-
Bottom-Up Generation of Verilog Designs for Testing EDA Tools
Authors:
João Victor Amorim Vieira,
Luiza de Melo Gomes,
Rafael Sumitani,
Raissa Maciel,
Augusto Mafra,
Mirlaine Crepalde,
Fernando Magno Quintão Pereira
Abstract:
Testing Electronic Design Automation (EDA) tools rely on benchmarks -- designs written in Hardware Description Languages (HDLs) such as Verilog, SystemVerilog, or VHDL. Although collections of benchmarks for these languages exist, they are typically limited in size. This scarcity has recently drawn more attention due to the increasing need for training large language models in this domain. To deal…
▽ More
Testing Electronic Design Automation (EDA) tools rely on benchmarks -- designs written in Hardware Description Languages (HDLs) such as Verilog, SystemVerilog, or VHDL. Although collections of benchmarks for these languages exist, they are typically limited in size. This scarcity has recently drawn more attention due to the increasing need for training large language models in this domain. To deal with such limitation, this paper presents a methodology and a corresponding tool for generating realistic Verilog designs. The tool, ChiGen, was originally developed to test the Jasper\textregistered\ Formal Verification Platform, a product by Cadence Design Systems. Now, released as open-source software, ChiGen has been able to identify zero-day bugs in a range of tools, including Verible, Verilator, and Yosys. This paper outlines the principles behind ChiGen's design, focusing on three aspects of it: (i) generation guided by probabilistic grammars, (ii) type inference via the Hindley-Milner algorithm, and (iii) code injection enabled by data-flow analysis. Once deployed on standard hardware, ChiGen outperforms existing Verilog Fuzzers such as Verismith, TransFuzz, and VlogHammer regarding structural diversity, code coverage, and bug-finding ability.
△ Less
Submitted 6 April, 2025;
originally announced April 2025.
-
CountPath: Automating Fragment Counting in Digital Pathology
Authors:
Ana Beatriz Vieira,
Maria Valente,
Diana Montezuma,
Tomé Albuquerque,
Liliana Ribeiro,
Domingos Oliveira,
João Monteiro,
Sofia Gonçalves,
Isabel M. Pinto,
Jaime S. Cardoso,
Arlindo L. Oliveira
Abstract:
Quality control of medical images is a critical component of digital pathology, ensuring that diagnostic images meet required standards. A pre-analytical task within this process is the verification of the number of specimen fragments, a process that ensures that the number of fragments on a slide matches the number documented in the macroscopic report. This step is important to ensure that the sl…
▽ More
Quality control of medical images is a critical component of digital pathology, ensuring that diagnostic images meet required standards. A pre-analytical task within this process is the verification of the number of specimen fragments, a process that ensures that the number of fragments on a slide matches the number documented in the macroscopic report. This step is important to ensure that the slides contain the appropriate diagnostic material from the grossing process, thereby guaranteeing the accuracy of subsequent microscopic examination and diagnosis. Traditionally, this assessment is performed manually, requiring significant time and effort while being subject to significant variability due to its subjective nature. To address these challenges, this study explores an automated approach to fragment counting using the YOLOv9 and Vision Transformer models. Our results demonstrate that the automated system achieves a level of performance comparable to expert assessments, offering a reliable and efficient alternative to manual counting. Additionally, we present findings on interobserver variability, showing that the automated approach achieves an accuracy of 86%, which falls within the range of variation observed among experts (82-88%), further supporting its potential for integration into routine pathology workflows.
△ Less
Submitted 13 March, 2025;
originally announced March 2025.
-
Python Agent in Ludii
Authors:
Izaias S. de Lima Neto,
Marco A. A. de Aguiar Vieira,
Anderson R. Tavares
Abstract:
Ludii is a Java general game system with a considerable number of board games, with an API for developing new agents and a game description language to create new games. To improve versatility and ease development, we provide Python interfaces for agent programming. This allows the use of Python modules to implement general game playing agents.
As a means of enabling Python for creating Ludii ag…
▽ More
Ludii is a Java general game system with a considerable number of board games, with an API for developing new agents and a game description language to create new games. To improve versatility and ease development, we provide Python interfaces for agent programming. This allows the use of Python modules to implement general game playing agents.
As a means of enabling Python for creating Ludii agents, the interfaces are implemented using different Java libraries: jpy and Py4J. The main goal of this work is to determine which version is faster. To do so, we conducted a performance analysis of two different GGP algorithms, Minimax adapted to GGP and MCTS. The analysis was performed across several combinatorial games with varying depth, branching factor, and ply time. For reproducibility, we provide tutorials and repositories.
Our analysis includes predictive models using regression, which suggest that jpy is faster than Py4J, however slower than a native Java Ludii agent, as expected.
△ Less
Submitted 18 December, 2024;
originally announced December 2024.
