scholarly journals Representing Integer Sequences Using Piecewise-Affine Loops

Mathematics ◽  
2021 ◽  
Vol 9 (19) ◽  
pp. 2368
Author(s):  
Gabriel Rodríguez ◽  
Louis-Noël Pouchet ◽  
Juan Touriño

A formal, high-level representation of programs is typically needed for static and dynamic analyses performed by compilers. However, the source code of target applications is not always available in an analyzable form, e.g., to protect intellectual property. To reason on such applications, it becomes necessary to build models from observations of its execution. This paper details an algebraic approach which, taking as input the trace of memory addresses accessed by a single memory reference, synthesizes an affine loop with a single perfectly nested reference that generates the original trace. This approach is extended to support the synthesis of unions of affine loops, useful for minimally modeling traces generated by automatic transformations of polyhedral programs, such as tiling. The resulting system is capable of processing hundreds of gigabytes of trace data in minutes, minimally reconstructing 100% of the static control parts in PolyBench/C applications and 99.99% in the Pluto-tiled versions of these benchmarks. As an application example of the trace modeling method, trace compression is explored. The affine representations built for the memory traces of PolyBench/C codes achieve compression factors of the order of 106 and 103 with respect to gzip for the original and tiled versions of the traces, respectively.

2019 ◽  
Vol 14 (2) ◽  
pp. 26-32
Author(s):  
Nur Hayati Abd Rahman ◽  
Khairunnisa Abd Samad ◽  
Shahreena Daud ◽  
Zarinah Abu Yazid

With help from both domestic and international markets, ASEAN countries are able to catch-up withthe latest economic development if they can sustain high economic growth for a long-period of time. To doso, the resources available in countries such as capital and labors should fully be utilized up to theoptimum level. The capital itself can be in many forms such as investment. Since most of the ASEANcountries are categorized as developing countries, the reliance on foreign direct investment (FDI) as asource of growth is highly needed as it helps the economy to step on a higher stage of economic developmentvia the roles of foreign experts and technological transfer. In ensuring a higher level of investment, there isa need to ensure a high level of intellectual property protection since it assists in promoting invention,innovation and new business development. In opposite, lacking in protection might discourage foreigninvestors to invest in the countries, thus limiting the ability of the countries to grow further. Therefore, theaim of this paper is to examine whether strong intellectual property protection will really help in attractingmore foreign investors to invest in ASEAN-5 countries. Using annual data from 2007 to 2016, panel dataestimation using random effect is employed. It was found that the ASEAN-5 countries should strengthentheir intellectual property protection in order to stimulate higher foreign investments. Nevertheless, inbetween copyright and patents, copyrights protection gives significant effect to the FDI inflows relative tothe latter one. It indicates that the countries are slowly moving out from the production-based economy andcatching-up towards a digital economy. Keywords: ASEAN-5, foreign direct investment, intellectual property protection, digital economy, copyrights


2020 ◽  
Author(s):  
Sara Di Bartolomeo ◽  
Yixuan Zhang ◽  
Fangfang Sheng ◽  
Cody Dunne

Temporal event sequence alignment has been used in many domains to visualize nuanced changes and interactions over time. Existing approaches align one or two sentinel events. Overview tasks require examining all alignments of interest using interaction and time or juxtaposition of many visualizations. Furthermore, any event attribute overviews are not closely tied to sequence visualizations. We present SEQUENCE BRAIDING, a novel overview visualization for temporal event sequences and attributes using a layered directed acyclic network.SEQUENCE BRAIDING visually aligns many temporal events and attribute groups simultaneously and supports arbitrary ordering, absence, and duplication of events. In a controlled experiment we compare SEQUENCE BRAIDING and IDMVis on user task completion time, correctness, error, and confidence. Our results provide good evidence that users of SEQUENCE BRAIDING can understand high-level patterns and trends faster and with similar error. A full version of this paper with all appendices;the evaluation stimuli, data, and analysis code; and source code are available at osf.io/s92bu.


Author(s):  
Natarajan Meghanathan ◽  
Alexander Roy Geoghegan

The high-level contribution of this book chapter is to illustrate how to conduct static code analysis of a software program and mitigate the vulnerabilities associated with the program. The automated tools used to test for software security are the Source Code Analyzer and Audit Workbench, developed by Fortify, Inc. The first two sections of the chapter are comprised of (i) An introduction to Static Code Analysis and its usefulness in testing for Software Security and (ii) An introduction to the Source Code Analyzer and the Audit Workbench tools and how to use them to conduct static code analysis. The authors then present a detailed case study of static code analysis conducted on a File Reader program (developed in Java) using these automated tools. The specific software vulnerabilities that are discovered, analyzed, and mitigated include: (i) Denial of Service, (ii) System Information Leak, (iii) Unreleased Resource (in the context of Streams), and (iv) Path Manipulation. The authors discuss the potential risk in having each of these vulnerabilities in a software program and provide the solutions (and the Java code) to mitigate these vulnerabilities. The proposed solutions for each of these four vulnerabilities are more generic and could be used to correct such vulnerabilities in software developed in any other programming language.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 158931-158950 ◽  
Author(s):  
Umair Sabir ◽  
Farooque Azam ◽  
Sami Ul Haq ◽  
Muhammad Waseem Anwar ◽  
Wasi Haider Butt ◽  
...  

Author(s):  
Mirko Luca Lobina ◽  
Luigi Atzori ◽  
Davide Mula

Many audio watermarking techniques presented in the last years make use of masking and psychological models derived from signal processing. Such a basic idea is winning because it guarantees a high level of robustness and bandwidth of the watermark as well as fidelity of the watermarked signal. This chapter first describes the relationship between digital right management, intellectual property, and use of watermarking techniques. Then, the crossing use of watermarking and masking models is detailed, providing schemes, examples, and references. Finally, the authors present two strategies that make use of a masking model, applied to a classic watermarking technique. The joint use of classic frameworks and masking models seems to be one of the trends for the future of research in watermarking. Several tests on the proposed strategies with the state of the art are also offered to give an idea of how to assess the effectiveness of a watermarking technique.


2008 ◽  
Vol 81 (3) ◽  
pp. 447-460 ◽  
Author(s):  
Georgia Frantzeskou ◽  
Stephen MacDonell ◽  
Efstathios Stamatatos ◽  
Stefanos Gritzalis
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document