33,103 research outputs found
Augmenting Agent Platforms to Facilitate Conversation Reasoning
Within Multi Agent Systems, communication by means of Agent Communication
Languages (ACLs) has a key role to play in the co-operation, co-ordination and
knowledge-sharing between agents. Despite this, complex reasoning about agent
messaging, and specifically about conversations between agents, tends not to
have widespread support amongst general-purpose agent programming languages.
ACRE (Agent Communication Reasoning Engine) aims to complement the existing
logical reasoning capabilities of agent programming languages with the
capability of reasoning about complex interaction protocols in order to
facilitate conversations between agents. This paper outlines the aims of the
ACRE project and gives details of the functioning of a prototype implementation
within the Agent Factory multi agent framework
Dwarna : a blockchain solution for dynamic consent in biobanking
Dynamic consent aims to empower research partners and facilitate active participation in the research process. Used within
the context of biobanking, it gives individuals access to information and control to determine how and where their
biospecimens and data should be used. We present Dwarnaâa web portal for âdynamic consentâ that acts as a hub
connecting the different stakeholders of the Malta Biobank: biobank managers, researchers, research partners, and the
general public. The portal stores research partnersâ consent in a blockchain to create an immutable audit trail of research
partnersâ consent changes. Dwarnaâs structure also presents a solution to the European Unionâs General Data Protection
Regulationâs right to erasureâa right that is seemingly incompatible with the blockchain model. Dwarnaâs transparent
structure increases trustworthiness in the biobanking process by giving research partners more control over which research
studies they participate in, by facilitating the withdrawal of consent and by making it possible to request that the biospecimen
and associated data are destroyed.peer-reviewe
When Is Fear for One\u27s Life Race-Gendered? An Intersectional Analysis of the Bureau of Immigration Appeals\u27s \u3ci\u3eIn re A-R-C-G-\u3c/i\u3e Decision
In August 2014, the U.S. Board of Immigration Appeals (BIA) handed down a breakthrough decision, In re A-R-C-G-, permitting courts to consider domestic violence as a gendered form of persecution in a home country and thus grounds for asylum in the United States. Along with two other 2014 decisions, In re W-G-R- and In re M-E-V-G-, this case represented a marked shift from prior BIA decisions, which for fifteen years had interpreted sections 208(a) and 241(b)(3) of the Immigration and Naturalization Act more narrowly, thus excluding claims of home country abuse as reasonable grounds to grant asylum. Specifically, in A-R-C-G-, the BIA found that Guatemalan women fleeing domestic violence can be considered a âparticular social groupâ (PSG). Its decision has been celebrated as a step forward in resolving contradictory and arbitrary outcomes that persisted in a vacuum of jurisprudential norms about the issue
Recommended from our members
LinkChains: Exploring the space of decentralised trustworthy Linked Data
Distributed ledger platforms based on blockchains provide a fully distributed form of data storage which can guarantee data integrity. Certain use cases, such as medical applications, can benefit from guarantees that the results of arbitrary queries against a Linked Dataset faithfully represent its contents as originally published, without tampering or data corruption. We describe potential approaches to the storage and querying of Linked Data with varying degrees of decentralisation and guarantees of integrity, using distributed ledgers, and discuss their a priori differences in performance, storage limitations and reliability, setting out a programme for future empirical research
Lex Informatica: The Formulation of Information Policy Rules through Technology
Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a âLex Informaticaâ that policymakers must understand, consciously recognize, and encourage
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting
devices provides a compelling proposition for a new class of edge devices for
the Internet of Things. In particular, Computational Radio Frequency
Identification (CRFID) devices are an emerging class of battery-free,
computational, sensing enhanced devices that harvest all of their energy for
operation. Despite wireless connectivity and powering, secure wireless firmware
updates remains an open challenge for CRFID devices due to: intermittent
powering, limited computational capabilities, and the absence of a supervisory
operating system. We present, for the first time, a secure wireless code
dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic
hardware security primitive Static Random Access Memory Physical Unclonable
Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i)
overcomes the resource-constrained and intermittently powered nature of the
CRFID devices; ii) is fully compatible with existing communication protocols
employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is
built upon a standard and industry compliant firmware compilation and update
method realized by extending a recent framework for firmware updates provided
by Texas Instruments. We build an end-to-end SecuCode implementation and
conduct extensive experiments to demonstrate standards compliance, evaluate
performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin
Total order in opportunistic networks
Opportunistic network applications are usually assumed to work only with unordered immutable messages, like photos, videos, or music files, while applications that depend on ordered or mutable messages, like chat or shared contents editing applications, are ignored. In this paper, we examine how total ordering can be achieved in an opportunistic network. By leveraging on existing dissemination and causal order algorithms, we propose a commutative replicated data type algorithm on the basis of Logoot for achieving total order without using tombstones in opportunistic networks where message delivery is not guaranteed by the routing layer. Our algorithm is designed to use the nature of the opportunistic network to reduce the metadata size compared to the original Logoot, and even to achieve in some cases higher hit rates compared to the dissemination algorithms when no order is enforced. Finally, we present the results of the experiments for the new algorithm by using an opportunistic network emulator, mobility traces, and Wikipedia pages.Peer ReviewedPostprint (author's final draft
- âŠ