-
Hybrid Minimax-MCTS and Difficulty Adjustment for General Game Playing
Authors:
Marco Antônio Athayde de Aguiar Vieira,
Anderson Rocha Tavares,
Renato Perez Ribas
Abstract:
Board games are a great source of entertainment for all ages, as they create a competitive and engaging environment, as well as stimulating learning and strategic thinking. It is common for digital versions of board games, as any other type of digital games, to offer the option to select the difficulty of the game. This is usually done by customizing the search parameters of the AI algorithm. Howe…
▽ More
Board games are a great source of entertainment for all ages, as they create a competitive and engaging environment, as well as stimulating learning and strategic thinking. It is common for digital versions of board games, as any other type of digital games, to offer the option to select the difficulty of the game. This is usually done by customizing the search parameters of the AI algorithm. However, this approach cannot be extended to General Game Playing agents, as different games might require different parametrization for each difficulty level. In this paper, we present a general approach to implement an artificial intelligence opponent with difficulty levels for zero-sum games, together with a propose of a Minimax-MCTS hybrid algorithm, which combines the minimax search process with GGP aspects of MCTS. This approach was tested in our mobile application LoBoGames, an extensible board games platform, that is intended to have an broad catalog of games, with an emphasis on accessibility: the platform is friendly to visually-impaired users, and is compatible with more than 92\% of Android devices. The tests in this work indicate that both the hybrid Minimax-MCTS and the new difficulty adjustment system are promising GGP approaches that could be expanded in future work.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Framework based on complex networks to model and mine patient pathways
Authors:
Caroline de Oliveira Costa Souza Rosa,
Márcia Ito,
Alex Borges Vieira,
Klaus Wehmuth,
Antônio Tadeu Azevedo Gomes
Abstract:
The automatic discovery of a model to represent the history of encounters of a group of patients with the healthcare system -- the so-called "pathway of patients" -- is a new field of research that supports clinical and organisational decisions to improve the quality and efficiency of the treatment provided. The pathways of patients with chronic conditions tend to vary significantly from one perso…
▽ More
The automatic discovery of a model to represent the history of encounters of a group of patients with the healthcare system -- the so-called "pathway of patients" -- is a new field of research that supports clinical and organisational decisions to improve the quality and efficiency of the treatment provided. The pathways of patients with chronic conditions tend to vary significantly from one person to another, have repetitive tasks, and demand the analysis of multiple perspectives (interventions, diagnoses, medical specialities, among others) influencing the results. Therefore, modelling and mining those pathways is still a challenging task. In this work, we propose a framework comprising: (i) a pathway model based on a multi-aspect graph, (ii) a novel dissimilarity measurement to compare pathways taking the elapsed time into account, and (iii) a mining method based on traditional centrality measures to discover the most relevant steps of the pathways. We evaluated the framework using the study cases of pregnancy and diabetes, which revealed its usefulness in finding clusters of similar pathways, representing them in an easy-to-interpret way, and highlighting the most significant patterns according to multiple perspectives.
△ Less
Submitted 27 October, 2023; v1 submitted 25 September, 2023;
originally announced September 2023.
-
Scheduling Network Function Chains Under Sub-Millisecond Latency SLOs
Authors:
Jianfeng Wang,
Siddhant Gupta,
Marcos A. M. Vieira,
Barath Raghavan,
Ramesh Govindan
Abstract:
Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch between the traditional focus on NFV throughput and the need to meet very low latency SLOs, as edge services inherently require low latency. Moreover, clo…
▽ More
Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch between the traditional focus on NFV throughput and the need to meet very low latency SLOs, as edge services inherently require low latency. Moreover, cloud-based NFV systems need to achieve such low latency while minimizing CPU core usage.
We find that real-world traffic exhibits burstiness that causes latency spikes of up to 10s of milliseconds in existing NFV systems. To address this, we built NetBlaze, which achieves sub-millisecond p99 latency SLOs, even for adversarial traffic, using a novel multi-scale core-scaling strategy. NetBlaze makes traffic-to-core allocation decisions at rack, server, and core-spatial scales, and at increasingly finer timescales, to accommodate multi-timescale bursts. In comparison with state-of-the-art approaches, NetBlaze is the only one capable of achieving sub-millisecond p99 latency SLOs while using a comparable number of cores.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Analysis of account behaviors in Ethereum during an economic impact event
Authors:
Pedro Henrique F. S. Oliveira,
Daniel Muller Rezende,
Heder Soares Bernardino,
Saulo Moraes Villela,
Alex Borges Vieira
Abstract:
One of the main events that involve the world economy in 2022 is the conflict between Russia and Ukraine. This event offers a rare opportunity to analyze how events of this magnitude can reflect the use of cryptocurrencies. This work aims to investigate the behavior of accounts and their transactions on the Ethereum cryptocurrency during this event. To this end, we collected all transactions that…
▽ More
One of the main events that involve the world economy in 2022 is the conflict between Russia and Ukraine. This event offers a rare opportunity to analyze how events of this magnitude can reflect the use of cryptocurrencies. This work aims to investigate the behavior of accounts and their transactions on the Ethereum cryptocurrency during this event. To this end, we collected all transactions that occurred two weeks before and two weeks after the beginning of the conflict, organized into two groups: the collection of the accounts involved in these transactions and the subset of these ones that interacted with a service in Ethereum, called Flashbots Auction. We modeled temporal graphs where each node represents an account, and each edge represents a transaction between two accounts. Then, we analyzed the behavior of these accounts with graph metrics for both groups during each observed week. The results showed changes in the behavior and activity of users and their accounts, as well as variations in the daily volume of transactions.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Modelling and Mining of Patient Pathways: A Scoping Review
Authors:
Caroline de Oliveira Costa Souza Rosa,
Marcia Ito,
Alex Borges Vieira,
Antonio Tadeu Azevedo Gomes
Abstract:
The sequence of visits and procedures performed by the patient in the health system, also known as the patient's pathway or trajectory, can reveal important information about the clinical treatment adopted and the health service provided. The rise of electronic health data availability made it possible to assess the pathways of a large number of patients. Nevertheless, some challenges also arose c…
▽ More
The sequence of visits and procedures performed by the patient in the health system, also known as the patient's pathway or trajectory, can reveal important information about the clinical treatment adopted and the health service provided. The rise of electronic health data availability made it possible to assess the pathways of a large number of patients. Nevertheless, some challenges also arose concerning how to synthesize these pathways and how to mine them from the data, fostering a new field of research. The objective of this review is to survey this new field of research, highlighting representation models, mining techniques, methods of analysis, and examples of case studies.
