Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 211, Pages 1–12https://doi.org/10.1145/3597503.3639221Python has become one of the most popular programming languages for software development due to its simplicity, readability, and versatility. As the Python ecosystem grows, developers face increasing challenges in avoiding module conflicts, which occur ...
- research-articleSeptember 2023
Minimizing running buffers for tabletop object rearrangement: Complexity, fast algorithms, and applications
International Journal of Robotics Research (RBRS), Volume 42, Issue 10Pages 755–776https://doi.org/10.1177/02783649231178565For rearranging objects on tabletops with overhand grasps, temporarily relocating objects to some buffer space may be necessary. This raises the natural question of how many simultaneous storage spaces, or “running buffers,” are required so that certain ...
- research-articleApril 2017
Prediction of the domain name system (DNS) quality attributes
SAC '17: Proceedings of the Symposium on Applied ComputingPages 578–585https://doi.org/10.1145/3019612.3019728The Domain Name System (DNS) has a direct impact on the performance and dependability of nearly all aspects of interactions on the Internet. DNS relies on a delegation-based architecture, where resolution of a name to its IP address requires resolving ...
- invited-talkOctober 2016
Jointly Representing Images and Text: Dependency Graphs, Word Senses, and Multimodal Embeddings
iV&L-MM '16: Proceedings of the 2016 ACM workshop on Vision and Language Integration Meets Multimedia FusionPages 35–36https://doi.org/10.1145/2983563.2986050The amount of image data available on the web is growing rapidly: on Facebook alone, 350 million new images are uploaded every day. Making sense of this data requires new ways of efficiently indexing, annotating, and querying such enormous collections. ...
- ArticleSeptember 2014
Flow Graph Designer: A Tool for Designing and Analyzing Intel® Threading Building Blocks Flow Graphs
ICPPW '14: Proceedings of the 2014 43rd International Conference on Parallel Processing WorkshopsPages 149–158https://doi.org/10.1109/ICPPW.2014.31Flow Graph Designer is a visualization tool that supports the analysis and design of parallel applications that use the Intel® Threading Building Blocks (Intel® TBB) flow graph interface. The flow graph interface allows developers to express the ...
-
- articleJanuary 2014
Dependency relations between elementary intramolecular operations in gene assembly in ciliates
The intramolecular model of gene assembly in ciliates postulates three folding-recombination operations over a single DNA molecule. Those operations are suggested to assemble a macronuclear contiguous gene from its shuffled and inverted micronuclear ...
- articleSeptember 2013
Updating method for the computation of orbits in parallel and sequential dynamical systems
International Journal of Computer Mathematics (IJOCM), Volume 90, Issue 9Pages 1796–1808https://doi.org/10.1080/00207160.2013.767894In this article, we provide a matrix method in order to compute orbits of parallel and sequential dynamical systems on Boolean functions. In this sense, we develop algorithms for systems defined over directed and undirected graphs when the evolution ...
- articleDecember 2012
The lefthanded local lemma characterizes chordal dependency graphs
Random Structures & Algorithms (RSAA), Volume 41, Issue 4Pages 546–556https://doi.org/10.1002/rsa.20439Shearer gave a general theorem characterizing the family <span>\documentclass{article}\usepackage{mathrsfs, amsmath, amssymb}\pagestyle{empty}\begin{document}$\mathcal{L}$\end{document} **image**</span>of dependency graphs labeled with probabilities pv ...
- research-articleSeptember 2011
PEWS platform: a web services composition environment
WEWST '11: Proceedings of the 6th International Workshop on Enhanced Web Service TechnologiesPages 1–8https://doi.org/10.1145/2031325.2031326PEWS (Predicate Path Expression for Web Services) is a programming language for the definition of web service behavioral interfaces. PEWS programs can be used for the description of both simple and composite web services. Simple web services can be built ...
- research-articleSeptember 2011
Reverse engineering of dependency graphs via dynamic analysis
ECSA '11: Proceedings of the 5th European Conference on Software Architecture: Companion VolumeArticle No.: 5, Pages 1–2https://doi.org/10.1145/2031759.2031765Reverse engineering of software systems often employs static analysis of a program's source code. In this invited talk, I will present our approach to reverse engineering of software systems via analyzing monitoring data of a programs operational use; ...
- ArticleSeptember 2011
Scalable analysis of attack scenarios
ESORICS'11: Proceedings of the 16th European conference on Research in computer securityPages 416–433Attack graphs have been widely used for attack modeling, alert correlation, and prediction. In order to address the limitations of current approaches - scalability and impact analysis - we propose a novel framework to analyze massive amounts of alerts ...
- ArticleFebruary 2011
Deep semantics for dependency structures
Although dependency parsers have become increasingly popular, little work has been done on how to associate dependency structures with deep semantic representations. In this paper, we propose a semantic calculus for dependency structures which can be ...
- articleNovember 2010
Scheduling-capable autonomic manager for policy-based IT change management system
Enterprise Information Systems (ENTIS), Volume 4, Issue 4Pages 423–444https://doi.org/10.1080/17517575.2010.482676Managing large IT environments is expensive and labour intensive. Maintaining and upgrading with minimal disruption and administrative support has always been a challenging task for system administrators. One challenge faced by IT administrators is ...
- ArticleOctober 2010
Shedding Light on Enterprise Network Failures Using Spotlight
SRDS '10: Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed SystemsPages 167–176https://doi.org/10.1109/SRDS.2010.27Fault localization in enterprise networks is extremely challenging. A recent approach called Sherlock makes some headway into this problem by using an inference algorithm over a multi-tier probabilistic dependency graph that relates fault symptoms with ...
- research-articleJune 2010
FlowRank: ranking NetFlow records
IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing ConferencePages 484–488https://doi.org/10.1145/1815396.1815508This paper describes a new approach to identify relevant flow records in large scale flow dataset. We propose a method that leverages the well known page rank algorithm in order to extract the most relevant flows. We introduce a dependency relation that ...
- ArticleSeptember 2009
Hierarchical Dependency Graphs: Abstraction and Methodology for Mapping Systolic Array Designs to Multicore Processors
PaCT '09: Proceedings of the 10th International Conference on Parallel Computing TechnologiesPages 284–298https://doi.org/10.1007/978-3-642-03275-2_28Systolic array designs and dependency graphs are some of the most important class of algorithms in several scientific computing areas. In this paper, we first propose an abstraction based on the fundamental principles behind designing systolic arrays. ...
- ArticleMarch 2009
Automatic Failure Diagnosis Support in Distributed Large-Scale Software Systems Based on Timing Behavior Anomaly Correlation
CSMR '09: Proceedings of the 2009 European Conference on Software Maintenance and ReengineeringPages 47–58https://doi.org/10.1109/CSMR.2009.15Manual failure diagnosis in large-scale software systems is time-consuming and error-prone. Automatic failure diagnosis support mechanisms can potentially narrow down, or even localize faults within a very short time which both helps to preserve system ...
- ArticleJuly 1995
Properties of membership services
CASE '95: Proceedings of the Seventh International Workshop on Computer-Aided Software EngineeringPage 200Abstract: A membership service is used in a distributed system to maintain information about which sites are functioning and which have failed at any given time. Such services have proven to be fundamental for constructing distributed applications, with ...
- ArticleMarch 1995
Garbage collection in message passing distributed systems
Distributed systems use optimistic message logging for recovery from transient process failures. Such a recovery is facilitated by asynchronous message logging and check-pointing. It is also supported by garbage collection which requires identifying ...