The proceedings contain 68 papers. The special focus in this conference is on computer Aided Verification. The topics include: Rely-Guarantee Reasoning for Causally Consistent Shared Memory;unblocking Dynamic Par...
ISBN:
(纸本)9783031377051
The proceedings contain 68 papers. The special focus in this conference is on computer Aided Verification. The topics include: Rely-Guarantee Reasoning for Causally Consistent Shared Memory;unblocking Dynamic Partial Order Reduction;3D Environment modeling for Falsification and Beyond with Scenic 3.0;a Unified Model for Real-Time systems: Symbolic Techniques and Implementation;closed-Loop Analysis of Vision-Based Autonomous systems: A Case Study;hybrid Controller Synthesis for Nonlinear systems Subject to Reach-Avoid Constraints;safe Environmental Envelopes of Discrete systems;verse: A Python Library for Reasoning About Multi-agent Hybrid System Scenarios;counterexample Guided Knowledge Compilation for Boolean Functional Synthesis;Automated Analyses of IOT Event Monitoring systems;Guessing Winning Policies in LTL Synthesis by Semantic Learning;Policy Synthesis and Reinforcement Learning for Discounted LTL;synthesizing Permissive Winning Strategy Templates for Parity Games;synthesizing Trajectory Queries from Examples;learning Assumptions for Compositional Verification of Timed Automata;online Causation Monitoring of Signal Temporal Logic;process Equivalence Problems as Energy Games;commutativity for Concurrent Program Termination Proofs;fast Termination and Workflow Nets;Lincheck: A Practical Framework for Testing Concurrent Data Structures on JVM;nekton: A Linearizability Proof Checker.
This article describes the prospects of using artificial intelligence technologies, neural networks and computersystems for linguistic purposes. systems and tools capable of analyzing linguistic units or generating t...
详细信息
In many cases, the measurements taken in the grid to characterize the impedance, attenuation or emissions, require the placement of an extension cable to connect the measurement equipment to the connection point. When...
详细信息
In this study, resource allocation techniques based on reinforcement learning (RL) for 5G millimeter wave (mmWave) networks are compared and analyzed. The high bandwidth and large available spectrum in mmWave networks...
详细信息
The proceedings contain 68 papers. The special focus in this conference is on computer Aided Verification. The topics include: Rely-Guarantee Reasoning for Causally Consistent Shared Memory;unblocking Dynamic Par...
ISBN:
(纸本)9783031377082
The proceedings contain 68 papers. The special focus in this conference is on computer Aided Verification. The topics include: Rely-Guarantee Reasoning for Causally Consistent Shared Memory;unblocking Dynamic Partial Order Reduction;3D Environment modeling for Falsification and Beyond with Scenic 3.0;a Unified Model for Real-Time systems: Symbolic Techniques and Implementation;closed-Loop Analysis of Vision-Based Autonomous systems: A Case Study;hybrid Controller Synthesis for Nonlinear systems Subject to Reach-Avoid Constraints;safe Environmental Envelopes of Discrete systems;verse: A Python Library for Reasoning About Multi-agent Hybrid System Scenarios;counterexample Guided Knowledge Compilation for Boolean Functional Synthesis;Automated Analyses of IOT Event Monitoring systems;Guessing Winning Policies in LTL Synthesis by Semantic Learning;Policy Synthesis and Reinforcement Learning for Discounted LTL;synthesizing Permissive Winning Strategy Templates for Parity Games;synthesizing Trajectory Queries from Examples;learning Assumptions for Compositional Verification of Timed Automata;online Causation Monitoring of Signal Temporal Logic;process Equivalence Problems as Energy Games;commutativity for Concurrent Program Termination Proofs;fast Termination and Workflow Nets;Lincheck: A Practical Framework for Testing Concurrent Data Structures on JVM;nekton: A Linearizability Proof Checker.
The proceedings contain 67 papers. The topics discussed include: a systematic literature review of deep learning application in multiclass anomaly detection for chest medical imaging;machine learning algorithm and mod...
ISBN:
(纸本)9798350345162
The proceedings contain 67 papers. The topics discussed include: a systematic literature review of deep learning application in multiclass anomaly detection for chest medical imaging;machine learning algorithm and modeling in solar irradiance forecasting;facial palsy detection through changes in facial muscle functionality using CNN algorithm;performance measurement of ResNet-34 in convolutional neural network method for classification of mask type usage;fine-tuning deep learning model for detecting Indonesian traffic accident tweet;deep learning for safety: helmet detection in construction site image using YOLOv8;addressing wireless network capacity challenges: a novel mobile system with WOLA and NOMA;salt hash password using MD5 combination for dictionary attack protection;and cloud computing based server infrastructure analysis for payment machinery needs.
Neural network models have become the leading solution for a large variety of tasks, such as classification, natural language processing, and others. However, their reliability is heavily plagued by adversarial inputs...
详细信息
ISBN:
(数字)9789819916399
ISBN:
(纸本)9789819916382;9789819916399
Neural network models have become the leading solution for a large variety of tasks, such as classification, natural language processing, and others. However, their reliability is heavily plagued by adversarial inputs: inputs generated by adding tiny perturbations to correctly-classified inputs, and for which the neural network produces erroneous results. In this paper, we present a new method called Robustness measurement and Assessment (RoMA), which measures the robustness of a neural network model against such adversarial inputs. Specifically, RoMA determines the probability that a random input perturbation might cause misclassification. The method allows us to provide formal guarantees regarding the expected frequency of errors that a trained model will encounter after deployment. The type of robustness assessment afforded by RoMA is inspired by state-of-the-art certification practices, and could constitute an important step toward integrating neural networks in safety-critical systems.
Pandemics and epidemics pose significant threats due to their rapid global spread, overwhelming healthcare systems, and causing high mortality and morbidity rates. The recent COVID-19 pandemic has underscored the urge...
详细信息
Software modeling, as used in Model-Driven Engineering (MDE), is the process of abstracting software systems using formal or informal notations to help with communication, analysis, and design. This study looks into t...
详细信息
Currently, the basis for critical nodes definition and identification lies in the representation learning of the network and the extraction of local and global features of the nodes. The effectiveness of the algorithm...
详细信息
暂无评论