△ Less
Submitted 4 June, 2022;
originally announced June 2022.
-
Controlling the average degree in random power-law networks
Authors:
Allan Vieira,
Judson Moura,
Celia Anteneodo
Abstract:
We describe a procedure that allows continuously tuning the average degree $\langle k \rangle$ of uncorrelated networks with power-law degree distribution $p(k)$. Inn order to do this, we modify the low-$k$ region of $p(k)$, while preserving the large-$k$ tail up to a cutoff. Then, we use the modified $p(k)$ to obtain the degree sequence required to construct networks through the configuration mod…
▽ More
We describe a procedure that allows continuously tuning the average degree $\langle k \rangle$ of uncorrelated networks with power-law degree distribution $p(k)$. Inn order to do this, we modify the low-$k$ region of $p(k)$, while preserving the large-$k$ tail up to a cutoff. Then, we use the modified $p(k)$ to obtain the degree sequence required to construct networks through the configuration model. We analyze the resulting nearest-neighbor degree and local clustering to verify the absence of $k$-dependencies. Finally, a further modification is introduced to eliminate the sample fluctuations in the average degree.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Convolutional Neural Network to Restore Low-Dose Digital Breast Tomosynthesis Projections in a Variance Stabilization Domain
Authors:
Rodrigo de Barros Vimieiro,
Chuang Niu,
Hongming Shan,
Lucas Rodrigues Borges,
Ge Wang,
Marcelo Andrade da Costa Vieira
Abstract:
Digital breast tomosynthesis (DBT) exams should utilize the lowest possible radiation dose while maintaining sufficiently good image quality for accurate medical diagnosis. In this work, we propose a convolution neural network (CNN) to restore low-dose (LD) DBT projections to achieve an image quality equivalent to a standard full-dose (FD) acquisition. The proposed network architecture benefits fr…
▽ More
Digital breast tomosynthesis (DBT) exams should utilize the lowest possible radiation dose while maintaining sufficiently good image quality for accurate medical diagnosis. In this work, we propose a convolution neural network (CNN) to restore low-dose (LD) DBT projections to achieve an image quality equivalent to a standard full-dose (FD) acquisition. The proposed network architecture benefits from priors in terms of layers that were inspired by traditional model-based (MB) restoration methods, considering a model-based deep learning approach, where the network is trained to operate in the variance stabilization transformation (VST) domain. To accurately control the network operation point, in terms of noise and blur of the restored image, we propose a loss function that minimizes the bias and matches residual noise between the input and the output. The training dataset was composed of clinical data acquired at the standard FD and low-dose pairs obtained by the injection of quantum noise. The network was tested using real DBT projections acquired with a physical anthropomorphic breast phantom. The proposed network achieved superior results in terms of the mean normalized squared error (MNSE), training time and noise spatial correlation compared with networks trained with traditional data-driven methods. The proposed approach can be extended for other medical imaging application that requires LD acquisitions.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Automatic evaluation of scientific abstracts through natural language processing
Authors:
Lucas G. O. Lopes,
Thales M. A. Vieira,
William W. M. Lira
Abstract:
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems…
▽ More
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems intended to be solved by employing a text classification approach. Then, the abstract text is segmented into problem description, methodology and results. Finally, the methodology of the abstract is ranked based on the sentiment analysis of its results. The proposed framework allows us to quickly rank the best methods to solve specific problems. To validate the proposed framework, oil production anomaly abstracts were experimented and achieved promising results.
△ Less
Submitted 14 November, 2021;
originally announced December 2021.
