6,899 research outputs found
Internet Predictions
More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section
Personalized location prediction for group travellers from spatial-temporal trajectories
In recent years, research on location predictions by mining trajectories of users has attracted a lot of attentions. Existing studies on this topic mostly focus on individual movements, considering the trajectories as solo movements. However, a user usually does not visit locations just for the personal interest. The preference of a travel group has significant impacts on the places they have visited. In this paper, we propose a novel personalized location prediction approach which further takes into account users’ travel group type. To achieve this goal, we propose a new group pattern discovery approach to extract the travel groups from spatial-temporal trajectories of users. Type of the discovered groups, then, are identified through utilizing the profile information of the group members. The core idea underlying our proposal is the discovery of significant movement patterns of users to capture frequent movements by considering the group types. Finally, the problem of location prediction is formulated as an estimation of the probability of a given user visiting a given location based on his/her current movement and his/her group type. To the best of our knowledge, this is the first work on location prediction based on trajectory pattern mining that investigates the influence of travel group type. By means of a comprehensive evaluation using various datasets, we show that our proposed location prediction framework achieves significantly higher performance than previous location prediction methods
Shining Light On Shadow Stacks
Control-Flow Hijacking attacks are the dominant attack vector against C/C++
programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the
forward edge,i.e., indirect calls through function pointers and virtual calls.
Protecting the backward edge is left to stack canaries, which are easily
bypassed through information leaks. Shadow Stacks are a fully precise mechanism
for protecting backwards edges, and should be deployed with CFI mitigations. We
present a comprehensive analysis of all possible shadow stack mechanisms along
three axes: performance, compatibility, and security. For performance
comparisons we use SPEC CPU2006, while security and compatibility are
qualitatively analyzed. Based on our study, we renew calls for a shadow stack
design that leverages a dedicated register, resulting in low performance
overhead, and minimal memory overhead, but sacrifices compatibility. We present
case studies of our implementation of such a design, Shadesmar, on Phoronix and
Apache to demonstrate the feasibility of dedicating a general purpose register
to a security monitor on modern architectures, and the deployability of
Shadesmar. Our comprehensive analysis, including detailed case studies for our
novel design, allows compiler designers and practitioners to select the correct
shadow stack design for different usage scenarios.Comment: To Appear in IEEE Security and Privacy 201
Edge-Cloud Polarization and Collaboration: A Comprehensive Survey for AI
Influenced by the great success of deep learning via cloud computing and the
rapid development of edge chips, research in artificial intelligence (AI) has
shifted to both of the computing paradigms, i.e., cloud computing and edge
computing. In recent years, we have witnessed significant progress in
developing more advanced AI models on cloud servers that surpass traditional
deep learning models owing to model innovations (e.g., Transformers, Pretrained
families), explosion of training data and soaring computing capabilities.
However, edge computing, especially edge and cloud collaborative computing, are
still in its infancy to announce their success due to the resource-constrained
IoT scenarios with very limited algorithms deployed. In this survey, we conduct
a systematic review for both cloud and edge AI. Specifically, we are the first
to set up the collaborative learning mechanism for cloud and edge modeling with
a thorough review of the architectures that enable such mechanism. We also
discuss potentials and practical experiences of some on-going advanced edge AI
topics including pretraining models, graph neural networks and reinforcement
learning. Finally, we discuss the promising directions and challenges in this
field.Comment: 20 pages, Transactions on Knowledge and Data Engineerin
Knowledge-Enhanced Top-K Recommendation in Poincar\'e Ball
Personalized recommender systems are increasingly important as more content
and services become available and users struggle to identify what might
interest them. Thanks to the ability for providing rich information, knowledge
graphs (KGs) are being incorporated to enhance the recommendation performance
and interpretability. To effectively make use of the knowledge graph, we
propose a recommendation model in the hyperbolic space, which facilitates the
learning of the hierarchical structure of knowledge graphs. Furthermore, a
hyperbolic attention network is employed to determine the relative importances
of neighboring entities of a certain item. In addition, we propose an adaptive
and fine-grained regularization mechanism to adaptively regularize items and
their neighboring representations. Via a comparison using three real-world
datasets with state-of-the-art methods, we show that the proposed model
outperforms the best existing models by 2-16% in terms of NDCG@K on Top-K
recommendation.Comment: Accepted by the 35th AAAI Conference on Artificial Intelligence (AAAI
2021
- …