474 research outputs found

    FeladatfĂŒggƑ felĂ©pĂ­tĂ©sƱ többprocesszoros cĂ©lrendszerek szintĂ©zis algoritmusainak kutatĂĄsa = Research of synthesis algorithms for special-purpose multiprocessing systems with task-dependent architecture

    Get PDF
    Új mĂłdszert Ă©s egy keretrendszert fejlesztettĂŒnk ki olyan speciĂĄlis többprocesszoros struktĂșra tervezĂ©sĂ©re, amely lehetƑvĂ© teszi a pipeline mƱködtetĂ©st akkor is, ha a feladat-leĂ­rĂĄsban nincs hatĂ©konyan kihasznĂĄlhatĂł pĂĄrhuzamossĂĄg. A szintĂ©zis egy magas szintƱ nyelven (C, Java, stb.) adott feladatleĂ­rĂĄsbĂłl indul ki. EzutĂĄn dekompozĂ­ciĂłs algoritmus megfelelƑ szegmenseket kĂ©pez a program alapjĂĄn. A szegmensek kĂ­vĂĄnt szĂĄma, a szegmenseket megvalĂłsĂ­tĂł processzorok fƑbb tulajdonsĂĄgai Ă©s a becsĂŒlt kommunikĂĄciĂłs idƑigĂ©nyek megadhatĂłk bemeneti paramĂ©terekkĂ©nt. KedvezƑ pipeline felĂ©pĂ­tĂ©s cĂ©ljĂĄbĂłl a pipeline adatfolyamok magas szintƱ szintĂ©zisĂ©nek (HLS) mĂłdszertanĂĄt alkalmaztuk. Ezek az eszközök az ĂŒtemezĂ©s Ă©s az allokĂĄciĂł rĂ©vĂ©n kĂ­sĂ©rlik meg az optimalizĂĄlĂĄst a szegmensekbƑl kĂ©pzett adatfolyam grĂĄfon. EzĂ©rt a kiadĂłdĂł többprocesszoros felĂ©pĂ­tĂ©s nem egy uniformizĂĄlt processzor-rĂĄcs, hanem a megoldandĂł feladatra formĂĄlt struktĂșra, Ă­gy feladatfĂŒggƑnek nevezhetƑ. A mĂłdszer modularitĂĄsa lehetƑvĂ© teszi a dekompozĂ­ciĂłs algoritmusnak Ă©s a HLS eszköznek a cserĂ©jĂ©t, mĂłdosĂ­tĂĄsĂĄt az alkalmazĂĄsi igĂ©nyektƑl fĂŒggƑen. A mĂłdszer kiĂ©rtĂ©kelĂ©se cĂ©ljĂĄbĂłl olyan HLS eszközt alkalmaztunk, amely a kĂ­vĂĄnt pipeline ĂșjraindĂ­tĂĄsi periĂłdust bemeneti adatkĂ©nt tudja kezelni, Ă©s processzorok között egy optimalizĂĄlt idƑosztĂĄsos, arbitrĂĄciĂł-mentes sĂ­nrendszert hoz lĂ©tre. Ebben a struktĂșrĂĄban a kommunikĂĄciĂł szervezĂ©sĂ©hez nincs szĂŒksĂ©g kĂŒlön szoftver tĂĄmogatĂĄsra, ha a processzorok kĂ©pesek közvetlen adatforgalomra. | A new method and a framework tool has been developed for designing a special multiprocessing structure for making the pipeline function possible as a special parallel processing, even if there is no efficiently exploitable parallelism in the task description. The synthesis starts from a task description written in a high level language (C, Java, etc). A decomposing algorithm generates proper segments of this program. The desired number of the segments, the main properties of the processor set implementing the segments and the estimated communication time-demand can be given as input parameters. For constructing a pipeline structure, the high-level synthesis (HLS) methodology of pipelined datapaths is applied. These tools attempt to optimize by scheduling and allocating the dataflow graph generated from the segments Thus, the resulted structure is not a uniform processor grid, but it is shaped depending on the task, i.e. it can be called task-dependent. The modularity of the method permits the decomposition algorithm and the HLS tool to be replaced by other ones depending on the requirements of the application. For evaluating the method, a specific HLS tool is applied, which can accept the desired pipeline restart time as input parameter, and generates an optimized time shared simple arbitration-free bus system between the processing units. Therefore, there is no need for extra efforts to organize the communication, if the processing units can transfer data directly

    Automated android malware detection using user feedback

    Get PDF
    The widespread usage of mobile devices and their seamless adaptation to each user’s needs through useful applications (apps) makes them a prime target for malware developers. Malware is software built to harm the user, e.g., to access sensitive user data, such as banking details, or to hold data hostage and block user access. These apps are distributed in marketplaces that host millions and therefore have their forms of automated malware detection in place to deter malware developers and keep their app store (and reputation) trustworthy. Nevertheless, a non-negligible number of apps can bypass these detectors and remain available in the marketplace for any user to download and install on their device. Current malware detection strategies rely on using static or dynamic app extracted features (or a combination of both) to scale the detection and cover the growing number of apps submitted to the marketplace. In this paper, the main focus is on the apps that bypass the malware detectors and stay in the marketplace long enough to receive user feedback. This paper uses real-world data provided by an app store. The quantitative ratings and potential alert flags assigned to the apps by the users were used as features to train machine learning classifiers that successfully classify malware that evaded previous detection attempts. These results present reasonable accuracy and thus work to help to maintain a user-safe environment.info:eu-repo/semantics/publishedVersio

