Monografias em Ciência da Computação
Departmento de Informática
Pontifícia Universidade Católica do Rio de Janeiro - PUC-Rio
Rio de Janeiro - Brazil
This file contains a list of the technical reports of the Departmento de Informática, Pontifícia Universidade Católica do Janeiro - PUC-Rio, Brazil, which are published in our series Monografias em Ciência da Computação (ISSN 0103-9741), edited by Prof. Carlos Lucena. Please note that the reports not available for download are available in their print format and can be obtained via the e-mail below.
For any questions, requests or suggestions, please contact:
Rosane Castilho firstname.lastname@example.org
Last update: 05/SEPTEMBER/2017
ROSEMBERG, M.R.; CUNHA, F.J.P.; PORTUGAL, R.; PIVATELLI, J.; SANTOS, L.T.; MOURA, A.M.; VENIERIS, R.; RIELLO, E.; OLIVIERI, B.; ALVES, P.H.C.; FERREIRA, M.G.; LEITE, J.C.S.P. Explorando o conceito de software consistente: um estudo ancorado em revisão colaborativa. 55 p. Port. E-mail: email@example.com
Abstract: The concept of software awareness addresses the possibility of the software to modify its behavior in order to allow its adaptation to changes occurring in the environment in which the software is running. Such adaptation would therefore be the result of a state of awareness in contrast to the conditions it meets and the desired goals. We can understand the idea as an evolution of the concept of software evolution in that evolution involves the awareness to evolve. The exploration of this concept as a non-functional requirement is a strategy that enables a concept detailing, as well as the possibility of operationalization classifications to be carried out to achieve the non-functional requirement of awareness applied to software artifacts. This work is part of a foundational study that proposes an initial mapping of a network of soft goals to represent the concept of awareness. Our primary objective is to confirm that network as foundational basis as well as to instantiate it through a set of published proposals that contribute to the awareness soft goals. The approach we adopted was based on a collaborative strategy.
SIRQUEIRA, T.F.M.; VIANA, M.L.; NASCIMENTO, N.; LUCENA, C.J.P.L. Um framework para provenieência de dados. 12 p. Port. E-mail: firstname.lastname@example.org
Abstract: Data provenance refers to the historical record of the derivation of the data, allowing the reproduction of experiments, interpretation of results and identification of problems through the analysis of the processes that originated the data. Data provenance contributes to the evaluation of experiments. This paper presents a framework for data provenance using the W3C provenance data model, called PROV-DM. Such framework aims at contributing to, and facilitating, the collection, storage and retrieval of provenance data through a modeling and storage layer based on PROV-DM, yet is compatible with other representations of PROV such as PROV-O. To demonstrate the utilization of the framework, it was used in an IoT application that performs the gas classification to identify diseases.
ALVES, P.H.C.; VIANA, M.L.; LUCENA, C.J.P.L. Working towards a BDI agent based on personality ttaits to improve normative conflicts solution. 13 p. Eng. E-mail: email@example.com
Abstract: Norms exist to avoid and solve conflicts, make agreements, reduce complexity, and in general to achieve a desirable social order. However, norms eventually can be conflicting — for example, when there is a norm that prohibits an agent to perform a particular action and another norm that obligates the same agent to perform the same action in the same period of time. The agent’s decision about which norms to fulfill can be defined based on rewards, punishments and agent goals. Sometimes, this balance will not be enough to allow the agent to make the best decision. In this context, this paper introduces an approach that considers the agent’s personality traits in order to improve the process for resolving normative conflicts.
