Zum Hauptinhalt springen

Showing 1–26 of 26 results for author: Laredo, J

Searching in archive cs. Search in all archives.
.
  1. Determining the significance and relative importance of parameters of a simulated quenching algorithm using statistical tools

    Authors: Pedro A. Castillo, Maribel García Arenas, Nuria Rico, Antonio Miguel Mora, Pablo García-Sánchez, Juan Luis Jiménez Laredo, Juan Julián Merelo Guervós

    Abstract: When search methods are being designed it is very important to know which parameters have the greatest influence on the behaviour and performance of the algorithm. To this end, algorithm parameters are commonly calibrated by means of either theoretic analysis or intensive experimentation. When undertaking a detailed statistical analysis of the influence of each parameter, the designer should pay a… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  2. Asynchronous Distributed Genetic Algorithms with Javascript and JSON

    Authors: Juan Julián Merelo, Pedro A. Castillo, Juan Luis Jiménez Laredo, Antonio M. Mora, Alberto Prieto

    Abstract: In a connected world, spare CPU cycles are up for grabs, if you only make its obtention easy enough. In this paper we present a distributed evolutionary computation system that uses the computational capabilities of the ubiquituous web browser. Using Asynchronous Javascript and JSON (Javascript Object Notation, a serialization protocol) allows anybody with a web browser (that is, mostly everybody… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:cs/0701115

  3. Evolvable Agents, a Fine Grained Approach for Distributed Evolutionary Computing: Walking towards the Peer-to-Peer Computing Frontiers

    Authors: Juan Luis Jiménez Laredo, Pedro A. Castillo, Antonio M. Mora, Juan Julián Merelo

    Abstract: In this work we propose a fine grained approach with self-adaptive migration rate for distributed evolutionary computation. Our target is to gain some insights on the effects caused by communication when the algorithm scales. To this end, we consider a set of basic topologies in order to avoid the overlapping of algorithmic effects between communication and topological structures. We analyse the a… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:cs/0703117

  4. Improving genetic algorithms performance via deterministic population shrinkage

    Authors: Juan Luis Jiménez Laredo, Carlos Fernandes, Juan Julián Merelo, Christian Gagné

    Abstract: Despite the intuition that the same population size is not needed throughout the run of an Evolutionary Algorithm (EA), most EAs use a fixed population size. This paper presents an empirical study on the possible benefits of a Simple Variable Population Sizing (SVPS) scheme on the performance of Genetic Algorithms (GAs). It consists in decreasing the population for a GA run following a predetermin… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

  5. arXiv:2112.10893  [pdf, other

    cs.SE cs.LG

    VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

    Authors: Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail Kaiser, Baishakhi Ray

    Abstract: Automatically locating vulnerable statements in source code is crucial to assure software security and alleviate developers' debugging efforts. This becomes even more important in today's software ecosystem, where vulnerable code can flow easily and unwittingly within and across software repositories like GitHub. Across such millions of lines of code, traditional static and dynamic approaches stru… ▽ More

    Submitted 12 January, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: Camera Ready for Research Track of 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022)

  6. arXiv:2111.05827  [pdf

    cs.SE cs.AI

    Data-Driven AI Model Signal-Awareness Enhancement and Introspection

    Authors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari

    Abstract: AI modeling for source code understanding tasks has been making significant progress, and is being adopted in production development pipelines. However, reliability concerns, especially whether the models are actually learning task-related aspects of source code, are being raised. While recent model-probing approaches have observed a lack of signal awareness in many AI-for-code models, i.e. models… ▽ More

    Submitted 7 January, 2022; v1 submitted 10 November, 2021; originally announced November 2021.

    Comments: Fixed author email ids

  7. arXiv:2109.03341  [pdf

    cs.AI cs.SE

    Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

    Authors: Yufan Zhuang, Sahil Suneja, Veronika Thost, Giacomo Domeniconi, Alessandro Morari, Jim Laredo

    Abstract: Identifying vulnerable code is a precautionary measure to counter software security breaches. Tedious expert effort has been spent to build static analyzers, yet insecure patterns are barely fully enumerated. This work explores a deep learning approach to automatically learn the insecure patterns from code corpora. Because code naturally admits graph structures with parsing, we develop a novel gra… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: Submitted June 2020

  8. arXiv:2108.11139  [pdf, other

    cs.SE cs.DB cs.LG cs.PL

    Learning GraphQL Query Costs (Extended Version)

    Authors: Georgios Mavroudeas, Guillaume Baudart, Alan Cha, Martin Hirzel, Jim A. Laredo, Malik Magdon-Ismail, Louis Mandel, Erik Wittern

    Abstract: GraphQL is a query language for APIs and a runtime for executing those queries, fetching the requested data from existing microservices, REST APIs, databases, or other sources. Its expressiveness and its flexibility have made it an attractive candidate for API providers in many industries, especially through the web. A major drawback to blindly servicing a client's query in GraphQL is that the cos… ▽ More

    Submitted 26 August, 2021; v1 submitted 25 August, 2021; originally announced August 2021.

