19 results on '"Trace generation"'
Search Results
2. Protecting the trust and credibility of data by tracking forgery trace based on GANs
- Author
-
Shuai Xiao, Jiachen Yang, and Zhihan Lv
- Subjects
Forgery detection ,Trace generation ,Social data ,Privacy protection ,Information technology ,T58.5-58.64 - Abstract
With the advent of the 5G Internet of Things era, communication and social interaction in our daily life have changed a lot, and a large amount of social data is transmitted to the Internet. At the same time, with the rapid development of deep forgery technology, a new generation of social data trust crisis has also followed. Therefore, how to ensure the trust and credibility of social data in the 5G Internet of Things era is an urgent problem to be solved. This paper proposes a new method for forgery detection based on GANs. We first discover the hidden gradient information in the grayscale image of the forged image and use this gradient information to guide the generation of forged traces. In the classifier, we replace the traditional binary loss with the focal loss that can focus on difficult-to-classify samples, which can achieve accurate classification when the real and fake samples are unbalanced. Experimental results show that the proposed method can achieve high accuracy on the DeeperForensics dataset and with the highest accuracy is 98%.
- Published
- 2022
- Full Text
- View/download PDF
3. OntoTrace: A Tool for Supporting Trace Generation in Software Development by Using Ontology-Based Automatic Reasoning
- Author
-
Mosquera, David, Ruiz, Marcela, Pastor, Oscar, Spielberger, Jürgen, Fievet, Lucas, van der Aalst, Wil, Series Editor, Mylopoulos, John, Series Editor, Ram, Sudha, Series Editor, Rosemann, Michael, Series Editor, Szyperski, Clemens, Series Editor, De Weerdt, Jochen, editor, and Polyvyanyy, Artem, editor
- Published
- 2022
- Full Text
- View/download PDF
4. MSTA-Net: Forgery Detection by Generating Manipulation Trace Based on Multi-Scale Self-Texture Attention.
- Author
-
Yang, Jiachen, Xiao, Shuai, Li, Aiyun, Lu, Wen, Gao, Xinbo, and Li, Yang
- Subjects
- *
FORGERY , *DEEPFAKES , *CONVOLUTIONAL neural networks , *CIVIL rights , *HUMAN fingerprints - Abstract
Lots of Deepfake videos are circulating on the Internet, which not only damages the personal rights of the forged individual, but also pollutes the web environment. What’s worse, it may trigger public opinion and endanger national security. Therefore, it is urgent to fight deep forgery. Most of the current forgery detection algorithms are based on convolutional neural networks to learn the feature differences between forged and real frames from big data. In this paper, from the perspective of image generation, we simulate the forgery process based on image generation and explore possible trace of forgery. We propose a multi-scale self-texture attention Generative Network(MSTA-Net) to track the potential texture trace in image generation process and eliminate the interference of deep forgery post-processing. Firstly, a generator with encoder-decoder is to disassemble images and performed trace generation, then we merge the generated trace image and the original map, which is input into the classifier with Resnet as the backbone. Secondly, the self-texture attention mechanism(STA) is proposed as the skip connection between the encoder and the decoder, which significantly enhances the texture characteristics in the image disassembly process and assists the generation of texture trace. Finally, we propose a loss function called Prob-tuple loss restricted by classification probability to amend the generation of forgery trace directly. To verify the performance of the MSTA-Net, we design different experiments to verify the feasibility and advancement of the method. Experimental results show that the proposed method performs well on deep forged databases represented by FaceForensics++, Celeb-DF, Deeperforensics and DFDC, and some results are reaching the state-of-the-art. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. OntoTrace : a tool for supporting trace generation in software development by using ontology-based automatic reasoning
- Author
-
Mosquera, David, Ruiz, Marcela, Pastor, Oscar, Spielberger, Jürgen, Fievet, Lucas, Mosquera, David, Ruiz, Marcela, Pastor, Oscar, Spielberger, Jürgen, and Fievet, Lucas
- Abstract
Traceability in software development has gained interest due to its software maintainability and quality assurance benefits. Artifacts such as code, requirements, mockups, test cases, among others, are feasible trace sources/targets during the software development process. Existing scientific approaches support tasks like identifying untraced artifacts, establishing new traces, and validating existing traces. However, most approaches require input existing traceability data or are restricted to a certain application domain hindering their practical application. This contemporary challenge in information systems engineering calls for novel traceability solutions. In this paper, we present OntoTrace: a tool for supporting traceability tasks in software development projects by using ontology-based automatic reasoning. OntoTrace allows software development teams for inferring traceability-related data such as i) which are the traceable source/target artifacts; ii) which artifacts are not yet traced; and iii) given a specific artifact, which are the possible traces between it and other artifacts. We demonstrate how OntoTrace works in the context of the Swiss startup LogicFlow AG, supporting the traceability between functional/non-functional requirements and user interface test cases. We conclude the paper by reflecting on the experience from applying the approach in practice, and we draw on future challenges and next research endeavors.
