2,030 Hits in 10.9 sec

Systems Challenges for Trustworthy Embodied Systems [article]

Harald Rueß
2022 arXiv   pre-print
We are therefore identifying a number of urgent systems challenges for trustworthy embodied systems, including robust and human-centric AI, cognitive architectures, uncertainty quantification, trustworthy  ...  When deploying embodied systems into a real-life context we face various engineering challenges, as it is crucial to coordinate the behavior of embodied systems in a beneficial manner, ensure their compatibility  ...  On the one hand, they must be able to handle uncertainties due to the imprecision of sensors and the behavior of data-driven components for perceiving and interpreting the context to enable decisions to  ... 
arXiv:2201.03413v2 fatcat:hwprg3zjhvfuro3etecx2t4qua

Technologies for fall risk assessment and conceptual design in personal health record system

Milla Sinikka Immonen, Heidi Similä, Mikko Lindholm, Raija Korpelainen, Timo Jämsä
2019 Finnish Journal of eHealth and eWelfare  
The study also presents one easy to use solution for assessing fall risk and suggests a concept-design for integrating sensor-based solutions into the Finnish national Kanta Personal Health Record.  ...  A wide implementation still requires extensive validation studies, adoption to health care processes and novel IoT -solutions for collecting large amounts of sensor data.  ...  The authors would like to thank Timo Niemirepo for developing the mobile software for fall risk assessment.  ... 
doi:10.23996/fjhw.73258 fatcat:lprfyt64f5bwnkk7obc7ejcpwm

Contextual Awareness in Human-Advanced-Vehicle Systems: A Survey

Raul Fernandez-Rojas, Anthony Perry, Hemant Singh, Benjamin Campbell, Saber Elsayed, Robert Hunjet, Hussein Abbass
2019 IEEE Access  
systems as the enabling technology for recommender systems to operate autonomously.  ...  His research interests include machine learning, human-robot teaming, and modeling cognitive states using neuroimaging methods such as fNIRS and EEG.  ...  In it, a user initiates a task, and the system provides assistance and makes recommendations based on the known action sequence (work plan) and system context.  ... 
doi:10.1109/access.2019.2902812 fatcat:ieqvknlscjgfthy3snql53ohzi

Context Aware Control Systems: An Engineering Applications Perspective

Ricardo Alfredo Cajo Diaz, Mihaela Ghita, Dana Copot, Isabela Roxana Birs, Cristina Muresan, Clara Ionescu
2020 IEEE Access  
The integration of CACSs and affective computing paradigms is proposed by [63] for building a mobile platform that identifies and interprets the affective state.  ...  Smart devices use sensors (and thus data) to autonomously gather, share, analyse and interpret the information to make decisions.  ...  Currently, her research interests focus on novel tools for modeling and control of dynamical systems with fractional calculus tools.  ... 
doi:10.1109/access.2020.3041357 fatcat:774abyybrbb4hcxtfepj2xngd4

Sources of Risk of AI Systems

André Steimers, Moritz Schneider
2022 International Journal of Environmental Research and Public Health  
For this purpose, the differences between AI systems, especially those based on modern machine learning methods, and classical software were analysed, and the current research fields of trustworthy AI  ...  These new sources of risk should be taken into account in the overall risk assessment of a system based on AI technologies, examined for their criticality and managed accordingly at an early stage to prevent  ...  Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/ijerph19063641 pmid:35329328 pmcid:PMC8951316 fatcat:zrld4nlgmfevzfiaxwq5drqzo4

Fusion paradigms in cognitive technical systems for human–computer interaction

Michael Glodek, Frank Honold, Thomas Geier, Gerald Krell, Florian Nothdurft, Stephan Reuter, Felix Schüssel, Thilo Hörnle, Klaus Dietmayer, Wolfgang Minker, Susanne Biundo, Michael Weber (+2 others)
2015 Neurocomputing  
To do so, a CTS has to rely on data from multiple sensors which must be processed and combined by fusion algorithms.  ...  Recent trends in human-computer interaction (HCI) show a development towards cognitive technical systems (CTS) to provide natural and efficient operating principles.  ...  Acknowledgments This paper is based on work done within the transregional collaborative research centre SFB/TRR 62 Companion-Technology  ... 
doi:10.1016/j.neucom.2015.01.076 fatcat:jkkyivq4afgxxcscaljfhketpu

Tailored Uncertainty Estimation for Deep Learning Systems [article]

Joachim Sicking, Maram Akila, Jan David Schneider, Fabian Hüger, Peter Schlicht, Tim Wirtz, Stefan Wrobel
2022 arXiv   pre-print
In this work, we propose a framework that, firstly, structures and shapes these requirements, secondly, guides the selection of a suitable uncertainty estimation method and, thirdly, provides strategies  ...  By contributing tailored uncertainty estimation in this sense, our framework helps to foster trustworthy DL systems.  ...  Poretschkin for fruitful discussions on the standardization and regulation of ML systems.  ... 
arXiv:2204.13963v1 fatcat:ofd4dibpxjemfeylt6hsc7puoa

Overview and Challenges of Ambient Systems, Towards a Constructivist Approach to their Modelling [article]

