派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability and Security; 20th International C Udo Voges Conference proceedings 2001 Springer-Verlag Berlin Heidelberg 200 [打印本頁]

作者: estrange    時間: 2025-3-21 17:35
書目名稱Computer Safety, Reliability and Security影響因子(影響力)




書目名稱Computer Safety, Reliability and Security影響因子(影響力)學科排名




書目名稱Computer Safety, Reliability and Security網絡公開度




書目名稱Computer Safety, Reliability and Security網絡公開度學科排名




書目名稱Computer Safety, Reliability and Security被引頻次




書目名稱Computer Safety, Reliability and Security被引頻次學科排名




書目名稱Computer Safety, Reliability and Security年度引用




書目名稱Computer Safety, Reliability and Security年度引用學科排名




書目名稱Computer Safety, Reliability and Security讀者反饋




書目名稱Computer Safety, Reliability and Security讀者反饋學科排名





作者: 嚴重傷害    時間: 2025-3-21 23:08

作者: 萬花筒    時間: 2025-3-22 01:18

作者: 無禮回復    時間: 2025-3-22 07:04
plausible mental models. Using mechanized formal methods, we can then calculate divergences between the actual system behavior and that suggested by the mental model. These divergences indicate possible automation surprises and other human factors problems and suggest places where the design should be improved.
作者: 畸形    時間: 2025-3-22 08:48

作者: Inflated    時間: 2025-3-22 13:41

作者: Inflated    時間: 2025-3-22 17:29

作者: Ambulatory    時間: 2025-3-22 21:42

作者: orthopedist    時間: 2025-3-23 03:52
Information Sources on and Around S-Plus, Unfortunately, the emphasis placed on security issues when developing safety critical systems is to often inadequate, possibly due to the lack of “;safety-compliant” security methods. Having had the opportunity to adapt the HAZOP-principle to the security context, a HAZOP was established which is w
作者: chondromalacia    時間: 2025-3-23 08:20

作者: Sinus-Rhythm    時間: 2025-3-23 11:31

作者: gonioscopy    時間: 2025-3-23 16:28
terature are reviewed and automated analysis techniques are proposed. The techniques based on OCL expressions and graph transformations are detailed and their limitations are discussed. To speed up the checker methods, a reduced form for UML statecharts is introduced. Using this form, the correctnes
作者: Intact    時間: 2025-3-23 18:03
al parts of the design process and considered on an equal basis at the earliest stage possible in the development. A practical example is given to illustrate this viewpoint. The need to expand and complement the customary set of notions and methodologies is motivated.
作者: Instrumental    時間: 2025-3-23 23:40

作者: 楓樹    時間: 2025-3-24 03:01
plausible mental models. Using mechanized formal methods, we can then calculate divergences between the actual system behavior and that suggested by the mental model. These divergences indicate possible automation surprises and other human factors problems and suggest places where the design should
作者: 刪減    時間: 2025-3-24 10:34

作者: 闡明    時間: 2025-3-24 13:33
s that support the train driver in performing his activity and analyses the role of the interactive systems, such as computer based equipments, to understand possible human-machine interaction problems. The application of the methodology has shown that a strong involvement of the users of the intera
作者: goodwill    時間: 2025-3-24 17:17
commercial off-the-shelf (COTS) components in safety-related systems, and a usual feature of COTS products is a lack of such evidence. There is therefore a debate as to the appropriateness of COTS products in such applications. This paper discusses not only evidence, but also risk, the other issue a
作者: 不容置疑    時間: 2025-3-24 22:40
ability analysis of computer systems early in the design process. The proposed framework combines functional and behavioral modeling, fault injection and simulation. Starting from the RDD-100 model built by the system designers, two techniques are discussed for the mutation of this model to analyze
作者: 細微差別    時間: 2025-3-25 00:18

作者: 我們的面粉    時間: 2025-3-25 04:15

作者: ingestion    時間: 2025-3-25 08:39

作者: AV-node    時間: 2025-3-25 15:31

作者: Vertebra    時間: 2025-3-25 17:42

作者: Ligneous    時間: 2025-3-25 23:47
Udo VogesIncludes supplementary material:
作者: 無王時期,    時間: 2025-3-26 01:39

作者: 啟發(fā)    時間: 2025-3-26 05:29
A brief description of the Computer Based Interlocking system that is to be introduced in Norway is given and the requirements for presenting a safety case are described. Problems in actually fulfilling those requirements and lessons to be learnt are explained.
作者: 可耕種    時間: 2025-3-26 12:05

作者: 滴注    時間: 2025-3-26 12:47

作者: invade    時間: 2025-3-26 20:13

作者: FLEET    時間: 2025-3-26 21:59

作者: Cytokines    時間: 2025-3-27 03:47

作者: 內行    時間: 2025-3-27 07:07
Modeling the Human in Human Factorsplausible mental models. Using mechanized formal methods, we can then calculate divergences between the actual system behavior and that suggested by the mental model. These divergences indicate possible automation surprises and other human factors problems and suggest places where the design should be improved.
作者: Estrogen    時間: 2025-3-27 10:03
Formal Support for Fault Modelling and Analysisour approach (formal specification, systematic fault identification, fault injection experiments and follow-up) and gives some results related to the application of this method to the industrial case study, a railway signalling system that is presently under development.
作者: DIKE    時間: 2025-3-27 13:58