- Published
- 2023
6. Capturing Transactional Memory Application’s Behavior – The Prerequisite for Performance Analysis
- Author
-
Schindewolf, Martin, Karl, Wolfgang, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Pankratius, Victor, editor, and Philippsen, Michael, editor
- Published
- 2012
- Full Text
- View/download PDF
7. A Method for Accurate High-Level Performance Evaluation of MPSoC Architectures Using Fine-Grained Generated Traces
- Author
-
Plyaskin, Roman, Herkersdorf, Andreas, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Müller-Schloer, Christian, editor, Karl, Wolfgang, editor, and Yehia, Sami, editor
- Published
- 2010
- Full Text
- View/download PDF
8. Workload Generators for Web-Based Systems: Characteristics, Current Status, and Challenges.
- Author
-
Curiel, Mariela and Pont, Ana
- Subjects
WORKLOAD of computers ,WEB-based user interfaces ,WORLD Wide Web ,ONLINE social networks ,INTERNET servers - Abstract
The growth and evolution of the World Wide Web (WWW) has been rapid over the last ten years and this has been caused mainly by factors such as the social Web and mobile technology. This growth, which presupposes the satisfaction of millions of users accessing Web applications with an adequate quality of service, requires continuous changes in the infrastructure to improve user experience or to handle new demands. Therefore, studies of Web-based systems aimed at comparing different hardware infrastructures, detecting system bottlenecks, provisioning hardware resources, making capacity planning tests, or software testability, are a matter of huge interest. However, the new trends in the WWW have brought new types of user demands and interactions that produce complex workload patterns. These patterns must be exhaustively studied and considered when designing helpful workload generators able to produce representative traces of the current reality. This survey is aimed at providing a useful guide for researchers of the Web, social networking, and other Internet related issues, regarding the main points and concerns about workload generation for Web-based systems. This paper reviews the predominant characteristics and attributes that define Web workloads, including the special cases of other types of Web applications (e.g., blogs, online social network platforms, and video-sharing services). It also identifies the main challenges for the next generation of Web workload generators, and explores current approaches and solutions suggested in recent works. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
9. Protecting the trust and credibility of data by tracking forgery trace based on GANs
- Author
-
Xiao, Shuai, Yang, Jiachen, Lv, Zhihan, Xiao, Shuai, Yang, Jiachen, and Lv, Zhihan
- Abstract
With the advent of the 5G Internet of Things era, communication and social interaction in our daily life have changed a lot, and a large amount of social data is transmitted to the Internet. At the same time, with the rapid development of deep forgery technology, a new generation of social data trust crisis has also followed. Therefore, how to ensure the trust and credibility of social data in the 5G Internet of Things era is an urgent problem to be solved. This paper proposes a new method for forgery detection based on GANs. We first discover the hidden gradient information in the grayscale image of the forged image and use this gradient information to guide the generation of forged traces. In the classifier, we replace the traditional binary loss with the focal loss that can focus on difficult-to-classify samples, which can achieve accurate classification when the real and fake samples are unbalanced. Experimental results show that the proposed method can achieve high accuracy on the DeeperForensics dataset and with the highest accuracy is 98%.
