• Title/Summary/Keyword: Task Graph

Search Result 153, Processing Time 0.02 seconds

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

ON SOMBOR INDEX OF BICYCLIC GRAPHS WITH GIVEN MATCHING NUMBER

  • XIAOLING, SUN;JIANWEI, DU
    • Journal of Applied and Pure Mathematics
    • /
    • v.4 no.5_6
    • /
    • pp.249-262
    • /
    • 2022
  • Nowadays, it is an important task to find extremal values on any molecular descriptor with respect to different graph parameters. The Sombor index is a novel topological molecular descriptor introduced by Gutman in 2021. The research on determining extremal values for the Sombor index of a graph is very popular recently. In this paper, we present the maximum Sombor index of bicyclic graphs with given matching number. Furthermore, we identify the corresponding extremal bicyclic graphs.

Implementation of Scheduling Strategies on PC Clusters (PC 클러스터에서 스케줄링 기법의 구현)

  • Kang Oh-Han;Song Hee-Heon;Chung Joong-Soo
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.521-528
    • /
    • 2004
  • In this-paper, we propose a new task scheduling scheme for bus-based cluster architectures and analyze performance of the scheduling scheme which has been implemented in a PC cluster. The implemented scheme schedules the tasks of a task graph to the processors of a PC cluster, and it reduces parallel execution time by selectively duplicating critical tasks using heuristic. Experimental results show that the proposed scheduling scheme produces better parallel execution time than the other scheduling scheme.

Duplication with Task Assignment in Mesh Distributed System

  • Sharma, Rashmi;Nitin, Nitin
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.193-214
    • /
    • 2014
  • Load balancing is the major benefit of any distributed system. To facilitate this advantage, task duplication and migration methodologies are employed. As this paper deals with dependent tasks (DAG), we used duplication. Task duplication reduces the overall schedule length of DAG along-with load balancing. This paper proposes a new task duplication algorithm at the time of tasks assignment on various processors. With the intention of conducting proposed algorithm performance computation; simulation has been done on the Netbeans IDE. The mesh topology of a distributed system is simulated at this juncture. For task duplication, overall schedule length of DAG is the main parameter that decides the performance of a proposed duplication algorithm. After obtaining the results we compared our performance with arbitrary task assignment, CAWF and HEFT-TD algorithms. Additionally, we also compared the complexity of the proposed algorithm with the Duplication Based Bottom Up scheduling (DBUS) and Heterogeneous Earliest Finish Time with Task Duplication (HEFT-TD).

Modeling for Performance Evaluation of Distributed Computer Systems (분산 컴퓨터 시스템의 성능 평가를 위한 모델연구)

  • Cho, Young-Cheol;Kwon, Wook-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 1995.11a
    • /
    • pp.219-221
    • /
    • 1995
  • This paper proposes a model for simulation and performance evaluation of distributed computer systems(DCS). The model is composed of operating system(OS), resource, task, environment submodel. Task Flow Graph(TFG) is suggested to describe the relation between tasks. This paper considers task response time, the scheduler's ready queue length, utilization of each resource as performance indices. The distributed system of Continuous Annealing Line(CAL) in iron process is simulated with the proposed model.

  • PDF

Exploring Visualization Process of Expert Teachers: a Case of the Simple Visual Task

  • HEO, Gyun
    • Educational Technology International
    • /
    • v.7 no.1
    • /
    • pp.21-37
    • /
    • 2006
  • This paper focuses on finding out visualization process by means of VTA(Visual Task Analysis) of expert teachers' simple task. Findings indicate teachers have coding schema of performing visual task as such; (a) the analyzing by reading and some activities in the task text, (b) conceptualizing or understanding in his/her own way, (c) the explaining of the action or product, (d) the searching by thinking or finding, (e) the decision of visualizing of the task. Expert teachers tried to visualize in the form of abstract graph, and to omit the object which was not directly related to the topic at the pilot study. VAT based on ground theory and protocol analysis was developed and performed. This case study suggests that an additional study for searching a guide and method might be beneficial for conducting a visual task analysis.

