Monografias em Ciência da Computação
2017
ABSTRACTS
Departmento de Informática
Pontifícia Universidade Católica do Rio de Janeiro - PUC-Rio
Rio de Janeiro - Brazil
This file contains a list of the technical reports of the Departmento de Informática,
Pontifícia Universidade
Católica do Janeiro - PUC-Rio, Brazil,
which are published in our series Monografias em Ciência da Computação (ISSN
0103-9741), edited
by Prof. Carlos Lucena. Please note that the reports not available for download
are available in their print format and can be obtained via the e-mail below.
For any questions, requests or suggestions, please contact:
Rosane Castilho
bib-di@inf.puc-rio.br
Last update: 05/SEPTEMBER/2017
[MCC01/17]
ROSEMBERG, M.R.; CUNHA, F.J.P.; PORTUGAL, R.; PIVATELLI, J.; SANTOS, L.T.;
MOURA, A.M.; VENIERIS, R.; RIELLO, E.; OLIVIERI, B.; ALVES, P.H.C.; FERREIRA,
M.G.; LEITE, J.C.S.P. Explorando o conceito de software consciente: um estudo
ancorado em revisão colaborativa. 55 p.
Port. E-mail:
julio@inf.puc-rio.br
Abstract: The concept of software
awareness addresses the possibility of the software to modify its behavior in
order to allow its adaptation to changes occurring in the environment in which
the software is running. Such adaptation would therefore be the result of a
state of awareness in contrast to the conditions it meets and the desired goals.
We can understand the idea as an evolution of the concept of software evolution
in that evolution involves the awareness to evolve. The exploration of this
concept as a non-functional requirement is a strategy that enables a concept
detailing, as well as the possibility of operationalization classifications to
be carried out to achieve the non-functional requirement of awareness applied to
software artifacts. This work is part of a foundational study that proposes an
initial mapping of a network of soft goals to represent the concept of
awareness. Our primary objective is to confirm that network as foundational
basis as well as to instantiate it through a set of published proposals that
contribute to the awareness soft goals. The approach we adopted was based on a
collaborative strategy.
[MCC02/17]
SIRQUEIRA, T.F.M.; VIANA, M.L.; NASCIMENTO, N.; LUCENA, C.J.P.L. Um framework
para provenieência de dados. 12
p. Port. E-mail: lucena@inf.puc-rio.br
Abstract: Data provenance refers to the
historical record of the derivation of the data, allowing the reproduction of
experiments, interpretation of results and identification of problems through
the analysis of the processes that originated the data. Data provenance
contributes to the evaluation of experiments. This paper presents a framework
for data provenance using the W3C provenance data model, called PROV-DM. Such
framework aims at contributing to, and facilitating, the collection, storage and
retrieval of provenance data through a modeling and storage layer based on
PROV-DM, yet is compatible with other representations of PROV such as PROV-O. To
demonstrate the utilization of the framework, it was used in an IoT application
that performs the gas classification to identify diseases.
[MCC03/17]
ALVES, P.H.C.; VIANA, M.L.; LUCENA, C.J.P.L. Working towards a BDI agent based
on personality ttaits to improve normative conflicts solution.
13
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract: Norms exist to avoid and solve conflicts, make
agreements, reduce complexity, and in general to achieve a desirable social
order. However, norms eventually can be conflicting — for example, when there is
a norm that prohibits an agent to perform a particular action and another norm
that obligates the same agent to perform the same action in the same period of
time. The agent’s decision about which norms to fulfill can be defined based on
rewards, punishments and agent goals. Sometimes, this balance will not be enough
to allow the agent to make the best decision. In this context, this paper
introduces an approach that considers the agent’s personality traits in order to
improve the process for resolving normative conflicts.
[MCC04/17]
MOREJÓN, R.; VIANA, M.L.; LUCENA, C.J.P.L. Generating software agents for data
mining: an example for health data area. 12
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract:
[MCC05/17]
VELMOVITSKY, P.E.; BRIOT, J.P.; VIANA, M.L.; LUCENA, C.J.P.L. Implementing an
argumentation-based decision BDI agent: a case study for participatory
management of protected areas. 12
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract:
[MCC06/17]
NASCIMENTO, N.M.; LUCENA, C.J.P.L. Engineering smart things based on evolved
networks. 18
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract:
[MCC07/17]
LIMA, E.S.; GOTTIN. V.M.; FURTADO, A.L. Network
traversal as an aid to plot analysis and composition.