- Published
- 2022
- Full Text
- View/download PDF
10. Trace-Based Runtime Instruction Rescheduling for Architecture Extension
- Author
-
Tang, YuXing, Deng, Kun, Cao, HongJia, Zhou, XingMing, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Yang, Laurence T., editor, Zhou, Xingshe, editor, Zhao, Wei, editor, Wu, Zhaohui, editor, Zhu, Yian, editor, and Lin, Man, editor
- Published
- 2005
- Full Text
- View/download PDF
11. OntoTrace : a tool for supporting trace generation in software development by using ontology-based automatic reasoning
- Author
-
David Mosquera, Marcela Ruiz, Oscar Pastor, Jürgen Spielberger, and Lucas Fievet
- Subjects
Automatic reasoning ,Ontology ,Software traceability ,Software traceability tool ,005: Computerprogrammierung, Programme und Daten ,006: Spezielle Computerverfahren ,Trace generation - Abstract
Traceability in software development has gained interest due to its software maintainability and quality assurance benefits. Artifacts such as code, requirements, mockups, test cases, among others, are feasible trace sources/targets during the software development process. Existing scientific approaches support tasks like identifying untraced artifacts, establishing new traces, and validating existing traces. However, most approaches require input existing traceability data or are restricted to a certain application domain hindering their practical application. This contemporary challenge in information systems engineering calls for novel traceability solutions. In this paper, we present OntoTrace: a tool for supporting traceability tasks in software development projects by using ontology-based automatic reasoning. OntoTrace allows software development teams for inferring traceability-related data such as i) which are the traceable source/target artifacts; ii) which artifacts are not yet traced; and iii) given a specific artifact, which are the possible traces between it and other artifacts. We demonstrate how OntoTrace works in the context of the Swiss startup LogicFlow AG, supporting the traceability between functional/non-functional requirements and user interface test cases. We conclude the paper by reflecting on the experience from applying the approach in practice, and we draw on future challenges and next research endeavors.
- Published
- 2022
- Full Text
- View/download PDF
12. Threshold settings for TRIP/STOP detection in GPS traces.
- Author
-
Cich, Glenn, Knapen, Luk, Bellemans, Tom, Janssens, Davy, and Wets, Geert
- Abstract
This paper presents two methods to extract stops and trips from GPS traces: the first one focuses on periods of non-movement (stops) and the second one tries to identify the longest periods of movement (trips). A stop corresponds to a location where the individual halts with the intention to perform an activity. In order to assert the quality of both methods, the results are compared to cases where the stops and trips are known by other means. First a set of traces was used for which the stops were identified by the traveler by means of a visual tool aimed at alignment of manually reported periods in the diary to automatically recorded GPS coordinates. Second, a set of synthetic traces was used. Several quality indicators are presented; they have been evaluated using sensitivity analysis in order to determine the optimal values for the detector's configuration settings. Person traces (as opposed to car traces) were used. Individual specific behavior seems to have a large effect on the optimal values for threshold settings used in both the TRIP and STOP detector algorithms. Accurate detection of stops and trips in GPS traces is vital to prompted recall surveys because those surveys can extend over several weeks. Inaccurate stop detection requires frequent corrections by the respondent and can cause them to quit. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
13. Execution replay: A mechanism for integrating a visualization tool with a symbolic debugger
- Author
-
Leu, Eric, Schiper, André, Goos, Gerhard, editor, Hartmanis, Juris, editor, Bougé, Luc, editor, Cosnard, Michel, editor, Robert, Yves, editor, and Trystram, Denis, editor
