11,290 research outputs found
archivist: An R Package for Managing, Recording and Restoring Data Analysis Results
Everything that exists in R is an object [Chambers2016]. This article
examines what would be possible if we kept copies of all R objects that have
ever been created. Not only objects but also their properties, meta-data,
relations with other objects and information about context in which they were
created.
We introduce archivist, an R package designed to improve the management of
results of data analysis. Key functionalities of this package include: (i)
management of local and remote repositories which contain R objects and their
meta-data (objects' properties and relations between them); (ii) archiving R
objects to repositories; (iii) sharing and retrieving objects (and it's
pedigree) by their unique hooks; (iv) searching for objects with specific
properties or relations to other objects; (v) verification of object's identity
and context of it's creation.
The presented archivist package extends, in a combination with packages such
as knitr and Sweave, the reproducible research paradigm by creating new ways to
retrieve and validate previously calculated objects. These new features give a
variety of opportunities such as: sharing R objects within reports or articles;
adding hooks to R objects in table or figure captions; interactive exploration
of object repositories; caching function calls with their results; retrieving
object's pedigree (information about how the object was created); automated
tracking of the performance of considered models, restoring R libraries to the
state in which object was archived.Comment: Submitted to JSS in 2015, conditionally accepte
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
Networks are evolving toward a ubiquitous model in which heterogeneous
devices are interconnected. Cryptographic algorithms are required for developing security
solutions that protect network activity. However, the computational and energy limitations
of network devices jeopardize the actual implementation of such mechanisms. In this
paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric
cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing
based cryptography on personal agendas, and compare them with the costs of basic operating
system functions. Results show that although cryptographic power costs are high and such
operations shall be restricted in time, they are not the main limiting factor of the autonomy
of a device
Virtual RTCP: A Case Study of Monitoring and Repair for UDP-based IPTV Systems
IPTV systems have seen widespread deployment, but often lack robust mechanisms for monitoring the quality of experience. This makes it difficult for network operators to ensure that their services match the quality of traditional broadcast TV systems, leading to consumer dissatisfaction. We present a case study of virtual RTCP, a new framework for reception quality monitoring and reporting for UDP-encapsulated MPEG video delivered over IP multicast. We show that this allows incremental deployment of reporting infrastructure, coupled with effective retransmission-based packet loss repair
Micro computed tomography based finite element models of calcium phosphate scaffolds for bone tissue engineering
Bone is a living tissue that is able to regenerate by itself. However, when severe bone defects occur, the natural regeneration may be impaired. In these cases, bone graft substitutes can be used to induce the natural healing process. As a scaffold for tissue engineering, these bone graft substitutes have to meet specific requirements. Among others, the material must be biocompatible, biodegradable and have a porous structure to allow vascularization, cell migration and formation of new bone. Additionally, the mechanical properties of the scaffold have to resemble the ones of native tissue. The goal of this project is to create a computational model of the calcium phosphate scaffolds that are produced by rapid-prototyping by the Biomaterials, Biomechanics, and Tissue Engineering group at the Technical University of Catalonia. These models are based on finite element analysis and micro computed tomography images in order to consider the actual architecture of the scaffolds. The generated FE-models allow the computation of both local strains, which act as mechanical stimuli on attached cells, as well as the behaviour of the entire scaffold. When considering this information, the scaffold can be optimized for tissue differentiation by tuning both the scaffold architecture and the scaffold material bulk properties.Incomin
In-packet Bloom filters: Design and networking applications
The Bloom filter (BF) is a well-known space-efficient data structure that
answers set membership queries with some probability of false positives. In an
attempt to solve many of the limitations of current inter-networking
architectures, some recent proposals rely on including small BFs in packet
headers for routing, security, accountability or other purposes that move
application states into the packets themselves. In this paper, we consider the
design of such in-packet Bloom filters (iBF). Our main contributions are
exploring the design space and the evaluation of a series of extensions (1) to
increase the practicality and performance of iBFs, (2) to enable
false-negative-free element deletion, and (3) to provide security enhancements.
In addition to the theoretical estimates, extensive simulations of the multiple
design parameters and implementation alternatives validate the usefulness of
the extensions, providing for enhanced and novel iBF networking applications.Comment: 15 pages, 11 figures, preprint submitted to Elsevier COMNET Journa
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU states, and they all fall short in precision and usability. As the physical memory of a VM always exists in all these applications, in this article, we present OS-Sommelier+, a multi-aspect, memory exclusive approach for precise and robust guest OS fingerprinting in the cloud. It works as follows: given a physical memory dump of a guest OS, OS-Sommelier+ first uses a code hash based approach from kernel code aspect to determine the guest OS version. If code hash approach fails, OS-Sommelier+ then uses a kernel data signature based approach from kernel data aspect to determine the version. We have implemented a prototype system, and tested it with a number of Linux kernels. Our evaluation results show that the code hash approach is faster but can only fingerprint the known kernels, and data signature approach complements the code signature approach and can fingerprint even unknown kernels
- …