Assembly modeling in computer-aided design (CAD) refers to designing new products based on a collection of preexisting individual parts. To streamline this process, designers would benefit from recommendations for par...
详细信息
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many softwareengineering tasks such as program classification [1] and defect detection. Ear...
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many softwareengineering tasks such as program classification [1] and defect detection. Earlier approaches treat the code as token sequences and use CNN, RNN, and the Transformer models to learn code representations.
Unified Modeling Language (UML) is a versatile tool for specifying, visualizing, and documenting softwaresystems through diagrams. In the early stages of development, addressing design issues is critical to improving...
详细信息
ISBN:
(数字)9798350367027
ISBN:
(纸本)9798350367034
Unified Modeling Language (UML) is a versatile tool for specifying, visualizing, and documenting softwaresystems through diagrams. In the early stages of development, addressing design issues is critical to improving software quality and reducing costs. Use case modeling and UML scenario engineering are key techniques in requirements elicitation and specification development. This paper presents best practices for applying these techniques, highlighting their role in constructing accurate sequence diagrams and integrating formal specifications with user interface prototyping. Additionally, it explores extending scenarios to manage complex requirements like time and security constraints and offers a framework for visualizing business interactions in B2B environments to improve communication among stakeholders.
Attack vectors for adversaries have increased in organizations because of the growing use of less secure IoT devices. The risk of attacks on an organization’s network has also increased due to the bring your own devi...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions $(\text{TLA}^{+}...
详细信息
ISBN:
(数字)9798350351507
ISBN:
(纸本)9798350363067
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions $(\text{TLA}^{+})$ , into computer science education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computer science programs, (2) construct level-appropriate examples that could be included midway into one's undergraduate studies, (3) demonstrate how to address successive “failuresy” through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding $\text { TLA }^{+}$ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in $\text { TLA }^{+}$ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudi
Recent decades have witnessed a trend that the echo state network(ESN)is widely utilized in field of time series prediction due to its powerful computational ***,most of the existing research on ESN is conducted under...
详细信息
Recent decades have witnessed a trend that the echo state network(ESN)is widely utilized in field of time series prediction due to its powerful computational ***,most of the existing research on ESN is conducted under the assumption that data is free of noise or polluted by the Gaussian noise,which lacks robustness or even fails to solve real-world *** work handles this issue by proposing a probabilistic regularized ESN(PRESN)with robustness ***,we design a novel objective function for minimizing both the mean and variance of modeling error,and then a scheme is derived for getting output weights of the ***,generalization performance,robustness,and unbiased estimation abilities of the PRESN are revealed by theoretical ***,experiments on a benchmark dataset and two real-world datasets are conducted to verify the performance of the proposed *** source code is publicly available at https://***/LongJinlab/probabilistic-regularized-echo-state-network.
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ...
详细信息
To informatively plan optimal paths for autonomous mobile robots in indoor environment is essential in real life cases. In view of the shortcomings of the traditional path planning strategies based on the cameras moun...
详细信息
Vision transformers have contributed greatly to advancements in the computer vision domain, demonstrating state-of-the-art performance in diverse tasks (e.g., image classification, object detection). However, their hi...
Medical notes contain valuable information about patient conditions, treatments, and progress. Extracting symptoms from these unstructured notes is crucial for clinical research, population health analysis, and decisi...
详细信息
暂无评论