958 resultados para Call dependency analysis
Resumo:
Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Resumo:
Les cadriciels et les bibliothèques sont indispensables aux systèmes logiciels d'aujourd'hui. Quand ils évoluent, il est souvent fastidieux et coûteux pour les développeurs de faire la mise à jour de leur code. Par conséquent, des approches ont été proposées pour aider les développeurs à migrer leur code. Généralement, ces approches ne peuvent identifier automatiquement les règles de modification une-remplacée-par-plusieurs méthodes et plusieurs-remplacées-par-une méthode. De plus, elles font souvent un compromis entre rappel et précision dans leur résultats en utilisant un ou plusieurs seuils expérimentaux. Nous présentons AURA (AUtomatic change Rule Assistant), une nouvelle approche hybride qui combine call dependency analysis et text similarity analysis pour surmonter ces limitations. Nous avons implanté AURA en Java et comparé ses résultats sur cinq cadriciels avec trois approches précédentes par Dagenais et Robillard, M. Kim et al., et Schäfer et al. Les résultats de cette comparaison montrent que, en moyenne, le rappel de AURA est 53,07% plus que celui des autre approches avec une précision similaire (0,10% en moins).
Resumo:
As características relacionadas à comunicação sonora em duas espécies aparentadas, Hyla nana e H. sanborni, pertencentes ao grupo nana de espécies, foram estudadas, entre agosto de 1997 e junho de 1999, em duas poças permanentes de grande porte em área aberta na região de Botucatu, Estado de São Paulo. Foram obtidas gravações de 131 exemplares, 71 indivíduos de H. nana e 58 de H. sanborni, durante início de atividade de vocalização e atividade de vocalização em coro. Houve diferença nos ritmos de emissão de notas dos cantos entre o início das atividades e durante os coros. O canto de anúncio das espécies consiste na emissão de séries consecutivas de notas simples, pulsadas, com taxa de repetição rápida. Hyla nana e H. sanborni apresentam dois tipos de notas em seu canto de anúncio, denominados aqui como tipos A e B. Notas do tipo A, introdutórias, apresentam maior duração e número de pulsos, e suas emissões foram mais freqüentes durante o início das atividades de vocalização. As notas introdutórias são as primeiras da série emitida em atividade de coro. As notas do tipo B, secundárias, são curtas e com menor número de pulsos, sendo emitidas durante as vocalizações em coro. Os dois tipos de notas encontrados diferem significativamente em sua estrutura temporal. As duas espécies apresentaram segregação acústica tanto na estrutura espectral como na temporal de seus cantos de anúncio.
Resumo:
Automatic Call Recognition is vital for environmental monitoring. Patten recognition has been applied in automatic species recognition for years. However, few studies have applied formal syntactic methods to species call structure analysis. This paper introduces a novel method to adopt timed and probabilistic automata in automatic species recognition based upon acoustic components as the primitives. We demonstrate this through one kind of birds in Australia: Eastern Yellow Robin.
Resumo:
Image analysis and graphics synthesis can be achieved with learning techniques using directly image examples without physically-based, 3D models. In our technique: -- the mapping from novel images to a vector of "pose" and "expression" parameters can be learned from a small set of example images using a function approximation technique that we call an analysis network; -- the inverse mapping from input "pose" and "expression" parameters to output images can be synthesized from a small set of example images and used to produce new images using a similar synthesis network. The techniques described here have several applications in computer graphics, special effects, interactive multimedia and very low bandwidth teleconferencing.
