Skip to main content

Showing 1–13 of 13 results for author: Weber, J H

  1. arXiv:2304.00408  [pdf

    eess.SY cs.SE

    Hazard Analysis for Self-Adaptive Systems Using System-Theoretic Process Analysis

    Authors: Simon Diemert, Jens H. Weber

    Abstract: Self-adaptive systems are able to change their behaviour at run-time in response to changes. Self-adaptation is an important strategy for managing uncertainty that is present during the design of modern systems, such as autonomous vehicles. However, assuring the safety of self-adaptive systems remains a challenge, particularly when the adaptations have an impact on safety-critical functions. The f… ▽ More

    Submitted 1 April, 2023; originally announced April 2023.

    Comments: 12 pages (10 pages + 2 pages of references)

  2. arXiv:2303.15473  [pdf

    cs.HC cs.AI eess.SY

    Can Large Language Models assist in Hazard Analysis?

    Authors: Simon Diemert, Jens H Weber

    Abstract: Large Language Models (LLMs), such as GPT-3, have demonstrated remarkable natural language processing and generation capabilities and have been applied to a variety tasks, such as source code generation. This paper explores the potential of integrating LLMs in the hazard analysis for safety-critical systems, a process which we refer to as co-hazard analysis (CoHA). In CoHA, a human analyst interac… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

  3. A Foundation for Functional Graph Programs: The Graph Transformation Control Algebra (GTA)

    Authors: Jens H. Weber

    Abstract: Applications of graph transformation (GT) systems often require control structures that can be used to direct GT processes. Most existing GT tools follow a stateful computational model, where a single graph is repeatedly modified "in-place" when GT rules are applied. The implementation of control structures in such tools is not trivial. Common challenges include dealing with the non-determinism in… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

    Comments: In Proceedings GCM 2022, arXiv:2212.10975

    Journal ref: EPTCS 374, 2022, pp. 45-58

  4. arXiv:2210.00095  [pdf

    cs.SE cs.AI cs.MA

    Safety-Critical Adaptation in Self-Adaptive Systems

    Authors: Simon Diemert, Jens H. Weber

    Abstract: Modern systems are designed to operate in increasingly variable and uncertain environments. Not only are these environments complex, in the sense that they contain a tremendous number of variables, but they also change over time. Systems must be able to adjust their behaviour at run-time to manage these uncertainties. These self-adaptive systems have been studied extensively. This paper proposes a… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

    Comments: Submitted to The 1st IEEE International Workshop on Assured Autonomy, Artificial Intelligence and Machine Learning (WAAM) 2022

  5. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  6. arXiv:1509.04075  [pdf, ps, other

    cs.IT

    Secure Transmission on the Two-hop Relay Channel with Scaled Compute-and-Forward

    Authors: Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar

    Abstract: In this paper, we consider communication on a two-hop channel, in which a source wants to send information reliably and securely to the destination via a relay. We consider both the untrusted relay case and the external eavesdropper case. In the untrusted relay case, the relay behaves as an eavesdropper and there is a cooperative node which sends a jamming signal to confuse the relay when the it i… ▽ More

    Submitted 14 September, 2015; originally announced September 2015.

    Comments: This paper has been submitted to the IEEE transactions on information theory

  7. Pearson codes

    Authors: Jos H. Weber, Kees A. Schouhamer Immink, Simon R. Blackburn

    Abstract: The Pearson distance has been advocated for improving the error performance of noisy channels with unknown gain and offset. The Pearson distance can only fruitfully be used for sets of $q$-ary codewords, called Pearson codes, that satisfy specific properties. We will analyze constructions and properties of optimal Pearson codes. We will compare the redundancy of optimal Pearson codes with the redu… ▽ More

    Submitted 29 September, 2015; v1 submitted 1 September, 2015; originally announced September 2015.