-
Impact of loss functions on the performance of a deep neural network designed to restore low-dose digital mammography
Authors:
Hongming Shan,
Rodrigo de Barros Vimieiro,
Lucas Rodrigues Borges,
Marcelo Andrade da Costa Vieira,
Ge Wang
Abstract:
Digital mammography is still the most common imaging tool for breast cancer screening. Although the benefits of using digital mammography for cancer screening outweigh the risks associated with the x-ray exposure, the radiation dose must be kept as low as possible while maintaining the diagnostic utility of the generated images, thus minimizing patient risks. Many studies investigated the feasibil…
▽ More
Digital mammography is still the most common imaging tool for breast cancer screening. Although the benefits of using digital mammography for cancer screening outweigh the risks associated with the x-ray exposure, the radiation dose must be kept as low as possible while maintaining the diagnostic utility of the generated images, thus minimizing patient risks. Many studies investigated the feasibility of dose reduction by restoring low-dose images using deep neural networks. In these cases, choosing the appropriate training database and loss function is crucial and impacts the quality of the results. In this work, a modification of the ResNet architecture, with hierarchical skip connections, is proposed to restore low-dose digital mammography. We compared the restored images to the standard full-dose images. Moreover, we evaluated the performance of several loss functions for this task. For training purposes, we extracted 256,000 image patches from a dataset of 400 images of retrospective clinical mammography exams, where different dose levels were simulated to generate low and standard-dose pairs. To validate the network in a real scenario, a physical anthropomorphic breast phantom was used to acquire real low-dose and standard full-dose images in a commercially avaliable mammography system, which were then processed through our trained model. An analytical restoration model for low-dose digital mammography, previously presented, was used as a benchmark in this work. Objective assessment was performed through the signal-to-noise ratio (SNR) and mean normalized squared error (MNSE), decomposed into residual noise and bias. Results showed that the perceptual loss function (PL4) is able to achieve virtually the same noise levels of a full-dose acquisition, while resulting in smaller signal bias compared to other loss functions.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
BlockColdChain: Vaccine Cold Chain Blockchain
Authors:
Ronan D. Mendonça,
Otávio S. Gomes,
Luiz F. M. Vieira,
Marcos A. M. Vieira,
Alex B. Vieira,
José A. M. Nacif
Abstract:
In this paper, we propose a blockchain-based cold chain technology for vaccine cooling track. The COVID-19 pandemic has caused the death of millions of people. An important step towards ending the pandemic is vaccination. Vaccines must be kept under control temperature during the whole process, from fabrication to the hands of the health professionals who will immunize the population. However, the…
▽ More
In this paper, we propose a blockchain-based cold chain technology for vaccine cooling track. The COVID-19 pandemic has caused the death of millions of people. An important step towards ending the pandemic is vaccination. Vaccines must be kept under control temperature during the whole process, from fabrication to the hands of the health professionals who will immunize the population. However, there are numerous reports of vaccine loss due to temperature variations, and, currently, people getting vaccinated have no control if their vaccine was kept safe. Blockchain is a technology solution that can provide public and verifiable records. We review the World Health Organization (WHO) cool chain and Blockchain technology. Moreover, we describe current IoT temperature monitoring devices and propose Blockcoldchain to track vaccine cold chain using blockchain, thus proving an unalterable vaccine temperature history. Our experimental results using smart contracts demonstrate the system's feasibility.
△ Less
Submitted 28 April, 2021;
originally announced April 2021.
-
A Machine Learning model of the combination of normalized SD1 and SD2 indexes from 24h-Heart Rate Variability as a predictor of myocardial infarction
Authors:
Antonio Carlos Silva-Filho,
Sara Raquel Dutra-Macedo,
Adeilson Serra Mendes Vieira,
Cristiano Mostarda
Abstract:
Aim: to evaluate the ability of the nonlinear 24-HRV as a predictor of MI using Machine Learning Methods: The sample was composed of 218 patients divided into two groups (Healthy, n=128; MI n=90). The sample dataset is part of the Telemetric and Holter Electrocardiogram Warehouse (THEW) database, from the University of Rochester Medical Center. We used the most common ML algorithms for accuracy co…
▽ More
Aim: to evaluate the ability of the nonlinear 24-HRV as a predictor of MI using Machine Learning Methods: The sample was composed of 218 patients divided into two groups (Healthy, n=128; MI n=90). The sample dataset is part of the Telemetric and Holter Electrocardiogram Warehouse (THEW) database, from the University of Rochester Medical Center. We used the most common ML algorithms for accuracy comparison with a setting of 10-fold cross-validation (briefly, Linear Regression, Linear Discriminant Analysis, k-Nearest Neighbour, Random Forest, Supporting Vector Machine, Naïve Bayes, C 5.0 and Stochastic Gradient Boosting). Results: The main findings of this study show that the combination of SD1nu + SD2nu has greater predictive power for MI in comparison to other HRV indexes. Conclusion: The ML model using nonlinear HRV indexes showed to be more effective than the linear domain, evidenced through the application of ML, represented by a good precision of the Stochastic Gradient Boosting model.
Keywords: heart rate variability, machine learning, nonlinear domain, cardiovascular disease
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Galleon: Reshaping the Square Peg of NFV
Authors:
Jianfeng Wang,
Tamás Lévai,
Zhuojin Li,
Marcos A. M. Vieira,
Ramesh Govindan,
Barath Raghavan
Abstract:
Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet proce…
▽ More
Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet processing with the round hole of cloud computing infrastructures and abstractions, all while delivering performance, scalability, and isolation. Past work has led to the belief that NFV is different enough that it requires novel, custom approaches that deviate from today's norms. To the contrary, we show that we can achieve performance, scalability, and isolation in NFV judiciously using mechanisms and abstractions of FaaS, the Linux kernel, NIC hardware, and OpenFlow switches. As such, with our system Galleon, NFV can be practically-deployable today in conventional cloud environments while delivering up to double the performance per core compared to the state of the art.
