Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 81

Full-Text Articles in Entire DC Network

On Coresets For Fair Clustering In Metric And Euclidean Spaces And Their Applications, Sayan Bandyapadhyay, Fedor V. Fomin, Kirill Simonov Jun 2024

On Coresets For Fair Clustering In Metric And Euclidean Spaces And Their Applications, Sayan Bandyapadhyay, Fedor V. Fomin, Kirill Simonov

Computer Science Faculty Publications and Presentations

Fair clustering is a constrained clustering problem where we need to partition a set of colored points. The fraction of points of each color in every cluster should be more or less equal to the fraction of points of this color in the dataset. The problem was recently introduced by Chierichetti et al. (2017) [1]. We propose a new construction of coresets for fair clustering for Euclidean and general metrics based on random sampling. For the Euclidean space Rd, we provide the first coreset whose size does not depend exponentially on the dimension d. The question of whether such constructions …


Fea Simulations For Thermal Distributions Of Large Scale 3dic Packages, Suxia Chen, Qiang Wu, Wayne Xun, Jiachen Zhang, Jianping Xun May 2024

Fea Simulations For Thermal Distributions Of Large Scale 3dic Packages, Suxia Chen, Qiang Wu, Wayne Xun, Jiachen Zhang, Jianping Xun

Computer Science Faculty Publications and Presentations

As the market increases for Artificial Intelligence and High-Performance Computing applications, the geometry of 3-Dimensional Integrated Circuit packages becomes more complicated; therefore, predicting the thermal distributions of the structures becomes not only more important but also more challenging. The physics governing the thermal distribution is a 3-dimensional partial differential equation. In order to predict the thermal distributions, various approaches such as the layer modeling method have been invented. While practical, these approaches solve a simplified version of the differential equation placing an inherent limitation on their capabilities which may be improved upon. In this research we solve the actual differential …


Static Reflective Surfaces For Improved Terahertz Coverage, Thanh Le, Suresh Singh May 2024

Static Reflective Surfaces For Improved Terahertz Coverage, Thanh Le, Suresh Singh

Computer Science Faculty Publications and Presentations

LoS (Line of Sight) MIMO (Multiple Input Multiple Output) is considered the best way to deliver high capacity channels for terahertz communications due to the severe attenuation suffered by reflected components. Unfortunately, terahertz links are easily blocked by any obstruction resulting in link breakage. Therefore, it is necessary to provide alternative paths via reflectors. A problem shared by LoS paths and reflected paths (via polished reflectors) is that the channel matrix is rank 1 in the far-field. As a result, the achieved capacity is lower than what can theoretically be achieved in a rich multi-path environment. In this work, we …


Mask2former With Improved Query For Semantic Segmentation In Remote-Sensing Images, Shichen Guo, Qi Wang, Shiming Xiang, Shuwen Wang, Xuezhi Wang Mar 2024

Mask2former With Improved Query For Semantic Segmentation In Remote-Sensing Images, Shichen Guo, Qi Wang, Shiming Xiang, Shuwen Wang, Xuezhi Wang

Computer Science Faculty Publications and Presentations

Semantic segmentation of remote sensing (RS) images is vital in various practical applications, including urban construction planning, natural disaster monitoring, and land resources investigation. However, RS images are captured by airplanes or satellites at high altitudes and long distances, resulting in ground objects of the same category being scattered in various corners of the image. Moreover, objects of different sizes appear simultaneously in RS images. For example, some objects occupy a large area in urban scenes, while others only have small regions. Technically, the above two universal situations pose significant challenges to the segmentation with a high quality for RS …


Self-Optimizing Feature Generation Via Categorical Hashing Representation And Hierarchical Reinforcement Crossing, Wangyang Ying, Dongjie Wang, Kunpeng Liu, Leilei Sun, Yanjie Fu Feb 2024

