派博傳思國際中心

標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 19th International C Floor Koornneef,Meine Meulen Conference proceedings 2000 Springer-Verlag B [打印本頁]

作者: 習(xí)慣    時間: 2025-3-21 16:13
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名





作者: tenosynovitis    時間: 2025-3-21 22:14

作者: Itinerant    時間: 2025-3-22 03:12

作者: TERRA    時間: 2025-3-22 08:02

作者: 染色體    時間: 2025-3-22 12:18
Validation of Control System Specifications with Abstract Plant Modelsperation of power plants. Testing of such procedures is difficult, especially because of the problem of errors in specifications. By verifying high level specifications of automatic procedures andform alised specifications of manual procedures against an abstract plant model and a set of correctness
作者: 原告    時間: 2025-3-22 16:24

作者: 原告    時間: 2025-3-22 19:45

作者: 按時間順序    時間: 2025-3-22 22:59
The Safety Management of Data-Driven Safety-Related Systemses of such systems are railway interlockings and air traffic control systems. While there is now considerable experience and guidance on how to develop safety-related software, and there are a number of standards in this area, the topic of safety-related configuration data is hardly mentioned in the
作者: modish    時間: 2025-3-23 01:40

作者: 疲憊的老馬    時間: 2025-3-23 06:30
A Dependability-Explicit Model for the Development of Computing Systemsreation process which builds on the classical development steps (requirements, design, realization, integration); 2) dependability processes (i.e., fault prevention, fault tolerance, fault removal and fault forecasting); and 3) other supporting processes such as quality assurance and certification.
作者: Hla461    時間: 2025-3-23 10:21
Deriving Quantified Safety Requirements in Complex Systemscope with system complexity, or to derive and prioritise component safety requirements. There is also confusion in practice about whether the techniques are being used to assess risk or to assign targets. This paper proposes a way of integrating hazard analysis techniques to solve these problems. Th
作者: SUGAR    時間: 2025-3-23 14:58
Improving Software Development by Using Safe Object Oriented Development : OTCDplementation of the Ravenscar profile (ObjectAda Raven.), Aonix has had a long history of experience in Ada language based Safety Critical applications, especially in transportation (avionics or rail). Aonix has developed a solution which takes advantage of a fully object oriented approach related t
作者: debase    時間: 2025-3-23 21:26

作者: Complement    時間: 2025-3-24 01:02

作者: 表示問    時間: 2025-3-24 04:33

作者: Condescending    時間: 2025-3-24 10:32

作者: EVEN    時間: 2025-3-24 12:54

作者: 無情    時間: 2025-3-24 17:27

作者: SEEK    時間: 2025-3-24 20:48
Software Support for Incident Reporting Systems in Safety-Critical Applicationsecall. This, in turn, has profound implications for safety-critical applications. Users may fail to identify similar incidents within national or international collections. This paper, therefore, shows how several alternative software architectures support incident report systems in safety-critical
作者: 敬禮    時間: 2025-3-24 23:24

作者: Neuropeptides    時間: 2025-3-25 05:49

作者: GLUE    時間: 2025-3-25 11:25

作者: 帶來    時間: 2025-3-25 14:41

作者: defray    時間: 2025-3-25 19:03
Konstantinos Leventakos,Aaron S. Mansfieldrmal Methods and related topics at introductory (MSc conversion) level over many years. Examples of simple specifications are given, their contribution to students’ education discussed, and a number of teaching recommendations are proposed.
作者: Madrigal    時間: 2025-3-25 23:34
A Formal Methods Case Study: Using Light-Weight VDM for the Development of a Security System Moduleelopment Method, supported by the IFAD Toolbox. With respect to the original version, formal methods — even in its light-weight form — has increased software quality while the development efforts were comparable. The team that has used conventional methods for the development of the original version discusses the relevance of the findings.
作者: fulcrum    時間: 2025-3-26 02:39

作者: 專橫    時間: 2025-3-26 04:23

作者: 染色體    時間: 2025-3-26 11:24
Floor Koornneef,Meine MeulenIncludes supplementary material:
作者: 討好美人    時間: 2025-3-26 15:43
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233716.jpg
作者: Interlocking    時間: 2025-3-26 19:01
Computer Safety, Reliability, and Security978-3-540-40891-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 蛤肉    時間: 2025-3-26 20:56

作者: 懶鬼才會衰弱    時間: 2025-3-27 02:21
Erica L. Andres,Matthew S. Blockelopment Method, supported by the IFAD Toolbox. With respect to the original version, formal methods — even in its light-weight form — has increased software quality while the development efforts were comparable. The team that has used conventional methods for the development of the original version discusses the relevance of the findings.
作者: Infelicity    時間: 2025-3-27 08:18

作者: 旅行路線    時間: 2025-3-27 12:21

作者: BABY    時間: 2025-3-27 15:34

作者: opportune    時間: 2025-3-27 21:36

作者: 跳脫衣舞的人    時間: 2025-3-27 22:33
https://doi.org/10.1057/9781137499974This paper presents some techniques for reducing the time to perform the required simulation experiments. Static and dynamic methods are proposed to analyze the list of faults to be injected, removing faults as soon as their behavior is known. Common features available in most VHDL simulation enviro
作者: 刻苦讀書    時間: 2025-3-28 05:43