  9. arXiv:2102.07995  [pdf, other

    cs.SE cs.AI cs.LG

    D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis

    Authors: Yunhui Zheng, Saurabh Pujar, Burn Lewis, Luca Buratti, Edward Epstein, Bo Yang, Jim Laredo, Alessandro Morari, Zhong Su

    Abstract: Static analysis tools are widely used for vulnerability detection as they understand programs with complex behavior and millions of lines of code. Despite their popularity, static analysis tools are known to generate an excess of false positives. The recent ability of Machine Learning models to understand programming languages opens new possibilities when applied to static analysis. However, exist… ▽ More

    Submitted 16 February, 2021; originally announced February 2021.

    Comments: Accepted to the 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP '21)

  10. arXiv:2011.14934  [pdf

    cs.SE cs.AI cs.LG

    Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

    Authors: Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari

    Abstract: This work explores the signal awareness of AI models for source code understanding. Using a software vulnerability detection use case, we evaluate the models' ability to capture the correct vulnerability signals to produce their predictions. Our prediction-preserving input minimization (P2IM) approach systematically reduces the original source code to a minimal snippet which a model needs to maint… ▽ More

    Submitted 22 June, 2021; v1 submitted 25 November, 2020; originally announced November 2020.

    Comments: Authors Sahil Suneja, Yunhui Zheng, and Yufan Zhuang contributed equally to this research. FSE 2021

  11. arXiv:2009.05632  [pdf, other

    cs.SE cs.PL

    A Principled Approach to GraphQL Query Cost Analysis

    Authors: Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim A. Laredo

    Abstract: The landscape of web APIs is evolving to meet new client requirements and to facilitate how providers fulfill them. A recent web API model is GraphQL, which is both a query language and a runtime. Using GraphQL, client queries express the data they want to retrieve or mutate, and servers respond with exactly those data or changes. GraphQL's expressiveness is risky for service providers because cli… ▽ More

    Submitted 11 September, 2020; originally announced September 2020.

    Comments: Published at the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) 2020

  12. arXiv:2006.12641  [pdf, ps, other

    cs.CL cs.LG cs.PL

    Exploring Software Naturalness through Neural Language Models

    Authors: Luca Buratti, Saurabh Pujar, Mihaela Bornea, Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi

    Abstract: The Software Naturalness hypothesis argues that programming languages can be understood through the same techniques used in natural language processing. We explore this hypothesis through the use of a pre-trained transformer-based language model to perform code analysis tasks. Present approaches to code analysis depend heavily on features derived from the Abstract Syntax Tree (AST) while our trans… ▽ More

    Submitted 24 June, 2020; v1 submitted 22 June, 2020; originally announced June 2020.

  13. arXiv:2006.08614  [pdf

    cs.SE cs.CR cs.LG cs.PL

    Learning to map source code to software vulnerability using code-as-a-graph

    Authors: Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari

    Abstract: We explore the applicability of Graph Neural Networks in learning the nuances of source code from a security perspective. Specifically, whether signatures of vulnerabilities in source code can be learned from its graph representation, in terms of relationships between nodes and edges. We create a pipeline we call AI4VA, which first encodes a sample source code into a Code Property Graph. The extra… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

  14. arXiv:1809.08529  [pdf

    cs.DC

    Permissioned Blockchain Technologies for Academic Publishing

    Authors: Petr Novotny, Qi Zhang, Richard Hull, Salman Baset, Jim Laredo, Roman Vaculin, Daniel L. Ford, Donna N. Dillenberger

    Abstract: Academic publishing is continuously evolving with the gradual adoption of new technologies. Blockchain is a new technology that promises to change how individuals and organizations interact across various boundaries. The adoption of blockchains is beginning to transform diverse industries such as finance, supply chain, international trade, as well as energy and resource management and many others.… ▽ More

    Submitted 23 September, 2018; originally announced September 2018.

