• Title/Summary/Keyword: Composability

Search Result 15, Processing Time 0.028 seconds

Is Trust Transitive and Composable in Social Networks?

  • Song, Hee Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.4
    • /
    • pp.191-205
    • /
    • 2013
  • Recently, the topic of predicting interpersonal trust in online social networks is receiving considerable attention, because trust plays a critical role in controlling the spread of distorted information and vicious rumors, as well as reducing uncertainties and risk from unreliable users in social networks. Several trust prediction models have been developed on the basis of transitivity and composability properties of trust; however, it is hard to find empirical studies on whether and how transitivity and composability properties of trust are operated in real online social networks. This study aims to predict interpersonal trust between two unknown users in social networks and verify the proposition on whether and how transitivity and composability of trust are operated in social networks. For this purpose, we chose three social network sites called FilmTrust, Advogato, and Epinion, which contain explicit trust information by their users, and we empirically investigated the proposition. Experimental results showed that trust can be propagated farther and farther along the trust link; however, when path distance becomes distant, the accuracy of trust prediction lowers because noise is activated in the process of trust propagation. Also, the composability property of trust is operated as we expected in real social networks. However, contrary to our expectations, when the path is synthesized more during the trust prediction, the reliability of predicted trust did not tend to increase gradually.

A Study on Transitivity and Composability of Trust in Social Network (소셜네트워크에서 신뢰의 전이성과 결합성에 관한 연구)

  • Song, Hee-Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.41-53
    • /
    • 2011
  • Trust prediction between users in social network based on the trust propagation assumes properties of transitivity and composability of trust propagation. But it has been hard to find studies which test on how those properties have been operated in real social network. This study aims to validate if the longer the distance of trust paths and the less the numbers of trust paths, the higher prediction error occurs using two real social network data set. As a result, the longer the distance of trust paths, we can find higher prediction error when predicting level of trust between source and target users. But we can not find decreasing trend of prediction error though the possible number of trust paths between source and target users increases.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

On the Design of Distributed Time-Triggered Embedded Systems

  • Kopetz, Hermann
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.340-356
    • /
    • 2008
  • The cognitive constraints of the human mind must drive the decisions in architecture and methodology design in order that the systems we build are comprehensible. This paper presents a methodology for the design of time-triggered embedded systems that leads to understandable artifacts. We lift the design process to a higher level of abstractionto the level of computational components that interact solely by the exchange of messages. The time-triggered architecture makes it possible to specify the temporal properties of component interfaces precisely and provides temporally predictable message communication, such that the precise behavior of a large design can be studied in the early phases of a design on the basis of the component interface specifications. This paper shows how the cognitive simplification strategies of abstraction, partitioning and segmentation are supported by the time-triggered architecture and its associated design methodology to construct evolvable embedded systems that can be readily understood and modified.

Universal Composability Notion for Functional Encryption Schemes

  • Sadikin, Rifki;Park, YoungHo;Park, KilHoum;Moon, SangJae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.3
    • /
    • pp.17-26
    • /
    • 2013
  • We have developed an ideal functionality for security requirement of functional encryption schemes. The functionality is needed when we want to show the security of a functional encryption scheme in universal composable (UC) framework. A functionality $F_{fe}$ was developed to represent ideal respond of a functional encryption scheme against any polynomial time active attacker. We show that UC security notion of functional encryption scheme $F_{fe}$ is as strong as fully secure functional encryption in an indistinguishable game with chosen cipher text attack. The proof used a method that showing for any environment algorithm, it can not distinguish ideal world where the attacker play with ideal functionality $F_{fe}$ and real world where the attacker play a fully secure functional encryption scheme.

Modeling and Simulation Methodology for Defense Systems Based on Concept of System of Systems (복합체계 개념에 기반한 국방체계 모델링 시뮬레이션 방법론)

  • Kim, Tag Gon;Kwon, Se Jung;Kang, Bonggu
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.450-460
    • /
    • 2013
  • A complex system such as defense systems is in a form of System of Systems (SoS) in which each component is a system being independent of other component systems. Dynamical behavior of SoS is represented by a composition of behaviors of component systems. Thus, a M&S tool/environment would not be efficient for development of heterogeneous models nor for simulation in a centralized environment. Moreover, such an environment restricts reusability and composability. This paper presents an interoperation method for M&S of defense systems as SoS. The approach first develops component system models using tools, each specialized to M&S of each component system. It then interoperates such simulations together to simulate a whole system as SoS. HLA/RTI is employed for such interoperation, which is a DoD/IEEE standard to support interoperation. We will introduce a case study for interoperable simulation of defense systems, which consists of a wargame simulator and a communication simulator.

