Empowering end users in debugging trigger-action rules
End users can program trigger-action rules to personalize the joint behavior of their smart
devices and online services. Trigger-action programming is, however, a complex task for …
devices and online services. Trigger-action programming is, however, a complex task for …
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems
Internet of Things (IoT) has become a common paradigm for different domains such as
health care, transportation infrastructure, smart homes, smart shopping, and e-commerce …
health care, transportation infrastructure, smart homes, smart shopping, and e-commerce …
Copi: enabling probabilistic conflict prediction in smart space through context-awareness
In a smart space influenced by multiple parties, conflicts can arise when competing users try
to control the same devices in different ways. Such conflicts usually require user negotiation …
to control the same devices in different ways. Such conflicts usually require user negotiation …
A formal methods-based Rule Verification Framework for end-user programming in campus Building Automation Systems
Abstract Building Automation Systems have recently exposed programming interfaces for
occupants to dynamically control and personalize indoor workplace environments. To this …
occupants to dynamically control and personalize indoor workplace environments. To this …
Risk management for nuclear medical department using reinforcement learning algorithms
G Paragliola, M Naeem - Journal of Reliable Intelligent Environments, 2019 - Springer
Modern medical software systems are often classified as medical devices and governed by
regulations which require stringent risk safety activities to be implemented to minimize the …
regulations which require stringent risk safety activities to be implemented to minimize the …
virony: A tool for analysis and verification of ECA rules in intelligent environments
C Vannucchi, M Diamanti, G Mazzante… - 2017 International …, 2017 - ieeexplore.ieee.org
Intelligent Environments (IE) are a very active area of research and a number of applications
are currently being deployed in domains ranging from smart home to e-health and …
are currently being deployed in domains ranging from smart home to e-health and …
A conflicts' classification for IoT-based services: a comparative survey
Abstract Recently, Internet of Things (IoT)-based systems, especially automation systems,
have become an indispensable part of modern-day lives to support the controlling of the …
have become an indispensable part of modern-day lives to support the controlling of the …
Automating conflict detection and mitigation in large-scale IoT systems
In this paper we examine the problem of conflict detection and mitigation across multiple
independently designed IoT subsystems deployed in a shared environment. The desired …
independently designed IoT subsystems deployed in a shared environment. The desired …
A calculus for attribute-based memory updates
In this paper, we present AbU a new ECA-inspired calculus with attribute-based
communication, an interaction model recently introduced for coordinating large numbers of …
communication, an interaction model recently introduced for coordinating large numbers of …
Zero-knowledge multi-transfer based on range proofs and homomorphic encryption
Zero-knowledge proofs are widely adopted in Confidential Transactions (CTs). In particular,
with these proofs, it is possible to prove the validity of transactions without revealing …
with these proofs, it is possible to prove the validity of transactions without revealing …