43 research outputs found

    Multiscale Bone Remodelling with Spatial P Systems

    Get PDF
    Many biological phenomena are inherently multiscale, i.e. they are characterized by interactions involving different spatial and temporal scales simultaneously. Though several approaches have been proposed to provide "multilayer" models, only Complex Automata, derived from Cellular Automata, naturally embed spatial information and realize multiscaling with well-established inter-scale integration schemas. Spatial P systems, a variant of P systems in which a more geometric concept of space has been added, have several characteristics in common with Cellular Automata. We propose such a formalism as a basis to rephrase the Complex Automata multiscaling approach and, in this perspective, provide a 2-scale Spatial P system describing bone remodelling. The proposed model not only results to be highly faithful and expressive in a multiscale scenario, but also highlights the need of a deep and formal expressiveness study involving Complex Automata, Spatial P systems and other promising multiscale approaches, such as our shape-based one already resulted to be highly faithful.Comment: In Proceedings MeCBIC 2010, arXiv:1011.005

    Off-chain trading for micro grid systems

    Get PDF
    As micro grids and blockchain gained the interest and attention of both academia and the industry, the interaction between the two technologies seems inevitable. However, there are challenges to overcome in order to actually realize the integration between micro grids and blockchains. In this article, we review the solutions proposed to enhance micro grids with blockchains. We discuss the scalability challenges and the opportunities derived from the off-chaining computing techniques. In this context, we draft a design to implement a micro grid-based peer-to-peer local energy market, powered by an off-chain computing protocol called DIVERSITY. DIVERSITY aims to shift the computational burden from a main blockchain to an intermediate layer of nodes, aggregating data and executing smart contracts off-chain. We simulate different data logging approaches, and it is found that DIVERSITY allows an actual saving on fees and power consumption derived from using a public blockchain platform, such as Ethereum, in order to assure a truly decentralized renewable energy distribution at a lower cost

    Analysis and verification of ECA rules in intelligent environments

    Get PDF
    Intelligent Environments (IEs) are physical spaces where Information Technology (IT) and other pervasive computing technologies are combined in order to achieve specific goals for the users and the environment. IEs have the goal of enriching user experience, increasing awareness of the environment. A number of applications are currently being deployed in domains ranging from smart homes to e-health and autonomous vehicles. Quite often IE support human activities, thus essential requirements to be ensured are correctness, reliability, safety and security. In this paper we present how a set of techniques and tools that have been developed for the verification of software can be employed in the verification of IE described by means of event-condition-action rules. More precisely, we reduce the problem of verifying key properties of these rules to satisfiability and termination problems that can be addressed using state-of-the-art Satisfiability Modulo Theory (SMT) solvers and program analysers. Our approach has been implemented in a tool called vIRONy. Our approach has been validated on a number of case studies from the literature

    Symbolic verification of event–condition–action rules in intelligent environments

    Get PDF
    In this paper we show how state-of-the art SMT-based techniques for software verification can be employed in the verification of event–condition–action rules in intelligent environments. Moreover, we exploit the specific features of intelligent environments to optimise the verification process. We compare our approach with previous work in a detailed evaluation section, showing how it improves both performance and expressivity of the language for event–condition–action rules

    A Catalogue of Inter-Parameter Dependencies in RESTful Web APIs

    Get PDF
    Web services often impose dependency constraints that re strict the way in which two or more input parameters can be combined to form valid calls to the service. Unfortunately, current specification languages for web services like the OpenAPI Specification provide no support for the formal description of such dependencies, which makes it hardly possible to automatically discover and interact with services without human intervention. Researchers and practitioners are openly requesting support for modelling and validating dependencies among in put parameters in web APIs, but this is not possible unless we share a deep understanding of how dependencies emerge in practice—the aim of this work. In this paper, we present a thorough study on the presence of dependency constraints among input parameters in web APIs in in dustry. The study is based on a review of more than 2.5K operations from 40 real-world RESTful APIs from multiple application domains. Overall, our findings show that input dependencies are the norm, rather than the exception, with 85% of the reviewed APIs having some kind of dependency among their input parameters. As the main outcome of our study, we present a catalogue of seven types of dependencies consistently found in RESTful web APIsMinisterio de Economía y Competitividad BELI (TIN2015-70560-R)Ministerio de Ciencia, Innovación y Universidades Horatio RTI2018-101204-B-C21Ministerio de Educación, Cultura y Deporte FPU17/0407

