標題: Titlebook: Architecting Critical Systems; First International Holger Giese Conference proceedings 2010 Springer-Verlag Berlin Heidelberg 2010 ARC.Ove [打印本頁] 作者: 多話 時間: 2025-3-21 18:24
書目名稱Architecting Critical Systems影響因子(影響力)
書目名稱Architecting Critical Systems影響因子(影響力)學科排名
書目名稱Architecting Critical Systems網(wǎng)絡公開度
書目名稱Architecting Critical Systems網(wǎng)絡公開度學科排名
書目名稱Architecting Critical Systems被引頻次
書目名稱Architecting Critical Systems被引頻次學科排名
書目名稱Architecting Critical Systems年度引用
書目名稱Architecting Critical Systems年度引用學科排名
書目名稱Architecting Critical Systems讀者反饋
書目名稱Architecting Critical Systems讀者反饋學科排名
作者: 遺傳學 時間: 2025-3-21 21:51 作者: magenta 時間: 2025-3-22 03:48
John Starling III,Darius J. Karimipourtions while meeting performance requirements. We report experimental results that validate our approach by comparing a model-based evaluation of a software architecture for management of cultural assets with values observed on the real implementation of the system.作者: WAX 時間: 2025-3-22 07:36 作者: Osteoarthritis 時間: 2025-3-22 08:47 作者: 皺痕 時間: 2025-3-22 15:28
Rose M. Ylimaki,Lynnette A. Brundermanurther, we use the GSN modular extension to organise the safety case into core and variable argument modules which are loosely coupled by means of argument contracts. We demonstrate this approach in a case study based on a product line of aero-engine control systems.作者: 羅盤 時間: 2025-3-22 17:52 作者: 直覺好 時間: 2025-3-22 21:42 作者: GLOOM 時間: 2025-3-23 01:33
An Architectural Framework for Analyzing Tradeoffs between Software Security and Performancetions while meeting performance requirements. We report experimental results that validate our approach by comparing a model-based evaluation of a software architecture for management of cultural assets with values observed on the real implementation of the system.作者: 沒收 時間: 2025-3-23 08:25
Component Behavior Synthesis for Critical Systems,matic composition of protocol behaviors with respect to interdependent concerns. The composition is performed by taking a proper refinement relation into account so that the analysis results of the separated concerns are preserved which is essential for safety critical systems.作者: 無聊的人 時間: 2025-3-23 09:46 作者: 弄污 時間: 2025-3-23 16:21 作者: 制度 時間: 2025-3-23 20:30 作者: ornithology 時間: 2025-3-24 00:40
ISO/DIS 26262 in the Context of Electric and Electronic Architecture Modeling the ISO 26262, the EEA contributes to the intercommunication of distributed, safety related functions plus the determination of architectures..This article discusses the impact of the standard on the EEA development and the handling of safety requirements demanded by ISO 26262 during early development phases.作者: NICE 時間: 2025-3-24 03:14 作者: 逗留 時間: 2025-3-24 08:22
Rose M. Ylimaki,Lynnette A. Brundermanection approaches, the old one (FITS) and a new one (InBochs). FITS was not sufficient in case of the numerical DMC implementation. InBochs is based on the system emulator and delivers the same level of functionality as FITS while having capability to extend fault models.作者: 玩忽職守 時間: 2025-3-24 11:25 作者: neuron 時間: 2025-3-24 16:15 作者: Assignment 時間: 2025-3-24 21:21
Updates in Clinical Dermatologyision how a software engineer can assess that a given dependability technique is adequate for a given software design, i.e., if the technique, when applied, will cause the system to meet a dependability requirement (e.g., an availability degree). So, the idea here presented is how to integrate alrea作者: Coronary 時間: 2025-3-25 02:36
Tina Bhutani,Wilson Liao,Mio Nakamuramost important principles. For one component, separation of concerns is realized by defining the overall component functionality by separated protocol behaviors. One of the main challenges of applying separation of concerns is the later automatic composition of the separated, maybe interdependent co作者: hypertension 時間: 2025-3-25 03:56 作者: 窩轉(zhuǎn)脊椎動物 時間: 2025-3-25 10:56 作者: 愛好 時間: 2025-3-25 14:07
