Set propagation techniques for reachability analysis
Reachability analysis consists in computing the set of states that are reachable by a
dynamical system from all initial states and for all admissible inputs and parameters. It is a …
dynamical system from all initial states and for all admissible inputs and parameters. It is a …
A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability
In the past few years, significant progress has been made on deep neural networks (DNNs)
in achieving human-level performance on several long-standing tasks. With the broader …
in achieving human-level performance on several long-standing tasks. With the broader …
[PDF][PDF] Automating the design process for smart building technologies
R Parekh - World Journal of Advanced Research and Reviews, 2024 - researchgate.net
Smart buildings are emerging as complex cyber-physical systems that aim to provide safe,
comfortable, energy-efficient, and aesthetically pleasing environments. However, traditional …
comfortable, energy-efficient, and aesthetically pleasing environments. However, traditional …
[책][B] Handbook of model checking
This handbook is intended to give an in-depth description of the many research areas that
make up the expanding field of model checking. In 32 chapters, 76 of the world's leading …
make up the expanding field of model checking. In 32 chapters, 76 of the world's leading …
Learning from massive noisy labeled data for image classification
Large-scale supervised datasets are crucial to train convolutional neural networks (CNNs)
for various computer vision problems. However, obtaining a massive amount of well-labeled …
for various computer vision problems. However, obtaining a massive amount of well-labeled …
[책][B] Formal methods for discrete-time dynamical systems
In control theory, complex models of physical processes, such as systems of differential or
difference equations, are usually checked against simple specifications, such as stability …
difference equations, are usually checked against simple specifications, such as stability …
The past, present and future of cyber-physical systems: A focus on models
EA Lee - Sensors, 2015 - mdpi.com
This paper is about better engineering of cyber-physical systems (CPSs) through better
models. Deterministic models have historically proven extremely useful and arguably form …
models. Deterministic models have historically proven extremely useful and arguably form …
The visual object tracking vot2015 challenge results
Abstract The Visual Object Tracking challenge 2015, VOT2015, aims at comparing short-
term single-object visual trackers that do not apply pre-learned models of object …
term single-object visual trackers that do not apply pre-learned models of object …
Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools
Fault tree analysis (FTA) is a very prominent method to analyze the risks related to safety
and economically critical assets, like power plants, airplanes, data centers and web shops …
and economically critical assets, like power plants, airplanes, data centers and web shops …
Soteria: Automated {IoT} safety and security analysis
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …
integrate physical processes with digital systems have changed the way we live, play and …