We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A refinement-based approach to safe smart contract deployment and evolution

    In our previous work, we proposed a verification framework that shifts from the “code is law” to a new “specification is law” paradigm related to the...

    Pedro Antonino, Juliandson Ferreira, ... Filipe Arruda in Software and Systems Modeling
    Article 25 January 2024
  2. Supporting safe metamodel evolution with edelta

    Metamodels play a crucial role in any model-based application. They underpin the definition of models and tools, and the development of model...

    Lorenzo Bettini, Davide Di Ruscio, ... Alfonso Pierantonio in International Journal on Software Tools for Technology Transfer
    Article Open access 03 February 2022
  3. Safe Contrastive Clustering

    Contrastive clustering is an effective deep clustering approach, which learns both instance-level consistency and cluster-level consistency in a...
    Pengwei Tang, Huayi Tang, ... Yong Liu in MultiMedia Modeling
    Conference paper 2023
  4. Neural-network-based safe learning control for non-zero-sum differential games of nonlinear systems with asymmetric input constraints

    This paper primarily investigates a neural-network-based safe control scheme for solving the optimal control problem of continuous-time (CT)...

    Chunbin Qin, Tianzeng Zhu, ... Jishi Zhang in Applied Intelligence
    Article 14 June 2024
  5. Safe AI in Autonomous Vehicles

    Today, the most prominent application of AI technology in the automotive domain is in the realm of environment perception. The diversity of the...
    Falk Howar, Hardi Hungar in Bridging the Gap Between AI and Reality
    Conference paper 2024
  6. Toward a safe MLOps process for the continuous development and safety assurance of ML-based systems in the railway domain

    Traditional automation technologies alone are not sufficient to enable driverless operation of trains (called Grade of Automation (GoA) 4) on...

    Marc Zeller, Thomas Waschulzik, ... Claus Bahlmann in AI and Ethics
    Article 03 January 2024
  7. Evolution of Computing

    Computers and computing emerged within a lifetime and completely changed our world. Although their history is brief, the change they precipitated has...
    Chapter Open access 2024
  8. Safe Software and Secure Software

    In most cyber-physical systems, the functionality is implemented in software. Therefore, the software is responsible for a significant part of safety...
    Chapter 2022
  9. Going beyond templates: composition and evolution in nested OSTRICH

    Low-code frameworks strive to simplify and speed up application development. An essential mechanism to achieve these goals is to have native support...

    João Costa Seco, Hugo Lourenço, ... Carla Ferreira in Software and Systems Modeling
    Article Open access 20 May 2024
  10. Safe and secure system architectures for cyber-physical systems

    Cyber-physical systems are at the core of our current civilization. Countless examples dominate our daily life and work, such as driverless cars that...

    Frank J. Furrer in Informatik Spektrum
    Article Open access 03 April 2023
  11. Reliable and Accurate Implicit Neural Representation of Multiple Swept Volumes with Application to Safe Human–Robot Interaction

    In automated production using collaborative robots in a manufacturing cell, a crucial aspect is to avoid collisions to ensure the safety of workers...

    Ming-Hsiu Lee, **g-Sin Liu in SN Computer Science
    Article Open access 12 March 2024
  12. An Architecture for Safe Driving Automation

    This paper presents a novel distributed computer architecture that supports the incremental development and validation of a safe and secure SAE...
    Hermann Kopetz in Principles of Systems Design
    Chapter 2022
  13. Type-safe Quantum Programming in Idris

    Variational Quantum Algorithms are hybrid classical-quantum algorithms where classical and quantum computation work in tandem to solve computational...
    Liliane-Joy Dandy, Emmanuel Jeandel, Vladimir Zamdzhiev in Programming Languages and Systems
    Conference paper Open access 2023
  14. Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance

    Autonomous spacecraft rendezvous poses significant challenges in increasingly complex space missions. Recently, Reinforcement Learning (RL) has...
    Yingmin **ao, Zhibin Yang, ... Zhiqiu Huang in Dependable Software Engineering. Theories, Tools, and Applications
    Conference paper 2024
  15. Revisiting Ontology Evolution Patterns

    Mixing formal methods (such as B) and ontology description languages is a promising approach to develop reliable, safe and secure systems. In fact,...
    Akram Idani, Rim Djedidi, German Vega in Advances in Model and Data Engineering in the Digitalization Era
    Conference paper 2022
  16. Fail-Safe Automatic Timed Response Protocol for Cyber Incident and Fault Management

    An operation modality sometimes referred to as Hybrid System Operation is increasingly prevalent as automated systems assume more control in...
    Zeth duBois, Roger Lew, Ronald L. Boring in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2023
  17. Safe reuse in modelling language engineering using model subty** with OCL constraints

    Low-code software development promises rapid delivery of software cloud applications by employing domain-specific languages (DSLs), requiring minimal...

    Article Open access 05 September 2022
  18. Assigning Safe Executed Systems to Meanings

    The B method is a formal method to design software components and to prove that they are compliant with some formalized requirements, giving a way to...
    Conference paper 2022
  19. Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models

    Model extraction emerges as a critical security threat with attack vectors exploiting both algorithmic and implementation-based approaches. The main...
    Kevin Hector, Pierre-Alain Moëllic, ... Mathieu Dumont in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  20. Road Environment Perception for Safe and Comfortable Driving

    With the ongoing evolution of autonomous driving technology, road environment perception systems have become a significant focus of research....
    Sicen Guo, Yu Jiang, ... Rui Fan in Autonomous Driving Perception
    Chapter 2023
Did you find what you were looking for? Share feedback.