The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Driven by market trends towards highly-personalised products, the manufacturing industry is facing a variety of challenges that require systems to be adaptive, robust, resilient, and responsive. Collective adaptive systems have the potential to provide solutions to a wide variety of these problems. This paper has two main aims: to highlight shared problems between industry and the collective adaptive...
In this paper we explore the combination of novel spatio-temporal model-checking techniques, and of a recently developed model-based approach to the study of bike sharing systems, in order to detect, visualize and investigate potential problems with bike sharing system configurations. In particular the formation and dynamics of clusters of full stations is explored. Such clusters are likely to be...
We describe and demonstrate a fully distributed algorithm that enables prioritized TCP flows to allocate network resources (bandwidth) among themselves. The algorithm does not require any explicit communication among the different TCP flows. It enables autonomous adaptation to loss of network resources due to cyber attack or failure, while ensuring that users receive prioritized utility from available...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Since the start of the 21st century, computer networks have been through an exponential growth in terms of the network capacity, the number of the users and the type of tasks that are performed over the network. With the resent boom of mobile devices (e.g., Tablet computers, smart phones, smart devices, and wearable computing), the number of network users is bound to increase exponentially. But, most...
Multi-Agent Collaboration (MAC) is a means by which agents solve complex real-world problems. It encompasses agents' coordination, negotiation and cooperation towards their shared goal. A distributed collaboration community consisting of heterogeneous agents in ever-changing environments faces varying degrees of collaborators' goals and/or polices conflicts. Therefore, the focus of my research is...
An interrelation between a topological design of network and efficient algorithm on it is important for communication or transportation systems. In this paper, we propose a design principle for a reliable routing in a store-carry-forward manner based on autonomously moving message-ferries on a special structure of fractal-like network, which consists of a self-similar tiling of equilateral triangles...
Modern software systems are often compositions of entities that increasingly use self-adaptive capabilities to improve their behavior to achieve systemic quality goals. Self adaptive managers for each component system attempt to provide locally optimal results, but if they cooperated and potentially coordinated their efforts it might be possible to obtain more globally optimal results. The emergent...
The characteristics of self-organizing, adaptive systems (SOAS) lead to a significantly higher flexibility and robustness against an ever-changing environment. This flexibility makes it hard to test these systems adequately, which is, however, inevitable in order to assure their quality. The PhD thesis faces the following key challenges for testing SOAS: state space explosion, interleaved feedback...
The complexity of software systems has raised many challenges in the way they will be installed, configured, deployed and merged in the near future. The vision of a self-protecting system with the capability of defending itself as a whole as well as planning how to mitigate the attack given different scenarios and requirements is one of the most promising research directions to solve these challenges...
Self-adaptive software systems (SASS) are equipped with feedback loops to adapt autonomously to changes of the software or environment. In established fields, such as embedded software, sophisticated approaches have been developed to systematically study feedback loops early during the development. In order to cover the particularities of feedback, techniques like one-way and in-the-loop simulation...
We propose secure multi-party computation techniques for the distributed computation of the average using a privacy-preserving extension of gossip algorithms. While recently there has been mainly research on the side of gossip algorithms (GA) for data aggregation itself, to the best of our knowledge, the aforementioned research line does not take into consideration the privacy of the entities involved...
Recently, two different techniques emerged that are tailored to environments pervaded of computational devices. On the one hand, aggregate programming, and especially computational fields-based programming, is a promising abstraction for coordinating the activities of multiple situated devices. On the other hand, augmented reality is emerging as new means of interaction with both software and physical...
The assessment of emergent global behaviors of self-organizing applications is an important task to accomplish before employing such systems in real scenarios, yet their intrinsic complexity make this activity still challenging. In this paper we present a logic language used to verify graph-based global properties of self-organizing systems at run-time. The logic language extends a chemical-based...
The topology of networks typically remains static over long periods of time, giving attackers the advantage of long planning cycles to develop, test, and refine targeted attacks. The CINDAM design preempts the attacker by creating ephemeral, per-host views of the protected enclave to transform the constant topology of computing networks into deceptive, mutable, and individualized ones that are able...
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest...
Systems of "building block" algorithms can guarantee that self-organizing systems eventually converge to a predictable state, but what of their dynamical behavior in environments with ongoing changes? To begin to address this challenge, we analyze a commonly used distributed distance estimation algorithm from a stability theory perspective, identifying key properties of monotonicity and...
BINSURGEON is a binary rewriting system that enhances stripped binary executables with repairs, defenses, and additional functionality. This involves making space-consuming changes to the program's control flow graph (CFG), recomputing instruction content, and relocating instructions, all while preserving functionality in the remainder of the program's control flow. BINSURGEON uses extendable rewrite...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.