△ Less
Submitted 16 January, 2021;
originally announced January 2021.
-
A Survey on Embedding Dynamic Graphs
Authors:
Claudio D. T. Barros,
Matheus R. F. Mendonça,
Alex B. Vieira,
Artur Ziviani
Abstract:
Embedding static graphs in low-dimensional vector spaces plays a key role in network analytics and inference, supporting applications like node classification, link prediction, and graph visualization. However, many real-world networks present dynamic behavior, including topological evolution, feature evolution, and diffusion. Therefore, several methods for embedding dynamic graphs have been propo…
▽ More
Embedding static graphs in low-dimensional vector spaces plays a key role in network analytics and inference, supporting applications like node classification, link prediction, and graph visualization. However, many real-world networks present dynamic behavior, including topological evolution, feature evolution, and diffusion. Therefore, several methods for embedding dynamic graphs have been proposed to learn network representations over time, facing novel challenges, such as time-domain modeling, temporal features to be captured, and the temporal granularity to be embedded. In this survey, we overview dynamic graph embedding, discussing its fundamentals and the recent advances developed so far. We introduce the formal definition of dynamic graph embedding, focusing on the problem setting and introducing a novel taxonomy for dynamic graph embedding input and output. We further explore different dynamic behaviors that may be encompassed by embeddings, classifying by topological evolution, feature evolution, and processes on networks. Afterward, we describe existing techniques and propose a taxonomy for dynamic graph embedding techniques based on algorithmic approaches, from matrix and tensor factorization to deep learning, random walks, and temporal point processes. We also elucidate main applications, including dynamic link prediction, anomaly detection, and diffusion prediction, and we further state some promising research directions in the area.
△ Less
Submitted 21 July, 2021; v1 submitted 4 January, 2021;
originally announced January 2021.
-
You Shall not Pass: Avoiding Spurious Paths in Shortest-Path Based Centralities in Multidimensional Complex Networks
Authors:
Klaus Wehmuth,
Artur Ziviani,
Leonardo Chinelate Costa,
Ana Paula Couto da Silva,
Alex Borges Vieira
Abstract:
In complex network analysis, centralities based on shortest paths, such as betweenness and closeness, are widely used. More recently, many complex systems are being represented by time-varying, multilayer, and time-varying multilayer networks, i.e. multidimensional (or high order) networks. Nevertheless, it is well-known that the aggregation process may create spurious paths on the aggregated view…
▽ More
In complex network analysis, centralities based on shortest paths, such as betweenness and closeness, are widely used. More recently, many complex systems are being represented by time-varying, multilayer, and time-varying multilayer networks, i.e. multidimensional (or high order) networks. Nevertheless, it is well-known that the aggregation process may create spurious paths on the aggregated view of such multidimensional (high order) networks. Consequently, these spurious paths may then cause shortest-path based centrality metrics to produce incorrect results, thus undermining the network centrality analysis. In this context, we propose a method able to avoid taking into account spurious paths when computing centralities based on shortest paths in multidimensional (or high order) networks. Our method is based on MultiAspect Graphs~(MAG) to represent the multidimensional networks and we show that well-known centrality algorithms can be straightforwardly adapted to the MAG environment. Moreover, we show that, by using this MAG representation, pitfalls usually associated with spurious paths resulting from aggregation in multidimensional networks can be avoided at the time of the aggregation process. As a result, shortest-path based centralities are assured to be computed correctly for multidimensional networks, without taking into account spurious paths that could otherwise lead to incorrect results. We also present a case study that shows the impact of spurious paths in the computing of shortest paths and consequently of shortest-path based centralities, such as betweenness and closeness, thus illustrating the importance of this contribution.
△ Less
Submitted 19 August, 2020; v1 submitted 27 June, 2020;
originally announced June 2020.
