We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Safe Session-Based Concurrency with Shared Linear State

    We introduce \(\textsf{CLASS}\) , a session-typed,...
    Pedro Rocha, Luís Caires in Programming Languages and Systems
    Conference paper Open access 2023
  2. The Physical Principles of the Construction of Systems for Safe Monitoring of the State of a Human Operator

    Abstract

    Based on an analysis of statistical data on railway and road traffic, as well as laboratory studies, mathematical models are developed that...

    S. V. Gerus, V. V. Dementienko, V. I. Mirgorodskiy in Pattern Recognition and Image Analysis
    Article 01 December 2023
  3. Safe Contrastive Clustering

    Contrastive clustering is an effective deep clustering approach, which learns both instance-level consistency and cluster-level consistency in a...
    Pengwei Tang, Huayi Tang, ... Yong Liu in MultiMedia Modeling
    Conference paper 2023
  4. Improving Time to Take Over Through HMI Strategies Nudging a Safe Driving State

    In scenarios of partially autonomous driving, drivers can easily become distracted and engage in secondary activities unrelated to driving. However,...
    Roberta Presta, Chiara Tancredi, ... Laura Mancuso in HCI in Mobility, Transport, and Automotive Systems
    Conference paper 2024
  5. SAFe transformation in a large financial corporation

    As agile software development is increasingly adopted in the software industry, the popularity of scaling frameworks supporting adoption in large...

    Abheeshta Putta, Maria Paasivaara, Casper Lassenius in Empirical Software Engineering
    Article Open access 16 December 2023
  6. Time Travel and Fail-Safe

    Data is an asset that has a major impact on the long-term success of an enterprise. Access to the right data at the right time is extremely important...
    Chapter 2023
  7. SASH: Safe Autonomous Self-Healing

    With the large scale and user demands on modern cloud systems there is a need for autonomous approaches to self-healing. When there is no operator in...
    Gary White, Leonardo Lucio Custode, Owen O’Brien in Service-Oriented Computing – ICSOC 2022 Workshops
    Conference paper 2023
  8. Safe Autonomous Decision-Making with vGOAL

    Safety is one of the crucial features of autonomous systems. Safe decision-making is a critical and challenging task in develo** such systems. To...
    Conference paper 2023
  9. Safe Distributional Reinforcement Learning

    Safety in reinforcement learning (RL) is a key property in both training and execution in many domains such as autonomous driving or finance. In this...
    Jianyi Zhang, Paul Weng in Distributed Artificial Intelligence
    Conference paper 2022
  10. The Solvability of Consensus in Iterated Models Extended with Safe-Consensus

    The safe-consensus task was introduced by Afek, Gafni and Lieber (DISC’ 09) as a weakening of the classic consensus. When there is concurrency, the...

    Rodolfo Conde, Sergio Rajsbaum in Theory of Computing Systems
    Article Open access 17 July 2023
  11. Nudging the Safe Zone: Design and Assessment of HMI Strategies Based on Intelligent Driver State Monitoring Systems

    Dangerous driver behavior can arise from different factors: distraction, sleepiness, and emotional states like anger, anxiety, boredom, or happiness....
    Roberta Presta, Flavia De Simone, ... Silvia Chiesa in HCI in Mobility, Transport, and Automotive Systems
    Conference paper 2023
  12. Safe and Robust Transfer Learning

    In this chapter, we discuss the safety and robustness of transfer learning. By safety, we refer to its defense and solutions against attack and data...
    **dong Wang, Yiqiang Chen in Introduction to Transfer Learning
    Chapter 2023
  13. A refinement-based approach to safe smart contract deployment and evolution

    In our previous work, we proposed a verification framework that shifts from the “code is law” to a new “specification is law” paradigm related to the...

    Pedro Antonino, Juliandson Ferreira, ... Filipe Arruda in Software and Systems Modeling
    Article 25 January 2024
  14. Neural-network-based safe learning control for non-zero-sum differential games of nonlinear systems with asymmetric input constraints

    This paper primarily investigates a neural-network-based safe control scheme for solving the optimal control problem of continuous-time (CT)...

    Chunbin Qin, Tianzeng Zhu, ... Jishi Zhang in Applied Intelligence
    Article 14 June 2024
  15. Safe optimal robust control of nonlinear systems with asymmetric input constraints using reinforcement learning

    External disturbances and asymmetric input constraints may cause a major problem to the optimal control of the system. Aiming at such problem, this...

    Dehua Zhang, Yuchen Wang, ... Linlin Liang in Applied Intelligence
    Article 05 December 2023
  16. State

    The State Pattern encapsulates state expressions in objects. This can be useful if an object shows different behavior depending on its state. With...
    Chapter 2023
  17. Safe Exploration Method for Reinforcement Learning Under Existence of Disturbance

    Recent rapid developments in reinforcement learning algorithms have been giving us novel possibilities in many fields. However, due to their...
    Yoshihiro Okawa, Tomotake Sasaki, ... Toru Namerikawa in Machine Learning and Knowledge Discovery in Databases
    Conference paper 2023
  18. Online disinformation in the 2020 U.S. election: swing vs. safe states

    For U.S. presidential elections, most states use the so-called winner-take-all system, in which the state’s presidential electors are awarded to the...

    Manuel Pratelli, Marinella Petrocchi, ... Rocco De Nicola in EPJ Data Science
    Article Open access 26 March 2024
  19. Generic Security of the SAFE API and Its Applications

    We provide security foundations for SAFE, a recently introduced API framework for sponge-based hash functions tailored to prime-field-based...
    Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  20. SAMBA: safe model-based & active reinforcement learning

    In this paper, we propose SAMBA, a novel framework for safe reinforcement learning that combines aspects from probabilistic modelling, information...

    Alexander I. Cowen-Rivers, Daniel Palenicek, ... Haitham Bou-Ammar in Machine Learning
    Article 04 January 2022
Did you find what you were looking for? Share feedback.