This document summarizes a presentation on blockchain for multi-agent systems regarding trust, reputation, and ethics. It discusses how blockchain can be used to manage trust and reputation in multi-agent systems. It presents an example case study of a startup assessment platform using blockchain and agents. It also outlines some open technological and ethical challenges around integrating blockchain and multi-agent systems, such as scalability, standardization, privacy, and liability.
Ethical Concerns and Opportunities in Binding Intelligent Systems and Blockch...Davide Calvaresi
Intelligent systems are becoming increasingly complex and pervade a broad range of application domains, including safety-critical systems such as e-health, finance, and energy management. Traditional approaches are no longer capable of addressing the demand for trust and transparency in these applications. Hence, the current decade is demanding intelligent systems to be autonomous, and in particular explainable, transparent, and trustworthy. To satisfy such requirements, and therefore to comply with the recent EU regulations in the matter (e.g., GDPR), intelligent systems (e.g., Multi-Agent Systems - MAS) and technologies enabling tamper-proof and distributed consensus (e.g., Blockchain Technology - BCT) are conveying into reconciling solutions. Recently, the empowerment of MAS with BCT (and the use of BCT themselves) has gained considerable momentum, raising challenges, and unveiling oppor- tunities. However, several ethical concerns have yet to be faced. This paper elaborates on the entanglement among ethical and technological challenges while proposing and discussing approaches that address these emerging research opportunities.
i. The webinar discussed cloud contracts and service level agreements (SLAs) with a focus on governance.
ii. It covered the scope and control of cloud services, SLA definitions, risk factors for cloud SLAs, and what providers say about cloud adoption drivers and security responsibilities.
iii. Key recommendations included examining a provider's subcontractors, forming a committee to develop contract requirements, and reviewing existing controls to identify issues to include in contracts and SLAs.
Euro Cloud 23 5 12 Interoute The Cloud Is Great But Vdc Is Betterjon_graham1977
The cloud is great, but a Virtual Data Centre is better according to the document. A Virtual Data Centre provides public cloud simplicity with private cloud security, including a true cloud service with a pan-European infrastructure as a service, location sensitivity, MPLS integration, no vendor lock-in, network control instead of emulation, 24/7 support, and security and compliance. Interoute guarantees cloud success with its Virtual Data Centre offering.
Valerie E
The document provides an overview of key aspects of vendor due diligence that credit unions should consider. It discusses what due diligence is, its purpose in helping credit unions evaluate vendors and partnerships, and when it should be conducted. Specifically, it outlines areas to focus on such as background checks, contract provisions, mortgage brokers/correspondents relationships, and "red flags" that warrant further scrutiny. The document aims to help credit unions properly assess vendors and manage associated risks.
Edgington, CUCE, BSACS
Cloud Computing: Is Your Bank on Board?cloudecision
Accenture stresses that, “As banks adapt to changes in their competitive and technology environments, cloud computing will play a major role. Cloud’s combination of low cost and high scalability, effectively unlimited processing power and storage, unprecedented agility and speed to market, and variable pay-per-use cost structures all support the qualities that banks will need to compete and win in the future.”
1) The document discusses how trust and security have evolved from the analogue to the digital world. In the digital world, identity and access management (IAM) helps build trust through managing digital identities and enforcing security policies.
2) IAM has two parts - identity management, which manages the lifecycle of digital identities, and access management, which regulates access to information assets through role-based policies.
3) Together, identity management and access management provide a framework for secure digital transactions that supports both organizations' and individuals' needs for trust online.
4IRE Labs’ main focus is on finTech and supply chain. We have created an array of branded white-label products serving the crowdfunding, private blockchains and other applications. The Blockchain platforms we have experience with include: Ethereum, Quorum, Solidity, Hyperledger Fabric, Multichain, NEO, R3, Exonum, Monax.
The document summarizes the agenda for a pre-conference workshop on cloud identity at a summit on June 6th, 2016. The workshop will include presentations from the chairs of various working groups at the Kantara Initiative on topics like user managed access, identity assurance, consent and information sharing, and privacy services. There will also be panel discussions and opportunities to learn about Kantara's programs and sign a professional pledge. The workshop aims to explore collaboration between governments, industry and users to better manage data and digital identity.
Ethical Concerns and Opportunities in Binding Intelligent Systems and Blockch...Davide Calvaresi
Intelligent systems are becoming increasingly complex and pervade a broad range of application domains, including safety-critical systems such as e-health, finance, and energy management. Traditional approaches are no longer capable of addressing the demand for trust and transparency in these applications. Hence, the current decade is demanding intelligent systems to be autonomous, and in particular explainable, transparent, and trustworthy. To satisfy such requirements, and therefore to comply with the recent EU regulations in the matter (e.g., GDPR), intelligent systems (e.g., Multi-Agent Systems - MAS) and technologies enabling tamper-proof and distributed consensus (e.g., Blockchain Technology - BCT) are conveying into reconciling solutions. Recently, the empowerment of MAS with BCT (and the use of BCT themselves) has gained considerable momentum, raising challenges, and unveiling oppor- tunities. However, several ethical concerns have yet to be faced. This paper elaborates on the entanglement among ethical and technological challenges while proposing and discussing approaches that address these emerging research opportunities.
i. The webinar discussed cloud contracts and service level agreements (SLAs) with a focus on governance.
ii. It covered the scope and control of cloud services, SLA definitions, risk factors for cloud SLAs, and what providers say about cloud adoption drivers and security responsibilities.
iii. Key recommendations included examining a provider's subcontractors, forming a committee to develop contract requirements, and reviewing existing controls to identify issues to include in contracts and SLAs.
