Modern cyber-physical systems (CPS) integrate more and more powerful computing power to master novel applications and adapt to changing situations. A striking example is the recent progression in the automotive market...
详细信息
ISBN:
(纸本)9781450357159
Modern cyber-physical systems (CPS) integrate more and more powerful computing power to master novel applications and adapt to changing situations. A striking example is the recent progression in the automotive market towards autonomous driving. Powerful artificial intelligent algorithms must be executed on high performant parallelized platforms. However, this cannot be employed in a safe way, as the platforms stemming from the consumer electronics (CE) world still lack required dependability and safety mechanisms. In this paper, we present a concept to integrate undependable self-adaptive subsystems into safety-critical environments. For this, we introduce self-adaptation envelopes which manage undependable system parts and integrate within a dependable system. We evaluate our approach by a comprehensive case study of autonomous driving. thereby, we show that the potential failures of the AUTOSAR adaptive platform as exemplary undependable system can be handled by our concept. In overall, we outline a way of integrating inherently undependable adaptivesystems into safety-critical CPS.
In previous work of the authors, intelligent agent systems have been used in the diagnosis of dementia and the differentiation among dementia caused by different etiologies. the agent-based approach is flexible enough...
详细信息
ISBN:
(纸本)188084352x
In previous work of the authors, intelligent agent systems have been used in the diagnosis of dementia and the differentiation among dementia caused by different etiologies. the agent-based approach is flexible enough to be expanded to address other healthcare needs. In the work described here, intelligent agents are used to assist individuals suffering from dementia in their daily activities. the purpose is two-fold: to allow the patients to function in their home environments for as long as possible and to reduce the burden on family members and care providers.
We propose a software development approach that combines the use of the UML notation, the use of the structuring concepts provided by the problem frames, together with our methodological approach for well-founded meth...
详细信息
ISBN:
(纸本)188084352x
We propose a software development approach that combines the use of the UML notation, the use of the structuring concepts provided by the problem frames, together with our methodological approach for well-founded methods. the problem frames are used to provide a first idea of the main elements of the problem under study. then we provide ad hoc UML based development methods for some of the most relevant problem frames together with precise guidelines for the users. the general idea of our method is that, for each frame, several artifacts have to be produced, each one corresponding to a part of the frame. the description level may range from informal and sketchy, to formal and precise, while this approach is drawn from experience in formal specifications.
Research in Artificial Intelligence (AI) was for a long time dominated by the concentration on individual teaming processes and cognitive operations without taking into regard the fact that human teaming and thinking ...
详细信息
ISBN:
(纸本)188084352x
Research in Artificial Intelligence (AI) was for a long time dominated by the concentration on individual teaming processes and cognitive operations without taking into regard the fact that human teaming and thinking always occurs in a social context (e.g. [7]). Concepts like "multi agent systems" demonstrate that this research situation begins to change as AI-researchers more frequently consider the importance of context for cognitive development. In the cognitive sciences and in particular in the theories of social teaming (e.g. [1]) the dependency of cognitive development on the social context was always taken into account, although not always described with a necessary precision.
We introduce a UML-based model for conceptual design support in civil engineering. therefore, we identify required extensions to standard UML. Class diagrams axe used for elaborating building type-specific knowledge: ...
详细信息
ISBN:
(纸本)188084352x
We introduce a UML-based model for conceptual design support in civil engineering. therefore, we identify required extensions to standard UML. Class diagrams axe used for elaborating building type-specific knowledge: Object diagrams, implicitly contained in the architect's sketch, are validated against the defined knowledge. To enable the use of industrial, domain-specific tools, we provide an integrated conceptual design extension. the developed tool support is based on graph rewriting. With our approach architects are enabled to deal with semantic objects during early design phase, assisted by incremental consistency checks.
Self-adaptivesystems (SAS) are revolutionizing many aspects of our society. From server clusters to autonomous vehicles, SAS are becoming more ubiquitous and essential to our world. Security is frequently a priority ...
详细信息
ISBN:
(纸本)9781450357159
Self-adaptivesystems (SAS) are revolutionizing many aspects of our society. From server clusters to autonomous vehicles, SAS are becoming more ubiquitous and essential to our world. Security is frequently a priority for these systems as many SAS conduct mission-critical operations, or work with sensitive information. Fortunately, security is being more recognized as an indispensable aspect of virtually all aspects of computing systems, in all phases of software development. Despite the growing prominence in security, from computing education to vulnerability detection systems, it is just another concern of creating good software. Despite how critical security is, it is a quality attribute like other aspects such as reliability, stability, or adaptability in a SAS.
the classical EIGamal encryption scheme is described in the setting of the multiplicative group Z∗p;the group of units of the ring of integers modulo a prime p, but it can be easily generalized to work in any...-nite ...
详细信息
Learning algorithms generally rely on contemporary neural architectures having one or more hidden layers and they suffer from the same deficiencies that genetic algorithms and methodologies for non-trivial automatic p...
详细信息
this paper describes software development for an Airborne Multi-Spectral Imaging System that uses digital cameras to provide high resolution images at very high rates. the software controls the camera and the GPS rece...
详细信息
ISBN:
(纸本)188084352x
this paper describes software development for an Airborne Multi-Spectral Imaging System that uses digital cameras to provide high resolution images at very high rates. the software controls the camera and the GPS receiver and allows the remote manipulation of various functions, including play, stop, and rewind. the GPS co-ordinates and the corresponding time are simultaneously recorded. the system is viable for many applications that require reasonably good resolution at low cost. Such applications include vegetation detection, oceanography, marine biology, geographical information systems, and environmental coastal science analysis. the paper presents results of two successful flight tests.
Graceful degradation describes the smooth change to a lower state of some system aspect. In this paper, we study the graceful degradation of system functionality in the presence of errors. Our approach is targeted at ...
详细信息
ISBN:
(纸本)188084352x
Graceful degradation describes the smooth change to a lower state of some system aspect. In this paper, we study the graceful degradation of system functionality in the presence of errors. Our approach is targeted at dynamically configurable component-based embedded software, e.g. software for mobile phone, set-top boxes, domotic controllers, etc. Based on a graph that captures the dependencies among the components of a system, we are able to identify those components that are affected by the occurrence of an error. then, using the dynamic reconfiguration capabilities of the system, we remove those components affected by the error, leaving the system at an operational state in which the delivered functionality has gracefully degraded to that provided by the remaining components.
暂无评论