skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Mining Shape Expressions from Positive Examples
Shape expressions (SEs) is a novel specification language that was recently introduced to express behavioral patterns over real-valued signals observed during the execution of cyber-physical systems. An SE is a regular expression composed of arbitrary parameterized shapes, such as lines, exponential curves, and sinusoids as atomic symbols with symbolic constraints on the shape parameters. SEs enable a natural and intuitive specification of complex temporal patterns over possibly noisy data. In this article, we propose a novel method for mining a broad and interesting fragment of SEs from time-series data using a combination of techniques from linear regression, unsupervised clustering, and learning finite automata from positive examples. The learned SE for a given dataset provides an explainable and intuitive model of the observed system behavior. We demonstrate the applicability of our approach on two case studies from different application domains and experimentally evaluate the implemented specification mining procedure.  more » « less
Award ID(s):
1837131
PAR ID:
10199915
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
ISSN:
0278-0070
Page Range / eLocation ID:
1 to 1
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Obtaining an accurate specification of the access control policy enforced by an application is essential in ensuring that it meets our security/privacy expectations. This is especially important as many of real-world applications handle a large amount and variety of data objects that may have different applicable policies. We investigate the problem of automated learning of access control policies from web applications. The existing research on mining access control policies has mainly focused on developing algorithms for inferring correct and concise policies from low-level authorization information. However, little has been done in terms of systematically gathering the low-level authorization data and applications' data models that are prerequisite to such a mining process. In this paper, we propose a novel black-box approach to inferring those prerequisites and discuss our initial observations on employing such a framework in learning policies from real-world web applications. 
    more » « less
  2. Mining spatiotemporal mobility patterns is crucial for optimizing urban planning, enhancing transportation systems, and improving public safety by providing useful insights into human movement and behavior over space and time. As an unsupervised learning technique, time series clustering has gained considerable attention due to its efficiency. However, the existing literature has often overlooked the inherent characteristics of mobility data, including high-dimensionality, noise, outliers, and time distortions. This oversight can lead to potentially large computational costs and inaccurate patterns. To address these challenges, this paper proposes a novel neural network-based method integrating temporal autoencoder and dynamic time warping-based K-means clustering algorithm to mutually promote each other for mining spatiotemporal mobility patterns. Comparative results showed that our proposed method outperformed several time series clustering techniques in accurately identifying mobility patterns on both synthetic and real-world data, which provides a reliable foundation for data-driven decision-making. Furthermore, we applied the method to monthly county-level mobility data during the COVID-19 pandemic in the U.S., revealing significant differences in mobility changes between rural and urban areas, as well as the impact of public response and health considerations on mobility patterns. 
    more » « less
  3. A massive amount of data generated today on platforms such as social networks, telecommunication networks, and the internet in general can be represented as graph streams. Activity in a network’s underlying graph generates a sequence of edges in the form of a stream; for example, a social network may generate a graph stream based on the interactions (edges) between different users (nodes) over time. While many graph mining algorithms have already been developed for analyzing relatively small graphs, graphs that begin to approach the size of real-world networks stress the limitations of such methods due to their dynamic nature and the substantial number of nodes and connections involved. In this paper we present GraphZip, a scalable method for mining interesting patterns in graph streams. GraphZip is inspired by the Lempel-Ziv (LZ) class of compression algorithms, and uses a novel dictionary-based compression approach to discover maximally- compressing patterns in a graph stream. We experimentally show that GraphZip is able to retrieve complex and insightful patterns from large real-world graphs and artificially-generated graphs with ground truth patterns. Additionally, our results demonstrate that GraphZip is both highly efficient and highly effective compared to existing state-of-the-art methods for mining graph streams. 
    more » « less
  4. Abstract While significant efforts are being devoted to improving the ionic conductivity of lithium solid electrolytes (SEs), electronic transport, which has an important role in the calendar life, energy density, and cycling stability of solid‐state batteries (SSBs), is rarely studied. Here, the electronic conductivities of three representative SEs, including Li3PS4, Li7La3Zr2O12, and Li3YCl6, are reported. It is reported that the electronic conductivities of SEs are overestimated from the conventional measurements. By revisiting direct current polarizations using two‐blocking‐electrode cells and the Hebb‐Wagner approach, their sources of inaccuracy are provided and the anodic decomposition of SE is highlighted as the key source for the overestimated result. Modifications in the electrode selection and data interpretation are also proposed to approach the intrinsic electronic conductivity of SEs. A two‐step polarization method is also proposed to estimate the electronic conductivity of sulfides that decompose during measurement. Measured by the modified approach, the electronic conductivities of all SEs are one or two orders of magnitude lower than the reported value. Despite that, the electronic conductivity of sulfides seems to be still quite high to enable SSBs with a long calendar life of >10 years, highlighting the critical need for a more careful study of electronic transport in lithium SEs. 
    more » « less
  5. Specification and tolerancing of surfaces with mid-spatial frequency (MSF) errors are challenging and require new tools to augment simple surface statistics to better represent the structured characteristics of these errors. A novel surface specification method is developed by considering the structured and anisotropic nature of MSF errors and their impact on the modulation transfer function (MTF). The result is an intuitive plot of bandlimited RMS error values in polar coordinates which contains the surface error anisotropy information and enables an easy to understand acceptance criterion. Methods, application examples, and the connection of this surface specification approach to the MTF are discussed. © 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement 
    more » « less