4,515 research outputs found
Questions related to Bitcoin and other Informational Money
A collection of questions about Bitcoin and its hypothetical relatives
Bitguilder and Bitpenny is formulated. These questions concern technical issues
about protocols, security issues, issues about the formalizations of
informational monies in various contexts, and issues about forms of use and
misuse. Some questions are formulated in the more general setting of
informational monies and near-monies.
We also formulate questions about legal, psychological, and ethical aspects
of informational money. Finally we formulate a number of questions concerning
the economical merits of and outlooks for Bitcoin.Comment: 31 pages. In v2 the section on patterns for use and misuse has been
improved and expanded with so-called contaminations. Other small improvements
were made and 13 additional references have been include
OperA/ALIVE/OperettA
Comprehensive models for organizations must, on the one hand, be able to specify global goals and requirements but, on the other hand, cannot assume that particular actors will always act according to the needs and expectations of the system design. Concepts as organizational rules (Zambonelli 2002), norms and institutions (Dignum and Dignum 2001; Esteva et al. 2002), and social structures (Parunak and Odell 2002) arise from the idea that the effective engineering of organizations needs high-level, actor-independent concepts and abstractions that explicitly define the organization in which agents live (Zambonelli 2002).Peer ReviewedPostprint (author's final draft
Recommended from our members
Computerization of workflows, guidelines and care pathways: a review of implementation challenges for process-oriented health information systems
There is a need to integrate the various theoretical frameworks and formalisms for modeling clinical guidelines, workflows, and pathways, in order to move beyond providing support for individual clinical decisions and toward the provision of process-oriented, patient-centered, health information systems (HIS). In this review, we analyze the challenges in developing process-oriented HIS that formally model guidelines, workflows, and care pathways. A qualitative meta-synthesis was performed on studies published in English between 1995 and 2010 that addressed the modeling process and reported the exposition of a new methodology, model, system implementation, or system architecture. Thematic analysis, principal component analysis (PCA) and data visualisation techniques were used to identify and cluster the underlying implementation ‘challenge’ themes. One hundred and eight relevant studies were selected for review. Twenty-five underlying ‘challenge’ themes were identified. These were clustered into 10 distinct groups, from which a conceptual model of the implementation process was developed. We found that the development of systems supporting individual clinical decisions is evolving toward the implementation of adaptable care pathways on the semantic web, incorporating formal, clinical, and organizational ontologies, and the use of workflow management systems. These architectures now need to be implemented and evaluated on a wider scale within clinical settings
An approach to control collaborative processes in PLM systems
Companies that collaborate within the product development processes need to
implement an effective management of their collaborative activities. Despite
the implementation of a PLM system, the collaborative activities are not
efficient as it might be expected. This paper presents an analysis of the
problems related to the collaborative work using a PLM system. From this
analysis, we propose an approach for improving collaborative processes within a
PLM system, based on monitoring indicators. This approach leads to identify and
therefore to mitigate the brakes of the collaborative work
Results of multi-agent system and ontology to manage ideas and represent knowledge in a challenge of creativity
This article is about an intelligent system to support ideas management as a
result of a multi-agent system used in a distributed system with heterogeneous
information as ideas and knowledge, after the results about an ontology to
describe the meaning of these ideas. The intelligent system assists
participants of the creativity workshop to manage their ideas and consequently
proposing an ontology dedicated to ideas. During the creative workshop many
creative activities and collaborative creative methods are used by roles
immersed in this creativity workshop event where they share knowledge. The
collaboration of these roles is physically distant, their interactions might be
synchrony or asynchrony, and the information of the ideas are heterogeneous, so
we can say that the process is distributed. Those ideas are writing in natural
language by participants which have a role and the ideas are heterogeneous
since some of them are described by schema, text or scenario of use. This paper
presents first, our MAS and second our Ontology design
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)
Web applications require access to the file-system for many different tasks.
When analyzing the security of a web application, secu- rity analysts should
thus consider the impact that file-system operations have on the security of
the whole application. Moreover, the analysis should take into consideration
how file-system vulnerabilities might in- teract with other vulnerabilities
leading an attacker to breach into the web application. In this paper, we first
propose a classification of file- system vulnerabilities, and then, based on
this classification, we present a formal approach that allows one to exploit
file-system vulnerabilities. We give a formal representation of web
applications, databases and file- systems, and show how to reason about
file-system vulnerabilities. We also show how to combine file-system
vulnerabilities and SQL-Injection vulnerabilities for the identification of
complex, multi-stage attacks. We have developed an automatic tool that
implements our approach and we show its efficiency by discussing several
real-world case studies, which are witness to the fact that our tool can
generate, and exploit, complex attacks that, to the best of our knowledge, no
other state-of-the-art-tool for the security of web applications can find
A process model for the design of multi-agent systems
In this paper, we propose a pragmatic process model for the development of multi-agent system based on the combination of standard software engineering techniques with a special focus on multi-agent systems. The resulting process model is the attempt to make our experience in the design of multi-agent systems available to other system designers. The approach presented in this paper has evolved over several years and it has been successfully applied and refined in different types of multi-agent systems. A short case study of our latest project is included in the paper
A theory and model for the evolution of software services
Software services are subject to constant change and variation. To control service development, a service developer needs to know why a change was made, what are its implications and whether the change is complete. Typically, service clients do not perceive the upgraded service immediately. As a consequence, service-based applications may fail on the service client side due to changes carried out during a provider service upgrade. In order to manage changes in a meaningful and effective manner service clients must therefore be considered when service changes are introduced at the service provider's side. Otherwise such changes will most certainly result in severe application disruption. Eliminating spurious results and inconsistencies that may occur due to uncontrolled changes is therefore a necessary condition for the ability of services to evolve gracefully, ensure service stability, and handle variability in their behavior. Towards this goal, this work presents a model and a theoretical framework for the compatible evolution of services based on well-founded theories and techniques from a number of disparate fields.
- …