Search Results - "Erascu, Madalina"
-
1
Real quantifier elimination for the synthesis of optimal numerical algorithms (Case study: Square root computation)
Published in Journal of symbolic computation (01-07-2016)“…We report on our on-going efforts to apply real quantifier elimination to the synthesis of optimal numerical algorithms. In particular, we describe a case…”
Get full text
Journal Article -
2
Scalable optimal deployment in the cloud of component-based applications using optimization modulo theory, mathematical programming and symmetry breaking
Published in Journal of logical and algebraic methods in programming (01-06-2021)“…Automated deployment of component-based applications in the Cloud consists in the allocation of virtual machines (VMs) offers from various Cloud Providers such…”
Get full text
Journal Article -
3
Automatically Enforcing Security SLAs in the Cloud
Published in IEEE transactions on services computing (01-09-2017)“…Dealing with the provisioning of cloud services granted by Security SLAs is a very challenging research topic. At the state of the art, the main related issues…”
Get full text
Journal Article -
4
Benchmarking Local Robustness of High-Accuracy Binary Neural Networks for Enhanced Traffic Sign Recognition
Published in Electronic proceedings in theoretical computer science (22-09-2023)Get full text
Journal Article -
5
SAGE - A Tool for Optimal Deployments in Kubernetes Clusters
Published in 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (04-12-2023)“…Cloud computing has brought a fundamental transformation in how organizations operate their applications, enabling them to achieve affordable high availability…”
Get full text
Conference Proceeding -
6
A scalable hybrid approach for applications placement in the cloud
Published in 2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG) (01-10-2015)“…The exact methods do not scale well for resource management problems requiring to deploy a set of applications on some virtual machines (VMs) such that (1)…”
Get full text
Conference Proceeding -
7
Fast and Exact Synthesis of Application Deployment Plans using Graph Neural Networks and Satisfiability Modulo Theory
Published in 2024 International Joint Conference on Neural Networks (IJCNN) (30-06-2024)“…Learning-augmented algorithms use machine learning predictions to boost optimization algorithms performance. The extra information incorporated into…”
Get full text
Conference Proceeding -
8
A Purely Logical Approach to the Termination of Imperative Loops
Published in 2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (01-09-2010)“…We present and illustrate a method for the generation of the termination conditions for nested loops with abrupt termination statements. The conditions are…”
Get full text
Conference Proceeding -
9
A Calculus for Imperative Programs: Formalization and Implementation
Published in 2009 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (01-09-2009)“…As an extension of our previous work on imperative program verification, we present a formalism for handling the total correctness of While loops in imperative…”
Get full text
Conference Proceeding -
10
Benchmarking Optimization Solvers and Symmetry Breakers for the Automated Deployment of Component-based Applications in the Cloud (EXTENDED ABSTRACT)
Published 24-05-2023“…CEUR-WS, vol 3458, 2023 Optimization solvers based on methods from constraint programming (OR-Tools, Chuffed, Gecode), optimization modulo theory (Z3), and…”
Get full text
Journal Article -
11
SAGE -- A Tool for Optimal Deployments in Kubernetes Clusters
Published 12-07-2023“…Cloud computing has brought a fundamental transformation in how organizations operate their applications, enabling them to achieve affordable high availability…”
Get full text
Journal Article -
12
A Tool for Fake News Detection
Published in 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) (01-09-2018)“…The word post-truth was considered by Oxford Dictionaries Word of the Year 2016. The word is an adjective relating to or denoting circumstances in which…”
Get full text
Conference Proceeding -
13
Semi-automatic analysis of algorithm complexity (Case study: Square-root computation)
Published in 2014 IEEE 12th International Symposium on Intelligent Systems and Informatics (SISY) (01-09-2014)“…We report on our on-going efforts to apply real quantifier elimination to the (semi-)automatic complexity analysis of numerical algorithms. In particular, we…”
Get full text
Conference Proceeding -
14
Scalable Optimal Deployment in the Cloud of Component-based Applications using Optimization Modulo Theory, Mathematical Programming and Symmetry Breaking
Published 09-06-2020“…The problem of Cloud resource provisioning for component-based applications consists in the allocation of virtual machines (VMs) offers from various Cloud…”
Get full text
Journal Article -
15
Constraint Satisfaction Approaches in Cloud Resource Selection for Component Based Applications
Published in 2018 IEEE 14th International Conference on Intelligent Computer Communication and Processing (ICCP) (01-09-2018)“…Cloud resource provisioning for applications con-sisting of interacting components requires solving a constrained optimization problem. In this paper two exact…”
Get full text
Conference Proceeding -
16
An Architecture for a Management Agency for Cloud Resources
Published in 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) (01-09-2018)“…Cloud computing offers attractive options to migrate corporate applications without the end users needing to manage any physical resources. While this "ease"…”
Get full text
Conference Proceeding -
17
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
Published in 2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS) (01-07-2016)“…The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service…”
Get full text
Conference Proceeding -
18
Soundness of a Logic-Based Verification Method for Imperative Loops
Published in 2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (01-09-2012)“…We present a logic-based verification method for imperative loops (including ones with abrupt termination) and the automatic proof of its soundness. The…”
Get full text
Conference Proceeding -
19
Benchmarking Local Robustness of High-Accuracy Binary Neural Networks for Enhanced Traffic Sign Recognition
Published 25-09-2023“…EPTCS 389, 2023, pp. 120-130 Traffic signs play a critical role in road safety and traffic management for autonomous driving systems. Accurate traffic sign…”
Get full text
Journal Article -
20
Architecturing Binarized Neural Networks for Traffic Sign Recognition
Published 27-03-2023“…Traffic signs support road safety and managing the flow of traffic, hence are an integral part of any vision system for autonomous driving. While the use of…”
Get full text
Journal Article