Formal Methods: State of the Art and Future Directions EDMUND M

Total Page:16

File Type:pdf, Size:1020Kb

Formal Methods: State of the Art and Future Directions EDMUND M Formal Methods: State of the Art and Future Directions EDMUND M. CLARKE, JEANNETTE M. WING, ET AL.1 Computer Science Department, Carnegie Mellon University, Pittsburgh, PA ^[email protected]& and ^[email protected]& 1. INTRODUCTION The first part of this report assesses the state of the art in specification and Hardware and software systems will in- verification. For verification, we high- evitably grow in scale and functionality. light advances in model checking and Because of this increase in complexity, theorem proving. In the three sections the likelihood of subtle errors is much on specification, model checking, and greater. Moreover, some of these errors theorem proving, we explain what we may cause catastrophic loss of money, mean by the general technique and time, or even human life. A major goal of software engineering is to enable de- briefly describe some successful case velopers to construct systems that oper- studies and well-known tools. The sec- ate reliably despite this complexity. One ond part of this report outlines future way of achieving this goal is by using directions in fundamental concepts, new formal methods, which are mathemati- methods and tools, integration of meth- cally based languages, techniques, and ods, and education and technology tools for specifying and verifying such transfer. We close with summary re- systems. Use of formal methods does marks and pointers to resources for not a priori guarantee correctness. more information. However, they can greatly increase our understanding of a system by revealing inconsistencies, ambiguities, and incom- 2. STATE OF THE ART pleteness that might otherwise go unde- In the past, the use of formal methods tected. in practice seemed hopeless. The nota- tions were too obscure, the techniques did not scale, and the tool support was 1 Working Group members include Rajeev Alur, inadequate or too hard to use. There Edmund Clarke (Co-Chair), Rance Cleaveland, were only a few nontrivial case studies David Dill, Allen Emerson, Stephen Garland, Steven German, John Guttag, Anthony Hall, and together they still were not convinc- Thomas Henzinger, Gerard Holzmann, Cliff ing enough to the practicing software or Jones, Robert Kurshan, Nancy Leveson, Kenneth hardware engineer. Few people had the McMillan, J Moore, Doron Peled, Amir Pnueli, training to use them effectively on the John Rushby, Natarajan Shankar, Joseph Sifakis, Prasad Sistla, Bernhard Steffen, Pierre Wolper, job. Jeannette Wing (Co-Chair), Jim Woodcock, and Only recently have we begun to see a Pamela Zave. more promising picture of formal meth- This research is sponsored in part by the Wright Laboratory, Aeronautical Systems Center, Air Force Materiel Command, USAF, and the Advanced Research Projects Agency (ARPA) under grant number F33615-93-1-1330. Views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing official policies or endorsements, either expressed or implied, of Wright Laboratory or the United States Government. Permission to make digital/hard copy of part or all of this work for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage, the copyright notice, the title of the publication, and its date appear, and notice is given that copying is by permission of the ACM, Inc. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. © 1996 ACM 0360-0300/96/0400–0626 $03.50 ACM Computing Surveys, Vol. 28, No. 4, December 1996 Formal Methods • 627 ods. For software specification, industry [ISO 1987] wed two different methods, is open to trying out notations such as Z one for handling rich state spaces and to document a system’s properties more one for handling complexity due to con- rigorously. For hardware verification, currency. Common to all these methods industry is adopting techniques such as is the use of the mathematical concepts model checking and theorem proving to of abstraction and composition. complement the more traditional one of The process of specification is the act simulation. In both areas, researchers of writing things down precisely. The and practitioners are performing more main benefit in so doing is intangible— and more industrial-sized case studies, gaining a deeper understanding of the and thereby gaining the benefits of us- system being specified. It is through ing formal methods. this specification process that develop- ers uncover design flaws, inconsisten- 2.1 Specification cies, ambiguities, and incompletenesses. A tangible byproduct of this process, Specification is the process of describing however, is an artifact that can itself be a system and its desired properties. For- formally analyzed, for example, checked mal specification uses a language with a to be internally consistent or used to mathematically defined syntax and se- derive other properties of the specified mantics. The kinds of system properties system. The specification is a useful might include functional behavior, tim- communication device between cus- ing behavior, performance characteris- tomer and designer, between designer tics, or internal structure. So far, speci- and implementor, and between imple- fication has been most successful for mentor and tester. It serves as a com- behavioral properties. One current panion document to the system’s source trend is to integrate different specifica- code, but at a higher level of descrip- tion languages, each able to handle a tion. different aspect of a system. Another is to handle nonbehavioral aspects of a Notable Examples system such as its performance, real- CICS. Oxford University and IBM time constraints, security policies, and Hursley Laboratories collaborated in architectural design. the 1980s on using Z to formalize part Some formal methods such as Z of IBM’s Customer Information Con- [Spivey 1988], VDM [Jones 1986], and trol System, an online transaction Larch [Guttag and Horning 1993] focus processing system with thousands of on specifying the behavior of sequential installations worldwide [Houston and systems. States are described in terms King 1991]. Measurements taken by of rich mathematical structures such as IBM throughout the development pro- sets, relations, and functions; state cess indicated an overall improve- transitions are given in terms of pre- ment in the quality of the product, a and post-conditions. Other methods reduction in the number of errors dis- such as CSP [Hoare 1985], CCS [Milner covered, and earlier detection of er- 1980], Statecharts [Harel 1987], Tempo- rors found in the process. IBM also ral Logic [Pnueli 1981; Manna and estimated a 9% reduction in the total Pnueli 1991; Lamport 1984], and I/O development cost of the new release. automata [Lynch and Tuttle 1987] focus The success of this work is well on specifying the behavior of concurrent known and resulted in the Queen’s systems; states typically range over Award for Technological Achieve- simple domains like integers or are left ment. It inspired many others to fol- uninterpreted, and behavior is defined low suit. in terms of sequences, trees, or partial orders of events. Still others such as CDIS. In 1992 Praxis delivered to the RAISE [Nielsen et al. 1989] and LOTOS UK Civil Aviation Authority the CCF ACM Computing Surveys, Vol. 28, No. 4, December 1996 628 • E. M. Clarke et al. Display Information System, a part of ular specifications [Heninger 1980; the new air traffic management sys- Janicki et al. 1996]. Many would ex- tem for London’s airspace [Hall 1996]. pect that the use of SPARK would add CDIS is a distributed fault-tolerant to the cost of the software, while im- system implemented on nearly 100 proving its quality. The added qual- computers linked in a dual local-area ity, however, decreased the overall network. Praxis used formal methods cost of software development because as an integral part of the development of the huge savings in testing. The process and in conjunction with other use of SPARK annotations to specify software engineering, project manage- the behavior of the modules led to ment, and quality assurance tech- software that is close to being “correct niques. During requirements analy- by construction,” and hence passes its sis, formal description supplemented tests instead of requiring expensive informal and structured requirements rework. notations. At the system specification stage, an abstract VDM model was TCAS. In the early 1990s, the Safety- developed in conjunction with con- Critical Systems Research Group at crete user interface definitions, semi- the University of California, Irvine formal definitions of the concurrent (now at the University of Washington) produced a formal requirements spec- behavior, and definitions of external ification for the Traffic Collision interfaces. During design, the ab- Avoidance System (TCAS) II, required stract VDM was refined into more on all commercial aircraft flying in concrete module specifications. At a US airspace. They used the Require- lower level, the software for the dual ments State Machine Language LAN was specified and developed for- (RSML), which is based on State- mally using CCS. charts with changes made to over- Productivity on the project was the come difficulties found during the same as or better than on comparable specification process. Although an in- projects carried out using informal dustry group was attempting to pro- methods. There
Recommended publications
  • Verification and Formal Methods
    Verification and Formal Methods: Practice and Experience J. C. P. Woodcock University of York, UK and P. G. Larsen Engineering College of Aarhus, Denmark and J. C. Bicarregui STFC Rutherford Appleton Laboratory, UK and J. S. Fitzgerald Newcastle University, UK We describe the state of the art in the industrial use of formal verification technology. We report on a new survey of the use of formal methods in industry, and compare it with the most significant surveys carried out over the last 20 years. We review the literature on formal methods, and present a series of industrial projects undetaken over the last two decades. We draw some observations from these surveys and records of experience. Based on this, we discuss the issues surrounding the industrial adoption of formal methods. Finally, we look to the future and describe the development of a Verified Software Repository, part of the worldwide Verified Software Initiative. We introduce the initial projects being used to populate the repository, and describe the challenges they address. Categories and Subject Descriptors: D.2.4 [Software/Program Verification]: Assertion check- ers, Class invariants, Correctness proofs, Formal methods, Model checking, Programming by contract; F.3.1 [Specifying and Verifying and Reasoning about Programs]: Assertions, Invariants, Logics of programs, Mechanical verification, Pre- and post-conditions, Specification techniques; F.4.1 [Mathematical Logic]: Mechanical theorem proving; I.2.2 [Automatic Pro- gramming]: Program verification. Additional Key Words and Phrases: Experimental software engineering, formal methods surveys, Grand Challenges, Verified Software Initiative, Verified Software Repository. 1. INTRODUCTION Formal verification, for both hardware and software, has been a topic of great sig- nificance for at least forty years.
    [Show full text]
  • Formal Methods
    SE 5302: Formal Methods Course Instructor: Parasara Sridhar Duggirala, Ph.D. Catalog Description. 3 credits. This course is designed to provide students with an introduction to formal methods as a framework for the specification, design, and verification of software-intensive embedded systems. Topics include automata theory, model checking, theorem proving, and system specification. Examples are driven by cyber-physical systems. The course is addressed to students in engineering who have had at least a year of software or embedded systems design experience. Pre- Requisites: SE 5100 or SE 5101 or SE 5102 and at least one year of software or embedded systems design experience. Course Delivery Method. The course will be offered online, asynchronously, in small recorded modules according to the course schedule and syllabus. Direct and live communication with the instructor will be available each week, according to the class schedule, for discussion, questions, examples, and quizzes. Attendance at live sessions is required, and you must notify the instructor in advance if you cannot attend. A social networking tool called Slack will be used to communicate with students and the instructor between live sessions. Course Objective. This course is designed to provide students with an introduction to formal methods as a framework for the specification, design, and verification of software- intensive embedded systems. Topics include automata theory, model checking, theorem proving, and system specification. Examples are driven by control systems and software systems. Anticipated Student Outcomes. By the end of the course, a student will be able to (1) Gain familiarity with current system design flows in industry used for embedded system design, implementation and verification.
    [Show full text]
  • August 2018 FACS a C T S
    Issue 2018-1 August 2018 FACS A C T S The Newsletter of the Formal Aspects of Computing Science (FACS) Specialist Group ISSN 0950-1231 FACS FACTS Issue 2018-1 August 2018 About FACS FACTS FACS FACTS (ISSN: 0950-1231) is the newsletter of the BCS Specialist Group on Formal Aspects of Computing Science (FACS). FACS FACTS is distributed in electronic form to all FACS members. Submissions to FACS FACTS are always welcome. Please visit the newsletter area of the BCS FACS website for further details at: http://www.bcs.org/category/12461 Back issues of FACS FACTS are available for download from: http://www.bcs.org/content/conWebDoc/33135 The FACS FACTS Team Newsletter Editors Tim Denvir [email protected] Brian Monahan [email protected] Editorial Team Jonathan Bowen, John Cooke, Tim Denvir, Brian Monahan, Margaret West. Contributors to this issue Jonathan Bowen, John Cooke, Tim Denvir, Sofia Meacham. Brian Monahan, Bill Stoddart, Botond Virginas, Margaret West BCS-FACS websites BCS: http://www.bcs-facs.org LinkedIn: http://www.linkedin.com/groups?gid=2427579 Facebook: http://www.facebook.com/pages/BCS-FACS/120243984688255 Wikipedia: http://en.wikipedia.org/wiki/BCS-FACS If you have any questions about BCS-FACS, please send these to Paul Boca [email protected] 2 FACS FACTS Issue 2018-1 August 2018 Editorial Dear readers, welcome to our first issue of FACS FACTS for 2018. This year, 2018, marks the 40th anniversary of FACS. At least one editor recalls an article by Dan Simpson, member of the editorial team at the time, FACS at 10 in 1988.
    [Show full text]
  • A Conceptual Framework for Investigating Organizational Control and Resistance in Crowd-Based Platforms
    Proceedings of the 50th Hawaii International Conference on System Sciences | 2017 A Conceptual Framework for Investigating Organizational Control and Resistance in Crowd-Based Platforms David A. Askay California Polytechnic State University [email protected] Abstract Crowd-based platforms coordinate action through This paper presents a research agenda for crowd decomposing tasks and encouraging individuals to behavior research by drawing from the participate by providing intrinsic (e.g., fun, organizational control literature. It addresses the enjoyment) and/or extrinsic (e.g., status, money, need for research into the organizational and social social interaction, etc.) motivators [3]. Three recent structures that guide user behavior and contributions Information Systems (IS) reviews of crowdsourcing in crowd-based platforms. Crowd behavior is research [6, 4, 7] emphasize the importance of situated within a conceptual framework of designing effective incentive systems. However, organizational control. This framework helps research on motivation is somewhat disparate, with scholars more fully articulate the full range of various categorizations and often inconsistent control mechanisms operating in crowd-based findings as to which incentives are the most effective platforms, contextualizes these mechanisms into the [4]. Moreover, this approach can be limited by its context of crowd-based platforms, challenges existing often deterministic and rational assumptions of user rational assumptions about incentive systems, and behavior and motivation, which overlooks normative clarifies theoretical constructs of organizational and social aspects of human behavior [8]. To more control to foster stronger integration between fully understand the dynamics of crowd behavior and information systems research and organizational and governance of crowd-based projects, IS researchers management science.
    [Show full text]
  • 4Th International Symposium on Unifying Theories of Programming
    Website Call for Papers http://utp12.lri.fr/ Interest in the fundamental problem of the combination of formal notations and theories of programming has grown consistently in recent Chairs years. The theories define, in various different ways, many common Marie-Claude Gaudel ([email protected]) notions, such as abstraction, refinement, choice, termination, feasibility, Burkhart Wolff ([email protected]) concurrency and communication. Despite these differences, such theories may be unified in a way which greatly facilitates their study and Organisation Chair comparison. Moreover, such a unification offers a means of combining different languages describing various facets and artifacts of software Abderrahmane Feliachi ([email protected]) development in a seamless, logically consistent way. Hoare and He's Unifying Theories of Programming (UTP) is widely acknowledged one Invited Speakers of the most significant such unification approaches to have emerged in the last 15 years. Jim Woodcock, University of York, UK. Based on their pioneering work, the aims of the UTP Symposium Jeremy Gibbons, series are to continue reaffirming the significance of the ongoing UTP University of Oxford, UK. project and to stimulate efforts to advance it by providing a focus for the sharing of results by those already actively contributing, and to raise Important Dates awareness of the benefits of such unifying theoretical frameworks among the wider computer science and software engineering Paper submission: March 31, 2012 communities. Notification: May 14, 2012 Camera-ready: June 4, 2012 To this end the Symposium welcomes contributions on all the themes Symposium: August 27-28, 2012 that can be related to the Unifying Theories of Programming.