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing

  • Zhu, Hong;Wu, Bin;Xie, Meiyi;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5171-5189
    • /
    • 2016
  • With the popularity of cloud computing, many data owners outsource their graph data to the cloud for cost savings. The cloud server is not fully trusted and always wants to learn the owners' contents. To protect the information hiding, the graph data have to be encrypted before outsourcing to the cloud. The adjacent vertex search is a very common operation, many other operations can be built based on the adjacent vertex search. A boolean adjacent vertex search is an important basic operation, a query user can get the boolean search results. Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. We use the Gram-Schmidt algorithm and achieve the boolean expression search in our paper. We formally analyze the security of our scheme, and the query user can handily get the boolean search results by this scheme. The experiment results with a real graph data set demonstrate the efficiency of our scheme.

Comparative Study on Static Task Scheduling Algorithms in Global Heterogeneous Environment (전역 이기종 환경에서의 정적 태스크 스케줄링의 비교 연구)

  • Kim Jung-Hwan
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.163-170
    • /
    • 2006
  • Most scheduling problems including DAG(Directed Acyclic Graph)-based are known to be NP-complete, so many heuristic-based scheduling algorithms have been researched. HEFT and CPOP are such algorithms which have been devised to be effective in heterogeneous environment. We proposed, in the previous research, three scheduling algorithms which are effective in realistic global heterogeneous environment: CPOC, eCPOPC and eCPOP. In this paper, the heuristics which are used in the above five algorithms will be systematically analyzed. Those algorithms will be also studied experimentally using various benchmarks. Experimental results show that the eCPOC generates better schedules than any other algorithms and the heuristics which are used in the proposed algorithms are effective in the global heterogeneous environment.

An Optimization Strategy of Task Allocation using Coordination Agent (조정 에이전트를 이용한 작업 할당 최적화 기법)

  • Park, Jae-Hyun;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.7 no.4
    • /
    • pp.93-104
    • /
    • 2007
  • In the complex real-time multi-agent system such as game environment, dynamic task allocations are repeatedly performed to achieve a goal in terms of system efficiency. In this research, we present a task allocation scheme suitable for the real-time multi-agent environment. The scheme is to optimize the task allocation by complementing existing coordination agent with $A^*$ algorithm. The coordination agent creates a status graph that consists of nodes which represent the combinations of tasks and agents, and refines the graph to remove nodes of non-execution tasks and agents. The coordination agent performs the selective utilization of the $A^*$ algorithm method and the greedy method for real-time re-allocation. Then it finds some paths of the minimum cost as optimized results by using $A^*$ algorithm. Our experiments show that the coordination agent with $A^*$ algorithm improves a task allocation efficiency about 25% highly than the coordination agent only with greedy algorithm.

  • PDF

Complex Discrete Systems Graph Simulation

  • Kadirova, Delovar;Kadirova, Aziza
    • Journal of Multimedia Information System
    • /
    • v.2 no.3
    • /
    • pp.263-274
    • /
    • 2015
  • The subject of this work is the complex discrete systems simulation special features with the aid of dynamic graph models. The proposed simulation technique allows to determine the ways for tasks solutions in terms of discrete systems analysis and synthesis of various complication: one-dimensional and multidimensional, steady and unstable, with the pulse elements abnormal operating mode and others. Often complex control systems analysis and synthesis task solutions, via classical approach comes out to be insolvent, because of the computational problems. The application of graph models allows to perform clear and strict characterization and computer procedures automation. The optimal controls synthesis algorithm presented in this paper, transferring the discrete system from target initial state to target final state within the minimum time, allows to consider the zero initial conditions systems, with the initial potential energy, with the control actions limitations and complex pulse elements operating mode.