This mini review examines the security challenges faced by purchasers in the metaverse, focusing on issues such as data protection, privacy, identity theft, financial fraud, and software vulnerabilities. The metaverse...
详细信息
In this work, a cavity-backed antenna with increased bandwidth and minimum design complexity for operation at millimeter wave (mmW) frequencies is proposed. Namely, by leveraging our recently proposed frequency pullin...
详细信息
Because ensembles and swarms occur everywhere in nature, in social and in technical contexts, their modeling and programming is one of the challenges of modern software systemsengineering. While it is well-known how ...
详细信息
ISBN:
(纸本)9783031751066;9783031751073
Because ensembles and swarms occur everywhere in nature, in social and in technical contexts, their modeling and programming is one of the challenges of modern software systemsengineering. While it is well-known how self-adaptive or autonomic systems can be designed advantageously (Kounev et al., 2017), this often requires the engineering of new software languages with a tremendous development effort. This paper presents a novel context-role-adaptive approach for modeling and programming of ensembles and swarms that relies on a small library in Julia (1300 SLOC), exploiting its facilities for metaprogramming, multiple dispatch, and equational modeling. We demonstrate the validity of the approach with a tutorial on two scenarios from the technical and natural domain in which ensembles are represented by (dynamic) contexts. RailCabs are shuttle-based autonomous trains, self-forming ensembles, represented as contexts that re-group during their travels. Bird swarms show specific formations, represented as contexts to save energy and to prevent attackers. In the latter case study, we show how to model the dynamic behavior of the birds with an equational modeling library in Julia. Therefore, the paper contributes a new library-based approach to Context-Role-oriented Equational Modeling of Ensembles (CREME).
Server-based computing in space has been recently proposed due to potential benefits in terms of capability, latency, security, sustainability, and cost. Despite this, there has been no work asking the question: how s...
详细信息
Fraud detection is critical in identifying and preventing fraudulent activities across various industries, safeguarding financial assets, and maintaining trust in business. Although graph-based fraud detection methods...
详细信息
Autonomous multi-agent, or more generally, collective adaptive systems, use different modes of communication to support their autonomy and ease of interaction. In order to enable modelling and reasoning about such sys...
详细信息
ISBN:
(纸本)9783031751066;9783031751073
Autonomous multi-agent, or more generally, collective adaptive systems, use different modes of communication to support their autonomy and ease of interaction. In order to enable modelling and reasoning about such systems, we need frameworks that combine many forms of communication. R-CHECK is a modelling, simulation, and verification environment supporting the development of multi-agent systems, providing attributed channelled broadcast and multicast communication. That is, the communication is not merely derived based on connectivity to channels but in addition based on properties of targeted receiversAnother common communication mode is point-to-point, wherein agents communicate with each other directly. Capturing point-to-point through R-CHECK's multicast and broadcast is possible but cumbersome, inefficient, and prone to interference. Here, we extend R-CHECK with attributed point-to-point communication, which can be established based on identity or properties of participants. We also support model-checking of point-to-point by extending linear temporal logic with observation descriptors related to the participants in this communication mode. We argue that these extensions simplify the design of models, and demonstrate their benefits by means of an illustrative case study.
This edited transcript records a keynote address at the SETSS 2024 workshop. It provides some thoughts on formal software engineering approach in the light of experience and recent developments such as Artif...
详细信息
Computability theory is traditionally conceived as the theoretical basis of informatics. Nevertheless, numerous proposals transcend computability theory, in particular by emphasizing interaction of modules, or compone...
详细信息
ISBN:
(纸本)9783031751066;9783031751073
Computability theory is traditionally conceived as the theoretical basis of informatics. Nevertheless, numerous proposals transcend computability theory, in particular by emphasizing interaction of modules, or components, parts, constituents, as a fundamental computing feature. In a technical framework, interaction requires composition of modules. Hence, a most abstract, comprehensive theory of modules and their composition is required. To this end, we suggest a minimal set of postulates to characterize systems in the digital world that consist of interacting modules. For such systems, we suggest a calculus with a simple, yet most general composition operator which exhibits important properties, in particular associativity. We claim that this composition calculus provides not just another conceptual, formal framework, but that essentially all settings of modules and their composition can be based on this calculus. This claim is supported by a rich body of theorems, properties, special classes of modules, and case studies.
The rapid growth in the number of scientific documents makes it increasingly necessary to provide researchers with efficient paper recommendation services. Since scientific documents contain many mathematical expressi...
详细信息
The increased financial value of the power grids and the multitude of potential attackers, including such with advanced capabilities, makes the enhancement of cybersecurity in power grids very important. In order to s...
详细信息
暂无评论