Euro Cloud 23 5 12 Interoute The Cloud Is Great But Vdc Is Betterjon_graham1977
The cloud is great, but a Virtual Data Centre is better according to the document. A Virtual Data Centre provides public cloud simplicity with private cloud security, including a true cloud service with a pan-European infrastructure as a service, location sensitivity, MPLS integration, no vendor lock-in, network control instead of emulation, 24/7 support, and security and compliance. Interoute guarantees cloud success with its Virtual Data Centre offering.
Valerie E
The document provides an overview of key aspects of vendor due diligence that credit unions should consider. It discusses what due diligence is, its purpose in helping credit unions evaluate vendors and partnerships, and when it should be conducted. Specifically, it outlines areas to focus on such as background checks, contract provisions, mortgage brokers/correspondents relationships, and "red flags" that warrant further scrutiny. The document aims to help credit unions properly assess vendors and manage associated risks.
Edgington, CUCE, BSACS
Cloud Computing: Is Your Bank on Board?cloudecision
Accenture stresses that, “As banks adapt to changes in their competitive and technology environments, cloud computing will play a major role. Cloud’s combination of low cost and high scalability, effectively unlimited processing power and storage, unprecedented agility and speed to market, and variable pay-per-use cost structures all support the qualities that banks will need to compete and win in the future.”
1) The document discusses how trust and security have evolved from the analogue to the digital world. In the digital world, identity and access management (IAM) helps build trust through managing digital identities and enforcing security policies.
2) IAM has two parts - identity management, which manages the lifecycle of digital identities, and access management, which regulates access to information assets through role-based policies.
3) Together, identity management and access management provide a framework for secure digital transactions that supports both organizations' and individuals' needs for trust online.
4IRE Labs’ main focus is on finTech and supply chain. We have created an array of branded white-label products serving the crowdfunding, private blockchains and other applications. The Blockchain platforms we have experience with include: Ethereum, Quorum, Solidity, Hyperledger Fabric, Multichain, NEO, R3, Exonum, Monax.
The document summarizes the agenda for a pre-conference workshop on cloud identity at a summit on June 6th, 2016. The workshop will include presentations from the chairs of various working groups at the Kantara Initiative on topics like user managed access, identity assurance, consent and information sharing, and privacy services. There will also be panel discussions and opportunities to learn about Kantara's programs and sign a professional pledge. The workshop aims to explore collaboration between governments, industry and users to better manage data and digital identity.
The document discusses Ventiv Technology's transition from Aon eSolutions to an independent company. It highlights key priorities such as making the change smooth for customers. It also previews upcoming innovations including a new user interface for RiskConsole and a universal data intake tool. The CEO introduces the new issue of the 3SIXTY publication and invites readers to learn more through the Ventiv blog.
This document summarizes a white paper on how blockchain technology can contribute to sustainable development goals. It discusses how blockchain can improve development aid effectiveness through increased transparency, accountability and direct aid distribution. Blockchain allows for trustless verification of identities and transactions, reducing corruption risks. The document explores several potential applications of blockchain including digital identity, remittances, supply chain management, energy access and property rights. It argues that blockchain can help meet development goals by establishing trust and distributing resources efficiently.
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...IRJET Journal
This document proposes a reputation-based trust management framework called CloudArmor to address trust issues in cloud computing. It describes three key challenges of trust management in clouds: 1) preserving privacy of sensitive user information, 2) protecting cloud services from malicious users providing misleading feedback, and 3) guaranteeing availability of trust management services given the dynamic cloud environment. The proposed framework includes a protocol to verify credibility of feedback while preserving privacy, an adaptive credibility model to measure feedback credibility and identify malicious users, and an availability model to manage availability of the decentralized trust management service.
Presentation given by Dr K Subramanian, Director and Professor, Advance Centre for Informatic and Innovative Learning IGNOU on August 3rd, 2011 at eWorld Forum (www.eworldforum.net) in the session Information Management and Security
I dispel some myths about distributed ledgers (aka "blockchains") in an institutional context. I explain why they are hard to implement and what they are good for, in the real world.
TierPoint White Paper_With all due diligence_2015sllongo3
Understanding true security capabilities in the cloud environment is an important part of the evaluation process of a prospective provider. This guide will help you understand what needs investigating before turning your data over to the cloud.
This white paper discusses the importance of conducting thorough due diligence on cloud computing providers to evaluate their security capabilities. It outlines four key areas that should be examined: 1) verifying the provider's infrastructure and standardized equipment; 2) checking for important security certifications; 3) assessing the due diligence conducted by the provider themselves; and 4) validating the provider's data protection and security measures. Conducting proper due diligence is essential to ensure a cloud provider can adequately protect a customer's data and systems.
The document provides steps for requesting writing assistance from HelpWriting.net. It outlines the registration process, completing an order form with instructions and deadline, and reviewing writer bids before authorizing payment after receiving the completed paper. It notes the site offers free revisions and promises original, high-quality content with refunds for plagiarism.
