Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Perennial Semantic Data Terms of Use for Decentralized Web
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2238–2249https://doi.org/10.1145/3589334.3645631In today's digital landscape, the Web has become increasingly centralized, raising concerns about user privacy violations. Decentralized Web architectures, such as Solid, offer a promising solution by empowering users with better control over their data ...
- research-articleMay 2024
A Computational Framework of Human Values
AAMAS '24: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent SystemsPages 1531–1539There is an increasing recognition of the need to engineer AI that respects and embodies human values. The value alignment problem, which identifies that need, has led to a growing body of research that investigates value learning, the aggregation of ...
- ArticleSeptember 2023
Formal Reasoning About Influence in Natural Sciences Experiments
AbstractWe present a simple calculus for deriving statements about the local behaviour of partial, continuous functions over the reals, within a collection of such functions associated with the elements of a finite partial order. We show that the calculus ...
- research-articleJanuary 2021
A combined solution for flexible control of poultry houses
International Journal of Computer Applications in Technology (IJCAT), Volume 67, Issue 2-3Pages 232–243https://doi.org/10.1504/ijcat.2021.121539In poultry houses, thermal comfort is decisive for maximising the feed conversion rate, a measure for successful production. As there are different automatic control options, that result in variable performance indexes, this paper reproduces, tests, and ...
-
- research-articleJanuary 2020
Using priced timed automata for the specification and verification of CSMA/CA in WSNs
International Journal of Information and Communication Technology (IJICT), Volume 17, Issue 2Pages 129–145https://doi.org/10.1504/ijict.2020.108963Several contention-based MAC protocols for WSNs have been proposed. The control channel is accessed with carrier sense multiple access with collision avoidance (CSMA/CA) method. The complexity of this method and its criticality motivate the formal ...
- research-articleJanuary 2020
Applying guidelines for system modelling in Event-B - a systematic literature review
International Journal of Critical Computer-Based Systems (IJCCBS), Volume 10, Issue 1Pages 1–36https://doi.org/10.1504/ijccbs.2020.108668Developing safety-critical systems is an intricate task since it involves the application of well-established and rigorous methods, supported by good practices. The modelling is merely a part of this undertaking. However, it plays a significant role in ...
- research-articleJuly 2019
Misbinding Attacks on Secure Device Pairing and Bootstrapping
Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications SecurityPages 453–464https://doi.org/10.1145/3321705.3329813In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compromised participant manipulates the honest parties so that the victim becomes unknowingly associated with a third party. These attacks are well known, and ...
- research-articleFebruary 2019
Formal modelling and verifying elasticity strategies in cloud systems
Elasticity property allows cloud systems to adapt to their input workload by provisioning and deprovisioning resources as the demand grows and drops. However, due to the unpredictable nature of workload, providing accurate action plans to manage a cloud ...
- research-articleJanuary 2019
New Proposals to Improve a MAC Layer Protocol in Wireless Sensor Networks
Informatica (INFMA), Volume 30, Issue 1Pages 91–116The evolution of Wireless Sensor Networks has led to the development of protocols that must comply with their new restrictions while being efficient in terms of energy consumption and time. We focus on a collision resolution protocol, the so-called Two ...
- research-articleNovember 2018
Maintenance of Smart Buildings using Fault Trees
ACM Transactions on Sensor Networks (TOSN), Volume 14, Issue 3-4Article No.: 28, Pages 1–25https://doi.org/10.1145/3232616Timely maintenance is an important means of increasing system dependability and life span. Fault Maintenance trees (FMTs) are an innovative framework incorporating both maintenance strategies and degradation models and serve as a good planning platform ...
- research-articleNovember 2017
Efficient probabilistic model checking of smart building maintenance using fault maintenance trees
BuildSys '17: Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built EnvironmentsArticle No.: 24, Pages 1–10https://doi.org/10.1145/3137133.3137138Cyber-physical systems, like Smart Buildings and power plants, have to meet high standards, both in terms of reliability and availability. Such metrics are typically evaluated using Fault trees (FTs) and do not consider maintenance strategies which can ...
- short-paperJune 2017
Modelling safety-critical devices: coloured petri nets and Z
EICS '17: Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing SystemsPages 51–56https://doi.org/10.1145/3102113.3102125The paper describes a model that presents a technique in which we combine formal languages---Z, presentation models and coloured Petri nets---and methods which use them, to specify the functionality and model the user interface and interaction of a ...
- research-articleMay 2016
On Lions, Impala, and Bigraphs: Modelling Interactions in Physical/Virtual Spaces
ACM Transactions on Computer-Human Interaction (TOCHI), Volume 23, Issue 2Article No.: 9, Pages 1–56https://doi.org/10.1145/2882784While HCI has a long tradition of formally modelling task-based interactions with graphical user interfaces, there has been less progress in modelling emerging ubiquitous computing systems due in large part to their highly contextual nature and ...
- articleJanuary 2016
Formally verified TSM centric privacy preserving NFC mobile payment framework and protocol
International Journal of Information and Computer Security (IJICS), Volume 8, Issue 2Pages 181–204https://doi.org/10.1504/IJICS.2016.078126Near field communication is on the verge of broad adoption worldwide. The combination of NFC and smart mobile devices are making the way of life more easier for millennials. Sensitive consumer information can be predicted using data aggregation and ...
- research-articleSeptember 2015
DevOps meets formal modelling in high-criticality complex systems
QUDOS 2015: Proceedings of the 1st International Workshop on Quality-Aware DevOpsPages 7–12https://doi.org/10.1145/2804371.2804373Quality is the cornerstone of high criticality systems, since in case of failure not only major financial losses are at stake, but also human lives. Formal methods that support model based-development are one of the methodologies used to achieve ...
- articleJune 2015
Approaching the Internet of things IoT: a modelling, analysis and abstraction framework
Concurrency and Computation: Practice & Experience (CCOMP), Volume 27, Issue 8Pages 1966–1984https://doi.org/10.1002/cpe.3131The evolution of communication protocols, sensory hardware, mobile and pervasive devices, alongside social and cyber-physical networks, has made the Internet of things IoT an interesting concept with inherent complexities as it is realised. Such ...
- ArticleMarch 2015
A Formal Specification and Prototyping Language for Multi-core System Management
PDP '15: Proceedings of the 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based ProcessingPages 696–700https://doi.org/10.1109/PDP.2015.107We relate the experience of a defining a formal domain specific language (DSL) for the construction and reasoning about OS-level management logic of multi-core systems. The approach is based on a novel, iterative development principle where results of ...
- ArticleJune 2014
Formal Derivation of Distributed MapReduce
ABZ 2014: Proceedings of the 4th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z - Volume 8477Pages 238–254https://doi.org/10.1007/978-3-662-43652-3_21MapReduce is a powerful distributed data processing model that is currently adopted in a wide range of domains to efficiently handle large volumes of data, i.e., cope with the big data surge. In this paper, we propose an approach to formal derivation of ...
- ArticleSeptember 2013
Formalisation of an Industrial Approach to Monitoring Critical Data
SAFECOMP 2013: Proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security - Volume 8153Pages 57–69https://doi.org/10.1007/978-3-642-40793-2_6A large class of safety-critical control systems contains monitoring subsystems that display certain system parameters to (human) operators. Ensuring that the displayed data are sufficiently fresh and non-corrupted constitutes an important part of ...