the proceedings contain 15 papers. the special focus in this conference is on Formal Techniques for distributed Objects, Components, and systems. the topics include: Preface;on Bidirectional Runtime Enforcement;superv...
ISBN:
(纸本)9783030780883
the proceedings contain 15 papers. the special focus in this conference is on Formal Techniques for distributed Objects, Components, and systems. the topics include: Preface;on Bidirectional Runtime Enforcement;supervisory Synthesis of Configurable Behavioural Contracts with Modalities;off-the-Shelf Automated Analysis of Liveness Properties for Just Paths: (Extended Abstract);Towards a Spatial Model Checker on GPU;formal Verification of HotStuff;better Late than Never or: Verifying Asynchronous Components at Runtime;Tutorial: Designing distributed Software in mCRL2;a Multi-agent Model for Polarization Under Confirmation Bias in Social Networks;A Formalisation of SysML State Machines in mCRL2;how Adaptive and Reliable is Your Program?;branching Place Bisimilarity: A Decidable Behavioral Equivalence for Finite Petri Nets with Silent Moves;prioritise the Best Variation;Towards Multi-layered Temporal Models:: A Proposal to Integrate Instant Refinement in CCSL.
the proceedings contain 42 papers. the special focus in this conference is on distributedcomputing and Artificial Intelligence. the topics include: Rassel: Robot assistant for the elderly;domestic violence prevention...
ISBN:
(纸本)9783030005238
the proceedings contain 42 papers. the special focus in this conference is on distributedcomputing and Artificial Intelligence. the topics include: Rassel: Robot assistant for the elderly;domestic violence prevention system;LOWG – intelligent monitorization system with custom alerts to avoid the home basics services related risk;design thinking for social challenges;SiloMAS: A MAS for smart silos to optimize food and water consumption on livestock holdings;intelligent livestock feeding system by means of silos with IoT technology.
the proceedings contain 10 papers. the special focus in this conference is on distributed Applications and Interoperable systems. the topics include: Simulation of Large Scale Computational Ecosystems with Alchemist: ...
ISBN:
(纸本)9783030781972
the proceedings contain 10 papers. the special focus in this conference is on distributed Applications and Interoperable systems. the topics include: Simulation of Large Scale Computational Ecosystems with Alchemist: A Tutorial;network Federation for Inter-cloud Operations;specK: Composition of Stream Processing Applications over Fog Environments;ASPAS: As Secure as Possible Available systems;portable Intermediate Representation for Efficient Big Data Analytics;shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups;UCBFed: Using Reinforcement Learning Method to Tackle the Federated Optimization Problem;keVlar-Tz: A Secure Cache for Arm TrustZone: (Practical Experience Report);analysis and Improvement of Heterogeneous Hardware Support in Docker Images.
Decentralization is an important feature both for security and for reliability as it reduces the risks of collusion and impact of the single-point-of-failure vulnerability in a system. After having recalled the re-enc...
详细信息
ISBN:
(纸本)9783031485893;9783031485909
Decentralization is an important feature both for security and for reliability as it reduces the risks of collusion and impact of the single-point-of-failure vulnerability in a system. After having recalled the re-encryption procedure - mainly to establish notations - we will describe a modification of the distributed encrypted storage protocol by Ateniese-Fu-Green-Hohenberger. Such a protocol is a strongly centralized one since it assigns to the manager the possibility of storing all the symmetric keys involved in enciphering the resources required by the users of the system. Our goal here is to show how to reduce the role of the manager as being just a certifier of the access requests to the shared resources. We will achieve this by using standard public-key cryptography tools like the digital signature with message integrity.
Self-consumption is developing worldwide to increase renewable electricity consumption and reduce electricity bills. It can be carried out individually or collectively (grouping several entities), but is generally res...
详细信息
ISBN:
(纸本)9798331507879;9798331507862
Self-consumption is developing worldwide to increase renewable electricity consumption and reduce electricity bills. It can be carried out individually or collectively (grouping several entities), but is generally restricted geographically. In datacenters, one may use load shifting to benefit from the self-consumption tariffs, at the cost of increasing energy consumption. An alternative would be to extend the self-consumption rules to wider perimeters. this paper proposes a comparative study on several aspects influencing the collective self-consumption (CSC) of an Edge infrastructure, including spatial load shifting, temporal load shifting and extending the current rules to encompass wider geographical boundaries. Spatial shifting under the current CSC scheme is found more cost-effective (3.9% of cost reduction) with a negligible increase in energy consumption (0.19%), compared to the revised definition of collective self-consumption which leads to 3.7% cost reduction and no increase in energy consumption. Moreover, allowing up to 10% of the user tasks to be shifted in time can further increase the self-consumption rate by 1.3%.
Computer program testing may be a basic perspective of computer program improvement, guaranteeing the unwavering quality, usefulness, and execution of applications. However, testing large-scale distributedsystems pos...
详细信息
Efficient load balancing is essential for distributedsystems to have outstanding performance and scalability. this study compares the load balancing strategies of two popular distributed application frameworks, gRPC ...
详细信息
Serverless applications are based on Function-as-a-Service (FaaS) platforms where serverless functions interact with other cloud-specific services. the integration of these components is crucial for the application’s...
详细信息
In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D...
详细信息
In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D) coverage in various applications. this oversight leads to ineffective data gathering due to incomplete area coverage and network connectivity. In previous researches (Boufares et al. in: 2018 31 IEEE/ACS 15thinternationalconference on computer systems and applications (AICCSA), Aqaba, Jordan, pp 1-8, 2018, in: 13thinternational wireless communications and mobile computingconference (IWCMC), Valencia, pp 1628-1633, 2017, in: IEEE wireless communications and mobile computingconference (IWCMC), Dubrovnik, Croatia, pp 563-568, 2015a, in: the 4thinternationalconference on performance evaluation and modeling in wired and wireless networks (PEMWN), Hammamet, Tunisia, pp 103-108, 2015b), we proposed 3D mobile autonomous redeployment strategies based on the Virtual Forces Algorithm, tailored for diverse configurations: 3D volume applications such as smart homes or agriculture, 3D flat surfaces like snow monitoring, and 3D terrain surfaces like volcano monitoring. Our approach ensured complete coverage and connectivity in these scenarios. Moreover, energy efficiency emerges as a critical concern, given the autonomous and mobile nature of sensor nodes operating on finite battery power. Hence, in this paper, we provide an overview of our previous results, highlighting the efficacy of our 3D mobile autonomous redeployment strategies across various configurations. Subsequently, we delve into an in-depth analysis of the energy consumption associated withthe different proposed contributions. Building upon these insights, we propose an energy harvesting approach aimed at extending the operational lifespan of mobile 3D WSNs, thus ensuring sustained functionality in diverse real-world *** these contributions, we address critical challenges and p
暂无评论