-
Towards a Polyglot Data Access Layer for a Low-Code Application Development Platform
Authors:
Ana Nunes Alonso,
João Abreu,
David Nunes,
André Vieira,
Luiz Santos,
Tércio Soares,
José Pereira
Abstract:
Low-code application development as proposed by the OutSystems Platform enables fast mobile and desktop application development and deployment. It hinges on visual development of the interface and business logic but also on easy integration with data stores and services while delivering robust applications that scale. Data integration increasingly means accessing a variety of NoSQL stores. Unfortu…
▽ More
Low-code application development as proposed by the OutSystems Platform enables fast mobile and desktop application development and deployment. It hinges on visual development of the interface and business logic but also on easy integration with data stores and services while delivering robust applications that scale. Data integration increasingly means accessing a variety of NoSQL stores. Unfortunately, the diversity of data and processing models, that make them useful in the first place, is difficult to reconcile with the simplification of abstractions exposed to developers in a low-code platform. Moreover, NoSQL data stores also rely on a variety of general purpose and custom scripting languages as their main interfaces. In this paper we propose a polyglot data access layer for the OutSystems Platform that uses SQL with optional embedded script snippets to bridge the gap between low-code and full access to NoSQL stores. In detail, we characterize the challenges for integrating a variety of NoSQL data stores; we describe the architecture and proof-of-concept implementation; and evaluate it with a sample application.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
On Localizing a Camera from a Single Image
Authors:
Pradipta Ghosh,
Xiaochen Liu,
Hang Qiu,
Marcos A. M. Vieira,
Gaurav S. Sukhatme,
Ramesh Govindan
Abstract:
Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explore the following question: under what conditions is it possible to estimate the location of a camera from a single image taken by the camera? We show…
▽ More
Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explore the following question: under what conditions is it possible to estimate the location of a camera from a single image taken by the camera? We show that, using a judicious combination of projective geometry, neural networks, and crowd-sourced annotations from human workers, it is possible to position 95% of the images in our test data set to within 12 m. This performance is two orders of magnitude better than PoseNet, a state-of-the-art neural network that, when trained on a large corpus of images in an area, can estimate the pose of a single image. Finally, we show that the camera's inferred position and intrinsic parameters can help design a number of virtual sensors, all of which are reasonably accurate.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Dynamics of extended Schelling models
Authors:
A. P. Vieira,
E. Goles,
H. J. Herrmann
Abstract:
We explore extensions of Schelling's model of social dynamics, in which two types of agents live on a checkerboard lattice and move in order to optimize their own satisfaction, which depends on how many agents among their neighbors are of their same type. For each number $n$ of same-type nearest neighbors we independently assign a binary satisfaction variable $s_{k}$ which is equal to one only if…
▽ More
We explore extensions of Schelling's model of social dynamics, in which two types of agents live on a checkerboard lattice and move in order to optimize their own satisfaction, which depends on how many agents among their neighbors are of their same type. For each number $n$ of same-type nearest neighbors we independently assign a binary satisfaction variable $s_{k}$ which is equal to one only if the agent is satisfied with that condition, and is equal to zero otherwise. This defines 32 different satisfaction rules, which we investigate in detail, focusing on pattern formation and measuring segregation with the help of an "energy" function which is related to the number of neighboring agents of different types and plays no role in the dynamics. We consider the checkerboard lattice to be fully occupied and the dynamics consists of switching the locations of randomly selected unsatisfied agents of opposite types. We show that, starting from a random distribution of agents, only a small number of rules lead to (nearly) fully segregated patterns in the long run, with many rules leading to chaotic steady-state behavior. Nevertheless, other interesting patterns may also be dynamically generated, such as "anti-segregate d" patterns as well as patterns resembling sponges.
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
Imperfect bifurcations in opinion dynamics under external fields
Authors:
Francisco Freitas,
Allan R. Vieira,
Celia Anteneodo
Abstract:
We investigate, through a kinetic-exchange model, the impact that an external field, like advertising and propaganda, has on opinion dynamics. We address the situations where two opposite alternatives can be selected but the possibility of indecision also exists. In this model, individuals influence each other through pairwise interactions, which can be of agreement or disagreement, and there are…
▽ More
We investigate, through a kinetic-exchange model, the impact that an external field, like advertising and propaganda, has on opinion dynamics. We address the situations where two opposite alternatives can be selected but the possibility of indecision also exists. In this model, individuals influence each other through pairwise interactions, which can be of agreement or disagreement, and there are also external fields that can skew decision making. Two parameters are used to model the interactions with the field: one measures the sensitivity of the individuals to be influenced, another quantifies in which direction. We study this model in a fully connected social network scenario, by means of numerical simulations of the kinetic exchange dynamics and analytical results derived from the mean-field rate equations. We show how the external bias gives rise to imperfect bifurcations, and cusp catastrophes, allowing abrupt changes and hysteresis depending on the level of disagreement in interpersonal interactions and on the strength of the external influence.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
An Adversarial Risk Analysis Framework for Cybersecurity
Authors:
David Rios Insua,
Aitor Couce Vieira,
Jose Antonio Rubio,
Wolter Pieters,
Katsiaryna Labunets,
Daniel Garcia Rasines
Abstract:
