The proceedings contain 22 papers. The special focus in this conference is on engineering of Complex computersystems. The topics include: Automated Parameter Determination for Enhancing the Product Configur...
ISBN:
(纸本)9783031664557
The proceedings contain 22 papers. The special focus in this conference is on engineering of Complex computersystems. The topics include: Automated Parameter Determination for Enhancing the Product Configuration System of Renault: An Experience Report;optimal Solution Guided Branching Strategy for Neural Network Branch and Bound Verification;AccMILP: An Approach for Accelerating Neural Network Verification Based on Neuron Importance;Word2Vec-BERT-bmu:Classification of RISC-V Architecture Software Package Build Failures;Test Architecture Generation by Leveraging BERT and Control and Data Flows;less is More: An Empirical Study of Undersampling Techniques for Technical Debt Prediction;modeling and Verification of Solidity Smart Contracts with the B Method;template-Based Smart Contract Verification: A Case Study on Maritime Transportation Domain;QuanSafe: A DTBN-Based Framework of Quantitative Safety Analysis for AADL Models;a Event-B-Based Approach for Schedulability Analysis For Real-Time Scheduling Algorithms through Deadlock Detection;Validation of RailML Using ProB;reachability Analysis of Concurrent Self-modifying Code;an Iterative Formal Model-Driven Approach to Railway systems Validation;an Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control;confidentiality Management in Complex systems Design;analyzing Excessive Permission Requests in Google Workspace Add-Ons;formal Verification Techniques for Post-quantum Cryptography: A Systematic Review;autoWeb: Automatically Inferring Web Framework Semantics via Configuration Mutation;safePtrX: Research on Mitigation of Heap-Based Memory Safety Violations for Intel x86-64;towards Efficiently Parallelizing Patch-Space Exploration in Automated Program Repair.
The proceedings contain 87 papers. The topics discussed include: designing an e-voting framework using blockchain: a secure and transparent attendance approach;SODIBOT: a two in one real-time human monitoring system u...
ISBN:
(纸本)9798350310931
The proceedings contain 87 papers. The topics discussed include: designing an e-voting framework using blockchain: a secure and transparent attendance approach;SODIBOT: a two in one real-time human monitoring system using YOLO algorithms;priority based fair scheduling: enhancing efficiency in cloud job distribution;a survey on supervised machine learning in intrusion detection systems for Internet of Things;machine learning regression models for real-time touchless interaction applications;knowledge of the utilization of telegram for learning among primary students in Kuantan;exploring machine learning in IoT smart home automation;predicting mental health disorder on twitter using machine learning techniques;improving sarcasm detection in mash-up language through hybrid pretrained word embedding;and an overview of part-of-speech tagging methods and datasets for Malay language.
The proceedings contain 25 papers. The topics discussed include: stability-aware exploration of design space of autonomous robots for goods delivery;automated compositional verification for robotic state machines usin...
ISBN:
(纸本)9798350340044
The proceedings contain 25 papers. The topics discussed include: stability-aware exploration of design space of autonomous robots for goods delivery;automated compositional verification for robotic state machines using Isabelle/HOL;quantitative explainable ai for face recognition;formal alignment of requirements models with high-level architecture models;disproving XAI myths with formal methods – initial results;rapid prototyping & development life cycle for smart applications of internet of entities;how to select samples for active learning? document clustering with active learning methodology;an experience report on the optimization of the product configuration system of Renault;validating communication of a dynamic traffic management system;concolic execution for RPA testing;and specification and verification of communication paradigms for CBSE in event B.
The proceedings contain 36 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Security and Safety in Urban Environments: Evaluating Threats and...
