Filters








2,693 Hits in 6.4 sec

Learning I/O Automata [chapter]

Fides Aarts, Frits Vaandrager
2010 Lecture Notes in Computer Science  
Links are established between three widely used modeling frameworks for reactive systems: the ioco theory of Tretmans, the interface automata of De Alfaro and Henzinger, and Mealy machines.  ...  It is shown that, by exploiting these links, any tool for active learning of Mealy machines can be used for learning I/O automata that are deterministic and output determined.  ...  Acknowledgement Many thanks to Bengt Jonsson, Bernhard Steffen, Jan Tretmans and the anonymous referees for inspiring discussions and/or pointers to the literature, and to Falk Howar for his generous LearnLib  ... 
doi:10.1007/978-3-642-15375-4_6 fatcat:weiewer6pfakdjopsamwqxpaiq

A Proof-of-Concept IoT System for Remote Healthcare Based on Interoperability Standards

Lenin-Guillermo Lemus-Zúñiga, Juan M. Félix, Alvaro Fides-Valero, José-Vte. Benlloch-Dualde, Antonio Martinez-Millana
2022 Sensors  
Thanks to the effort of academia and industry, there is a wide variety of platforms, systems and commercial products enabling the real-time information exchange of environmental data and people's health  ...  In this paper, we propose a health monitoring system based on the integration of rapid prototyping hardware and interoperable software to build system capable of transmitting biomedical data to healthcare  ...  Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22041646 pmid:35214548 pmcid:PMC8879307 fatcat:xpofnbz3wzd2nfvvb4uvj4hwpu

Generating models of infinite-state communication protocols using regular inference with abstraction

Fides Aarts, Bengt Jonsson, Johan Uijen, Frits Vaandrager
2014 Formal methods in system design  
We present a framework, which adapts regular inference to include data parameters in messages and states for generating components with large or infinite message alphabets.  ...  In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior  ...  Acknowledgement We are grateful to Falk Howar from TU Dortmund for his generous LearnLib support, and to Falk Howar and Bernhard Steffen for fruitful discussions.  ... 
doi:10.1007/s10703-014-0216-x fatcat:5jc2tcicqrfo3k3ewezw3vorcq

A Molecular Survey of Bacterial Species in the Guts of Black Soldier Fly Larvae (Hermetia illucens) Reared on Two Urban Organic Waste Streams in Kenya

Marwa Shumo, Fathiya M. Khamis, Fidelis Levi Ombura, Chrysantus M. Tanga, Komi K. M. Fiaboe, Sevgan Subramanian, Sunday Ekesi, Oliver K. Schlüter, Arnold van Huis, Christian Borgemeister
2021 Frontiers in Microbiology  
Thus, several concerns about their safety for inclusion into animal feed remain largely unaddressed.  ...  ACKNOWLEDGMENTS The authors are extremely thankful to their esteemed colleague Guido Luechters (ZEF) for his valuable assistance in the data analysis and Maureen Ong'onge, Joseph Gichuhi, Isaiah Rachami  ...  , and Dennis Muthoni (ICIPE) for their technical assistance.  ... 
doi:10.3389/fmicb.2021.687103 pmid:34630342 pmcid:PMC8493336 fatcat:bb6jpq6zgrgv3kkmigj4ojhlaa

Simplifying parallel and distributed simulation with the DUP system

Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Matthew J. Rutherford
2010 Proceedings of the 2010 Spring Simulation Multiconference on - SpringSim '10  
with minimal changes, and (2) FiDES, a Discrete-Event Simulation (DES) framework built atop DUP that provides a simple, yet powerful, means of implementing a parallel and/or distributed DES.  ...  We then describe a toolset for profiling, debugging and visualization that aids the development of DUP simulations.  ...  Acknowledgements The authors would like to thank Nathaniel Sandford for allowing us to experiment with his Blackjack simulation, and Min Qi and Craig Ritzdorf for their contributions to early versions  ... 
doi:10.1145/1878537.1878698 fatcat:lmqrwt3kgbhppea356o474z7a4

Author Index

2008 2008 IEEE International Symposium on Parallel and Distributed Processing  
Efficient and Accurate FPGA-based Simulator for Molecular Dynamics Fernando, Pradeep A Customizable FPGA IP Core Implementation of a General Purpose Genetic Algorithm Engine Fide, Sevin Architecture Optimizations  ...  A Neocortex Model Implementation on Reconfigurable Logic with Streaming Memory Wadsworth, Daniel M.  ... 
doi:10.1109/ipdps.2008.4536576 fatcat:7unikf5ywjhjtdd6xtrmcom3gq

GAN-Aimbots: Using Machine Learning for Cheating in First Person Shooters

Anssi Kanervisto, Tomi Kinnunen, Ville Hautamaki
2022 IEEE Transactions on Games  
By gathering data from various players in a first-person shooter game we show that the method improves players' performance while remaining hidden from automatic and manual protection mechanisms.  ...  , threaten the video game industry; they could be used to generate artificial gameplay indistinguishable from that of legitimate human players.  ...  to play for everyone.  ... 
doi:10.1109/tg.2022.3173450 fatcat:yzrkfzu35ndp5ozbhwhuzgf2mu

