The proceedings contain 23 papers. The topics discussed include: efficient parameter synthesis using optimized state exploration strategies;integrating tools: co-simulation in UPPAAL using FMI-FMU;TLSsem: a TLS securi...
ISBN:
(纸本)9781538624319
The proceedings contain 23 papers. The topics discussed include: efficient parameter synthesis using optimized state exploration strategies;integrating tools: co-simulation in UPPAAL using FMI-FMU;TLSsem: a TLS security-enhanced mechanism against MITM attacks in public WiFis;distributed object-oriented design of autonomous control systems for connected vehicle platoons;BigrTiMo-a process algebra for structure-aware mobile systems;learning likely invariants to explain why a program fails;enhancing knowledge sharing in stack overflow via automatic external web resources linking;a composition mechanism for refinement-based methods;class modularization using indirect relationships;reachability analysis of self modifying code;a unified framework for throughput analysis of streaming applications under memory constraints;speeding up type-specific instrumentation for the analysis of complex systems;multi-modeling approach to performance engineering of cyber-physical systems design;towards solving decision making problems using probabilistic model checking;software reliability modeling and analysis via kernel-based approach;a model driven method to design and analyze secure architectures of systems-of-systems;and functional requirements-based automated testing for avionics.
Technology of high dimensional data features objective clustering based on the methods of complex systems inductive modeling is presented in the paper. Architecture of the objective clustering inductive technology as ...
详细信息
ISBN:
(纸本)9783319582740
Technology of high dimensional data features objective clustering based on the methods of complex systems inductive modeling is presented in the paper. Architecture of the objective clustering inductive technology as a block diagram of step-by-step implementation of the objects clustering procedure was developed. Method of criterial evaluation of complex data clustering results using two equal power data subsets is proposed. Degree of clustering objectivity evaluates on the basis of complex use of internal and external criteria. Researches on the simulation results of the proposed technology based on the SOTA self-organizing clustering algorithm using the gene expression data obtained by DNA microarray analysis of patients with lung cancer GEOD-68571 Array Express database, the datasets "Compound" and "Aggregation" of the Computing School of the Eastern Finland University and the data "seeds" are presented.
The DC arc fault is a major threat to the safety of photovoltaic systems, a large amount of heat from sustained arcs leads to fire accidents. Therefore, detecting the arc faults for PV systems is receiving considerabl...
详细信息
ISBN:
(纸本)9789811063640;9789811063633
The DC arc fault is a major threat to the safety of photovoltaic systems, a large amount of heat from sustained arcs leads to fire accidents. Therefore, detecting the arc faults for PV systems is receiving considerable concern. In order to develop accurate and rapid detection and location methods for arc faults, it is important to establish an arc model to characterize and predict arc characteristics and transient response. In this paper, a new DC arc model is developed from a hyperbolic approximation by observing the arc current and voltage waveforms. Based on the derived model, pink noise is superimposed to obtain better frequency domain characteristics. After comparing the simulation and the experimental results, the model is proved to be suitable for transient simulations. Furthermore, developing detection algorithm and location strategies will also be based on the DC arc model.
The K-SVD algorithm aims to find an adaptive dictionary for a set of signals by using the sparse representation optimization and constrained singular value decomposition. In this paper, firstly, the original K-SVD alg...
详细信息
A promising technique for the formal verification of embedded and cyber-physical systems is flow-pipe construction, which creates a sequence of regions covering all reachable states over time. Flow-pipe construction m...
详细信息
ISBN:
(数字)9783319657653
ISBN:
(纸本)9783319657653;9783319657646
A promising technique for the formal verification of embedded and cyber-physical systems is flow-pipe construction, which creates a sequence of regions covering all reachable states over time. Flow-pipe construction methods can check whether specifications are met for all states, rather than just testing using a finite and incomplete set of simulation traces. A fundamental challenge when using flow-pipe construction on high-dimensional systems is the cost of geometric operations, such as intersection and convex hull. We address this challenge by showing that it is often possible to remove the need to perform high-dimensional geometric operations by combining two model transformations, direct time-triggered conversion and dynamics scaling. Further, we prove the overapproximation error in the conversion can be made arbitrarily small. Finally, we show that our transformation-based approach enables the analysis of a drivetrain system with up to 51 dimensions.
The proceedings contain 22 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Model-based safety analysis for vehicle guidance systems;rare event simulat...
