software is continuously evolving as business processes that needed to be solved become increasingly complex. software architecture is an important aspect during software design, with monolithic and microservices bein...
详细信息
Physical adversarial attacks can deceive deep neural networks (DNNs), leading to erroneous predictions in real-world scenarios. To uncover potential security risks, attacking the safety-critical task of person detecti...
The proceedings contain 22 papers. The special focus in this conference is on Formal engineering Methods. The topics include: Guided Integration of Formal Verification in Assurance Cases;validation-Driven De...
ISBN:
(纸本)9789819975839
The proceedings contain 22 papers. The special focus in this conference is on Formal engineering Methods. The topics include: Guided Integration of Formal Verification in Assurance Cases;validation-Driven Development;incremental Property Directed Reachability;Proving Local Invariants in ASTDs;formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol;early and Systematic Validation of Formal Models;verifying Neural Networks by Approximating Convex Hulls;eager to Stop: Efficient Falsification of Deep Neural Networks;A Runtime Verification Framework for Cyber-Physical systems Based on Data Analytics and LTL Formula Learning;an Idealist’s Approach for Smart Contract Correctness;unified Verification of Neural Networks’ Robustness and Privacy in computer Vision;ioT software Vulnerability Detection Techniques through Large Language Model;vulnerability Detection via Typestate-Guided Code Representation Learning;Active Inference of EFSMs Without Reset;learning Mealy Machines with Local Timers;compositional Vulnerability Detection with Insecurity Separation Logic;dynamic Extrapolation in Extended Timed Automata;formalizing Robustness Against Character-Level Perturbations for Neural Network Language Models;trace Models of Concurrent Valuation Algebras;branch and Bound for Sigmoid-Like Neural Network Verification.
The word determinism is commonly used among software practitioners (software developers, certification staff), in certification standards, and among researchers in softwareengineering and computer science. We have fo...
详细信息
ISBN:
(数字)9798350349610
ISBN:
(纸本)9798350349627
The word determinism is commonly used among software practitioners (software developers, certification staff), in certification standards, and among researchers in softwareengineering and computer science. We have found that the word determinism is used differently among these people and documents. This different use of the word is unfortunate because (i) it hampers communication between these groups which hampers collaboration (between industry participants), technology transfer (from researchers to practitioners), and research feedback (practitioners informing researchers about important pain points), and (ii) even within one group, there is sometimes disagreement on the meaning of this word. Therefore, in this paper, we discuss different meanings of the word determinism, and their consequences for softwareengineering. We present a taxonomy that gives different meanings of the word determinism in critical systems (comprising software, hardware platform, and external environment). With these definitions, we discuss their implications for airworthiness and critical software.
Nowadays, automation softwaresystems play a crucial role in assisting humans with specific tasks, particularly in online communication for timely interactions. However, the misuse of such systems poses risks, impacti...
详细信息
ISBN:
(数字)9798350381559
ISBN:
(纸本)9798350381566
Nowadays, automation softwaresystems play a crucial role in assisting humans with specific tasks, particularly in online communication for timely interactions. However, the misuse of such systems poses risks, impacting website performance, leading to data access violations, or even posing threats to the system's security. To address these challenges, an automatic software inspection system has been developed as a prototype, aimed at preventing potential issues in the online domain. Machine learning algorithms are employed to enhance detection accuracy, with the decision tree algorithm demonstrating a maximum accuracy of 97.4%. This promising result suggests its suitability for further development into a JavaScript library, offering a valuable resource for future website applications.
The assessment of mental workload from electroencephalogram (EEG) data for brain-computer interfaces (BCI) poses some challenges due to the interaction of spatial and temporal features within the data. Similar challen...
Taking testing goals into account, this article lays forth a methodology for automating the testing of component-based and embedded systems. We work with the component-based systems from communication point of view. H...
A supervised feature selection method selects an appropriate but concise set of features to differentiate classes, which is highly expensive for large-scale datasets. Therefore, feature selection should aim at both mi...
The proceedings contain 98 papers. The topics discussed include: linguistic-based data augmentation approach for offensive language detection;a mixed reality interface for tactical data management in geographic inform...
ISBN:
(纸本)9781665470100
The proceedings contain 98 papers. The topics discussed include: linguistic-based data augmentation approach for offensive language detection;a mixed reality interface for tactical data management in geographic information systems;the effect of statistical attributes on the determination of stock trading actions;reverse ant colony optimization for the winner determination problem in combinatorial auctions;brain computer interaction and cybersecurity of the brain;an anomaly detection study for the smart home environment;what does industry suggest to academia on softwareengineering education?;anomaly pattern analysis based on machine learning on real telecommunication data;explainable ai for software defect prediction with gradient boosting classifier;data augmentation of morphological brain network using multi-variate normal distribution;applying web crawler technologies for compiling parallel corpora as one stage of natural language processing;comparison of heuristic and metaheuristic algorithms;and a new algorithm for the initial feasible solutions of fixed charge transportation problem.
Information technology is been widely spread all over the world. The benefits that the IT sector provides are unmeasurable. Though there are numerous benefits there are scams going around with the software developed u...
详细信息
暂无评论