Self-Optimizing Feature Generation Via Categorical Hashing Representation And Hierarchical Reinforcement Crossing, Wangyang Ying, Dongjie Wang, Kunpeng Liu, Leilei Sun, Yanjie Fu

Computer Science Faculty Publications and Presentations

Feature generation aims to generate new and meaningful features to create a discriminative representation space. A generated feature is meaningful when the generated feature is from a feature pair with inherent feature interaction. In the real world, experienced data scientists can identify potentially useful feature-feature interactions, and generate meaningful dimensions from an exponentially large search space in an optimal crossing form over an optimal generation path. But, machines have limited human-like abilities. We generalize such learning tasks as self-optimizing feature generation. Self-optimizing feature generation imposes several under-addressed challenges on existing systems: meaningful, robust, and efficient generation. To tackle these challenges, …


Deep Adaptive Graph Clustering Via Von Mises-Fisher Distributions, Pengfei Wang, Daqing Wu, Chong Chen, Kunpeng Liu, Yanjie Fu, Jianqiang Huang, Yuanchun Zhou, Jianfeng Zhan, Xiansheng Hua Jan 2024

Deep Adaptive Graph Clustering Via Von Mises-Fisher Distributions, Pengfei Wang, Daqing Wu, Chong Chen, Kunpeng Liu, Yanjie Fu, Jianqiang Huang, Yuanchun Zhou, Jianfeng Zhan, Xiansheng Hua

Computer Science Faculty Publications and Presentations

Graph clustering has been a hot research topic and is widely used in many fields, such as community detection in social networks. Lots of works combining auto-encoder and graph neural networks have been applied to clustering tasks by utilizing node attributes and graph structure. These works usually assumed the inherent parameters (i.e., size and variance) of different clusters in the latent embedding space are homogeneous, and hence the assigned probability is monotonous over the Euclidean distance between node embeddings and centroids. Unfortunately, this assumption usually does not hold since the size and concentration of different clusters can be quite different, …


Gated Recurrent Units For Blockage Mitigation In Mmwave Wireless, Ahmed H. Almutairi, Alireza Keshavarz-Haddad, Ehsan Aryafar Dec 2023

Gated Recurrent Units For Blockage Mitigation In Mmwave Wireless, Ahmed H. Almutairi, Alireza Keshavarz-Haddad, Ehsan Aryafar

Computer Science Faculty Publications and Presentations

Millimeter-Wave (mmWave) communication is susceptible to blockages, which can significantly reduce the signal strength at the receiver. Mitigating the negative impacts of blockages is a key requirement to ensure reliable and high throughput mmWave communication links. Previous research on blockage mitigation has introduced several model and protocol based blockage mitigation solutions that focus on one technique at a time, such as handoff to a different base station or beam adaptation to the same base station. In this paper, we address the overarching problem: what blockage mitigation method should be employed? and what is the optimal sub-selection within that method? To …


Auxiliary Features-Guided Super Resolution For Monte Carlo Rendering, Qiqi Hou, Feng Liu Oct 2023

Auxiliary Features-Guided Super Resolution For Monte Carlo Rendering, Qiqi Hou, Feng Liu

Computer Science Faculty Publications and Presentations

This paper investigates super-resolution to reduce the number of pixels to render and thus speed up Monte Carlo rendering algorithms. While great progress has been made to super-resolution technologies, it is essentially an ill-posed problem and cannot recover high-frequency details in renderings. To address this problem, we exploit high-resolution auxiliary features to guide super-resolution of low-resolution renderings. These high-resolution auxiliary features can be quickly rendered by a rendering engine and at the same time provide valuable high-frequency details to assist super-resolution. To this end, we develop a cross-modality transformer network that consists of an auxiliary feature branch and a low-resolution …


An Improved Lower Bound For Sparse Reconstruction From Subsampled Walsh Matrices, Jaroslaw Blasiok, Patrick Lopatto, Kyle Luh, Jake Marcinek, Shravas Rao Jan 2023

