Query execution time prediction is essential for database query optimization tasks, such as query scheduling, progress monitoring, and resource allocation. In the query execution time prediction ...tasks, the query plan is often used as the modeling object of a prediction model. Although the learning-based prediction models have been proposed to capture plan features, there are two limitations need to be considered more. First, the parent–child dependencies between plan operators can be captured, but the operator’s branch independence cannot be distinguished. Second, each operator’s output row is its following operator input, but the data iterate transfer operations between operators are ignored. In this study, we propose a graph query execution time prediction model containing a plan module, a query module, a plan-query module, and a prediction module to improve prediction effectiveness. Specifically, the plan module is used to capture the data iterate transfer operations and distinguish independent of branch operators; the query module is used to learn features of query terms that have an influence on the composition of operators; the plan-query interaction module is used to learn the logical correlations of plan and query. The experiment on datasets proves the effectiveness of the operator iterate-aware and query-plan interaction method in our proposed graph query execution prediction model.
Abstract
Architecture specifications such as Armv8-A and RISC-V are the ultimate foundation for software verification and the correctness criteria for hardware verification. They should define the ...allowed sequential and relaxed-memory concurrency behaviour of programs, but hitherto there has been no integration of full-scale instruction-set architecture (ISA) semantics with axiomatic concurrency models, either in mathematics or in tools. These ISA semantics can be surprisingly large and intricate, e.g. 100k
$$+$$
+
lines for Armv8-A. In this paper we present a tool, Isla, for computing the allowed behaviours of concurrent litmus tests with respect to full-scale ISA definitions, in the Sail language, and arbitrary axiomatic relaxed-memory concurrency models, in the Cat language. It is based on a generic symbolic engine for Sail ISA specifications. We equip the tool with a web interface to make it widely accessible, and illustrate and evaluate it for Armv8-A and RISC-V. The symbolic execution engine is valuable also for other verification tasks: it has been used in automated ISA test generation for the Arm Morello prototype architecture, extending Armv8-A with CHERI capabilities, and for Iris program-logic reasoning about binary code above the Armv8-A and RISC-V ISA specifications. By using full-scale and authoritative ISA semantics, Isla lets one evaluate litmus tests using arbitrary user instructions with high confidence. Moreover, because these ISA specifications give detailed and validated definitions of the sequential aspects of
systems
functionality, as used by hypervisors and operating systems, e.g. instruction fetch, exceptions, and address translation, our tool provides a basis for developing concurrency semantics for these. We demonstrate this for the Armv8-A instruction-fetch and virtual-memory models and examples of Simner et al.
Ethereum, the largest blockchain for running smart contracts, charges the people who send transactions to deploy or invoke smart contracts for thwarting resource abuse. The amount of transaction fee ...depends on the size of that contract and the operations executed by that contract. Consequently, smart contracts with inefficient code will waste money. In this article, we propose and develop the first tool, named GasChecker , for automatically identifying gas-inefficient code in smart contracts, and conduct the first empirical study on the prevalence of gas-inefficient code in the deployed smart contracts. More precisely, we first summarize ten gas-inefficient programming patterns and propose a new approach based on symbolic execution (SE) to detect them in the bytecode of smart contracts. To make our approach scalable to analyze millions of smart contracts, we parallelize SE by tailoring it to the MapReduce programming model, and propose a new feedback-based load balancing strategy to effectively utilize cloud resources. Extensive experiments show that GasChecker scales well with the increase of workers. The empirical study demonstrates that lots of real smart contracts contain various inefficient code. Manual investigation demonstrates that only 2.5 percent of discovered gas-inefficient instances are false positives.
Data-driven decision support for maintenance management is necessary for modern digitalized production systems. The data-driven approach enables analyzing the dynamic production system in real-time. ...Common problems within maintenance management are that maintenance decisions are experience-driven, narrow-focussed and static. Specifically, machine criticality assessment is a tool that is used in manufacturing companies to plan and prioritize maintenance activities. The maintenance problems are well exemplified by this tool in industrial practice. The tool is not trustworthy, seldom updated and focuses on individual machines. Therefore, this paper aims at the development and validation of a framework for a data-driven machine criticality assessment tool. The tool supports prioritization and planning of maintenance decisions with a clear goal of increasing productivity. Four empirical cases were studied by employing a multiple case study methodology. The framework provides guidelines for maintenance decision-making by combining the Manufacturing Execution System (MES) and Computerized Maintenance Management System (CMMS) data with a systems perspective. The results show that by employing data-driven decision support within the maintenance organization, it can truly enable modern digitalized production systems to achieve higher levels of productivity.
Action imagery is the ability to mentally simulate the execution of an action without physically performing it. Action imagery is assumed to rely at least partly on similar mechanisms as action ...execution. Therefore, we expected that imagery and execution durations would be constrained by the number of folds in a Paper Folding Task. Analogously, individual differences in execution durations were expected to be reflected in imagery durations. Twenty-eight participants performed two imagery conditions (computer vs. paper) and one execution condition (paper) where two-dimensional grids of a three-dimensional cube were (mentally) folded to determine whether two selected edges overlapped or not. As expected, imagery performance and execution performance were strongly correlated and decreased with the number of folds. Further, the number of folds influenced imagery durations even more than execution durations. This may be due to the additional cognitive load in imagery that emerges when tracking the folds to follow up with the next ones. The results indicate that Mental Paper Folding predominantly involves dynamic visual representations that are not functionally associated with one's own movements as in action imagery.