ISBN:
(纸本)9783031687372
The proceedings contain 36 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Security and Safety in Urban Environments: Evaluating Threats and Risks of Autonomous Last-Mile Delivery Robots;safe Road-Crossing by Autonomous Wheelchairs: A Novel Dataset and Its Evaluation;automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety;Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection;enhancing Tunnel Safety with Artery V2X Simulation for Real-Time Risk Assessment;detecting and Mitigating Errors in Neural Networks;challenges and Limitations of Utilizing Multi-core/Heterogeneous Logic Elements in the Railway Signaling Applications;identifying Difficult Environmental Conditions with Scenario-Based Hazard and Fault Analysis;Using GPT-4 to Generate Failure Logic;towards an Argument Pattern for the Use of Safety Performance Indicators;enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis;Managing Changing Product Liability Obligations Emerging from New Proposed EU Directive;reaching Consensus on System-of-systems Resilience Assurance: A Case of Mobility as a Service;a Deductive Approach to Safety Assurance: Formalising Safety Contracts with Subjective Logic;a New Approach to Creating Clear Operational Safety Arguments;including Defeaters in Quantitative Confidence Assessments for Assurance Cases;multivariate Security Breach Probability: The Gordon-Loeb Model with Copulas;quantum Machine Learning: Perspectives in Cybersecurity;Security Modeling Challenges and Research Directions Around the ADVISE Meta Framework;Capability Ambient DO – A Usable Tool for Linux System Security;VUOS: A User-Space Hypervisor Based on System Call Hijacking;cyber Risk Propagation on Networks;where Do Safety and Security Mutually Reinforce? A Multi-level Model-Based Approach for a Consistent Interplay;a Flow-Based Credibilit
The proceedings contain 138 papers. The topics discussed include: implementation of sorted stair-case modulation and sorted phase disposition PWM for grid-tied multi-level inverter;bi-directional converter for hybrid ...
ISBN:
(纸本)9798350305005
The proceedings contain 138 papers. The topics discussed include: implementation of sorted stair-case modulation and sorted phase disposition PWM for grid-tied multi-level inverter;bi-directional converter for hybrid energy storage system;experimental investigation of the effectiveness and robustness of active disturbance rejection control using a DC motor-driven piston;instantaneous power based effective power balance operation in all-electric ship microgrid;modelling of EV penetration for an Indian state using machine learning approach;finite element-based dynamic eccentricity fault analysis in switched reluctance motor using machine learning approach;setting-free smart recloser for three terminal mixed lines;elevator based car parking system;optimal sizing and operation of PV based battery swapping station considering EV uncertainties for an Indian residential community;and sensitivity of threshold value ‘R’ in approximate entropy based brain-computer interface.
The proceedings contain 24 papers. The topics discussed include: minimal schedule with minimal number of agents in attack-defense trees;reducing malware labeling efforts through efficient prototype selection;optimizin...
ISBN:
(纸本)9781665401623
The proceedings contain 24 papers. The topics discussed include: minimal schedule with minimal number of agents in attack-defense trees;reducing malware labeling efforts through efficient prototype selection;optimizing parallel java streams;parameterized design and formal verification of multi-ported memory;self-adaptation in microservice architectures: a case study;multi-layer event analytic method of adaptive software orienting at uncertain environments;a formal model for fault tolerant parallel matrix factorization;formalism- driven development of decentralized systems;building correct hybrid systems using event-B and Sagemath: illustration by the hybrid smart heating system case study;a bounded semantics for improving the efficiency of bounded model checking;and distributed explicit state space exploration with state reconstruction for rdma networks.
The proceedings contain 21 papers. The special focus in this conference is on Software engineering Research and Practice. The topics include: MetaPix: A Data-Centric AI Development Platform for Efficient Manageme...
