3,034 Hits in 15.1 sec

The Care Label Concept: A Certification Suite for Trustworthy and Resource-Aware Machine Learning [article]

Katharina Morik and Helena Kotthaus and Lukas Heppe and Danny Heinrich and Raphael Fischer and Andreas Pauly and Nico Piatkowski
2021 arXiv   pre-print
On the other hand, care labels are the result of a certification suite that tests whether stated guarantees hold. In this paper, we present two experiments with our certification suite.  ...  For those who do not want to invest time into understanding the method or the learned model, we offer care labels: easy to understand at a glance, allowing for method or model comparisons, and, at the  ...  Acknowledgement This research has been funded by the Federal Ministry of Education and Research of Germany as part of the competence center for machine learning ML2R (01IS18038A/B).  ... 
arXiv:2106.00512v1 fatcat:ev5x235sxvfqhacuh2xuibthfq

Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing

Mohamad Samir A. EID, Hitoshi AIDA
2017 IEICE transactions on information and systems  
A novel behaviorbased reputation and penalty system is designed, then a simplified proof of concept prototype is implemented and deployed on DeterLab.  ...  Only the added identification level was utilized for mitigation, while future work includes incorporating all three levels to mitigate switching and multi-request per connection attack categories. key  ...  , and The Teijin Foundation.  ... 
doi:10.1587/transinf.2016icp0024 fatcat:dwjnxnsowffpzmir252hptenve

Basic Concepts [chapter]

2011 Oracle Database Performance and Scalability  
Each title brings the principles and theory of programming in-the-large and industrial strength software into focus.  ...  case histories, quantitative analysis, and technology into the project effort.  ...  Instead of suggesting what path a reader should take, I'd like to recommend a few learning elements from which a reader can build a learning path to suit his/her own interests.  ... 
doi:10.1002/9781118135532.ch1 fatcat:itsggugltfdqvis5qndwmthbku

Reflections on a Tale: The Marxist Foundations of the Concepts of Regulation and Accumulation*

Alain Lipietz
1988 Studies in Political Economy  
Within this limited purview, I will demonstrate the utility of the concepts of accumulation and regulation and the links between these concepts and the similarly labelled ones developed by Marx and some  ...  For reproduction to occur, agents must first be aware that a social relation exists and the relation must appear normal, or natural.  ... 
doi:10.1080/19187033.1988.11675540 fatcat:snzvjsddq5enrjse4cmrny2hpu

Indexing: Concepts and Theory

Birger Hjørland
2018 Knowledge organization  
Second, I further situate knowledge organization in light of Jürgen Habermas' theory of the public sphere and argue that this theory can be viewed as a fundamental model of knowledge organization.  ...  I conclude that this relationship between social organization and knowledge organization must be understood and examined in order to fully account for the role knowledge organization in human activities  ...  Acknowledgements Acknowledgements is usually the place where one expresses a Acknowledgments I am grateful to Blaise Cronin, Pamela Sandstrom, and the anonymous referees of this article for their thoughtful  ... 
doi:10.5771/0943-7444-2018-7-609 fatcat:ck62ps2gwvhvvlzyetcflqmciu

Chapter 2. Threshold Concepts: Integrating and Applying Information Literacy and Writing Instruction [chapter]

Barry Maid, Barbara D'Angelo
2016 Information Literacy: Research and Collaboration across Disciplines  
The publishers and the Series editors are committed to the principle that knowledge should freely circulate. We see the opportunities that new technologies have for further democratizing knowledge.  ...  Consistent with the wide ranging approaches characteristic of teaching and scholarship in writing across the curriculum, the series presents works that take divergent perspectives on working as a writer  ...  ACKNOWLEDGEMENTS We would like to acknowledge Ako Aotearoa for the funding for this research over a three year period, and Facet Publishing for permission to use the ANCIL diagram ( Figure 17 .1) as produced  ... 
doi:10.37514/per-b.2016.0834.2.02 fatcat:z6tdzm5oiraxfoi2wyhc2vbt5a

Systems Challenges for Trustworthy Embodied Systems [article]

Harald Rueß
2022 arXiv   pre-print
We are arguing that traditional systems engineering is coming to a climacteric from embedded to embodied systems, and with assuring the trustworthiness of dynamic federations of situationally aware, intent-driven  ...  We are therefore identifying a number of urgent systems challenges for trustworthy embodied systems, including robust and human-centric AI, cognitive architectures, uncertainty quantification, trustworthy  ...  A recent survey on knowledge-augmented machine learning 84 reviews the role of knowledge in machine learning, and it discusses its relation to the concept of invariance.  ... 
arXiv:2201.03413v2 fatcat:hwprg3zjhvfuro3etecx2t4qua

Exploring the Impact of Narrative Arts Activities on the Self-concept of Grade 9 Learners in Group Context

J. G. Maree, P. A. Pienaar
2009 International Journal of Adolescence and Youth  
Worksheets may be designed to suit a particular scenario, for example, wishes for the future, or developing a road map for the future.  ...  vast resources for self-understanding and for altering their self-concepts, basic attitudes, and self-directed behaviour; these resources can be tapped if a definable climate of facilitative psychological  ...  PLEASE RELAX AND TRY 5. A verse from scripture that has deep personal meaning for you. 6. Things I learned from others in the group, and about others in the group. 7.  ... 
doi:10.1080/02673843.2009.9748013 fatcat:og5ffqndcrcpfonasfscnsm73i

