A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Requirements-driven Test Generation for Autonomous Vehicles with Machine Learning Components
[article]
2019
arXiv
pre-print
Our framework evaluates test cases against the STL formulae and additionally uses the requirements to automatically identify test cases that fail to satisfy the requirements. ...
We present a testing framework that uses signal temporal logic (STL), which is a precise and unambiguous requirements language. ...
III, for a trajectory with respect to the requirement is automatically computed in Sim-ATAV. ...
arXiv:1908.01094v1
fatcat:b65tzewderajrkeiukezvlbiga
Freedom and torture: the new architecture of domination and refusal. The aesthetics of refusal and architectural atavism
2020
Since 1963, artists Shusaku Arakawa and Madeline Gins have attempted to realize a body made immortal by reskilling its habitual experience of architecture. ...
Contrary to the view that Arakawa and Gins' work is playful and horizontalist, underlying this veneer of play is a politics of force, of carving their ideal into the body through the spectacular imposition ...
These frameworks are the sedimentation of habit. ...
doi:10.34632/comunicacaoecultura.2013.5117
fatcat:wlpgrukzrrb67blbsdgniccm6y
Psychology and Deterrence
1988
American Political Science Review
for their detailed and extraordinarily helpful comments on an earlier draft of this chapter. ...
For the fourth time, in early 1973, Egyptian military officers planned a surprise attack for limited military objectives in coordination with Syria. And again, in May, the attack was postponed. ...
For a long time no such investigation was attempted. ...
doi:10.2307/1958134
fatcat:klazd435ibabpi7tcx2ul6674e
Toni Cade Bambara's vulnerable men
[chapter]
2021
Mediating Vulnerability
More recently, she has published a volume on the Interview as Creative Practice with Rebecca Roach (Special issue of Biography) and she edited Writing Manuals for the Masses (2020) with Dirk de Geest. ...
Her book The Unconcept: The Freudian uncanny in contemporary theory (2011) is a systematic genealogy of the uncanny. ...
This volume is the result of long-standing discussions that started during two international doctoral summer schools convened by the Hermes Consortium for Literary and Cultural Studies, a network of 11 ...
doi:10.2307/j.ctv1nnwhjt.9
fatcat:zmcuw3h2wrfczih4jow5sh4f6a
Software Engineering and Software Management 2019
2019
Software Engineering
We want to thank the authors and presenters of the accepted papers and the keynote speaker Marcus Deininger.W eexpress our gratitude to the SEŠ19 conference organizers fors upporting our workshop. ...
In our evaluation with 120 real-world systems from different domains, we confirm a significant increase in efficiency, when using a MIG for decision propagation. ...
Vulnerability databases contain knowledgeabout security bestpractices and also known vulnerabilities in frameworks and algorithms, typicallywith appropriate mitigations. ...
doi:10.18420/se2019-58
dblp:conf/se/HaendlerN19
fatcat:dktca4qfafahrp3roj3epwjdli
Between Charcot and Bernheim: The debate on hypnotism in fin-de-siècle Italy
2017
Notes and Records: the Royal Society journal of the history of science
1880s, studies on hypnotic suggestion by the Salpêtrière and Nancy Schools of hypnotism gave further impetus to research and therapeutic experimentation and inspired the emergence of an interpretative framework ...
In the following years, French studies on hypnotism continued to exert a strong influence in Italy. ...
For a discussion of Lombroso's notion of atavism, see S. A. Cole and M. C. ...
pmid:30125057
pmcid:PMC5554306
fatcat:5tphev4p4jdppphwyvhcphbvs4
Primera declaración Mexicana en materia de Insuficiencia Cardiaca
2021
Cardiovascular and Metabolic Science
Evaluation in the pre-discharge period. As noted, the vulnerable period of heart failure is the best time to initiate or optimize a diseasemodifying treatment. ...
measures to move to the chronic phase of the disease in a safe framework. ...
doi:10.35366/98870
fatcat:5ratikkwgnemnladsh7tuekvyq
Law and its doctrinal study
2008
Acta Juridica Hungarica
For it converts law positedly built by consecutive structuring of words into some sort of a uniform conceptual system. Therefore it is an authored product mostly in a historical chain. ...
