3,652 Hits in 8.7 sec

Certifiably safe software-dependent systems: challenges and directions

John Hatcliff, Alan Wassyng, Tim Kelly, Cyrille Comar, Paul Jones
2014 Proceedings of the on Future of Software Engineering - FOSE 2014  
The amount and impact of software-dependence in critical systems impinging on daily life is increasing rapidly.  ...  On the one hand there are unprecedented, exponential increases in size, inter-dependencies, intricacies, numbers and variety in the systems and distribution of development processes across organizations  ...  ACKNOWLEDGEMENTS The authors wish to thank Tom Maibaum (McMaster Centre for Software Certification, McMaster University) for his comments on earlier versions of this paper.  ... 
doi:10.1145/2593882.2593895 dblp:conf/icse/HatcliffWKCJ14 fatcat:cclqub6ianezlgyt4o7e4wp4ja

An ontological metamodel for cyber-physical system safety, security, and resilience coengineering

Georgios Bakirtzis, Tim Sherburne, Stephen Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming
2021 Journal of Software and Systems Modeling  
This increased complexity is impacting the management of models necessary for designing cyber-physical systems that are able to take into account a number of "-ilities", such that they are safe and secure  ...  , and functional) and safety, security, and resilient considerations.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the USDOD.  ... 
doi:10.1007/s10270-021-00892-z fatcat:uqcdis26hnafxdsjgklz3d2yru

Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, January 06-11 2019, Schloss Dagstuhl [article]

Joel Greenyer, Malte Lochau, Thomas Vogel
2019 arXiv   pre-print
This report documents the program and results of the GI-Dagstuhl Seminar 19023 on Explainable Software for Cyber-Physical Systems (ES4CPS).  ...  The goal of this seminar was to serve as a starting point for an interdisciplinary coordination of research activities targeting ES4CPS and an incubator of a new research community around this topic.  ...  Acknowledgments We would like to thank the Gesellschaft for Informatik e.V. (GI, German Society for Informatics) and Schloss Dagstuhl for partially funding this seminar.  ... 
arXiv:1904.11851v1 fatcat:r2r5ac6hmnel3f6weiynjwunni

How can we know a self-driving car is safe?

Jack Stilgoe
2021 Ethics and Information Technology  
Engineers' safety assurances will have their credibility tested in public. 'How safe is safe enough?' prompts further questions: 'safe enough for what?' and 'safe enough for whom?'  ...  The first, safety-in-numbers, sees safety as a self-evident property of the technology and offers metrics in an attempt to reassure the public.  ...  In the short term, many safety cases rest on a safety driver, a human on-the-loop who is behind the wheel and, in principle, able to compensate for the technology's shortcomings.  ... 
doi:10.1007/s10676-021-09602-1 fatcat:akb5gb7etzcjjhjhlc65izyjq4

Characterizing the Chain of Evidence for Software Safety Cases: A Conceptual Model Based on the IEC 61508 Standard

Rajwinder Kaur Panesar-Walawege, Mehrdad Sabetzadeh, Lionel Briand, Thierry Coq
2010 2010 Third International Conference on Software Testing, Verification and Validation  
Acknowledgements This journey started in the fall of 2006 in Ottawa, when I attended a course given by Dr. Lionel Briand. The following year, when Dr.  ...  Briand moved to Norway, he presented me with the opportunity to join him at Simula Research Laboratory. Accepting that offer was an excellent decision.  ...  In addition, the quality of the overall safety case is bound by the quality of the weakest link.  ... 
doi:10.1109/icst.2010.12 dblp:conf/icst/Panesar-WalawegeSBC10 fatcat:fudljkqkvbfy7nizhgpxj7efla

Engineering Moral Agents -- from Human Morality to Artificial Morality (Dagstuhl Seminar 16222)

Michael Fisher, Christian List, Marija Slavkovik, Alan Winfield, Marc Herbstritt
2016 Dagstuhl Reports  
The seminar focused on questions of how to formalise, "quantify", qualify, validate, verify, and modify the "ethics" of moral machines.  ...  This is a long-term endeavour, but the seminar was successful in laying the foundations and connections for accomplishing it.  ...  In the second case, in developing ethics for human beings who use machines, the burden of making sure that machines are never employed in an unethical fashion always rests with the human beings who interact  ... 
doi:10.4230/dagrep.6.5.114 dblp:journals/dagstuhl-reports/FisherLSW16 fatcat:ngtdcym6ojey5kw3lqmavrxwcq

Introduction [chapter]

2011 Innovation and Nanotechnology  
In each case, the software that directs its actions is part of the total machine, making the computer an enormously (if not infi nitely) reconfi gurable machine, capable of taking on new forms.  ...  This confi dence assured investors that there would be some period of return on the investment in which other potential competitors are held at bay, at least from practicing the art as claimed in the patent  ... 
doi:10.5040/9781849664783.0006 fatcat:orfthwdybrcshhwbjly2747jgi

Engineering Reliable Deep Learning Systems [article]

