There is some concern regarding the effect of smart phones and other wearable devices using wireless communication and worn by the users very closely to their body. In this paper, we propose a new network switching selection model and its algorithms that minimize the non-ionizing radiation of these devices during use. We validate the model and its algorithms with a proof-of-concept implementation on the Android platform.
In this paper we propose a coordination model that integrates logic programs into a chemical-based coordination framework. The goal is to engineer self-organising systems as well as assess their emergent global properties. Our model is generic and accommodates various logics and it is also powerful enough to supersede various chemical-based approaches. By tuning the internal logic language we can tackle and solve coordination problems in a rigorous way, without renouncing to important engineering properties such as compactness, modularity and reusability of code. We present our logic-based coordination model and we shows how to engineer well-know self-organising mechanisms and how to assess their corresponding emergent properties.
Reputation Management is rather a new field in the realm of computer security. This is mainly due to the fact that computers and software are more and more involved in open networks. In these open networks, any encountered user may become part of the user base and associated interactions even if there is no a priori information about those new users. The greater openness of these networks implies greater uncertainty regarding the outcomes of these interactions. Traditional security mechanisms, for example, access control lists, working under the assumption that there is a priori information about who is allowed to do what, fail in these open situations. Reputation management has been used for ages in the real world to mitigate the risk of negative interaction outcomes among an open number of potentially highly profitable interaction opportunities. Reputation management is now being applied to the open computing world of online interactions and transactions. From the first edition of this book chapter written in 2008 to this second one written in 2012, online reputation services have gained a lot of momentum and reputation monitoring and analysis is now intensively sold to brands companies by communication and marketing agencies. After an introductory section, the second section of this chapter discusses the general understanding of the notion of reputation. Section 3 explains where this concept of reputation fits into computer security. The fourth section presents the state of the art of robust computational reputation. Section 5 gives an overview of the current market of online reputation services, also now called e-reputation services. The conclusion underlines the need to standardize online reputation for increased adoption and robustness.
Exception handling continues to be a challenging problem in object oriented system development. One reason for this is that today's software systems are getting increasingly more complex. Moreover, exception handling is needed in a wide range of emerging application areas, sometimes requiring domain-specific models for handling exceptions. Moreover, new programming paradigms such as pervasive computing, service oriented computing, grid, ambient and mobile computing, web add new dimensions to the existing challenges in this area. The integration of exception handling mechanisms in a design needs to be based on well-founded principles and formal models to deal with the complexities of such systems and to ensure robust and reliable operation. It needs to be pursued at the very start of a design with a clear understanding of the ensuing implications at all stages, ranging from design specification, implementation, operation, maintenance, and evolution. This workshop was structured around the presentation and discussion of the various research issues in this regard to develop a common understanding of the current and future directions of research in this area.
Mobile code has often been mentioned as an attractive technol- ogy for distributing computations inside a Grid consisting of heterogeneous nodes interconnected by a large-scale network. We describe here a Java-based mobile agent model for a Grid infrastructure which addresses issues such as customizable distribution of computation, security, billing and accounting.
This paper presents first a formal development methodology that enables a specifier to add complexity progressively into the system design, and to formally validate each step wrt client's requirements. Second, the paper describes the application of this methodology to agent-based systems, as well as development guidelines that help the specifier during the development of such systems. The methodology and the development guidelines are presented through an agent market place example.
The Trigger and Data Acquisition System of the ALICE Experiment has been designed to support the high bandwidth expected during the LHC heavy ion run. A model of this system has been developed. The goal of this model is two fold.First, it allows us to verify that the system-level design is consistent and behaves according to the requirements. Second, it is used to evaluate the theoretical system performances using the measurements done on sub-systemsprototypes. This paper presents the specification and simulation of a model of the ALICE DAQ system using a commercial tool (Foresight). This specification is then executed to simulate the system behaviour.(Abstract onlyavailable, full text to follow)
A Coordianted Atomic Action (CA Action) is a unified scheme for coordinating complex concurrent activities and supporting error recovery between multiple interacting objects in distributed object-oriented systems. They constitute a very interesting concept for the structured developement of fault-tolerant distributed applications. To formalize the design of CA actions, this paper introduces a new language called COALA (COordinateed Atomic actions LAnguage). COALA provides both a concrete syntax to write CA actions and a semantics which formally explains the concept. The semantics is given in the formal object-oriented specification language CO-OPN/2. COALA can thus benefit form the formal techniques developed around CO-OPN/2 and use them for the validation and the test of applications written with COALA CA actions.
The messenger paradigm is one of the earliest models which propose the exchange of code to implement computer communication. Code becomes mobile and mobile code is now considered a promising alternative for the implementation of distributed applications. One application of mobile code is in the implementation of software agents which themselves are used to implement complex distributed applications. However, efficient execution environments for mobile code are needed before mobile code can be considered a true technology for distributed applications. Our messenger project has focused at identifying and providing, both at the operating system level and at the language level, the necessary mechanisms for the efficient support of distributed applications built with messengers. Since the project has reached a global consistent point, this paper, that can be considered as a position paper, provides an overview of the theoretical and practical aspects of the whole project. The main result of our work is the definition and implementation of an environment for the execution of messengers and the corresponding language for expressing the messenger behavior, called respectively the M0 platform and the M0 language. In both the language and the environment, minimality and efficiency have been the leitmotiv.