Skip to main content

Showing 1–45 of 45 results for author: Stoller, D

.
  1. arXiv:2310.07160  [pdf, other

    cs.SD cs.LG eess.AS

    LLark: A Multimodal Instruction-Following Language Model for Music

    Authors: Josh Gardner, Simon Durand, Daniel Stoller, Rachel M. Bittner

    Abstract: Music has a unique and complex structure which is challenging for both expert humans and existing AI systems to understand, and presents unique challenges relative to other forms of audio. We present LLark, an instruction-tuned multimodal model for \emph{music} understanding. We detail our process for dataset creation, which involves augmenting the annotations of diverse open-source music datasets… ▽ More

    Submitted 2 June, 2024; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: ICML camera-ready version

  2. arXiv:2308.15878  [pdf, ps, other

    cs.PL cs.LO cs.PF

    Benchmarking for Integrating Logic Rules with Everything Else

    Authors: Yanhong A. Liu, Scott D. Stoller, Yi Tong, K. Tuncay Tekle

    Abstract: Integrating logic rules with other language features is increasingly sought after for advanced applications that require knowledge-base capabilities. To address this demand, increasingly more languages and extensions for such integration have been developed. How to evaluate such languages? This paper describes a set of programming and performance benchmarks for evaluating languages supporting… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: In Proceedings ICLP 2023, arXiv:2308.14898. arXiv admin note: substantial text overlap with arXiv:2205.15204

    Journal ref: EPTCS 385, 2023, pp. 12-26

  3. Contrastive Learning-Based Audio to Lyrics Alignment for Multiple Languages

    Authors: Simon Durand, Daniel Stoller, Sebastian Ewert

    Abstract: Lyrics alignment gained considerable attention in recent years. State-of-the-art systems either re-use established speech recognition toolkits, or design end-to-end solutions involving a Connectionist Temporal Classification (CTC) loss. However, both approaches suffer from specific weaknesses: toolkits are known for their complexity, and CTC systems use a loss designed for transcription which can… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

    Comments: 5 pages, accepted at the International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2023

    Journal ref: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece, 2023, pp. 1-5

  4. arXiv:2305.19202  [pdf, ps, other

    cs.PL

    Integrating Logic Rules with Everything Else, Seamlessly

    Authors: Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin

    Abstract: This paper presents a language, Alda, that supports all of logic rules, sets, functions, updates, and objects as seamlessly integrated built-ins. The key idea is to support predicates in rules as set-valued variables that can be used and updated in any scope, and support queries using rules as either explicit or implicit automatic calls to an inference function. We have defined a formal semantic… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: To be published in Theory and Practice of Logic Programming, Special issue for selected papers from 39nd International Conference on Logic Programming. arXiv admin note: substantial text overlap with arXiv:2205.15204

  5. arXiv:2205.15204  [pdf, ps, other

    cs.PL

    Programming with rules and everything else, seamlessly

    Authors: Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin, K. Tuncay Tekle

    Abstract: Logic rules are powerful for expressing complex reasoning and analysis problems. At the same time, they are inconvenient or impossible to use for many other aspects of applications. Integrating rules in a language with sets and functions, and furthermore with updates to objects, has been a subject of significant study. What's lacking is a language that integrates all constructs seamlessly. This… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  6. arXiv:2205.01273  [pdf, other

    cs.SD eess.AS

    Few-Shot Musical Source Separation

    Authors: Yu Wang, Daniel Stoller, Rachel M. Bittner, Juan Pablo Bello

    Abstract: Deep learning-based approaches to musical source separation are often limited to the instrument classes that the models are trained on and do not generalize to separate unseen instruments. To address this, we propose a few-shot musical source separation paradigm. We condition a generic U-Net source separation model using few audio examples of the target instrument. We train a few-shot conditioning… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

    Comments: ICASSP 2022

  7. arXiv:2203.16960  [pdf, other

    cs.MA cs.RO

    Multi-Agent Spatial Predictive Control with Application to Drone Flocking (Extended Version)

    Authors: Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu

    Abstract: We introduce the novel concept of Spatial Predictive Control (SPC) to solve the following problem: given a collection of agents (e.g., drones) with positional low-level controllers (LLCs) and a mission-specific distributed cost function, how can a distributed controller achieve and maintain cost-function minimization without a plant model and only positional observations of the environment? Our fu… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

