標(biāo)題: Titlebook: Applicable Formal Methods for Safe Industrial Products; Essays Dedicated to Anne E. Haxthausen,Wen-ling Huang,Markus Roggenbac Book 2023 T [打印本頁] 作者: Considerate 時間: 2025-3-21 17:53
書目名稱Applicable Formal Methods for Safe Industrial Products影響因子(影響力)
書目名稱Applicable Formal Methods for Safe Industrial Products影響因子(影響力)學(xué)科排名
書目名稱Applicable Formal Methods for Safe Industrial Products網(wǎng)絡(luò)公開度
書目名稱Applicable Formal Methods for Safe Industrial Products網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applicable Formal Methods for Safe Industrial Products被引頻次
書目名稱Applicable Formal Methods for Safe Industrial Products被引頻次學(xué)科排名
書目名稱Applicable Formal Methods for Safe Industrial Products年度引用
書目名稱Applicable Formal Methods for Safe Industrial Products年度引用學(xué)科排名
書目名稱Applicable Formal Methods for Safe Industrial Products讀者反饋
書目名稱Applicable Formal Methods for Safe Industrial Products讀者反饋學(xué)科排名
作者: 鬼魂 時間: 2025-3-21 22:26 作者: Root494 時間: 2025-3-22 01:04
,Household Goodness: ‘Cousin Phillis’, ,sfer concerns formal software verification technology for interlocking computers. It spans over Technology Readiness Levels TRL 1–7 and was reported on in two REF Impact Case Studies, in 2014 and 2021?[., .].作者: Expediency 時間: 2025-3-22 05:04
Conformance Relations Between Input/Output Languageslence, reduction, and variations thereof. This approach is based on languages over input/output alphabets. It allows for easier comparison between conformance relations, and gives rise to a fundamental necessary and sufficient criterion for conformance testing.作者: 動物 時間: 2025-3-22 11:11 作者: 懶惰人民 時間: 2025-3-22 14:15
Anne E. Haxthausen,Wen-ling Huang,Markus RoggenbacHonorary volume dedicated to Jan Peleska on the occasion of his 65th birthday.Contributions by leading researchers in the domain.Features a range of academic research and industrial implementation suc作者: AVERT 時間: 2025-3-22 17:45
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/a/image/159055.jpg作者: 蛙鳴聲 時間: 2025-3-23 00:08 作者: 樹上結(jié)蜜糖 時間: 2025-3-23 01:23
https://doi.org/10.1007/978-3-030-26415-4ystems, called RoboStar. In this paper, we describe our current effort to ally RoboStar and RT-Tester, an award-winning tool that embodies many of Jan Peleska’s beautiful results on formal testing. With our work, RoboStar users can benefit from the testing infrastructure of RT-Tester to run simulati作者: institute 時間: 2025-3-23 07:29 作者: myalgia 時間: 2025-3-23 10:22 作者: mechanical 時間: 2025-3-23 16:20
https://doi.org/10.1007/978-1-349-20529-5ndomly sampling as well as re-using tests in general is problematic and that instead, new tests need to be generated for each new version of the systems. We discuss empirical results on the power of heuristic search and show that different algorithms lead to largely different results—with some gener作者: 一個攪動不安 時間: 2025-3-23 21:32 作者: 吝嗇性 時間: 2025-3-23 23:41 作者: tolerance 時間: 2025-3-24 05:51
The 1860s: Achievements and Endings,rting point of our risk identification method are architectural patterns contained in a system architecture, e.g., process control loops or interactive systems. A RIQ enumerates the typical risks associated with such a pattern. By assessing for each issue contained in a RIQ whether it is relevant or作者: indignant 時間: 2025-3-24 09:14
,Household Goodness: ‘Cousin Phillis’, ,sfer concerns formal software verification technology for interlocking computers. It spans over Technology Readiness Levels TRL 1–7 and was reported on in two REF Impact Case Studies, in 2014 and 2021?[., .].作者: EVICT 時間: 2025-3-24 13:02 作者: 一致性 時間: 2025-3-24 17:25
,Women and History: ‘My Lady Ludlow’,In previous work, we realised that spatial reasoning is a key to prove collision freedom. Our method was based on a dedicated Multi-lane Spatial Logic (MLSL) for traffic on motorways?[.]..In this paper, we extend this approach by taking into account the plans of cars in the near future up?to a certa作者: Mediocre 時間: 2025-3-24 22:19
Elizabeth Gaskell’s Smaller Stories environmental perception: How can we achieve confidence in the perception chain, especially when dealing with percepts safe-guarding critical manoeuvres? We present a methodology which allows to mathematically prove that the risk of misevaluating a safety-critical guard conditions referring to envi作者: Cleave 時間: 2025-3-25 02:35 作者: Gratulate 時間: 2025-3-25 03:23 作者: 六邊形 時間: 2025-3-25 07:37 作者: 危機(jī) 時間: 2025-3-25 15:43
978-3-031-40131-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: 品牌 時間: 2025-3-25 15:54
https://doi.org/10.1057/9780230107861This paper is dedicated with affection to Jan Peleska on the occasion of his 65th birthday. We discuss a unifying theory of uncertainty in robotics based on Hoare & He’s unifying theories of programming and Hehner’s probabilistic predicative programming. We start a long-term research agenda with a semantics for Prism and end with many questions.作者: Gratuitous 時間: 2025-3-25 21:02 作者: 贊美者 時間: 2025-3-26 02:59 作者: HAVOC 時間: 2025-3-26 07:05 作者: COW 時間: 2025-3-26 09:31
Bringing RoboStar and?RT-Tester Togetherons and tests generated using the RoboStar automated techniques. The testing primitives of RT-Tester simplify the implementation of test cases, and the RT-Tester execution engine provides state-of-the-art high-performance real-time facilities to carry out and report the traceable results of test experiments.作者: 古老 時間: 2025-3-26 14:31
Safer Than Perception: Assuring Confidence in?Safety-Critical Decisions of?Automated Vehiclesronmental artefacts can be bounded to a considerably lower frequency than the risk of individual misclassifications, and can thereby be adjusted to a value less than a given level of societally accepted risk.作者: 口味 時間: 2025-3-26 17:27
https://doi.org/10.1007/978-3-030-26415-4buted test architecture thus affects the ability of testing to distinguish between a specification and an SUT and so leads to the need for a different notion of correctness (implementation relation). This paper explores alternative implementation relations for distributed testing and how they relate.作者: extemporaneous 時間: 2025-3-27 00:01
https://doi.org/10.1007/978-1-349-22617-7 attacks practised today that could be used in the future to attack railway systems to make them less available or less secure. It also presents a combination of techniques and technologies that, assisted by formal methods, can reduce the chances of success of such attacks.作者: optional 時間: 2025-3-27 04:19 作者: gimmick 時間: 2025-3-27 07:39 作者: FLEET 時間: 2025-3-27 11:52
https://doi.org/10.1057/9780230107861e potential and challenges of such an approach using a small “desktop” version of a commercial semi-autonomous agricultural robot. Inspired by the work of Jan Peleska on test automation, we identify directions for future research and innovation in this setting.作者: 憎惡 時間: 2025-3-27 16:17 作者: 東西 時間: 2025-3-27 17:52 作者: 補(bǔ)角 時間: 2025-3-27 22:57
Time for Traffic ManoeuvresAutomata of UPPAAL. The idea is that a car can perform a traffic manoeuvre like a lane change only if it successfully communicates with all surrounding cars that check their internal extended SC automata for compliance with their safety and time constraints in the near future.作者: Nonthreatening 時間: 2025-3-28 03:01 作者: deface 時間: 2025-3-28 08:21 作者: 萬靈丹 時間: 2025-3-28 11:46
https://doi.org/10.1007/978-3-030-26415-4ons and tests generated using the RoboStar automated techniques. The testing primitives of RT-Tester simplify the implementation of test cases, and the RT-Tester execution engine provides state-of-the-art high-performance real-time facilities to carry out and report the traceable results of test experiments.作者: choleretic 時間: 2025-3-28 15:05 作者: 健壯 時間: 2025-3-28 20:58 作者: 柔聲地說 時間: 2025-3-29 00:06
0302-9743 range of academic research and industrial implementation suc.This Festschrift, dedicated to Jan Peleska on the occasion of his 65th birthday, contains papers written by many of his closest collaborators in academic and industry research.?..After studying mathematics at the University of Hamburg, Jan作者: 斜谷 時間: 2025-3-29 06:03 作者: 失敗主義者 時間: 2025-3-29 09:12 作者: decode 時間: 2025-3-29 14:04 作者: Arroyo 時間: 2025-3-29 17:48 作者: Meander 時間: 2025-3-29 23:02
On Testing Ethical Autonomous Decision-Making identify three main components in our proposed framework for test-case generation, conformance analysis, and learning and adaptation of ethical models based on examples from stakeholders. We define a number of templates formalising the main ethical theories in the literature that can be further ins作者: 刻苦讀書 時間: 2025-3-30 03:17 作者: 充足 時間: 2025-3-30 04:39 作者: 財政 時間: 2025-3-30 09:15 作者: 擴(kuò)音器 時間: 2025-3-30 16:23
On Scenario-Based Testing of?Cyber-Physical Systemsndomly sampling as well as re-using tests in general is problematic and that instead, new tests need to be generated for each new version of the systems. We discuss empirical results on the power of heuristic search and show that different algorithms lead to largely different results—with some gener作者: 使熄滅 時間: 2025-3-30 18:07
Safety vs. Security – Why Separation of Concerns is a Good Strategy for Safety-Critical Systemsl security and safety requirements, which are partially conflicting. Safety related software will rarely be changed after approval, whereas security related software needs almost permanently updates. This leads to problems that are hard to solve. Recently CENELEC TS 50701 “Cybersecurity for Railways作者: Finasteride 時間: 2025-3-30 21:39
Decomposing the?Verification of?Interlocking Systemsodelled as an instance of a generic model configured over the network under its control. For models over large networks it is a well-known problem that model checking may fail due to state space explosion. The RobustRailS tools that combine inductive reasoning with SMT solving using Jan Peleska’s po作者: 修改 時間: 2025-3-31 04:53
Pattern-Based Risk Identification for?Model-Based Risk Managementrting point of our risk identification method are architectural patterns contained in a system architecture, e.g., process control loops or interactive systems. A RIQ enumerates the typical risks associated with such a pattern. By assessing for each issue contained in a RIQ whether it is relevant or作者: implore 時間: 2025-3-31 07:52
Software Model Checking of?Interlocking Programssfer concerns formal software verification technology for interlocking computers. It spans over Technology Readiness Levels TRL 1–7 and was reported on in two REF Impact Case Studies, in 2014 and 2021?[., .].作者: 是比賽 時間: 2025-3-31 10:52 作者: 心胸狹窄 時間: 2025-3-31 13:48