2,211 research outputs found

    Searching for Smallest Grammars on Large Sequences and Application to DNA

    Get PDF
    International audienceMotivated by the inference of the structure of genomic sequences, we address here the smallest grammar problem. In previous work, we introduced a new perspective on this problem, splitting the task into two different optimization problems: choosing which words will be considered constituents of the final grammar and finding a minimal parsing with these constituents. Here we focus on making these ideas applicable on large sequences. First, we improve the complexity of existing algorithms by using the concept of maximal repeats when choosing which substrings will be the constituents of the grammar. Then, we improve the size of the grammars by cautiously adding a minimal parsing optimization step. Together, these approaches enable us to propose new practical algorithms that return smaller grammars (up to 10\%) in approximately the same amount of time than their competitors on a classical set of genomic sequences and on whole genomes of model organisms

    A Review of Subsequence Time Series Clustering

    Get PDF
    Clustering of subsequence time series remains an open issue in time series clustering. Subsequence time series clustering is used in different fields, such as e-commerce, outlier detection, speech recognition, biological systems, DNA recognition, and text mining. One of the useful fields in the domain of subsequence time series clustering is pattern recognition. To improve this field, a sequence of time series data is used. This paper reviews some definitions and backgrounds related to subsequence time series clustering. The categorization of the literature reviews is divided into three groups: preproof, interproof, and postproof period. Moreover, various state-of-the-art approaches in performing subsequence time series clustering are discussed under each of the following categories. The strengths and weaknesses of the employed methods are evaluated as potential issues for future studies

    Master of Music in Composition

    Get PDF
    This portfolio of compositions involved the creation of multimedia works within the context of collaborative artistic practice. This interest has resulted from my increasing participation in multidisciplinary collaborative projects in recent years as a composer and singer. In the portfolio of works I have drawn on a range of theoretical texts from the fields of cognitive science, psychology, sociology and spirituality to develop a supportive discourse with which to reflect on the creative intersection of activities. Five collaborative compositions were created and realised. These range from a self-generative installation to a traditional film score. To examine the creative process, I have constructed a continuum that situates each piece between polarities of product or process-driven work. On one side of this continuum is Beads, a generative sound/video installation which explores video tracking as a compositional agent. At the opposite pole is The Old Woman in the Woods, a typical cinematic film score. Situated between these two extreme points are Terroir, Let It Go, and Aspects of Trees. Aspects of Trees is a hyperimprovisational system for visual projections, live cello, and software application. Let it Go explores the balance between improvisation, composition and “composed” instruments. Terroir is a fixed media experimental film which uses a single data source collected from an old cell phone

    Outward-Orientation and Development: Are Revisionists Right

    Get PDF
    The costs of import substitution (IS) as a strategy for industrialization, which was deemed synonymous with economic development by many development economists of the fifties and sixties, were shown to be substantial in the influential and nuanced studies of the seventies and eighties under the auspices of OECD, NBER and World Bank. These studies played a critical role in shifting policies in several developing countries away from the IS strategy. Recently there has been a proliferation of cross country regressions as a methodology of analysis of issues relating to growth, trade and other issues. Both proponents (e.g. Sachs and Warner (1995)) and opponents (Rodriguez and Rodrik (1999)) of the view that openness to trade is linked to higher growth have relied on such regressions. The paper systematically reviews the theoretical and empirical studies on such linkage. It rejects the cross-country regression methodology for reasons of their weak theoretical foundation, poor quality of their data base and their inappropriate econometric methodologies. It argues that the most compelling evidence on this issue can come only from careful case studies of policy regimes of individual entries such as those of OECD, NBER and World Bank. It concludes that the virtues of openness established in these nuanced in-depth studies remain unrefuted.Developing Countries, Economic Development, Economic Growth, International Trade, Openness, Import Substitution, Export Promotion, Cross-Country Regressions

    AIDIS: Detecting and Classifying Anomalous Behavior in UbiquitousKernel Processes