In European history, the continental tradition has retraced ius to lex for the law to be embodied by posited texts. Dogmatics is a meta-structure logified upon them. ...
analytical work (providing the law with a self-referential framework for interpretation) built around (and above) the actual primary tear of the law, which in the early Modern Times, when the law codification ...
doi:10.1556/ajur.49.2008.3.1
fatcat:2sabauccn5hb7brliul42ggxzu
Cancer: Beyond Speciation
[chapter]
2011
Advances in Cancer Research
time) which actually determines ''rapidity of proliferation'' for the tumor as a whole. ...
delivery purpose or immune attack; or mutant macromolecules that can be used for delivery or catalysis purposes. ...
doi:10.1016/b978-0-12-387688-1.00010-7
pmid:21925308
fatcat:dmqjmpwa35hcte5savghdtxnwm
Notes on troubling 'the popular'
2018
Popular Music
for edification and to champion ideals of respectability. ...
by pursuing a genealogy of discourse in Britain during a crucial period from 1860 to 1920 in which modernity is increasingly characterised by an antagonistic relationship between intellectual elites and ...
Acknowledgements My thanks go to Delia Casadei, Nick Cook, James Gabrillo, Oskar Cox Jensen, and Chris Townsend for their thoughts on an early draft. ...
doi:10.1017/s0261143018000247
fatcat:uqx7rfsn5bc3re2urbfviq2kl4
Developing a Vulnerability Assessment Concept for eHealth iOS Applications
2021
This thesis aims to design a vulnerability assessment concept for iOS apps that considers specific eHealth requirements. ...
Mobile health apps process a lot of sensitive data that needs to be protected. Misconfigurations and faultily designed software often lead to app vulnerabilities. ...
The resultingr eport contains the detected vulnerabilities, risk estimation,a nd mitigation strategies. 6.1.2 NIST additional discovery Planning Discovery Attack 1. Test time and date Reporting 2. ...
doi:10.34726/hss.2021.94801
fatcat:3ababjzwbjbwfii72ptq5vwnui
Cultural Expertise: An Emergent Concept and Evolving Practices
2019
Laws
gender rights, including the revisitation of socio-legal instruments such as the cultural test and the scrutiny of psychiatric evaluation in criminal trials. ...
It starts with the definition of cultural expertise and the need for an integrated and broad conceptualization that includes all the arrays of socio-legal instruments that use knowledge from the social ...
Funding: This special issue is an output of the project titled "Cultural Expertise in Europe: What is it useful for?" ...
doi:10.3390/laws8040028
fatcat:ds7zozrfsbaatgwdmnirhcqp44
Scandinavian forensic psychiatric practices – an overview and evaluation
2005
Nordic Journal of Psychiatry
Special measures A decision by the court that a defendant is legally insane for his actions will not automatically lead to an acquittal. ...
Hence, there will be no need for a (time consuming) full report. ...
doi:10.1080/08039480510022927
pmid:16195105
fatcat:sw5kpnt5yvabfpdsc3hhutr4cq
The Troubled Encounter Between Postcolonialism and African History
2006
Journal of the Canadian Historical Association
This has been a source of both its strengths and its weaknesses. Ania Loomba offers a measured evaluation of postcolonialism for the study of colonialism as a whole and literacy criticism itself. ...
our time?" ...
doi:10.7202/016592ar
fatcat:ts7gnxtzzzfybii4ftgixyr6ei
Deadly Symbiosis
2001
Punishment & Society
The recent upsurge in black incarceration results from the crisis of the ghetto as device for caste control and the correlative need for a substitute apparatus for the containment of lower-class African ...
, spawning a carceral continuum that entraps a population of younger black men rejected by the deregulated wage-labor market. ...
' to 'doing gang time'. ...
doi:10.1177/14624740122228276
fatcat:4it4vvpzpncczha3t3bh5mzr7m
« Previous
Showing results 1 — 15 out of 131 results