Filters








1,183,988 Hits in 6.5 sec

Towards a Conceptual Framework for Expert System Validation

Pedro Meseguer
1992 AI Communications  
The final aim is to get a conceptual framework for ES validation, what is a difficult task because of the immaturity of the field. We analyze ES validation from four points of view.  ...  Third, we discuss briefly specific techniques to achieve an effective validation for these targets. And fourth, we locate these validation targets in an ES life-cycle.  ...  I also thank Jean Pierre Laurent for early access of his work on validation terminology.  ... 
doi:10.3233/aic-1992-5301 fatcat:vrcmxmt345edpecqnfamkhwq3e

Synthesis of Petri Nets from Scenarios with VipTool [chapter]

Robin Bergenthum, Jörg Desel, Robert Lorenz, Sebastian Mauser
2008 Lecture Notes in Computer Science  
To integrate this extension and further new functionalities, we changed the architecture of VipTool to a flexible plug-in technology.  ...  The synthesis functionalities fill a gap in a previously defined procedure [9, 7] where the first definition of an initial process model had to be done "by hand", i.e. without any tool support.  ...  Obviously, analysis requires a high degree of validity of the model with respect to the actual business process in the sense that the model faithfully represents the process.  ... 
doi:10.1007/978-3-540-68746-7_25 fatcat:pewr3lgdwjdzbknadthouovsay

Using ontologies for defining tasks, problem-solving methods and their mappings [chapter]

D. Fensel, E. Motta, S. Decker, Z. Zdrahal
1997 Lecture Notes in Computer Science  
Def 6.1 State P&R : Design model PD Def 6.2 Complete P&R : Complete design model PD Def 6.3 Set with a total order and equality P&R : SET OF parameter PD Def 6.4 < P&R : ⊂ PD , = P&R : = PD Def 6.5 Correct  ...  P&R = Valid design model PD Ax 6.1 Preference P&R (s P&R ,s´P &R ) ↔ cost(d PD ) < cost(d´P D ) ∧ s P&R = d PD ∧ s´P &R = d´P D Ax 6.2 Partial completeness P&R (d P&R ) = {p PD | (p PD ,v PD ) ∈ d PD  ...  We thank Annette ten Teije, Frank van Harmelen, Mark Willems, and two anonymous reviewers for helpful comments on drafts of the paper.  ... 
doi:10.1007/bfb0026781 fatcat:phdhvcdvarfzlmvb6muvv3jlze

Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO 26262 [article]

Rick Salay, Krzysztof Czarnecki
2018 arXiv   pre-print
In this report, we take steps to address this conflict by doing a detailed assessment and adaption of ISO 26262 for ML, specifically in the context of supervised learning.  ...  Unfortunately, these standards were not designed to accommodate technologies such as ML or the type of functionality that is provided by an ADS and this has created a conflict between the need to innovate  ...  Our hope is that bringing these issues and ideas together in a cohesive exposition will help to identify gaps, research opportunities and possible solutions for the safe use of ML.  ... 
arXiv:1808.01614v1 fatcat:x4kmbhyjczax7kizww4angrgcu

Deriving Safety Case Fragments for Assessing MBASafe's Compliance with EN 50128 [chapter]

Barbara Gallina, Elena Gómez-Martínez, Clara Benac Earle
2016 Communications in Computer and Information Science  
In this paper, we contribute to partially justify the adequacy of MBASafe to act as process evidence.  ...  MBASafe is a recently proposed and potentially innovative design and verification process.  ...  This work has been partially supported by the ARTEMIS project nSafeCer [20] and by the Swedish Foundation for Strategic Research via the SYNOPSIS project [22] and the Gen&ReuseSafetyCases project [  ... 
doi:10.1007/978-3-319-38980-6_1 fatcat:2gnw5shhp5hgxp3jpimtljxe2y

Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL

Mirco Kuhlmann, Karsten Sohr, Martin Gogolla
2011 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement  
The approach results in a domain-specific language for RBAC which is highly configurable and extendable with respect to new RBAC concepts and classes of authorization constraints and allows the developer  ...  Thereby, the complexity of the resulting security policies increases so that tool support for comfortable creation and adequate validation is required.  ...  ACKNOWLEDGMENTS We would like to thank the referees for their helpful comments.  ... 
doi:10.1109/ssiri.2011.18 dblp:conf/ssiri/KuhlmannSG11 fatcat:peoj25r65bh4vof3byt3oidlzy

Model and Methodology for the Synthesis of Heterogeneous and Partially Reconfigurable Systems

Florian Dittmann, Marcelo Gotz, Achim Rettberg
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
In this paper, we introduce a synthesis methodology for reconfigurable systems that respects the specific requirements of run-time reconfiguration.  ...  When reconfigurable devices are used in modern embedded systems and their capability to adapt to changing application requirements becomes an issue, comprehensive modeling and design methods are required  ...  In order to be able to respect the specific needs of (partially) reconfigurable devices, we extend our initial task dependence graph G via several steps into a problem graph G P (V P , E P ).  ... 
doi:10.1109/ipdps.2007.370388 dblp:conf/ipps/DittmannGR07 fatcat:pzitl37wtfearcymr4bo5l2nie

Page 6408 of Mathematical Reviews Vol. , Issue 92k [page]

1992 Mathematical Reviews  
The developed program has the characteristic that, while it is not difficult to design, it requires a nontrivial proof of termination.  ...  Several results of independent interest are obtained, namely the finite approximability of the be- havioral preorder and a partial completeness result for the set of equations E with respect to the preorder  ... 