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...IJNSA Journal
This paper argues for the consideration of a decentralized, open, interoperable identity framework as a secure, scalable, user-centered meta-platform capable of leveraging many aggregate network advantages and delivery options for education and healthcare providers. An overview of the shortfalls and vulnerabilities of the current Internet and systems for identity management is first explained, followed by a summary of the status of development and primary proponents of decentralized, blockchain-enabled, self-sovereign identification (SSI). An examination of the Key Event Receipt Infrastructure (KERI) open-source decentralized key management infrastructure (DKMI) and its primary root-of-trust in self-certifying identifiers (SCID) is evaluated. This paper recommends KERI for consideration as a potential meta-platform overlay and solution for both the education and health industries as a means of attaining their primary goal of being more user versus institution-centric in their core interactions and processes. Finally, some pathways for future research are recommended.
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Dana Gardner
Transcript of a discussion on how a major financial transactions provider is exploiting cloud models to extend a distributed real-time payment capability across the globe despite some of the strictest security and performance requirements.
With the recent increase demand for cloud services, handling clients’ needs is getting increasingly
challenging. Responding to all requesting clients with no exception could lead to security breaches, and
since it is the provider’s responsibility to secure not only the offered cloud services but also the data, it is
important to ensure clients reliability. Although filtering clients in the cloud is not so common, it is
required to assure cloud safety.
In this paper, we made use of multi agent system interaction mechanisms to handle the cloud interactions
for the providers’ side, and of Particle Swarm Optimization to select the and determine the accurate trust
weight and therefore to filtrate the clients by determining malicious and untrustworthy clients. The
selection depends on previous knowledge and overall rating of trusted peers. The conducted experiments
proves that the combination between MAS, PSO and trust outputs relevant results with different number of
peers, the solution is able to converge to the best result after small number of iterations. To explore more
space and scenarios, synthetic data was generated to improve the model’s precision .
The document proposes a model that uses multi-agent systems and particle swarm optimization to select trustworthy cloud clients. Agents represent cloud providers and clients and interact to determine clients' trustworthiness based on previous feedback. The model converges to identify malicious clients after a small number of iterations. Experiments showed the combination of these techniques produced relevant results for different numbers of peers.
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
The three articles proposed different approaches to improve elasticity and resource scaling in cloud computing. Islam et al. defined metrics to quantify elasticity for cloud consumers. Nguyen et al. designed an elastic resource scaling system using prediction to allocate resources proactively based on future needs. Han et al. developed an approach to detect and analyze bottlenecks in multi-tier cloud applications to enable elastic scaling. The articles aim to enhance cloud elasticity through metrics, predictive allocation, and bottleneck analysis for improved resource utilization and user experience.
BLOCK512 is a blockchain consulting firm that provides insights, advisory services, and assistance with accelerating blockchain-optimized solutions. The document defines key blockchain concepts like distributed ledgers, consensus, smart contracts, and different types of cryptocurrencies. It also notes the significant estimated savings and investment that blockchain adoption could provide for banks and financial technology companies. The final sections discuss questions organizations should consider around how blockchain may impact their competitors, customers, processes, business models and leadership strategies.
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...IRJET Journal
This document discusses the potential for blockchain technology to improve identity and access management (IAM). It begins by providing background on IAM and how digital identities are currently managed. It then introduces blockchain technology and explores how some of its key properties like distributed ledgers, encryption, and consensus protocols could be applied to IAM. However, it also notes several challenges for blockchain in IAM, such as ensuring privacy and security. The document proposes a conceptual model for how a blockchain-based IAM system might work by treating identities, entitlements, and access events as units of value on a decentralized ledger. But it acknowledges that blockchain is still a work in progress and may not be suitable to manage all aspects of IAM. The aim
This document provides guidance for law firms on basic cyber security controls and governance. It recommends that firms start by understanding the risks to client information, intellectual property and billing systems. It also advises implementing cyber security best practices from frameworks like NIST and the SANS 20 critical controls. These controls address technical areas like device/software inventory, secure configurations, vulnerability management and more. The document suggests some enhanced protections for law firms, including cyber threat intelligence to monitor digital shadows and deception/decoy technologies to detect advanced threats that evade other defenses. It emphasizes that cyber security is important for maintaining client trust and demonstrates a firm's trustworthiness in today's environment where breaches are assumed.
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills MN
By harnessing the power of High Flux Vacuum Membrane Distillation, Travis Hills from MN envisions a future where clean and safe drinking water is accessible to all, regardless of geographical location or economic status.
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...Advanced-Concepts-Team
Presentation in the Science Coffee of the Advanced Concepts Team of the European Space Agency on the 07.06.2024.
Speaker: Diego Blas (IFAE/ICREA)
Title: Gravitational wave detection with orbital motion of Moon and artificial
Abstract:
In this talk I will describe some recent ideas to find gravitational waves from supermassive black holes or of primordial origin by studying their secular effect on the orbital motion of the Moon or satellites that are laser ranged.