  15. Generating GraphQL-Wrappers for REST(-like) APIs

    Authors: Erik Wittern, Alan Cha, Jim A. Laredo

    Abstract: GraphQL is a query language and thereupon-based paradigm for implementing web Application Programming Interfaces (APIs) for client-server interactions. Using GraphQL, clients define precise, nested data-requirements in typed queries, which are resolved by servers against (possibly multiple) backend systems, like databases, object storages, or other APIs. Clients receive only the data they care abo… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

    Comments: Originally published at 18th International Conference on Web Engineering (ICWE '18)

    Journal ref: In: Mikkonen T., Klamma R., Hernández J. (eds) Web Engineering. ICWE 2018. Lecture Notes in Computer Science, vol 10845. Springer, Cham

  16. arXiv:1705.06586  [pdf, other

    cs.SE

    Opportunities in Software Engineering Research for Web API Consumption

    Authors: Erik Wittern, Annie Ying, Yunhui Zheng, Jim A. Laredo, Julian Dolby, Christopher C. Young, Aleksander A. Slominski

    Abstract: Nowadays, invoking third party code increasingly involves calling web services via their web APIs, as opposed to the more traditional scenario of downloading a library and invoking the library's API. However, there are also new challenges for developers calling these web APIs. In this paper, we highlight a broad set of these challenges and argue for resulting opportunities for software engineering… ▽ More

    Submitted 18 May, 2017; originally announced May 2017.

    Comments: Erik Wittern and Annie Ying are both first authors

  17. arXiv:1702.03906  [pdf, other

    cs.SE

    Statically Checking Web API Requests in JavaScript

    Authors: Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim A. Laredo

    Abstract: Many JavaScript applications perform HTTP requests to web APIs, relying on the request URL, HTTP method, and request data to be constructed correctly by string operations. Traditional compile-time error checking, such as calling a non-existent method in Java, are not available for checking whether such requests comply with the requirements of a web API. In this paper, we propose an approach to sta… ▽ More

    Submitted 15 February, 2017; v1 submitted 13 February, 2017; originally announced February 2017.

    Comments: International Conference on Software Engineering, 2017

  18. arXiv:1106.0118   

    cs.NE cs.DC cs.ET cs.NI

    1st International Workshop on Distributed Evolutionary Computation in Informal Environments

    Authors: Juan-J. Merelo, Maribel García-Arenas, Juan-Luis J. Laredo, Francisco Fernández de la Vega

    Abstract: Online conference proceedings for the IWDECIE workshop, taking place in New Orleans on June 5th, 2011. The workshop focuses on non-conventional implementations of bioinspired algorithms and its conceptual implications.

    Submitted 2 June, 2011; v1 submitted 1 June, 2011; originally announced June 2011.

    Comments: Five papers, workshop took place together with CEC 2011 in New Orleans (LA, USA). http://geneura.ugr.es/~iwdecie

  19. arXiv:1105.6205  [pdf, ps, other

    cs.NE cs.DC cs.NI

    Cloud-based Evolutionary Algorithms: An algorithmic study

    Authors: Juan-J. Merelo, Maribel García-Arenas, Antonio M. Mora, Pedro Castillo, Gustavo Romero, JLJ Laredo

    Abstract: After a proof of concept using Dropbox(tm), a free storage and synchronization service, showed that an evolutionary algorithm using several dissimilar computers connected via WiFi or Ethernet had a good scaling behavior in terms of evaluations per second, it remains to be proved whether that effect also translates to the algorithmic performance of the algorithm. In this paper we will check several… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.

    Comments: Paper 4 for the First International Workshop of Distributed Evolutionary computation in Informal Environments

  20. arXiv:1105.4971  [pdf, ps, other

    cs.NE

    Distributed Evolutionary Computation using REST

    Authors: P. A. Castillo, M. G. Arenas, A. M. Mora, J. L. J. Laredo, G. Romero, V. M Rivas, J. J. Merelo

    Abstract: This paper analises distributed evolutionary computation based on the Representational State Transfer (REST) protocol, which overlays a farming model on evolutionary computation. An approach to evolutionary distributed optimisation of multilayer perceptrons (MLP) using REST and language Perl has been done. In these experiments, a master-slave based evolutionary algorithm (EA) has been implemented,… ▽ More

    Submitted 25 May, 2011; originally announced May 2011.