作者: athlete’s-foot    時間: 2025-3-27 18:34
Conference proceedings 2001m 13 countries responded to the Call for Papers, and 10 countries were represented in the final program. The proceedings include 20 papers plus 3 invited papers, covering the areas Reliability Assessment and Security, Safety Case and Safety Analysis, Testing, Formal Methods, Control Systems, and thi
作者: 大都市    時間: 2025-3-28 00:46
Information Sources on and Around S-Plus, the more long-term activity by the Halden Reactor Project on the use of BBNs as support for safety assessment of programmable systems. In this report it is discussed how the two approaches can be merged together into one Bayesian Network, and the problems with merging are pinpointed.
作者: 不利    時間: 2025-3-28 02:38

作者: 擁護    時間: 2025-3-28 08:46

作者: 啪心兒跳動    時間: 2025-3-28 13:03

作者: auxiliary    時間: 2025-3-28 18:09
Information Sources on and Around S-Plus,attributes, it is quite possible to handle security issues as part of the traditional hazard analysis. In addition, while presenting the modified HAZOP-method, its use on safety related systems will be demonstrated.
作者: 收到    時間: 2025-3-28 22:37

作者: 小畫像    時間: 2025-3-29 00:04

作者: 真繁榮    時間: 2025-3-29 05:47

作者: 止痛藥    時間: 2025-3-29 10:17
Designing Safety into Medical Decisions and Clinical Processesafety cases for such applications from the work and experience of the software safety community. Some distinctive challenges also arise in medicine, and some novel safety management techniques to address them are being developed.
作者: 類似思想    時間: 2025-3-29 13:01

作者: 河流    時間: 2025-3-29 18:29

作者: 不理會    時間: 2025-3-29 21:29
The Effectiveness of Statistical Testing when Applied to Logic Systemstected a problem, which was missed by all other testing techniques. This together with its potential for reliability quantification illustrates its importance for system validation as part of a risk—based safety—case.
作者: 無效    時間: 2025-3-30 03:29

作者: 舊石器    時間: 2025-3-30 06:54
perating, parallel architecture machine with two superscalar processors..The algorithms are studied for their fault tolerance in the presence of an elementary fault detection method based on command duplication and exploiting the parallel architecture.
作者: 極小量    時間: 2025-3-30 09:05

作者: minaret    時間: 2025-3-30 12:29
A Bayesian Belief Network for Reliability Assessment the more long-term activity by the Halden Reactor Project on the use of BBNs as support for safety assessment of programmable systems. In this report it is discussed how the two approaches can be merged together into one Bayesian Network, and the problems with merging are pinpointed.
作者: incite    時間: 2025-3-30 16:44

作者: 季雨    時間: 2025-3-30 21:18
The COTS Debate in Perspectivet the heart of the COTS debate. It also addresses the other side of the debate: a challenge to the rigorous requirements of the standards. Finally, the paper proposes a convention on the evidence that should be provided to support claims for the safety of COTS items.
作者: agenda    時間: 2025-3-31 02:32
Conference proceedings 2001es of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and security (applied to safety in terms of inte
作者: 音的強弱    時間: 2025-3-31 08:57
0302-9743 P since its inauguration in 1979. This series of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and s
作者: 凹處    時間: 2025-3-31 09:53
nd their limitations are discussed. To speed up the checker methods, a reduced form for UML statecharts is introduced. Using this form, the correctness and completeness of some checker methods can be proven. An example illustrates the application of the tools developed so far.
作者: 變化無常    時間: 2025-3-31 13:35

作者: 詞匯記憶方法    時間: 2025-3-31 18:50
plicable technique is presented, to find out critical and problematic humanmachine interactions during the operation of a system. The technique is based on a state-interaction matrix, carefully filled out and afterwards automatically evaluated.
作者: 出處    時間: 2025-3-31 23:45

作者: 沉著    時間: 2025-4-1 05:10

作者: Offstage    時間: 2025-4-1 10:04

作者: GEAR    時間: 2025-4-1 11:23
Analyzing Human-Machine Interactions in Safety-Critical Systems: A Basic Applicable Approachplicable technique is presented, to find out critical and problematic humanmachine interactions during the operation of a system. The technique is based on a state-interaction matrix, carefully filled out and afterwards automatically evaluated.
作者: Outwit    時間: 2025-4-1 16:10
A Classification Scheme for Software Verification Tools with Regard to RTCA/DO-178Bscheme for software verification tools was needed. This paper provides a tool classification scheme that is based on four basic tool classification categories: “objectives”, “methods”, “metrics”, and “attributes”.
作者: 平常    時間: 2025-4-1 20:39

作者: 侵略    時間: 2025-4-1 22:57
Security Assessments of Safety Critical Systems Using HAZOPs Unfortunately, the emphasis placed on security issues when developing safety critical systems is to often inadequate, possibly due to the lack of “;safety-compliant” security methods. Having had the opportunity to adapt the HAZOP-principle to the security context, a HAZOP was established which is w




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
牟定县| 乐昌市| 历史| 长子县| 汉沽区| 兖州市| 息烽县| 平舆县| 连南| 宜昌市| 钟山县| 金堂县| 堆龙德庆县| 玛多县| 澄城县| 泰安市| 和政县| 沙坪坝区| 桃江县| 田阳县| 舒兰市| 商南县| 加查县| 上思县| 凤台县| 阜阳市| 八宿县| 万年县| 吐鲁番市| 修武县| 白沙| 五原县| 益阳市| 台北市| 当阳市| 公安县| 清远市| 眉山市| 自贡市| 堆龙德庆县| 大埔区|