Empowering end users in debugging trigger-action rules

F Corno, L De Russis, A Monge Roffarello - Proceedings of the 2019 …, 2019 - dl.acm.org
End users can program trigger-action rules to personalize the joint behavior of their smart
devices and online services. Trigger-action programming is, however, a complex task for …

IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems

A Al Farooq, E Al-Shaer, T Moyer… - 2019 IFIP/IEEE …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has become a common paradigm for different domains such as
health care, transportation infrastructure, smart homes, smart shopping, and e-commerce …

Copi: enabling probabilistic conflict prediction in smart space through context-awareness

J Hua, H Yu, S Lee, HM Adal, C Milhaupt… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
In a smart space influenced by multiple parties, conflicts can arise when competing users try
to control the same devices in different ways. Such conflicts usually require user negotiation …

A formal methods-based Rule Verification Framework for end-user programming in campus Building Automation Systems

H Ibrhim, S Khattab, K Elsayed, A Badr, E Nabil - Building and Environment, 2020 - Elsevier
Abstract Building Automation Systems have recently exposed programming interfaces for
occupants to dynamically control and personalize indoor workplace environments. To this …

Risk management for nuclear medical department using reinforcement learning algorithms

G Paragliola, M Naeem - Journal of Reliable Intelligent Environments, 2019 - Springer
Modern medical software systems are often classified as medical devices and governed by
regulations which require stringent risk safety activities to be implemented to minimize the …

virony: A tool for analysis and verification of ECA rules in intelligent environments

C Vannucchi, M Diamanti, G Mazzante… - 2017 International …, 2017 - ieeexplore.ieee.org
Intelligent Environments (IE) are a very active area of research and a number of applications
are currently being deployed in domains ranging from smart home to e-health and …

A conflicts' classification for IoT-based services: a comparative survey

H Ibrhim, H Hassan, E Nabil - PeerJ Computer Science, 2021 - peerj.com
Abstract Recently, Internet of Things (IoT)-based systems, especially automation systems,
have become an indispensable part of modern-day lives to support the controlling of the …

Automating conflict detection and mitigation in large-scale IoT systems

P Pradeep, A Pal, K Kant - 2021 IEEE/ACM 21st International …, 2021 - ieeexplore.ieee.org
In this paper we examine the problem of conflict detection and mitigation across multiple
independently designed IoT subsystems deployed in a shared environment. The desired …

A calculus for attribute-based memory updates

M Miculan, M Pasqua - Theoretical Aspects of Computing–ICTAC 2021 …, 2021 - Springer
In this paper, we present AbU a new ECA-inspired calculus with attribute-based
communication, an interaction model recently introduced for coordinating large numbers of …

Zero-knowledge multi-transfer based on range proofs and homomorphic encryption

E Scala, C Dong, F Corradini, L Mostarda - International Conference on …, 2023 - Springer
Zero-knowledge proofs are widely adopted in Confidential Transactions (CTs). In particular,
with these proofs, it is possible to prove the validity of transactions without revealing …