Page 102 of 313
Abstract: Process-based argumentations argue that a safety-critical system has been developed in compliance with the development process defined in the standards and provide the evidence for certification of compliance. However, the process-based argumentations cannot ensure that the evidences are sufficient to support the claim. If the argumentations are insufficient (i.e., fallacious) they may result in a...
Abstract: CHESS is an open source methodology and toolset for the development of safety-critical systems. More specifically, CHESS is a model-based methodology, which supports the design, dependability analysis, and code generation for critical systems. Despite its rather mature level in terms of technology readiness, systematic guidance needs to be developed to promote its usage for certification purposes....
Abstract: In times of increasing polarization and political acrimony, fueled by distrust of government and media disinformation, it is ever more important to understand the cognitive mechanisms behind political attitude change. In two experiments, we present evidence that false beliefs about one’s own prior attitudes and confabulatory reasoning can lead to lasting changes in political attitudes. In Experime...
Abstract: Abstract Self-adaptation is a well-known technique to handle growing complexities of software systems, where a system autonomously adapts itself in response to changes in a dynamic and unpredictable environment. With the increasing need for developing self-adaptive systems, providing a model and an implementation platform to facilitate integration of adaptation mechanisms into the systems and assu...
Abstract: One of the major advantages of Model-Driven Engineering is the possibility to early assess crucial system properties, in order to identify issues that are easier and cheaper to solve at design level than at code level. An example of such a property is the timing behaviour of a real-time application, where an early indication that the timing constraints might not be met can help avoiding costly re-...
Abstract: The Internet of Things (IoT) is envisioned as a global network of connected things enabling ubiquitous machine-to-machine (M2M) communication. With estimations of billions of sensors and devices to be connected in the coming years, the IoT has been advocated as having a great potential to impact the way we live, but also how we work. However, the connectivity aspect in itself only accounts for the...
Abstract: Hardware manufacturers are forced to improve system performance continuously due to advanced and computationally demanding system functions. Unfortunately - more powerful hardware leads to increased costs. Instead, companies attempt to improve performance by consolidating multiple functions to share the same hardware to exploit existing performance instead. In legacy systems, each function had ind...
Abstract: Adaptive autonomy plays a major role in the design of multi-robots and multi-agent systems, where the need of collaboration for achieving a common goal is of primary importance. In particular, adaptation becomes necessary to deal with dynamic environments, and scarce available resources. In this paper, a mathematical framework for modelling the agents' willingness to interact and collaborate, and ...
Abstract: Fog computing is an emerging technology that enables the design of novel time sensitive industrial applications. This new computing paradigm also opens several new research challenges in different scientific domains, ranging from computer architectures to networks, from robotics to real-time systems. In this paper, we present a use case in the human-robot collaboration domain, and we identify some...
Abstract: Highly configurable systems are complex pieces of software. To tackle this complexity, hundreds of dedicated analysis techniques have been conceived, many of which able to analyze system properties for all possible system configurations, as opposed to traditional, single-system analyses. Unfortunately, it is largely unknown whether these techniques are adopted in practice, whether they address act...
Abstract: In the early 90s, researchers began to focus on security as an important property to address in combination with safety. Over the years, researchers have proposed approaches to harmonize activities ......
Abstract: Monitoring of third-party content, such as ads, in web applications is one of the growing business areas in the web industry. In order to increase the impact of the ads and optimize the content on the web-page, companies measure which ads are displayed and how long they stay on the visible part of the screen. However, the challenge is that the third-party content can be of varying type, come from ...
Page 102 of 313