    Framework of hierarchy for neural theory

    Get PDF

    Airy processes and variational problems

    Full text link
    We review the Airy processes; their formulation and how they are conjectured to govern the large time, large distance spatial fluctuations of one dimensional random growth models. We also describe formulas which express the probabilities that they lie below a given curve as Fredholm determinants of certain boundary value operators, and the several applications of these formulas to variational problems involving Airy processes that arise in physical problems, as well as to their local behaviour.Comment: Minor corrections. 41 pages, 4 figures. To appear as chapter in "PASI Proceedings: Topics in percolative and disordered systems

    idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining

    Get PDF
    This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed strategy where the functionalities are structured on layers. SQL-injection attacks, one of the most dangerous attacks to online databases, are the focus of this research. The agents in each one of the layers are specialized in specific tasks, such as data gathering, data classification, and visualization. This study presents two key agents under a hybrid architecture: a classifier agent that incorporates a Case-Based Reasoning engine employing advanced algorithms in the reasoning cycle stages, and a visualizer agent that integrates several techniques to facilitate the visual analysis of suspicious queries. The former incorporates a new classification model based on a mixture of a neural network and a Support Vector Machine in order to classify SQL queries in a reliable way. The latter combines clustering and neural projection techniques to support the visual analysis and identification of target attacks. The proposed approach was tested in a real-traffic case study and its experimental results, which validate the performance of the proposed approach, are presented in this paperSpanish Ministry of Science projects OVAMAH (TIN 2009-13839-C03-03) and MIDAS (TIN 2010-21272-C02-01), funded by the European Regional Development Fund, projects of the Junta of Castilla and Leon BU006A08 and JCYL-2002-05; Projects of the Spanish Government SA071A08, CIT-020000-2008-2 and CIT-020000-2009-12; the Professional Excellence Program 2006-2010 IFARHU-SENACYT-Panama. The authors would also like to thank the vehicle interior manufacturer, Grupo Antolin Ingenieria S.A., within the framework of the project MAGNO2008 - 1028. - CENIT Project funded by the Spanish Ministry

    DETERMINING VALUE DIMENSIONS FOR AN ALL-ENCOMPASSING SERVICE EVALUATION

    Get PDF
    Purpose – All along its evolution, service logic strongly focuses on the meaning of service value and where it resides within a service development process, shifting from its conception as a service attribute to be created by the service provider to a focus on value-in-use and value-in-context as elements emerging from the user experience. The purpose of this paper is to reflect upon how to determine value dimensions emerging from each value creation sphere in order to evaluate the overall service performance both from a provider and a user perspective. Design/Methodology/approach – The authors explores in parallel service logic studies in the field of marketing and management and evaluation studies in the field of social sciences in order to define a service evaluation model. The model will be exemplified through the application to a service in the healthcare sector. Final considerations will be done upon the use of the model as a tool for shifting the reflection on value creation from theory to practice. Findings – Even though in theory of service logic there is a quite clear understanding of service value creation dynamics for all the actors involved (provider, user and other stakeholders), evaluation in the service field is still focused on evaluating processes mainly from a provider perspective. A systemic vision determining the value of the overall service performance is missing. Considering evaluation as a process aimed at a critical analysis of data collected to support a judgment, with the purpose of triggering a change in what is being evaluated, the paper proposes a reflection within the value creation spheres based on three different evaluation moments (ex-ante, in-itinere, ex-post) and considering both a provider and a user perspective. The output consists of an evaluation model that reflects upon how to determine and evaluate value dimensions that are meaningful for the service provider in value-facilitation activities and for the service user in value-creation activities, thus gaining understanding of service value from both perspectives in the so called co-creation sphere. Research limitations/implications – The authors bridge service studies and evaluation studies to start approaching the concept of service evaluation as a further development of service logic. Originality/value – The paper faces the service evaluation issue from a service logic perspective, introducing a new topic in the field and a way to approach it thanks to a reflection upon the process of determination of service evaluation objects and value dimensions

    Rethinking IT governance for SMEs

    Get PDF
    Purpose - The purpose of this paper is to critically rethink the concepts and the theoretical foundations of IT governance in small- and medium-sized enterprises (SMEs). Design/methodology/approach - The paper is based on multiple case studies. In total, eight cases of outsourced information system projects where failures occurred were selected. An outsourced information system failure (OISF) is suggested as a failure of governance of the IT in a SME environment. A structure for stating propositions derived from two competing theories is proposed (Agency Theory and Theory of Trust). Findings - The results reveal that trust is slightly more important than control issues such as output-based contracts and structured controls in the governance of IT in SMEs. Practical implications - The world of SMEs is significantly different from that of large companies, and therefore, the concept of IT governance in SMEs needs reconsideration. For researchers and practitioners, it would be more meaningful to focus on actual, working SMEs instead of on a version of their activities derived from those of large companies. Originality/value - The paper offers two contributions. First, it elaborates the limited research on IT in SMEs and second, it brings theoretical foundations for their IT governance. The value of IT governance in SMEs is explained
    • 

    corecore