標(biāo)題: Titlebook: Engineering of Computer-Based Systems; 8th International Co Jan Kofroň,Tiziana Margaria,Cristina Seceleanu Conference proceedings 2024 The [打印本頁] 作者: 斷巖 時(shí)間: 2025-3-21 20:02
書目名稱Engineering of Computer-Based Systems影響因子(影響力)
書目名稱Engineering of Computer-Based Systems影響因子(影響力)學(xué)科排名
書目名稱Engineering of Computer-Based Systems網(wǎng)絡(luò)公開度
書目名稱Engineering of Computer-Based Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Engineering of Computer-Based Systems被引頻次
書目名稱Engineering of Computer-Based Systems被引頻次學(xué)科排名
書目名稱Engineering of Computer-Based Systems年度引用
書目名稱Engineering of Computer-Based Systems年度引用學(xué)科排名
書目名稱Engineering of Computer-Based Systems讀者反饋
書目名稱Engineering of Computer-Based Systems讀者反饋學(xué)科排名
作者: 果核 時(shí)間: 2025-3-21 22:39 作者: 藐視 時(shí)間: 2025-3-22 02:17
,Ambient Temperature Prediction for?Embedded Systems Using Machine Learning,and’s board. After providing an overview of the related work, we describe how we train the two ML models and identify the optimal training and test datasets to avoid the problems of data under- and over-fitting. Given this train/test split, the trained RF and XGBoost models provide temperature predi作者: cataract 時(shí)間: 2025-3-22 08:29
A Federated Learning Algorithms Development Paradigm,work targeting smart Internet of Things in edge systems is still an open challenge. A solution to that challenge named Python Testbed for Federated Learning Algorithms (PTB-FLA) appeared recently. This solution is written in pure Python, it supports both centralized and decentralized algorithms, and作者: 胎兒 時(shí)間: 2025-3-22 10:29 作者: heckle 時(shí)間: 2025-3-22 15:33 作者: heckle 時(shí)間: 2025-3-22 20:40
,Learning in?Uppaal for?Test Case Generation for?Cyber-Physical Systems,ta for modelling. Different from other studies, we construct the model from the environment’s perspective. After building the model, we synthesize policies for different kinds of environments by using reinforcement learning in Uppaal and parse the policies for test-case generation. Statistical model作者: incisive 時(shí)間: 2025-3-22 23:22
,A Literature Survey of?Assertions in?Software Testing,lidation tasks. We provide an overview of the last two decades of research involving ‘a(chǎn)ssertions’ in software testing. Based on a term–based search, we filtered the inclusion of relevant papers and synthesised them w.r.t. the problem addressed, the solution designed, and the evaluation conducted. Th作者: Genistein 時(shí)間: 2025-3-23 03:12
,FPGA-Based Encryption for?Peer-to-Peer Industrial Network Links,ential to extend IT security across increasingly connected factories. However, in the highly specialised field of operations technology and embedded systems, not every device can run additional security measures, as they are old or designed with sparse resources. We introduce here the concept of a “作者: Aggressive 時(shí)間: 2025-3-23 05:59
,Formalization and?Verification of?MQTT-SN Communication Using CSP,nderlying protocol to provide ordered and reliable connections during transmission, making it ideal for sensors in WSN with extremely limited computing power and resources. Due to the widespread use of WSN in various areas, the MQTT-SN protocol has promising application prospects. Furthermore, secur作者: calamity 時(shí)間: 2025-3-24 09:35
,Cyber-Physical Ecosystems: Modelling and?Verification,cal ecosystems are cyber-physical systems of systems that are highly connected. These are networked systems that combine cyber-physical systems with an interaction mechanism with other systems and the environment (ecosystem capability). Our contribution will be on two streams: (i) modelling the cons作者: 諷刺滑稽戲劇 時(shí)間: 2025-3-24 14:26 作者: ABIDE 時(shí)間: 2025-3-24 16:36 作者: 詞根詞綴法 時(shí)間: 2025-3-24 21:02 作者: 名字 時(shí)間: 2025-3-25 01:17
978-3-031-49251-8The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: curriculum 時(shí)間: 2025-3-25 03:35 作者: 天賦 時(shí)間: 2025-3-25 10:53
The Genetics of Male InfertilityThe result of reinforcement learning is often obtained in the form of a q-table mapping actions to future rewards. We propose to use SMT solvers and . to generate a representation of a learned strategy in a format which is understandable for a human. We present the methodology and demonstrate it on a small game.作者: 生命 時(shí)間: 2025-3-25 13:22
https://doi.org/10.1007/978-94-017-5956-4This poster paper presents a software package (.) that implements the Hammock-EFL approach for Project Management and Parallel Programming, written in Python.作者: aphasia 時(shí)間: 2025-3-25 18:22 作者: 召集 時(shí)間: 2025-3-25 21:40 作者: GREEN 時(shí)間: 2025-3-26 00:51 作者: 空洞 時(shí)間: 2025-3-26 07:37 作者: Congruous 時(shí)間: 2025-3-26 11:18
The Genesis of Simulation in Dynamicsand the concept of responsible AI systems, fundamental to understand the technological, ethical and legal context of the current framework of debate and regulation of AI. The aim is to understand their dimension and their interrelation with the rest of the elements involved in the regulation and aud作者: nauseate 時(shí)間: 2025-3-26 15:59
