52 research outputs found

    Reasoning about the impacts of information sharing

    Get PDF
    Shared information can benefit an agent, allowing others to aid it in its goals. However, such information can also harm, for example when malicious agents are aware of these goals, and can then thereby subvert the goal-maker's plans. In this paper we describe a decision process framework allowing an agent to decide what information it should reveal to its neighbours within a communication graph in order to maximise its utility. We assume that these neighbours can pass information onto others within the graph. The inferences made by agents receiving the messages can have a positive or negative impact on the information providing agent, and our decision process seeks to assess how a message should be modified in order to be most beneficial to the information producer. Our decision process is based on the provider's subjective beliefs about others in the system, and therefore makes extensive use of the notion of trust with regards to the likelihood that a message will be passed on by the receiver, and the likelihood that an agent will use the information against the provider. Our core contributions are therefore the construction of a model of information propagation; the description of the agent's decision procedure; and an analysis of some of its properties

    GPS based Bluetooth Broadcasting – Long Range Solution

    Get PDF
    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. Our simulation results have shown that, message can be received by those devices which are out of the initial Bluetooth range in reasonable time. Flooding of multiple messages could be avoided by applying hash function. With this solution, long range data and voice communication could be done with free of cost also can be used for commercial advertising purpose

    Monitoring the Quality of Information (QoI) for low-cost sensor networks

    Get PDF
    Mantaining a low cost sensor network calibrated for a certain time having trustable information is a highly complicated task. Thanks to redundant sensors in sensing devices and a sensor network, statistical tests can be applied in order to know whenever a calibration or a replacement should be done

    CSM-H-R: An Automatic Context Reasoning Framework for Interoperable Intelligent Systems and Privacy Protection

    Full text link
    Automation of High-Level Context (HLC) reasoning for intelligent systems at scale is imperative due to the unceasing accumulation of contextual data in the IoT era, the trend of the fusion of data from multi-sources, and the intrinsic complexity and dynamism of the context-based decision-making process. To mitigate this issue, we propose an automatic context reasoning framework CSM-H-R, which programmatically combines ontologies and states at runtime and the model-storage phase for attaining the ability to recognize meaningful HLC, and the resulting data representation can be applied to different reasoning techniques. Case studies are developed based on an intelligent elevator system in a smart campus setting. An implementation of the framework - a CSM Engine, and the experiments of translating the HLC reasoning into vector and matrix computing especially take care of the dynamic aspects of context and present the potentiality of using advanced mathematical and probabilistic models to achieve the next level of automation in integrating intelligent systems; meanwhile, privacy protection support is achieved by anonymization through label embedding and reducing information correlation. The code of this study is available at: https://github.com/songhui01/CSM-H-R.Comment: 11 pages, 8 figures, Keywords: Context Reasoning, Automation, Intelligent Systems, Context Modeling, Context Dynamism, Privacy Protection, Context Sharing, Interoperability, System Integratio

    Implementation for simplifying Bluetooth device connection methods

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.Includes bibliographical references (p. 63-64).This thesis provides a way for users to easily add and remove devices to secure groups, allowing for a more intuitive way of making connections between devices. These groups allow users to seamlessly make connections between their devices once devices are added to a group. Current models for sending data from device to device either involve proprietary cables and manufacturer-specific connectors or complex systems of PINs and passwords to authorize a user/device. In an environment where a user expects to be able to quickly send data between his mobile devices, the time it takes to initialize a connection should not be longer than the time it takes to send the data. The solution proposed in this thesis establishes a model using groups, with group owners and group members. Groups are identified using shared public and private key pairs. The group model establishes implicit trusted relationships between members of a group without having to explicitly authorize a member, simplifying and reducing the number of authenticated links a user must create between his devices.by Tehyih Debbie Wan.M.Eng

    Monitoramento em tempo de execução : a construção de um módulo em Erlang para uma arquitetura orientada a serviços

    Get PDF
    Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2017.Monitoramento de software em tempo de execução tem sido usado para detecção de falhas, análise de desempenho, otimização, diagnóstico e recuperação. Evidenciar e utilizar métricas adequadas são o que possibilita a obtenção dessas informações em tempo de execução do software. Quando agir, o que verificar, o que pode melhorar é uma parte crucial do contexto apresentado. Por esse motivo, este estudo apresentou um módulo em Erlang de monitoramento de sistemas em tempo de execução embasado em um mapeamento sistemático de métricas de monitoramento de sistemas computacionais em tempo de execução a fim de auxiliar na manutenibilidade de sistemas por meio de uma camada de visualização de software. O serviço de monitoramento foi utilizado nos sistemas da Universidade de Brasília a fim de analisar e avaliar os resultados obtidos neste trabalho.Monitoring runtime software has been used for fault detection, performance analysis, optimization, diagnosis and recovery. Evidence and proper metrics is what makes it possible to obtain this information in the software runtime. When to act, what to check, which can improve is a crucial part of the pop. For this reason, this study presented a module in Erlang for monitoring systems in execution time based on a systematic mapping of computational systems runtime monitoring metrics in order to assist in the maintenance of systems through a visualization layer software. The monitoring service was used with the systems of the University of Brasília in order to analyze and evaluate the results obtained in this work
    • …
    corecore