11,722 research outputs found

    Semi-Federated Learning of an Embedding Space Across Multiple Machine Clusters

    Get PDF
    Provided are systems and methods for privacy-preserving learning of a shared embedding space for data split across multiple separate clusters of computing machines. In one example, the multiple separate clusters of computing machines can correspond to multiple separate data silos

    Microservices and serverless functions – lifecycle, performance, and resource utilisation of edge based real-time IoT analytics

    Get PDF
    Edge Computing harnesses resources close to the data sources to reduce end-to-end latency and allow real-time process automation for verticals such as Smart City, Healthcare and Industry 4.0. Edge resources are limited when compared to traditional Cloud data centres; hence the choice of proper resource management strategies in this context becomes paramount. Microservice and Function as a Service architectures support modular and agile patterns, compared to a monolithic design, through lightweight containerisation, continuous integration / deployment and scaling. The advantages brought about by these technologies may initially seem obvious, but we argue that their usage at the Edge deserves a more in-depth evaluation. By analysing both the software development and deployment lifecycle, along with performance and resource utilisation, this paper explores microservices and two alternative types of serverless functions to build edge real-time IoT analytics. In the experiments comparing these technologies, microservices generally exhibit slightly better end-to-end processing latency and resource utilisation than serverless functions. One of the serverless functions and the microservices excel at handling larger data streams with auto-scaling. Whilst serverless functions natively offer this feature, the choice of container orchestration framework may determine its availability for microservices. The other serverless function, while supporting a simpler lifecycle, is more suitable for low-invocation scenarios and faces challenges with parallel requests and inherent overhead, making it less suitable for real-time processing in demanding IoT settings

    Apis mellifera Mitochondrial DNA (mtDNA), A Rewiew Paper

    Get PDF
    This review paper presents a comprehensive analysis of the mitochondrial DNA (mtDNA) of Apis mellifera, commonly referred to as the Western honey bee. The present study aims to examine the genetic diversity, population structure, and evolutionary history of a species of insect that holds economic significance. This study elucidates the genetic determinants that impact the adaptive capacity, behavioral patterns, and overall well-being of honey bees through the examination of mitochondrial DNA (mtDNA) sequences derived from diverse honey bee populations across the globe. Furthermore, this study examines the potential implications of mitochondrial DNA (mtDNA) research on various aspects of beekeeping practices, conservation initiatives, and the comprehension of honey bee biology. This paper serves as a significant asset for researchers, beekeepers, and conservationists with a keen interest in exploring the genetic characteristics of Apis mellifer

    A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection

    Get PDF
    The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are in place and compliant with standards and internal policies. Forensics assist the investigation of past security incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of tackling the requirements imposed by massively distributed and complex Industrial Automation and Control Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic template for a converged platform. These results are intended to guide future research on forensics and compliance auditing for Critical Infrastructure Protection.info:eu-repo/semantics/publishedVersio

    LIMITS OF ALGORITHMIC FAIR USE

    Get PDF
    In this article, we apply historical copyright principles to the evolving state of text-to-image generation and explore the implications of emerging technological constructs for copyright’s fair use doctrine. Artificial intelligence (“AI”) is frequently trained on copyrighted works, which usually involves extensive copying without owners’ authorization. Such copying could constitute prima facie copyright infringement, but existing guidance suggests fair use should apply to most machine learning contexts. Mark Lemley and Bryan Casey argue that training machine learning (“ML”) models on copyrighted material should generally be permitted under fair use when the model’s outputs transcends the purpose of its inputs. Their arguments are compelling in the domain of AI, generally. However, contemporary AI’s capacity to generate new works of art (“generative AI”) presents a unique case because it explicitly attempts to emulate the expression copyright intends to protect. Jessica Gillotte concludes that generative AI does not illicit copyright infringement because judicial guidance requires adherence to the constitutional imperative to promote the creation of new works when technological change blurs copyright’s boundaries. Even if infringement does occur, Gillotte finds that fair use would serve as a valid defense because training an AI model transforms the original work and is unlikely to damage the original artist’s market for the copyrighted work. Our paper deviates from prior scholarship by exploring specific generative AI use cases in technological detail. Ultimately, we argue that fair use’s first factor, the purpose of the use, and its fourth factor, the impact on the market for the copyrighted work, both weigh against a finding of fair use in generative AI use cases. However, even if text-to-image models aren’t found to be transformative, we argue that the potential for market usurpation alone sufficiently negates fair use. There is presently little specific guidance from courts as to whether using copyrighted works to build generative AI models constitutes either infringement or fair use, although several related lawsuits are currently pending. Text-to-art generative AIs present several scenarios that threaten substantial harm to the market for the copyrighted original, which tends to undercut the case for fair use. For example, a generative AI trained on copyrighted works has already enabled users to create works “in the style of” individual artists, which has allegedly caused business and reputational losses for the emulated copyright holder. Furthermore, past analyses have ignored the potential for a model to be non-transformative when its intended output has the same purpose and is of the same nature as its copyrighted inputs. This article contributes to the discussion by shining a technical light on text-to-art AI use cases to explore whether some uses normatively fail to qualify as fair uses. First, we examine whether text-to-image models present a prima facie infringement claim. We then distinguish text-to-image generative AIs from non-image focused AIs. In doing so, we argue that when the nature of the copyrighted work and the purpose of the infringing use are the same, it is more likely that the original artist will experience market harm. This tilts the overall analysis against a finding of fair use

    Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security

    Get PDF
    This paper assesses the effects of Stack Overflow code snippet evolution on the security of open-source projects. Users on Stack Overflow actively revise posted code snippets, sometimes addressing bugs and vulnerabilities. Accordingly, developers that reuse code from Stack Overflow should treat it like any other evolving code dependency and be vigilant about updates. It is unclear whether developers are doing so, to what extent outdated code snippets from Stack Overflow are present in GitHub projects, and whether developers miss security-relevant updates to reused snippets. To shed light on those questions, we devised a method to 1) detect outdated code snippets versions from 1.5M Stack Overflow snippets in 11,479 popular GitHub projects and 2) detect security-relevant updates to those Stack Overflow code snippets not reflected in those GitHub projects. Our results show that developers do not update dependent code snippets when those evolved on Stack Overflow. We found that 2,405 code snippet versions reused in 2,109 GitHub projects were outdated, with 43 projects missing fixes to bugs and vulnerabilities on Stack Overflow. Those 43 projects containing outdated, insecure snippets were forked on average 1,085 times (max. 16,121), indicating that our results are likely a lower bound for affected code bases. An important insight from our work is that treating Stack Overflow code as purely static code impedes holistic solutions to the problem of copying insecure code from Stack Overflow. Instead, our results suggest that developers need tools that continuously monitor Stack Overflow for security warnings and code fixes to reused code snippets and not only warn during copy-pasting

    Deep generative models for network data synthesis and monitoring

    Get PDF
    Measurement and monitoring are fundamental tasks in all networks, enabling the down-stream management and optimization of the network. Although networks inherently have abundant amounts of monitoring data, its access and effective measurement is another story. The challenges exist in many aspects. First, the inaccessibility of network monitoring data for external users, and it is hard to provide a high-fidelity dataset without leaking commercial sensitive information. Second, it could be very expensive to carry out effective data collection to cover a large-scale network system, considering the size of network growing, i.e., cell number of radio network and the number of flows in the Internet Service Provider (ISP) network. Third, it is difficult to ensure fidelity and efficiency simultaneously in network monitoring, as the available resources in the network element that can be applied to support the measurement function are too limited to implement sophisticated mechanisms. Finally, understanding and explaining the behavior of the network becomes challenging due to its size and complex structure. Various emerging optimization-based solutions (e.g., compressive sensing) or data-driven solutions (e.g. deep learning) have been proposed for the aforementioned challenges. However, the fidelity and efficiency of existing methods cannot yet meet the current network requirements. The contributions made in this thesis significantly advance the state of the art in the domain of network measurement and monitoring techniques. Overall, we leverage cutting-edge machine learning technology, deep generative modeling, throughout the entire thesis. First, we design and realize APPSHOT , an efficient city-scale network traffic sharing with a conditional generative model, which only requires open-source contextual data during inference (e.g., land use information and population distribution). Second, we develop an efficient drive testing system — GENDT, based on generative model, which combines graph neural networks, conditional generation, and quantified model uncertainty to enhance the efficiency of mobile drive testing. Third, we design and implement DISTILGAN, a high-fidelity, efficient, versatile, and real-time network telemetry system with latent GANs and spectral-temporal networks. Finally, we propose SPOTLIGHT , an accurate, explainable, and efficient anomaly detection system of the Open RAN (Radio Access Network) system. The lessons learned through this research are summarized, and interesting topics are discussed for future work in this domain. All proposed solutions have been evaluated with real-world datasets and applied to support different applications in real systems

    A systematic map of studies testing the relationship between temperature and animal reproduction

    Get PDF
    Funding: This work was funded by the European Society for Evolution (which funds a Special Topic Network on Evolutionary Ecology of Thermal Fertility Limits to CF, AB, RRS and TARP), the Natural Environment Research Council (NE/P002692/1 to TARP, AB and RRS, NE/X011550/1 to LRD and TARP), the Biotechnology and \Biological Sciences Research Council (BB/W016753/1 to AB, TARP and RRS) and a Heisenberg fellowship from the German Research Foundation (FR 2973/11-1 to CF).1. Exposure to extreme temperatures can negatively affect animal reproduction, by disrupting the ability of individuals to produce any offspring (fertility), or the number of offspring produced by fertile individuals (fecundity). This has important ecological consequences, because reproduction is the ultimate measure of population fitness: a reduction in reproductive output lowers the population growth rate and increases the extinction risk. Despite this importance, there have been no large‐scale summaries of the evidence for effect of temperature on reproduction. 2. We provide a systematic map of studies testing the relationship between temperature and animal reproduction. We systematically searched for published studies that statistically test for a direct link between temperature and animal reproduction, in terms of fertility, fecundity or indirect measures of reproductive potential (gamete and gonad traits). 3. Overall, we collated a large and rich evidence base, with 1654 papers that met our inclusion criteria, encompassing 1191 species. 4. The map revealed several important research gaps. Insects made up almost half of the dataset, but reptiles and amphibians were uncommon, as were non‐arthropod invertebrates. Fecundity was the most common reproductive trait examined, and relatively few studies measured fertility. It was uncommon for experimental studies to test exposure of different life stages, exposure to short‐term heat or cold shock, exposure to temperature fluctuations, or to independently assess male and female effects. Studies were most often published in journals focusing on entomology and pest control, ecology and evolution, aquaculture and fisheries science, and marine biology. Finally, while individuals were sampled from every continent, there was a strong sampling bias towards mid‐latitudes in the Northern Hemisphere, such that the tropics and polar regions are less well sampled. 5. This map reveals a rich literature of studies testing the relationship between temperature and animal reproduction, but also uncovers substantial missing treatment of taxa, traits, and thermal regimes. This database will provide a valuable resource for future quantitative meta‐analyses, and direct future studies aiming to fill identified gaps.Publisher PDFPeer reviewe
    • 

    corecore