    Comments: Paper 3 for the First International Workshop of Distributed Evolutionary computation in Informal Environments

  21. arXiv:0803.2695  [pdf, ps, other

    cs.NE cs.CV

    KohonAnts: A Self-Organizing Ant Algorithm for Clustering and Pattern Classification

    Authors: C. Fernandes, A. M. Mora, J. J. Merelo, V. Ramos, J. L. J. Laredo

    Abstract: In this paper we introduce a new ant-based method that takes advantage of the cooperative self-organization of Ant Colony Systems to create a naturally inspired clustering and pattern recognition method. The approach considers each data item as an ant, which moves inside a grid changing the cells it goes through, in a fashion similar to Kohonen's Self-Organizing Maps. The resulting algorithm is… ▽ More

    Submitted 18 March, 2008; originally announced March 2008.

    Comments: Submitted to ALIFE XI

  22. arXiv:0803.1926  [pdf, ps, other

    cs.NE cs.AI

    Improved evolutionary generation of XSLT stylesheets

    Authors: Pablo Garcia-Sanchez, J. L. J. Laredo, J. P. Sevilla, Pedro Castillo, J. J. Merelo

    Abstract: This paper introduces a procedure based on genetic programming to evolve XSLT programs (usually called stylesheets or logicsheets). XSLT is a general purpose, document-oriented functional language, generally used to transform XML documents (or, in general, solve any problem that can be coded as an XML document). The proposed solution uses a tree representation for the stylesheets as well as dive… ▽ More

    Submitted 13 March, 2008; originally announced March 2008.

    Comments: Accepted as poster at the GECCO-2008 conference

  23. arXiv:0712.2630  [pdf, ps, other

    cs.NE cs.PL

    Evolving XSLT stylesheets

    Authors: Nestor Zorzano, Daniel Merino, J. L. J. Laredo, J. P. Sevilla, Pablo Garcia, J. J. Merelo

    Abstract: This paper introduces a procedure based on genetic programming to evolve XSLT programs (usually called stylesheets or logicsheets). XSLT is a general purpose, document-oriented functional language, generally used to transform XML documents (or, in general, solve any problem that can be coded as an XML document). The proposed solution uses a tree representation for the stylesheets as well as dive… ▽ More

    Submitted 17 December, 2007; originally announced December 2007.

    Comments: First draft, preparing for WCCI 2008

  24. arXiv:cs/0703117  [pdf, ps, other

    cs.DC

    Self-adaptive Gossip Policies for Distributed Population-based Algorithms

    Authors: J. L. J. Laredo, E. A. Eiben, M. Schoenauer, P. A. Castillo, A. M. Mora, F. Fernandez, J. J. Merelo

    Abstract: Gossipping has demonstrate to be an efficient mechanism for spreading information among P2P networks. Within the context of P2P computing, we propose the so-called Evolvable Agent Model for distributed population-based algorithms which uses gossipping as communication policy, and represents every individual as a self-scheduled single thread. The model avoids obsolete nodes in the population by d… ▽ More

    Submitted 23 March, 2007; originally announced March 2007.

    Comments: Submitted to Europar 2007

  25. arXiv:cs/0701115  [pdf, ps, other

    cs.DC cs.NE

    Browser-based distributed evolutionary computation: performance and scaling behavior

    Authors: J. J. Merelo, Antonio Mora-Garcia, J. L. J. Laredo, Juan Lupion, Fernando Tricas

    Abstract: The challenge of ad-hoc computing is to find the way of taking advantage of spare cycles in an efficient way that takes into account all capabilities of the devices and interconnections available to them. In this paper we explore distributed evolutionary computation based on the Ruby on Rails framework, which overlays a Model-View-Controller on evolutionary computation. It allows anybody with a… ▽ More

    Submitted 18 January, 2007; originally announced January 2007.

    Comments: Submitted to GECCO 2007

  26. arXiv:cs/0610113  [pdf, ps, other

    cs.MA cs.CC

    CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit Path in the Battlefield

    Authors: A. M. Mora, J. J. Merelo, C. Millan, J. Torrecillas, J. L. J. Laredo

    Abstract: In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO) algorithm called CHAC, which has been designed to solve the problem of finding the path on a map (corresponding to a simulated battlefield) that minimizes resources while maximizing safety. CHAC has been tested with two different state transition rules: an aggregative function that combines the heuristic and pheromone inf… ▽ More

    Submitted 19 October, 2006; originally announced October 2006.

    Journal ref: Published in Proceedings of the Workshop on Nature Inspired Cooperative Strategies for Optimization. NICSO'2006, Pelta & Krasnogor, (eds) pp 85-98, Jun. 2006