Rose M. Ylimaki,Lynnette A. Brunderman) algorithms. Numerical and explicit implementations of the DMC algorithms are considered. It is shown that faults affecting the algorithms can provoke undesirable behaviour or even destabilize the process. Dependability was evaluated experimentally using two different software implemented fault inj作者: ROOF 時間: 2025-3-25 15:49
David Gurr,Daniela Acquaro,Lawrie Drysdalein advantage by rapidly producing, consuming, and sharing information using service oriented architectures (SOAs). In this paper, we study the cyber survivability of mission-critical net-centric systems, focusing on Ballistic-Missile-Defense (BMD) systems. We propose a net-centric architecture for a作者: Synchronism 時間: 2025-3-25 23:19 作者: 侵略者 時間: 2025-3-26 03:04 作者: 認識 時間: 2025-3-26 08:11
Evidence-Based School Mental Health Servicespment, production, operation and decommissioning. All systems affected by the standard, like anti-trap protection or advanced driver assistance systems, contain hierarchical electric and electronic parts. After publishing the final version, they all should be designed, assessed and documented to the作者: 技術 時間: 2025-3-26 12:33 作者: 刺耳的聲音 時間: 2025-3-26 13:19
https://doi.org/10.1007/978-3-642-13556-9ARC; Overlay; Standards; algorithms; applications; architecture; design; fault tolerance; modeling; operating作者: floaters 時間: 2025-3-26 18:54
978-3-642-13555-2Springer-Verlag Berlin Heidelberg 2010作者: ANT 時間: 2025-3-26 22:17
Holger GieseUp-to-date results.Fast track conference proceedings.State-of-the-art report作者: 起波瀾 時間: 2025-3-27 01:10 作者: Parallel 時間: 2025-3-27 08:54 作者: 分散 時間: 2025-3-27 11:43 作者: 2否定 時間: 2025-3-27 14:16 作者: 娘娘腔 時間: 2025-3-27 19:09
Component Behavior Synthesis for Critical Systems,most important principles. For one component, separation of concerns is realized by defining the overall component functionality by separated protocol behaviors. One of the main challenges of applying separation of concerns is the later automatic composition of the separated, maybe interdependent co作者: Bravado 時間: 2025-3-27 23:07 作者: 止痛藥 時間: 2025-3-28 04:45
Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirementsem development. E-voting has illustrated the importance of formal software engineering in the development of complex systems: poorly engineered and poorly documented voting systems have had serious negative consequences for all system stakeholders. It is clear that the formal verification of e-votin作者: Veneer 時間: 2025-3-28 07:48
Testing Fault Robustness of Model Predictive Control Algorithms) algorithms. Numerical and explicit implementations of the DMC algorithms are considered. It is shown that faults affecting the algorithms can provoke undesirable behaviour or even destabilize the process. Dependability was evaluated experimentally using two different software implemented fault inj作者: 清唱劇 時間: 2025-3-28 10:50 作者: BUCK 時間: 2025-3-28 18:17
A Safety Case Approach to Assuring Configurable Architectures of Safety-Critical Product Linesexploiting common features and assets shared by systems within a specific domain. In this paper, we discuss the challenges of justifying the safety of architectural configurations and variation when developing product-line safety cases. We then address these challenges by defining an approach to dev作者: 確定 時間: 2025-3-28 20:07
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlaysthese systems are increasingly composed of standard Internet technologies and use public networks. Hence, while the SCADA functionality has increased, its vulnerability to cyber threats has also risen. These threats often lead to reduced system availability or compromised data integrity, eventually 作者: 陳列 時間: 2025-3-29 01:33 作者: 領袖氣質(zhì) 時間: 2025-3-29 05:26 作者: emission 時間: 2025-3-29 07:50 作者: Mediocre 時間: 2025-3-29 13:55