More Related Content
Similar to BCT4MAS - Blockchain for Multi-Agent Systems - NTN invited talk
The document discusses Ventiv Technology's transition from Aon eSolutions to an independent company. It highlights key priorities such as making the change smooth for customers. It also previews upcoming innovations including a new user interface for RiskConsole and a universal data intake tool. The CEO introduces the new issue of the 3SIXTY publication and invites readers to learn more through the Ventiv blog.
This document summarizes a white paper on how blockchain technology can contribute to sustainable development goals. It discusses how blockchain can improve development aid effectiveness through increased transparency, accountability and direct aid distribution. Blockchain allows for trustless verification of identities and transactions, reducing corruption risks. The document explores several potential applications of blockchain including digital identity, remittances, supply chain management, energy access and property rights. It argues that blockchain can help meet development goals by establishing trust and distributing resources efficiently.
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...IRJET Journal
This document proposes a reputation-based trust management framework called CloudArmor to address trust issues in cloud computing. It describes three key challenges of trust management in clouds: 1) preserving privacy of sensitive user information, 2) protecting cloud services from malicious users providing misleading feedback, and 3) guaranteeing availability of trust management services given the dynamic cloud environment. The proposed framework includes a protocol to verify credibility of feedback while preserving privacy, an adaptive credibility model to measure feedback credibility and identify malicious users, and an availability model to manage availability of the decentralized trust management service.
Presentation given by Dr K Subramanian, Director and Professor, Advance Centre for Informatic and Innovative Learning IGNOU on August 3rd, 2011 at eWorld Forum (www.eworldforum.net) in the session Information Management and Security
I dispel some myths about distributed ledgers (aka "blockchains") in an institutional context. I explain why they are hard to implement and what they are good for, in the real world.
TierPoint White Paper_With all due diligence_2015sllongo3
Understanding true security capabilities in the cloud environment is an important part of the evaluation process of a prospective provider. This guide will help you understand what needs investigating before turning your data over to the cloud.
This white paper discusses the importance of conducting thorough due diligence on cloud computing providers to evaluate their security capabilities. It outlines four key areas that should be examined: 1) verifying the provider's infrastructure and standardized equipment; 2) checking for important security certifications; 3) assessing the due diligence conducted by the provider themselves; and 4) validating the provider's data protection and security measures. Conducting proper due diligence is essential to ensure a cloud provider can adequately protect a customer's data and systems.
The document provides steps for requesting writing assistance from HelpWriting.net. It outlines the registration process, completing an order form with instructions and deadline, and reviewing writer bids before authorizing payment after receiving the completed paper. It notes the site offers free revisions and promises original, high-quality content with refunds for plagiarism.
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...IJNSA Journal
This paper argues for the consideration of a decentralized, open, interoperable identity framework as a secure, scalable, user-centered meta-platform capable of leveraging many aggregate network advantages and delivery options for education and healthcare providers. An overview of the shortfalls and vulnerabilities of the current Internet and systems for identity management is first explained, followed by a summary of the status of development and primary proponents of decentralized, blockchain-enabled, self-sovereign identification (SSI). An examination of the Key Event Receipt Infrastructure (KERI) open-source decentralized key management infrastructure (DKMI) and its primary root-of-trust in self-certifying identifiers (SCID) is evaluated. This paper recommends KERI for consideration as a potential meta-platform overlay and solution for both the education and health industries as a means of attaining their primary goal of being more user versus institution-centric in their core interactions and processes. Finally, some pathways for future research are recommended.
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Dana Gardner
Transcript of a discussion on how a major financial transactions provider is exploiting cloud models to extend a distributed real-time payment capability across the globe despite some of the strictest security and performance requirements.
With the recent increase demand for cloud services, handling clients’ needs is getting increasingly
challenging. Responding to all requesting clients with no exception could lead to security breaches, and
since it is the provider’s responsibility to secure not only the offered cloud services but also the data, it is
important to ensure clients reliability. Although filtering clients in the cloud is not so common, it is
required to assure cloud safety.
In this paper, we made use of multi agent system interaction mechanisms to handle the cloud interactions
for the providers’ side, and of Particle Swarm Optimization to select the and determine the accurate trust
weight and therefore to filtrate the clients by determining malicious and untrustworthy clients. The
selection depends on previous knowledge and overall rating of trusted peers. The conducted experiments
proves that the combination between MAS, PSO and trust outputs relevant results with different number of
peers, the solution is able to converge to the best result after small number of iterations. To explore more
space and scenarios, synthetic data was generated to improve the model’s precision .
The document proposes a model that uses multi-agent systems and particle swarm optimization to select trustworthy cloud clients. Agents represent cloud providers and clients and interact to determine clients' trustworthiness based on previous feedback. The model converges to identify malicious clients after a small number of iterations. Experiments showed the combination of these techniques produced relevant results for different numbers of peers.
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
The three articles proposed different approaches to improve elasticity and resource scaling in cloud computing. Islam et al. defined metrics to quantify elasticity for cloud consumers. Nguyen et al. designed an elastic resource scaling system using prediction to allocate resources proactively based on future needs. Han et al. developed an approach to detect and analyze bottlenecks in multi-tier cloud applications to enable elastic scaling. The articles aim to enhance cloud elasticity through metrics, predictive allocation, and bottleneck analysis for improved resource utilization and user experience.