- Published
- 1992
- Full Text
- View/download PDF
14. A multilane traffic and collision generator for IoV.
- Author
-
Satrawala, Anamika, Mazumdar, Arka Prokash, and Vipparthi, Santosh Kumar
- Subjects
- *
INTELLIGENT transportation systems , *TRAFFIC safety , *INTELLIGENT networks , *TRAFFIC flow , *HUMAN error - Abstract
Cooperative driving is an emerging area in the field of vehicular networks and Intelligent Transportation Systems (ITS). It contributes to enhancing safety by reducing accidents as a consequence of rogue driving and overtaking. Thus, to accomplish the requirements of safety, real-time traffic traces are required for comprehensive analysis. However, the real traces are limited in availability and constraint to the environment they are collected from. On the other hand, a common practice is to use a single-lane traffic generation model to address collision modeling, which is limited by collision modeling of rear-end collisions. Therefore, to address these limitations in the literature, this paper proposes a multilane traffic generation (MLTG) model using microscopic modeling. Furthermore, to generate different multilane synthetic traffic traces, traffic flow behaviors and collision scenarios are replicated as use cases by incorporating the perception & human errors. The efficacy of the MLTG model is tested and analyzed by performing extensive simulations in MATLAB by considering varied scenarios such as straight road, merging, and diversion for single-lane and cross-lane collision modeling, respectively. The results show that the performance of the proposed MLTG model outperforms in terms of stability and scalability, compared to the existing state-of-the-art techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
15. Architecture-Aware Real-Time Compression of Execution Traces.
- Author
-
MIHAJLOVIĆ, BOJAN, ŽILIC, ŽELJKO, and GROSS, WARREN J.
- Subjects
EXECUTION traces (Computer program testing) ,COMPUTER software testing ,DEBUGGING ,DATA compression ,ENCODING - Abstract
In recent years, on-chip trace generation has been recognized as a solution to the debugging of increasingly complex software. An execution trace can be seen as the most fundamentally useful type of trace, allowing the execution path of software to be determined post hoc. However, the bandwidth required to output such a trace can be excessive. Our architecture-aware trace compression (AATC) scheme adds an on-chip branch predictor and branch target buffer to reduce the volume of execution trace data in real time through on-chip compression. Novel redundancy reduction strategies are employed, most notably in exploiting the widespread use of linked branches and the compiler-driven movement of return addresses between link register, stack, and program counter. In doing so, the volume of branch target addresses is reduced by 52%, whereas other algorithmic improvements further decrease trace volume. An analysis of spatial and temporal redundancy in the trace stream allows a comparison of encoding strategies to be made for systematically increasing compression performance. A combination of differential, Fibonacci, VarLen, and Move-to-Front encodings are chosen to produce two compressor variants: a performance-focused xAATC that encodes 56.5 instructions/bit using 24,133 gates and an area-efficient fAATC that encodes 48.1 instructions/bit using only 9,854 gates. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
16. A Hybrid Markov Model for Accurate Memory Reference Generation.
- Author
-
Hassan, Rahman and Harris, Antony
- Subjects
CACHE memory ,MARKOV processes ,COMPUTER simulation ,COMPUTER storage devices ,COMPUTER architecture - Abstract
Workload characterisation and generation is becoming an increasingly important area as hardware and application complexities continue to advance. In this paper, we introduce a concise methodology for workload generation for fast and accurate cache design space exploration. The hybrid model we propose uses an adaptation of the Least Recently Used Stack Model to capture key spatio-temporal locality features and a Markov model is implemented to generate an arbitrary length trace with the given workload characteristics through a dynamically ordered FIFO scheduler. Simulation of a variety of application traces from the SPEC2000 benchmark suite demonstrate the cacheability characteristics of the synthetic memory reference stream is generally very well preserved and similar to its original form. [ABSTRACT FROM AUTHOR]
- Published
- 2007
17. Dynamically Instrumenting the QEMU Emulator for Linux Process Trace Generation with the GDB Debugger.
- Author
-
MIHAJLOVIĆ, BOJAN, ŽILIĆ, ŽELJKO, and GROSS, WARREN J.