    [Show full text]
  • Communications Cacm.Acm.Org of Theacm 06/2009 Vol.52 No.06
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 06/2009 VOL.52 NO.06 One Laptop Per Child: Vision vs. Reality Hard-Disk Drives: The Good, The Bad, and the Ugly How CS Serves The Developing World Network Front-End Processors The Claremont Report On Database Research Autonomous Helicopters Association for Computing Machinery Think Parallel..... It’s not just what we make. It’s what we make possible. Advancing Technology Curriculum Driving Software Evolution Fostering Tomorrow’s Innovators Learn more at: www.intel.com/thinkparallel ACM Ad.indd 1 4/17/2009 11:20:03 AM ABCD springer.com Noteworthy Computer Science Journals Autonomous Biological Personal and Robots Cybernetics Ubiquitous G. Sukhatme, University W. Senn, Universität Bern, Computing of Southern California, Physiologisches Institut; ACM Viterbi School of Engi- J. Rinzel, National neering, Dept. Computer Institutes of Health (NIH), P. Thomas, Univ. Coll. Science Dept. Health Education & London Interaction Centre Autonomous Robots Welfare; J. L. van Hemmen, reports on the theory and TU München, Abt. Physik Personal and Ubiquitous applications of robotic systems capable of Biological Cybernetics is an interdisciplinary Computing publishes peer-reviewed some degree of self-sufficiency. It features medium for experimental, theoretical and international research on handheld, wearable papers that include performance data on actual application-oriented aspects of information and mobile information devices and the robots in the real world. The focus is on the processing in organisms, including sensory, pervasive communications infrastructure that ability to move and be self-sufficient, not on motor, cognitive, and ecological phenomena. supports them to enable the seamless whether the system is an imitation of biology.
    [Show full text]
  • Formal Methods for Biological Systems: Languages, Algorithms, and Applications Qinsi Wang CMU-CS-16-129 September 2016
    Formal Methods for Biological Systems: Languages, Algorithms, and Applications Qinsi Wang CMU-CS-16-129 September 2016 School of Computer Science Computer Science Department Carnegie Mellon University Pittsburgh, PA Thesis Committee Edmund M. Clarke, Chair Stephen Brookes Marta Zofia Kwiatkowska, University of Oxford Frank Pfenning Natasa Miskov-Zivanov, University of Pittsburgh Submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Copyright c 2016 Qinsi Wang This research was sponsored by the National Science Foundation under grant numbers CNS-0926181 and CNS- 1035813, the Army Research Laboratory under grant numbers FA95501210146 and FA955015C0030, the Defense Advanced Research Projects Agency under grant number FA875012C0204, the Office of Naval Research under grant number N000141310090, the Semiconductor Research Corporation under grant number 2008-TJ-1860, and the Mi- croelectronics Advanced Research Corporation (DARPA) under grant number 2009-DT-2049. The views and conclusions contained in this document are those of the author and should not be interpreted as rep- resenting the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity. Keywords: Model checking, Formal specification, Formal Analysis, Boolean networks, Qual- itative networks, Rule-based modeling, Multiscale hybrid rule-based modeling, Hybrid systems, Stochastic hybrid systems, Symbolic model checking, Bounded model checking, Statistical model checking, Bounded reachability, Probabilistic bounded reachability, Parameter estimation, Sensi- tivity analysis, Statistical tests, Pancreatic cancer, Phage-based bacteria killing, Prostate cancer treatment, C. elegans For My Beloved Mom & Dad iv Abstract As biomedical research advances into more complicated systems, there is an in- creasing need to model and analyze these systems to better understand them.
