This special issue includes a selection of the artefacts presented at the 18th international Federated conference on Distributed computing Techniques (DiScoTec 2023), held at the NOVA University Lisbon (Lisbon, Portug...
详细信息
This special issue includes a selection of the artefacts presented at the 18th international Federated conference on Distributed computing Techniques (DiScoTec 2023), held at the NOVA University Lisbon (Lisbon, Portugal), in June 18-23, 2023. The federated conference included: COORDINATION 2023, the 25th internationalconference on Coordination Models and Languages);DAIS 2023, the 23rd internationalconference on Distributed Applications and Interoperable systems;and FORTE 2023, the 43rd internationalconference on Formal Techniques for Distributed Objects, Components, and systems. All the three conferences welcomed submissions describing technological artefacts, including innovative prototypes supporting the modelling, development, analysis, simulation, or testing of systems in the broad spectrum of distributed computing subjects. The artefact evaluation chairs have selected a subset of high- quality accepted artefacts to be invited for submission to this special issue. Following the revision process, nine artefacts have been accepted to be part of this special issue. The published contributions include different types of artefacts, including programming libraries, frameworks, as well as tools for the analysis, verification, and simulation of distributed systems.
Quantum computing are breakthroughs aimed to revolutionize several sectors, although they also present considerable cybersecurity threats. Quantum computers can manage quite greater quantities of information than the ...
详细信息
This study delves into the crucial issue of reducing energy consumption within green computing by examining the energy usage of well-known applications and comparing them based on their complexity. Utilizing PowerAPI,...
详细信息
Nowadays, the surveillance system performing as an indispensable part for modern industrial Internet has attracted much attention. With the continuous progress of microprocessor technology, sensor technology, particul...
详细信息
As blockchain technology is widely applied across various fields, the performance requirements of blockchain systems, such as throughput and transaction latency, are increasing. In this context, blockchain systems hav...
详细信息
After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous genera...
详细信息
The software industry is characterized by an environment of uncertainty, high volatility, and constant change. This context has shaped the industry, its components, and actors, generating methodologies capable of meet...
详细信息
In the contemporary context of quantum computing, the availability of quantum computing platforms through cloud services is increasing, which has democratized access to this technology. This is generating interest in ...
详细信息
ISBN:
(纸本)9789819608072;9789819608089
In the contemporary context of quantum computing, the availability of quantum computing platforms through cloud services is increasing, which has democratized access to this technology. This is generating interest in the industry and the scientific community. However, the increasing demand for access to quantum computers is facing limited resource availability, leading to prolonged waiting times for users and high execution costs. Leveraging the under-utilization, it has already been shown that it is possible to optimize the use of current QPUs by scheduling quantum tasks, and the generated noise does not significantly affect the results. This can be achieved concretely by combining circuits. To this end, the main objective of this work is to define and validate three circuit scheduling policies for the QCRAFT Scheduler, improving the efficiency of QPU utilization and reducing both waiting times and associated task execution costs. A validation of each of the policies has been performed, achieving an average cost reduction of 83.67% and an average task reduction of 84.20% concerning the single execution of the same circuits.
This research paper proposes the implementation of a teaching strategy for the Lean software development course targeting third-year undergraduate students. Additionally, the intermediate results of applying the propo...
详细信息
The proceedings contain 22 papers. The special focus in this conference is on Dependable softwareengineering: Theories, Tools and Applications. The topics include: Extending Symbolic Heap to Support Shared Owner...
ISBN:
(纸本)9789819606016
The proceedings contain 22 papers. The special focus in this conference is on Dependable softwareengineering: Theories, Tools and Applications. The topics include: Extending Symbolic Heap to Support Shared Ownership;constraint Based Invariant Generation with Modular Operations;Data-Dependent WAR Analysis for Efficient Task-Based Intermittent computing;Can Language Models Pretend Solvers? Logic Code Simulation with LLMs;enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-expressions;Formal Verification of RISC-V Processor Chisel Designs;the Principle of Staking: Formal Verification of Staking Smart Contract;a Contract-Based Framework for Formal Verification of Embedded software;Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness;The Design of Intelligent Temperature Control System of Smart House with MARS;universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects;Cache Behavior Analysis with SP-Relative Addressing for WCET Estimation;timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals;runtime Verification of Neural-Symbolic systems;eidos: Efficient, Imperceptible Adversarial 3D Point Clouds;MILE: A Mutation Testing Framework of In-Context Learning systems;a Derivative-Based Membership Algorithm for Enhanced Regular Expressions;nanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive;faster Lifetime-Optimal Speculative Partial Redundancy Elimination for Goto-Free Programs;EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning.
暂无评论