7,109 research outputs found

    Diversity in Action: Strategies With Impact

    Get PDF
    Compiles essays by foundation executives and trustees on the impact of diversity and inclusiveness efforts, strategies, and lessons learned. Offers perspectives on community outreach and leadership training, board development, staffing, and grantmaking

    Balanced Innovation Management

    Get PDF
    The Department of Defense has demonstrated success in managing innovation. The military’s approach to innovation management extends beyond traditional distinctions between internal and external innovation modes. Summarizing specific innovation strategies available to managers develops recognition of this growing reality. The article concludes with resulting lessons that can be more widely adopted by managers

    Paradigms of Intelligent Systems

    Get PDF
    This paper approaches the subject of paradigms for the categories of intelligent systems. First we can look at the term paradigm in its scientific meaning and then we make acquaintance with the main categories of intelligent systems (expert systems, intelligent systems based on genetic algorithms, artificial neuronal systems, fuzzy systems, hybrid intelligent systems). We will see that every system has one or more paradigms, but hybrid intelligent systems combine paradigms because they are made of different technologies. This research has been made under the guidance of Dr. Ioan AND ONE, Professor and Director of Research Laboratory.paradigm, intelligent systems, expert systems, genetic algorithms, fuzzy systems, artificial neuronal networks, hybrid intelligent systems

    From Temporal Models to Property-Based Testing

    Full text link
    This paper presents a framework to apply property-based testing (PBT) on top of temporal formal models. The aim of this work is to help software engineers to understand temporal models that are presented formally and to make use of the advantages of formal methods: the core time-based constructs of a formal method are schematically translated to the BeSpaceD extension of the Scala programming language. This allows us to have an executable Scala code that corresponds to the formal model, as well as to perform PBT of the models functionality. To model temporal properties of the systems, in the current work we focus on two formal languages, TLA+ and FocusST.Comment: Preprint. Accepted to the 12th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2017). Final version published by SCITEPRESS, http://www.scitepress.or

    Mobile Museum Guides Applications based on Knowledge Graphs

    Get PDF
    In the paper, we discuss our experience in design and development of a content consumption focused mobile applications with data sources in the form of Linked Data by the example of developing museum guide application for The State Russian Museum. We describe our approach to formalizing a model in a dynamictyped programming language (JavaScript) and the way to keep it consistent. The paper contains the description of the system’s main component: a framework for generating a model from an ontology. Ontology-based application architecture can facilitate Domain Driven Design approach, and we demonstrate the ways how to combine these techniques in practice. Lastly, we discuss challenges and problems we faced during the development, then present our conclusions and future direction for exploration

    Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions

    Full text link
    As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly: network computations cannot be controlled, but they can be steered by local constraints on network nodes. The tasks of "programming" global behaviors through local constraints belong to the area of security. The "program particles" that assure that a system of local interactions leads towards some desired global goals are called security protocols. As computation spreads beyond cyberspace, into physical and social spaces, new security tasks and problems arise. As networks are extended by physical sensors and controllers, including the humans, and interlaced with social networks, the engineering concepts and techniques of computer security blend with the social processes of security. These new connectors for computational and social software require a new "discipline of programming" of global behaviors through local constraints. Since the new discipline seems to be emerging from a combination of established models of security protocols with older methods of procedural programming, we use the name procedures for these new connectors, that generalize protocols. In the present paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks. On the way, we survey the guiding ideas of Protocol Derivation Logic (also PDL) that evolved through our work in security in last 10 years. Both formalisms are geared towards graphic reasoning and tool support. We illustrate their workings by analysing a popular form of two-factor authentication, and a multi-channel device pairing procedure, devised for this occasion.Comment: 32 pages, 12 figures, 3 tables; journal submission; extended references, added discussio

    A Study on Formal Verification for JavaScript Software

    Get PDF
    Information security is still a major problem for users of websites and hybrid mobile applications. While many apps and websites come with terms of service agreements between the developer and end user, there is no rigorous mechanism in place to ensure that these agreements are being followed. Formal methods can offer greater confidence that these policies are being followed, but there is currently no widely adopted tool that makes formal methods available for average consumers. After studying the current state-of-the-art in JavaScript policy enforcement and verification, this research proposes several new techniques for applying model checking to JavaScript that strikes a balance of low runtime overhead and fine-grained policy enforcement that other techniques do not achieve
    corecore