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Targeted attacks on IT systems are a rising threat against the confidentiality, integrity, and availability of critical information and infrastructures. With the rising prominence of advanced persistent threats (APTs), identifying and under-standing such attacks has become increasingly important. Current signature-based systems are heavily reliant on fixed patterns that struggle with unknown or evasive applications, while behavior-based solutions usually leave most of the interpretative work to a human analyst.In this article we propose AIDIS, an Advanced Intrusion Detection and Interpretation System capable to explain anomalous behavior within a network-enabled user session by considering kernel event anomalies identified through their deviation from a set of baseline process graphs. For this purpose we adapt star-structures, a bipartite representation used to approximate the edit distance be-tween two graphs. Baseline templates are generated automatically and adapt to the nature of the respective operating system process.We prototypically implemented smart anomaly classification through a set of competency questions applied to graph template deviations and evaluated the approach using both Random Forest and linear kernel support vector machines.The determined attack classes are ultimately mapped to a dedicated APT at-tacker/defender meta model that considers actions, actors, as well as assets and mitigating controls, thereby enabling decision support and contextual interpretation of ongoing attack

    Advanced Threat Intelligence: Interpretation of Anomalous Behavior in Ubiquitous Kernel Processes

    Get PDF
    Targeted attacks on digital infrastructures are a rising threat against the confidentiality, integrity, and availability of both IT systems and sensitive data. With the emergence of advanced persistent threats (APTs), identifying and understanding such attacks has become an increasingly difficult task. Current signature-based systems are heavily reliant on fixed patterns that struggle with unknown or evasive applications, while behavior-based solutions usually leave most of the interpretative work to a human analyst. This thesis presents a multi-stage system able to detect and classify anomalous behavior within a user session by observing and analyzing ubiquitous kernel processes. Application candidates suitable for monitoring are initially selected through an adapted sentiment mining process using a score based on the log likelihood ratio (LLR). For transparent anomaly detection within a corpus of associated events, the author utilizes star structures, a bipartite representation designed to approximate the edit distance between graphs. Templates describing nominal behavior are generated automatically and are used for the computation of both an anomaly score and a report containing all deviating events. The extracted anomalies are classified using the Random Forest (RF) and Support Vector Machine (SVM) algorithms. Ultimately, the newly labeled patterns are mapped to a dedicated APT attacker–defender model that considers objectives, actions, actors, as well as assets, thereby bridging the gap between attack indicators and detailed threat semantics. This enables both risk assessment and decision support for mitigating targeted attacks. Results show that the prototype system is capable of identifying 99.8% of all star structure anomalies as benign or malicious. In multi-class scenarios that seek to associate each anomaly with a distinct attack pattern belonging to a particular APT stage we achieve a solid accuracy of 95.7%. Furthermore, we demonstrate that 88.3% of observed attacks could be identified by analyzing and classifying a single ubiquitous Windows process for a mere 10 seconds, thereby eliminating the necessity to monitor each and every (unknown) application running on a system. With its semantic take on threat detection and classification, the proposed system offers a formal as well as technical solution to an information security challenge of great significance.The financial support by the Christian Doppler Research Association, the Austrian Federal Ministry for Digital and Economic Affairs, and the National Foundation for Research, Technology and Development is gratefully acknowledged

    The measurement, evolution, and neural representation of action grammars of human behavior

    Get PDF
    Human behaviors from toolmaking to language are thought to rely on a uniquely evolved capacity for hierarchical action sequencing. Testing this idea will require objective, generalizable methods for measuring the structural complexity of real-world behavior. Here we present a data-driven approach for extracting action grammars from basic ethograms, exemplified with respect to the evolutionarily relevant behavior of stone toolmaking. We analyzed sequences from the experimental replication of ~ 2.5 Mya Oldowan vs. ~ 0.5 Mya Acheulean tools, finding that, while using the same “alphabet” of elementary actions, Acheulean sequences are quantifiably more complex and Oldowan grammars are a subset of Acheulean grammars. We illustrate the utility of our complexity measures by re-analyzing data from an fMRI study of stone toolmaking to identify brain responses to structural complexity. Beyond specific implications regarding the co-evolution of language and technology, this exercise illustrates the general applicability of our method to investigate naturalistic human behavior and cognition

    Phrase based browsing for simulation traces of network protocols

    Full text link
    Most discrete event simulation frameworks are able to out-put simulation runs as a trace. The Network Simulator 2 (NS2) is a prominent example that does so to decouple generation of dynamic behavior from its evaluation. If a modeler is interested in the specific details and confronted with lengthy traces from simulation runs, support is needed to identify relevant pieces of information. In this paper, we present a new phrase-based browser that has its roots in information retrieval, language acquisition and text com-pression which is refined to work with trace data derived from simulation models. The browser is a new navigation feature of Traviando, a trace visualizer and analyzer for sim-ulation traces. The browsing technique allows a modeler to investigate particular patterns seen in a trace, that may be of interest due to their frequent or rare occurrence. We demonstrate how this approach applies to traces generated with NS2.
    corecore