A Method for Designing Physical User Interfaces for Intelligent Production Environments

Pierre Taner Kirisci, Klaus-Dieter Thoben
2018 Advances in Human-Computer Interaction  
In order to demonstrate the feasibility of the design method, we further conduct a validation and evaluation of the functional modelling tool, based on an industrial use case, in cooperation with design  ...  Based on this idea, we derive several functional and nonfunctional requirements for a suitable design method, supporting the conceptualisation of physical user interfaces in the early phases of product  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of the paper.  ... 
doi:10.1155/2018/6487070 fatcat:nqpggosp5jelppnubvd4cop4ea

Testing of concurrent programs based on message sequence charts

In Sang Chung, Hyeon Soo Kim, hyun Seop Bae, Yong Rae Kwon, Byung Sun Lee
1999 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems PDSE-99  
However, the equivalence relation, which requires a specification and a program to encompass the same set of synchronization sequences, is not well-suited for testing concurrent programs against partial  ...  In this paper, we present a new specification-based approach to testing concurrent programs againist Message Sequence Charts(MSCs) with partial and nondeterministic semantics.  ...  Definition 3.2 A set of all valid event sequences VS(M) with respect to an MSC specification M is VS(M) = fvs j M vsg.  ... 
doi:10.1109/pdse.1999.779740 dblp:conf/pdse/ChungKBKL99 fatcat:g4iujlbd4ngsjdir4puzgi7zdy

Messir: a text-first DSL-based approach for UML requirements engineering (tool demo)

Benoît Ries, Alfredo Capozucca, Nicolas Guelfi
2018 Proceedings of the 11th ACM SIGPLAN International Conference on Software Language Engineering - SLE 2018  
Messir DSL's static semantics is defined as a set of validation rules guiding end-users through the requirements analysis phase.  ...  This tool paper presents the design and tool-support of Messir, an approach centered on textual domain-specific languages supported by our open-source UML requirements engineering tool, named Excalibur  ...  Acknowledgments The authors would like to thank all the students from University of Luxembourg and from our partner institutions for having provided valuable feedback during our lectures, as well as bachelor  ... 
doi:10.1145/3276604.3276614 dblp:conf/sle/RiesCG18 fatcat:nmgsyioxebh7xirdr5fys3xu2i

The Role of Invariants in the Co-evolution of Business and Technical Service Specification of an Enterprise

Biljana Bajic-Bizumic, Irina Rychkova, Alain Wegmann
2013 The Practice of Enterprise Modeling  
We formalize the service specifications in Alloy and demonstrate how each design iteration can be simulated, visualized and validated with the Alloy analyzer tool.  ...  We propose an approach to enterprise service design that can be described as an iterative introduction and a modification of invariants in response to the evolution of business and/or technical service  ...  Automated interpretation and traceability between scenarios generated by Alloy and their specifications (business requirements, business rules, etc) is a subject of our future research.  ... 
dblp:conf/ifip8-1/Bajic-BizumicRW13 fatcat:4igyier4tfedrffcbkmx2odfg4

Model-Based Testing 2010: Short Abstracts

Jan Tretmans, Florian Prester, Philipp Helle, Wladimir Schamai
2010 Electronical Notes in Theoretical Computer Science  
This article contains three short abstracts of presentations given at the Sixth Workshop on Model-Based Testing (MBT 2010) on March 21, 2010 in Paphos, Cyprus: Theory of Model-Based Testing and How ioco  ...  Goes eco by Jan Tretmans (invited presentation), Model-Centric Testing by Florian Prester and Specification Model Based Testing in the Avionic Domain -Current Status and Future Directions  ...  It defines when an IUT is correct with respect to a specification model.  ... 
doi:10.1016/j.entcs.2010.12.016 fatcat:xsmjbto4dbhkjonakb6pvpv55a

Potentials for the Integration of Design Thinking along Automotive Systems Engineering Focusing Security and Safety

Julian Tekaat, Aschot Kharatyan, Harald Anacker, Roman Dumitrescu
2019 Proceedings of the International Conference on Engineering Design  
However, this approach is still in a prototype stage. The consideration of security and safety within the early stages of systems design leads to so- called ill-defined problems.  ...  Due to an incomplete database, this is not supported or only partially supported by conventional approaches. The resulting potentials are derived based upon a practical example.  ...  These will lead to addition iterative adaptions of partial models, until the discipline specific design, integration and validation as well as the system integration and validation can be processed.  ... 
doi:10.1017/dsi.2019.295 fatcat:wjqiekqapfectplyma6jwolexy

SQUALE Dependability Assessment Criteria [chapter]

Yves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson
1999 Lecture Notes in Computer Science  
with respect to the application domains and industrial sectors, 2) their ability to address all dependability attributes, and 3) their progressiveness as a function of more or less strict requirements  ...  The SQUALE criteria differ from traditional evaluation methods (security evaluation criteria, standards for the design, development and validation of safety critical systems), by: 1) their independence  ...  This work has been partially supported by the European Commission as part of the ACTS Programme under project AC097.  ... 
doi:10.1007/3-540-48249-0_3 fatcat:ud2ma5vu5fg2vadvheowhmcj5e
« Previous Showing results 1 — 15 out of 1,183,988 results