A Study on Agent based Simulation System Architecture for the Engagement of Ground Weapon Systems (지상무기체계 교전 모의를 위한 에이전트 기반 시뮬레이션 시스템 아키텍처 설계 연구)

  • Hwam, Won K.;Chung, Yongho;Na, Jaeho;Park, Sang C.
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.4
    • /
    • pp.81-90
    • /
    • 2012
  • Presented in this paper is a study for construction of a simulation system for the engagement of ground weapon systems. This paper proposes architecture for the simulation system based on agent simulation design methodology. Every entity of the proposed architecture is developed by assembling modularized agent components, and it enhances the reusability and composability of the entity. Consequently, time, costs, and efforts that are required to develop a new simulation system is able to be reduced by the enhancement. In the case of ground engagement simulation, it is very important to reflect environmental effects. Synthetic battlefield of the proposed architecture has environmental data of the battlefield and interacts with entities in the simulation system. The proposed architecture based simulation system can build swiftly various simulation models by the objectives and derive reasonable results from behaviors of entities that include environmental effects. This paper contains the construction of an example system based on the proposed architecture to verify the advantages of the architecture.

A Study on Changes in the Fashion Market Viewed from the Perspective of Big Blur (빅블러 관점으로 바라본 패션 시장의 변화에 관한 연구)

  • Park, Yonjin;Kan, Hosup
    • Journal of Fashion Business
    • /
    • v.24 no.4
    • /
    • pp.144-160
    • /
    • 2020
  • Today, the development of innovative technologies is accompanied by changes in the industrial structure and the Big Blur phenomenon, where the boundaries in various fields are blurred. The purpose of this study was to view the Big Blur phenomenon as a big paradigm shift in the 21st century and derive environmental changes and characteristics of the Korean fashion market. The research method included an analysis of the fashion brands after 2015. Through this study, we intended to establish a framework for understanding the changes in the fashion market from the perspective of Big Blur and discuss the direction of brand marketing. The research results showed the hyperlinks, connectivity, openness, homeostasis, synchronicity, mobility, interactivity, and brand experience of online and offline spaces beyond the boundaries of virtual space and offline physical spaces such as online physical and spatial viewpoints. It also showed the characteristics. The characteristics from the socio-cultural point of view were characteristic of diversity, mixture, coexistence, composability, and pluralism beyond the traditional socio-cultural and regulatory scopes. Hip hop fashion, street fashion, unisex, genderless, androgynous fashion, and kid fashion are the backbone of the Big Blur and are becoming important factors in fashion. The characteristics of the market and economic viewpoint are prosumers that play roles both as producers and consumers. It shows the extensibility of consumers as producers, the cohesiveness of producers and consumers, the cooperation, and the interconnectivity.

A Methodology for Creating a Simulation Model for a Agent Based and Object-oriented Logistics Support System (군수지원시스템을 위한 에이전트 기반의 객체 지향 시뮬레이션 모델 아키텍처 설계 방법론)

  • Chung, Yong-H.;Hwam, Won-K.;Park, Sang-C.
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.27-34
    • /
    • 2012
  • Proposed in the paper is an agent based and object-oriented methodology to create a virtual logistics support system model. The proposed virtual logistics support system model consists of three types of objects: the logistics force agent model(static model), the military supplies transport manager model(function model), the military supplies state manager model(dynamic model). A logistic force agent model consists of two agent: main function agent and function agent. To improve the reusability and composability of a logistics force agent model, the function agent is designed to adapt to different logistics force agent configuration. A military supplies transport manager is agent that get information about supply route, make decisions based on decision variables, which are maintained by the military supplies state manager, and transport military supplies. A military supplies state manager is requested military supplies from logistics force agent, provide decision variables such as the capacity, order of priority. For the implementation of the proposed virtual logistics force agent model, this paper employs Discrete Event Systems Specification(DEVS) formalism.

A Simulation Framework of Multi-Agent Based Small Engagement Using Cougaar Architecture (Cougaar Architecture 활용 다중 에이전트 기반 소규모 교전 시뮬레이션 Framework)

  • Hwam, Won-K.;Chung, Yong-Ho;Park, Sang-C.
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.101-109
    • /
    • 2011
  • M&S in the field of national defense is a battle system has been highly spotlighted for obtaining weapon systems, analyzing and experimentation of battle effects to reduce costs, time, and risks. It is classified as Campaign, Mission, Engagement, and Engineering levels by detail of description. In engagements, many situations on the battle field which are really unpredictable are required to be considered on the view of diverse tactics. Thus, engagement simulation is in demand to use for forecasting real-world battle situations by inserting various components which consists of real engaging situations into virtual local battle field. While developing the engagement simulation, adopting the concept of agent-based simulation gives it benefits which are improved autonomy, composability, and reusability of entities. It means reducing the time, cost and effort to develop the simulations. This paper concentrates on the framework of multi-agent based engagement simulation using Cougaar Architecture.