Filters








295 Hits in 3.0 sec

How to Safeguard AI [chapter]

Ina Schieferdecker, Jürgen Großmann, Martin A. Schneider
2019 The Democratization of Artificial Intelligence  
lead by Dirk Messner and Sabine Schlacke, with the participants at the conference "The Democratization of AI.  ...  Net Politics in the Era of Learning Algorithms" in Bochum, September 2018 led by Andreas Sudmann and with the members of the ITEA3 project "Industrial-grade Verification and Validation of Evolving Systems  ...  Sensors are part of the Internet of Things and generate dif ferent kinds of data such as measurements, series of measurements or data streams.  ... 
doi:10.14361/9783839447192-015 fatcat:lnllyqez7fgmxjy2zfri4qhc5q

Reliable Task Management Based on a Smart Contract for Runtime Verification of Sensing and Actuating Tasks in IoT Environments

Lei Hang, Do-Hyeun Kim
2020 Sensors  
With the gradual popularization of Internet-of-Things (IoT) applications and the development of wireless networking technologies, the use of heterogeneous devices and runtime verification of task fulfillment  ...  The usability of the proposed solution is further demonstrated by implementing a prototype application in which the Hyperledger Fabric is utilized to implement the business logic for runtime verification  ...  The authors in [25] present a novel solution framework that is first of its kind in proposing the democratization of runtime verification based on a model-based testing approach.  ... 
doi:10.3390/s20041207 pmid:32098340 pmcid:PMC7070672 fatcat:ybh52tet6nbmzjzxapzxrxh4ca

A Survey of Challenges for Runtime Verification from Advanced Application Domains (Beyond Software) [article]

César Sánchez and Gerardo Schneider and Wolfgang Ahrendt and Ezio Bartocci and Domenico Bianculli and Christian Colombo and Yliés Falcone and Adrian Francalanza and Sran Krstić and Joa̋o M. Lourenço and Dejan Nickovic and Gordon J. Pace and Jose Rufino and Julien Signoles and Dmitriy Traytel and Alexander Weiss
2018 arXiv   pre-print
Typically, the two main activities in runtime verification efforts are the process of creating monitors from specifications, and the algorithms for the evaluation of traces against the generated monitors  ...  In this paper we present a collection of challenges for runtime verification extracted from concrete application domains, focusing on the difficulties that must be overcome to tackle these specific challenges  ...  Acknowledgements This research has been supported by the European ICT COST Action IC1402 (Runtime Verification beyond Monitoring (ARVI)).  ... 
arXiv:1811.06740v1 fatcat:4bxx5tvfpzez3jidsj22flibv4

Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in Medicine

Arthur Gatouillat, Youakim Badr, Bertrand Massot, Ervin Sejdic
2018 IEEE Internet of Things Journal  
We describe the practical application of the democratization of medical devices for both patients and health-care providers.  ...  However, because of the critical nature of health-related systems, the Internet of Medical Things still faces numerous challenges, more particularly in terms of reliability, safety and security.  ...  Sejdić, "Internet of Medical Things: A Review of Recent Contributions Dealing With Cyber-Physical Systems in Medicine," in IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3810-3822, Oct. 2018, https  ... 
doi:10.1109/jiot.2018.2849014 fatcat:z2oytkgvu5gh5cuziawczhqdfe

Code Drones [article]

Mithun P. Acharya, Chris Parnin, Nicholas A. Kraft, Aldo Dagnino, Xiao Qu
2016 arXiv   pre-print
We discuss the implications of having social and intelligent/cognitive software artifacts that guide their own self-improvement.  ...  this paradigm, humanized artifacts take the lead and choreograph (socially, in collaboration with other intelligent software artifacts and humans) automated software engineering solutions to a myriad of  ...  In the Social Internet of Things (SIoT) [13] paradigm, billions of embedded computing devices form a social network.  ... 
arXiv:1411.6118v4 fatcat:7fewivvtqzdxraodfpubglsgue

A survey of challenges for runtime verification from advanced application domains (beyond software)

César Sánchez, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliés Falcone, Adrian Francalanza, Srđan Krstić, Joa̋o M. Lourenço, Dejan Nickovic, Gordon J. Pace (+4 others)
2019 Formal methods in system design  
Typically, the two main activities in runtime verification efforts are the process of creating monitors from specifications, and the algorithms for the evaluation of traces against the generated monitors  ...  In this paper we present a collection of challenges for runtime verification extracted from concrete application domains, focusing on the difficulties that must be overcome to tackle these specific challenges  ...  Acknowledgements Open access funding provided by University of Gothenburg. This research has been supported by the European ICT COST Action IC1402 Runtime Verification beyond Monitoring (ARVI).  ... 
doi:10.1007/s10703-019-00337-w fatcat:6vu5odqyjjbkvf255bsxcchane

Software Engineering for Intelligent and Autonomous Systems: Report from the GI Dagstuhl Seminar 18343 [article]

Simos Gerasimou, Thomas Vogel, Ada Diaconescu
2019 arXiv   pre-print
This report summarises the research carried out during SEfIAS GI Dagstuhl seminar which provided a forum for strengthening interaction and collaboration for early-career researchers and practitioners from  ...  security, safety, loss of comfort or revenue.  ...  ECo-IoT: an Architectural Approach for Realizing Emergent Configurations in the Internet of Things Romina Spalazzese (Malmö University, SE) The rapid proliferation of the Internet of Things (IoT) is  ... 
arXiv:1904.01518v2 fatcat:inddhdemafdyljubjjq7fv6xvu