  8. arXiv:2202.09710  [pdf, other

    eess.SY cs.AI cs.LG

    A Barrier Certificate-based Simplex Architecture with Application to Microgrids

    Authors: Amol Damare, Shouvik Roy, Scott A. Smolka, Scott D. Stoller

    Abstract: We present Barrier Certificate-based Simplex (BC-Simplex), a new, provably correct design for runtime assurance of continuous dynamical systems. BC-Simplex is centered around the Simplex Control Architecture, which consists of a high-performance advanced controller which is not guaranteed to maintain safety of the plant, a verified-safe baseline controller, and a decision module that switches cont… ▽ More

    Submitted 2 June, 2022; v1 submitted 19 February, 2022; originally announced February 2022.

  9. The Black-Box Simplex Architecture for Runtime Assurance of Autonomous CPS

    Authors: Usama Mehmood, Sanaz Sheikhi, Stanley Bak, Scott A. Smolka, Scott D. Stoller

    Abstract: The Simplex Architecture is a runtime assurance framework where control authority may switch from an unverified and potentially unsafe advanced controller to a backup baseline controller in order to maintain the safety of an autonomous cyber-physical system. In this work, we show that runtime checks can replace the requirement to statically verify safety of the baseline controller. This is importa… ▽ More

    Submitted 31 May, 2022; v1 submitted 24 February, 2021; originally announced February 2021.

    Journal ref: NASA Formal Methods (2022) 231-250

  10. arXiv:2012.10153  [pdf, other

    cs.MA

    A Distributed Simplex Architecture for Multi-Agent Systems

    Authors: Usama Mehmood, Scott D. Stoller, Radu Grosu, Shouvik Roy, Amol Damare, Scott A. Smolka

    Abstract: We present Distributed Simplex Architecture (DSA), a new runtime assurance technique that provides safety guarantees for multi-agent systems (MASs). DSA is inspired by the Simplex control architecture of Sha et al., but with some significant differences. The traditional Simplex approach is limited to single-agent systems or a MAS with a centralized control scheme. DSA addresses this limitation by… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

  11. Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: This paper presents a general framework and methods for complete programming and checking of distributed algorithms at a high-level, as in pseudocode languages, but precisely specified and directly executable, as in formal specification languages and practical programming languages, respectively. The checking framework, as well as the writing of distributed algorithms and specification of their sa… ▽ More

    Submitted 23 December, 2020; v1 submitted 21 August, 2020; originally announced August 2020.

    Comments: Small fixes to improve property specifications, including improvements not in the RV 2020 final version

    Journal ref: RV 2020: Proceedings of the 20th International Conference on Runtime Verification. LNCS 12399. Pages 47-66. Springer

  12. arXiv:2008.08444  [pdf, other

    cs.CR cs.AI

    Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values

    Authors: Thang Bui, Scott D. Stoller

    Abstract: Attribute-Based Access Control (ABAC) and Relationship-based access control (ReBAC) provide a high level of expressiveness and flexibility that promote security and information sharing, by allowing policies to be expressed in terms of attributes of and chains of relationships between entities. Algorithms for learning ABAC and ReBAC policies from legacy access control information have the potential… ▽ More

    Submitted 23 November, 2020; v1 submitted 19 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1909.12095

  13. arXiv:2007.13053  [pdf, ps, other

    cs.DB cs.AI cs.LO

    Recursive Rules with Aggregation: A Simple Unified Semantics

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: Complex reasoning problems are most clearly and easily specified using logical rules, but require recursive rules with aggregation such as count and sum for practical applications. Unfortunately, the meaning of such rules has been a significant challenge, leading to many disagreeing semantics. This paper describes a unified semantics for recursive rules with aggregation, extending the unified fo… ▽ More

    Submitted 21 September, 2022; v1 submitted 26 July, 2020; originally announced July 2020.

