Search results for "computer.software_genre"

showing 10 items of 3858 documents

Children’s Interactions Within a Virtual Reality Environment for Learning Chemistry

2017

This paper presents a virtual reality based solution for learning. Multimodal interactions are proposed to support students’ engagement through active experimentation and reflective observation. Students tasks are provided within an immersive virtual outdoor environment created using a human-centred design approach. Junior high school teachers and students between ages 14 and 16 were involved in design and test activities. Observations, video recordings, and interviews were used in data collection. Three interaction modalities were provided and tested: visual, auditory and kinesthetic/tangible interactions. The students involved in user testing showed great interest to learn in such an envi…

ModalitiesMultimediaComputer scienceKinesthetic learningVirtual realitycomputer.software_genreExperiential learningScience educationTest (assessment)Resource (project management)Human–computer interactionComputingMilieux_COMPUTERSANDEDUCATIONcomputerInstructional simulation
researchProduct

Using Internet videos to learn about controversies: Evaluation and integration of multiple and multimodal documents by primary school students

2020

Abstract In many Internet videos authors appear in front of the camera to present their particular view on a topic. Given the high consumption rate of Internet videos by teenagers, we explored the pros and cons of using these videos to learn about complex topics, compared to learning from textual web pages. Specifically, we studied how 207 primary school students (grades 4–6) evaluated and integrated multiple and multimodal web pages (text or video) while learning about the pros and cons of bottled water. Results showed no major role of modality in students' source memory, as measured by citations in their responses to an integration question and their memory for sources. Nevertheless, moda…

Modality (human–computer interaction)General Computer ScienceMultimediabusiness.industryInternet videos05 social sciences050301 educationprimary school educationmultiple document comprehensionmultimodal informationcomputer.software_genre050105 experimental psychologyEducationWeb pageshallowing hypothesis0501 psychology and cognitive sciencesThe InternetDigital readingbusinessPsychology0503 educationcomputerPeriod (music)Computers & Education
researchProduct

LynxNet: Wild Animal Monitoring Using Sensor Networks

2010

Monitoring wild animals, especially those that are becoming endangered (for example, lynxes and wolves) is important for biology researchers. Solutions for the monitoring already exist; however, they all have drawbacks, such as limited range or lifetime, sensing modality, reporting delays, unreliability of operation. In this work we describe our experiences in designing an improved animal monitoring sensor system and low-level software for sensor node control and communication. The target animals for this particular research are wild lynxes or canines, however it can be extended to other animal species. The LynxNet system is based on tracking collars, built around TMote Mini sensor nodes, s…

Modality (human–computer interaction)business.industryReal-time computingComputer securitycomputer.software_genreAnimal monitoringGeneralLiterature_MISCELLANEOUSKey distribution in wireless sensor networksBase stationSensor nodeGlobal Positioning SystemMobile wireless sensor networkbusinesscomputerWireless sensor network
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

Building a new CTL model checker using Web services

2013

This Computation Tree Logic (CTL) is widely used to capture compositions of reactive systems. Model checking is particularly well-suited for the automated verification of finite-state systems, both for software and for hardware. A CTL model checker tool allows designers to automatically verify that systems satisfy specifications expressed in the language of CTL logic. In this paper we present a new CTL model checker implemented in client-server paradigm. CTL Designer, the client tool, allows an interactive construction of the CTL models as state-transition graphs. Java and C# APIs are provided for programmatic construction of large models. The server part of our tool embeds the core of the …

Model checkingComputation tree logicbusiness.industryComputer scienceProgramming languagecomputer.software_genreCTL*TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESSoftwareTheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSScalabilityWeb servicebusinessFormal verificationcomputerReactive system2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013)
researchProduct

Verification of JADE Agents Using ATL Model Checking

2015

It is widely accepted that the key to successfully developing a system is to produce a thorough system specification and design. This task requires an appropriate formal method and a suitable tool to determine whether or not an implementation conforms to the specifications. In this paper we present an advanced technique to analyse, design and debug JADE software agents, using Alternating-time Temporal Logic (ATL) which is interpreted over concurrent game structures, considered as natural models for compositions of open systems. In development of the proposed solution, we will use our original ATL model checker. In contrast to previous approaches, our tool permits an interactive or programma…

Model checkingComputer Networks and Communicationsbusiness.industryComputer scienceProgramming languagemedia_common.quotation_subjectJADE (programming language)System requirements specificationFormal methodscomputer.software_genreComputer Science ApplicationsComputational Theory and MathematicsDebuggingSoftware agentEmbedded systemTemporal logicWeb servicebusinesscomputermedia_commoncomputer.programming_languageInternational Journal of Computers Communications & Control
researchProduct

Domain specific language for securities settlement systems

2012

Actual problems during design, implementation and maintenance of securities settlement systems software are achieving complementarity of several different, connected, asynchronously communicating settlement systems and verification of this complementarity. The aim of this paper is to create domain specific language for modeling of settlement systems and their interactions. Then use models to calculate settlement systems behavior. Specific of settlement systems requires that they perform accordingly to business rules in any situation. This makes use of model checking a very desirable step in development process of settlement systems. Defining a domain specific language and creating editor su…

Model checkingDomain-specific languageBusiness rulebusiness.industryComputer scienceBasis path testingComputingMilieux_LEGALASPECTSOFCOMPUTINGcomputer.software_genreComplementarity (physics)SoftwareTest caseData miningSoftware engineeringbusinessFormal verificationcomputer2012 Second International Conference on Digital Information Processing and Communications (ICDIPC)
researchProduct

ATL model checking in the cloud

2015

This paper gives an overview of our recent work on implementing a new interactive ATL model checker for verification of open systems. In verification based on model checking, we need to provide a model of the system and also write down the properties (ATL formulas) that we require the system to satisfy. Traditionally, the semantics of ATL is given in terms of concurrent game structures. In contrast to previous approaches, our tool permits an interactive design of the ATL models as state-transition graphs, and is based on client/server architecture. The server part, published as Web service in OpenShift cloud platform, embeds the core of the ATL model checker, and the client provides an intu…

Model checkingSQLProgramming languagebusiness.industrySemantics (computer science)Computer scienceInteractive designCloud computingcomputer.software_genreTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESOperating systemAlgorithm designWeb servicebusinesscomputercomputer.programming_languageGraphical user interface2015 Internet Technologies and Applications (ITA)
researchProduct

Implementing an ATL model checker tool using relational algebra concepts

2014

Alternating-Time Temporal Logic (ATL) is a branching-time temporal logic that naturally describes computations of open systems. An open system interacts with its environment and its behavior depends on the state of the system as well as the behavior of the environment. ATL model-checking is a well-established technique for verifying that a formal model representing such a system satisfies a given property. In this paper we describe a new interactive model checker environment based on algebraic approach. Our tool is implemented in client-server paradigm. The client part allows an interactive construction of ATL models represented by concurrent game structures as directed multi-graphs. The se…

Model checkingSQLTheoretical computer scienceProgramming languageComputer sciencecomputer.internet_protocolRelational algebracomputer.software_genreOpen system (systems theory)Temporal logicWeb servicecomputerServer-sideXMLcomputer.programming_language2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
researchProduct

Survey of Formal Verification Methods for Smart Contracts on Blockchain

2019

Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…

Model checkingSmart contractExploitComputer science020206 networking & telecommunications02 engineering and technologyFormal methodsComputer securitycomputer.software_genreSyntax (logic)Automated theorem provingOrder (business)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingFormal verificationcomputer2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct