Page 312 - Artificial Intelligence for the Internet of Everything
P. 312

290   Index


          Relationship-building communications,  with momentum, 28
                104                         Shannon’s information theory, 11
          Reliability, 109                  Shannon’s theory, 145–146
          Remote method invocation (RMI)    Shared mental models, 105
                mechanism, 273–275          Simon condition, 181
          Resilience solutions for cyber physical  Simplest imaginable signature, 252
                systems, 87–89              Simulated immersive environments, 61
            address cybersecurity for physical systems,  Single IoT device, 271
                89–95                       Sleep model, 125
              education of engineers and policy-  Smart bridge, 142
                makers, 93–95               Smart contract design, 217–218
              historic patterns for, 90–92  Smart contracts, 235
              mission-based cybersecurity, 92–93  Smart entities, 117
            data curation, 96–97            Smartphone zombie, 180
            market incentives, 97–98        Smart substitutions, 129
            operators of physical systems,  Smart things, 119
                cybersecurity role and certification  SOA. See Service-oriented architecture
                of, 95–96                        (SOA)
          Resilient cyber physical system, 87  Social engagement, 104
          Rhetoric relations, 203           Software-design paradigms, 271
          Rhetoric structure theory (RST), 189  Software paradigm, 15–16
          Riemann manifold techniques, 35–36  Stakeholders, changing roles of, 130
          RMI mechanism. See Remote method  Standard belief propagation algorithm,
                invocation (RMI) mechanism       77–78
          The Road to Serfdom (Hayek), 174–175  Standard BP algorithm, 72–73
          Robotic systems, 103              Standard full-gradient method, 25
          Robustness, 56                    Standard HMC approaches, 35–36
          RST. See Rhetoric structure theory (RST)  Standard stochastic optimization problem,
                                                 23–24
          S                                 State variables, 248
          SAGE. See Sentry AGEnts (SAGE)    Statistical-learning methods, 22
          SA methods. See Stochastic approximation  Step-wise secure process, 221
                (SA) methods                Stochastic approximation (SA) methods,
          “Self-bootstrapped” organizations, 233  29–30
          Self-star (self-*) behaviors, 146, 148  Stochastic gradient descent (SGD), 23
          Semiautonomous, 132                 algorithm, 24–25
          Sensor data, 126                  Structural recursion, 252
          Sensors, 119, 244–245             Stuxnet attacks, 89
          Sentinel, 96                      Subordinate agents, 75–76
          Sentry AGEnts (SAGE), 273–275     Support vector machine (SVM) learning,
            architecture, 274f                   202
            server, 277–278f                Surprise minimization, concept of, 69–70
          Service-oriented architecture (SOA),  SVM learning. See Support vector machine
                15–16, 273, 274f                 (SVM) learning
          SGD. See Stochastic gradient descent (SGD)  SVM TK approach, 210–211
          SGD variants, 26–28               Synchrony, 105
            mini-batch SGD, 26–28, 27b      System architectures, 263
   307   308   309   310   311   312   313   314   315