Search
Search Results
-
Grants4Companies: Applying Declarative Methods for Recommending and Reasoning About Business Grants in the Austrian Public Administration (System Description)
We describe the methods and technologies underlying the application Grants4Companies. The application uses a logic-based expert system to display a... -
Technological Model Based on Blockchain Technology for Genetic Information Protection in the Health Sector
In the health industry, the transparency of product data registration in the supply chain is a critical aspect in determining the source of genetic... -
RoboStar Technology: A Roboticist’s Toolbox for Combined Proof, Simulation, and Testing
Simulation is favored by roboticists to evaluate controller design and software. Often, state machines are drawn to convey overall ideas and used as... -
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices
This document studies the current state of post-quantum cryptography implementation feasibility, providing general approaches that developers and... -
Resources for Comparative Analysis of IDN Authoring Tools
Authoring tools are a crucial component in the practice and research of interactive digital narrative design, yet there is no contemporary knowledge... -
Kurz erklärt: Measuring Data Changes in Data Engineering and their Impact on Explainability and Algorithm Fairness
Data engineering is an integral part of any data science and ML process. It consists of several subtasks that are performed to improve data quality...
-
A Formal Theory of Choreographic Programming
Choreographic programming is a paradigm for writing coordination plans for distributed systems from a global point of view, from which...
-
Formal verification for security and attacks in IoT physical layer
IoT devices are more important than ever. In a connected world, IoT devices have many uses. They are no longer merely used at work; they are part of...
-
Brief Announcement: Secure and Efficient Participant Authentication—Application to Mobile E-Voting
With Popularity of smart phones, more and more users tend to use them in e-voting activities. However, mobile devices has weak computing power and... -
DLchain: Blockchain with Deep Learning as Proof-of-Useful-Work
Blockchains based on Proof-of-Work can maintain a distributed ledger with a high security guarantee but also lead to severe energy waste due to the... -
Wild Swarms: Autonomous Drones for Environmental Monitoring and Protection
In this paper, we present an example case study of how an autonomous swarm-based Multi-Robot System (MRS) could contribute to environmental... -
Lightweight Blockchain Logging for Data-Intensive Applications
With the recent success of cryptocurrency, Blockchain’s design opens the door of building trustworthy distributed systems. A common paradigm is to... -
End-to-End Test Coverage Metrics in Microservice Systems: An Automated Approach
Microservice architecture gains momentum by fueling systems with cloud-native benefits, scalability, and decentralized evolution. However, new... -
Comparison of Smart Contract Platforms from the Perspective of Developers
Blockchain technologies promise to transform businesses by offering benefits like efficiency, transparency, fewer intermediaries, streamlined... -
A trusted authentication scheme based on super SIM card for mobile office for industry 4.0
With the rapid development and wide popularity of Internet technology, mobile application services have become an indispensable part of people's...
-
A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang
We present a proof-assistant-based formalisation of a subset of Erlang, intended to serve as a base for proving refactorings correct. After... -
Decentralising the Internet of Medical Things with Distributed Ledger Technologies and Off-Chain Storages: A Proof of Concept
The privacy issue limits the Internet of Medical Things. Medical information would enhance new medical studies, formulate new treatments, and deliver... -
Cloud-Based Secure Electronic Medical Data Sharing System Using Blockchain Technology (Simulation of a Ransomware Attack with OWASP)
Attacks using ransomware are increasing, putting current healthcare institutions and other crucial infrastructure at risk. The current healthcare... -
Monitoring
What are some of the most important features any new Linux system must have before it can be accepted into your organization's production or live... -
Enhanced Pin Entry Mechanism for ATM Machine by Defending Shoulder Surfing Attacks
Passwords and extraordinary recognizable proof numbers (PINs) are critical and notable strategies for confirmation found in many gadgets, including...