Skip to main content

Showing 1–9 of 9 results for author: Fernández, J M

Searching in archive cs. Search in all archives.
.
  1. Workflows Community Summit 2024: Future Trends and Challenges in Scientific Workflows

    Authors: Rafael Ferreira da Silva, Deborah Bard, Kyle Chard, Shaun de Witt, Ian T. Foster, Tom Gibbs, Carole Goble, William Godoy, Johan Gustafsson, Utz-Uwe Haus, Stephen Hudson, Shantenu Jha, Laila Los, Drew Paine, Frédéric Suter, Logan Ward, Sean Wilkinson, Marcos Amaris, Yadu Babuji, Jonathan Bader, Riccardo Balin, Daniel Balouek, Sarah Beecroft, Khalid Belhajjame, Rajat Bhattarai , et al. (86 additional authors not shown)

    Abstract: The Workflows Community Summit gathered 111 participants from 18 countries to discuss emerging trends and challenges in scientific workflows, focusing on six key areas: time-sensitive workflows, AI-HPC convergence, multi-facility workflows, heterogeneous HPC environments, user experience, and FAIR computational workflows. The integration of AI and exascale computing has revolutionized scientific w… ▽ More

    Submitted 18 October, 2024; originally announced October 2024.

    Report number: ORNL/TM-2024/3573

  2. WorkflowHub: a registry for computational workflows

    Authors: Ove Johan Ragnar Gustafsson, Sean R. Wilkinson, Finn Bacall, Luca Pireddu, Stian Soiland-Reyes, Simone Leo, Stuart Owen, Nick Juty, José M. Fernández, Björn Grüning, Tom Brown, Hervé Ménager, Salvador Capella-Gutierrez, Frederik Coppens, Carole Goble

    Abstract: The rising popularity of computational workflows is driven by the need for repetitive and scalable data processing, sharing of processing know-how, and transparent methods. As both combined records of analysis and descriptions of processing steps, workflows should be reproducible, reusable, adaptable, and available. Workflow sharing presents opportunities to reduce unnecessary reinvention, promote… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

    Comments: 30 pages, 4 figures

  3. arXiv:2312.09870  [pdf, other

    cs.CR

    CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B

    Authors: Mikaëla Ngamboé, Xiao Niu, Benoit Joly, Steven P Biegler, Paul Berthier, Rémi Benito, Greg Rice, José M Fernandez, Gabriela Nicolescu

    Abstract: The Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance technology that mandated in many airspaces. It improves safety, increases efficiency and reduces air traffic congestion by broadcasting aircraft navigation data. Yet, ADS-B is vulnerable to spoofing attacks as it lacks mechanisms to ensure the integrity and authenticity of the data being supplied. None of the existing cryptog… ▽ More

    Submitted 29 November, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

  4. Recording provenance of workflow runs with RO-Crate

    Authors: Simone Leo, Michael R. Crusoe, Laura Rodríguez-Navas, Raül Sirvent, Alexander Kanitz, Paul De Geest, Rudolf Wittner, Luca Pireddu, Daniel Garijo, José M. Fernández, Iacopo Colonnelli, Matej Gallo, Tazro Ohta, Hirotaka Suetake, Salvador Capella-Gutierrez, Renske de Wit, Bruno P. Kinoshita, Stian Soiland-Reyes

    Abstract: Recording the provenance of scientific computation results is key to the support of traceability, reproducibility and quality assessment of data products. Several data models have been explored to address this need, providing representations of workflow plans and their executions as well as means of packaging the resulting information for archiving and sharing. However, existing approaches tend to… ▽ More

    Submitted 16 July, 2024; v1 submitted 12 December, 2023; originally announced December 2023.

