60,383 research outputs found
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings
up new challenges to security. Traditional security has accomplished a long way
toward protecting well-defined goals such as confidentiality, integrity,
availability, and authenticity. However, with the growing sophistication of the
attacks and the complexity of the system, the protection using traditional
methods could be cost-prohibitive. A new perspective and a new theoretical
foundation are needed to understand security from a strategic and
decision-making perspective. Game theory provides a natural framework to
capture the adversarial and defensive interactions between an attacker and a
defender. It provides a quantitative assessment of security, prediction of
security outcomes, and a mechanism design tool that can enable
security-by-design and reverse the attacker's advantage. This tutorial provides
an overview of diverse methodologies from game theory that includes games of
incomplete information, dynamic games, mechanism design theory to offer a
modern theoretic underpinning of a science of cybersecurity. The tutorial will
also discuss open problems and research challenges that the CCS community can
address and contribute with an objective to build a multidisciplinary bridge
between cybersecurity, economics, game and decision theory
Automatic Generation of Text Descriptive Comments for Code Blocks
We propose a framework to automatically generate descriptive comments for
source code blocks. While this problem has been studied by many researchers
previously, their methods are mostly based on fixed template and achieves poor
results. Our framework does not rely on any template, but makes use of a new
recursive neural network called Code-RNN to extract features from the source
code and embed them into one vector. When this vector representation is input
to a new recurrent neural network (Code-GRU), the overall framework generates
text descriptions of the code with accuracy (Rouge-2 value) significantly
higher than other learning-based approaches such as sequence-to-sequence model.
The Code-RNN model can also be used in other scenario where the representation
of code is required.Comment: aaai 201
Construction of a surface air temperature series for Qingdao in China for the period 1899 to 2014
Abstract. We present a homogenized surface air temperature (SAT) time series at 2 m height for the city of Qingdao in China from 1899 to 2014. This series is derived from three data sources: newly digitized and homogenized observations of the German National Meteorological Service from 1899 to 1913, homogenized observation data of the China Meteorological Administration (CMA) from 1961 to 2014 and a gridded dataset of Willmott and Matsuura (2012) in Delaware to fill the gap from 1914 to 1960. Based on this new series, long-term trends are described. The SAT in Qingdao has a significant warming trend of 0.11 ± 0.03 °C decade−1 during 1899–2014. The coldest period occurred during 1909–1918 and the warmest period occurred during 1999–2008. For the seasonal mean SAT, the most significant warming can be found in spring, followed by winter. The homogenized time series of Qingdao is provided and archived by the Deutscher Wetterdienst (DWD) web page under overseas stations of the Deutsche Seewarte (http://www.dwd.de/EN/ourservices/overseas_stations/ueberseedoku/doi_qingdao.html) in ASCII format. Users can also freely obtain a short description of the data at https://doi.org/https://dx.doi.org/10.5676/DWD/Qing_v1 And the data can be downloaded at http://dwd.de/EN/ourservices/overseas_stations/ueberseedoku/data_qingdao.txt
Differential space-time block-coded OFDMA for frequency-selective fading channels
Combining differential Alamouti space-time block code (DASTBC) with orthogonal frequency-division multiple access (OFDMA), this paper introduces a multiuser/multirate transmission scheme, which allows full-rate and full-diversity noncoherent communications using two transmit antennas over frequency-selective fading channels. Compared with the existing differential space-time coded OFDM designs, our scheme imposes 10 restrictions on signal constellations, and thus can improve the spectral efficiency by exploiting efficient modulation techniques such as QAM, APSK etc. The main principles of our design are s follows: OFDMA eliminates multiuser interference, and converts multiuser environments to single-user ones; Space-time coding achieves performance improvement by exploiting space diversity available with multiple antennas, no matter whether channel state information is known to the receiver. System performance is evaluated both analytically and with simulations
Hybrid modelling methodology applied to microstructural evolution during hot deformation of aluminium alloys
This is the post print version of this article. The official published version can be accessed from the link below.This paper considers how data based neurofuzzy modelling techniques for the poorly understood relationships between changing process histories and the evolution of the internal state variables of dislocation density, subgrain size and subgrain boundary misorientation can be combined with physically-based models to investigate the effects of the internal state variables on the flow stress and recrystallisation behaviour. The model uses genetic algorithms to optimise the constants and is validated for data on a range of aluminium-magnesium alloys of both high and commercial purity. It is shown that this hybrid modelling methodology supported by a knowledge base offers a flexible way
to develop the microstructrural modelling as more data and better understanding of the evolution of the internal state variables become available.Financial support from the UK Engineering and Physical Sciences Research Council was used in this study
- …