BLOCK512 is a blockchain consulting firm that provides insights, advisory services, and assistance with accelerating blockchain-optimized solutions. The document defines key blockchain concepts like distributed ledgers, consensus, smart contracts, and different types of cryptocurrencies. It also notes the significant estimated savings and investment that blockchain adoption could provide for banks and financial technology companies. The final sections discuss questions organizations should consider around how blockchain may impact their competitors, customers, processes, business models and leadership strategies.
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...IRJET Journal
This document discusses the potential for blockchain technology to improve identity and access management (IAM). It begins by providing background on IAM and how digital identities are currently managed. It then introduces blockchain technology and explores how some of its key properties like distributed ledgers, encryption, and consensus protocols could be applied to IAM. However, it also notes several challenges for blockchain in IAM, such as ensuring privacy and security. The document proposes a conceptual model for how a blockchain-based IAM system might work by treating identities, entitlements, and access events as units of value on a decentralized ledger. But it acknowledges that blockchain is still a work in progress and may not be suitable to manage all aspects of IAM. The aim
This document provides guidance for law firms on basic cyber security controls and governance. It recommends that firms start by understanding the risks to client information, intellectual property and billing systems. It also advises implementing cyber security best practices from frameworks like NIST and the SANS 20 critical controls. These controls address technical areas like device/software inventory, secure configurations, vulnerability management and more. The document suggests some enhanced protections for law firms, including cyber threat intelligence to monitor digital shadows and deception/decoy technologies to detect advanced threats that evade other defenses. It emphasizes that cyber security is important for maintaining client trust and demonstrates a firm's trustworthiness in today's environment where breaches are assumed.
Similar to BCT4MAS - Blockchain for Multi-Agent Systems - NTN invited talk (20)
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills MN
By harnessing the power of High Flux Vacuum Membrane Distillation, Travis Hills from MN envisions a future where clean and safe drinking water is accessible to all, regardless of geographical location or economic status.
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...Advanced-Concepts-Team
Presentation in the Science Coffee of the Advanced Concepts Team of the European Space Agency on the 07.06.2024.
Speaker: Diego Blas (IFAE/ICREA)
Title: Gravitational wave detection with orbital motion of Moon and artificial
Abstract:
In this talk I will describe some recent ideas to find gravitational waves from supermassive black holes or of primordial origin by studying their secular effect on the orbital motion of the Moon or satellites that are laser ranged.
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...Sérgio Sacani
Context. With a mass exceeding several 104 M⊙ and a rich and dense population of massive stars, supermassive young star clusters
represent the most massive star-forming environment that is dominated by the feedback from massive stars and gravitational interactions
among stars.
Aims. In this paper we present the Extended Westerlund 1 and 2 Open Clusters Survey (EWOCS) project, which aims to investigate
the influence of the starburst environment on the formation of stars and planets, and on the evolution of both low and high mass stars.
The primary targets of this project are Westerlund 1 and 2, the closest supermassive star clusters to the Sun.
Methods. The project is based primarily on recent observations conducted with the Chandra and JWST observatories. Specifically,
the Chandra survey of Westerlund 1 consists of 36 new ACIS-I observations, nearly co-pointed, for a total exposure time of 1 Msec.
Additionally, we included 8 archival Chandra/ACIS-S observations. This paper presents the resulting catalog of X-ray sources within
and around Westerlund 1. Sources were detected by combining various existing methods, and photon extraction and source validation
were carried out using the ACIS-Extract software.
Results. The EWOCS X-ray catalog comprises 5963 validated sources out of the 9420 initially provided to ACIS-Extract, reaching a
photon flux threshold of approximately 2 × 10−8 photons cm−2
s
−1
. The X-ray sources exhibit a highly concentrated spatial distribution,
with 1075 sources located within the central 1 arcmin. We have successfully detected X-ray emissions from 126 out of the 166 known
massive stars of the cluster, and we have collected over 71 000 photons from the magnetar CXO J164710.20-455217.
The binding of cosmological structures by massless topological defectsSérgio Sacani
Assuming spherical symmetry and weak field, it is shown that if one solves the Poisson equation or the Einstein field
equations sourced by a topological defect, i.e. a singularity of a very specific form, the result is a localized gravitational
field capable of driving flat rotation (i.e. Keplerian circular orbits at a constant speed for all radii) of test masses on a thin
spherical shell without any underlying mass. Moreover, a large-scale structure which exploits this solution by assembling
concentrically a number of such topological defects can establish a flat stellar or galactic rotation curve, and can also deflect
light in the same manner as an equipotential (isothermal) sphere. Thus, the need for dark matter or modified gravity theory is
mitigated, at least in part.
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Leonel Morgado
Current descriptions of immersive learning cases are often difficult or impossible to compare. This is due to a myriad of different options on what details to include, which aspects are relevant, and on the descriptive approaches employed. Also, these aspects often combine very specific details with more general guidelines or indicate intents and rationales without clarifying their implementation. In this paper we provide a method to describe immersive learning cases that is structured to enable comparisons, yet flexible enough to allow researchers and practitioners to decide which aspects to include. This method leverages a taxonomy that classifies educational aspects at three levels (uses, practices, and strategies) and then utilizes two frameworks, the Immersive Learning Brain and the Immersion Cube, to enable a structured description and interpretation of immersive learning cases. The method is then demonstrated on a published immersive learning case on training for wind turbine maintenance using virtual reality. Applying the method results in a structured artifact, the Immersive Learning Case Sheet, that tags the case with its proximal uses, practices, and strategies, and refines the free text case description to ensure that matching details are included. This contribution is thus a case description method in support of future comparative research of immersive learning cases. We then discuss how the resulting description and interpretation can be leveraged to change immersion learning cases, by enriching them (considering low-effort changes or additions) or innovating (exploring more challenging avenues of transformation). The method holds significant promise to support better-grounded research in immersive learning.