    Automated analysis of inter-parameter dependencies in web APIs

    Get PDF
    Web services often impose constraintsthat restrict the way in which two or more input parameters can be combined to form valid calls to the service, i.e. inter-parameter dependencies. Current web API specification languages like the OpenAPI Specification (OAS) pro vide no support for the formal description of such dependencies, making it hardly possible to interact with the services without human intervention. We propose specifying and automatically ana lyzing inter-parameter dependencies in web APIs. To this end, we propose a domain-specific language to describe these dependencies, a constraint programming-aided tool supporting their automated analysis, and an OAS extension integrating our approach and eas ing its adoption. Together, these contributions open a new range of possibilities in areas such as source code generation and testin

    A Theory of Encodings and Expressiveness (Extended Abstract)

    Get PDF
    This paper proposes a definition of what it means for one system description language to encode another one, thereby enabling an ordering of system description languages with respect to expressive power. I compare the proposed definition with other definitions of encoding and expressiveness found in the literature, and illustrate it on a well-known case study: the encoding of the synchronous in the asynchronous backslashpi $-calculus

    IRON: Reliable domain specific language for programming IoT devices

    No full text
    A domain-specific language (DSL) is a programming language that is specialized to a particular application domain. IRON is a DSL for the IoT domain which allows not only to program in an easy way using the Event-Condition-Action (ECA) rules but also to prevent incorrect actions. In this paper, we formally describe the semantics of IRON. The anomalies that IRON prevents are: (i) the presence of cycles that determine the non-termination, (ii) the ambiguous actions that do not allow the definition of a final configuration, (iii) the breaking of invariances. In addition to the formal description of IRON, an interpreter was created in a host language (LUA) that captures and manages the three anomalies. This provides a general scheme for the implementation of languages based on ECA rules

    Energy saving and collision-free motion planning for oblivious robots

    No full text
    In distributed computing, many tasks have been studied involving mobile entities - also called robots - with weak capabilities. A well-known scenario is that in which robots operate in Look-Compute-Move (LCM) cycles. During each cycle, a robot acquires a snapshot of the surrounding environment (Look phase), then executes an appropriate algorithm by using the obtained snapshot as input (Compute phase), and finally moves toward a desired destination, if any (Move phase). In this context, we consider robots that have to visit a partially ordered set of locations. A solution to the problem is the assignment to each robot of a trajectory to follow in order to visit the required locations. The resolution of the task is subject to two main constraints. Robots have to minimize the energy spent to accomplish an assigned trajectory, and they have to avoid collisions among each other. The minimization of the energy is expressed in terms of the number of turns a robot has to perform in between two different locations. This equals the number of bends the assigned trajectory contains in between such locations. In general, the problem is known to require Ω(n) bends per connection, with n being the number of locations, even if considering just two robots involved. We study the case where the locations that a single robot has to visit are represented as colored points in the Euclidean plane, and only two colors are provided. This means the partial order among the locations is just based on two colors per robot. In this case, we provide a constructive solution for two robots with five bends per connection

    Blockchain and IoT Integration for Society 5.0

    No full text
    The integration of Blockchain and Internet of Things (IoT) will have many implications in the Society 5.0. Blockchain technology has the potential to deal with issues that are related to data ownership, data integrity and data market monopolies. Public blockchains support the implementation of the data democratisation vision where everybody has access to data and there are no gatekeepers that make use of isolated data silos. Smart contracts can be used to provide contract transparency and allow citizens to manage their own data and the deriving economic value. This paper describes a novel blockchain-based security protocol that has been applied to a bicycle rental case study. This has been designed and implemented with the Society 5.0 vision in mind. Users store their own rental data by using a public blockchain. This eliminates the need of a centralised authority, provides data immutability and allows users to agree on transparent smart contract to manage their insurance, their payments and their own rental data. The smart lock protocol has been implemented in a real industrial product that uses the Ethereum public blockchain
    corecore