Skip to main content

Showing 1–4 of 4 results for author: Benedetti, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.08945  [pdf, other

    cs.SE

    A Comparative Gas Cost Analysis of Proxy and Diamond Patterns in EVM Blockchains for Trusted Smart Contract Engineering

    Authors: Anto Benedetti, Tiphaine Henry, Sara Tucci-Piergiovanni

    Abstract: Blockchain applications are witnessing rapid evolution, necessitating the integration of upgradeable smart contracts. Software patterns have been proposed to summarize upgradeable smart contract best practices. However, research is missing on the comparison of these upgradeable smart contract patterns, especially regarding gas costs related to deployment and execution. This study aims to provide a… ▽ More

    Submitted 15 May, 2024; v1 submitted 14 December, 2023; originally announced December 2023.

  2. Stat-weight: Improving the Estimator of Interleaved Methods Outcomes with Statistical Hypothesis Testing

    Authors: Alessandro Benedetti, Anna Ruggero

    Abstract: Interleaving is an online evaluation approach for information retrieval systems that compares the effectiveness of ranking functions in interpreting the users' implicit feedback. Previous work such as Hofmann et al (2011) has evaluated the most promising interleaved methods at the time, on uniform distributions of queries. In the real world, ordinarily, there is an unbalanced distribution of repea… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: This preprint has not undergone peer review (when applicable) or any post-submission improvements or corrections. The Version of Record of this contribution is published in Advances in Information Retrieval 45th European Conference on Information Retrieval, ECIR 2023, Dublin, Ireland, April, 2023, Proceedings, Part III, and is available online at https://doi.org/10.1007/978-3-031-28241-6_2

    MSC Class: H.3.3

    Journal ref: Advances in Information Retrieval 45th European Conference on Information Retrieval, ECIR 2023, Dublin, Ireland, 2023, Proceedings, Part III

  3. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  4. arXiv:1610.07914  [pdf, other

    cs.SE cs.PL

    The ACPATH Metric: Precise Estimation of the Number of Acyclic Paths in C-like Languages

    Authors: Roberto Bagnara, Abramo Bagnara, Alessandro Benedetti, Patricia M. Hill

    Abstract: NPATH is a metric introduced by Brian A. Nejmeh in [13] that is aimed at overcoming some important limitations of McCabe's cyclomatic complexity. Despite the fact that the declared NPATH objective is to count the number of acyclic execution paths through a function, the definition given for the C language in [13] fails to do so even for very simple programs. We show that counting the number of acy… ▽ More

    Submitted 10 March, 2024; v1 submitted 25 October, 2016; originally announced October 2016.

    Comments: 62 pages, 10 figures, 7 tables

    MSC Class: 68N30 ACM Class: D.2.8; D.2.5