Showing 1–2 of 2 results for author: Ruggerio, S
-
FSM Builder: A Tool for Writing Autograded Finite Automata Questions
Authors:
Eliot Wong Robson,
Sam Ruggerio,
Jeff Erickson
Abstract:
Deterministic and nondeterministic finite automata (DFAs and NFAs) are abstract models of computation commonly taught in introductory computing theory courses. These models have important applications (such as fast regular expression matching), and are used to introduce formal language theory. Undergraduate students often struggle with understanding these models at first, due to the level of abstr…
▽ More
Deterministic and nondeterministic finite automata (DFAs and NFAs) are abstract models of computation commonly taught in introductory computing theory courses. These models have important applications (such as fast regular expression matching), and are used to introduce formal language theory. Undergraduate students often struggle with understanding these models at first, due to the level of abstraction. As a result, various pedagogical tools have been developed to allow students to practice with these models. We introduce the FSM Builder, a new pedagogical tool enabling students to practice constructing DFAs and NFAs with a graphical editor, giving personalized feedback and partial credit. The algorithms used for generating these are heavily inspired by previous works. The key advantages to its competitors are greater flexibility and scalability. This is because the FSM Builder is implemented using efficient algorithms from an open source package, allowing for easy extension and question creation. We discuss the implementation of the tool, how it stands out from previous tools, and takeaways from experiences of using the tool in multiple large courses. Survey results indicate the interface and feedback provided by the tool were useful to students.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Optimizing a Model-Agnostic Measure of Graph Counterdeceptiveness via Reattachment
Authors:
Anakin Dey,
Sam Ruggerio,
Melkior Ornik
Abstract:
Recognition of an adversary's objective is a core problem in physical security and cyber defense. Prior work on target recognition focuses on develo** optimal inference strategies given the adversary's operating environment. However, the success of such strategies significantly depends on features of the environment. We consider the problem of optimal counterdeceptive environment design: constru…
▽ More
Recognition of an adversary's objective is a core problem in physical security and cyber defense. Prior work on target recognition focuses on develo** optimal inference strategies given the adversary's operating environment. However, the success of such strategies significantly depends on features of the environment. We consider the problem of optimal counterdeceptive environment design: construction of an environment which promotes early recognition of an adversary's objective, given operational constraints. Interpreting counterdeception as a question of graph design with a bound on total edge length, we propose a measure of graph counterdeceptiveness and a novel heuristic algorithm for maximizing counterdeceptiveness based on iterative reattachment of trees. We benchmark the performance of this algorithm on synthetic networks as well as a graph inspired by a real-world high-security environment, verifying that the proposed algorithm is computationally feasible and yields meaningful network designs.
△ Less
Submitted 25 November, 2023;
originally announced November 2023.