https://doi.org/10.1007/978-1-4899-2067-6and’s board. After providing an overview of the related work, we describe how we train the two ML models and identify the optimal training and test datasets to avoid the problems of data under- and over-fitting. Given this train/test split, the trained RF and XGBoost models provide temperature predi作者: 結(jié)束 時(shí)間: 2025-3-26 20:37
The Genetic Code and the Origin of Lifework targeting smart Internet of Things in edge systems is still an open challenge. A solution to that challenge named Python Testbed for Federated Learning Algorithms (PTB-FLA) appeared recently. This solution is written in pure Python, it supports both centralized and decentralized algorithms, and作者: 食料 時(shí)間: 2025-3-26 21:56 作者: 蕁麻 時(shí)間: 2025-3-27 02:21
https://doi.org/10.1007/978-3-031-14794-4s a web-based, low-code/no-code graphical modelling environment for ML and data analytics applications. On a case study from the medical domain, we solve the challenge of re-using AI/ML models that do not address data with imbalanced class by implementing ML algorithms in Python that do the re-balan作者: START 時(shí)間: 2025-3-27 05:38 作者: 小臼 時(shí)間: 2025-3-27 12:21 作者: 內(nèi)部 時(shí)間: 2025-3-27 15:19 作者: SSRIS 時(shí)間: 2025-3-27 18:39
https://doi.org/10.1007/978-1-4684-2445-4nderlying protocol to provide ordered and reliable connections during transmission, making it ideal for sensors in WSN with extremely limited computing power and resources. Due to the widespread use of WSN in various areas, the MQTT-SN protocol has promising application prospects. Furthermore, secur作者: 吸引人的花招 時(shí)間: 2025-3-27 22:20 作者: deface 時(shí)間: 2025-3-28 03:03
The Genetics of Coeliac Diseaseperformance of the designed prototype before deploying these complex networks. Network Simulator 3 (ns-3), MATLAB/Simulink, and . ?SMC are three industry-leading tools that simulate communicating models, each with strengths and weaknesses. NS3 is suitable for large-scale network simulations, MATLAB/作者: 拍翅 時(shí)間: 2025-3-28 06:38 作者: 租約 時(shí)間: 2025-3-28 12:02
The Genetics of Diabetes Mellitusation: The characteristic decomposition of LDE into tasks that are solved with dedicated domain-specific languages divides the migration tasks into portions adequate to apply LLM-based code generation. We illustrate this effect by migrating a low-code/no-code generator for point-and-click adventures作者: 裂縫 時(shí)間: 2025-3-28 18:09 作者: 躲債 時(shí)間: 2025-3-28 20:03
https://doi.org/10.1007/978-1-59259-033-9cal ecosystems are cyber-physical systems of systems that are highly connected. These are networked systems that combine cyber-physical systems with an interaction mechanism with other systems and the environment (ecosystem capability). Our contribution will be on two streams: (i) modelling the cons作者: intention 時(shí)間: 2025-3-29 02:12 作者: 是比賽 時(shí)間: 2025-3-29 05:34
https://doi.org/10.1007/978-1-4684-2436-2paper evaluates the FIUL-Data framework using data from analytical chemistry, comprising retention time measurements of anti-sense oligonucleotide. Empirical evaluation is carried out in a two-step process in which the responses of selected ML models to data mutation are analyzed individually and th作者: 火海 時(shí)間: 2025-3-29 10:32
https://doi.org/10.1007/978-1-4684-2445-4(CSP) and then verify seven properties of this model using Process Analysis Toolkit (PAT), including deadlock freedom, divergence freedom, data reachability, client security, gateway security, broker security, and data leakage. According to the verification results in PAT, our model satisfies all th作者: Heart-Rate 時(shí)間: 2025-3-29 15:07
The Genetics of Cardiovascular Diseasenel environments..The study aims to explore acoustic features and classification algorithms to distinguish between road and tunnel environment and using a sensor fusion with radar systems, suspend the MM &A system accordingly. By tackling this problem, the research contributes to the advancement of 作者: sacrum 時(shí)間: 2025-3-29 19:30 作者: Thyroiditis 時(shí)間: 2025-3-29 22:49
https://doi.org/10.1007/978-1-4614-8642-8designed PCBs in the manufacturing line to automatically generate 3D models of the PCBAs. By incorporating various techniques, the framework introduces controlled defects into the PCBA, thereby creating reproducible and differentiable defect datasets. The quality data produced by this framework enab作者: 數(shù)量 時(shí)間: 2025-3-30 01:22
,Machine Learning Data Suitability and?Performance Testing Using Fault Injection Testing Framework,paper evaluates the FIUL-Data framework using data from analytical chemistry, comprising retention time measurements of anti-sense oligonucleotide. Empirical evaluation is carried out in a two-step process in which the responses of selected ML models to data mutation are analyzed individually and th作者: 駁船 時(shí)間: 2025-3-30 04:34