    Journal ref: Journal of Logic and Computation, 32(8):1659--1693, December 2022

  14. arXiv:2006.00680  [pdf, other

    cs.MA

    Learning Distributed Controllers for V-Formation

    Authors: Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari

    Abstract: We show how a high-performing, fully distributed and symmetric neural V-formation controller can be synthesized from a Centralized MPC (Model Predictive Control) controller using Deep Learning. This result is significant as we also establish that under very reasonable conditions, it is impossible to achieve V-formation using a deterministic, distributed, and symmetric controller. The learning proc… ▽ More

    Submitted 31 May, 2020; originally announced June 2020.

  15. arXiv:1911.06393  [pdf, other

    cs.LG cs.SD eess.AS stat.ML

    Seq-U-Net: A One-Dimensional Causal U-Net for Efficient Sequence Modelling

    Authors: Daniel Stoller, Mi Tian, Sebastian Ewert, Simon Dixon

    Abstract: Convolutional neural networks (CNNs) with dilated filters such as the Wavenet or the Temporal Convolutional Network (TCN) have shown good results in a variety of sequence modelling tasks. However, efficiently modelling long-term dependencies in these sequences is still challenging. Although the receptive field of these models grows exponentially with the number of layers, computing the convolution… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: Code available at https://github.com/f90/Seq-U-Net

  16. arXiv:1910.10346  [pdf, ps, other

    cs.LO cs.AI cs.PL

    Knowledge of Uncertain Worlds: Programming with Logical Constraints

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: Programming with logic for sophisticated applications must deal with recursion and negation, which together have created significant challenges in logic, leading to many different, conflicting semantics of rules. This paper describes a unified language, DA logic, for design and analysis logic, based on the unifying founded semantics and constraint semantics, that support the power and ease of prog… ▽ More

    Submitted 10 December, 2020; v1 submitted 23 October, 2019; originally announced October 2019.

    Journal ref: Journal of Logic and Computation, 31(1):193-212, Jan. 2021, Oxford University Press

  17. arXiv:1909.12095  [pdf, other

    cs.CR

    A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies

    Authors: Thang Bui, Scott D. Stoller

    Abstract: Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing, by allowing policies to be expressed in terms of chains of relationships between entities. ReBAC policy mining algorithms have the potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automatin… ▽ More

    Submitted 12 May, 2020; v1 submitted 24 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.07530, arXiv:1708.04749

  18. arXiv:1908.09813  [pdf, other

    cs.MA

    Neural Flocking: MPC-based Supervised Learning of Flocking Controllers

    Authors: Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari

    Abstract: We show how a distributed flocking controller can be synthesized using deep learning from a centralized controller which generates the trajectories of the flock. Our approach is based on supervised learning, with the centralized controller providing the training data to the learning agent, i.e., the synthesized distributed controller. We use Model Predictive Control (MPC) for the centralized contr… ▽ More

    Submitted 17 January, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: This is an updated version of our previous submission. The updated version includes an additional section of experiments using quadrotors

  19. arXiv:1908.00528  [pdf, other

    cs.AI eess.SY

    Neural Simplex Architecture

    Authors: Dung T. Phan, Radu Grosu, Nils Jansen, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller

    Abstract: We present the Neural Simplex Architecture (NSA), a new approach to runtime assurance that provides safety guarantees for neural controllers (obtained e.g. using reinforcement learning) of autonomous and other complex systems without unduly sacrificing performance. NSA is inspired by the Simplex control architecture of Sha et al., but with some significant differences. In the traditional approach,… ▽ More

    Submitted 24 March, 2020; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 12th NASA Formal Methods Symposium (NFM 2020)

  20. arXiv:1905.12660  [pdf, other

    cs.LG stat.ML

    Training Generative Adversarial Networks from Incomplete Observations using Factorised Discriminators

    Authors: Daniel Stoller, Sebastian Ewert, Simon Dixon

    Abstract: Generative adversarial networks (GANs) have shown great success in applications such as image generation and inpainting. However, they typically require large datasets, which are often not available, especially in the context of prediction tasks such as image segmentation that require labels. Therefore, methods such as the CycleGAN use more easily available unlabelled data, but do not offer a way… ▽ More

    Submitted 30 January, 2020; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: 10 pages plus 14 pages appendix. Accepted at the International Conference on Learning Representations (ICLR) 2020. Camera-ready submission. Implementation available at https://github.com/f90/FactorGAN

  21. Algorithm Diversity for Resilient Systems

    Authors: Scott D. Stoller, Yanhong A. Liu

    Abstract: Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit. Work on software diversity for security typically creates variants of a program using low-level code transformations. This paper is the first to study algorithm diversity for resilience. We first describe how a method based on high-level… ▽ More

    Submitted 28 April, 2019; originally announced April 2019.