Current Ms word generated power point presentation covers major details about the micronuclei test. It's significance and assays to conduct it. It is used to detect the micronuclei formation inside the cells of nearly every multicellular organism. It's formation takes place during chromosomal sepration at metaphase.
The debris of the ‘last major merger’ is dynamically youngSérgio Sacani
The Milky Way’s (MW) inner stellar halo contains an [Fe/H]-rich component with highly eccentric orbits, often referred to as the
‘last major merger.’ Hypotheses for the origin of this component include Gaia-Sausage/Enceladus (GSE), where the progenitor
collided with the MW proto-disc 8–11 Gyr ago, and the Virgo Radial Merger (VRM), where the progenitor collided with the
MW disc within the last 3 Gyr. These two scenarios make different predictions about observable structure in local phase space,
because the morphology of debris depends on how long it has had to phase mix. The recently identified phase-space folds in Gaia
DR3 have positive caustic velocities, making them fundamentally different than the phase-mixed chevrons found in simulations
at late times. Roughly 20 per cent of the stars in the prograde local stellar halo are associated with the observed caustics. Based
on a simple phase-mixing model, the observed number of caustics are consistent with a merger that occurred 1–2 Gyr ago.
We also compare the observed phase-space distribution to FIRE-2 Latte simulations of GSE-like mergers, using a quantitative
measurement of phase mixing (2D causticality). The observed local phase-space distribution best matches the simulated data
1–2 Gyr after collision, and certainly not later than 3 Gyr. This is further evidence that the progenitor of the ‘last major merger’
did not collide with the MW proto-disc at early times, as is thought for the GSE, but instead collided with the MW disc within
the last few Gyr, consistent with the body of work surrounding the VRM.
Authoring a personal GPT for your research and practice: How we created the Q...Leonel Morgado
Thematic analysis in qualitative research is a time-consuming and systematic task, typically done using teams. Team members must ground their activities on common understandings of the major concepts underlying the thematic analysis, and define criteria for its development. However, conceptual misunderstandings, equivocations, and lack of adherence to criteria are challenges to the quality and speed of this process. Given the distributed and uncertain nature of this process, we wondered if the tasks in thematic analysis could be supported by readily available artificial intelligence chatbots. Our early efforts point to potential benefits: not just saving time in the coding process but better adherence to criteria and grounding, by increasing triangulation between humans and artificial intelligence. This tutorial will provide a description and demonstration of the process we followed, as two academic researchers, to develop a custom ChatGPT to assist with qualitative coding in the thematic data analysis process of immersive learning accounts in a survey of the academic literature: QUAL-E Immersive Learning Thematic Analysis Helper. In the hands-on time, participants will try out QUAL-E and develop their ideas for their own qualitative coding ChatGPT. Participants that have the paid ChatGPT Plus subscription can create a draft of their assistants. The organizers will provide course materials and slide deck that participants will be able to utilize to continue development of their custom GPT. The paid subscription to ChatGPT Plus is not required to participate in this workshop, just for trying out personal GPTs during it.
2. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
2Introduction
Davide’s Research Areas
Real-Time Multi-Agent Systems (RT-MAS)
Blockchain & Multi-Agent Systems (BCT4MAS)
{B0}
{B1}
{B2}
{E1}
{E2}
Proximal joint
Distal joint
Distallink
Proximallink
Digital (tele)rehabilitation (DTR)
Explainability in MAS (XMAS)
Real-Time Tire Monitoring (SmartTyre)
Ambient
Assisted Living
Safety-critical
Applications
Tourism
Distributed AI
eHealth
3. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
3
hard-coded, semi-automated, autonomous
static, uncertain, unpredictable
Scenarios
Introduction
Strict Dependability
Timing Guarantees
Embedded Systems
Safety and Security
Scarcity of Resources
…
Abstraction
Accountability
Trusted entities
Trusted data
Trusted interactions
Distribute Thinking
Flexibility
Reconfigurability
Robustness
Ubiquity
…
many systems, still one challenge
4. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
4MAS & BCT
Image: Peter Bergstrom
5. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
«An agent is anything that can be viewed as perceiving its environment through sensors
and acting upon that environment through effectors.»
