skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Protocols Over Things: A Decentralized Programming Model for the Internet of Things
Award ID(s):
1908374
PAR ID:
10194542
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Computer
Volume:
53
Issue:
12
ISSN:
0018-9162
Page Range / eLocation ID:
60 to 68
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. A<sc>bstract</sc> Nonlinear sigma models on de Sitter background have proved a useful prototype for quantum gravity in summing the large logarithms which arise from loop corrections. We consider a model whose evolution is described, at leading logarithm order, by the trace of the coincident, doubly differentiated scalar propagator. An analytic approximation for this quantity on an arbitrary expansion history is applied to generalize the resummed de Sitter result to any cosmological background which has experienced primordial inflation. In addition to analytic expressions, we present explicit numerical results for the evolution in a plausible expansion history. The large scales of primordial inflation are transmitted to late times. 
    more » « less
  2. Batteryless, energy-harvesting systems could reshape the Internet of Things into a more sustainable societal infrastructure. 
    more » « less
  3. Silicon Valley, and the U.S. tech sector more broadly, have changed the world in part by embracing a “move fast and break things” mentality popularized by Mark Zuckerberg. While it is true that the tech sector has attempted to break with such a reactive and flippant response to security concerns, including at Microsoft itself through its Security Development Lifecycle, cyberattacks continue at an alarming rate. As a result, there are growing calls from regulators around the world to change the risk equation. An example is the 2023 U.S. National Cybersecurity Strategy, which argues that “[w]e must hold the stewards of our data accountable for the protection of personal data; drive the development of more secure connected devices; and reshape laws that govern liability for data losses and harm caused by cybersecurity errors, software vulnerabilities, and other risks created by software and digital technologies.” What exact form such liability should take is up for debate. The defect model of products liability law is one clear option, and courts across the United States have already been applying it using both strict liability and risk utility framings in a variety of cases. This Article delves into the debates by considering how other cyber powers around the world—including the European Union—are extending products liability law to cover software, and it examines the lessons these efforts hold for U.S. policymakers with case studies focusing on liability for AI- generated content and Internet-connected critical infrastructure. 
    more » « less