Skip to main content

Showing 1–12 of 12 results for author: Pace, G J

.
  1. arXiv:2302.01764  [pdf, other

    cs.CR cs.DC cs.NI

    Active External Calls for Blockchain and Distributed Ledger Technologies: Debunking cited inability of Blockchain and DLT to make external calls

    Authors: Joshua Ellul, Gordon J Pace

    Abstract: Blockchain and other distributed ledger technologies have enabled peer-to-peer networks to maintain ledgers with an immutable history and guaranteed computation, all carried out without the need of trusted parties. In practice, few applications of blockchain are closed i.e. do not interact with the world outside the blockchain, and various techniques have been proposed and used to handle such inte… ▽ More

    Submitted 10 January, 2023; originally announced February 2023.

    Report number: 2023-01

  2. arXiv:2105.10399  [pdf, other

    cs.DC cs.CR

    Towards External Calls for Blockchain and Distributed Ledger Technology

    Authors: Joshua Ellul, Gordon J. Pace

    Abstract: It is widely accepted that blockchain systems cannot execute calls to external systems or services due to each node having to reach a deterministic state. However, in this paper we show that this belief is preconceived by demonstrating a method that enables blockchain and distributed ledger technologies to perform calls to external systems initiated from the blockchain/DLT itself.

    Submitted 24 May, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

  3. arXiv:2105.06267  [pdf, ps, other

    cs.CY

    A Pragmatic Approach to Regulating Artificial Intelligence: A Technology Regulator's Perspective

    Authors: Joshua Ellul, Stephen McCarthy, Trevor Sammut, Juanita Brockdorff, Matthew Scerri, Gordon J. Pace

    Abstract: Artificial Intelligence (AI) and the regulation thereof is a topic that is increasingly being discussed within various fora. Various proposals have been made in literature for defining regulatory bodies and/or related regulation. In this paper, we present a pragmatic approach for providing a technology assurance regulatory framework. To the best knowledge of the authors this work presents the firs… ▽ More

    Submitted 15 April, 2021; originally announced May 2021.

  4. arXiv:1811.06740  [pdf, ps, other

    cs.SE

    A Survey of Challenges for Runtime Verification from Advanced Application Domains (Beyond Software)

    Authors: César Sánchez, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliés Falcone, Adrian Francalanza, Srđan Krstić, JoHao M. Lourenço, Dejan Nickovic, Gordon J. Pace, Jose Rufino, Julien Signoles, Dmitriy Traytel, Alexander Weiss

    Abstract: Runtime verification is an area of formal methods that studies the dynamic analysis of execution traces against formal specifications. Typically, the two main activities in runtime verification efforts are the process of creating monitors from specifications, and the algorithms for the evaluation of traces against the generated monitors. Other activities involve the instrumentation of the system t… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

  5. Control-Flow Residual Analysis for Symbolic Automata

    Authors: Shaun Azzopardi, Christian Colombo, Gordon J. Pace

    Abstract: Where full static analysis of systems fails to scale up due to system size, dynamic monitoring has been increasingly used to ensure system correctness. The downside is, however, runtime overheads which are induced by the additional monitoring code instrumented. To address this issue, various approaches have been proposed in the literature to use static analysis in order to reduce monitoring overhe… ▽ More

    Submitted 23 August, 2017; originally announced August 2017.

    Comments: In Proceedings PrePost 2017, arXiv:1708.06889

    Journal ref: EPTCS 254, 2017, pp. 29-43

  6. Proceedings Second International Workshop on Pre- and Post-Deployment Verification Techniques

    Authors: Adrian Francalanza, Gordon J. Pace

    Abstract: This volume contains the proceedings of PrePost 2017 (the Second International Workshop on Pre- and Post-Deployment Verification Techniques), taking place on 19th September 2017 in Torino, Italy, as a satellite event of the 13th International Conference on integrated Formal Methods (iFM 2017). PrePost aims to bridge two areas of research and academic communities: on one hand techniques for analy… ▽ More

    Submitted 23 August, 2017; originally announced August 2017.

    Journal ref: EPTCS 254, 2017

  7. Device-Centric Monitoring for Mobile Device Management

    Authors: Luke Chircop, Christian Colombo, Gordon J. Pace

    Abstract: The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices an… ▽ More

    Submitted 29 March, 2016; originally announced March 2016.

    Comments: In Proceedings FESCA 2016, arXiv:1603.08371

    Journal ref: EPTCS 205, 2016, pp. 31-44

  8. arXiv:1406.2298  [pdf, ps, other

    cs.SE cs.CL

    Explaining Violation Traces with Finite State Natural Language Generation Models

    Authors: Gordon J. Pace, Michael Rosner

    Abstract: An essential element of any verification technique is that of identifying and communicating to the user, system behaviour which leads to a deviation from the expected behaviour. Such behaviours are typically made available as long traces of system actions which would benefit from a natural language explanation of the trace and especially in the context of business logic level specifications. In th… ▽ More

    Submitted 9 June, 2014; originally announced June 2014.

  9. Comprehensive Monitor-Oriented Compensation Programming

    Authors: Christian Colombo, Gordon J. Pace

    Abstract: Compensation programming is typically used in the programming of web service compositions whose correct implementation is crucial due to their handling of security-critical activities such as financial transactions. While traditional exception handling depends on the state of the system at the moment of failure, compensation programming is significantly more challenging and dynamic because it is d… ▽ More

    Submitted 3 April, 2014; originally announced April 2014.

    Comments: In Proceedings FESCA 2014, arXiv:1404.0436

    Journal ref: EPTCS 147, 2014, pp. 47-61

  10. Extensible Technology-Agnostic Runtime Verification

    Authors: Christian Colombo, Adrian Francalanza, Ruth Mizzi, Gordon J. Pace

    Abstract: With numerous specialised technologies available to industry, it has become increasingly frequent for computer systems to be composed of heterogeneous components built over, and using, different technologies and languages. While this enables developers to use the appropriate technologies for specific contexts, it becomes more challenging to ensure the correctness of the overall system. In this pap… ▽ More

    Submitted 20 February, 2013; originally announced February 2013.

    Comments: In Proceedings FESCA 2013, arXiv:1302.4780

    Journal ref: EPTCS 108, 2013, pp. 1-15

  11. Contracts for Interacting Two-Party Systems

    Authors: Gordon J. Pace, Fernando Schapachnik

    Abstract: This article deals with the interrelation of deontic operators in contracts -- an aspect often neglected when considering only one of the involved parties. On top of an automata-based semantics we formalise the onuses that obligations, permissions and prohibitions on one party impose on the other. Such formalisation allows for a clean notion of contract strictness and a derived notion of contract… ▽ More

    Submitted 11 September, 2012; originally announced September 2012.

    Comments: In Proceedings FLACOS 2012, arXiv:1209.1699

    Journal ref: EPTCS 94, 2012, pp. 21-30

  12. Proceedings Sixth Workshop on Formal Languages and Analysis of Contract-Oriented Software

    Authors: Gordon J. Pace, Anders P. Ravn

    Abstract: The ability to negotiate contracts for a wide range of aspects and to provide services conforming to them is a most pressing need in service-oriented architectures. High-level models of contracts are making their way into the area, but application developers are still left to their own devices when it comes to writing code that will comply with a contract concluded before service provision. At the… ▽ More

    Submitted 8 September, 2012; originally announced September 2012.

    Journal ref: EPTCS 94, 2012