A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Agent-based Internet of Things: State-of-the-art and research challenges

C Savaglio, M Ganzha, M Paprzycki, C Bădică… - Future Generation …, 2020 - Elsevier
The disruptive potentials of the Internet of Things (IoT) entails multifaceted requirements and
development issues (large scale deployments, heterogeneity, cyberphysicality …

Roma: Multi-agent reinforcement learning with emergent roles

T Wang, H Dong, V Lesser, C Zhang - arxiv preprint arxiv:2003.08039, 2020 - arxiv.org
The role concept provides a useful tool to design and understand complex multi-agent
systems, which allows agents with a similar role to share similar behaviors. However …

Rode: Learning roles to decompose multi-agent tasks

T Wang, T Gupta, A Mahajan, B Peng… - arxiv preprint arxiv …, 2020 - arxiv.org
Role-based learning holds the promise of achieving scalable multi-agent learning by
decomposing complex tasks using roles. However, it is largely unclear how to efficiently …

Aios: Llm agent operating system

K Mei, X Zhu, W Xu, W Hua, M **, Z Li, S Xu… - arxiv preprint arxiv …, 2024 - arxiv.org
LLM-based intelligent agents face significant deployment challenges, particularly related to
resource management. Allowing unrestricted access to LLM or tool resources can lead to …

A survey on engineering approaches for self-adaptive systems

C Krupitzer, FM Roth, S VanSyckel, G Schiele… - Pervasive and Mobile …, 2015 - Elsevier
The complexity of information systems is increasing in recent years, leading to increased
effort for maintenance and configuration. Self-adaptive systems (SASs) address this issue …

Modeling cyber–physical systems

P Derler, EA Lee, AS Vincentelli - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
This paper focuses on the challenges of modeling cyber–physical systems (CPSs) that arise
from the intrinsic heterogeneity, concurrency, and sensitivity to timing of such systems. It …

Multi-agent systems applications in energy optimization problems: A state-of-the-art review

A González-Briones, F De La Prieta, MS Mohamad… - Energies, 2018 - mdpi.com
This article reviews the state-of-the-art developments in Multi-Agent Systems (MASs) and
their application to energy optimization problems. This methodology and related tools have …

NDA: Near-DRAM acceleration architecture leveraging commodity DRAM devices and standard memory modules

A Farmahini-Farahani, JH Ahn… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
Energy consumed for transferring data across the processor memory hierarchy constitutes a
large fraction of total system energy consumption, and this fraction has steadily increased …

A systematic literature review on the usage of eye-tracking in software engineering

Z Sharafi, Z Soh, YG Guéhéneuc - Information and Software Technology, 2015 - Elsevier
Context Eye-tracking is a mean to collect evidence regarding some participants' cognitive
processes. Eye-trackers monitor participants' visual attention by collecting eye-movement …