Cyber threats affect all kinds of organisations. Risk analysis is an essential methodology for cybersecurity as it allows organisations to deal with the cyber threats potentially affecting them, prioritise the defence of their assets and decide what security controls should be implemented. Many risk analysis methods are present in cybersecurity models, compliance frameworks and international stand…
▽ More
Cyber threats affect all kinds of organisations. Risk analysis is an essential methodology for cybersecurity as it allows organisations to deal with the cyber threats potentially affecting them, prioritise the defence of their assets and decide what security controls should be implemented. Many risk analysis methods are present in cybersecurity models, compliance frameworks and international standards. However, most of them employ risk matrices, which suffer shortcomings that may lead to suboptimal resource allocations. We propose a comprehensive framework for cybersecurity risk analysis, covering the presence of both adversarial and non-intentional threats and the use of insurance as part of the security portfolio. A case study illustrating the proposed framework is presented, serving as template for more complex cases.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Threshold $q$-voter model
Authors:
Allan R. Vieira,
Celia Anteneodo
Abstract:
We introduce the threshold $q$-voter opinion dynamics where an agent, facing a binary choice, can change its mind when at least $q_0$ amongst $q$ neighbors share the opposite opinion. Otherwise, the agent can still change its mind with a certain probability $\varepsilon$. This threshold dynamics contemplates the possibility of persuasion by an influence group even when there is not full agreement…
▽ More
We introduce the threshold $q$-voter opinion dynamics where an agent, facing a binary choice, can change its mind when at least $q_0$ amongst $q$ neighbors share the opposite opinion. Otherwise, the agent can still change its mind with a certain probability $\varepsilon$. This threshold dynamics contemplates the possibility of persuasion by an influence group even when there is not full agreement among its members. In fact, individuals can follow their peers not only when there is unanimity ($q_0=q$) in the lobby group, as assumed in the $q$-voter model, but, depending on the circumstances, also when there is simple majority ($q_0>q/2$), Byzantine consensus ($q_0>2q/3$), or any minimal number $q_0$ amongst $q$. This realistic threshold gives place to emerging collective states and phase transitions which are not observed in the standard $q$-voter. The threshold $q_0$, together with the stochasticity introduced by $\varepsilon$, yields a phenomenology that mimics as particular cases the $q$-voter with stochastic drivings such as nonconformity and independence. In particular, nonconsensus majority states are possible, as well as mixed phases. Continuous and discontinuous phase transitions can occur, but also transitions from fluctuating phases into absorbing states.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
Data Augmentation for Detection of Architectural Distortion in Digital Mammography using Deep Learning Approach
Authors:
Arthur C. Costa,
Helder C. R. Oliveira,
Juliana H. Catani,
Nestor de Barros,
Carlos F. E. Melo,
Marcelo A. C. Vieira
Abstract:
Early detection of breast cancer can increase treatment efficiency. Architectural Distortion (AD) is a very subtle contraction of the breast tissue and may represent the earliest sign of cancer. Since it is very likely to be unnoticed by radiologists, several approaches have been proposed over the years but none using deep learning techniques. To train a Convolutional Neural Network (CNN), which i…
▽ More
Early detection of breast cancer can increase treatment efficiency. Architectural Distortion (AD) is a very subtle contraction of the breast tissue and may represent the earliest sign of cancer. Since it is very likely to be unnoticed by radiologists, several approaches have been proposed over the years but none using deep learning techniques. To train a Convolutional Neural Network (CNN), which is a deep neural architecture, is necessary a huge amount of data. To overcome this problem, this paper proposes a data augmentation approach applied to clinical image dataset to properly train a CNN. Results using receiver operating characteristic analysis showed that with a very limited dataset we could train a CNN to detect AD in digital mammography with area under the curve (AUC = 0.74).
△ Less
Submitted 5 July, 2018;
originally announced July 2018.
-
Knowledge Representation in Graphs using Convolutional Neural Networks
Authors:
Armando Vieira
Abstract:
Knowledge Graphs (KG) constitute a flexible representation of complex relationships between entities particularly useful for biomedical data. These KG, however, are very sparse with many missing edges (facts) and the visualisation of the mesh of interactions nontrivial. Here we apply a compositional model to embed nodes and relationships into a vectorised semantic space to perform graph completion…
▽ More
Knowledge Graphs (KG) constitute a flexible representation of complex relationships between entities particularly useful for biomedical data. These KG, however, are very sparse with many missing edges (facts) and the visualisation of the mesh of interactions nontrivial. Here we apply a compositional model to embed nodes and relationships into a vectorised semantic space to perform graph completion. A visualisation tool based on Convolutional Neural Networks and Self-Organised Maps (SOM) is proposed to extract high-level insights from the KG. We apply this technique to a subset of CTD, containing interactions of compounds with human genes / proteins and show that the performance is comparable to the one obtained by structural models.
△ Less
Submitted 7 December, 2016;
originally announced December 2016.
-
GPIC - GPU Power Iteration Cluster
Authors:
Gustavo R. L Silva,
Rafael R. Medeiros,
Antonio P. Braga,
Douglas A. G. Vieira
Abstract:
This work presents a new clustering algorithm, the GPIC, a Graphics Processing Unit (GPU) accelerated algorithm for Power Iteration Clustering (PIC). Our algorithm is based on the original PIC proposal, adapted to take advantage of the GPU architecture, maintining the algorith original properties. The proposed method was compared against the serial and parallel Spark implementation, achieving a co…
▽ More
This work presents a new clustering algorithm, the GPIC, a Graphics Processing Unit (GPU) accelerated algorithm for Power Iteration Clustering (PIC). Our algorithm is based on the original PIC proposal, adapted to take advantage of the GPU architecture, maintining the algorith original properties. The proposed method was compared against the serial and parallel Spark implementation, achieving a considerable speed-up in the test problems.
△ Less
Submitted 10 April, 2016;
originally announced April 2016.