An Improved Lower Bound For Sparse Reconstruction From Subsampled Walsh Matrices, Jaroslaw Blasiok, Patrick Lopatto, Kyle Luh, Jake Marcinek, Shravas Rao

Computer Science Faculty Publications and Presentations

We give a short argument that yields a new lower bound on the number of uniformly and independently subsampled rows from a bounded, orthonormal matrix necessary to form a matrix with the restricted isometry property. We show that a matrix formed by uniformly and independently subsampling rows of an N ×N Walsh matrix contains a K-sparse vector in the kernel, unless the number of subsampled rows is Ω(KlogKlog(N/K)) — our lower bound applies whenever min(K,N/K) > logC N. Containing a sparse vector in the kernel precludes not only the restricted isometry property, but more generally the application of those matrices for …


Rdkg: A Reinforcement Learning Framework For Disease Diagnosis On Knowledge Graph, Shipeng Guo, Kunpeng Liu, Pengfei Wang, Weiwei Dai, Yi Du, Yuanchun Zhou, Wenjuan Cui Jan 2023

Rdkg: A Reinforcement Learning Framework For Disease Diagnosis On Knowledge Graph, Shipeng Guo, Kunpeng Liu, Pengfei Wang, Weiwei Dai, Yi Du, Yuanchun Zhou, Wenjuan Cui

Computer Science Faculty Publications and Presentations

Automatic disease diagnosis from symptoms has attracted much attention in medical practices. It can assist doctors and medical practitioners in narrowing down disease candidates, reducing testing costs, improving diagnosis efficiency, and more importantly, saving human lives. Existing research has made significant progress in diagnosing disease but was limited by the gap between interpretability and accuracy. To fill this gap, in this paper, we propose a method called Reinforced Disease Diagnosis on Knowlege Graph (RDKG). Specifically, we first construct a knowledge graph containing all information from electronic medical records. To capture informative embeddings, we propose an enhanced knowledge graph embedding method …


A Simpler Machine Learning Model For Acute Kidney Injury Risk Stratification In Hospitalized Patients, Yirui Hu, Kunpeng Liu, Kevin Ho, David Riviello, Jason Brown, Alex R. Chang, Gurmukteshwar Singh, H. Lester Kirchner Oct 2022

A Simpler Machine Learning Model For Acute Kidney Injury Risk Stratification In Hospitalized Patients, Yirui Hu, Kunpeng Liu, Kevin Ho, David Riviello, Jason Brown, Alex R. Chang, Gurmukteshwar Singh, H. Lester Kirchner

Computer Science Faculty Publications and Presentations

Background: Hospitalization-associated acute kidney injury (AKI), affecting one-in-five inpatients, is associated with increased mortality and major adverse cardiac/kidney endpoints. Early AKI risk stratification may enable closer monitoring and prevention. Given the complexity and resource utilization of existing machine learning models, we aimed to develop a simpler prediction model. Methods: Models were trained and validated to predict risk of AKI using electronic health record (EHR) data available at 24 h of inpatient admission. Input variables included demographics, laboratory values, medications, and comorbidities. Missing values were imputed using multiple imputation by chained equations. Results: 26,410 of 209,300 (12.6%) inpatients developed AKI during …


Quantum Algorithms For Attacking Hardness Assumptions In Classical And Post‐Quantum Cryptography, J.-F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, Fang Song Aug 2022

Quantum Algorithms For Attacking Hardness Assumptions In Classical And Post‐Quantum Cryptography, J.-F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, Fang Song

Computer Science Faculty Publications and Presentations

In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post-quantum secure cryptosystems. The authors provide details on the cost of the quantum algorithms presented in this survey. The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.


