Jaganmohan Chandrasekaran, Erin Lanus, Tyler Cody, Laura J. Freeman, Raghu N. Kacker, M S Raunak, D. Richard Kuhn
The data-intensive nature of machine learning (ML)-enabled systems introduces unique challenges in test and evaluation. We present an overview of combinatorial coverage, exploring its applications across the ML-enabled system lifecycle and its potential to address key limitations in performing test and evaluation for ML-enabled systems.
支持机器学习(ML)的系统具有数据密集的特点,这给测试和评估带来了独特的挑战。我们概述了组合覆盖率,探讨了它在支持 ML 的系统生命周期中的应用,以及它在解决支持 ML 的系统测试和评估的关键局限性方面的潜力。
{"title":"Leveraging Combinatorial Coverage in the Machine Learning Product Lifecycle","authors":"Jaganmohan Chandrasekaran, Erin Lanus, Tyler Cody, Laura J. Freeman, Raghu N. Kacker, M S Raunak, D. Richard Kuhn","doi":"10.1109/mc.2024.3366142","DOIUrl":"https://doi.org/10.1109/mc.2024.3366142","url":null,"abstract":"The data-intensive nature of machine learning (ML)-enabled systems introduces unique challenges in test and evaluation. We present an overview of combinatorial coverage, exploring its applications across the ML-enabled system lifecycle and its potential to address key limitations in performing test and evaluation for ML-enabled systems.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"31 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Computer Society Diversity and Inclusion Fund","authors":"","doi":"10.1109/mc.2024.3408590","DOIUrl":"https://doi.org/10.1109/mc.2024.3408590","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"17 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article presents a prioritization scheme aimed at assisting enterprises in strengthening their cybersecurity posture by efficiently addressing cyberthreat intelligence and common vulnerabilities and exposures aligned with their specific risk landscape.
{"title":"Enterprise-Centric Intelligence: A Prioritization Scheme for Cyberthreat Intelligence and Common Vulnerabilities and Exposures","authors":"Shanhsin Lee, Shiuhpyng Winston Shieh, Mengru Tsai","doi":"10.1109/mc.2024.3393250","DOIUrl":"https://doi.org/10.1109/mc.2024.3393250","url":null,"abstract":"This article presents a prioritization scheme aimed at assisting enterprises in strengthening their cybersecurity posture by efficiently addressing cyberthreat intelligence and common vulnerabilities and exposures aligned with their specific risk landscape.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"25 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cullen Bash, Jessica Bian, Dejan Milojicic, Chandrakant D. Patel, Luka Strezoski, Vladimir Terzija
Fueled by an unprecedented adoption of artificial intelligence, data centers are becoming the largest growing consumers of energy. This results in both an opportunity and necessity to reinvent a tighter relationship between IT and sustainable energy supplies.
在人工智能空前普及的推动下,数据中心正在成为最大的能源消费者。因此,重塑 IT 与可持续能源供应之间的紧密关系既是机遇,也是必要。
{"title":"Energy Supplies for Future Data Centers","authors":"Cullen Bash, Jessica Bian, Dejan Milojicic, Chandrakant D. Patel, Luka Strezoski, Vladimir Terzija","doi":"10.1109/mc.2024.3393248","DOIUrl":"https://doi.org/10.1109/mc.2024.3393248","url":null,"abstract":"Fueled by an unprecedented adoption of artificial intelligence, data centers are becoming the largest growing consumers of energy. This results in both an opportunity and necessity to reinvent a tighter relationship between IT and sustainable energy supplies.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"34 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Yao, Nicholas Gorlewski, Fadi P. Deek, Guiling Wang
Public key infrastructure has been widely used in key management systems (KMSs). This article undertakes a comprehensive examination of the current decentralized KMS (DKMS) approaches with the objective of providing organizational decision makers and technical developers some guidance toward the adoption of DKMS technology in their respective applications.
{"title":"Considerations for Decision Makers and Developers Toward the Adoption of Decentralized Key Management Systems Technology in Emerging Applications","authors":"Wei Yao, Nicholas Gorlewski, Fadi P. Deek, Guiling Wang","doi":"10.1109/mc.2023.3339390","DOIUrl":"https://doi.org/10.1109/mc.2023.3339390","url":null,"abstract":"Public key infrastructure has been widely used in key management systems (KMSs). This article undertakes a comprehensive examination of the current decentralized KMS (DKMS) approaches with the objective of providing organizational decision makers and technical developers some guidance toward the adoption of DKMS technology in their respective applications.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"19 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saurabh Bagchi, Mahsa Ghasemi, Kang G. Shin, Nalini Venkatasubramanian, Dongyan Xu, Saman Zonouz
The panel was held on 14 November 2023 at Purdue University as part of a Grand Challenges in Resilience Workshop sponsored by the U.S. National Science Foundation and organized by our center, the Center for Resilient Infrastructures, Systems, and Processes (CRISP).
{"title":"Role of Resilience in Cyber-Physical Systems: A Roundtable Panel","authors":"Saurabh Bagchi, Mahsa Ghasemi, Kang G. Shin, Nalini Venkatasubramanian, Dongyan Xu, Saman Zonouz","doi":"10.1109/mc.2024.3394108","DOIUrl":"https://doi.org/10.1109/mc.2024.3394108","url":null,"abstract":"The panel was held on 14 November 2023 at Purdue University as part of a Grand Challenges in Resilience Workshop sponsored by the U.S. National Science Foundation and organized by our center, the Center for Resilient Infrastructures, Systems, and Processes (CRISP).","PeriodicalId":10623,"journal":{"name":"Computer","volume":"1 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141532402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}