421 research outputs found
Expressing Measurement Uncertainty in OCL/UML Datatypes
Uncertainty is an inherent property of any measure or estimation performed in any physical setting, and therefore it needs to
be considered when modeling systems that manage real data. Although several modeling languages permit the representation of measurement uncertainty for describing certain system attributes, these aspects are not normally incorporated into their type systems. Thus, operating with uncertain values and propagating uncertainty are normally cumbersome processes, di cult to achieve at the model level. This paper proposes an extension of OCL and UML datatypes to incorporate data uncertainty coming from physical measurements or user estimations into the models, along with the set of operations de ned for the values of these types.Universidad de MĂĄlaga. Campus de Excelencia Internacional AndalucĂa Tech
35: Justice of the Peace appointment, 1792: Manuel Gayoso do Lemos to William Dunbar
Justice of the Peace appointment, 1792: Manuel Gayoso do Lemos to William Dunbarhttps://scholarlycommons.obu.edu/dunbar/1037/thumbnail.jp
Enhancing layered enterprise architecture development through conceptual structures
Enterprise Architecture (EA) enables organisations to align their information technology with their business needs. Layered EA Development (LEAD) enhances EA by using meta-models made up of layered meta-objects, interconnected by semantic relations. Organisations can use these meta-models to benefit from a novel, ontology-based, object-oriented way of EA thinking and working. Furthermore, the meta-models are directed graphs that can be read linearly from a Top Down View (TDV) or a Bottom Up View (BUV) perspective. Conceptual Structures through CG-FCA (where CG refers to Conceptual Graph and FCA to Formal Concept Analysis) is thus used to traverse the TDV and BUV directions using the LEAD Industry 4.0 meta-model as an illustration. The motivation for CG-FCA is stated. It is discovered that CG-FCA: (a) identifies any unwanted cycles in the âtop-downâ or âbottom-upâ directions, and (b) conveniently arranges the many pathways by which the meta-models can be traversed and understood in a Formal Concept Lattice. Through the LEAD meta-model exemplar, the wider appeal of CG-FCA and directed graphs are also identified
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II.
Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al. at ToSC 2017 and BDT technique proposed by Wang and Peyrin at ToSC 2019, we find a new 11-round related-tweakey boomerang distinguisher of Deoxys-BC-384 with probability of , and give a related-tweakey rectangle attack on 13-round Deoxys-BC-384 with a data complexity of and time complexity of , and then apply it to analyze 13-round Deoxys-I-256-128 in this paper. This is the first time that an attack on 13-round Deoxys-I-256-128 is given, while the previous attack on this version only reaches 12 rounds
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
In CRYPTOâ89, Merkle presented three double-block-length
hash functions based on DES. They are optimally collision resistant in
a black-box model, that is, the time complexity of any collision-finding
algorithm for them is Ω(2^<l/2>) if DES is a random block cipher, where
l is the output length. Their drawback is that their rates are low. In
this article, new double-block-length hash functions with higher rates
are presented which are also optimally collision resistant in the blackbox
model. They are composed of block ciphers whose key length is twice
larger than their block length
Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services
Web services are distributed software components, that are decoupled from each other using interfaces with specified functional behaviors. However, such behavioral specifications are insufficient to demonstrate compliance with certain temporal non-functional policies. An example is demonstrating that a patientâs health-related query sent to a health care service is answered only by a doctor (and not by a secretary). Demonstrating compliance with such policies is important for satisfying governmental privacy regulations. It is often necessary to expose the internals of the web service implementation for demonstrating such compliance, which may compromise modularity. In this work, we provide a language design that enables such demonstrations, while hiding majority of the serviceâs source code. The key idea is to use greybox specifications to allow service providers to selectively hide and expose parts of their implementation. The overall problem of showing compliance is then reduced to two subproblems: whether the desired properties are satisfied by the serviceâs greybox specification, and whether this greybox specification is satisfied by the serviceâs implementation. We specify policies using LTL and solve the first problem by model checking. We solve the second problem by refinement techniques
Analysis of Transaction Management Performance
There is currently much interest in incorporating transactions into both operating systems and general purpose programming languages. This paper provides a detailed examination of the design and performance of theâÂą transaction manager of the Camelot system. Camelot is a transaction facility that provides a rich model of transactions intended to support a wide variety of general-purpose applications. The transaction manager's principal function is to execute the protocols that ensure atomicity. The conclusions of this study are: a simple optimization to two-phase commit reduces logging activity of distributed transactions; non-blocking commit is practical for some applications; multithreaded design improves throughput provided that log batching is used; multi-casting reduces the variance of distributed commit protocols in a LAN environment; and the performance of transaction mechanisms such as Camelot depend heavily upon kernel performance
Return of the Great Spaghetti Monster : Learnings from a Twelve-Year Adventure in Web Software Development
The widespread adoption of the World Wide Web has fundamentally changed the landscape of software development. Only ten years ago, very few developers would write software for the Web, let alone consider using JavaScript or other web technologies for writing any serious software applications. In this paper, we reflect upon a twelve-year adventure in web development that began with the development of the Lively Kernel system at Sun Microsystems Labs in 2006. Back then, we also published some papers that identified important challenges in web-based software development based on established software engineering principles. We will revisit our earlier findings and compare the state of the art in web development today to our earlier learnings, followed by some reflections and suggestions for the road forward.Peer reviewe
- âŠ