    Journal ref: In Proceedings of the 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2019), volume 11559 of Lecture Notes in Computer Science. Springer-Verlag, 2019

  22. arXiv:1904.09533  [pdf, other

    cs.LG cs.SD eess.AS stat.ML

    GAN-based Generation and Automatic Selection of Explanations for Neural Networks

    Authors: Saumitra Mishra, Daniel Stoller, Emmanouil Benetos, Bob L. Sturm, Simon Dixon

    Abstract: One way to interpret trained deep neural networks (DNNs) is by inspecting characteristics that neurons in the model respond to, such as by iteratively optimising the model input (e.g., an image) to maximally activate specific neurons. However, this requires a careful selection of hyper-parameters to generate interpretable examples for each neuron of interest, and current methods rely on a manual,… ▽ More

    Submitted 27 April, 2019; v1 submitted 20 April, 2019; originally announced April 2019.

    Comments: 8 pages plus references and appendix. Accepted at the ICLR 2019 Workshop "Safe Machine Learning: Specification, Robustness and Assurance". Camera-ready version. v2: Corrected page header

    Journal ref: SafeML Workshop at the International Conference on Learning Representations (ICLR) 2019

  23. arXiv:1904.04589  [pdf, other

    eess.AS cs.SD

    Ensemble Models for Spoofing Detection in Automatic Speaker Verification

    Authors: Bhusan Chettri, Daniel Stoller, Veronica Morfi, Marco A. Martínez Ramírez, Emmanouil Benetos, Bob L. Sturm

    Abstract: Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especially when using only one modeling approach. For robustness, we use both deep neural networks and traditional machine learning models and combine them as ensemble models through logistic regression. They are trained to detect logical access (LA) and physical access (PA) attacks on the dataset released… ▽ More

    Submitted 4 July, 2019; v1 submitted 9 April, 2019; originally announced April 2019.

    Comments: Accepted at Interspeech 2019, Graz, Austria

  24. Efficient and Extensible Policy Mining for Relationship-Based Access Control

    Authors: Thang Bui, Scott D. Stoller, Hieu Le

    Abstract: Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities. ReBAC policy mining algorithms have a potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC polic… ▽ More

    Submitted 8 August, 2019; v1 submitted 18 March, 2019; originally announced March 2019.

    Journal ref: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019), pages 161-172

  25. arXiv:1902.06797  [pdf, other

    cs.SD cs.LG eess.AS

    End-to-end Lyrics Alignment for Polyphonic Music Using an Audio-to-Character Recognition Model

    Authors: Daniel Stoller, Simon Durand, Sebastian Ewert

    Abstract: Time-aligned lyrics can enrich the music listening experience by enabling karaoke, text-based song retrieval and intra-song navigation, and other applications. Compared to text-to-speech alignment, lyrics alignment remains highly challenging, despite many attempts to combine numerous sub-modules including vocal separation and detection in an effort to break down the problem. Furthermore, training… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: 5 pages (1 for references), 2 figures, 2 tables. Camera-ready version, accepted at the International Conference on Acoustics, Speech, and Signal Processing 2019 (ICASSP)

  26. High-level Cryptographic Abstractions

    Authors: Christopher Kane, Bo Lin, Saksham Chand, Scott D. Stoller, Yanhong A. Liu

    Abstract: The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while also allowing maximum control when needed. This paper proposes such high-level abstractions consisting of simple cryptographic primitives and full… ▽ More

    Submitted 23 August, 2019; v1 submitted 21 October, 2018; originally announced October 2018.