5
[Russell & Norvig]
«Autonomous agents are computational systems that inhabit some complex dynamic environment, sense and act autonomously in this
environment, and by doing so realize a set of goals or tasks for which they are designed.» [Maes]
«...software “components” that communicate with their peers by exchanging messages in an expressive agent communication language.Agents can be as
simple as subroutines; but typically they are larger entities with some sort of persistent control.» [Genesereth & Ketchpel]
«We consider agents to be systems that are situated in some environment. By this, we mean that agents are capable of sensing their
environment (via sensors), and have a repertoire of possible actions that they can perform (via effectors or actuators) in order to modify
their environment.» [Wooldridge]
Multi-Agent Systems in a nutshell
6. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
6Multi-Agent Systems in a nutshell
Knowledge
Behavior(s)
Interaction Policies
Autonomy
Social Ability
Reactivity Proactivity
MobilityRationality
Machines Learning
Independent decision making
(without human action)
7. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
7Multi-Agent Systems in a nutshell
Knowledge
Behavior(s)
Interaction Policies
Autonomy
Social Ability
Reactivity Proactivity
MobilityRationality
Machines Learning
To execute
GOAL driven actions
8. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
8Multi-Agent Systems in a nutshell
Knowledge
Behavior(s)
Interaction Policies
Autonomy
Social Ability
Reactivity Proactivity
MobilityRationality
Machines Learning
Migration on
several network nodes
9. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
9Multi-Agent Systems in a nutshell
Knowledge
Behavior(s)
Interaction Policies
Autonomy
Social Ability
Reactivity Proactivity
MobilityRationality
Machines Learning
Self-adaption to
user needs, environmental needs
10. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
10Multi-Agent Systems in a nutshell
Knowledge
Behavior(s)
Interaction Policies
Autonomy
Social Ability
Reactivity Proactivity
MobilityRationality
Machines Learning
Communicate with other agent
to (share - require - contract)
informations - performance
11. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
11Multi-Agent Systems in a nutshell
Knowledge
Behavior(s)
Interaction Policies
Autonomy
Social Ability
Reactivity Proactivity
MobilityRationality
Machines Learning
Always GOALs oriented
Never to avoid
their achievement
12. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
12Multi-Agent Systems in a nutshell
Knowledge
Behavior(s)
Interaction Policies
Autonomy
Social Ability
Reactivity Proactivity
MobilityRationality
Machines Learning
React to environmental changes
or due some events
13. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
13Multi-Agent Systems in a nutshell
Reasoning upon Explicit
symbolic representation
Logic is easily understood
Robustness
…
Response Time
Complexity
faithfully world
representation
Require High
standardization
Security & Trust
14. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
14MAS Design
Domain
Model
Computational
Persuasive
User
Profile
State
Machine
Coordinator
Mediator
Coach
privacy sphere
Behavior change Agent
Calbimonte, J. P., Calvaresi, D., Dubosson, F., & Schumacher, M. (2019,
June). Towards profile and domain modelling in agent-based applications
for behavior change. In International Conference on Practical Applications
of Agents and Multi-Agent Systems (pp. 16-28). Springer, Cham.Behavior
15. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
15Trust in MAS
“a belief an agent has that the other party will do what it says it will
(being honest and reliable)
or reciprocate
(being reciprocative for the common good of both),
given an opportunity to defect to get higher payoffs”
Calvaresi, D., Calbimonte, J. P., Dubovitskaya, A., Mattioli, V., Piguet, J. G., & Schumacher, M. (2019). The good, the bad, and the ethical implications of bridging blockchain and multi-agent systems. Information, 10(12), 363.
16. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
16Introduction
BCT in a nutshell
Scope What’s a block… chain?
Ledger
Distributed
Secured
Immutable
…
Transaction 20
Transaction 21
21/6/18 12:00
038314966…
0b53a3166…
Transaction 22
Transaction 23
Transaction 24
21/6/18 13:00
0b53a3166…
110c5321a1…
Transaction 25
Transaction 26
…
21/6/18 16:00
110c5321a1…
xx1c5x3a1…
Block30 Block31 Block32
Block ID (hash of the contents)
Transactions
TimeStamp
Previous Block ID
Logic
Replicate the single DB
and the logic
17. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
17Introduction
BCT in a nutshell
LEDGER
WORLD STATE
UPDATED
LOGIC
1
2
3
4
5
6
Transaction (TXs) sent to the Peer
Peer invokes Smart Contract
Peer uses WS to generate the TXs
TXs grouped in a new Block
New Block added to the BC
18. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
18Introduction
Possible scenarios
BC-A*
BC-A*
19. 19Certificates and Identity management
| |Davide Calvaresi Trusted Reg, Neg and Service eval in MAS via BCT WI, Santiago - 4.12.2018
Membership
Service
AMS
DF
Can I
Join?
Here is
your eCert
1
2
3
5
Let me
see
(CA-A)
WHO WHAT
ag_1 serv_1
ag_1 serv_2
ag_2 serv_1
4
(BC-A)
1 2
3 4
5
20. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
20
BC-A
InvokeChaincode
Assets Ledger
Register Agent
Add Service
Register Interaction
Map Agent-Service
Edit Agent
Edit Service
Delete Agent
Delete Servie
Create Activity
Update Reputation
CA-A
Membership Service Issue Valid Identities
Identify Roles
Manage CRL
Certification
Authorities
Core BehaviorView Controller Model
Register Agent
Add Service
Add Interaction
Edit Agent
Edit Service
Delete Agent
Delete Service
Update Reputation
Issue Certificate
Verify Credentials
Current Architecture
21. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
21
IdService
Name
Description
Cost
Time
...