    Comments: 38 pages, 5 figures, 3 tables. Resubmitted to PLOS ONE following peer review

    Journal ref: PLoS ONE vol. 19, iss. 9, pp. 1-35, 2024

  5. arXiv:2306.17747  [pdf, other

    cs.MA cs.AI math.DS math.OC nlin.AO

    Discriminatory or Samaritan -- which AI is needed for humanity? An Evolutionary Game Theory Analysis of Hybrid Human-AI populations

    Authors: Tim Booker, Manuel Miranda, Jesús A. Moreno López, José María Ramos Fernández, Max Reddel, Valeria Widler, Filippo Zimmaro, Alberto Antonioni, The Anh Han

    Abstract: As artificial intelligence (AI) systems are increasingly embedded in our lives, their presence leads to interactions that shape our behaviour, decision-making, and social interactions. Existing theoretical research has primarily focused on human-to-human interactions, overlooking the unique dynamics triggered by the presence of AI. In this paper, resorting to methods from evolutionary game theory,… ▽ More

    Submitted 3 July, 2023; v1 submitted 30 June, 2023; originally announced June 2023.

    Comments: This work is the result of the Complexity72h 2023 workshop

  6. Packaging research artefacts with RO-Crate

    Authors: Stian Soiland-Reyes, Peter Sefton, Mercè Crosas, Leyla Jael Castro, Frederik Coppens, José M. Fernández, Daniel Garijo, Björn Grüning, Marco La Rosa, Simone Leo, Eoghan Ó Carragáin, Marc Portier, Ana Trisovic, RO-Crate Community, Paul Groth, Carole Goble

    Abstract: An increasing number of researchers support reproducibility by including pointers to and descriptions of datasets, software and methods in their publications. However, scientific articles may be ambiguous, incomplete and difficult to process by automated systems. In this paper we introduce RO-Crate, an open, community-driven, and lightweight approach to packaging research artefacts along with thei… ▽ More

    Submitted 6 December, 2021; v1 submitted 14 August, 2021; originally announced August 2021.

    Comments: 44 pages. Accepted for Data Science

    ACM Class: H.1.1; H.3.2

    Journal ref: Data Science 2022

  7. arXiv:2005.11886  [pdf, other

    cs.CR

    The never ending war in the stack and the reincarnation of ROP attacks

    Authors: Ammari Nader, Joan Calvet, Jose M. Fernandez

    Abstract: Return Oriented Programming (ROP) is a technique by which an attacker can induce arbitrary behavior inside a vulnerable program without injecting a malicious code. The continues failure of the currently deployed defenses against ROP has made it again one of the most powerful memory corruption attacks. ROP is also considered as one of the most flexible attacks, its level of flexibility, unlike othe… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

    Comments: The never ending war in the stack and the reincarnation of ROP attacks

  8. arXiv:1812.06815  [pdf, other

    cs.LG cs.CR

    Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings

    Authors: François Menet, Paul Berthier, José M. Fernandez, Michel Gagnon

    Abstract: Deep learning models are vulnerable to adversarial examples which are input samples modified in order to maximize the error on the system. We introduce Spartan Networks, resistant deep neural networks that do not require input preprocessing nor adversarial training. These networks have an adversarial layer designed to discard some information of the network, thus forcing the system to focus on rel… ▽ More

    Submitted 17 December, 2018; originally announced December 2018.

    Comments: Poster previously accepted at ACM CCS 2018 Toronto, Submitted to Computers & Security

    MSC Class: 68T37 ACM Class: I.2.6

  9. arXiv:quant-ph/0307017  [pdf, ps, other

    quant-ph cs.CC

    Quaternionic Computing

    Authors: Jose M. Fernandez, William A. Schneeberger

    Abstract: We introduce a model of computation based on quaternions, which is inspired on the quantum computing model. Pure states are vectors of a suitable linear space over the quaternions. Other aspects of the theory are the same as in quantum computing: superposition and linearity of the state space, unitarity of the transformations, and projective measurements. However, one notable exception is the fa… ▽ More

    Submitted 5 November, 2004; v1 submitted 2 July, 2003; originally announced July 2003.

    Comments: Version 2: 32 pages, 8 PS figures. Ver 2 is a substantially revised version, which addresses a major problem with the previous version: the output of quaternionic circuits is in general ambiguous unless an total order of evaluation of gates is defined. The main complexity result is essentially unaffected. This version addresses this issue and discusses in detail the complexity and physical consequences of this "ambiguity"