scholarly journals Automated model repair for distributed programs

2012 ◽  
Vol 43 (2) ◽  
pp. 85-107 ◽  
Author(s):  
Borzoo Bonakdarpour ◽  
Sandeep S. Kulkarni
2011 ◽  
Author(s):  
William R. Marczak ◽  
Peter Alvaro ◽  
Neil Conway ◽  
Joseph M. Hellerstein ◽  
David Maier

1989 ◽  
Vol 32 (9) ◽  
pp. 1079-1084 ◽  
Author(s):  
Wan-Hong S. Cheng ◽  
Virgil E. Wallentine

2021 ◽  
Vol 34 (5) ◽  
pp. 319-348
Author(s):  
Duong Nguyen ◽  
Sorrachai Yingchareonthawornchai ◽  
Vidhya Tekken Valapil ◽  
Sandeep S. Kulkarni ◽  
Murat Demirbas
Keyword(s):  

2011 ◽  
Vol 21 (6) ◽  
pp. 1111-1181
Author(s):  
ANA ALMEIDA MATOS ◽  
JAN CEDERQUIST

With the emergence of the new possibilities offered by global computing, new security issues follow from the fact that these possibilities can be equally exploited by parties with malicious intentions. Many attacks arise at the application level, and can be tackled by means of programming language techniques. For instance, confidentiality can be violated during the execution of programs that reveal secret information. This kind of program behaviour can be avoided by information flow analyses that detect the encoding of illegal flows.This paper studies information flows that occur in distributed programs with code mobility from a language-based security perspective. New forms of security leaks that are introduced by code mobility, which we callmigration leaks, are presented and compared with well-known forms of illegal flow. We propose an information flow property that is adequate for networks consisting of a generalisation of the non-disclosure policy. We design a type and effect system for enforcing it on an expressive distributed calculus, and explain a soundness proof methodology in detail.


Author(s):  
Milan Češka ◽  
Christian Dehnert ◽  
Nils Jansen ◽  
Sebastian Junges ◽  
Joost-Pieter Katoen
Keyword(s):  

2020 ◽  
Vol 34 (08) ◽  
pp. 13140-13147
Author(s):  
Ian Beaver ◽  
Abdullah Mueen

With the rise of Intelligent Virtual Assistants (IVAs), there is a necessary rise in human effort to identify conversations containing misunderstood user inputs. These conversations uncover error in natural language understanding and help prioritize and expedite improvements to the IVA. As human reviewer time is valuable and manual analysis is time consuming, prioritizing the conversations where misunderstanding has likely occurred reduces costs and speeds improvement. In addition, less conversations reviewed by humans mean less user data is exposed, increasing privacy. We present a scalable system for automated conversation review that can identify potential miscommunications. Our system provides IVA designers with suggested actions to fix errors in IVA understanding, prioritizes areas of language model repair, and automates the review of conversations where desired.Verint - Next IT builds IVAs on behalf of other companies and organizations, and therefore analyzes large volumes of conversational data. Our review system has been in production for over three years and saves our company roughly $1.5 million in annotation costs yearly, as well as shortened the refinement cycle of production IVAs. In this paper, the system design is discussed and performance in identifying errors in IVA understanding is compared to that of human reviewers.


Sign in / Sign up

Export Citation Format

Share Document