Sl-Cyclegan: Blind Motion Deblurring In Cycles Using Sparse Learning, Ali Syed Saqlain, Li-Yun Wang, Zhiyong Liu May 2022

Sl-Cyclegan: Blind Motion Deblurring In Cycles Using Sparse Learning, Ali Syed Saqlain, Li-Yun Wang, Zhiyong Liu

Computer Science Faculty Publications and Presentations

In this paper, we introduce an end-to-end generative adversarial network (GAN) based on sparse learning for single image motion deblurring, which we called SL-CycleGAN. For the first time in image motion deblurring, we propose a sparse ResNet-block as a combination of sparse convolution layers and a trainable spatial pooler k-winner based on HTM (Hierarchical Temporal Memory) to replace non-linearity such as ReLU in the ResNet-block of SL-CycleGAN generators. Furthermore, we take our inspiration from the domain-to-domain translation ability of the CycleGAN, and we show that image deblurring can be cycle-consistent while achieving the best qualitative results. Finally, we perform extensive …


Rate Maximization In A Uav Based Full-Duplex Multi-User Communication Network Using Multi-Objective Optimization, Syed Muhammad Hashir, Sabyasachi Gupta, Gavin Megson, Ehsan Aryafar, Joseph Camp Feb 2022

Rate Maximization In A Uav Based Full-Duplex Multi-User Communication Network Using Multi-Objective Optimization, Syed Muhammad Hashir, Sabyasachi Gupta, Gavin Megson, Ehsan Aryafar, Joseph Camp

Computer Science Faculty Publications and Presentations

In this paper, we study an unmanned-aerial-vehicle (UAV) based full-duplex (FD) multi-user communication network, where a UAV is deployed as a multiple-input–multiple-output (MIMO) FD base station (BS) to serve multiple FD users on the ground. We propose a multi-objective optimization framework which considers two desirable objective functions, namely sum uplink (UL) rate maximization and sum downlink (DL) rate maximization while providing quality-of-service to all the users in the communication network. A novel resource allocation multi-objective-optimization-problem (MOOP) is designed which optimizes the downlink beamformer, the beamwidth angle, and the 3D position of the UAV, and also the UL power of the …


Learned Dual-View Reflection Removal, Simon Niklaus, Xuaner Cecilia Zhang, Jonathan T. Barron, Neal Wadhwa, Rahul Garg, Feng Liu, Tianfan Xue Apr 2021

Learned Dual-View Reflection Removal, Simon Niklaus, Xuaner Cecilia Zhang, Jonathan T. Barron, Neal Wadhwa, Rahul Garg, Feng Liu, Tianfan Xue

Computer Science Faculty Publications and Presentations

Traditional reflection removal algorithms either use a single image as input, which suffers from intrinsic ambiguities, or use multiple images from a moving camera, which is inconvenient for users. We instead propose a learning-based dereflection algorithm that uses stereo images as input. This is an effective trade-off between the two extremes: the parallax between two views provides cues to remove reflections, and two views are easy to capture due to the adoption of stereo cameras in smartphones. Our model consists of a learning-based reflection-invariant flow model for dual-view registration, and a learned synthesis model for combining aligned image pairs. Because …


View Synthesis Of Dynamic Scenes Based On Deep 3d Mask Volume, Kai-En Lin, Guowei Yang, Lei Xiao, Feng Liu, Ravi Ramamoorthi Jan 2021

View Synthesis Of Dynamic Scenes Based On Deep 3d Mask Volume, Kai-En Lin, Guowei Yang, Lei Xiao, Feng Liu, Ravi Ramamoorthi

Computer Science Faculty Publications and Presentations

Image view synthesis has seen great success in reconstructing photorealistic visuals, thanks to deep learning and various novel representations. The next key step in immersive virtual experiences is view synthesis of dynamic scenes. However, several challenges exist due to the lack of high-quality training datasets, and the additional time dimension for videos of dynamic scenes. To address this issue, we introduce a multi-view video dataset, captured with a custom 10-camera rig in 120FPS. The dataset contains 96 high-quality scenes showing various visual effects and human interactions in outdoor scenes. We develop a new algorithm, Deep 3D Mask Volume, which enables …


