2,709 research outputs found
Component Hiding Using Identification and Boundary Blurring Techniques
Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java based component identification tool. With this tool, we can characterize time required for carrying out adversarial attacks on unaltered boolean circuitry. To counter component identification methods we utilize boundary blurring techniques which are either semantic preserving or semantic changing in order to prevent component identification methods. Furthermore, we will show these techniques can drive adversarial cost to unreasonable levels preventing compromise of critical systems
An overview of decision table literature 1982-1995.
This report gives an overview of the literature on decision tables over the past 15 years. As much as possible, for each reference, an author supplied abstract, a number of keywords and a classification are provided. In some cases own comments are added. The purpose of these comments is to show where, how and why decision tables are used. The literature is classified according to application area, theoretical versus practical character, year of publication, country or origin (not necessarily country of publication) and the language of the document. After a description of the scope of the interview, classification results and the classification by topic are presented. The main body of the paper is the ordered list of publications with abstract, classification and comments.
Toward an Ontology for Third Generation Systems Thinking
Systems thinking is a way of making sense about the world in terms of
multilevel, nested, interacting systems, their environment, and the boundaries
between the systems and the environment. In this paper we discuss the evolution
of systems thinking and discuss what is needed for an ontology of the current
generation of systems thinking
Advanced Interface Design for IIIF. A Digital Tool to Explore Image Collections at Different Scales
This article introduces a proposal for an experimental interface design that uses the International Image Interoperability Framework (IIIF) to facilitate the exploration of image collections through the navigation of relational models created by the scholarly practice of annotation. Within the project From Data To Wisdom, an innovative digital tool was designed by harnessing IIIF resources and leveraging close and distant reading on three levels of detail: micro, meso, and macro. The proposed tool integrates annotation features that enable scholars to analyze individual images and interpret broader connections and patterns across image sets. This article outlines the experimental interface’s theoretical framework, design principles, and significant advantages, highlighting the potential to support interdisciplinary research and advancements in digital art
Towards Ontology-Based Program Analysis
Program analysis is fundamental for program optimizations, debugging,
and many other tasks. But developing program analyses has been a
challenging and error-prone process for general users. Declarative
program analysis has shown the promise to dramatically improve the
productivity in the development of program analyses. Current
declarative program analysis is however subject to some major
limitations in supporting cooperations among analysis tools, guiding
program optimizations, and often requires much effort for repeated
program preprocessing.
In this work, we advocate the integration of ontology into declarative
program analysis. As a way to standardize the definitions of concepts
in a domain and the representation of the knowledge in the domain,
ontology offers a promising way to address the limitations of current
declarative program analysis. We develop a prototype framework named
PATO for conducting program analysis upon ontology-based program
representation. Experiments on six program analyses confirm the
potential of ontology for complementing existing declarative program
analysis. It supports multiple analyses without separate program
preprocessing, promotes cooperative Liveness analysis between two
compilers, and effectively guides a data placement optimization for
Graphic Processing Units (GPU)
An expert system to optimize combinational logic
Twenty to fifty percent of the active area of most semicustom integrated circuits is devoted to combinational logic. Automating the synthesis and optimization of combinational circuitry can result in significant improvements in both the design cycle time and the overall area of the implementation. This thesis presents a rule-based system that optimizes combinational logic for a given technology. By performing Boolean function minimization, decomposition, logic synthesis and a series of local transformations4, the system achieves area reductions and saves valuable design time
Recommended from our members
From symbols to icons: the return of resemblance in the cognitive neuroscience revolution
We argue that one important aspect of the "cognitive neuroscience revolution" identified by Boone and Piccinini (2015) is a dramatic shift away from thinking of cognitive representations as arbitrary symbols towards thinking of them as icons that replicate structural characteristics of their targets. We argue that this shift has been driven both "from below" and "from above" - that is, from a greater appreciation of what mechanistic explanation of information-processing systems involves ("from below"), and from a greater appreciation of the problems solved by bio-cognitive systems, chiefly regulation and prediction ("from above"). We illustrate these arguments by reference to examples from cognitive neuroscience, principally representational similarity analysis and the emergence of (predictive) dynamical models as a central postulate in neurocognitive research
Computational Ontologies and Information Systems I: Foundations
This paper provides a state-of-the-art review about computational ontologies to raise awareness about this research area in the IS discipline and to explore areas where IS researchers can engage in fruitful research. This paper discusses the basic foundations and definitions pertaining to the field of computational ontologies. It reviews the intersection of computational ontologies with the IS discipline. It also discusses methods and guidelines for developing computational ontologies. The paper concludes with recommendations for important and emerging directions for research. The technical aspects of ontologies are presented in a companion paper (Volume 14, article 9). The companion paper provides a comprehensive review of the formalisms, languages, and tools used for specifying and implementing computational ontologies
An information assistant system for the prevention of tunnel vision in crisis management
In the crisis management environment, tunnel vision is a set of bias in decision makers’ cognitive process which often leads to incorrect understanding of the real crisis situation, biased perception of information, and improper decisions. The tunnel vision phenomenon is a consequence of both the challenges in the task and the natural limitation in a human being’s cognitive process. An information assistant system is proposed with the purpose of preventing tunnel vision. The system serves as a platform for monitoring the on-going crisis event. All information goes through the system before arrives at the user. The system enhances the data quality, reduces the data quantity and presents the crisis information in a manner that prevents or repairs the user’s cognitive overload. While working with such a system, the users (crisis managers) are expected to be more likely to stay aware of the actual situation, stay open minded to possibilities, and make proper decisions
- …