Theoretical Computer Science


Book Description

This book constitutes the thoroughly refereed proceedings of the 39th National Conference of Theoretical Computer Science, NCTCS 2021, held in Yinchuan, China, in July 2021. The 67 full papers were carefully reviewed and selected from 145 submissions, and 14 of them were selected for the volume. The papers present recent research in the areas of information hiding, data detection and recognition, system scheduling, time series prediction, and formal analysis.







Real-Time Sensor Networks and Systems for the Industrial IoT


Book Description

The Industrial Internet of Things (Industrial IoT—IIoT) has emerged as the core construct behind the various cyber-physical systems constituting a principal dimension of the fourth Industrial Revolution. While initially born as the concept behind specific industrial applications of generic IoT technologies, for the optimization of operational efficiency in automation and control, it quickly enabled the achievement of the total convergence of Operational (OT) and Information Technologies (IT). The IIoT has now surpassed the traditional borders of automation and control functions in the process and manufacturing industry, shifting towards a wider domain of functions and industries, embraced under the dominant global initiatives and architectural frameworks of Industry 4.0 (or Industrie 4.0) in Germany, Industrial Internet in the US, Society 5.0 in Japan, and Made-in-China 2025 in China. As real-time embedded systems are quickly achieving ubiquity in everyday life and in industrial environments, and many processes already depend on real-time cyber-physical systems and embedded sensors, the integration of IoT with cognitive computing and real-time data exchange is essential for real-time analytics and realization of digital twins in smart environments and services under the various frameworks’ provisions. In this context, real-time sensor networks and systems for the Industrial IoT encompass multiple technologies and raise significant design, optimization, integration and exploitation challenges. The ten articles in this Special Issue describe advances in real-time sensor networks and systems that are significant enablers of the Industrial IoT paradigm. In the relevant landscape, the domain of wireless networking technologies is centrally positioned, as expected.




Putting AI in the Critical Loop


Book Description

Providing a high level of autonomy for a human-machine team requires assumptions that address behavior and mutual trust. The performance of a human-machine team is maximized when the partnership provides mutual benefits that satisfy design rationales, balance of control, and the nature of autonomy. The distinctively different characteristics and features of humans and machines are likely why they have the potential to work well together, overcoming each other's weaknesses through cooperation, synergy, and interdependence which forms a "collective intelligence. Trust is bidirectional and two-sided; humans need to trust AI technology, but future AI technology may also need to trust humans.Putting AI in the Critical Loop: Assured Trust and Autonomy in Human-Machine Teams focuses on human-machine trust and "assured performance and operation in order to realize the potential of autonomy. This book aims to take on the primary challenges of bidirectional trust and performance of autonomous systems, providing readers with a review of the latest literature, the science of autonomy, and a clear path towards the autonomy of human-machine teams and systems. Throughout this book, the intersecting themes of collective intelligence, bidirectional trust, and continual assurance form the challenging and extraordinarily interesting themes which will help lay the groundwork for the audience to not only bridge the knowledge gaps, but also to advance this science to develop better solutions. - Assesses the latest research advances, engineering challenges, and the theoretical gaps surrounding the question of autonomy - Reviews the challenges of autonomy (e.g., trust, ethics, legalities, etc.), including gaps in the knowledge of the science - Offers a path forward to solutions - Investigates the value of trust by humans of HMTs, as well as the bidirectionality of trust, understanding how machines learn to trust their human teammates




Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems


Book Description

This book provides comprehensive coverage of various solutions that address issues related to real-time performance, security, and robustness in emerging automotive platforms. The authors discuss recent advances towards the goal of enabling reliable, secure, and robust, time-critical automotive cyber-physical systems, using advanced optimization and machine learning techniques. The focus is on presenting state-of-the-art solutions to various challenges including real-time data scheduling, secure communication within and outside the vehicle, tolerance to faults, optimizing the use of resource-constrained automotive ECUs, intrusion detection, and developing robust perception and control techniques for increasingly autonomous vehicles.




Quality-of-Service Aware Design and Management of Embedded Mixed-Criticality Systems


Book Description

This book addresses the challenges associated with efficient Mixed-Criticality (MC) system design. We focus on application analysis through execution time analysis and task scheduling analysis in order to execute more low-criticality tasks in the system, i.e., improving the Quality-of-Service (QoS), while guaranteeing the correct execution of high-criticality tasks. Further, this book addresses the challenge of enhancing QoS using parallelism in multi-processor hardware platforms.




Parallel and Distributed Computing, Applications and Technologies


Book Description

This book constitutes the refereed proceedings of the 19th International Conference on CParallel and Distributed Computing, Applications and Technologies, PDCAT 2018, held in Jeju Island, South Korea, in August 2018. The 35 revised full papers presented along with the 14 short papers and were carefully reviewed and selected from 150 submissions. The papers of this volume are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication systems.




System Innovation for a Troubled World


Book Description

System Innovation for a Troubled World: Applied System Innovation VIII contains roughly one tenth of the total of 250 contributions from 8 different countries that were presented at the IEEE 8th International Conference on Applied System Innovation (ICASI 2022, Sun Moon Lake, Nantou, Taiwan, 21-23 April 2022). This book aims to provide an integrated communication platform for researchers from a wide range of topics including: Information Technology Communication Science Applied Mathematics Computer Science Advanced Material Science Engineering System Innovation for a Troubled World: Applied System Innovation VIII aims at science and engineering technologists, academics and professionals from the above mentioned areas.




Handbook of Real-Time Computing


Book Description

The aim of this handbook is to summarize the recent rapidly developed real-time computing technologies, from theories to applications. This handbook benefits the readers as a full and quick technical reference with a high-level historic review of technology, detailed technical descriptions and the latest practical applications. In general, the handbook is divided into three main parts (subjected to be modified): theory, design, and application covering different but not limited to the following topics: - Real-time operating systems - Real-time scheduling - Timing analysis - Programming languages and run-time systems - Middleware systems - Design and analysis tools - Real-time aspects of wireless sensor networks - Energy aware real-time methods




Formal Techniques for Safety-Critical Systems


Book Description

This book constitutes the refereed proceedings of the 6th International Workshop on Formal Techniques for Safety-Critical Systems, FTSCS 2018, held in Gold Coast, Australia in November 2018. The 10 revised full papers presented together with an abstract of an invited talk were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on analysis and verification of Safety-Critical Systems; analysis of timed systems; semantics and analysis methods, and model transformation.