855,583 research outputs found
A Formal Context Representation Framework for Network-Enabled Cognition
Network-accessible resources are inherently contextual with respect to the specific situations (e.g., location and default assumptions) in which they are used. Therefore, the explicit conceptualization and representation of contexts is required to address a number of problems in Network- Enabled Cognition (NEC). We propose a context representation framework to address the computational specification of contexts. Our focus is on developing a formal model of context for the unambiguous and effective delivery of data and knowledge, in particular, for enabling forms of automated inference that address contextual differences between agents in a distributed network environment. We identify several components for the conceptualization of contexts within the context representation framework. These include jurisdictions (which can be used to interpret contextual data), semantic assumptions (which highlight the meaning of data), provenance information and inter-context relationships. Finally, we demonstrate the application of the context representation framework in a collaborative military coalition planning scenario. We show how the framework can be used to support the representation of plan-relevant contextual information
A Goal-based Framework for Contextual Requirements Modeling and Analysis
Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerging computing paradigms, such as ambient, pervasive and ubiquitous computing, where it is essential to monitor and adapt to an inherently varying context. Besides influencing the software, context may influence stakeholders' goals and their choices to meet them. In this paper, we propose a goal-oriented RE modeling and reasoning framework for systems operating in varying contexts. We introduce contextual goal models to relate goals and contexts; context analysis to refine contexts and identify ways to verify them; reasoning techniques to derive requirements reflecting the context and users priorities at runtime; and finally, design time reasoning techniques to derive requirements for a system to be developed at minimum cost and valid in all considered contexts. We illustrate and evaluate our approach through a case study about a museum-guide mobile information system
A monitoring approach for runtime service discovery
Effective runtime service discovery requires identification of services based on different service characteristics such as structural, behavioural, quality, and contextual characteristics. However, current service registries guarantee services described in terms of structural and sometimes quality characteristics and, therefore, it is not always possible to assume that services in them will have all the characteristics required for effective service discovery. In this paper, we describe a monitor-based runtime service discovery framework called MoRSeD. The framework supports service discovery in both push and pull modes of query execution. The push mode of query execution is performed in parallel to the execution of a service-based system, in a proactive way. Both types of queries are specified in a query language called SerDiQueL that allows the representation of structural, behavioral, quality, and contextual conditions of services to be identified. The framework uses a monitor component to verify if behavioral and contextual conditions in the queries can be satisfied by services, based on translations of these conditions into properties represented in event calculus, and verification of the satisfiability of these properties against services. The monitor is also used to support identification that services participating in a service-based system are unavailable, and identification of changes in the behavioral and contextual characteristics of the services. A prototype implementation of the framework has been developed. The framework has been evaluated in terms of comparison of its performance when using and when not using the monitor component
Is Authority Always Constructed and Contextual? A Classical Challenge to the Framework for Information Literacy
The 2015 Framework for Information Literacy for Higher Education (or Framework) is the latest effort of academic librarians to provide relevant guidance for the teaching of information literacy. One claim made within this “living document,” in line with current academic trends of constructivism and social constructivism, is that “Authority is Constructed and Contextual.” Questions are raised concerning authority’s relationship to the idea of truth, and an effort is made, largely through a Socratic method of inquiry, to delve into the meaning of the Framework’s statement on authority using the further explanations provided concerning this particular “frame,” as well as the context of the entire document. Connections between the nature of authority, responsibility, and the ethical direction of the Framework are considered, and the relevance of the matter of truth is brought to bear here as well. Finally, the conclusion is reached that in light of the investigation’s findings, the current statement that “Authority is Constructed and Contextual” is fraught with significant difficulties, and a statement akin to “Issues of Authority are Contextual and Nuanced” is warranted instead
Towards Adaptable and Adaptive Policy-Free Middleware
We believe that to fully support adaptive distributed applications,
middleware must itself be adaptable, adaptive and policy-free. In this paper we
present a new language-independent adaptable and adaptive policy framework
suitable for integration in a wide variety of middleware systems. This
framework facilitates the construction of adaptive distributed applications.
The framework addresses adaptability through its ability to represent a wide
range of specific middleware policies. Adaptiveness is supported by a rich
contextual model, through which an application programmer may control precisely
how policies should be selected for any particular interaction with the
middleware. A contextual pattern mechanism facilitates the succinct expression
of both coarse- and fine-grain policy contexts. Policies may be specified and
altered dynamically, and may themselves take account of dynamic conditions. The
framework contains no hard-wired policies; instead, all policies can be
configured.Comment: Submitted to Dependable and Adaptive Distributed Systems Track, ACM
SAC 200
Data Poisoning Attacks in Contextual Bandits
We study offline data poisoning attacks in contextual bandits, a class of
reinforcement learning problems with important applications in online
recommendation and adaptive medical treatment, among others. We provide a
general attack framework based on convex optimization and show that by slightly
manipulating rewards in the data, an attacker can force the bandit algorithm to
pull a target arm for a target contextual vector. The target arm and target
contextual vector are both chosen by the attacker. That is, the attacker can
hijack the behavior of a contextual bandit. We also investigate the feasibility
and the side effects of such attacks, and identify future directions for
defense. Experiments on both synthetic and real-world data demonstrate the
efficiency of the attack algorithm.Comment: GameSec 201
The relation between nonlocality and contextuality for a biphoton
We investigate the set of qutrit states in terms of symmetric states of two
qubits that violate the minimal contextual inequality, namely the
Klyachko-Can-Binicoglu-Shumovsky (KCBS) inequality. The physical system that
provides a natural framework for this problem is a biphoton which consists of
two photons in the same spatio-temporal mode and whose effective polarization
behaves as a three-level quantum system. The relationship between the KCBS
contextual inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality is
investigated. We find that every biphotonic state that is contextual with
respect to KCBS is nonlocal as per the CHSH test when the two photons are
apart, but the converse is not true.Comment: Close to the published versio
- …