Gérald Rocher, Jean-Yves Tigli, Stéphane Lavirotte, Nhan Le Thanh
2020 arXiv   pre-print
However, due to the complexity of these systems and the inability to predict the effects of their actions, the responsibility for these actions still often remains with users.  ...  It is no longer a question of predicting but of evaluating in vivo the effectiveness of these systems. The perspectives for such an approach are discussed.  ...  As a result, responsibility for actions is often left to individuals, with ambient systems only providing support for decision-making. IV.  ... 
arXiv:2001.09770v1 fatcat:4pbkphppevhappmk5xdr3j36yi

A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems

Denise Ratasich, Faiq Khalid, Florian Geissler, Radu Grosu, Muhammad Shafique, Ezio Bartocci
2019 IEEE Access  
The cyber-physical systems (CPS) monitor and control the things from the distance. As a result, the concepts of dependability and security get deeply intertwined.  ...  Furthermore, this paper presents the main challenges in building a resilient IoT for CPS which is crucial in the era of smart CPS with enhanced connectivity (an excellent example of such a system is connected  ...  Classification-based anomaly detection learns a model (SVM, neural network, Bayesian networks, rules or decision trees) given labeled training data (e.g., states and observations of the system) to cluster  ... 
doi:10.1109/access.2019.2891969 fatcat:hb77c2cenfhlpbtpnjql5umh6a

Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps

Andreas Thompson, Gencer Erdogan
2020 Proceedings of the 6th International Conference on Information Systems Security and Privacy  
Based on our initial result we argue that our tool-supported method: is easy to use and understandable for developers, supports the planning of trustworthy smart IoT systems in the DevOps practice in terms  ...  With the rapid growth of the devices, the physical nature of these devices, and the amount of data collected, there will be a greater need for trustworthiness.  ...  Acknowledgements The present work was carried out at the University of Oslo, the Department of Informatics at the Faculty of Mathematics and Natural Sciences and SINTEF, Oslo, between 2018 and 2019.  ... 
doi:10.5220/0009189307420753 dblp:conf/icissp/ThompsonE20 fatcat:llqe7tubzfcvpk7p66rs7crvn4

Quality of Context in Context-Aware Systems

Asma A.Q. Al-Shargabi, Francois Siewe, Ammar T. Zahary
2017 EAI Endorsed Transactions on Context-aware Systems and Applications  
To limit the impact of context imperfection on the behavior of a context-aware system, a notion of Quality of Context (QoC) is used to measure quality of any information that is used as context information  ...  This paper reports an analytical review the state of the art on quality of context in context-aware systems and points to future research directions.  ...  Authors in [40] and [63] introduced a policy based approach for QoC.  ... 
doi:10.4108/eai.6-7-2017.152761 fatcat:6ywpegucgfdfxmh3fkcurj6rfq

Commercial Collaboration for Collision Avoidance and Flight Operations [chapter]

David Finkleman
2013 Space Operations: Experience, Mission Systems, and Advanced Concepts  
The Space Data Center demonstrates the ability of industry to respond rapidly and effectively to demonstrated need industry-wide and among Governments.  ...  The paper will trace development, describe capabilities, and suggest future collaboration and improvement.  ...  CSSI experts have defined requirements for actionability. 11 These include considering the age of orbit estimates included, the reference frames and coordinate systems of contributing data, the time  ... 
doi:10.2514/5.9781624102080.0193.0208 fatcat:xehidhwmwbgt7ky442two4eski

ActivFORMS: A Formally-Founded Model-Based Approach to Engineer Self-Adaptive Systems [article]

Danny Weyns, M. Usman Iftikhar
2022 arXiv   pre-print
Self-adaptation equips a computing system with a feedback loop that enables it dealing with change caused by uncertainties during operation, such as changing availability of resources and fluctuating workloads  ...  ActivFORMS contributes an end-to-end approach for engineering self-adaptive systems, spanning four main stages of the life cycle of a feedback loop: design, deployment, runtime adaptation, and evolution  ...  We are grateful to VersaSense, Gowri Sankar Ramachandran, and Ritesh Kumar Singh for setting up DeltaIoT. We express our appreciation to Prof.  ... 
arXiv:1908.11179v3 fatcat:2erkrwordnaljgaxrrg3trlbxa

Intrusion Response Systems: A Survey [chapter]

Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi, Eugene H. Spafford
2008 Information Assurance  
Then we provide a classification of existing work on the topic into four categoriesresponse through static decision tables, response through dynamic decision process, intrusion tolerance through diverse  ...  replicas, and intrusion response for specific classes of attacks.  ...  There are likely to be a vast number of states for a real production system, and this would preclude any approach that relies on statically enumerating the states and creating the responses in each state  ... 
doi:10.1016/b978-012373566-9.50015-x fatcat:tlmg46x475gp3maja6ytpzgope

Intrusion Response Systems: A Survey [chapter]

2008 Network Security Desk Reference  
Then we provide a classification of existing work on the topic into four categoriesresponse through static decision tables, response through dynamic decision process, intrusion tolerance through diverse  ...  replicas, and intrusion response for specific classes of attacks.  ...  There are likely to be a vast number of states for a real production system, and this would preclude any approach that relies on statically enumerating the states and creating the responses in each state  ... 
doi:10.1016/b978-0-12-374463-0.00010-2 fatcat:4wmfeklxqjfmvfrejpjt4aa65a
« Previous Showing results 1 — 15 out of 2,030 results