ISBN:
(纸本)9783031866432
The proceedings contain 21 papers. The special focus in this conference is on Software engineering Research and Practice. The topics include: MetaPix: A Data-Centric AI Development Platform for Efficient Management and Utilization of Unstructured computer Vision Data;A Novel Architecture That Examines Network Activity in a Docker-Based Multitenant to Verify Zero Trust Container Architecture (ZTCA) Compliance;VENUS: Designing a Validation Engine for User Stories;a Framework for Requirements Modeling of Safety Critical systems: A Continuous Glucose Monitoring System Case Study;plan-Based and Agile Companies: A Comparison of Project Management Approaches;Service Availability Ratio (SAR): An Availability Metric for Microservice;Development of a Desktop Agent System Using GPT;navigating Challenges in E-Participation: A Comprehensive Meta-Analysis;The Shifting Landscape of Cybersecurity: The Impact of Remote Work and COVID-19 on Data Breach Trends;Farmchain: Empowering Smallholder Farmers Through Blockchain and DAOs: Cryptournomic Approach;privacy Strategies for Police Personnel: Co-designing a Self-assessment Tool;cybersecurity Threats: An Analysis of the Rise and Impacts of State Sponsored Cyber Attacks;moore’s Law: What Comes Next?;use of Emerging Technologies in Africa;using Survey to Investigate the Integration of Artificial Intelligence in e-Learning;students Satisfaction with the Distance Education During Covid-19 Pandemic;Improving Student Success in Math Courses Using WeBWorK;fast Food Review Online;a systems Approach to Improving E-Learning Using Theory of Constraints.
The proceedings contain 33 papers. The special focus in this conference is on Internet Computing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Da...
ISBN:
(纸本)9783031859229
The proceedings contain 33 papers. The special focus in this conference is on Internet Computing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Data for Comfort and Energy Conservation in Optimizing HVAC systems;improving Critical Controls Using IoT and computer Vision;A Data-Driven Driving Under the Influence (DUI) Detection, Notification and Prevention System Using Artificial Intelligence and Internet-Of-Things (IoT);understanding User Interactions with IoT Process Models: A Demographic Perspective;Advancing IoT Process Modeling: A Comparative Evaluation of BPMNE4IoT and Traditional BPMN on User-Friendliness, Effectiveness, and Workload;Threat Detection Using MLP for IoT Network;harnessing Social Robotics and the Internet of Things to Reduce the Risk of Older Adults Developing Hypothermia and Dehydration;re/Imagining Smart Home Automation Framework in the Era of 6G-Enabled Smart Cities;smart Roadway Monitoring: Pothole Detection and Mapping via Google Street View;Energy-Efficiency Modeling for AI Applications on Edge Computing;optimizing Wireless Sensor Network Node Placement Using Bacterial Foraging Optimization;The Vital Role of Small and Marginal Farmer in Future of Our Climate: Democratization of Machine Learning, Artificial Intelligence, and Dairy Cow Necklace Sensors in Achieving the UN Climate Change Goals (COP21) and the Paris Agreement;autonomous Driving Prototype with Raspberry Pi by Using Image Processing Technology;towards Implementation of Privacy-Preserving Federated Learning Aggregation Using Multi-key Homomorphic Encryption;advancing Nursing Education Through Virtual Reality Training: A Revolutionary Approach to Ensuring Patient Safety;multiDrone Simulator An Open Source Multi-plataform Tool to Use in Tests of Optimized Flight of Group of Drones;Revolutionizing Multiplayer Gaming: A Deep Dive into VisionXO, a 3D Multiplayer Tic-Tac-Toe Game.
The proceedings contain 71 papers. The topics discussed include: RGSS-Negotiation: a genetic-based approach for web service security negotiation;network-aware resource management strategy in cloud computing environmen...
ISBN:
(纸本)9781509032679
The proceedings contain 71 papers. The topics discussed include: RGSS-Negotiation: a genetic-based approach for web service security negotiation;network-aware resource management strategy in cloud computing environments;a framework for virtual machine admission control in cloud environment;software defined networking concepts and challenges;clustering of xml documents based on structure and aggregated content;collaborative approach for a MANET intrusion detection system using multilateration;virtualization security;a novel near-optimum distributed scheduling algorithm for mmWave mesh networks;wavelet-enhanced detection of small/slow object movement in complex scenes;a new object recognition framework based on PCA, LDA, and K-NN;sequential-based action recognition technique based on homography of interested SIFT keypoints;robust automatic speech recognition system based on using adaptive time-frequency masking;efficient single-linkage hierarchical clustering based on partitioning;clustering of xml documents based on structure and aggregated content;an enhanced genetic algorithm-based timetabling system with incremental changes;sparse random encoder for age invariant face recognition;and automatic summarization of the Arabic documents using NMF: a preliminary study.
暂无评论