作者: BET    時間: 2025-3-28 07:08

作者: concubine    時間: 2025-3-28 12:14
https://doi.org/10.1057/9780230285880a main technique for implementation. More specifically, constant perturbation is introduced as a specific example of data-flow perturbation. Some quantitative metrics are proposed for the description of software diversity, and the parameters needed to calculate the metrics estimated by fault injecti
作者: ingestion    時間: 2025-3-28 14:51
https://doi.org/10.1057/9780230285880rge amount of problems he or she has experienced tends to rigidify his or her strategies due to empirical learning and application of [symptom-fault] co-occurrence rules. We defend the hypothesis that experts’ errors depend on the knowledge of these co-occurrences. Our experiment supported this poin
作者: Peak-Bone-Mass    時間: 2025-3-28 22:40

作者: Palpate    時間: 2025-3-29 00:00
https://doi.org/10.1007/1-4020-3789-9d success of the FAA’s Aviation Safety Reporting System (ASRS) and the FDA’s MedWatch has led to the establishment of similar national and international schemes. These enable individuals and groups to report their safety concerns in a confidential or anonymous manner. Unfortunately, many of these sy
作者: squander    時間: 2025-3-29 04:38

作者: Entreaty    時間: 2025-3-29 07:27
https://doi.org/10.1007/1-4020-3789-9cope with system complexity, or to derive and prioritise component safety requirements. There is also confusion in practice about whether the techniques are being used to assess risk or to assign targets. This paper proposes a way of integrating hazard analysis techniques to solve these problems. Th
作者: GEM    時間: 2025-3-29 12:34
https://doi.org/10.1007/1-4020-3789-9plementation of the Ravenscar profile (ObjectAda Raven.), Aonix has had a long history of experience in Ada language based Safety Critical applications, especially in transportation (avionics or rail). Aonix has developed a solution which takes advantage of a fully object oriented approach related t
作者: 構(gòu)想    時間: 2025-3-29 18:50
https://doi.org/10.1007/1-4020-3789-9evel 4, is presented. Its main characteristics are input conditioning by low resolution analogue-to-digital converters and inference by look-up in cause/effect tables or rule set tables. This programmable electronic system consists of a few elements, only. Thus, it is reliable, safe, verifiable, che
作者: 雄辯    時間: 2025-3-29 21:36

作者: 消音器    時間: 2025-3-30 03:38
The Basic Problems of Phenomenologyoaches are used to analyze and evaluate the dependability of such systems, based respectively on analytical modeling and experimental validation. Both approaches as well as examples of their mutual interactions are briefly illustrated on a subsystem of a specific computer control system. The analyti
作者: 前面    時間: 2025-3-30 08:02
https://doi.org/10.1007/978-3-031-59475-5lysis techniques has been developed. One of them is Fault Tree Analysis. Fault tree (FT) represents causal and generalization relations between events (e.g. between hazard and its causes). However, original FT cannot express either time relations between events or times of: detection of a danger sit
作者: oracle    時間: 2025-3-30 09:02

作者: 沒收    時間: 2025-3-30 14:04
Konstantinos Leventakos,Aaron S. Mansfieldbe widely used in practice, but their acceptance by industry is well below what it should be. The most commonly mentioned way of improving on this situation is to reform education. This must address two issues. The first is to establish an . concept of Formal Methods, one which is both sound and pra
作者: Demonstrate    時間: 2025-3-30 17:05

作者: orthopedist    時間: 2025-3-30 20:56

作者: Acupressure    時間: 2025-3-31 03:30

作者: occurrence    時間: 2025-3-31 06:38
Empirical Assessment of Software On-Line Diagnostics Using Fault Injectionlt to the input space. The results were promising in that they demonstrated no significant deterioration in the effectiveness of the diagnostics as the fault coupling to the input space decreased. On this basis the use of diagnostics can be seen as supplementary to validation testing.
作者: Harass    時間: 2025-3-31 10:50
Expert Error: The Case of Trouble-Shooting in Electronicsiew, human is an active component of systems and the final dependability partly relies on human reliability. More specifically, human operators are strongly involved in maintenance and trouble-shooting activities. One then has to know about the cognitive processes involved in expert error and integrate this knowledge in the design of systems.
作者: 慢慢沖刷    時間: 2025-3-31 14:46

作者: Prophylaxis    時間: 2025-3-31 20:54
Validation of Control System Specifications with Abstract Plant Models requirements, this problem can be overcome to some extent. This paper describes the basic idea of such verification. It suggests using the verification approach as a complementary aid to traditional verification and validation which may involve different aspects including human factors.
作者: FID    時間: 2025-4-1 01:05

作者: LURE    時間: 2025-4-1 03:16
Dependability of Computer Control Systems in Power Plantscal approach allows evaluation of dependability measures such as availability and identifies the most influential dependability parameters. Fault injection provides the numerical values of the above mentioned parameters and allows identification of specific behaviors that may not have been considered by the analytical model.
作者: 豐滿有漂亮    時間: 2025-4-1 07:54

作者: Incommensurate    時間: 2025-4-1 14:04

作者: 壓碎    時間: 2025-4-1 14:40

作者: FEAT    時間: 2025-4-1 22:08





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
睢宁县| 镇康县| 望城县| 逊克县| 宝丰县| 合山市| 五大连池市| 古蔺县| 宁安市| 宣武区| 丹棱县| 兴安县| 昌黎县| 吉安县| 赫章县| 连南| 宁陵县| 灵台县| 平潭县| 阿克陶县| 宁国市| 定结县| 开远市| 永福县| 安乡县| 玉屏| 郓城县| 惠东县| 红河县| 九龙坡区| 离岛区| 巴楚县| 阿图什市| 裕民县| 屏边| 龙胜| 京山县| 东源县| 沾化县| 磐石市| 准格尔旗|