A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Agent-based Internet of Things: State-of-the-art and research challenges
The disruptive potentials of the Internet of Things (IoT) entails multifaceted requirements and
development issues (large scale deployments, heterogeneity, cyberphysicality …
development issues (large scale deployments, heterogeneity, cyberphysicality …
Roma: Multi-agent reinforcement learning with emergent roles
The role concept provides a useful tool to design and understand complex multi-agent
systems, which allows agents with a similar role to share similar behaviors. However …
systems, which allows agents with a similar role to share similar behaviors. However …
Rode: Learning roles to decompose multi-agent tasks
Role-based learning holds the promise of achieving scalable multi-agent learning by
decomposing complex tasks using roles. However, it is largely unclear how to efficiently …
decomposing complex tasks using roles. However, it is largely unclear how to efficiently …
Aios: Llm agent operating system
LLM-based intelligent agents face significant deployment challenges, particularly related to
resource management. Allowing unrestricted access to LLM or tool resources can lead to …
resource management. Allowing unrestricted access to LLM or tool resources can lead to …
A survey on engineering approaches for self-adaptive systems
The complexity of information systems is increasing in recent years, leading to increased
effort for maintenance and configuration. Self-adaptive systems (SASs) address this issue …
effort for maintenance and configuration. Self-adaptive systems (SASs) address this issue …
Modeling cyber–physical systems
This paper focuses on the challenges of modeling cyber–physical systems (CPSs) that arise
from the intrinsic heterogeneity, concurrency, and sensitivity to timing of such systems. It …
from the intrinsic heterogeneity, concurrency, and sensitivity to timing of such systems. It …
Multi-agent systems applications in energy optimization problems: A state-of-the-art review
A González-Briones, F De La Prieta, MS Mohamad… - Energies, 2018 - mdpi.com
This article reviews the state-of-the-art developments in Multi-Agent Systems (MASs) and
their application to energy optimization problems. This methodology and related tools have …
their application to energy optimization problems. This methodology and related tools have …
NDA: Near-DRAM acceleration architecture leveraging commodity DRAM devices and standard memory modules
Energy consumed for transferring data across the processor memory hierarchy constitutes a
large fraction of total system energy consumption, and this fraction has steadily increased …
large fraction of total system energy consumption, and this fraction has steadily increased …
A systematic literature review on the usage of eye-tracking in software engineering
Context Eye-tracking is a mean to collect evidence regarding some participants' cognitive
processes. Eye-trackers monitor participants' visual attention by collecting eye-movement …
processes. Eye-trackers monitor participants' visual attention by collecting eye-movement …