A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Care Label Concept: A Certification Suite for Trustworthy and Resource-Aware Machine Learning
[article]
2021
arXiv
pre-print
On the other hand, care labels are the result of a certification suite that tests whether stated guarantees hold. In this paper, we present two experiments with our certification suite. ...
For those who do not want to invest time into understanding the method or the learned model, we offer care labels: easy to understand at a glance, allowing for method or model comparisons, and, at the ...
Acknowledgement This research has been funded by the Federal Ministry of Education and Research of Germany as part of the competence center for machine learning ML2R (01IS18038A/B). ...
arXiv:2106.00512v1
fatcat:ev5x235sxvfqhacuh2xuibthfq
Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing
2017
IEICE transactions on information and systems
A novel behaviorbased reputation and penalty system is designed, then a simplified proof of concept prototype is implemented and deployed on DeterLab. ...
Only the added identification level was utilized for mitigation, while future work includes incorporating all three levels to mitigate switching and multi-request per connection attack categories. key ...
, and The Teijin Foundation. ...
doi:10.1587/transinf.2016icp0024
fatcat:dwjnxnsowffpzmir252hptenve
Basic Concepts
[chapter]
2011
Oracle Database Performance and Scalability
Each title brings the principles and theory of programming in-the-large and industrial strength software into focus. ...
case histories, quantitative analysis, and technology into the project effort. ...
Instead of suggesting what path a reader should take, I'd like to recommend a few learning elements from which a reader can build a learning path to suit his/her own interests. ...
doi:10.1002/9781118135532.ch1
fatcat:itsggugltfdqvis5qndwmthbku
Reflections on a Tale: The Marxist Foundations of the Concepts of Regulation and Accumulation*
1988
Studies in Political Economy
Within this limited purview, I will demonstrate the utility of the concepts of accumulation and regulation and the links between these concepts and the similarly labelled ones developed by Marx and some ...
For reproduction to occur, agents must first be aware that a social relation exists and the relation must appear normal, or natural. ...
doi:10.1080/19187033.1988.11675540
fatcat:snzvjsddq5enrjse4cmrny2hpu
Indexing: Concepts and Theory
2018
Knowledge organization
Second, I further situate knowledge organization in light of Jürgen Habermas' theory of the public sphere and argue that this theory can be viewed as a fundamental model of knowledge organization. ...
I conclude that this relationship between social organization and knowledge organization must be understood and examined in order to fully account for the role knowledge organization in human activities ...
Acknowledgements Acknowledgements is usually the place where one expresses a Acknowledgments I am grateful to Blaise Cronin, Pamela Sandstrom, and the anonymous referees of this article for their thoughtful ...
doi:10.5771/0943-7444-2018-7-609
fatcat:ck62ps2gwvhvvlzyetcflqmciu
Chapter 2. Threshold Concepts: Integrating and Applying Information Literacy and Writing Instruction
[chapter]
2016
Information Literacy: Research and Collaboration across Disciplines
The publishers and the Series editors are committed to the principle that knowledge should freely circulate. We see the opportunities that new technologies have for further democratizing knowledge. ...
Consistent with the wide ranging approaches characteristic of teaching and scholarship in writing across the curriculum, the series presents works that take divergent perspectives on working as a writer ...
ACKNOWLEDGEMENTS We would like to acknowledge Ako Aotearoa for the funding for this research over a three year period, and Facet Publishing for permission to use the ANCIL diagram ( Figure 17 .1) as produced ...
doi:10.37514/per-b.2016.0834.2.02
fatcat:z6tdzm5oiraxfoi2wyhc2vbt5a
Systems Challenges for Trustworthy Embodied Systems
[article]
2022
arXiv
pre-print
We are arguing that traditional systems engineering is coming to a climacteric from embedded to embodied systems, and with assuring the trustworthiness of dynamic federations of situationally aware, intent-driven ...
We are therefore identifying a number of urgent systems challenges for trustworthy embodied systems, including robust and human-centric AI, cognitive architectures, uncertainty quantification, trustworthy ...
A recent survey on knowledge-augmented machine learning 84 reviews the role of knowledge in machine learning, and it discusses its relation to the concept of invariance. ...
arXiv:2201.03413v2
fatcat:hwprg3zjhvfuro3etecx2t4qua
Exploring the Impact of Narrative Arts Activities on the Self-concept of Grade 9 Learners in Group Context
2009
International Journal of Adolescence and Youth
Worksheets may be designed to suit a particular scenario, for example, wishes for the future, or developing a road map for the future. ...
vast resources for self-understanding and for altering their self-concepts, basic attitudes, and self-directed behaviour; these resources can be tapped if a definable climate of facilitative psychological ...