Mils: Business, Legal And Social Acceptance

Christophe Toulemonde, Jacques Brygier, Holger Blasum, Sergey Tverdyshev, Bertrand Leconte, Kevin Müller, Axel Söding - Freiherr von Blomberg, Igor Furgel, Martina Truskaller
2015 Zenodo  
This document is the result of EURO-MILS Work Package 1.3. The objective of the WP is to analyse the business impact of trustworthy ICT for networked high-criticality systems.  ...  A multistep work has be done to make a quantitative and qualitative analysis of the different markets and understand the potential of exploitation.  ...  Certification Environment To be labelled as trustworthy, a system must be safe and secure.  ... 
doi:10.5281/zenodo.47301 fatcat:2njeypzu4jfgjaygciloaj4zae

AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS

Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi
2015 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)  
Vector Machine (SVM) algorithm, a simple machine learning classifier.  ...  The machine learning could benefit from a larger set of samples in order to validate the results.  ... 
doi:10.1109/badgers.2015.019 dblp:conf/badgers/MensahBOMK15 fatcat:nqn7fwqkcjaufjzzrrxtjxa7ru

Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project

Maria Pateraki, Manolis Lourakis, Leonidas Kallipolitis, Frank Werner, Petros Patias, Christos Pikridas
2019 Zenodo  
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project  ...  In the area of AI, key activities focus on a framework for AI systems using machine learning and other foundational standards; big data; and particularly on trustworthiness of AI.  ...  Trustworthy electronics are also in our focus. They will become a key component especially for the implementation of products and solutions using artificial intelligence and machine learning.  ... 
doi:10.5281/zenodo.4294256 fatcat:ovybcpqny5eppniw7hb5vcsevy

A Multidisciplinary Definition of Privacy Labels: The Story of Princess Privacy and the Seven Helpers [article]

Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll
2021 arXiv   pre-print
We employ storytelling and metaphors from fairytales to make reader-friendly and streamline our arguments about how a complex concept of Privacy Labeling (the 'knight in shining armor') can be a solution  ...  In the end we present three approaches to establish and manage PL, through: self-evaluations, certifications, or community endeavors. Based on these, we sketch a roadmap for future developments.  ...  The use of a set of rules that correlate between the privacy concepts annotations from the text and the elements of the constructed PL is new to standard machine learning models and can be used to explain  ... 
arXiv:2012.01813v3 fatcat:7z2z7y6iffhxrlordza7u7bjrm

Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking

Francesco Restuccia, Salvatore DrOro, Tommaso Melodia
2018 IEEE Internet of Things Journal  
In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges related to the application of machine learning and  ...  To this end, machine learning and software-defined networking will be key to provide both reconfigurability and intelligence to the IoT devices.  ...  However, ECC-based ones also require a certification authority (CA) to maintain a pool of certificates for users' public keys, and the users need extra computation to verify the certificates of others.  ... 
doi:10.1109/jiot.2018.2846040 fatcat:xjjdi43i2bfnta5e5c6fcuamdy

On Assessing Trustworthy AI in Healthcare. Machine Learning as a Supportive Tool to Recognize Cardiac Arrest in Emergency Calls

Roberto V. Zicari, James Brusseau, Stig Nikolaj Blomberg, Helle Collatz Christensen, Megan Coffee, Marianna B. Ganapini, Sara Gerke, Thomas Krendl Gilbert, Eleanore Hickman, Elisabeth Hildt, Sune Holm, Ulrich Kühne (+28 others)
2021 Frontiers in Human Dynamics  
To this end, we present a best practice of assessing the use of machine learning as a supportive tool to recognize cardiac arrest in emergency calls.  ...  For the assessment, we use a process to assess trustworthy AI, called 1Z-Inspection® to identify specific challenges and potential ethical trade-offs when we consider AI in practice.  ...  Thanks also to Irmhild van Halem, Timo Eichhorn, Todor Ivanov, Melissa McCullough, Karsten Tolle, Gemma Roig, and Norman Stürtz for their invaluable contribution to the definition of the Z-Inspection ®  ... 
doi:10.3389/fhumd.2021.673104 fatcat:tjcu5mrkufajtmz4qr6ohxsvhe

Promoting Ethical Awareness in Communication Analysis: Investigating Potentials and Limits of Visual Analytics for Intelligence Applications [article]

Maximilian T. Fischer, Simon David Hirsbrunner, Wolfgang Jentner, Matthias Miller, Daniel A. Keim, Paula Helm
2022 arXiv   pre-print
Visual analytics combines machine learning methods with interactive visual interfaces to enable human sense- and decision-making.  ...  We show that finding Visual Analytics design solutions for ethical issues is not a mere optimization task, but balancing out and negotiating these trade-offs has, as we argue, to be an integral aspect  ...  The BMBF had no role in the design and conduct of the analysis or the preparation, review, or approval of the manuscript. The authors declare no other financial interests.  ... 
arXiv:2203.09859v1 fatcat:xvn5zxix25al7i6u23n4d7zvmm
« Previous Showing results 1 — 15 out of 3,034 results