Filters








3,007 Hits in 8.7 sec

Conceptual Design of Discrete-Event Systems Using Templates

Lenko Grigorov, Brian E. Butler, José E. R. Cury, Karen Rudie
2010 Discrete event dynamic systems  
This work describes the research conducted in the quest for designing better software for discrete-event system (DES) control.  ...  Karen Rudie, for her dedication as a supervisor, for the encouragements I received, and for her cheerfulness and sense of humor which helped me in the completion of this work.  ...  Text entry of commands (command line) Support for the entry of text commands, e.g., a command line, within the software.  ... 
doi:10.1007/s10626-010-0089-0 fatcat:t5epmt5uzje6xd7yxihozpxkai

The 23 June 2016 West Virginia Flash Flood Event as Observed Through Two Hydrometeorology Testbed Experiments

Steven M. Martinaitis, Benjamin Albright, Jonathan J. Gourley, Sarah Perfater, Tiffany Meyer, Zachary L. Flamig, Robert A. Clark, Humberto Vergara, Mark Klein
2020 Weather and forecasting  
Experimental flash flood warnings issued during the HMT-Hydro experiment for this event improved the probability of detection and resulted in a 63.8% increase in lead time to 84.2 min.  ...  The flash flooding was part of a multi-day event which was classified as a billion-dollar disaster.  ...  testbed experiments to evaluate experimental 551 products for an historic, catastrophic hydrometeorological event.  ... 
doi:10.1175/waf-d-20-0016.1 fatcat:psnob5m5cfaeff7rgoaq2boche

Adversarial genetic programming for cyber security: a rising application domain where GP matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Genetic Programming and Evolvable Machines  
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of  ...  Mod-sim is appropriate when testbeds incur long experimental cycle times or do not abstract away irrelevant detail.  ... 
doi:10.1007/s10710-020-09389-y fatcat:pptcxqfc6zeptdstzl3ipewrym

Event-based Vision: A Survey [article]

Guillermo Gallego, Tobi Delbruck, Garrick Orchard, Chiara Bartolozzi, Brian Taba, Andrea Censi, Stefan Leutenegger, Andrew Davison, Joerg Conradt, Kostas Daniilidis, Davide Scaramuzza
2020 arXiv   pre-print
Hence, event cameras have a large potential for robotics and computer vision in challenging scenarios for traditional cameras, such as high speed and high dynamic range.  ...  This paper provides a comprehensive overview of the emerging field of event-based vision, with a focus on the applications and the algorithms developed to unlock the outstanding properties of event cameras  ...  For example, [215] combines a DVS with a pulsed line laser to allow fast terrain reconstruction, in the style of a 3D line scanner.  ... 
arXiv:1904.08405v2 fatcat:ffh6el7ojfg6jag5qm2hwnhweu

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Zenodo  
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of  ...  Mod-sim is appropriate when testbeds incur long experimental cycle times or do not abstract away irrelevant detail.  ... 
doi:10.5281/zenodo.4593284 fatcat:mpwyc4xbhbhahlaagf44a22abe

Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems [article]

Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah
2019 arXiv   pre-print
It detects data-oriented exploits if a specific physical event is missing along with the corresponding event dependent state transition.  ...  Our prototype on Raspberry Pi incurs a low overhead, taking 0.0001s for each state transition integrity checking, and 0.063s~0.211s for the cyber-physical contextual consistency checking.  ...  , instead we aim at detecting the anomalous of a large scale experimental evaluation.  ... 
arXiv:1805.00074v2 fatcat:x5dmz45xorgwdblfwdoqrpxiiy

Event-based Vision: A Survey

Guillermo Gallego, Tobi Delbruck, Garrick Michael Orchard, Chiara Bartolozzi, Brian Taba, Andrea Censi, Stefan Leutenegger, Andrew Davison, Jorg Conradt, Kostas Daniilidis, Davide Scaramuzza
2020 IEEE Transactions on Pattern Analysis and Machine Intelligence  
Hence, event cameras have a large potential for robotics and computer vision in challenging scenarios for traditional cameras, such as low-latency, high speed, and high dynamic range.  ...  This paper provides a comprehensive overview of the emerging field of event-based vision, with a focus on the applications and the algorithms developed to unlock the outstanding properties of event cameras  ...  Event Camera Availability Fill Factor: A major obstacle for early event camera mass production prospects was the limited fill factor of the pixels (i.e., the ratio of a pixel's light sensitive area to  ... 
doi:10.1109/tpami.2020.3008413 pmid:32750812 fatcat:vlxvlv4uynh5rpw4qlmaywqlqq

SherLIiC: A Typed Event-Focused Lexical Inference Benchmark for Evaluating Natural Language Inference

Martin Schmitt, Hinrich Schütze
2019 Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics  
We present SherLIiC, 1 a testbed for lexical inference in context (LIiC), consisting of 3985 manually annotated inference rule candidates (InfCands), accompanied by (i)~960k unlabeled InfCands, and (ii  ...  We show that SherLIiC poses a tough challenge to existing NLI systems.  ...  Acknowledgments We gratefully acknowledge a Ph.D. scholarship awarded to the first author by the German Academic Scholarship Foundation (Studienstiftung des deutschen Volkes).  ... 
doi:10.18653/v1/p19-1086 dblp:conf/acl/SchmittS19 fatcat:jhtrwibcojg3thcrmefl6y6rli

Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems [chapter]

André Sieber, Karsten Walther, Stefan Nürnberger, Jörg Nolte
2009 Lecture Notes in Computer Science  
We provide a coherent package consisting of a simulation framework, hardware, and a remotely accessible testbed, building a powerful tool for evaluation and validation of the results of FRONTS.  ...  This paper presents the Ghost subsystem for efficient remote software maintenance in such networks.  ...  Different colors and markers show different values for x. Sparser topologies, i.e. with the inter grid spacing g = 5 m are shown by dashed lines, solid lines are used for g = 4 m.  ... 
doi:10.1007/978-3-642-02118-3_2 fatcat:prjsfyqcojcnpcetw7vfnvqwpy

City-as-a-Platform: The Rise of Participatory Innovation Platforms in Finnish Cities

Ari-Veikko Anttiroiko
2016 Sustainability  
This article discusses the idea of city as a platform.  ...  Democratic culture, welfarism, and redistributive policy provide contextual support for platformization by strengthening social inclusion, taming the growth machine, and easing the tensions between pro-growth  ...  In spring 2013 PATIO was used as a platform for a citizen survey concerning the development of the Hiukkavaara area, and as a part of the same process a selected test group participated in an event which  ... 
doi:10.3390/su8090922 fatcat:72r4yq6h2ndlha6zsaf4matu7e

Integrity Protection for Scientific Workflow Data

Mats Rynge, William L. Poehlman, F. Alex Feltus, Karan Vahi, Ewa Deelman, Anirban Mandal, Ilya Baldin, Omkar Bhide, Randy Heiland, Von Welch, Raquel Hill
2019 Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) - PEARC '19  
With the continued rise of scientific computing and the enormous increases in the size of data being processed, scientists must consider whether the processes for transmitting and storing data sufficiently  ...  To validate our approach, we introduce Chaos Jungle -a toolkit providing an environment for validating integrity verification mechanisms by allowing researchers to introduce a variety of integrity errors  ...  To develop the framework, we plan to engage in an integrated approach of testbed experimentation, ML model training using workflow data on testbeds, and ML model validation on production CI for real world  ... 
doi:10.1145/3332186.3332222 dblp:conf/xsede/RyngeVDMBBHWHPF19 fatcat:qibvfgo5hzbbxncte2gan5eitq

Real-Time Simulation and Control of Large Scale Distributed Discrete Event Systems

Fernando G. Gonzalez
2013 Procedia Computer Science  
To this date there has been no realization of a general-purpose intelligent controller for manufacturing systems or any other large scale discrete-event system.  ...  The paper concludes by presenting an example of a flexible manufacturing system being controlled by this software.  ...  This model provides a testbed for the development of the simulation and control tool that is needed to manage the system.  ... 
doi:10.1016/j.procs.2013.01.019 fatcat:g7xvs3ookfgetf3f6l5dsfi324

Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems [article]

Charalambos Konstantinou, George Stergiopoulos, Masood Parvania, Paulo Esteves-Verissimo
2021 arXiv   pre-print
Such a demanding combination of properties and threats calls for resilience-enhancement methodologies and techniques, working in real-time operation.  ...  These adverse events can be of accidental or malicious nature and may include natural disasters, hardware or software faults, cyberattacks, or even infrastructure design and implementation faults.  ...  detected will generalize to the real system, or is simply a product of experimentation on the testbed that will not reflect to real-world systems [10] .  ... 
arXiv:2106.14962v2 fatcat:g5tv5fstrnew5ey5aiweinomba

Probabilistic delay differential equation modeling of event-related potentials

Dirk Ostwald, Ludger Starke
2016 NeuroImage  
In this theoretical note we are concerned with the DCM framework for electroencephalographically recorded event-related potentials (ERP-DCM).  ...  for its maximization.  ...  In the left panel, the gray lines depict the dynamics of a single source's nine state variables and the blue line depicts their projection onto a univariate time-course.  ... 
doi:10.1016/j.neuroimage.2016.04.025 pmid:27114057 fatcat:twsadfd33nf2lkpbr6pazd5s64

Report of the Third Global Experimentation for Future Internet (GEFI 2018) Workshop [article]

Mark Berman, Timur Friedman, Abhimanyu Gosain, Kate Keahey, Rick McGeer, Ingrid Moerman, Akihiro Nakao, Lucas Nussbaum, Kristin Rauschenbach, Violet Syrotiuk, Malathi Veeraraghavan, Naoaki Yamanaka
2019 arXiv   pre-print
Major topic areas included: softwareization and virtualization of radios and networks; testbed support for networking experiments; EdgeNet; a federated testbed of elastic optical networks; and reproducibility  ...  in experimentation.  ...  Research Infrastructure for large-Scale Experiments (RISE) National Institute of Information and Communications Technology (NICT), Japan RISE is a wide-area SDN testbed operated by NICT, which consists  ... 
arXiv:1901.02929v1 fatcat:nyzqaop4tjfo3djh4zmpakrepa
« Previous Showing results 1 — 15 out of 3,007 results