An Intrusion Detection System (IDS) is a security-based mechanism used for finding malicious activities and unauthorized access in a computer network or system. IDS solutions are now more essential than ever because o...
详细信息
In the automotive industry, according to ISO 26262, comprehensive testing is conducted to ensure softwaresystems quality over various phases of the V-model. However, at the system integration and testing phase, a sig...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into computer science education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computer science programs, (2) construct level-appropriate examples that could be included midway into one’s undergraduate studies, (3) demonstrate how to address successive "failures" through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding TLA+ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in TLA+ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudinal analysis within our own institution and
This article proposes a novel approach to traffic signal control that combines phase re-service with reinforcement learning (RL). The RL agent directly determines the duration of the next phase in a pre-defined sequen...
详细信息
This paper discusses the management of revisions and variants of musical works for the context of musicological research. Domain-specific languages (DSLs) are a fundamental tool in music notation and analysis, as they...
详细信息
Today, the tourism industry is significantly impacted by mobile applications leveraging Artificial Intelligence (AI) and Natural Language Processing (NLP) to enhance tourists' experiences before, during, and after...
详细信息
Conversational agents (CA) are software programs that can converse with users using natural language. They are now widely used in various domains, such as tourism, healthcare, and others, to perform tasks and provide ...
详细信息
In multi-agent path finding (MAPF), agents must move from their current positions to their target positions without colliding. Prior work on MAPF commonly assumed perfect knowledge of the environment. We consider a MA...
详细信息
Learning classifiers with uneven class distribution datasets poses a significant challenge in software defect prediction. This problem arises when the number of samples representing one class is significantly smaller ...
详细信息
In the field of mobile robotics, the interaction of robots with their environment plays a key role. Simulations serve to simulate a part of the environment so that the partly complex hardware is not damaged in extensi...
详细信息
暂无评论