Trustworthy AI: From principles to practices
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …
of various systems based on it. However, many current AI systems are found vulnerable to …
Formal methods: Practice and experience
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …
program life-cycle. We describe the state of the art in the industrial use of formal methods …
Toward verified artificial intelligence
Toward verified artificial intelligence Page 1 46 COMMUNICATIONS OF THE ACM | JULY
2022 | VOL. 65 | NO. 7 contributed articles ILL US TRA TION B Y PETER CRO W THER A …
2022 | VOL. 65 | NO. 7 contributed articles ILL US TRA TION B Y PETER CRO W THER A …
Adaptive deconvolutional networks for mid and high level feature learning
We present a hierarchical model that learns image decompositions via alternating layers of
convolutional sparse coding and max pooling. When trained on natural images, the layers of …
convolutional sparse coding and max pooling. When trained on natural images, the layers of …
[ΒΙΒΛΙΟ][B] Principles of model checking
A comprehensive introduction to the foundations of model checking, a fully automated
technique for finding flaws in hardware and software; with extensive examples and both …
technique for finding flaws in hardware and software; with extensive examples and both …
Correlation clustering
We consider the following clustering problem: we have a complete graph on n vertices
(items), where each edge (u, v) is labeled either+ or− depending on whether u and v have …
(items), where each edge (u, v) is labeled either+ or− depending on whether u and v have …
Dynamically discovering likely program invariants to support program evolution
Explicitly stated program invariants can help programmers by identifying program properties
that must be preserved when modifying code. In practice, however, these invariants are …
that must be preserved when modifying code. In practice, however, these invariants are …
[ΒΙΒΛΙΟ][B] Requirements engineering for software and systems
PA Laplante, M Kassab - 2022 - taylorfrancis.com
Solid requirements engineering has increasingly been recognized as the key to improved,
on-time, and on-budget delivery of software and systems projects. New software tools are …
on-time, and on-budget delivery of software and systems projects. New software tools are …
Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
NuSMV: a new symbolic model checker
This paper describes a new symbolic model checker, called NuSMV, developed as part of a
joint project between CMU and IRST. NuSMV is the result of the reengineering …
joint project between CMU and IRST. NuSMV is the result of the reengineering …