Selectivity And Robustness Of Sparse Coding Networks, Dylan M. Paiton, Charles Frye, Sheng Y. Lundquist, Joel D. Bowen, Ryan Zarcone, Bruno A. Olshausen Jan 2020

Selectivity And Robustness Of Sparse Coding Networks, Dylan M. Paiton, Charles Frye, Sheng Y. Lundquist, Joel D. Bowen, Ryan Zarcone, Bruno A. Olshausen

Computer Science Faculty Publications and Presentations

We investigate how the population nonlinearities resulting from lateral inhibition and thresholding in sparse coding networks influence neural response selectivity and robustness. We show that when compared to pointwise nonlinear models, such population nonlinearities improve the selectivity to a preferred stimulus and protect against adversarial perturbations of the input. These findings are predicted from the geometry of the single-neuron iso-response surface, which provides new insight into the relationship between selectivity and adversarial robustness. Inhibitory lateral connections curve the iso-response surface outward in the direction of selectivity. Since adversarial perturbations are orthogonal to the iso-response surface, adversarial attacks tend to be …


Computer Science For Equity: Teacher Education, Agency, And Statewide Reform, Joanna Goode, Max Skorodinsky, Jill Hubbard, James Hook Jan 2020

Computer Science For Equity: Teacher Education, Agency, And Statewide Reform, Joanna Goode, Max Skorodinsky, Jill Hubbard, James Hook

Computer Science Faculty Publications and Presentations

This paper reports on a statewide “Computer Science for All” initiative in Oregon that aims to democratize high school computer science and broaden participation in an academic subject that is one of the most segregated disciplines nationwide, in terms of both race and gender. With no statewide policies to support computing instruction, Oregon's legacy of computer science education has been marked by both low participation and by rates of underrepresented students falling well-below the already dismal national rates. The study outlined in this paper focuses on how teacher education can support educators in developing knowledge and agency, and impacting policies …


Artificial Intelligence Hits The Barrier Of Meaning, Melanie Mitchell Feb 2019

Artificial Intelligence Hits The Barrier Of Meaning, Melanie Mitchell

Computer Science Faculty Publications and Presentations

Today’s AI systems sorely lack the essence of human intelligence: Understanding the situations we experience, being able to grasp their meaning. The lack of humanlike understanding in machines is underscored by recent studies demonstrating lack of robustness of state-of-the-art deep-learning systems. Deeper networks and larger datasets alone are not likely to unlock AI’s “barrier of meaning”; instead the field will need to embrace its original roots as an interdisciplinary science of intelligence.


Context-Aware Synthesis For Video Frame Interpolation, Simon Niklaus, Feng Liu Jan 2019

Context-Aware Synthesis For Video Frame Interpolation, Simon Niklaus, Feng Liu

Computer Science Faculty Publications and Presentations

Video frame interpolation algorithms typically estimate optical flow or its variations and then use it to guide the synthesis of an intermediate frame between two consecutive original frames. To handle challenges like occlusion, bidirectional flow between the two input frames is often estimated and used to warp and blend the input frames. However, how to effectively blend the two warped frames still remains a challenging problem. This paper presents a context-aware synthesis approach that warps not only the input frames but also their pixel-wise contextual information and uses them to interpolate a high-quality intermediate frame. Specifically, we first use a …


Samu: Design And Implementation Of Frequency Selectivity-Aware Multi-User Mimo For Wlans, Yongjiu Du, Yan Shi, Ehsan Aryafar, Pengfei Cui, Joseph Camp, Mung Chiang Dec 2018

Samu: Design And Implementation Of Frequency Selectivity-Aware Multi-User Mimo For Wlans, Yongjiu Du, Yan Shi, Ehsan Aryafar, Pengfei Cui, Joseph Camp, Mung Chiang

Computer Science Faculty Publications and Presentations

The traffic demand of wireless networks is expected to increase 1000-fold over the next decade. In anticipation of such increasing data demand for dense networks with a large number of stations, IEEE 802.11ax has introduced key technologies for capacity improvement including Orthogonal Frequency-Division Multiple Access (OFDMA), multi-user multi-input multi-output (MU-MIMO), and greater bandwidth. However, IEEE 802.11ax has yet to fully define a specific scheduling framework, on which the throughput improvement of networks significantly depends. Even within a 20 MHz of bandwidth, users experience heterogeneous channel orthogonality characteristics across sub-carriers, which prevents access points (APs) from achieving the ideal multi-user gain. …


Grace's Inheritance, James Noble, Andrew P. Black, Kim B. Bruce, Michael Homer, Timothy Jones Jan 2017

Grace's Inheritance, James Noble, Andrew P. Black, Kim B. Bruce, Michael Homer, Timothy Jones

Computer Science Faculty Publications and Presentations

This article is an apologia for the design of inheritance in the Grace educational programming language: it explains how the design of Grace’s inheritance draws from inheritance mechanisms in predecessor languages, and defends that design as the best of the available alternatives. For simplicity, Grace objects are generated from object constructors, like those of Emerald, Lua, and Javascript; for familiarity, the language also provides classes and inheritance, like Simula, Smalltalk and Java. The design question we address is whether or not object constructors can provide an inheritance semantics similar to classes.


Incorporating Priors For Medical Image Segmentation Using A Genetic Algorithm, Payel Ghosh, Melanie Mitchell, James A. Tanyi, Arthur Y. Hung Feb 2016

Incorporating Priors For Medical Image Segmentation Using A Genetic Algorithm, Payel Ghosh, Melanie Mitchell, James A. Tanyi, Arthur Y. Hung

Computer Science Faculty Publications and Presentations

Medical image segmentation is typically performed manually by a physician to delineate gross tumor volumes for treatment planning and diagnosis. Manual segmentation is performed by medical experts using prior knowledge of organ shapes and locations but is prone to reader subjectivity and inconsistency. Automating the process is challenging due to poor tissue contrast and ill-defined organ/tissue boundaries in medical images. This paper presents a genetic algorithm for combining representations of learned information such as known shapes, regional properties and relative position of objects into a single framework to perform automated three-dimensional segmentation. The algorithm has been tested for prostate segmentation …


From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus Dec 2015

From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus

Computer Science Faculty Publications and Presentations

Although functional as well as logic languages use equality to discriminate between logically different cases, the operational meaning of equality is different in such languages. Functional languages reduce equational expressions to their Boolean values, True or False, logic languages use unification to check the validity only and fail otherwise. Consequently, the language Curry, which amalgamates functional and logic programming features, offers two kinds of equational expressions so that the programmer has to distinguish between these uses. We show that this distinction can be avoided by providing an analysis and transformation method that automatically selects the appropriate operation. Without this distinction …


Reinforced Imitative Graph Learning For Mobile User Profiling, Dongjie Wang, Pengyang Wang, Yanjie Fu, Kunpeng Liu, Hui Xiong, Charles Hughes Aug 2015

Reinforced Imitative Graph Learning For Mobile User Profiling, Dongjie Wang, Pengyang Wang, Yanjie Fu, Kunpeng Liu, Hui Xiong, Charles Hughes

Computer Science Faculty Publications and Presentations

Mobile user profiling refers to the efforts of extracting users’ characteristics from mobile activities. In order to capture the dynamic varying of user characteristics for generating effective user profiling, we propose an imitation-based mobile user profiling framework. Considering the objective of teaching an autonomous agent to imitate user mobility based on the user’s profile, the user profile is the most accurate when the agent can perfectly mimic the user behavior patterns. The profiling framework is formulated into a reinforcement learning task, where an agent is a next-visit planner, an action is a POI that a user will visit next, and …