PLEASE RELAX AND TRY
5. A verse from scripture that has deep personal meaning for you. 6. Things I learned from others in the group, and about others in the group. 7. ...
doi:10.1080/02673843.2009.9748013
fatcat:og5ffqndcrcpfonasfscnsm73i
Mils: Business, Legal And Social Acceptance
2015
Zenodo
This document is the result of EURO-MILS Work Package 1.3. The objective of the WP is to analyse the business impact of trustworthy ICT for networked high-criticality systems. ...
A multistep work has be done to make a quantitative and qualitative analysis of the different markets and understand the potential of exploitation. ...
Certification Environment To be labelled as trustworthy, a system must be safe and secure. ...
doi:10.5281/zenodo.47301
fatcat:2njeypzu4jfgjaygciloaj4zae
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS
2015
2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
Vector Machine (SVM) algorithm, a simple machine learning classifier. ...
The machine learning could benefit from a larger set of samples in order to validate the results. ...
doi:10.1109/badgers.2015.019
dblp:conf/badgers/MensahBOMK15
fatcat:nqn7fwqkcjaufjzzrrxtjxa7ru
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project
2019
Zenodo
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project ...
In the area of AI, key activities focus on a framework for AI systems using machine learning and other foundational standards; big data; and particularly on trustworthiness of AI. ...
Trustworthy electronics are also in our focus. They will become a key component especially for the implementation of products and solutions using artificial intelligence and machine learning. ...
doi:10.5281/zenodo.4294256
fatcat:ovybcpqny5eppniw7hb5vcsevy
A Multidisciplinary Definition of Privacy Labels: The Story of Princess Privacy and the Seven Helpers
[article]
2021
arXiv
pre-print
We employ storytelling and metaphors from fairytales to make reader-friendly and streamline our arguments about how a complex concept of Privacy Labeling (the 'knight in shining armor') can be a solution ...
In the end we present three approaches to establish and manage PL, through: self-evaluations, certifications, or community endeavors. Based on these, we sketch a roadmap for future developments. ...
The use of a set of rules that correlate between the privacy concepts annotations from the text and the elements of the constructed PL is new to standard machine learning models and can be used to explain ...
arXiv:2012.01813v3
fatcat:7z2z7y6iffhxrlordza7u7bjrm
Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking
2018
IEEE Internet of Things Journal
In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges related to the application of machine learning and ...
To this end, machine learning and software-defined networking will be key to provide both reconfigurability and intelligence to the IoT devices. ...
However, ECC-based ones also require a certification authority (CA) to maintain a pool of certificates for users' public keys, and the users need extra computation to verify the certificates of others. ...
doi:10.1109/jiot.2018.2846040
fatcat:xjjdi43i2bfnta5e5c6fcuamdy
On Assessing Trustworthy AI in Healthcare. Machine Learning as a Supportive Tool to Recognize Cardiac Arrest in Emergency Calls
2021
Frontiers in Human Dynamics
To this end, we present a best practice of assessing the use of machine learning as a supportive tool to recognize cardiac arrest in emergency calls. ...
For the assessment, we use a process to assess trustworthy AI, called 1Z-Inspection® to identify specific challenges and potential ethical trade-offs when we consider AI in practice. ...
Thanks also to Irmhild van Halem, Timo Eichhorn, Todor Ivanov, Melissa McCullough, Karsten Tolle, Gemma Roig, and Norman Stürtz for their invaluable contribution to the definition of the Z-Inspection ® ...
doi:10.3389/fhumd.2021.673104
fatcat:tjcu5mrkufajtmz4qr6ohxsvhe
Promoting Ethical Awareness in Communication Analysis: Investigating Potentials and Limits of Visual Analytics for Intelligence Applications
[article]
2022
arXiv
pre-print
Visual analytics combines machine learning methods with interactive visual interfaces to enable human sense- and decision-making. ...
We show that finding Visual Analytics design solutions for ethical issues is not a mere optimization task, but balancing out and negotiating these trade-offs has, as we argue, to be an integral aspect ...
The BMBF had no role in the design and conduct of the analysis or the preparation, review, or approval of the manuscript. The authors declare no other financial interests. ...
arXiv:2203.09859v1
fatcat:xvn5zxix25al7i6u23n4d7zvmm
« Previous
Showing results 1 — 15 out of 3,034 results