Artificial Intelligence Logic and Applications
The 2nd International Conference, AILA 2022, Shanghai, China, August 26–28, 2022, Proceedings
Chapter and Conference Paper
Heterogeneous multicore system integrated with FPGA has been shown to yield superior performance when executing real-time applications. In this paper, we propose a heterogeneous multicore co-scheduling algorit...
Chapter and Conference Paper
Fuzzy c-means (i.e., FCM) is a representative clustering method that is widely used in machine learning and pattern recognition. It can describe the degree of fuzziness of objects to clusters using memberships...
Chapter and Conference Paper
With the frequent occurrence of security issues in open-source software, the public is gradually paying attention to the trustworthiness of open-source software. As the cradle of open-source software, the open...
Chapter and Conference Paper
Software trustworthiness measurement becomes a focus in software companies. In software trustworthiness measurement, traditional Analytic Hierarchy Process (shortly, AHP) is usually utilized to estimate softwa...
Chapter and Conference Paper
Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design, preventing them from working properly. It is therefore necessary to a...
Chapter and Conference Paper
The software has been a part of our daily life. However, software systems are becoming more and more complex, with many uncertainties, unavoidable software bugs, failures, and even disasters. The measurement o...
Book and Conference Proceedings
The 2nd International Conference, AILA 2022, Shanghai, China, August 26–28, 2022, Proceedings
Chapter and Conference Paper
The Clock Constraint Specification Language (CCSL) is a clock-based specification language for capturing causal and chronometric constraints between events in Real-Time Embedded Systems (RTESs). Due to the lim...
Chapter and Conference Paper
The goal of this paper is to investigate measurement models of transitive trustworthiness for trustworthy networks. The reals in the interval [0,1] are used to define trust degrees in such a way that the large...