- Subjects
LINUX operating systems ,DEBUGGING ,EMULATION software ,EMBEDDED computer systems ,COMPUTER software development - Abstract
In software debugging, trace generation techniques are used to resolve highly complex bugs. However, the emulators increasingly used for embedded software development do not yet offer the types of trace generation infrastructure available in hardware. In this article, we make changes to the ARM ISA emulation of the QEMU emulator to allow for continuous instruction-level trace generation. Using a standard GDB client, tracepoints can be inserted to dynamically log registers and memory addresses without altering executing code. The ability to run trace experiments in five different modes allows the scope of trace generation to be narrowed as needed, down to the level of a single Linux process. Our scheme collects the execution traces of a Linux process on average between 9.6x-0.7x the speed of existing QEMU trace capabilities, with 96.7% less trace data volume. Compared to a software-instrumented tracing scheme, our method is both unobtrusive and performs on average between 3--4 orders of magnitude faster. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
18. Generating Object Lifetime Traces With Merlin.
- Author
-
Hertz, Matthew, Blackburn, Stephen M., Moss, J. Eliot B., McKinley, Kathryn S., and Stefanovio, Darko
- Subjects
- *
PROGRAMMING languages , *DISTRIBUTED computing , *GARBAGE collection (Computer science) , *COMPUTER memory management , *JAVA programming language , *C# (Computer program language) , *VISUAL programming languages (Computer science) , *MACHINE translating , *COMPUTER operating systems , *COMPUTER programming - Abstract
Programmers are writing a rapidly growing number of programs in object-oriented languages, such as Java and C#, that require garbage collection. Garbage collection traces and simulation speed up research by enabling deeper understandings of object lifetime behavior and quick exploration and design of new garbage collection algorithms. When generating perfect traces, the brute-force method of computing object lifetimes requires a whole-heap garbage collection at every potential collection point in the program. Because this process is prohibitively expensive, researchers often use granulated traces by collecting only periodically, for example, every 32 KB of allocation. We extend the state of the art for simulating garbage collection algorithms in two ways. First, we develop a systematic methodology for simulation studies of copying garbage collection and present results showing the effects of trace granularity on these simulations. We show that trace granularity often distorts simulated garbage collection results compared with perfect traces. Second, we present and measure the performance of a new algorithm called Merlin for computing object lifetimes. Merlin timestamps objects and later uses the timestamps of dead objects to reconstruct when they died. The Merlin algorithm piggybacks on garbage collections performed by the base system. Experimental results show that Merlin can generate traces over two orders of magnitude faster than the brute-force method which collects after every object allocation. We also use Merlin to produce visualizations of heap behavior that expose new object lifetime behaviors. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
19. EZTrace: A Generic Framework for Performance Analysis
- Author
-
Yutaka Ishikawa, Jack Dongarra, Francois Rue, Mathieu Faverge, Francois Trahay, Raymond Namyst, Riken, RIKEN - Institute of Physical and Chemical Research [Japon] (RIKEN), Department of Information and Communication Engineering, Graduate School of Information Science and Technology-The University of Tokyo (UTokyo), Service Expérimentation et Développement [Bordeaux] (SED), Inria Bordeaux - Sud-Ouest, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Innovative Computing Laboratory [Knoxville] (ICL), The University of Tennessee [Knoxville], Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB)-Centre National de la Recherche Scientifique (CNRS), Efficient runtime systems for parallel architectures (RUNTIME), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS), and Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB)
- Subjects
020203 distributed computing ,POSIX Threads ,trace generation ,Source code ,SIMPLE (military communications protocol) ,Computer science ,Distributed computing ,media_common.quotation_subject ,hybrid programming models ,02 engineering and technology ,Tracing ,computer.software_genre ,Scripting language ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Programming paradigm ,Plug-in ,performance analysis ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,computer ,TRACE (psycholinguistics) ,media_common - Abstract
Poster Session; International audience; Modern supercomputers with multi-core nodes enhanced by accelerators, as well as hybrid programming models, introduce more complexity in modern applications. Exploiting efficiently all the resources requires a complex analysis of the performance of applications in order to detect time-consuming or idle sections. We present eztrace, a generic trace generation framework that aims at providing a simple way to analyze applications. eztrace is based on plugins that allow it to trace different programming models such as MPI, pthread or OpenMP as well as user-defined libraries or applications. This framework uses two steps: one to collect the basic information during execution and one post-mortem analysis. This permits tracing the execution of applications with low overhead while allowing to refine the analysis after the execution of the program. We also present a simple script language for \eztrace that gives the user the opportunity to easily define the functions to instrument without modifying the source code of the application.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.