30 p. Eng. E-mail:
furtado@inf.puc-rio.br
Abstract:
[MCC08/17]
ALVES, P.H.C.; VIANA, M.L.; LUCENA, C.J.P.L. An architecture for
autonomous normative BDI agents based on personality traits to solve normative
conflicts. 15
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract:
[MCC09/17]
SASTRE PÉREZ, J.; VIANA, M.L.; LUCENA, C.J.P.L. A Multiagent system to
train machine learning models.
14
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract:
[MCC10/17]
CUNHA, F.J.P.; LUCENA, C.J.P. Checking the behavior of BDI4JADE agents
using an aspect-based approach.
28
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract:
[MCC11/17]
SIRQUEIRA, T.F.M.; VIANA, M.L.; LUCENA, C.J.P. Proveniência de dados em sistemas
multiagentes.
11
p. Port. E-mail: lucena@inf.puc-rio.br
Abstract: To understand data provenance it is necessary to know the reasoning
behind the decisions that lead to this data. Tracking actions on a system is not
trivial, especially if it involves intelligent software agents and human beings,
where both can make decisions that change the behavior of the system and the
results generated by it. This article discusses the data provenance in
multiagent systems (MAS), showing a new perspective of the current usage stage
of provenance systems, i.e., what benefits the data provenance can bring and the
problems involved in the absence of information about the actions of the systems
that make use of MAS. In addition, the article mentions some research
opportunities that are still untapped in multiagent systems.
[MCC12/17]
SIRQUEIRA, T.F.M.; VIANA, M.L.; LUCENA, C.J.P. Capturando proveniência de dados em sistemas
multiagentes.
10
p. Port. E-mail: lucena@inf.puc-rio.br
Abstract: the use of logs is discussed as a way to record the software
information and its application in the BDI4JADE platform. During the
presentation of the platform is explained the cycle of reasoning of the BDI and
the functioning of the agents, where soon after it is discussed how to
understand the actions and self-adaptations that agents can perform. At this
point we discuss the use of log and how a provenance model may be a better
approach. It is still discussed how this capture should be done, without the
need to insert code in the multiagent platform and without affecting its
architecture. Two codes are presented, the first one being extracted from
BDI4JADE demonstrating the use of log and the other making a comparative with
the use of aspects to capture the data provenance. At the end some consideration
is given and the next steps of the research are presented.
[MCC13/17]
ROSEMBERG, M.R.; SCHWABE, D.; POGGI, M. A hybrid block and stream cipher
encryption algorithm based on colision resistant hash functions.
12
p. Eng. E-mail: poggi@inf.puc-rio.br
Abstract: The Vernam Cipher, or one time pad is considered the only unbreakable
encryption scheme. It consists of a XOR operation between the plain text and a
random key with the same length of the plain text. Once encrypted, the ciphered
message gives nothing the cryptanalyst can use to decipher the encrypted
message. The major drawback of the Vernam cipher is that it is not feasible to
generate and share a key that is as long as the plain text message. Aim: In this
work, We propose a hybrid encryption algorithm, which combines block an stream
cipher characteristics, using hashes, salts and block counters as block key
generators to encrypt a variable length message. The strength of the
cryptosystem depends on the strength of the hash function. Method: We belive
that Collision resistant hash functions (CRHF) may be a very effecitve way to
generate peseudorandom block keys which can be used in a XOR operation with the
plain text. Results: In our experiments, we generated one billion keys for each
hash function we tested. None of them repeated itself. Conclusions: Our
experiments show the key generation algorithm mimics the behavior of the Vernam
Cipher and that the block cipher key will not be repeated for a long time. The
encryption and the decryption algorithms are very simple and easy to implement,
both in software and in hardware.
[MCC14/17]
SIRQUEIRA, T.F.M.; LUCENA, C.J.P. Capturando e analisando proveniência de dados
em sistemas multiagentes.
17
p. Eng. E-mail: lucena@inf.puc-rio.br
Abstract: This paper
presents the development of FProvW3C framework, next to a multi-agent system
where the framework is responsible for collecting and storing the provenance
data. We describe the data structures of the framework, following the W3C PROV
model, the UML diagrams of the framework and the application developed with the
use of the framework, the standards of projects used and the tests that were
carried out to validate the framework and the built system. At the end the next
steps and some results that have been obtained so far are presented.