{"title":"IEEE Computer Society Social Newworking","authors":"","doi":"10.1109/mc.2024.3440038","DOIUrl":"https://doi.org/10.1109/mc.2024.3440038","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"157 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vinod Vasudevan, Amr Abdullatif, Sohag Kabir, Felician Campean
We analyze the existing safety standard, ISO 26262, for automotive applications, determining the certifiability of machine learning (ML) approaches used in low-risk automotive applications. This can help assuring the security and safety of ML-based autonomous driving systems, gaining the trust of regulators, certification agencies, and stakeholders.
我们分析了适用于汽车应用的现有安全标准 ISO 26262,确定了低风险汽车应用中使用的机器学习(ML)方法的可认证性。这有助于确保基于 ML 的自动驾驶系统的安全性,赢得监管机构、认证机构和利益相关者的信任。
{"title":"Certifiability Analysis of Machine Learning Systems for Low-Risk Automotive Applications","authors":"Vinod Vasudevan, Amr Abdullatif, Sohag Kabir, Felician Campean","doi":"10.1109/mc.2024.3401402","DOIUrl":"https://doi.org/10.1109/mc.2024.3401402","url":null,"abstract":"We analyze the existing safety standard, ISO 26262, for automotive applications, determining the certifiability of machine learning (ML) approaches used in low-risk automotive applications. This can help assuring the security and safety of ML-based autonomous driving systems, gaining the trust of regulators, certification agencies, and stakeholders.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"89 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Students often challenge their instructors via e-mail. This, in turn, requires instructors to respond with tact. Can generative artificial intelligence be harnessed to compose tactful replies to the toughest student criticism?
{"title":"Generative Artificial Intelligence and Problematic Student E-Mails","authors":"Sorel Reisman","doi":"10.1109/mc.2024.3422548","DOIUrl":"https://doi.org/10.1109/mc.2024.3422548","url":null,"abstract":"Students often challenge their instructors via e-mail. This, in turn, requires instructors to respond with tact. Can generative artificial intelligence be harnessed to compose tactful replies to the toughest student criticism?","PeriodicalId":10623,"journal":{"name":"Computer","volume":"37 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Career Center","authors":"","doi":"10.1109/mc.2024.3437110","DOIUrl":"https://doi.org/10.1109/mc.2024.3437110","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing Through Time: Playing Chess","authors":"Ergun Akleman","doi":"10.1109/mc.2024.3423888","DOIUrl":"https://doi.org/10.1109/mc.2024.3423888","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"53 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article emphasizes the urgent need for certifying RAG GenAI chatbots in mission-critical systems, focused on data integrity and model reliability, with a comprehensive framework of technical, ethical, and operational assessments, which demonstrate its necessity through real-world implementations, advocating for continuous innovation and adaptable regulations.
{"title":"Certifying Generative AI: Retrieval-Augmented Generation Chatbots in High-Stakes Environments","authors":"Richard Shan","doi":"10.1109/mc.2024.3401085","DOIUrl":"https://doi.org/10.1109/mc.2024.3401085","url":null,"abstract":"This article emphasizes the urgent need for certifying RAG GenAI chatbots in mission-critical systems, focused on data integrity and model reliability, with a comprehensive framework of technical, ethical, and operational assessments, which demonstrate its necessity through real-world implementations, advocating for continuous innovation and adaptable regulations.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"25 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Generative artificial intelligence (GAI) is reshaping higher education institutions (HEIs). HEIs are responding with policies, leveraging GAI to optimize operations, update curricula, and develop multidisciplinary programs, showcasing a proactive approach to transformative educational practices.
新一代人工智能(GAI)正在重塑高等教育机构(HEIs)。高等院校正在制定相应的政策,利用 GAI 优化运营、更新课程和开发多学科项目,展示出一种积极主动的变革性教育实践方法。
{"title":"Adapting to Generative Artificial Intelligence: Approaches in Higher Education Institutions","authors":"Nir Kshetri, Jeffrey Voas","doi":"10.1109/mc.2024.3422589","DOIUrl":"https://doi.org/10.1109/mc.2024.3422589","url":null,"abstract":"Generative artificial intelligence (GAI) is reshaping higher education institutions (HEIs). HEIs are responding with policies, leveraging GAI to optimize operations, update curricula, and develop multidisciplinary programs, showcasing a proactive approach to transformative educational practices.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"12 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enabled by global connectivity and digitization, cyberwarfare targets critical infrastructures, collects information through espionage, and exploits social media. The cyberincidents of the Israel–Hamas conflict in Gaza demonstrate the changing landscape of cyberoperations.
{"title":"Cyberconflict: The New Frontier of Global Warfare and Social Influence","authors":"Theodoros Komninos, Dimitrios Serpanos","doi":"10.1109/mc.2024.3422729","DOIUrl":"https://doi.org/10.1109/mc.2024.3422729","url":null,"abstract":"Enabled by global connectivity and digitization, cyberwarfare targets critical infrastructures, collects information through espionage, and exploits social media. The cyberincidents of the Israel–Hamas conflict in Gaza demonstrate the changing landscape of cyberoperations.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"27 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142193971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}