-
Consequences of nonconformist behaviors in a continuous opinion model
Authors:
Allan R. Vieira,
Celia Anteneodo,
Nuno Crokidakis
Abstract:
We investigate opinion formation in a kinetic exchange opinion model, where opinions are represented by numbers in the real interval $[-1,1]$ and agents are typified by the individual degree of conviction about the opinion that they support. Opinions evolve through pairwise interactions governed by competitive positive and negative couplings, that promote imitation and dissent, respectively. The m…
▽ More
We investigate opinion formation in a kinetic exchange opinion model, where opinions are represented by numbers in the real interval $[-1,1]$ and agents are typified by the individual degree of conviction about the opinion that they support. Opinions evolve through pairwise interactions governed by competitive positive and negative couplings, that promote imitation and dissent, respectively. The model contemplates also another type of nonconformity such that agents can occasionally choose their opinions independently of the interactions with other agents. The steady states of the model as a function of the parameters that describe conviction, dissent and independence are analyzed, with particular emphasis on the emergence of extreme opinions. Then, we characterize the possible ordered and disordered phases and the occurrence or suppression of phase transitions that arise spontaneously due to the disorder introduced by the heterogeneity of the agents and/or their interactions.
△ Less
Submitted 18 January, 2016;
originally announced January 2016.
-
Predicting online user behaviour using deep learning algorithms
Authors:
Armando Vieira
Abstract:
We propose a robust classifier to predict buying intentions based on user behaviour within a large e-commerce website. In this work we compare traditional machine learning techniques with the most advanced deep learning approaches. We show that both Deep Belief Networks and Stacked Denoising auto-Encoders achieved a substantial improvement by extracting features from high dimensional data during t…
▽ More
We propose a robust classifier to predict buying intentions based on user behaviour within a large e-commerce website. In this work we compare traditional machine learning techniques with the most advanced deep learning approaches. We show that both Deep Belief Networks and Stacked Denoising auto-Encoders achieved a substantial improvement by extracting features from high dimensional data during the pre-train phase. They prove also to be more convenient to deal with severe class imbalance.
△ Less
Submitted 26 May, 2016; v1 submitted 19 November, 2015;
originally announced November 2015.
-
Time Centrality in Dynamic Complex Networks
Authors:
Eduardo Chinelate Costa,
Alex Borges Vieira,
Klaus Wehmuth,
Artur Ziviani,
Ana Paula Couto da Silva
Abstract:
There is an ever-increasing interest in investigating dynamics in time-varying graphs (TVGs). Nevertheless, so far, the notion of centrality in TVG scenarios usually refers to metrics that assess the relative importance of nodes along the temporal evolution of the dynamic complex network. For some TVG scenarios, however, more important than identifying the central nodes under a given node centrali…
▽ More
There is an ever-increasing interest in investigating dynamics in time-varying graphs (TVGs). Nevertheless, so far, the notion of centrality in TVG scenarios usually refers to metrics that assess the relative importance of nodes along the temporal evolution of the dynamic complex network. For some TVG scenarios, however, more important than identifying the central nodes under a given node centrality definition is identifying the key time instants for taking certain actions. In this paper, we thus introduce and investigate the notion of time centrality in TVGs. Analogously to node centrality, time centrality evaluates the relative importance of time instants in dynamic complex networks. In this context, we present two time centrality metrics related to diffusion processes. We evaluate the two defined metrics using both a real-world dataset representing an in-person contact dynamic network and a synthetically generated randomized TVG. We validate the concept of time centrality showing that diffusion starting at the best classified time instants (i.e. the most central ones), according to our metrics, can perform a faster and more efficient diffusion process.
△ Less
Submitted 5 September, 2015; v1 submitted 1 April, 2015;
originally announced April 2015.
-
A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity
Authors:
Aitor Couce Vieira,
Siv Hilde Houmb,
David Rios Insua
Abstract:
Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive an…
▽ More
Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.
△ Less
Submitted 7 April, 2014;
originally announced April 2014.
-
Tecnologia Móvel: Uma Tendência, Uma Realidade
Authors:
Carlos Augusto Almeida Alcantara,
Anderson Luiz Nogueira Vieira
Abstract:
Currently, mobility presents itself as a major innovation in historic technological revolution. From the first decade of this century, nothing compares to what happened in the field of Information Technology (IT), which is adding to market a range of news relating to infrastructure such as mobile computing hardware, software, computer networks, etc.. From a handheld as a wireless device, iPad, Sma…
▽ More
Currently, mobility presents itself as a major innovation in historic technological revolution. From the first decade of this century, nothing compares to what happened in the field of Information Technology (IT), which is adding to market a range of news relating to infrastructure such as mobile computing hardware, software, computer networks, etc.. From a handheld as a wireless device, iPad, Smartphone, you can connect to the digital world, people, customers, business partners, etc.. Given the infinite range of information, services and resources available in the electronic world, it is considered that few are those, markets and people who want to be left behind. The interest in this channel of communication becomes not only a new strategy of marketing and communications. Mobile devices are becoming more sophisticated and allows access to the web. Thinking in this context is that manufacturers of electronic components face each other in a war over the disputed technology to a competitive environment that is open to those who put on the market the product more attractive, interactive and versatile.
△ Less
Submitted 18 May, 2011;
originally announced May 2011.