    [Show full text]
  • The Holy Spirit and the Physical Uníverse: the Impact of Scjentific Paradigm Shifts on Contemporary Pneumatology
    Theological Studies 70 (2009) . THE HOLY SPIRIT AND THE PHYSICAL UNÍVERSE: THE IMPACT OF SCJENTIFIC PARADIGM SHIFTS ON CONTEMPORARY PNEUMATOLOGY WOLFGANG VONDEY A methodological shift occurred in the sciences in the 20th century that has irreversible repercussions for a contemporary theology of the Holy Spirit. Newton and Einstein followed fundamentally different trajectories that provide radically dissimilar frame- works for the pneumatological endeavor. Pneumatology after Einstein is located in a different cosmological framework constituted by the notions of order, rationality, relationality, symmetry, and movement. These notions provide the immediate challenges to a contemporary understanding of the Spirit in the physical universe. HPHE PARADIGM SHIFT IN SCIENCE from Ptolemaic to Copernican cosmo- Â logy is clearly reflected in post-Enlightenment theology. The wide- ranging implications of placing the sun instead of the earth at the center of the universe marked the beginnings of both the scientific and religious revolutions of the 16th century. A century later, Isaac Newton provided for the first time a comprehensive system of physical causality that heralded space and time as the absolute constituents of experiential reality from the perspective of both natural philosophy and theology.^ Despite the echoes WOLFGANG VONDEY received his Ph.D. in systematic theology and ethics at Marquette University and is currently associate professor of systematic theology in the School of Divinity, Regent University, Virginia. A prolific writer on Pneu- matology, ecclesiology, and the dialogue of science and theology, he has most recently published: People of Bread: Rediscovering Ecclesiology (2008); "Pentecos- tal Perspectives on The Nature and Mission of the Church" in "The Nature and Mission of the Church": Ecclesial Reality and Ecumenical Horizons for the Twenty- First Century, ed.
    [Show full text]
  • On a New Notion of Partial Refinement
    On a New Notion of Partial Refinement Emil Sekerinski Tian Zhang McMaster University McMaster University Hamilton, Canada Hamilton, Canada [email protected] [email protected] Formal specification techniques allow expressing idealized specifications, which abstract from re- strictions that may arise in implementations. However, partial implementations are universal in soft- ware development due to practical limitations. Our goal is to contribute to a method of program refinement that allows for partial implementations. For programs with a normal and an exceptional exit, we propose a new notion of partial refinement which allows an implementation to terminate ex- ceptionally if the desired results cannot be achieved, provided the initial state is maintained. Partial refinement leads to a systematic method of developing programs with exception handling. 1 Introduction In software development, specifications are meant to be concise by stating abstractly only the intention of a program rather than elaborating on a possible implementation. However, practical restrictions can prevent idealized specifications from being fully implemented. In general, there are three sources of partiality in implementations: there may be inherent limitations of the implementation, some features may intentionally not (yet) be implemented, or there may be a genuine fault. As an example of inherent limitations of an implementation, consider a class for the analysis of a collection of integers. The operations are initialization, inserting an integer, and summing all its elements. Assume that int is a type for machine-representable integers, bounded by MIN and MAX, and machine arithmetic is bounded, i.e. an overflow caused by arithmetic operations on int is detected and raises an exception, as available in x86 assembly language [11] and .NET [20].
