7,109 research outputs found
Diversity in Action: Strategies With Impact
Compiles essays by foundation executives and trustees on the impact of diversity and inclusiveness efforts, strategies, and lessons learned. Offers perspectives on community outreach and leadership training, board development, staffing, and grantmaking
Balanced Innovation Management
The Department of Defense has demonstrated success in managing innovation. The military’s approach to innovation management extends beyond traditional distinctions between internal and external innovation modes. Summarizing specific innovation strategies available to managers develops recognition of this growing reality. The article concludes with resulting lessons that can be more widely adopted by managers
Paradigms of Intelligent Systems
This paper approaches the subject of paradigms for the categories of intelligent systems. First we can look at the term paradigm in its scientific meaning and then we make acquaintance with the main categories of intelligent systems (expert systems, intelligent systems based on genetic algorithms, artificial neuronal systems, fuzzy systems, hybrid intelligent systems). We will see that every system has one or more paradigms, but hybrid intelligent systems combine paradigms because they are made of different technologies. This research has been made under the guidance of Dr. Ioan AND ONE, Professor and Director of Research Laboratory.paradigm, intelligent systems, expert systems, genetic algorithms, fuzzy systems, artificial neuronal networks, hybrid intelligent systems
From Temporal Models to Property-Based Testing
This paper presents a framework to apply property-based testing (PBT) on top
of temporal formal models. The aim of this work is to help software engineers
to understand temporal models that are presented formally and to make use of
the advantages of formal methods: the core time-based constructs of a formal
method are schematically translated to the BeSpaceD extension of the Scala
programming language. This allows us to have an executable Scala code that
corresponds to the formal model, as well as to perform PBT of the models
functionality. To model temporal properties of the systems, in the current work
we focus on two formal languages, TLA+ and FocusST.Comment: Preprint. Accepted to the 12th International Conference on Evaluation
of Novel Approaches to Software Engineering (ENASE 2017). Final version
published by SCITEPRESS, http://www.scitepress.or
Mobile Museum Guides Applications based on Knowledge Graphs
In the paper, we discuss our experience in design and development of a content consumption focused mobile
applications with data sources in the form of Linked Data by the example of developing museum guide
application for The State Russian Museum. We describe our approach to formalizing a model in a dynamictyped
programming language (JavaScript) and the way to keep it consistent. The paper contains the
description of the system’s main component: a framework for generating a model from an ontology.
Ontology-based application architecture can facilitate Domain Driven Design approach, and we demonstrate
the ways how to combine these techniques in practice. Lastly, we discuss challenges and problems we faced
during the development, then present our conclusions and future direction for exploration
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
As computation spreads from computers to networks of computers, and migrates
into cyberspace, it ceases to be globally programmable, but it remains
programmable indirectly: network computations cannot be controlled, but they
can be steered by local constraints on network nodes. The tasks of
"programming" global behaviors through local constraints belong to the area of
security. The "program particles" that assure that a system of local
interactions leads towards some desired global goals are called security
protocols. As computation spreads beyond cyberspace, into physical and social
spaces, new security tasks and problems arise. As networks are extended by
physical sensors and controllers, including the humans, and interlaced with
social networks, the engineering concepts and techniques of computer security
blend with the social processes of security. These new connectors for
computational and social software require a new "discipline of programming" of
global behaviors through local constraints. Since the new discipline seems to
be emerging from a combination of established models of security protocols with
older methods of procedural programming, we use the name procedures for these
new connectors, that generalize protocols. In the present paper we propose
actor-networks as a formal model of computation in heterogenous networks of
computers, humans and their devices; and we introduce Procedure Derivation
Logic (PDL) as a framework for reasoning about security in actor-networks. On
the way, we survey the guiding ideas of Protocol Derivation Logic (also PDL)
that evolved through our work in security in last 10 years. Both formalisms are
geared towards graphic reasoning and tool support. We illustrate their workings
by analysing a popular form of two-factor authentication, and a multi-channel
device pairing procedure, devised for this occasion.Comment: 32 pages, 12 figures, 3 tables; journal submission; extended
references, added discussio
A Study on Formal Verification for JavaScript Software
Information security is still a major problem for users of websites and hybrid mobile applications. While many apps and websites come with terms of service agreements between the developer and end user, there is no rigorous mechanism in place to ensure that these agreements are being followed. Formal methods can offer greater confidence that these policies are being followed, but there is currently no widely adopted tool that makes formal methods available for average consumers. After studying the current state-of-the-art in JavaScript policy enforcement and verification, this research proposes several new techniques for applying model checking to JavaScript that strikes a balance of low runtime overhead and fine-grained policy enforcement that other techniques do not achieve
- …