BodyParts3D: 3D structure database for anatomical concepts

N. Mitsuhashi, K. Fujieda, T. Tamura, S. Kawamoto, T. Takagi, K. Okubo
2009 Nucleic Acids Research  
BodyParts3D is a dictionary-type database for anatomy in which anatomical concepts are represented by 3D structure data that specify corresponding segments of a 3D whole-body model for an adult human male  ...  ACKNOWLEDGEMENTS We thank 'TARO' development team for generously providing their data.  ...  'TARO' is a voxel model phantom for radio-frequency electromagnetic-field dosimetry developed by the National Institute of Information and Communications Technology (NICT), Kitasato University, Keio University  ... 
doi:10.1093/nar/gkn613 pmid:18835852 pmcid:PMC2686534 fatcat:as6s5oj4nrfkzjqhujg33mzr4u

Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting [chapter]

Michael Valkering, Asia Slowinska, Herbert Bos
2009 Lecture Notes in Electrical Engineering  
As correlation with encrypted data is difficult, we retaint data on encrypted connections, making tags point to decrypted data instead.  ...  Upon detecting an attack, we correlate tainted memory blocks with the network trace to generate various types of signature.  ...  Whenever a read is performed on an SSL stream, the data will be decrypted. At that point the interposer requests a retaint for the decrypted data and logs the decrypted data to file.  ... 
doi:10.1007/978-0-387-85555-4_1 fatcat:zclr3m3rojchbnm5t3ez637r4m

A Hybrid Deep Model Using Deep Learning and Dense Optical Flow Approaches for Human Activity Recognition

Senem Tanberk, Zeynep Hilal Kilimci, Dilek Tukel, Mitat Uysal, Selim Akyokus
2020 IEEE Access  
With the same purpose, the 3D-CNN is secondly used for dense optical flow, which is the distribution of apparent velocities of movement in captured imagery data in video frames.  ...  information over video frames for the purpose of human activity recognition.  ...  In this study, it is proposed to construct a hybrid deep model for the purpose of HAR.  ... 
doi:10.1109/access.2020.2968529 fatcat:bafvat24ondflmzm454xc356eu

Data Extraction in Malignant Environments

Amith Mandal, R. P. Ramkumar
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
to undependable outsider and fourth gathering applications. amid this work, a bland data genealogy structure LIME (Data Lineage in the Malicious Environment), is utilized for data stream over different  ...  In general, LIME(Data Lineage in the Malicious Environment),lineage structure for information exchange, to be a key advance towards accomplishing responsibility by plan.  ...  A message request from a non guilty consumer VI. CONCLUSION AND FUTURE ENHANCEMENT We are blessing LIME, a model for capable data exchange over different elements.  ... 
doi:10.32628/cseit195116 fatcat:sihyharbifechd2cdqlbeawi2a

CURTAILING ENERGY THEFT USING CLAMPMETERS

Chukwuebuka Fidelis, Agbata Helen, James Amadi
2017 unpublished
The readings and power consumptions analyses through the clamp meters are remotely monitored wirelessly over a metering data management software interconnected with a database for proper theft control  ...  It is on the basis of these challenges that we propose curtailing energy theft by remote monitoring on power lines by designing a power clamp meter that transmits data wirelessly to the communication center  ...  Also for his painstaking efforts in reading, correcting and seeing that this work is a success. In addition, the elite lecturers in the department are not left out, we acknowledge you all.  ... 
doi:10.13140/rg.2.2.25439.82085 fatcat:gkl4vwdsxvfetnrjm6sgq2333y

Active Traffic Capture for Network Forensics [chapter]

Marco Slaviero, Anna Granova, Martin Olivier
2006 IFIP Advances in Information and Communication Technology  
In particular, it examines how traffic capture can influence the stream under surveillance so that no data is lost. A tool that forces TCP retransmissions is presented.  ...  Under heavy loads, it is possible for a sniffer to miss packets, which affects the quality of forensic evidence. This paper explores means for active capture of network traffic.  ...  Acknowledgement The authors would like to thank the members of the ICSA Research Group for their comments.  ... 
doi:10.1007/0-387-36891-4_17 fatcat:b7njyl7jwnghthomcxmrpnrc4i

Practical server privacy with secure coprocessors

S. W. Smith, D. Safford
2001 IBM Systems Journal  
In this paper, we examine the question: Using current commercially available technology, is it practical to build such a server, for real databases of realistic size, that offers reasonable performance-scaling  ...  Preliminary prototypes support this analysis, but leave many areas for further work.  ...  general-purpose computing environment for applications, with hardware support for cryptographic applications.  ... 
doi:10.1147/sj.403.0683 fatcat:gcoxquxavrekpbvudpncq2cnx4

CYBER SECURITY FOR GSM DATA PROTECTION

Fidelis C. Obodoeze
2010 unpublished
Asymmetric mechanisms are typically used for distributing keys (for example, a symmetric key) or for digital signing purposes.  ...  The AuC register is used for security purposes. It provides the parameters needed for authentication and encryption functions (RAND, SRES and Kc). The RAND is a random challenge generated randomly.  ...  APPENDIX A PROGRAM SOURCE CODES FOR THE secureSMS MIDlet program EncryptedSMSMIDlet.java class /******************** EncryptedSMSMIDlet class: The main class used in the secureSMS application ** ** Fidelis  ... 
doi:10.13140/rg.2.2.22845.82401 fatcat:pduvl3bv5fcqtmpsag6v73cdyu
« Previous Showing results 1 — 15 out of 2,693 results