the proceedings contain 134 papers. the topics discussed include: constructing self-adaptive systems with polymorphic software architecture;an empirical exploratory study on inferring developers' activities from l...
ISBN:
(纸本)9781627486613
the proceedings contain 134 papers. the topics discussed include: constructing self-adaptive systems with polymorphic software architecture;an empirical exploratory study on inferring developers' activities from low-level data;a framework for selecting agile practices and defining agile software processes;a proposal to delegate GUI implementation using a source code based model;common coupling as a measure of reuse effort in kernel-based software;QSEE Project: an experience in outsourcing software development for space applications;analyzing configuration management repository data for software process improvement;smooth quality oriented component integration through product line based aspect-oriented component adaptation;metrics of credibility and interaction quality: design and evaluation;automated test code generation from UML protocol state machines;and NLForSpec: translating natural language descriptions into formal test case specifications.
the dynamic knowledge graph is a data structure that adds temporal information to the nodes and edges of a traditional knowledge graph. It describes the changing processes of entities and relationships over time, ther...
详细信息
Expert systems (ES) rely heavily on effective control mechanisms to navigate complex problem-solving tasks. these mechanisms govern how ES utilizes knowledge and data to make decisions and execute actions. Optimizing ...
详细信息
In this paper, we propose a lattice-based certificateless signature scheme and certificateless aggregate signature which can be used to verify a large number of signatures simultaneously efficiently. To improve the se...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
In this paper, we propose a lattice-based certificateless signature scheme and certificateless aggregate signature which can be used to verify a large number of signatures simultaneously efficiently. To improve the security of our scheme, we have implemented our signature algorithm without trusted third parties. the security of our proposed signature algorithm can be reduced to the SIS problem under the random oracle model. Moreover, our construction only needs matrix multiplication and rejection sampling operation, so the algorithm is naturally simple and efficient. Besides, we've done some experiments using the NTL library, indicating our scheme has less time overhead and storage overhead than other schemes. To our best knowledge, we propose the first certificateless aggregate signature without trapdoors.
this research investigates the perceptions of cybersecurity among older adults in Malaysia, aged 60 years and above, who are reliant on technology for basic activities. the data from 331 participants showed that 30.8%...
详细信息
the role of anomaly detection systems in Critical Infrastructures (CIs) is critical due to the complexity of CIs and their control systems, which are usually implemented by computer-based controllers that constantly p...
详细信息
Expert systems (ES) rely heavily on effective control mechanisms to navigate complex problem-solving tasks. these mechanisms govern how ES utilizes knowledge and data to make decisions and execute actions. Optimizing ...
详细信息
ISBN:
(数字)9798331507817
ISBN:
(纸本)9798331507824
Expert systems (ES) rely heavily on effective control mechanisms to navigate complex problem-solving tasks. these mechanisms govern how ES utilizes knowledge and data to make decisions and execute actions. Optimizing these mechanisms, or addressing the “control problem,” remains a central challenge. Blackboard architectures, withtheir separation of knowledge and control processes, offer a promising approach. this study introduces an improved control mechanism for blackboard architectures. It focuses on a critical aspect-trigger mechanisms and feasible conditions-for optimal knowledge source selection to participate in the problem-solving process. By leveraging these features, this study aims to enhance decision-making and problem-solving capabilities within complex domains. this paper focuses on the technical details of exploring how it manages the flow of rule activation and execution throughout the problem-solving process.
this research investigates the perceptions of cybersecurity among older adults in Malaysia, aged 60 years and above, who are reliant on technology for basic activities. the data from 331 participants showed that 30.8%...
详细信息
ISBN:
(数字)9798331507817
ISBN:
(纸本)9798331507824
this research investigates the perceptions of cybersecurity among older adults in Malaysia, aged 60 years and above, who are reliant on technology for basic activities. the data from 331 participants showed that 30.8% were online for 4–8 hours daily, while 3.3% were completely disconnected. Interestingly, more than half of the respondents were unaware of cybersecurity threats, especially malware and ransomware, which put their data in jeopardy. While there is some awareness related to unauthorized access and computer fraud, knowledge gaps remain significant, and effective educational interventions are thus needed. Informal, self-directed learning appears to be a widespread way of acquiring skills in this age group, often supplemented by community workshops and peer networks. Given that almost half of the older adults spend considerable time online, improving their digital skills in tandem withtheir support systems is an important goal for enhancing their online experiences. It indicates the need for a twin approach: enhancing cybersecurity awareness with specialized educational programs, alongside developing flexible opportunities for informal learning. Educational institutions and relevant policies are encouraged to prioritize building hands-on, specific cybersecurity education for seniors. Also, user interface design considering cybersecurity-related issues can make using the technological environment as user-friendly and secure as possible. these strategies will contribute to creating an inclusive digital society, where older adults are confident and safe in using digital technologies while continuously contributing to their personal and professional development.
暂无评论