MOREJÓN, R.; VIANA, M.L.; LUCENA, C.J.P.L. Generating software agents for data mining: an example for health data area. 12 p. Eng. E-mail: firstname.lastname@example.org
VELMOVITSKY, P.E.; BRIOT, J.P.; VIANA, M.L.; LUCENA, C.J.P.L. Implementing an argumentation-based decision BDI agent: a case study for participatory management of protected areas. 12 p. Eng. E-mail: email@example.com
NASCIMENTO, N.M.; LUCENA, C.J.P.L. Engineering smart things based on evolved networks. 18 p. Eng. E-mail: firstname.lastname@example.org
LIMA, E.S.; GOTTIN. V.M.; FURTADO, A.L. Network traversal as an aid to plot analysis and composition. 30 p. Eng. E-mail: email@example.com
ALVES, P.H.C.; VIANA, M.L.; LUCENA, C.J.P.L. An architecture for autonomous normative BDI agents based on personality traits to solve normative conflicts. 15 p. Eng. E-mail: firstname.lastname@example.org
SASTRE PÉREZ, J.; VIANA, M.L.; LUCENA, C.J.P.L. A Multiagent system to train machine learning models. 14 p. Eng. E-mail: email@example.com
CUNHA, F.J.P.; LUCENA, C.J.P. Checking the behavior of BDI4JADE agents using an aspect-based approach. 28 p. Eng. E-mail: firstname.lastname@example.org
SIRQUEIRA, T.F.M.; VIANA, M.L.; LUCENA, C.J.P. Proveniência de dados em sistemas multiagentes. 11 p. Port. E-mail: email@example.com
Abstract: To understand data provenance it is necessary to know the reasoning behind the decisions that lead to this data. Tracking actions on a system is not trivial, especially if it involves intelligent software agents and human beings, where both can make decisions that change the behavior of the system and the results generated by it. This article discusses the data provenance in multiagent systems (MAS), showing a new perspective of the current usage stage of provenance systems, i.e., what benefits the data provenance can bring and the problems involved in the absence of information about the actions of the systems that make use of MAS. In addition, the article mentions some research opportunities that are still untapped in multiagent systems.
SIRQUEIRA, T.F.M.; VIANA, M.L.; LUCENA, C.J.P. Capturando proveniência de dados em sistemas multiagentes. 10 p. Port. E-mail: firstname.lastname@example.org
Abstract: the use of logs is discussed as a way to record the software information and its application in the BDI4JADE platform. During the presentation of the platform is explained the cycle of reasoning of the BDI and the functioning of the agents, where soon after it is discussed how to understand the actions and self-adaptations that agents can perform. At this point we discuss the use of log and how a provenance model may be a better approach. It is still discussed how this capture should be done, without the need to insert code in the multiagent platform and without affecting its architecture. Two codes are presented, the first one being extracted from BDI4JADE demonstrating the use of log and the other making a comparative with the use of aspects to capture the data provenance. At the end some consideration is given and the next steps of the research are presented.
ROSEMBERG, M.R.; SCHWABE, D.; POGGI, M. A hybrid block and stream cipher encryption algorithm based on colision resistant hash functions. 12 p. Eng. E-mail: email@example.com
Abstract: The Vernam Cipher, or one time pad is considered the only unbreakable encryption scheme. It consists of a XOR operation between the plain text and a random key with the same length of the plain text. Once encrypted, the ciphered message gives nothing the cryptanalyst can use to decipher the encrypted message. The major drawback of the Vernam cipher is that it is not feasible to generate and share a key that is as long as the plain text message. Aim: In this work, We propose a hybrid encryption algorithm, which combines block an stream cipher characteristics, using hashes, salts and block counters as block key generators to encrypt a variable length message. The strength of the cryptosystem depends on the strength of the hash function. Method: We belive that Collision resistant hash functions (CRHF) may be a very effecitve way to generate peseudorandom block keys which can be used in a XOR operation with the plain text. Results: In our experiments, we generated one billion keys for each hash function we tested. None of them repeated itself. Conclusions: Our experiments show the key generation algorithm mimics the behavior of the Vernam Cipher and that the block cipher key will not be repeated for a long time. The encryption and the decryption algorithms are very simple and easy to implement, both in software and in hardware.