Security for the Industrial IoT: The Case for Information-Centric Networking [article]

Michael Frey, Cenk Gündoğan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch
2019 arXiv   pre-print
With the advent of the IoT, embedded controllers link these 'things' to local networks that often are of low power wireless kind, and are interconnected via gateways to some cloud from the global Internet  ...  Evaluation of the crypto efforts on the RIOT operating system for content security reveal its feasibility for common deployment scenarios.  ...  Figure 4 shows the runtime results for signature generation and verification of the key establishment that needs to be performed only once.  ... 
arXiv:1810.04645v2 fatcat:weaw3bp3qvdf5ndf6fmxerce5a

Toward open-world software: Issues and challenges

L. Baresi, E. Di Nitto, C. Ghezzi
2006 Computer  
HISTORICAL PERSPECTIVE Inventors of early approaches to systematic software development tried to discipline the process by identifying well-defined stages and developing criteria for advancing from one  ...  For instance, software architectures have evolved from being static, monolithic, and centralized to dynamic, modular, and distributed.  ...  Runtime verification protects users from unanticipated unacceptable changes. New methods must be developed to support this new kind of verification.  ... 
doi:10.1109/mc.2006.362 fatcat:3avq6a7ubzcqhhmjb3ukwnzuve

Volunteer Down: How COVID-19 Created the Largest Idling Supercomputer on Earth

Nane Kratzke
2020 Future Internet  
It turns out that the disclosed resource sharing shortcomings of volunteer computing could be addressed by technologies that have been invented, optimized, and adapted for entirely different purposes by  ...  Promising technologies might be containers, serverless architectures, image registries, distributed service registries, and all have one thing in common: They already exist and are all tried and tested  ...  Thus, the worker client can be minimized to a standardized container runtime engine (for example Docker or any other OCI conform container runtime engine) that fetches provided images and executes them  ... 
doi:10.3390/fi12060098 fatcat:35uerxlqmjc7vlxjnrrd2tdqla

50 & 25 Years Ago

Erich Neuhold
2019 Computer  
He missed a few, for example, the importance of the Internet of Things or the influx of artificial intelligence. However, as an excuse, he predicted only 10 years into the future.]  ...  For instance, Internet areas of messaging, work fl ow, and information retrieval. … There is a downside though.  ... 
doi:10.1109/mc.2019.2914754 fatcat:qeu5bc23svhx5ac23adsesit7a

The Democratization of Artificial Intelligence [chapter]

Andreas Sudmann
2019 The Democratization of Artificial Intelligence  
The relationship between art, creativity, and smart machines shows that the discussion about the politics and democratization of AI must not be restricted to certain areas (economy, military) or to certain  ...  Instead, we should consider that the critique of AI and the commitment to democratizing it is also supported by many NGOs, academic institutions, journalists, or politicians; actors whose efforts undoubtedly  ...  For example, it is one thing whether AI technologies are used, say, for the recognition of medieval handwritings or for recommending certain products to consumers.  ... 
doi:10.14361/9783839447192-001 fatcat:hkeuvxtsajbndec2sssxaluir4

Enterprise Coordination on the Internet

Charles Petrie
2011 Future Internet  
What is needed is a new paradigm for how the Internet supports such coordination. Indeed, the Internet should and could provide fundamental coordination functions that are missing today.  ...  Such a Coordinated Internet would revolutionize enterprise management, for all enterprises, large and small, corporate and personal.  ...  The Coordinated Internet also has deep issues in common with Internet of Things, such as authorization to change descriptions of products and services.  ... 
doi:10.3390/fi3010049 fatcat:r662c3lxrzh5ndkmyqnouplubi

Combating Healthcare Fraud and Abuse: A Technology Framework and Prototype Leveraging Blockchain Technology (Preprint)

Tim Mackey, Ken Miyachi, Danny Fung, Samson Qian, James Short
2020 Journal of Medical Internet Research  
However, this process leaves out a critical stakeholder: the patient for whom the services are actually rendered. This lack of patient participation introduces a risk of fraud and abuse.  ...  the claims adjudication process more patient-centric for the purposes of identifying and preventing health care fraud and abuse.  ...  Acknowledgments The authors thank the San Diego Supercomputer Center for support and the AEEC Innovation Lab for feedback and support on the research presented.  ... 
doi:10.2196/18623 pmid:32909952 fatcat:6t5pnjhlcncnno3cgup3xl6w24

Future Computer Systems and Networking Research in the Netherlands: A Manifesto [article]

Alexandru Iosup
2022 arXiv   pre-print
Similarly, the emerging quantum internet depends on (traditional) CompSys to bootstrap operation for the foreseeable future.  ...  Each of the Top Sectors of the Dutch Economy, each route in the National Research Agenda, and each of the UN Sustainable Development Goals pose challenges that cannot be addressed without groundbreaking  ...  With the rapid rollout of 5G networks and the Internet-of-Things (IoT), the number of computing and networking devices keeps growing drastically [3] .  ... 
arXiv:2206.03259v1 fatcat:yz5xxpfeqbfbxp63i2naom3oy4
« Previous Showing results 1 — 15 out of 295 results