This study aims to present a compliance analysis tool to Six Sigma by integrating indicative of success and Paraconsistent Method Decision. This way is contributing to a previous scenario analysis that can help the im...
详细信息
Robots that operate autonomously require a path planner that ensures the robot reaches the desired position in a safe manner. The robot will be able to achieve greater speeds along the path if the path is smooth, mini...
详细信息
The context-awareness is a central aspect in the design of pervasive systems, characterizing their ability to adapt its structure and behavior. The context-aware exception handling (CAEH) is an existing approach emplo...
详细信息
The context-awareness is a central aspect in the design of pervasive systems, characterizing their ability to adapt its structure and behavior. The context-aware exception handling (CAEH) is an existing approach employed to design exception handling in pervasive systems. In this approach, the context is used to define, detect, propagate, and handle exceptions. CAEH is a complex and error prone activity, needing designers' insights and domain expertise to identify and characterize contextual exceptions. However, despite the existence of formal methods to analyze the adaptive behavior of pervasive systems, such methods lack specific support to specify the CAEH behavior. In this paper, we propose a formal model to reason about the CAEH behavior. It comprises an extension of the Kripke Structure to model the context evolution of a pervasive system and a transformation function that derivates the CAEH control flow from that proposed structure.
Having the right information at the right time is crucial to make decisions during emergency responses. To fulfill this requirement, emergency management systems must provide emergency managers with knowledge manageme...
详细信息
Having the right information at the right time is crucial to make decisions during emergency responses. To fulfill this requirement, emergency management systems must provide emergency managers with knowledge management and visualization tools. The goal is twofold: on one hand, to organize knowledge coming from different sources, mainly the emergency response plans (the formal knowledge) and the information extracted from the emergency development (the contextual knowledge);on the other hand, to enable effective access to information. Formal and contextual knowledge sets are mostly disjoint;however, there are cases in which a formal knowledge piece may be updated with some contextual information, constituting what we call the composite knowledge. In this paper, we extend a knowledge framework with the notion of composite knowledge, and use spatial hypertext to visualize this type of knowledge. We illustrate our proposal with a case study on accessing to information during an emergency response in an underground transportation system.
Context: The technical debt (TD) concept describes a tradeoff between short-term and long-term goals in software development. While it is highly useful as a metaphor, it has utility beyond the facilitation of discussi...
详细信息
ISBN:
(纸本)9781450318488
Context: The technical debt (TD) concept describes a tradeoff between short-term and long-term goals in software development. While it is highly useful as a metaphor, it has utility beyond the facilitation of discussion, to inspire a useful set of methods and tools that support the identification, measurement, monitoring, management, and payment of TD. Objective: This study focuses on the identification of TD. We evaluate human elicitation of TD and compare it to automated identification. Method: We asked a development team to identify TD items in artifacts from a software project on which they were working. We provided the participants with a TD template and a short questionnaire. In addition, we also collected the output of three tools to automatically identify TD and compared it to the results of human elicitation. Results: There is little overlap between the TD reported by different developers, so aggregation, rather than consensus, is an appropriate way to combine TD reported by multiple developers. The tools used are especially useful for identifying defect debt but cannot help in identifying many other types of debt, so involving humans in the identification process is necessary. Conclusion: We have conducted a case study that focuses on the practical identification of TD, one area that could be facilitated by tools and techniques. It contributes to the TD landscape, which depicts an understanding of relationships between different types of debt and how they are best discovered. Copyright 2013 ACM.
In the current landscape, security challenges extend to various domains, such as IoT networking, UAV communication, and VANETs, rendering underlying infrastructures increasingly susceptible to cyber-attacks. The taxon...
详细信息
ISBN:
(数字)9798350365887
ISBN:
(纸本)9798350365894
In the current landscape, security challenges extend to various domains, such as IoT networking, UAV communication, and VANETs, rendering underlying infrastructures increasingly susceptible to cyber-attacks. The taxonomies, targets, and purposes of these attacks are closely linked to the properties of the underlying infrastructures. With the elevated vulnerability risks and attacks targeting specific elements of software Defined Networking (SDN), integrating blockchain technology into networking has emerged as a potential solution. However, this convergence of SDN and blockchain introduces new security risks. This position paper overviews blockchain-enhanced SDN systems focusing on security issues and reviews existing research and arguments. Notably, there is currently no agreed-upon established taxonomy for the integrated security of SDN and blockchain. As a contribution to the literature, this paper proposes a taxonomy for classifying security approaches within SDN and blockchain deployment scenarios. This taxonomy categorizes solutions based on defense mechanisms, defense planes, blockchain deployment types, and SDN deployment types. Additionally, we discuss the open issues and challenges at the intersection of SDN and blockchain technologies from a security perspective.
With the progress of sensor technologies, there has been an increase in the number of connected computing devices capable of collecting information and interacting with the environment in which they are inserted, form...
详细信息
With the progress of sensor technologies, there has been an increase in the number of connected computing devices capable of collecting information and interacting with the environment in which they are inserted, forming the basis of the Internet of Things (IoT). Such devices enable the development of new applications capable of making cities more intelligent, providing improvements to society and urban infrastructure. As a result of the interaction between different applications, there is a large set of data, from which useful knowledge can be extracted. An important problem to be faced is the recurrent occurrence of arbovirus outbreaks in big cities with tropical climate. This research proposes an architecture capable of aggregating data from different types of IoT devices, and manipulating them using data analytics techniques to assist the surveillance of arbovirus outbreaks. As an example of case study, we present an exploratory analysis of climatology data and cases of arbovirus diseases in the city of Fortaleza, Ceara, Brazil, between the years of 2011 and 2017.
We identified and organized a number of statements about technical debt (TD Folklore list) expressed by practitioners in online websites, blogs and published papers. We chose 14 statements and we evaluated them throug...
详细信息
Blockchain is a peer-to-peer public ledger which guarantees the reliability of all the transactional record without a trusted third party. Basically, all the participants in the network create transactional record, ex...
详细信息
The use of private or consortium blockchains in organizations’ applications is growing. A relevant aspect of blockchains is the choice of consensus mechanism. This decision delimits which blockchain solutions are sui...
The use of private or consortium blockchains in organizations’ applications is growing. A relevant aspect of blockchains is the choice of consensus mechanism. This decision delimits which blockchain solutions are suitable for the private scenario. Once the consensus mechanism is chosen, more than one blockchain may be enabled. However, this decision making is not trivial and requires detailed experimental indicators about algorithms and blockchains performance. In this context, we provide a comprehensive performance analysis of the Raft consensus mechanism based on its implementation in Hyperledger Fabric and Ethereum blockchain solutions. We performed our experiments on an OpenStack private cloud using each blockchain developer’s default settings for virtual machines. Our findings show how the implementation of each solution can impact the application’s performance under certain conditions.
暂无评论