the proceedings contain 25 papers. the special focus in this conference is on NASA Formal Methods. the topics include: Specification Quality Metrics based on Mutation and Inductive Incremental Model Checking;formal Ve...
ISBN:
(纸本)9783030557539
the proceedings contain 25 papers. the special focus in this conference is on NASA Formal Methods. the topics include: Specification Quality Metrics based on Mutation and Inductive Incremental Model Checking;formal Verification of Parallel Prefix Sum;from Passive to Active: Learning Timed Automata Efficiently;benchmarking Software Model Checkers on Automotive Code;Strengthening Deterministic Policies for POMDPs;paRoT: A Practical Framework for Robust Deep Neural Network Training;parameter Synthesis and Robustness Analysis of Rule-based Models;falsification of Cyber-Physical systems with Constrained Signal Spaces;a Transformation of Hybrid Petri Nets with Stochastic Firings into a Subclass of Stochastic Hybrid Automata;run-Time Assurance for Learning-Enabled systems;heterogeneous Verification of an Autonomous Curiosity Rover;generating Correct-by-Construction distributed Implementations from Formal Maude Designs;verifying Band Convergence for Sampled Control systems;model Checking Timed Hyperproperties in Discrete-Time systems;sampling distributed Schedulers for Resilient Space Communication;per-Location Simulation;preface;automated Requirements-based Testing of Black-Box Reactive systems;neural Simplex Architecture;simplifying Neural Networks Using Formal Verification;constraining Counterexamples in Hybrid System Falsification: Penalty-based Approaches;hpnmg: A C++ Tool for Model Checking Hybrid Petri Nets with General Transitions;constraint Caching Revisited.
the proceedings contain 69 papers. the topics discussed include: usability and accessibility evaluation of banking websites;hierarchical transfer learning for text-to-speech in Indonesian, Javanese, And Sundanese lang...
ISBN:
(纸本)9781728192796
the proceedings contain 69 papers. the topics discussed include: usability and accessibility evaluation of banking websites;hierarchical transfer learning for text-to-speech in Indonesian, Javanese, And Sundanese languages;minimal explanations in RELU-based neural network via abduction;an implementation of area skyline query to select facilities location based on user's preferred surrounding facilities;ballot-polling risk-limiting audit for selection of CONDORCET winner;inverse distance weighted random forests: modeling unevenly distributed non-stationary geographic data;performance analysis of deep anomaly detection algorithms for commercial microwave link attenuation;a practical evaluation of dynamic time warping in financial time series clustering;and adverse drug reactions prediction using multi-label linear discriminant analysis and multi-label learning.
the proceedings contain 35 papers. the special focus in this conference is on Computational Intelligence in Security for Information systems. the topics include: Deep Wavelet Extreme Learning Machine for Data Classifi...
ISBN:
(纸本)9783030200046
the proceedings contain 35 papers. the special focus in this conference is on Computational Intelligence in Security for Information systems. the topics include: Deep Wavelet Extreme Learning Machine for Data Classification;palm Vein Age and Gender Estimation Using Center Symmetric-Local Binary Pattern;neuro-Evolutionary Feature Selection to Detect Android Malware;improving Blockchain Security Validation and Transaction Processing through Heterogeneous Computing;anomaly Detection on Patients Undergoing General Anesthesia;an Internet Voting Proposal Towards Improving Usability and Coercion Resistance;linearization of Cryptographic Sequences;On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework;a Novel Construction for Streaming Networks with Delays;comparison of System Call Representations for Intrusion Detection;hyot: Leveraging Hyperledger for Constructing an event-based Traceability System in IoT;data Mining for Statistical Evaluation of Summative and Competency-based Assessments in Mathematics;looking for the Antidote for Contaminated Water: Learning through an Escape Game;enhancing Collaborative Learning through Pedagogical Alignment;rules_Math: Establishing Assessment Standards;evaluate Mathematical Competencies in Engineering Using Video-Lessons;statistical Methods – What Is the Problem Here?;enhancing the Learning of Cryptography through Concept Maps;analysis of Student Achievement Scores: A Machine Learning Approach;analysis of Teacher Training in Mathematics in Paraguay’s Elementary Education System Using Machine Learning Techniques;Efficient Verification of Security Protocols Time Properties Using SMT Solvers;cooperative Evaluation Using Moodle;automatic Categorization of Introductory Programming Students;using Scratch to Improve Undergraduate Students’ Skills on Artificial Intelligence;project-based Methodology to Lecture on Web Frameworks Applied to the Management of Health-Related Data;mirkwood: An Online Parallel Craw
Power transformer takes an important place in the electrical delivery system. this equipment has to maintain its reliability and performance in order to provide good electricity. Power transformer is expected to be op...
详细信息
As database security issues become more and more important, copyright determination and database traceability technologies are becoming important requirements for database security. In order to trace the database at t...
详细信息
As we are mining streaming data using frequent pattern, the accumulation of time is a huge factor in influencing the relationship between data items. In this case, how to keep track of the historical information of st...
详细信息
A webserver is a provider that receives and provides data-based services that are sent through a web browser, then given a response in the form of web pages and HTML documents. the main problem that often occurs on a ...
详细信息
the proceedings contain 61 papers. the topics discussed include: quality-driven disorder handling for concurrent-windowed stream queries with shared operators;Enorm: efficient Window-based computation in large-scale d...
ISBN:
(纸本)9781450340212
the proceedings contain 61 papers. the topics discussed include: quality-driven disorder handling for concurrent-windowed stream queries with shared operators;Enorm: efficient Window-based computation in large-scale distributed stream processing systems;spreadsheets for stream processing with unbounded-windows and partitions;optimal operator placement for distributed stream processing applications;highly-available content-based publish/subscribe via gossiping;OMen: overlay mending for topic-based publish/subscribe systems under churn;shared dictionary compression in publish/subscribe systems;bandwidth-efficient content-based routing on software-defined networks;routing and scheduling of spatio-temporal tasks for optimizing airborne sensor system utilization;smooth and crispy - integrating continuous event proximity calculation and discrete event detection;reducing expenses of top-k monitoring in sensor cloud services;lessons learned using a process mining approach to analyze events from distributed applications;continuous analytics on graph data streams using WSO2 complex event processor;SPASS: scalable event stream processing leveraging sharing opportunities;complex event processing over streaming multi-cloud platforms - the FERARI approach;and RxSpatial: a framework for real-time spatiotemporal operations.
Termination is an important non-functional property of distributed algorithms. In an event-driven setting, the interesting aspect of termination is the possibility of control flow loops through communication, which th...
详细信息
ISBN:
(纸本)9781450367943
Termination is an important non-functional property of distributed algorithms. In an event-driven setting, the interesting aspect of termination is the possibility of control flow loops through communication, which this paper aims to investigate. In practice, it is often difficult to spot the possible communication behaviour of an algorithm at a glance. With a static analysis, the design process can be supported by visualizing possible flow of messages and give hints on possible sources of non-termination. We propose a termination analysis for distributed algorithms formulated in an event-driven specification language. the idea is to construct a message flow graph describing the possible communication between components (input-action pairs). We show that acyclicity of that graph implies termination. While many interesting algorithms indeed contain cycles, we also suggest ways of detecting cycles which cannot lead to non-termination. As a practical evaluation, we describe a concrete programming language together with a tool for automated termination analysis.
Aiming at the problems of uneven distribution of chaotic behavior, insufficient key space, and small amount of key change in a single chaotic system, a compound chaotic system (Logistic-Sine) composed of a single Logi...
详细信息
暂无评论