Search
Search Results
-
Some Remarks About Dependent Type Theory
The goal of this chapter is to describe a calculus designed in 1984/1985. This calculus was obtained by applying the ideas introduced by N.G. de... -
Routing, Models, and Controllers
In this chapter, we add the project started in Chap. 6 and demonstrate how to make use of concepts such as... -
Consistent Look: Layouts, Friendly Error Pages, and Environments
In this chapter, we will update the project seen in the previous chapter. In particular, we will demonstrate how to make use of layouts and friendly... -
Introduction to Authentication. User Login, Logout, and Registration
In this chapter, we will update the project seen in the previous chapter. In particular, we will briefly demonstrate how to make use of Identity in... -
On Identifiability of BN2A Networks
In this paper, we consider two-layer Bayesian networks. The first layer consists of hidden (unobservable) variables and the second layer consists of... -
Sana Solo: An Intelligent Approach to Measure Soil Fertility
Worm castings (Worm Excretion) are one the richest natural fertilizers on earth, making earthworms a very important and applicable soil health... -
FAMID: False Alarms Mitigation in IoMT Devices
Wearable and Implantable Medical Devices (WIMDs) and Physiological Closed-loop Control Systems (PCLCS) are crucial elements in the advancing field of... -
EHR Security and Privacy Aspects: A Systematic Review
Electronic Health Records (EHRs) have become increasingly popular in recent years, providing a convenient way to store, manage and share relevant... -
Machine Learning-Based Multi-stratum Channel Coordinator for Resilient Internet of Space Things
Sensing and transferring data are critical and challenging tasks for space missions, especially in the presence of extreme environments. Unlike... -
ALBA: Novel Anomaly Location-Based Authentication in IoMT Environment Using Unsupervised ML
Smartphones have become essential components in the Internet of Medical Things (IoMT), providing convenient interfaces and advanced technology that... -
Simulated Annealing Based Area Optimization of Multilayer Perceptron Hardware for IoT Edge Devices
The deployment of highly parameterized Neural Network (NN) models on resource-constrained hardware platforms such as IoT edge devices is a... -
VXorPUF: A Vedic Principles - Based Hybrid XOR Arbiter PUF for Robust Security in IoMT
The Internet of Medical Things (IoMT) is playing a pivotal role in the healthcare sector by allowing faster and more informed hospital care,... -
PTSD Detection Using Physiological Markers
This is an extended abstract for a Research Demo Session based on our published work [1]. PTSD has been a major problem in our society and much... -
Fog Computing in the Internet of Things: Challenges and Opportunities
The expansion of the Internet of Things (IoT) has made it possible for numerous widespread objects to connect to one another and communicate with one... -
FarmIns: Blockchain Leveraged Secure and Reliable Crop Insurance Management System
Farmer uses traditional crop insurance to protect their farms against crop loss and natural risks. However, farmers are concerned about crop... -
A Survey of Pedestrian to Infrastructure Communication System for Pedestrian Safety: System Components and Design Challenges
As urbanization continues to grow and smart cities are imagined, intelligent transportation systems (ITS) have become increasingly important as a... -
ChatGPT in the Loop: A Natural Language Extension for Domain-Specific Modeling Languages
This paper presents an approach to no-code development based on the interplay of formally defined (graphical) Domain-Specific Languages and informal,... -
Continuous Engineering for Trustworthy Learning-Enabled Autonomous Systems
Learning-enabled autonomous systems (LEAS) use machine learning (ML) components for essential functions of autonomous operation, such as perception... -
Benchmarks: Semantic Segmentation Neural Network Verification and Objection Detection Neural Network Verification in Perceptions Tasks of Autonomous Driving
The verification of the security of neural networks is cruicial, especially for the field of autonomous driving. Although there are currently... -
Welcome Remarks from AISoLA 2023/Track C2 Chairs
We are happy to present the proceedings of AISoLA’s Track C2: Verification meets Learning and Statistics.