8,733 research outputs found
An empirical Bayes approach to identification of modules in dynamic networks
We present a new method of identifying a specific module in a dynamic
network, possibly with feedback loops. Assuming known topology, we express the
dynamics by an acyclic network composed of two blocks where the first block
accounts for the relation between the known reference signals and the input to
the target module, while the second block contains the target module. Using an
empirical Bayes approach, we model the first block as a Gaussian vector with
covariance matrix (kernel) given by the recently introduced stable spline
kernel. The parameters of the target module are estimated by solving a marginal
likelihood problem with a novel iterative scheme based on the
Expectation-Maximization algorithm. Additionally, we extend the method to
include additional measurements downstream of the target module. Using Markov
Chain Monte Carlo techniques, it is shown that the same iterative scheme can
solve also this formulation. Numerical experiments illustrate the effectiveness
of the proposed methods
Learning linear modules in a dynamic network using regularized kernel-based methods
In order to identify one system (module) in an interconnected dynamic
network, one typically has to solve a Multi-Input-Single-Output (MISO)
identification problem that requires identification of all modules in the MISO
setup. For application of a parametric identification method this would require
estimating a large number of parameters, as well as an appropriate model order
selection step for a possibly large scale MISO problem, thereby increasing the
computational complexity of the identification algorithm to levels that are
beyond feasibility. An alternative identification approach is presented
employing regularized kernel-based methods. Keeping a parametric model for the
module of interest, we model the impulse response of the remaining modules in
the MISO structure as zero mean Gaussian processes (GP) with a covariance
matrix (kernel) given by the first-order stable spline kernel, accounting for
the noise model affecting the output of the target module and also for possible
instability of systems in the MISO setup. Using an Empirical Bayes (EB)
approach the target module parameters are estimated through an
Expectation-Maximization (EM) algorithm with a substantially reduced
computational complexity, while avoiding extensive model structure selection.
Numerical simulations illustrate the potentials of the introduced method in
comparison with the state-of-the-art techniques for local module
identification.Comment: 15 pages, 7 figures, Submitted for publication in Automatica, 12 May
2020. Final version of paper submitted on 06 January 2021 (To appear in
Automatica
Towards Automated Performance Bug Identification in Python
Context: Software performance is a critical non-functional requirement,
appearing in many fields such as mission critical applications, financial, and
real time systems. In this work we focused on early detection of performance
bugs; our software under study was a real time system used in the
advertisement/marketing domain.
Goal: Find a simple and easy to implement solution, predicting performance
bugs.
Method: We built several models using four machine learning methods, commonly
used for defect prediction: C4.5 Decision Trees, Na\"{\i}ve Bayes, Bayesian
Networks, and Logistic Regression.
Results: Our empirical results show that a C4.5 model, using lines of code
changed, file's age and size as explanatory variables, can be used to predict
performance bugs (recall=0.73, accuracy=0.85, and precision=0.96). We show that
reducing the number of changes delivered on a commit, can decrease the chance
of performance bug injection.
