Mobile, IoT, and wearable devices have been transitioning from passive consumers of remote data to active generators of massive amounts of data. Mobile apps often need to move data, generated on one device, to other n...
详细信息
ISBN:
(纸本)9781450357128
Mobile, IoT, and wearable devices have been transitioning from passive consumers of remote data to active generators of massive amounts of data. Mobile apps often need to move data, generated on one device, to other nearby devices for processing. For example, when reading its wearer's health vitals, a health monitoring app on a wearable device needs to transfer the data to the wearer's smartphone for display and analysis. this local processing of data by means of nearby computing resources has been promoted as a solution to network bandwidth bottlenecks, and commonly referred to as edge computing. Despite the critical dependence of edge computing on the device-to-device data sharing functionality, its mainstream implementations introduce low-level and hard-to-maintain code into the mobile codebase. To address this problem, this research introduces Remote ICC (RICCi), a novel middleware framework that provides programming support for data-intensive mobile applications at the edge, thereby reconciling programming convenience and performance efficiency. RICCi builds upon the native Android Inter-Component Communication (ICC) to simultaneously support seamless and efficient inter-device data sharing via a convenient and familiar programming model. To reach these design objectives, RICCi innovates in the middleware space by offering distributed programming abstractions that are data-oriented rather than procedure-oriented, thereby elevating latency into a first-class design concern for developing distributed mobile apps.
In this paper, we address the complex issue of representation of continuous behaviour of the environment of the embedded controllers. In our approach, we propose two novel ideas. One is to consider the weak solutions ...
详细信息
How to find these symptoms in the mass monitoring data of the City Operational System is crucial and important to prevent the accidents happening. the association rule mining method is used to mine rules of infrequent...
详细信息
Stream X-machines have been used to specify real systems requiring to represent complex data structures. One of the advantages of using stream X-machines to specify a system is that it is possible to produce a test se...
详细信息
the proceedings contain 11 papers. the special focus in this conference is on software Verification and Formal Methods for ML-Enables Autonomous systems. the topics include: Neural Network Precision Tuning Using Stoch...
ISBN:
(纸本)9783031212215
the proceedings contain 11 papers. the special focus in this conference is on software Verification and Formal Methods for ML-Enables Autonomous systems. the topics include: Neural Network Precision Tuning Using Stochastic Arithmetic;MLTL Multi-type (MLTLM): A Logic for Reasoning About Signals of Different Types;a Cascade of Checkers for Run-time Certification of Local Robustness;CEG4N: Counter-Example Guided Neural Network Quantization Refinement;minimal Multi-Layer Modifications of Deep Neural Networks;differentiable Logics for Neural Network Training and Verification;neural Networks in Imandra: Matrix Representation as a Verification Choice;self-correcting Neural Networks for Safe Classification;formal Specification for Learning-Enabled Autonomous systems;verified Numerical Methods for Ordinary Differential Equations.
Recent developments in mobile code and embedded systems have led to an increased interest in open platforms, i.e. platforms which enable different applications to interact in a dynamic environment. However, the flexib...
详细信息
ISBN:
(纸本)3540433538
Recent developments in mobile code and embedded systems have led to an increased interest in open platforms, i.e. platforms which enable different applications to interact in a dynamic environment. However, the flexibility of open platforms presents major difficulties for the (formal) verification of secure interaction between the different applications. To overcome these difficulties, compositional verification techniques are required. this paper presents a compositional approach to the specification and verification of secure applet interactions. this approach involves a compositional model of the interface behavior of applet interactions, a temporal logic property specification language, and a proof system for proving correctness of property decompositions. the usability of the approach is demonstrated on a realistic smartcard case study.
this paper discusses Model Reference Adaptive Control design for the 4-DOF Serial Manipulator, at first, a 4-DOF Serial Manipulator mechanical design is introduced in CATIA software, then the model CAD design in CATIA...
详细信息
this paper presents the HUGIN tool software system, which is freely distributed. HUGIN is anticipation system for the development of applied intelligent systems (IS) using Bayesian confidence networks to find solution...
详细信息
During the last years, Intelligent Virtual Environments for Training have become a quite popular application of computer science to education. these systems involve very different technologies, ranging from computer g...
详细信息
ISBN:
(纸本)3540287388
During the last years, Intelligent Virtual Environments for Training have become a quite popular application of computer science to education. these systems involve very different technologies, ranging from computer graphics to artificial intelligence. However, little attention has been paid to softwareengineering issues, and most of these systems are developed in an ad-hoe way that does not allow the reuse of their components or even an easy modification of the application. We describe an agent-based software architecture that is intended to be easily extended and modified. Also, some experiments to test the suitability of the architecture are shown.
A growing number of business and safety-critical services are delivered by computersystems designed to reconfigure in response to changes in workloads, requirements and internal state. In recent work, we showed how a...
详细信息
ISBN:
(纸本)9781450327336
A growing number of business and safety-critical services are delivered by computersystems designed to reconfigure in response to changes in workloads, requirements and internal state. In recent work, we showed how a formal technique called continual verification can be used to ensure that such systems continue to satisfy their reliability and performance requirements as they evolve, and we presented the challenges associated withthe new technique. In this paper, we address important instances of two of these challenges, namely the maintenance of up-to-date reliability models and the adoption of continual verification in engineering practice. To address the first challenge, we introduce a new method for learning the parameters of the reliability models from observations of the system behaviour. this method is capable of adapting to variations in the frequency of the available system observations, yielding faster and more accurate learning than existing solutions. To tackle the second challenge, we present a new softwareengineering tool that enables developers to use our adaptive learning and continual verification in the area of service-based systems, without a formal verification background and with minimal effort. Copyright is held by the owner/author(s). Publication rights licensed to ACM.
暂无评论