Search results for " Software"

showing 10 items of 1178 documents

Tolerating malicious monitors in detecting misbehaving robots

2008

This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.

0209 industrial biotechnologybusiness.industryComputer scienceDistributed computing020206 networking & telecommunicationsContext (language use)security02 engineering and technologyMotion (physics)consensus algorithm020901 industrial engineering & automationSettore ING-INF/04 - AutomaticaWork (electrical)Embedded system0202 electrical engineering electronic engineering information engineeringRobotDistributed software architectureIntrusion detectionmulti-agent systemsSoftware architecturebusiness
researchProduct

Exploring Virtual Reality as an Integrated Development Environment for Cyber-Physical Systems

2019

Cyber Physical Systems (CPS) development approaches tend to start from the physical (hardware) perspective, and the software is the final element in the process. However, this approach is unfit for the more software-intensive world that is increasingly iterative, connected, and constantly online. Many constraints prevent the application of iterative, incremental, and agile development methodologies, which now are the norm for many other fields of software. Time-consuming system validation can only start when both hardware and software components are ready, which implies that the software delivery and quality is almost always the final bottleneck in the CPS development and integration. Also …

0209 industrial biotechnologybusiness.industryComputer scienceProcess (engineering)Integrated softwareeducationCyber-physical system020207 software engineering02 engineering and technologyVirtualizationcomputer.software_genre113 Computer and information sciencesBottleneck020901 industrial engineering & automationSoftwareComponent-based software engineering0202 electrical engineering electronic engineering information engineeringbusinessSoftware engineeringcomputerAgile software development
researchProduct

DESDEO: The Modular and Open Source Framework for Interactive Multiobjective Optimization

2021

Interactive multiobjective optimization methods incorporate preferences from a human decision maker in the optimization process iteratively. This allows the decision maker to focus on a subset of solutions, learn about the underlying trade-offs among the conflicting objective functions in the problem and adjust preferences during the solution process. Incorporating preference information allows computing only solutions that are interesting to the decision maker, decreasing computation time significantly. Thus, interactive methods have many strengths making them viable for various applications. However, there is a lack of existing software frameworks to apply and experiment with interactive …

0209 industrial biotechnologylineaarinen optimointiPareto optimizationGeneral Computer Sciencemulti-criteria decision makingComputer sciencepäätöksentekoevoluutiolaskenta02 engineering and technologyData-driven multiobjective optimizationcomputer.software_genrenonlinear optimizationMulti-objective optimizationData modelingopen source softwareavoin lähdekoodi020901 industrial engineering & automationSoftwareoptimointi0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageGraphical user interfacepareto-tehokkuusbusiness.industryGeneral Engineeringinteractive methodsModular designPython (programming language)monitavoiteoptimointiTK1-9971Software frameworkdata-driven multiobjective optimizationevolutionary computation020201 artificial intelligence & image processingElectrical engineering. Electronics. Nuclear engineeringbusinessSoftware engineeringcomputerIEEE Access
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

Towards a Security Competence of Software Developers

2020

Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…

021110 strategic defence & security studiesohjelmistokehittäjätKnowledge managementbusiness.industryComputer scienceohjelmistotuotanto0211 other engineering and technologies020207 software engineering02 engineering and technologySoftwarekompetenssi0202 electrical engineering electronic engineering information engineeringammattitaitotietoturvaohjelmistokehitysbusinessCompetence (human resources)
researchProduct

Finding Software Bugs in Embedded Devices

2021

AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…

021110 strategic defence & security studiessulautettu tietotekniikkaComputer sciencebusiness.industryembedded devices0211 other engineering and technologies020207 software engineering02 engineering and technologysecurityField (computer science)Domain (software engineering)Embedded softwareSoftwareSoftware bugohjelmointivirheetSoftware deploymentEmbedded systemsoftware bugs0202 electrical engineering electronic engineering information engineeringtietoturvabusinessInternet of ThingsGeneral purpose software
researchProduct

Virtual and Augmented Reality Mirrors for Mental Health Treatment

2020

Virtual and Augmented Reality are technologies widely used in a variety of areas, including the medical sector. On the other hand, regular mirrors have been traditionally used as tools to aid in mental health treatment for a variety of diseases and disorders. Although it is possible to build Virtual and Augmented Reality experiences based on mirror metaphors, there are very few contributions of this kind in the medical sector. In this chapter, the great benefits that regular mirrors have brought for mental health treatment are addressed. In addition, a review on the state of the art in mirror-based Virtual and Augmented Reality applications is given, highlighting the potential benefits that…

03 medical and health sciences0302 clinical medicineApplied psychology0202 electrical engineering electronic engineering information engineering020207 software engineeringAugmented reality02 engineering and technologyPsychologyMental health treatment030217 neurology & neurosurgery
researchProduct

Dry selection and wet evaluation for the rational discovery of new anthelmintics

2017

Helminths infections remain a major problem in medical and public health. In this report, atom-based 2D bilinear indices, a TOMOCOMD-CARDD (QuBiLs-MAS module) molecular descriptor family and linear discriminant analysis (LDA) were used to find models that differentiate among anthelmintic and non-anthelmintic compounds. Two classification models obtained by using non-stochastic and stochastic 2D bilinear indices, classified correctly 86.64% and 84.66%, respectively, in the training set. Equation 1(2) correctly classified 141(135) out of 165 [85.45%(81.82%)] compounds in external validation set. Another LDA models were performed in order to get the most likely mechanism of action of anthelmin…

0301 basic medicineBiophysicsNon-stochastic and stochastic atom-based bilinear indicesBilinear interpolationLDA-based QSAR modelQuBiLs-MAS module01 natural sciencesSet (abstract data type)03 medical and health sciencesMolecular descriptorStatisticsPhysical and Theoretical ChemistryMolecular BiologySelection (genetic algorithm)MathematicsFree and open source softwareTraining setTOMOCOMD-CARDD softwareExternal validationAnthelmintic activityAtom (order theory)Computational creeningCondensed Matter PhysicsLinear discriminant analysis0104 chemical sciencesIndazole010404 medicinal & biomolecular chemistry030104 developmental biologyLead generationMolecular Physics
researchProduct

Cohesive Model for the Simulation of Crack Initiation and Propagation in Mixed-Mode I/II in Composite Materials

2019

A cohesive element able to connect and simulate crack growth between independently modeled finite element subdomains with non-matching meshes is proposed and validated. The approach is based on penalty constraints and has several advantages over conventional FE techniques in disconnecting two regions of a model during crack growth. The most important is the ability to release portion of the interface that are smaller than the local finite element length. Thus, the growth of delamination is not limited to advancing by releasing nodes of the FE model, which is a limitation common to the methods found in the literature. Furthermore, it is possible to vary the penalty parameter within the cohes…

0301 basic medicineCommercial softwareCohesive elementMaterials science030102 biochemistry & molecular biologyInterface (computing)Delamination02 engineering and technologyFinite element . Cohesive element . Penalty method . Composite materials . Delamination . Mixed-mode propagation021001 nanoscience & nanotechnologyMixed modeFinite element method03 medical and health sciencesSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineCeramics and CompositesPenalty methodPolygon meshComposite material0210 nano-technology
researchProduct