    Journal ref: PLAS 2019: Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security. November 2019. Pages 31-43

  27. Neural State Classification for Hybrid Systems

    Authors: Dung Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller

    Abstract: We introduce the State Classification Problem (SCP) for hybrid systems, and present Neural State Classification (NSC) as an efficient solution technique. SCP generalizes the model checking problem as it entails classifying each state $s$ of a hybrid automaton as either positive or negative, depending on whether or not $s$ satisfies a given time-bounded reachability specification. This is an intere… ▽ More

    Submitted 25 July, 2018; originally announced July 2018.

    Comments: ATVA2018 extended version

  28. arXiv:1806.03185  [pdf, other

    cs.SD eess.AS stat.ML

    Wave-U-Net: A Multi-Scale Neural Network for End-to-End Audio Source Separation

    Authors: Daniel Stoller, Sebastian Ewert, Simon Dixon

    Abstract: Models for audio source separation usually operate on the magnitude spectrum, which ignores phase information and makes separation performance dependant on hyper-parameters for the spectral front-end. Therefore, we investigate end-to-end source separation in the time-domain, which allows modelling phase information and avoids fixed spectral transformations. Due to high sampling rates for audio, em… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

    Comments: 7 pages (1 for references), 4 figures, 3 tables. Appearing in the proceedings of the 19th International Society for Music Information Retrieval Conference (ISMIR 2018) (camera-ready version). Implementation available at https://github.com/f90/Wave-U-Net

    Journal ref: 19th International Society for Music Information Retrieval Conference (ISMIR 2018)

  29. arXiv:1804.01650  [pdf, other

    cs.SD cs.LG eess.AS

    Jointly Detecting and Separating Singing Voice: A Multi-Task Approach

    Authors: Daniel Stoller, Sebastian Ewert, Simon Dixon

    Abstract: A main challenge in applying deep learning to music processing is the availability of training data. One potential solution is Multi-task Learning, in which the model also learns to solve related auxiliary tasks on additional datasets to exploit their correlation. While intuitive in principle, it can be challenging to identify related tasks and construct the model to optimally share information be… ▽ More

    Submitted 4 April, 2018; originally announced April 2018.

    Comments: 10 pages, 2 figures, accepted for the 14th International Conference on Latent Variable Analysis and Signal Separation

  30. arXiv:1712.01935  [pdf, other

    cs.LG

    How to Learn a Model Checker

    Authors: Dung Phan, Radu Grosu, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller

    Abstract: We show how machine-learning techniques, particularly neural networks, offer a very effective and highly efficient solution to the approximate model-checking problem for continuous and hybrid systems, a solution where the general-purpose model checker is replaced by a model-specific classifier trained by sampling model trajectories. To the best of our knowledge, we are the first to establish this… ▽ More

    Submitted 5 December, 2017; originally announced December 2017.

    Comments: 16 pages, 13 figures, short version submitted to HSCC2018

  31. arXiv:1711.00048  [pdf, other

    cs.LG cs.SD

    Adversarial Semi-Supervised Audio Source Separation applied to Singing Voice Extraction

    Authors: Daniel Stoller, Sebastian Ewert, Simon Dixon

    Abstract: The state of the art in music source separation employs neural networks trained in a supervised fashion on multi-track databases to estimate the sources from a given mixture. With only few datasets available, often extensive data augmentation is used to combat overfitting. Mixing random tracks, however, can even reduce separation performance as instruments in real music are strongly correlated. Th… ▽ More

    Submitted 6 April, 2018; v1 submitted 31 October, 2017; originally announced November 2017.

    Comments: 5 pages, 2 figures, 1 table. Final version of manuscript accepted for 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Implementation available at https://github.com/f90/AdversarialAudioSeparation

    ACM Class: H.5.5; I.2.6

  32. arXiv:1710.10013  [pdf, other

    cs.MA eess.SY

    Declarative vs Rule-based Control for Flocking Dynamics

    Authors: Usama Mehmood, Nicola Paoletti, Dung Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, Scott A. Smolka

    Abstract: The popularity of rule-based flocking models, such as Reynolds' classic flocking model, raises the question of whether more declarative flocking models are possible. This question is motivated by the observation that declarative models are generally simpler and easier to design, understand, and analyze than operational models. We introduce a very simple control law for flocking based on a cost fun… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

    Comments: 7 Pages

  33. arXiv:1708.04749  [pdf, other

    cs.CR

    Greedy and Evolutionary Algorithms for Mining Relationship-Based Access Control Policies

    Authors: Thang Bui, Scott D. Stoller, Jiajie Li

    Abstract: Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing. We formulate ReBAC as an object-oriented extension of attribute-based access control (ABAC) in which relationships are expressed using fields that refer to other objects, and path expressions are used to follow chains of relationships between objects.… ▽ More

    Submitted 21 August, 2018; v1 submitted 15 August, 2017; originally announced August 2017.

