Assessment of EMF Model to Text Generation Strategies and Libraries in an Industrial Context

Author(s):  
Christophe Ponsard ◽  
Denis Darquennes ◽  
Valery Ramon ◽  
Jean-Christophe Deprez
CounterText ◽  
2015 ◽  
Vol 1 (3) ◽  
pp. 348-365 ◽  
Author(s):  
Mario Aquilina

What if the post-literary also meant that which operates in a literary space (almost) devoid of language as we know it: for instance, a space in which language simply frames the literary or poetic rather than ‘containing’ it? What if the countertextual also meant the (en)countering of literary text with non-textual elements, such as mathematical concepts, or with texts that we would not normally think of as literary, such as computer code? This article addresses these issues in relation to Nick Montfort's #!, a 2014 print collection of poems that presents readers with the output of computer programs as well as the programs themselves, which are designed to operate on principles of text generation regulated by specific constraints. More specifically, it focuses on two works in the collection, ‘Round’ and ‘All the Names of God’, which are read in relation to the notions of the ‘computational sublime’ and the ‘event’.


1962 ◽  
Vol 9 (3) ◽  
pp. 228-240 ◽  
Author(s):  
Leo F. Schnore

Author(s):  
Naouress Fatfouta ◽  
Julie Stal-Le Cardinal ◽  
Christine Royer

AbstractCar crash simulation analysis is an important phase within the vehicle development. It intends to analyse the crashworthiness of the vehicle model and examine the level of passive security. However, this activity is not trivial because of the considerable collaboration within the project, the large amount of analysed and exchanged data and a high exigency. Consequently, a solution to assist, ease and reduce the time of the process is desired.To study the current practices followed in the car crash simulation analysis an empirical study has been conducted. This study has been applied within the simulation analysis team, in the development phase, within an automotive company. This paper describes a qualitative analysis of the industrial context and diagnoses the dysfunctions in the current practices. This paper also highlights the current challenges encountered in the car crash simulation analysis.


2021 ◽  
Vol 1 ◽  
pp. 1887-1896
Author(s):  
Vahid Salehi

AbstractCurrently, inconsistent software versions lead to massive challenges for many car manufacturers. This is partly because within the product lifecycle management and the software engineering process, there is no correct handling of software versions for the “data entry” (installation of software on the ECU) of the vehicles. Furthermore, there are currently major challenges for many vehicle manufacturers to ensure transparency, integrity and full traceability of SW data status vis-à-vis the legislator. To counteract these challenges, new solutions in the field of vehicle engineering are to be developed based on a new platform called “CarEngChainNet” and Blockchain technology. On the basis of the “CarEngChainNet” platform, new main and sub-chain chains will be developed that allow tamper-proof SW data management (Peer to Peer and crypto technology) across the entire PLM chain with new methods such as model-based systems engineering of the requirement, function and integration of the SW components in different areas of vehicle development. The aim is to develop new transmission chains of vehicles with individually packaged software artefacts (e.g. ECU software) that can be securely transmitted from server to server into the vehicle.


Cybersecurity ◽  
2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Tiago Espinha Gasiba ◽  
Ulrike Lechner ◽  
Maria Pinto-Albuquerque

AbstractSoftware vulnerabilities, when actively exploited by malicious parties, can lead to catastrophic consequences. Proper handling of software vulnerabilities is essential in the industrial context, particularly when the software is deployed in critical infrastructures. Therefore, several industrial standards mandate secure coding guidelines and industrial software developers’ training, as software quality is a significant contributor to secure software. CyberSecurity Challenges (CSC) form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry. These cybersecurity awareness events have been used with success in industrial environments. However, until now, these coached events took place on-site. In the present work, we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online. The introduced cybersecurity awareness platform, which the authors call Sifu, performs automatic assessment of challenges in compliance to secure coding guidelines, and uses an artificial intelligence method to provide players with solution-guiding hints. Furthermore, due to its characteristics, the Sifu platform allows for remote (online) learning, in times of social distancing. The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events. We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.


Sign in / Sign up

Export Citation Format

Share Document