Search results for "computer.software_genre"
showing 10 items of 3858 documents
An Expert System for the Design of Agents
2007
The growing interest for the design and development of multi-agent systems has brought to the creation of a specific research area called Agent-Oriented Software Engineering (AOSE), specifically conceived for the development of complex systems. The development of such systems needs the support of appropriate tools that could help the designer in producing the design artefacts. We developed a tool called Metameth that may be used to define a new (agent-oriented) design process as well as to apply it. In this paper, we describe only a slice of this complex tool, specifically addressing the interaction with human actors (the designers). This subsystem is conceived as a collaborative multi-agen…
State Model of Service Reliability
2006
We propose a simple formalism for modelling of a service reliability. A service is defined as an ordered set of states of a modelled application. In the model, a certain reliability is assigned to each application state. Reliability of a service is expressed in terms of above partial reliabilities.
Panel Discussion: Systems for Data Analysis What they AEE; what they Could be?
1985
CRANE: I’d like to pose a couple of questions: (1) Command Languages — A tool for the astronomer or for the programmer? (2) Portability — Holy Cow or Red Herring? I propose that we start with the first one and see how far we get. If we don’t get past that, fine. If we get on to the question of portability, this is also fine. Let me just open up the discussion by asking Rudi Albrecht to make a comment.
Tuning Java to Run Interactive Multiagent Simulations over Jason
2010
Java-based simulation environments are currently used by many multiagent systems (MAS), since they mainly provide portability as well as an interesting reduction of the development cost. However, this kind of MAS are rarely considered when developing interactive applications with time response constraints. This paper analyses the performance provided by Jason, a well-known Java-based MAS platform, as a suitable framework for developing interactive multiagent simulations. We show how to tune both the heap size and the garbage collection of the Java Virtual Machine in order to achieve a good performance while executing a simple locomotion benchmark based on crowd simulations. Furthermore, the…
Graph grammar engineering: A software specification method
1987
Graphs as conceptual data models are accepted and used in a wide range of different problem areas. Giving some examples we outline common aspects for modeling complex structures by graphs. We present a formal frame-work based on graph grammars to specify graph classes and the corresponding graph manipulations. We show that such a specification can be written in a systematic, engineering-like manner. This is achieved by an extension of the known programmed, attributed graph grammars. Node-set operators are introduced to facilitate graph queries. Concepts like abstraction, decomposition, refinement, parameterization, and integration have been adopted from software engineering to yield a compr…
New Trends in Databases and Information Systems: Contributions from ADBIS 2017 Workshops
2017
In the last few years, research on database and information system technologies has been rapidly evolving thanks to the new paradigms of software and hardware adopted by modern scientific and more invasive applications. A huge and heterogeneous amount of data should be efficiently stored, managed, and analyzed exploiting proper technologies for such novel and more interesting data-driven applications. New and cutting-edge research challenges arise that have been attracting great attention from both academia and industry. The 21st European Conference on Advances in Databases and Information Systems (ADBIS 2017), held on September 24–27, 2017 in Nicosia, Cyprus includes four thematic workshop…
Learning temporal patterns for anomaly intrusion detection
2002
For the last decade an explosive spread of computer systems and computer networks has resulted in a society that is increasingly dependent on information stored on these systems. A computer system connected to the network is accessible from another computer in this network regardless of its geographical position. Along with providing many benefits for legitimate users this technology creates almost unlimited opportunities for malicious persons, which using software vulnerabilities may successfully penetrate the networked computer systems. In order to eliminate potential devastating consequences caused by breaches in computer systems, more and more attention is drawn to the information secur…
Honeypot Utilization for Network Intrusion Detection
2018
For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…
Mobile Security with Location-Aware Role-Based Access Control
2012
Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…