A Scaffolded, Metamorphic Ctf For Reverse Engineering, Wu-Chang Feng Aug 2015

A Scaffolded, Metamorphic Ctf For Reverse Engineering, Wu-Chang Feng

Computer Science Faculty Publications and Presentations

Hands-on Capture-the-Flag (CTF) challenges tap into and cultivate the intrinsic motivation within people to solve puzzles, much in the same way Sudoku and crossword puzzles do. While the format has been successful in security competitions, there have been a limited number of attempts to integrate them into a classroom environment. This paper describes MetaCTF, a metamorphic set of CTF challenges for teaching reverse code engineering. MetaCTF is 1) scaffolded in a way that allows students to make incremental progress, 2) integrated with the course material so that students can immediately apply knowledge gained in class, 3) polymorphic and metamorphic so …


Compiling Collapsing Rules In Certain Constructor Systems, Sergio Antoy, Andy Jost Jul 2015

Compiling Collapsing Rules In Certain Constructor Systems, Sergio Antoy, Andy Jost

Computer Science Faculty Publications and Presentations

The implementation of functional logic languages by means of graph rewriting requires a special handling of collapsing rules. Recent advances about the notion of a needed step in some constructor systems offer a new approach to this problem. We present two results: a transformation of a certain class of constructor-based rewrite systems that eliminates collapsing rules, and a rewrite-like relation that takes advantage of the absence of collapsing rules. We formally state and prove the correctness of these results. When used together, these results simplify without any loss of efficiency an implementation of graph rewriting and consequently of functional logic …


Automatic Fault Injection For Driver Robustness Testing, Kai Cong, Li Lei, Zhenkun Yang, Fei Xie Jul 2015

Automatic Fault Injection For Driver Robustness Testing, Kai Cong, Li Lei, Zhenkun Yang, Fei Xie

Computer Science Faculty Publications and Presentations

Robustness testing is a crucial stage in the device driver development cycle. To accelerate driver robustness testing, effective fault scenarios need to be generated and injected without requiring much time and human effort. In this pa- per, we present a practical approach to automatic runtime generation and injection of fault scenarios for driver robust- ness testing. We identify target functions that can fail from runtime execution traces, generate effective fault scenarios on these target functions using a bounded trace-based it- erative strategy, and inject the generated fault scenarios at runtime to test driver robustness using a permutation-based injection mechanism. We …


Static Conflict Detection For A Policy Language, Alix Trou, Robert Dockins, Andrew Tolmach Jan 2015

Static Conflict Detection For A Policy Language, Alix Trou, Robert Dockins, Andrew Tolmach

Computer Science Faculty Publications and Presentations

We present a static control flow analysis used in the Simple Unified Policy Programming Language (SUPPL) compiler to detect internally inconsistent policies. For example, an access control policy can decide to both “allow” and “deny” access for a user; such an inconsistency is called a conflict. Policies in Suppl. follow the Event-Condition-Action paradigm; predicates are used to model conditions and event handlers are written in an imperative way. The analysis is twofold; it first computes a superset of all conflicts by looking for a combination of actions in the event handlers that might violate a user-supplied definition of conflicts. SMT …


Needed Computations Shortcutting Needed Steps, Sergio Antoy, Jacob Johannsen, Steven Libby Jan 2015

Needed Computations Shortcutting Needed Steps, Sergio Antoy, Jacob Johannsen, Steven Libby

Computer Science Faculty Publications and Presentations

We define a compilation scheme for a constructor-based, strongly-sequential, graph rewriting system which shortcuts some needed steps. The object code is another constructor-based graph rewriting system. This system is normalizing for the original system when using an innermost strategy. Consequently, the object code can be easily implemented by eager functions in a variety of programming languages. We modify this object code in a way that avoids total or partial construction of the contracta of some needed steps of a computation. When computing normal forms in this way, both memory consumption and execution time are reduced compared to ordinary rewriting computations …