Resumo:
La tâche de maintenance ainsi que la compréhension des programmes orientés objet (OO) deviennent de plus en plus coûteuses. L’analyse des liens de dépendance peut être une solution pour faciliter ces tâches d’ingénierie. Cependant, analyser les liens de dépendance est une tâche à la fois importante et difficile. Nous proposons une approche pour l'étude des liens de dépendance internes pour des programmes OO, dans un cadre probabiliste, où les entrées du programme peuvent être modélisées comme un vecteur aléatoire, ou comme une chaîne de Markov. Dans ce cadre, les métriques de couplage deviennent des variables aléatoires dont les distributions de probabilité peuvent être étudiées en utilisant les techniques de simulation Monte-Carlo. Les distributions obtenues constituent un point d’entrée pour comprendre les liens de dépendance internes entre les éléments du programme, ainsi que leur comportement général. Ce travail est valable dans le cas où les valeurs prises par la métrique dépendent des entrées du programme et que ces entrées ne sont pas fixées à priori. Nous illustrons notre approche par deux études de cas.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
The analysis of the wind flow around buildings has a great interest from the point of view of the wind energy assessment, pollutant dispersion control, natural ventilation and pedestrians wind comfort and safety. Since LES turbulence models are computationally time consuming when applied to real geometries, RANS models are still widely used. However, RANS models are very sensitive to the chosen turbulence parametrisation and the results can vary according to the application. In this investigation, the simulation of the wind flow around an isolated building is performed using various types of RANS turbulence models in the open source code OpenFOAM, and the results are compared with benchmark experimental data. In order to confirm the numerical accuracy of the simulations, a grid dependency analysis is performed and the convergence index and rate are calculated. Hit rates are calculated for all the cases and the models that successfully pass a validation criterion are analysed at different regions of the building roof, and the most accurate RANS models for the modelling of the flow at each region are identified. The characteristics of the wind flow at each region are also analysed from the point of view of the wind energy generation, and the most adequate wind turbine model for the wind energy exploitation at each region of the building roof is chosen.
Resumo:
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.
Resumo:
It is of course recognised that technology can be gendered and implicated in gender relations. However, it continues to be the case that men’s experiences with technology are underexplored and the situation is even more problematic where digital media is concerned. Over the past 30 years we have witnessed a dramatic rise in the pervasiveness of digital media across many parts of the world and as associated with wide ranging aspects of our lives. This rise has been fuelled over the last decade by the emergence of Web 2.0 and particularly Social Networking Sites (SNS). Given this context, I believe it is necessary for us to undertake more work to understand men’s engagements with digital media, the implications this might have for masculinities and the analysis of gender relations more generally. To begin to unpack this area, I engage theorizations of the properties of digital media networks and integrate this with the masculinity studies field. Using this framework, I suggest we need to consider the rise in what I call networked masculinities – those masculinities (co)produced and reproduced with digitally networked publics. Through this analysis I discuss themes related to digital mediators, relationships, play and leisure, work and commerce, and ethics. I conclude that as masculinities can be, and are being, complicated and given agency by advancing notions and practices of connectivity, mobility, classification and convergence, those engaged with masculinity studies and digital media have much to contribute.
Resumo:
Stakeholder analysis plays a critical role in business analysis. However, the majority of the stakeholder identification and analysis methods focus on the activities and processes and ignore the artefacts being processed by human beings. By focusing on the outputs of the organisation, an artefact-centric view helps create a network of artefacts, and a component-based structure of the organisation and its supply chain participants. Since the relationship is based on the components, i.e. after the stakeholders are identified, the interdependency between stakeholders and the focal organisation can be measured. Each stakeholder is associated with two types of dependency, namely the stakeholder’s dependency on the focal organisation and the focal organisation’s dependency on the stakeholder. We identify three factors for each type of dependency and propose the equations that calculate the dependency indexes. Once both types of the dependency indexes are calculated, each stakeholder can be placed and categorised into one of the four groups, namely critical stakeholder, mutual benefits stakeholder, replaceable stakeholder, and easy care stakeholder. The mutual dependency grid and the dependency gap analysis, which further investigates the priority of each stakeholder by calculating the weighted dependency gap between the focal organisation and the stakeholder, subsequently help the focal organisation to better understand its stakeholders and manage its stakeholder relationships.
Resumo:
In this article we take a discourse-historical approach to illustrate the significance of George W Bush's (2001) declaration of a 'war on terror'. We present four exemplary 'call to arms' speeches by Pope Urban 11 (1095), Queen Elizabeth I (1588), Adolf Hitler (1938) and George W Bush (2001) to exemplify the structure, function, and historical significance of such texts in western societies over the last millennium. We identify four generic features that have endured in such texts throughout this period: (i) an appeal to a legitimate power source that is external to the orator, and which is presented as inherently good; (ii) an appeal to the historical importance of the culture in which the discourse is situated; (iii) the construction of a thoroughly evil Other; and (iv) an appeal for unification behind the legitimating external power source. We argue further that such texts typically appear in historical contexts characterized by deep crises in political legitimacy.