Regular expressions are a classical concept in formal language theory. Regular expressions in programming languages (RegEx) such as JavaScript, feature non-standard semantics of operators (e.g. ...greedy/lazy Kleene star), as well as additional features such as capturing groups and references. While symbolic execution of programs containing RegExes appeals to string solvers natively supporting important features of RegEx, such a string solver is hitherto missing. In this paper, we propose the first string theory and string solver that natively provides such support. The key idea of our string solver is to introduce a new automata model, called prioritized streaming string transducers (PSST), to formalize the semantics of RegEx-dependent string functions. PSSTs combine priorities, which have previously been introduced in prioritized finite-state automata to capture greedy/lazy semantics, with string variables as in streaming string transducers to model capturing groups. We validate the consistency of the formal semantics with the actual JavaScript semantics by extensive experiments. Furthermore, to solve the string constraints, we show that PSSTs enjoy nice closure and algorithmic properties, in particular, the regularity-preserving property (i.e., pre-images of regular constraints under PSSTs are regular), and introduce a sound sequent calculus that exploits these properties and performs propagation of regular constraints by means of taking post-images or pre-images. Although the satisfiability of the string constraint language is generally undecidable, we show that our approach is complete for the so-called straight-line fragment. We evaluate the performance of our string solver on over 195000 string constraints generated from an open-source RegEx library. The experimental results show the efficacy of our approach, drastically improving the existing methods (via symbolic execution) in both precision and efficiency.
Smart contract technologies can be used to implement almost arbitrary business logic. They can revolutionize many businesses such as payments, insurance, and crowdfunding. The resulting birth of ...decentralized finance (DeFi) has gained significant momentum. Smart contracts and DeFi are now attractive targets for attacks. An important research question is how to protect deployed smart contracts and DeFi. Smart contracts cannot be modified once deployed, namely vulnerabilities cannot be fixed by patching. In this case, vulnerabilities in deployed contracts and DeFi might cause devastating consequences. In this paper, we put forward SolSaviour, a framework for protecting deployed smart contracts and DeFi. The core of SolSaviour is to build a smart contract protection mechanism based on democratic voting using a distributed trusted execution environment (TEE) cluster. Once a vulnerability in deployed contracts or DeFi is found, SolSaviour can destroy the defective contract and redeploy a patched contract via the distributed TEE cluster. Moreover, SolSaviour can migrate funds and state variables from the destroyed contract to the patched one. Compared with previous work, our approach can protect smart contracts and DeFi in a distributed manner, avoiding reliance on privileged users or trusted third parties. Our experiment results show that SolSaviour can protect smart contracts and complex DeFi protocols with feasible overhead.
Digital manufacturing technologies offer many opportunities for established companies to innovate. They promote data‐driven gains in operational efficiency and enable the transformation of current ...business models or the creation of entirely new differentiation opportunities. However, many digital innovation projects in manufacturing fall short of their initial ambitions and result in incremental improvements to an existing manufacturing system, if at all. To understand the reasons for the discrepancy between initial ambitions and achieved outcomes, we conduct a longitudinal qualitative study based on a collaborative research project with eight companies and additional expert interviews. Applying a paradox lens, we identify three tensional knots that reveal interrelated, multiple tensions of digital innovation management projects in established manufacturing firms: (1) amalgamating physical and digital assets, (2) innovating in an existing modus operandi, and (3) integrating internal and external stakeholders. These tensions result in the simultaneous occurrence of dynamic and conflicting forces that turn digital innovation projects in manufacturing away from their high initial ambitions. Our findings explain why digitizing the manufacturing system is a non‐trivial endeavor for established firms, which need to balance the complexities inherent in digitization efforts and manage conflicting goals. For managers, the findings provide ways to manage the interrelated tensions in their digital innovation efforts, enabling them to better capitalize on disruptive innovation ambitions.
During the last decade, a lot of procedure models for the introduction of industry 4.0 (I40) or industrial internet of things (IIoT) solutions have been proposed, especially in the German literature. ...Since they target all kinds of I40 projects they necessarily must be somewhat generic and are missing important details especially for the “implementation phase”. However, even in specific models for introducing manufacturing execution systems (MES) there are a lot of vague hints instead of concrete advice of how to do an effective and efficient implementation. Although it is certainly right that soft factors like finding the right partners and doing a good change management that involves end users early in the process are at least as critical as technical aspects, the latter should not be neglected. In this paper, some desirable features of MES are discussed and how they positively influence the efforts necessary for introducing such a system in a small to medium sized enterprise (SME).
The health of office workers has become a major concern under the pressure of increasingly fierce job competition. As countries have gradually promoted healthy buildings, there is an urgent need to ...create and construct healthy office environments. Although the WELL Building Standard proposed management and design strategies based on the principles of health and medicine, it does not consider group characteristics or gender differences.
This study aims to apply the theory of planned behavior to healthy building design and supplement the important role of gender and group characteristics in behavioral guidance based on architectural strategies and user behaviors to improve the relevant building evaluation system.
This study adopted a questionnaire survey and structural equation model. Four WELL-certified healthy office buildings in Nanshan District, Shenzhen, were selected for the survey. Based on the theory of planned behavior, structural equation models for men and women were established, compared, and analyzed. The factors affecting the health behaviors of the two groups and the actual effectiveness of various building optimization strategies were discussed, and an optimization direction for gender differences was proposed.
The findings indicated differences between male and female staff in their individual characteristics and implementation of health behaviors. Management strategies, subjective design strategies in assistance and guidance, and objective design strategies in spatial planning can promote the health behaviors of the two groups. However, the design strategies of result feedback and detail optimization only appeared to have a significant positive effect on female staff, whereas the intelligent automation design strategies only had an obvious intervention effect on men's health behaviors.
This study found that the theory of planned behavior in the field of social psychology could be applied to relevant research on architectural design and emphasized the influence of gender. It can not only provide the optimization direction for the evaluation standards of relevant healthy buildings but also promote the implementation of health behaviors in office groups and provide new ideas for promoting the development of healthy buildings.