  34. A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems

    Authors: Dung Phan, Junxing Yang, Matthew Clark, Radu Grosu, John D. Schierman, Scott A. Smolka, Scott D. Stoller

    Abstract: We present Component-Based Simplex Architecture (CBSA), a new framework for assuring the runtime safety of component-based cyber-physical systems (CPSs). CBSA integrates Assume-Guarantee (A-G) reasoning with the core principles of the Simplex control architecture to allow component-based CPSs to run advanced, uncertified controllers while still providing runtime assurance that A-G contracts and gl… ▽ More

    Submitted 16 April, 2017; originally announced April 2017.

    Comments: Extended version of a paper to be presented at ACSD 2017, 12 pages, 3 figures, 1 appendix

  35. Moderately Complex Paxos Made Simple: High-Level Executable Specification of Distributed Algorithms

    Authors: Yanhong A. Liu, Saksham Chand, Scott D. Stoller

    Abstract: This paper describes the application of a high-level language and method in develo** simpler specifications of more complex variants of the Paxos algorithm for distributed consensus. The specifications are for Multi-Paxos with preemption, replicated state machine, and reconfiguration and optimized with state reduction and failure detection. The language is DistAlgo. The key is to express complex… ▽ More

    Submitted 12 August, 2019; v1 submitted 31 March, 2017; originally announced April 2017.

    Journal ref: PPDP 2019: Proceedings of the 21st International Symposium on Principles and Practice of Declarative Programming. October 2019. Article No. 15. Pages 1-15. ACM Press

  36. arXiv:1703.01257  [pdf, other

    eess.SY

    Model Checking Cyber-Physical Systems using Particle Swarm Optimization

    Authors: Dung Phan, Scott A. Smolka, Radu Grosu, Usama Mehmood, Scott D. Stoller, Junxing Yang

    Abstract: We present a novel approach to the problem of model checking cyber-physical systems. We transform the model checking problem to an optimization one by designing an objective function that measures how close a state is to a violation of a property. We use particle swarm optimization (PSO) to effectively search for a state that minimizes the objective function. Such states, if found, are counter-exa… ▽ More

    Submitted 3 March, 2017; originally announced March 2017.

  37. arXiv:1606.06269  [pdf, ps, other

    cs.LO cs.AI cs.DB cs.PL

    Founded Semantics and Constraint Semantics of Logic Rules

    Authors: Yanhong A. Liu, Scott D. Stoller

    Abstract: Logic rules and inference are fundamental in computer science and have been studied extensively. However, prior semantics of logic languages can have subtle implications and can disagree significantly, on even very simple programs, including in attempting to solve the well-known Russell's paradox. These semantics are often non-intuitive and hard-to-understand when unrestricted negation is used in… ▽ More

    Submitted 26 March, 2020; v1 submitted 20 June, 2016; originally announced June 2016.

    Journal ref: Journal of Logic and Computation, 30(8):1609-1668, Dec. 2020, Oxford University Press

  38. Formal Verification of Multi-Paxos for Distributed Consensus

    Authors: Saksham Chand, Yanhong A. Liu, Scott D. Stoller

    Abstract: Paxos is an important algorithm for a set of distributed processes to agree on a single value or a sequence of values, for which it is called Basic Paxos or Multi-Paxos, respectively. Consensus is critical when distributed services are replicated for fault-tolerance, because non-faulty replicas must agree on the state of the system or the sequence of operations that have been performed. Unfortunat… ▽ More

    Submitted 11 November, 2019; v1 submitted 4 June, 2016; originally announced June 2016.

