151 research outputs found

    On Using Unsatisfiability for Solving Maximum Satisfiability

    No full text
    Maximum Satisfiability (MaxSAT) is a well-known optimization pro- blem, with several practical applications. The most widely known MAXS AT algorithms are ineffective at solving hard problems instances from practical application domains. Recent work proposed using efficient Boolean Satisfiability (SAT) solvers for solving the MaxSAT problem, based on identifying and eliminating unsatisfiable subformulas. However, these algorithms do not scale in practice. This paper analyzes existing MaxSAT algorithms based on unsatisfiable subformula identification. Moreover, the paper proposes a number of key optimizations to these MaxSAT algorithms and a new alternative algorithm. The proposed optimizations and the new algorithm provide significant performance improvements on MaxSAT instances from practical applications. Moreover, the efficiency of the new generation of unsatisfiability-based MaxSAT solvers becomes effectively indexed to the ability of modern SAT solvers to proving unsatisfiability and identifying unsatisfiable subformulas

    La llengua catalana en la publicitat a domicili

    Get PDF

    Notes i hipòtesis per a una interpretació de la Fia-Faia

    Get PDF

    Study of thermoelastic growth during martensitic transformations

    Get PDF
    The possibility of local elastic instabilities is considered in a first¿order structural phase transition, typically a thermoelastic martensitic transformation, with associated interfacial and volumic strain energy. They appear, for instance, as the result of shape change accommodation by simultaneous growth of different crystallographic variants. The treatment is phenomenological and deals with growth in both thermoelastic equilibrium and in nonequilibrium conditions produced by the elastic instability. Scaling of the transformed fraction curves against temperature is predicted only in the case of purely thermoelastic growth. The role of the transformation latent heat on the relaxation kinetics is also considered, and it is shown that it tends to increase the characteristic relaxation times as adiabatic conditions are approached, by keeping the system closer to a constant temperature. The analysis also reveals that the energy dissipated in the relaxation process has a double origin: release of elastic energy Wi and entropy production Si. The latter is shown to depend on both temperature rate and thermal conduction in the system

    Acoustic emission across the magnetostructural transition of the giant magnetocaloric Gd5Si2Ge2 compound

    Get PDF
    We report on the existence of acoustic emission during the paramagnetic-monoclinic to ferromagnetic-orthorhombic magnetostructural phase transition in the giant magnetocaloric Gd5Si2Ge2 compound. The transition kinetics have been analyzed from the detected acoustic signals. It is shown that this transition proceeds by avalanches between metastable states.Comment: 5 pages, 4 figure

    Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks

    Full text link
    Malware detectors based on machine learning (ML) have been shown to be susceptible to adversarial malware examples. However, current methods to generate adversarial malware examples still have their limits. They either rely on detailed model information (gradient-based attacks), or on detailed outputs of the model - such as class probabilities (score-based attacks), neither of which are available in real-world scenarios. Alternatively, adversarial examples might be crafted using only the label assigned by the detector (label-based attack) to train a substitute network or an agent using reinforcement learning. Nonetheless, label-based attacks might require querying a black-box system from a small number to thousands of times, depending on the approach, which might not be feasible against malware detectors. This work presents a novel query-free approach to craft adversarial malware examples to evade ML-based malware detectors. To this end, we have devised a GAN-based framework to generate adversarial malware examples that look similar to benign executables in the feature space. To demonstrate the suitability of our approach we have applied the GAN-based attack to three common types of features usually employed by static ML-based malware detectors: (1) Byte histogram features, (2) API-based features, and (3) String-based features. Results show that our model-agnostic approach performs on par with MalGAN, while generating more realistic adversarial malware examples without requiring any query to the malware detectors. Furthermore, we have tested the generated adversarial examples against state-of-the-art multimodal and deep learning malware detectors, showing a decrease in detection performance, as well as a decrease in the average number of detections by the anti-malware engines in VirusTotal
    corecore