Dismantling Complex Networks by a Neural Model Trained from Tiny Networks

jiazhengzhang/nirm 16 Aug 2022

Nonetheless, this article initiates insightful efforts of designing and training a neural influence ranking model (NIRM).

Social and Information Networks

0
16 Aug 2022

Don't Reinvent the Wheel: Towards Automatic Replacement of Custom Implementations with APIs

apireplacement/api_replacement 16 Aug 2022

Reusing code is a common practice in software development: It helps developers speedup the implementation task while also reducing the chances of introducing bugs, given the assumption that the reused code has been tested, possibly in production.

Software Engineering

0
16 Aug 2022

New Parallel Order Maintenance Data Structure

itisben/parallel-om 16 Aug 2022

One big advantage is that the comparisons are lock-free so that they can execute highly in parallel with other insertions and deletions, which achieve up to $34. 4$x speedups with $64$ workers.

Data Structures and Algorithms Distributed, Parallel, and Cluster Computing

0
16 Aug 2022

O(n log n) algorithm for finding a solution of Erdős-Ginzburg-Ziv theorem

ho94949/egz 16 Aug 2022

Erd\H{o}s-Ginzburg-Ziv theorem is a popular theorem in additive number theory, which states any sequence of $2n-1$ integers contains a subsequence of $n$ elements, with their sum is a multiple of $n$.

Data Structures and Algorithms Combinatorics

2
16 Aug 2022

A Domain-Specific Language for Simulation-Based Testing of IoT Edge-to-Cloud Solutions

jiali123456/iotecs 15 Aug 2022

An edge-to-cloud simulator executes the functionality of a large array of edge devices that communicate with cloud applications.

Software Engineering

0
15 Aug 2022

Xscope: Hunting for Cross-Chain Bridge Attacks

xscope-tool/results 15 Aug 2022

Based on those patterns, we design Xscope, an automatic tool to find security violations in cross-chain bridges and detect real-world attacks.

Software Engineering Cryptography and Security

1
15 Aug 2022

Compressing Pre-trained Models of Code into 3 MB

soarsmu/Compressor 15 Aug 2022

Inspired by this insight, the GA algorithm is designed to maximize a model's Giga floating-point operations (GFLOPs), an indicator of the model computational cost, to satisfy the constraint of the target model size.

Software Engineering

1
15 Aug 2022

Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map

chengqingli/mm-iealm 14 Aug 2022

This paper analyzes security performance of an image encryption algorithm using 2D lag-complex Logistic map (LCLM), which adopts it as a pseudo-random number generator, and uses the sum of all pixel values of the plain-image as its initial value to control the random combination of the basic encryption operations.

Cryptography and Security 94A60

0
14 Aug 2022

Virtual Reality Platform to Develop and Test Applications on Human-Robot Social Interaction

jajaguto/jubileo 13 Aug 2022

The simulation eliminates the possibility of harm to sensors, motors, and the physical structure of a real robot by enabling robotics application testing to be carried out quickly and affordably without being subjected to mechanical or electronic errors.

Robotics

0
13 Aug 2022

A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset

efchatz/http3-attacks 13 Aug 2022

Following QUIC protocol ratification on May 2021, the third major version of the Hypertext Transfer Protocol, namely HTTP/3, was published around one year later in RFC 9114.

Cryptography and Security

0
13 Aug 2022