ISBN:
(纸本)9783319662657
The proceedings contain 22 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Model-based safety analysis for vehicle guidance systems;rare event simulation for dynamic fault trees;arguing on software-level verification techniques appropriateness;confidence assessment framework for safety arguments;safety case impact assessment in automotive software systems;modeling operator behavior in the safety analysis of collaborative robotic applications;development and verification of a flight stack for a high-altitude glider in ada/SPARK 2014;a simplex architecture for hybrid systems using barrier certificates;a conceptual safety supervisor definition and evaluation framework for autonomous systems;a strategy for assessing safe use of sensors in autonomous road vehicles;modeling the safety architecture of UAS flight operations;generic management of availability in fail-operational automotive systems;benchmarking static code analyzers;automatic estimation of verified floating-point round-off errors via static analysis;classification tree method with parameter shielding;a tool for error propagation analysis of simulink models;early safety assessment of automotive systems using sabotage simulation-based fault injection framework;towards a sensor failure-dependent performance adaptation Using the validity concept;SMT-based synthesis of fault-tolerant architectures;a lightweight threat analysis approach intertwining safety and security for the automotive domain;a security architecture for railway signalling and systematic pattern approach for safety and security co-engineering in the automotive domain.
The proceedings contain 24 papers. The topics discussed include: towards the application of flask security architecture to SoC design;a power-efficient and high performance FPGA accelerator for convolutional neural ne...
ISBN:
(纸本)9781450351850
The proceedings contain 24 papers. The topics discussed include: towards the application of flask security architecture to SoC design;a power-efficient and high performance FPGA accelerator for convolutional neural networks;a unified framework for throughput analysis of synchronous data flow graphs under memory constraints;data analytics enables energy-efficiency and robustness: from mobile to manycores, datacenters, and networks;a fast online sequential learning accelerator for IoT network intrusion detection;small neural nets are beautiful: enabling embeddedsystems with small deep-neural-network architectures;driving behavior modeling and estimation for battery optimization in electric vehicles;heterogeneous redundancy to address performance and cost in multi-core SIMT;a machine learning-based approach for power and thermal management of next-generation video coding on MPSoCs;IR-level annotation strategy dealing with aggressive loop optimizations for performance estimation in native simulation;retention state-aware energy management for efficient nonvolatile processors;communication optimization for thermal reliable many-core systems;significance-driven adaptive approximate computing for energy-efficient image processing application;and 3D nanosystems enable embedded abundant-data computing.
This volume highlights new trends and challenges in research on agents and the new digital and knowledge economy, and includes 23 papers classified into the following categories: business process management, agent-bas...
ISBN:
(数字)9783319593944
ISBN:
(纸本)9783319593937
This volume highlights new trends and challenges in research on agents and the new digital and knowledge economy, and includes 23 papers classified into the following categories: business process management, agent-based modeling and simulation, and anthropic-oriented computing. All papers were originally presented at the 11th international KES conference on Agents and Multi-Agent systems Technologies and Applications (KES-AMSTA 2017) held June 2123, 2017 in Vilamoura, Algarve, Portugal. Todays economy is driven by technologies and knowledge. Digital technologies can free, shift and multiply choices, and often intrude on the territory of other industries by providing new ways of conducting business operations and creating value for customers and companies. The topics covered in this volume include software agents, multi-agent systems, agent modeling, mobile and cloud computing, big data analysis, business intelligence, artificial intelligence, social systems, computerembeddedsystems and nature inspired manufacturing, etc., all of which contribute to the modern Digital Economy. The results presented here will be of theoretical and practical value to researchers and industrial practitioners working in the fields of artificial intelligence, collective computational intelligence, innovative business models, the new digital and knowledge economy and, in particular, agent and multi-agent systems, technologies, tools and applications.
Community networks establish a wireless mesh network among citizens, providing a network that is independent, free, and (in some cases) available where regular Internet access is not. Following initial disappointments...
详细信息
ISBN:
(纸本)9781509043958
Community networks establish a wireless mesh network among citizens, providing a network that is independent, free, and (in some cases) available where regular Internet access is not. Following initial disappointments with their performance and availability, they are currently experiencing a second spring. Many of these networks are growing fast, but with little planning and limited oversight. Problems mostly manifest as limited scalability of the network-as has happened in the Freifunk mesh network operating in the city of Paderborn (approx. 800 nodes running the BATMAN IV protocol with control messages alone accounting for 25 GByte per month and node). In this work, we detail how we modeled this real-life network in a computersimulation as a way of allowing rapid (and worry free) experimentation with maximum insight. We describe how we parameterized and validated this model using gathered measurements. Based on the model, we were able to investigate alternative structures and parameterizations to improve the performance. The predicted performance gains map well to those measured after the proposed changes were deployed city-wide.
User simulators are a principal offline method for training and evaluating human-computer dialog systems. In this paper. we examine simple sequence-to-sequence neural network architectures for training end-to-end, nat...
详细信息
ISBN:
(纸本)9781510848764
User simulators are a principal offline method for training and evaluating human-computer dialog systems. In this paper. we examine simple sequence-to-sequence neural network architectures for training end-to-end, natural language to natural language, user simulators, using only raw logs of previous interactions without any additional human labelling. We compare the neural network-based simulators with a language model (LM)-based approach for creating natural language user simulators. Using both an automatic evaluation using LM perplexity and a human evaluation, we demonstrate that the sequence-to-sequence approaches outperform the LM-based method. We show correlation between LM perplexity and the human evaluation on this task, and discuss the benefits of different neural network architecture variations.
暂无评论