141,260 research outputs found

    Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1

    Get PDF
    This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal Verification and Static Analysis of ML Systems. Part 2: Simulation and Dynamic Testing, Defence in Depth and Diversity, Security-Informed Safety Analysis, Standards and Guidelines

    The Precautionary Principle in a World of Digital Dependencies

    Get PDF
    As organizations become deperimeterized, a new paradigm in software engineering ethics becomes necessary. We can no longer rely on an ethics of consequences, but might instead rely on the precautionary principle, which lets software engineers focus on creating a more extensive moral framework.\u

    Local Government planning: from data to action

    Get PDF
    Decentralisation is built on the assu mption that decentralized governme nts are more knowledgeable about and responsive to the needs of the poor. This article ex amines the role of local governments in Kenya and the ways in which they make their decisions about the allocation of resources to deliver water and sanitation services. Two major challenges are identified: i) lack of data that accurately reveal which areas are most in need; and ii) inadequate instruments for planning, monitoring and evaluation. In tackling previous shortcomings, this study i) adopts a new specific appr oach for data collection at community level, and ii) exploits these data through simple composite indicator s as policy tools that assist local government with decision-making. It concludes that accurate and compre hensive data are the basis of effective targeting and prioritization, which are fundamental to sector planning.Peer ReviewedPostprint (published version

    Requirements analysis in the implementation of integrated PLM, ERP and CAD systems

    Get PDF
    Product Lifecycle Management (PLM) system implementation is a major investment when the technology is used in manufacturing companies. This paper provides an analysis of the requirements for the integration of PLM systems with Enterprise Resource Planning (ERP) systems incorporating the design aspects of Computer Aided Design and Manufacturing (CAD/CAM) within the product development process. PLM implementation deals with various existing product data and information generated over years both from CAD and ERP systems. Data integration is very challenging and has important impact on future decisions while creating new processes. The information management plays very important role not only in PLM implementation but also in the way this will be used in future production. Therefore it is very important to analyse how product information is transferred to PLM system. It also need to be investigated that what, when and how the data will flow from and to PLM systems

    Advanced Cloud Privacy Threat Modeling

    Full text link
    Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system . This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for privacy threat modeling in relation to processing sensitive data in cloud computing environments. It describes the modeling methodology that involved applying Method Engineering to specify characteristics of a cloud privacy threat modeling methodology, different steps in the proposed methodology and corresponding products. We believe that the extended methodology facilitates the application of a privacy-preserving cloud software development approach from requirements engineering to design

    Towards a user-centric and multidisciplinary framework for designing context-aware applications

    Get PDF
    Research into context-aware computing has not sufficiently addressed human and social aspects of design. Existing design frameworks are predominantly software orientated, make little use of cross-disciplinary work, and do not provide an easily transferable structure for cross-application of design principles. To address these problems, this paper proposes a multidisciplinary and user-centred design framework, and two models of context, which derive from conceptualisations within Psychology, Linguistics, and Computer Science. In a study, our framework was found to significantly improve the performance of postgraduate students at identifying the context of the user and application, and the usability issues that arise

    The Political Economy Of Sanitation: How Can We Increase Investment and Improve Service For The Poor?

    Get PDF
    This report presents the results of a Global Economic and Sector Work (ESW) Study on the Political Economy of Sanitation in Brazil, India, Indonesia, and Senegal that was conducted by the Water and Sanitation Program (WSP) and the World Bank. Its purpose is to help WSP and the World Bank -- through a better understanding of the political economy of sanitation -- in their efforts to support partner countries and development practitioners in the design, implementation, and effectiveness of operations that aim to provide pro-poor sanitation investments and services to improve health and hygiene outcomes
    • …
    corecore