    [Show full text]
  • The Relative Use of Formal and Informal Information in The
    THE RELATIVE USE OF FORMAL AND INFORMAL INFORMATION IN THE EVALUATION OF INDIVIDUAL PERFORMANCE by GENE H. JOHNSON, B.B.A., M.S. in Acct. A DISSERTATION IN BUSINESS ADMINISTRATION Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY December, 1986 • //^,;¥ (c) 1986 Gene H. Johnson ACKNOWLEDGMENTS Funding for this research project was provided by the National Association of Accountants, and was especially beneficial in that it allowed the author to complete the project in a timely manner. Subjects for the project were provided by the research entity which must, for the sake of anonymity, remain unnamed. Nonetheless, their partici­ pation is greatly appreciated. Early conceptual development of the project was facilitated by a number of individuals, including the doctoral students and Professors Don Clancy and Frank Collins of Texas Tech University. Also helpful were the experiences of Louis Johnson, John Johnson, Sam Nichols, Darrell Adams, and Del Shumate. The members of the committee provided valuable guidance and support throughout the project; and although not a member of the committee. Professor Roy Howell provided valuable assistance with data analysis. Finally, Professor Donald K. Clancy served not only as committee chairman but also as a role model/mentor for the author. His participation made the project interesting, educational, and enjoyable. 11 CONTENTS ACKNOWLEDGMENTS ii ABSTRACT vi LIST OF TABLES viii LIST OF FIGURES ix I. INTRODUCTION AND BACKGROUND 1 Formal and Informal Information 2 Performance Evaluation 4 Purpose, Objectives, and Significance . 6 Organization 7 II. PREVIOUS STUDIES OF INFORMATION FOR PERFORMANCE EVALUATION 8 Goals and Goal-Directed Behavior 9 Early Studies on Performance Measures .
    [Show full text]
  • E.W. Dijkstra Archive: on the Cruelty of Really Teaching Computing Science
    On the cruelty of really teaching computing science Edsger W. Dijkstra. (EWD1036) http://www.cs.utexas.edu/users/EWD/ewd10xx/EWD1036.PDF The second part of this talk pursues some of the scientific and educational consequences of the assumption that computers represent a radical novelty. In order to give this assumption clear contents, we have to be much more precise as to what we mean in this context by the adjective "radical". We shall do so in the first part of this talk, in which we shall furthermore supply evidence in support of our assumption. The usual way in which we plan today for tomorrow is in yesterday’s vocabulary. We do so, because we try to get away with the concepts we are familiar with and that have acquired their meanings in our past experience. Of course, the words and the concepts don’t quite fit because our future differs from our past, but then we stretch them a little bit. Linguists are quite familiar with the phenomenon that the meanings of words evolve over time, but also know that this is a slow and gradual process. It is the most common way of trying to cope with novelty: by means of metaphors and analogies we try to link the new to the old, the novel to the familiar. Under sufficiently slow and gradual change, it works reasonably well; in the case of a sharp discontinuity, however, the method breaks down: though we may glorify it with the name "common sense", our past experience is no longer relevant, the analogies become too shallow, and the metaphors become more misleading than illuminating.
    [Show full text]
  • NEWS RELEASE Contact: Jim Ormond 212-626-0505
    NEWS RELEASE Contact: Jim Ormond 212-626-0505 [email protected] ACM ANNOUNCES NEW INTERNATIONAL CONFERENCE ON AI IN FINANCE Inaugural Conference to Be Held October 14-16 New York, NY, October 6, 2020 – ACM, the Association for Computing Machinery, will hold the inaugural ACM International Conference on AI in Finance (ICAIF), virtually from October 14-16. Advances in artificial intelligence are having significant impacts on finance, including financial markets, financial services, and the global financial system more broadly. ICAIF is a new scholarly conference to bring together researchers from a variety of disciplines to share technical advances and insights on the effects of AI on the finance world. The ICAIF conference includes participation from academia, government, regulatory agencies, financial institutions, NGOs and other stakeholders in the AI and finance communities. “AI is transforming the finance industry at every level, from the consumer, who might be interacting with an intelligent chatbot during an online banking session, to a bank CEO, who may be investing in new AI technologies to better predict trends, increase revenues, and find more efficient ways to keep financial systems secure,” explained ICAIF Program Chair Tucker Balch, J.P. Morgan AI Research. “We’ve put together a dynamic program of work from top researchers and we invite everyone who has a stake in how AI is shaping finance to join us by registering for the conference.” Visit here to view the entire program. 2020 ACM ICAIF HIGHLIGHTS ICAIF features a distinguished
    [Show full text]