P. Santhanam, Eitan Farchi, Victor Pankratius
2019 arXiv   pre-print
These fundamental aspects establish the need for a discipline on "AI Engineering".  ...  However, at the current level of maturity, the use of an AI component in mission-critical or safety-critical applications can have unexpected consequences.  ...  In another report from the Office of the Director of National Intelligence (ODNI) [12] , on Augmenting Intelligence using Machines (AIM) initiative, explicit discussion of AI assurance included the importance  ... 
arXiv:1910.12582v1 fatcat:oq34v26t3bashf6vsbqlazx7i4


2013 Nuclear Engineering and Technology  
Education and training must take care of explicit and tacit knowledge in a balanced manner. 3) Education and training for lesson-learned from wrong cases We can learn lessons from either good cases or  ...  There are a lot of case studies and lessons-learned published for better education and training. [28~32].  ... 
doi:10.5516/net.04.2013.700 fatcat:qpsaocwn4ncqpiktq767xeu64i

Digital Forensics Triage Classification Model using Hybrid Learning Approaches

Mohmed Afridhi L, Palanivel K
2022 International Journal of Innovative Research in Computer Science & Technology  
Consequently, digital forensics and machine learning techniques allow for the rapid classification of appropriate gadgets despite dipping the quantity of information that has to be adequately studied.  ...  Those now in use are, in fact, old-fashioned, as they are more focused on complete device extraction for case-relevant device identification.  ...  Machine Learning Approach Machine Learning (ML) [12] is described as "a variety of strategies for automatically detecting patterns in data and then using those patterns to forecast future data or make  ... 
doi:10.55524/ijircst.2022.10.3.7 fatcat:jgrkujyugnd7xau62upc65hdyi

Model-driven development of high-assurance active medical devices

Atif Mashkoor
2015 Software quality journal  
This paper presents initial results and lessons learned from an ongoing project focusing on the development of a formal model of a subsystem of a software-controlled safety-critical Active Medical Device  ...  The use of formal approaches for the development of AMDs is highly recommended by standards and regulations, and motivates the recent advancement of the state of the art of related methods and tools including  ...  In future, we also plan to research on the transformation of requirements models into ready-to-deploy code artifacts.  ... 
doi:10.1007/s11219-015-9288-0 fatcat:yzylzr64mbaujgzgx4uw2i4evu

Challenges of Software Requirements Quality Assurance and Validation: A Systematic Literature Review

Issa Atoum, Mahmoud Baklizi, Izzat Alsmadi, Ahmed Ali Otoom, Taha Alhersh, Jafar Ababneh, Jameel Almalki, Saeed Alshahrani
2021 IEEE Access  
Most tools depend on machine learning models; however, they inherit problems using machine learning techniques.  ...  If the generation of such artifacts was easy(for example, test cases), the requirements are of high-quality.  ... 
doi:10.1109/access.2021.3117989 fatcat:v37iv77twbbdxlxkz5boebtpcm

Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims [article]

Miles Brundage, Shahar Avin, Jasmine Wang, Haydn Belfield, Gretchen Krueger, Gillian Hadfield, Heidy Khlaaf, Jingying Yang, Helen Toner, Ruth Fong, Tegan Maharaj, Pang Wei Koh (+47 others)
2020 arXiv   pre-print
evidence about the safety, security, fairness, and privacy protection of AI systems.  ...  With the recent wave of progress in artificial intelligence (AI) has come a growing awareness of the large-scale impacts of AI systems, and recognition that existing regulations and norms in industry and  ...  One result of such work is the introduction and standardization of assurance cases in numerous domains.  ... 
arXiv:2004.07213v2 fatcat:4xii6rzlyffjnj3nlb47tbqi4y

Just-in-Time Certification

John Rushby
2007 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007)  
We then describe the necessity, and the challenge, of extending this to compositional certification and outline promising directions for accomplishing this.  ...  Finally, we consider the provocative possibility of systems in which methods of analysis traditionally used to support certification at design time are instead used for synthesis and monitoring at runtime  ...  I am grateful to Robin Bloomfield and Bev Littlewood and their colleagues for introducing me to several of the topics discussed here during a visit to CSR at City University in November 2006.  ... 
doi:10.1109/iceccs.2007.26 dblp:conf/iceccs/Rushby07 fatcat:jtiokqf76zbmbd7gr3h23exzia

The Need for a Meta-Architecture for Robot Autonomy

Stalin Muñoz Gutiérrez, Gerald Steinbauer-Wagner
2022 Electronic Proceedings in Theoretical Computer Science  
Here we put forward the case for a generative model of cognitive architectures for autonomous robotic agents that subscribes to the principles of model-based engineering and certifiable dependability,  ...  As the level of autonomy in robots increases, so do the cost of offering guarantees about the dependability of the system.  ...  To certify a software as dependable they consider it should be done based on a "credible" dependability case [55] (a generalization of the concept of safety case [7] ).  ... 
doi:10.4204/eptcs.362.9 fatcat:wq7bw4nwwnegpfxkvtva4wgqvm
« Previous Showing results 1 — 15 out of 3,652 results