Conclusions: We believe that our approach can help practitioners to eliminate
performance bugs early in the development cycle. Our results are also of
interest to theoreticians, establishing a link between functional bugs and
(non-functional) performance bugs, and explicitly showing that attributes used
for prediction of functional bugs can be used for prediction of performance
bugs
Spatial Guilds in the Serengeti Food Web Revealed by a Bayesian Group Model
Food webs, networks of feeding relationships among organisms, provide
fundamental insights into mechanisms that determine ecosystem stability and
persistence. Despite long-standing interest in the compartmental structure of
food webs, past network analyses of food webs have been constrained by a
standard definition of compartments, or modules, that requires many links
within compartments and few links between them. Empirical analyses have been
further limited by low-resolution data for primary producers. In this paper, we
present a Bayesian computational method for identifying group structure in food
webs using a flexible definition of a group that can describe both functional
roles and standard compartments. The Serengeti ecosystem provides an
opportunity to examine structure in a newly compiled food web that includes
species-level resolution among plants, allowing us to address whether groups in
the food web correspond to tightly-connected compartments or functional groups,
and whether network structure reflects spatial or trophic organization, or a
combination of the two. We have compiled the major mammalian and plant
components of the Serengeti food web from published literature, and we infer
its group structure using our method. We find that network structure
corresponds to spatially distinct plant groups coupled at higher trophic levels
by groups of herbivores, which are in turn coupled by carnivore groups. Thus
the group structure of the Serengeti web represents a mixture of trophic guild
structure and spatial patterns, in contrast to the standard compartments
typically identified in ecological networks. From data consisting only of nodes
and links, the group structure that emerges supports recent ideas on spatial
coupling and energy channels in ecosystems that have been proposed as important
for persistence.Comment: 28 pages, 6 figures (+ 3 supporting), 2 tables (+ 4 supporting
Local module identification in dynamic networks with correlated noise: the full input case
The identification of local modules in dynamic networks with known topology
has recently been addressed by formulating conditions for arriving at
consistent estimates of the module dynamics, typically under the assumption of
having disturbances that are uncorrelated over the different nodes. The
conditions typically reflect the selection of a set of node signals that are
taken as predictor inputs in a MISO identification setup. In this paper an
extension is made to arrive at an identification setup for the situation that
process noises on the different node signals can be correlated with each other.
In this situation the local module may need to be embedded in a MIMO
identification setup for arriving at a consistent estimate with maximum
likelihood properties. This requires the proper treatment of confounding
variables. The result is an algorithm that, based on the given network topology
and disturbance correlation structure, selects an appropriate set of node
signals as predictor inputs and outputs in a MISO or MIMO identification setup.
As a first step in the analysis, we restrict attention to the (slightly
conservative) situation where the selected output node signals are predicted
based on all of their in-neighbor node signals in the network.Comment: Extended version of paper submitted to the 58th IEEE Conf. Decision
and Control, Nice, 201
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph
As the security landscape evolves over time, where thousands of species of
malicious codes are seen every day, antivirus vendors strive to detect and
classify malware families for efficient and effective responses against malware
campaigns. To enrich this effort, and by capitalizing on ideas from the social
network analysis domain, we build a tool that can help classify malware
families using features driven from the graph structure of their system calls.
To achieve that, we first construct a system call graph that consists of system
calls found in the execution of the individual malware families. To explore
distinguishing features of various malware species, we study social network
properties as applied to the call graph, including the degree distribution,
degree centrality, average distance, clustering coefficient, network density,
and component ratio. We utilize features driven from those properties to build
a classifier for malware families. Our experimental results show that
influence-based graph metrics such as the degree centrality are effective for
classifying malware, whereas the general structural metrics of malware are less
effective for classifying malware. Our experiments demonstrate that the
proposed system performs well in detecting and classifying malware families
within each malware class with accuracy greater than 96%.Comment: Mathematical Problems in Engineering, Vol 201
Estimating effective connectivity in linear brain network models
Contemporary neuroscience has embraced network science to study the complex
and self-organized structure of the human brain; one of the main outstanding
issues is that of inferring from measure data, chiefly functional Magnetic
Resonance Imaging (fMRI), the so-called effective connectivity in brain
networks, that is the existing interactions among neuronal populations. This
inverse problem is complicated by the fact that the BOLD (Blood Oxygenation
Level Dependent) signal measured by fMRI represent a dynamic and nonlinear
transformation (the hemodynamic response) of neuronal activity. In this paper,
we consider resting state (rs) fMRI data; building upon a linear population
model of the BOLD signal and a stochastic linear DCM model, the model
parameters are estimated through an EM-type iterative procedure, which
alternately estimates the neuronal activity by means of the Rauch-Tung-Striebel
(RTS) smoother, updates the connections among neuronal states and refines the
parameters of the hemodynamic model; sparsity in the interconnection structure
is favoured using an iteratively reweighting scheme. Experimental results using
rs-fMRI data are shown demonstrating the effectiveness of our approach and
comparison with state of the art routines (SPM12 toolbox) is provided
- …