Service
IdReputation
IdService
IdAgent
AgentRole
Value
Reputation
0..n1
IdServiceAgentAssociation
IdService
IdAgent
Cost
Time
ServiceAgentAssociation
0..n
1
IdAgent
Name
Address
...
Agent
0..n 1
IdInteraction
IdWritierAgent
IdDemanderAgent
IdExecutorAgent
IdExecutedService
TimeStamp
Value
Interaction
0..n
1
0..n
1
0..n
1
Current Architecture
indexes
22. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
22
|
Case Study
InnMind Startup assessment platform
Startups InvestorsExperts
Startup Expert Investor
Startup B0, B11 B2, B5, B10, B11 B3, B11
Expert B5, B10, B11,B12 B12 B0, B4* B6, B11
Investor B8, B11 B9, B10, B11 B0, B7
maximizing their interests
having freedom of joining, serving,
and leaving the platform at any time.
organize coalitions
foster selfish interests manipulating and
exploiting other actors or some dynamics in the platform
Behavior Action
B0 Actor profiling
B1 Startup self-assessment
B2 Request of assessment
B3 Request visualization
B4 Exner assessment
B5 Assessment response
B6 Suggestion
B7 Success rate
B8 Demand for an expert
assessmentB9 Demand for assessing a startup
B10 Assessment negotiation
B11 Startup evaluation
B12 Assessment proposal
Calvaresi, D., Voronova, E., Calbimonte, J. P.,
Mattioli, V., & Schumacher, M. (2019, June). A
startup assessment approach based on multi-agent
and blockchain technologies. In International
Conference on Practical Applications of Agents and
Multi-Agent Systems (pp. 67-79). Springer, Cham.
23. Blockchain for Multi-Agent Systems: Trust, Reputation, Ethics| |Davide Calvaresi TNT group 17.9.2020
Case Study
InnMind Startup assessment platform
EXP2STUP1 EXP1STUP2
(a)
(b)
(c)
B0
B1
B0 B0
B2
(B10)
(B10)
B5
(B11)
(B10)
B5
B11
B12
B0
B2
23
24. Blockchain for Multi-Agent Systems: Trust, Reputation, Ethics| |Davide Calvaresi TNT group 17.9.2020
Case Study
InnMind Startup assessment platform
eval
BCT EX DM
Service Negotiation
donedone + eval
ok - revise
revise eval?
(a)
EX = Executor; DM = Demander
no
revise eval?
(b)
Disagreement resolution policy
eval(EX)
≄eval(DM)
24
26. Blockchain for Multi-Agent Systems: Trust, Reputation, Ethics| |Davide Calvaresi TNT group 17.9.2020
Case Study
InnMind Startup assessment platform
26
27. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
27Discussion
Lesson learnt in BCT 4 MAS
WHEN and HOW to apply
in function of requirements and context.
BREAKTHROUGH and DOMAINS
(DIS)ADVANTAGES
OLD or NEW
technologies/techniques?
TECHNOLOGIES
Prevention of Exploitation and Deception
Spot (un)intentional biases
Remove the need for TTP
Non-negligible Overhead
Complex integration
28. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
28Discussion
TECHNOLOGICAL Open Challenges of BCT 4 MAS
Multiple (Membership Service + Orderer) entities in permissioned BCT;
Scalability in coupling BCT and MAS;
Standardization and Reconciliation of SC for reputation mgm in holistic systems
Ensuring reliability of the mechanisms bridging the two technologies
Verify correctness of (new/amended) smart contracts
Improve privacy and anonymity
Technical immutability of smart contracts in enterprise software contexts
Can an AI entities (i.e., agents) autonomously develop SC?
29. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
29Discussion
ETHICAL Open Challenges of BCT 4 MAS (i)
Erosion of the socio-cultural blockchain ecosystem
(technological accessibility and egalitarian ecosystem?)
Smart contract complexity as Blockchain Fraud
(unexpected hard-to-foresee emergent properties and ML?)
Theoretical and effective empowerment: from accessibility to workability
(workarounds and implications?)
The persistent need for intermediaries to implement smart contracts
(who and how develops SC and liability?)
Calvaresi, D., Piguet, J. G., Calbimonte, J. P., Kampik, T., Najjar, A., Gadek, G., & Schumacher, M. (2020, October). Ethical Concerns and Opportunities in Binding
Intelligent Systems and Blockchain Technology. In International Conference on Practical Applications of Agents and Multi-Agent Systems (pp. 5-16). Springer, Cham.
30. BCT4MAS: Trust, Reputation, Ethics| |Davide Calvaresi ZHAW, NTN group 17.9.20
30Discussion
ETHICAL Open Challenges of BCT 4 MAS (ii)
Liability in AI delegation
(in complex systems, who is contracting, who & why should be liable for that?)
Constructing a fair reputation-building system through BCT and MAS
(authenticity, origin, traceability, and accuracy?)
Right to be forgotten
(old but gold)
Create a legal base for BCT and AI
(from where should we start?)
Calvaresi, D., Piguet, J. G., Calbimonte, J. P., Kampik, T., Najjar, A., Gadek, G., & Schumacher, M. (2020, October). Ethical Concerns and Opportunities in Binding
Intelligent Systems and Blockchain Technology. In International Conference on Practical Applications of Agents and Multi-Agent Systems (pp. 5-16). Springer, Cham.