    Journal ref: FM 2016: Proceedings of the 21st International Symposium on Formal Methods. LNCS 9995. Pages 119-136. Springer,

  39. arXiv:1603.02640  [pdf, other

    cs.CR

    Mining Hierarchical Temporal Roles with Multiple Metrics

    Authors: Scott D. Stoller, Thang Bui

    Abstract: Temporal role-based access control (TRBAC) extends role-based access control to limit the times at which roles are enabled. This paper presents a new algorithm for mining high-quality TRBAC policies from timed ACLs (i.e., ACLs with time limits in the entries) and optionally user attribute information. Such algorithms have potential to significantly reduce the cost of migration from timed ACLs to T… ▽ More

    Submitted 15 October, 2017; v1 submitted 8 March, 2016; originally announced March 2016.

  40. arXiv:1511.04583  [pdf, other

    cs.PL cs.AI cs.DB

    Demand-Driven Incremental Object Queries

    Authors: Yanhong A. Liu, Jon Brandvein, Scott D. Stoller, Bo Lin

    Abstract: Object queries are essential in information seeking and decision making in vast areas of applications. However, a query may involve complex conditions on objects and sets, which can be arbitrarily nested and aliased. The objects and sets involved as well as the demand---the given parameter values of interest---can change arbitrarily. How to implement object queries efficiently under all possible u… ▽ More

    Submitted 15 July, 2016; v1 submitted 14 November, 2015; originally announced November 2015.

    Journal ref: PPDP 2016: Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, September 2016, Pages 228-241. ACM Press

  41. arXiv:1508.07723  [pdf

    eess.SY cs.RO

    A survey on unmanned aerial vehicle collision avoidance systems

    Authors: Hung Pham, Scott A. Smolka, Scott D. Stoller, Dung Phan, Junxing Yang

    Abstract: Collision avoidance is a key factor in enabling the integration of unmanned aerial vehicle into real life use, whether it is in military or civil application. For a long time there have been a large number of works to address this problem; therefore a comparative summary of them would be desirable. This paper presents a survey on the major collision avoidance systems developed in up to date public… ▽ More

    Submitted 31 August, 2015; originally announced August 2015.

    Comments: This is only a draft

  42. arXiv:1412.8461  [pdf, ps, other

    cs.PL cs.DC

    From Clarity to Efficiency for Distributed Algorithms

    Authors: Yanhong A. Liu, Scott D. Stoller, Bo Lin

    Abstract: This article describes a very high-level language for clear description of distributed algorithms and optimizations necessary for generating efficient implementations. The language supports high-level control flows where complex synchronization conditions can be expressed using high-level queries, especially logic quantifications, over message history sequences. Unfortunately, the programs would b… ▽ More

    Submitted 11 March, 2017; v1 submitted 29 December, 2014; originally announced December 2014.

    Journal ref: ACM Transactions on Programming Languages and Systems (TOPLAS), 39(3), pages 12:1-12:41, July 2017, ACM Press

  43. arXiv:1403.5715  [pdf, other

    cs.CR cs.DB

    Mining Attribute-Based Access Control Policies from Logs

    Authors: Zhongyuan Xu, Scott D. Stoller

    Abstract: Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mini… ▽ More

    Submitted 12 February, 2018; v1 submitted 22 March, 2014; originally announced March 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1306.2401

  44. arXiv:1306.2401  [pdf, other

    cs.CR

    Mining Attribute-based Access Control Policies

    Authors: Zhongyuan Xu, Scott D. Stoller

    Abstract: Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from an access control list (ACL) policy or role-based access control (RBAC) policy with accompanying attribute data. T… ▽ More

    Submitted 7 August, 2014; v1 submitted 10 June, 2013; originally announced June 2013.

  45. arXiv:1005.0805  [pdf

    cond-mat.mtrl-sci

    Review of Best Practice Methods for Determining an Electrode Material's Performance for Ultracapacitors

    Authors: Meryl D. Stoller, Rodney S. Ruoff

    Abstract: Ultracapacitors are rapidly being adopted for use for a wide range of electrical energy storage applications. While ultracapacitors are able to deliver high rates of charge and discharge, they are limited in the amount of energy stored. The capacity of ultracapacitors is largely determined by the electrode material and as a result, research to improve the performance of electrode materials has d… ▽ More

    Submitted 13 May, 2010; v1 submitted 5 May, 2010; originally announced May 2010.