    Comments: 17 pages. Minor revisions and corrections since previous version. Author biographies added. To appear in IEEE Trans. Inform. Theory

  8. arXiv:1301.6484  [pdf, ps, other

    cs.IT

    Perspectives on Balanced Sequences

    Authors: Jos H. Weber, Kees A. Schouhamer Immink, Paul H. Siegel, Theo G. Swart

    Abstract: We examine and compare several different classes of "balanced" block codes over q-ary alphabets, namely symbol-balanced (SB) codes, charge-balanced (CB) codes, and polarity-balanced (PB) codes. Known results on the maximum size and asymptotic minimal redundancy of SB and CB codes are reviewed. We then determine the maximum size and asymptotic minimal redundancy of PB codes and of codes which are b… ▽ More

    Submitted 28 January, 2013; originally announced January 2013.

    Comments: 12 pages

  9. arXiv:1212.5782  [pdf, other

    cs.IT

    Random Access with Physical-layer Network Coding

    Authors: Jasper Goseling, Michael Gastpar, Jos H. Weber

    Abstract: Leveraging recent progress in physical-layer network coding we propose a new approach to random access: When packets collide, it is possible to recover a linear combination of the packets at the receiver. Over many rounds of transmission, the receiver can thus obtain many linear combinations and eventually recover all original packets. This is by contrast to slotted ALOHA where packet collisions l… ▽ More

    Submitted 23 December, 2012; originally announced December 2012.

  10. On the Energy Benefit of Network Coding for Wireless Multiple Unicast

    Authors: Jasper Goseling, Ruytaroh Matsumoto, Tomohiko Uyematsu, Jos H. Weber

    Abstract: We consider the energy savings that can be obtained by employing network coding instead of plain routing in wireless multiple unicast problems. We establish lower bounds on the benefit of network coding, defined as the maximum of the ratio of the minimum energy required by routing and network coding solutions, where the maximum is over all configurations. It is shown that if coding and routing sol… ▽ More

    Submitted 18 August, 2011; v1 submitted 16 January, 2009; originally announced January 2009.

    Journal ref: EURASIP Journal on Wireless Communications and Networking, Vol. 2010 (2010), Art.ID 605421

  11. arXiv:0811.0325  [pdf, ps, other

    cs.IT

    Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

    Authors: Jasper Goseling, Jos. H. Weber

    Abstract: We show that the maximum possible energy benefit of network coding for multiple unicast on wireless networks is at least 3. This improves the previously known lower bound of 2.4 from [1].

    Submitted 3 November, 2008; originally announced November 2008.

    Journal ref: Proceedings of the Twenty-ninth Symposium on Information Theory in the Benelux (ISBN: 978-90-9023135-8), Leuven, Belgium, pp. 85-91, May 29-30, 2008

  12. arXiv:cs/0607024  [pdf, ps, other

    cs.IT

    Results on Parity-Check Matrices with Optimal Stopping and/or Dead-End Set Enumerators

    Authors: Jos H. Weber, Khaled A. S. Abdel-Ghaffar

    Abstract: The performance of iterative decoding techniques for linear block codes correcting erasures depends very much on the sizes of the stopping sets associated with the underlying Tanner graph, or, equivalently, the parity-check matrix representing the code. In this paper, we introduce the notion of dead-end sets to explicitly demonstrate this dependency. The choice of the parity-check matrix entails… ▽ More

    Submitted 7 July, 2006; originally announced July 2006.

    Comments: 8 pages, submitted to IEEE Transactions on Information Theory

  13. arXiv:cs/0603007  [pdf, ps, other

    cs.IT

    Complete Enumeration of Stopping Sets of Full-Rank Parity-Check Matrices of Hamming Codes

    Authors: Khaled A. S. Abdel-Ghaffar, Jos H. Weber

    Abstract: Stopping sets, and in particular their numbers and sizes, play an important role in determining the performance of iterative decoders of linear codes over binary erasure channels. In the 2004 Shannon Lecture, McEliece presented an expression for the number of stopping sets of size three for a full-rank parity-check matrix of the Hamming code. In this correspondence, we derive an expression for t… ▽ More

    Submitted 2 March, 2006; originally announced March 2006.

    Comments: 7 pages, submitted to the IEEE Transactions on Information Theory