiDroid, we have inspected
randomly selected 140 apps from F-Droid repository. From these apps, we found
three apps vulnerable to SQL injection. To verify their vulnerability, we
analyzed the apps manually based on ConsiDroid's reports by using Robolectric
Sync-and-Burst: Force-Directed Graph Drawing with Uniform Force Magnitudes
We introduce a force-directed algorithm, called Sync-and-Burst, which falls
into the category of classical force-directed graph drawing algorithms. A
distinct feature in Sync-and-Burst is the use of simplified forces of
attraction and repulsion whose magnitude does not depend on the distance
between vertices. Instead, magnitudes are uniform throughout the graph at each
iteration and monotonically increase as the number of iterations grows. The
Sync-and-Burst layouts are always circular in shape with relatively even
distribution of vertices throughout the drawing area. We demonstrate that
aesthetically pleasing layouts are achieved in O(n) iterations.Comment: 12 page
Verification of Asynchronous Systems with an Unspecified Component
Component-based systems evolve as a new component is added or an existing one
is replaced by a newer version. Hence, it is appealing to assure the new system
still preserves its safety properties. However, instead of inspecting the new
system as a whole, which may result in a large state space, it is beneficial to
reuse the verification results by inspecting the newly added component in
isolation. To this aim, we study the problem of model checking component-based
asynchronously communicating systems in the presence of an unspecified
component against safety properties. Our solution is based on assume-guarantee
reasoning, adopted for asynchronous environments, which generates the weakest
assumption. If the newly added component conforms to the assumption, then the
whole system still satisfies the property. To make the approach efficient and
convergent, we produce an overapproximated interface of the missing component
and by its composition with the rest of the system components, we achieve an
overapproximated specification of the system, from which we remove those traces
of the system that violate the property and generate an assumption for the
missing component.
We have implemented our approach on two case studies. Furthermore, we
compared our results with the state of the art direct approach. Our resulting
assumptions are smaller in size and achieved faster
Decentralized Task Allocation in Multi-Robot Systems via Bipartite Graph Matching Augmented with Fuzzy Clustering
Robotic systems, working together as a team, are becoming valuable players in
different real-world applications, from disaster response to warehouse
fulfillment services. Centralized solutions for coordinating multi-robot teams
often suffer from poor scalability and vulnerability to communication
disruptions. This paper develops a decentralized multi-agent task allocation
(Dec-MATA) algorithm for multi-robot applications. The task planning problem is
posed as a maximum-weighted matching of a bipartite graph, the solution of
which using the blossom algorithm allows each robot to autonomously identify
the optimal sequence of tasks it should undertake. The graph weights are
determined based on a soft clustering process, which also plays a problem
decomposition role seeking to reduce the complexity of the individual-agents'
task assignment problems. To evaluate the new Dec-MATA algorithm, a series of
case studies (of varying complexity) are performed, with tasks being
distributed randomly over an observable 2D environment. A centralized approach,
based on a state-of-the-art MILP formulation of the multi-Traveling Salesman
problem is used for comparative analysis. While getting within 7-28% of the
optimal cost obtained by the centralized algorithm, the Dec-MATA algorithm is
found to be 1-3 orders of magnitude faster and minimally sensitive to
task-to-robot ratios, unlike the centralized algorithm.Comment: The ASME 2018 International Design Engineering Technical Conferences
& Computers and Information in Engineering Conferenc
- …
