Multi-agent systems are examples of complex distributed systems enabling dynamic adaptation in providing their services. By establishing on-the-fly collaborations, the agents can execute complex scenarios and adapt to...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
Multi-agent systems are examples of complex distributed systems enabling dynamic adaptation in providing their services. By establishing on-the-fly collaborations, the agents can execute complex scenarios and adapt to changing operating conditions including agent failures. We investigate how goal-oriented modelling can enhance reliability by providing a structured support for designing fault tolerant service orchestration.
Since LNG tanks transport flammable and explosive liquids, there are many affected factors and are prone to safety accidents, among which rollover accounts for a large proportion of LNG tank container vehicle transpor...
详细信息
With the development of information age, enterprises' demand for software is increasing sharply, and the problem of software development platform has become the focus of the industry. MDA model driven architecture...
详细信息
A conversational agent, also referred to as a chatbot, is computersoftware that can communicate with users in natural language. Because of a number of issues, developing a successful chatbot model is still difficult....
详细信息
By extrapolating functionality from the retina, retinomorphic engineering has yielded devices that have shown promise to alleviate the challenges presented in modern computer vision tasks. An incredible amount of work...
详细信息
The proceedings contain 53 papers. The special focus in this conference is on computer Aided Verification. The topics include: Neural Network Robustness as a Verification Property: A Principled Case Study;th...
ISBN:
(纸本)9783031131875
The proceedings contain 53 papers. The special focus in this conference is on computer Aided Verification. The topics include: Neural Network Robustness as a Verification Property: A Principled Case Study;the Lattice-Theoretic Essence of Property Directed Reachability Analysis;affine Loop Invariant Generation via Matrix Algebra;data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes;proof-Guided Underapproximation Widening for Bounded Model Checking;SolCMC: Solidity Compiler’s Model Checker;software Verification of Hyperproperties Beyond k-Safety;a Scalable Shannon Entropy Estimator;PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation;program Verification with Constrained Horn Clauses (Invited Paper);explaining Hyperproperty Violations;distilling Constraints in Zero-Knowledge Protocols;Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption;abstraction Modulo Stability for Reverse engineering;reachability of Koopman Linearized systems Using Random Fourier Feature Observables and Polynomial Zonotope Refinement;RINO: Robust INner and Outer Approximated Reachability of Neural Networks Controlled systems;STLmc: Robust STL Model Checking of Hybrid systems Using SMT;UCLID5: Multi-modal Formal Modeling, Verification, and Synthesis;data-Driven Invariant Learning for Probabilistic Programs;sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs;does a Program Yield the Right Distribution?: Verifying Probabilistic Programs via Generating Functions;abstraction-Refinement for Hierarchical Probabilistic Models;shared Certificates for Neural Network Verification;example Guided Synthesis of Linear Approximations for Neural Network Verification;verifying Neural Networks Against Backdoor Attacks.
The evolution of softwareengineering practices has heightened the emphasis on quality assurance, particularly in defect prediction and testing methodologies. Traditional approaches often fall short in addressing the ...
详细信息
ISBN:
(数字)9798331510299
ISBN:
(纸本)9798331510305
The evolution of softwareengineering practices has heightened the emphasis on quality assurance, particularly in defect prediction and testing methodologies. Traditional approaches often fall short in addressing the complexities of modern softwaresystems, prompting the integration of advanced technologies such as deep learning and machine learning. Recent research highlights the development of robust models for predicting defect density, which effectively tackle issues of data sparsity, alongside the introduction of specialized validation frameworks for AI-driven software that utilize innovative testing methods. Additionally, advancements in automated testing practices, including the use of large language models for test case generation and ensemble machine learning for bug classification, underscore the critical role of efficient maintenance in ensuring software quality. Furthermore, novel frameworks for validating unsupervised learning systems bridge user expectations with system performance evaluations. Collectively, these contributions reveal a trend towards leveraging cutting-edge methodologies to address the multifaceted challenges of software quality, emphasizing the need for adaptive and innovative strategies as softwaresystems continue to evolve.
In the era of technology and devices connection to Internet, developing management systems (MS), whether they are web based or mobile based, become very essential. Therefore, it becomes quite common to see a Managemen...
详细信息
ISBN:
(纸本)9781665478298
In the era of technology and devices connection to Internet, developing management systems (MS), whether they are web based or mobile based, become very essential. Therefore, it becomes quite common to see a Management Information System (MIS) wherever the process of management is there, and it becomes important to design and develop an MIS for any management unit that is still processing their tasks classically. However, issues of the exam committee unit in the Faculty of engineering (FENG) at Koya University (KoU) are still progressing without the concept of information system. This result has been obtained during a small survey that was conducted between 10th to 20th November 2021 inside the FENG among those academic staff who were nominated as members of the FENG exam committee. Therefore, authors of this work have proposed an online based information management system for facilitating the works of this committee. As a software development life cycle (SDLC), this work followed the waterfall methodology for designing and implementation. At end, a test has been conducted to check the system in three directions: achieving system requirements, style, and formatting for webpages, and dynamically of the system during updating data and records. According to the survey, the system has been agreed by the software testers.
In analytics and business intelligence, there are a lot of things that can go wrong. Be it a report or a plan in the data based results must be consistent, verifiable, accurate to emerge and most importantly, acceptab...
详细信息
The proceedings contain 53 papers. The special focus in this conference is on computer Aided Verification. The topics include: Neural Network Robustness as a Verification Property: A Principled Case Study;th...
ISBN:
(纸本)9783031131844
The proceedings contain 53 papers. The special focus in this conference is on computer Aided Verification. The topics include: Neural Network Robustness as a Verification Property: A Principled Case Study;the Lattice-Theoretic Essence of Property Directed Reachability Analysis;affine Loop Invariant Generation via Matrix Algebra;data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes;proof-Guided Underapproximation Widening for Bounded Model Checking;SolCMC: Solidity Compiler’s Model Checker;software Verification of Hyperproperties Beyond k-Safety;a Scalable Shannon Entropy Estimator;PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation;program Verification with Constrained Horn Clauses (Invited Paper);explaining Hyperproperty Violations;distilling Constraints in Zero-Knowledge Protocols;Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption;abstraction Modulo Stability for Reverse engineering;reachability of Koopman Linearized systems Using Random Fourier Feature Observables and Polynomial Zonotope Refinement;RINO: Robust INner and Outer Approximated Reachability of Neural Networks Controlled systems;STLmc: Robust STL Model Checking of Hybrid systems Using SMT;UCLID5: Multi-modal Formal Modeling, Verification, and Synthesis;data-Driven Invariant Learning for Probabilistic Programs;sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs;does a Program Yield the Right Distribution?: Verifying Probabilistic Programs via Generating Functions;abstraction-Refinement for Hierarchical Probabilistic Models;shared Certificates for Neural Network Verification;example Guided Synthesis of Linear Approximations for Neural Network Verification;verifying Neural Networks Against Backdoor Attacks.
暂无评论