,Formalization and?Verification of?MQTT-SN Communication Using CSP,(CSP) and then verify seven properties of this model using Process Analysis Toolkit (PAT), including deadlock freedom, divergence freedom, data reachability, client security, gateway security, broker security, and data leakage. According to the verification results in PAT, our model satisfies all th作者: Radiation 時(shí)間: 2025-3-30 09:08
,Detecting Road Tunnel-Like Environments Using Acoustic Classification for?Sensor Fusion with?Radar nel environments..The study aims to explore acoustic features and classification algorithms to distinguish between road and tunnel environment and using a sensor fusion with radar systems, suspend the MM &A system accordingly. By tackling this problem, the research contributes to the advancement of 作者: 古董 時(shí)間: 2025-3-30 13:21
,Comparative Analysis of?, ?SMC, ns-3 and?MATLAB/Simulink,hen designing and evaluating simulation experiments. They demonstrate that the choice of tool depends on the specific requirements of the simulation project and requires careful consideration of the strengths and weaknesses of each tool.作者: Cougar 時(shí)間: 2025-3-30 16:31 作者: PALL 時(shí)間: 2025-3-31 00:21
,Cyber-Physical Ecosystems: Modelling and?Verification,tituent systems and their interfaces, and (ii) local/global verification of cyber-physical ecosystems. We introduce a concept of basic model, whose skeleton is a Markov decision process and we propose a verification based abstraction methodology.作者: ALIAS 時(shí)間: 2025-3-31 01:16
0302-9743 h was held in V?ster?s, Sweden, in October 2023.. The 11 full papers included in this book were carefully reviewed and selected from 26 submissions and present software, hardware, and communication perspectives of systems engineering through its many facets. The special theme of this year is ”Engine作者: 斑駁 時(shí)間: 2025-3-31 07:50
The Genesis of Simulation in Dynamicsnd regulation of AI. The aim is to understand their dimension and their interrelation with the rest of the elements involved in the regulation and auditability of AI algorithms in order to achieve safe and trusted AI. We highlight concepts in bold in order to fix the moment when they are described in context.作者: 禁令 時(shí)間: 2025-3-31 11:00 作者: 使成核 時(shí)間: 2025-3-31 16:19 作者: 世俗 時(shí)間: 2025-3-31 20:33 作者: Discrete 時(shí)間: 2025-3-31 23:12
https://doi.org/10.1007/978-3-031-14794-4for AI/ML applications can be used by non-coders. It simplifies the data-preprocessing stage of any AI/ML project pipeline, which can potentially improve the performance of the models. The tool demo will showcase the low-code implementation and no-code reuse and repurposing of AI-based systems through end-to end Pyrus pipelines.作者: Fibrinogen 時(shí)間: 2025-4-1 05:07 作者: POINT 時(shí)間: 2025-4-1 07:30
,How to?Be An?Ethical Technologist, responsibility” and “machine ethics”. But corporations are driven by profits, not ethics, and machines are built by people. We should not expect corporations or machines to act ethically; we should expect people to act ethically. In this talk the speaker will discuss how technologists act ethically.作者: 影響深遠(yuǎn) 時(shí)間: 2025-4-1 11:06
,IDPP: Imbalanced Datasets Pipelines in?Pyrus,for AI/ML applications can be used by non-coders. It simplifies the data-preprocessing stage of any AI/ML project pipeline, which can potentially improve the performance of the models. The tool demo will showcase the low-code implementation and no-code reuse and repurposing of AI-based systems through end-to end Pyrus pipelines.作者: neutrophils 時(shí)間: 2025-4-1 17:37
,Towards LLM-Based System Migration in?Language-Driven Engineering,earning and model analysis by design. In particular, this allows to easily test the correctness of migration by learning the difference automaton for the generated products of the source and the target system of the migration.作者: 胰島素 時(shí)間: 2025-4-1 19:08 作者: 兇兆 時(shí)間: 2025-4-1 22:58 作者: Obliterate 時(shí)間: 2025-4-2 02:53
The Genetic Code and the Origin of Life code, (3) the federated sequential code with callbacks, and (4) the PTB-FLA code. The development paradigm is validated and illustrated in the case study on logistic regression, where both centralized and decentralized algorithms are developed.作者: Pedagogy 時(shí)間: 2025-4-2 11:01 作者: adroit 時(shí)間: 2025-4-2 12:16
https://doi.org/10.1007/978-1-59745-510-7hy. The resulting architecture is implemented as a proof of concept for Ethernet communication and tested through simulation as well as on an FPGA device. The impact of the encryption device is briefly investigated in a lab setup, followed by conclusions on system stability and performance.作者: commensurate 時(shí)間: 2025-4-2 18:44 作者: 救護(hù)車 時(shí)間: 2025-4-2 20:22
,Ambient Temperature Prediction for?Embedded Systems Using Machine Learning,readings. Furthermore, the RF model appears less volatile than XGBoost using our training data. As the results demonstrate, our predictive temperature models allow for an accurate error prediction as a function of baseband board sensors.