派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability, and Security; 24th International C Rune Winther,Bj?rn Axel Gran,Gustav Dahll Conference proceedings 2005 Spri [打印本頁]

作者: 黑暗社會    時間: 2025-3-21 18:20
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度學科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名





作者: Harbor    時間: 2025-3-21 23:57

作者: Mingle    時間: 2025-3-22 04:23

作者: effrontery    時間: 2025-3-22 07:18

作者: MAPLE    時間: 2025-3-22 09:40

作者: Bouquet    時間: 2025-3-22 16:50
,The Database for , Genome Studies—BRAD, their effects on actual programs. In these examples, run-time checks turn out to be most effective for unreliable programs. For more reliable programs, the benefit is relatively low as compared to the gain that can be achieved by other (more expensive) measures, most notably multiple-version diversity.
作者: Bouquet    時間: 2025-3-22 19:52
The Paper: Dedication to Hensel,e level mutants are then compared with the corresponding source code mutant behavior. In a back-to-back comparative study with mutants based on ten representative programming defects, no difference in the program behavior between source and byte code level mutants could be distinguished.
作者: 預防注射    時間: 2025-3-22 22:53

作者: 粉筆    時間: 2025-3-23 01:34
The Team: Noether, Brauer and Hasse,recedence relations between tasks on both different processors and the same processor. Simulation results have shown that this algorithm can achieve accurate results and offers good performance for systems with wide range of CPU utilizations and task set size, and therefore is applicable to schedulability analysis of complex distributed systems.
作者: Retrieval    時間: 2025-3-23 06:46
CMMI RAMS Extension Based on CENELEC Railway Standard,s actual number from 22 to 26, without changes in the CMMI model basic structure. The objective of this extension is to obtain a support tool for design process applicable to enterprises that develop railway systems and are adopting CMMI or migrating from other CMM models.
作者: etidronate    時間: 2025-3-23 10:59
Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment,ian Network enables the factors that influence the outcome of events to be represented explicitly. In the case study, this allowed the train derailment model to be generalised and applied in more circumstances. Although the resulting model is no longer just an event tree, the familiar event tree notation remains useful.
作者: 砍伐    時間: 2025-3-23 15:01

作者: 訓誡    時間: 2025-3-23 21:26
Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Softwarerization, fault distribution, relations between software metrics (like McCabe’s cyclomatic complexity or the risk categories of NASA SATC), software faults, and testing efforts, and yields clues about the significance of these measures for fault probabilities. A summary of the findings and related work conclude the paper.
作者: 不妥協(xié)    時間: 2025-3-23 23:18
A Formal Model for Fault-Tolerance in Distributed Systems,ed to encode the distributed algorithm. These rules are able to detect and eliminate the faults locally during the computation. This method can be implemented under an asynchronous message passing system which notifies the faults. To illustrate this approach, we present examples of fault-tolerant distributed spanning tree algorithms.
作者: Fabric    時間: 2025-3-24 03:13

作者: 專橫    時間: 2025-3-24 09:40
A Technique for Fault Tolerance Assessment of COTS Based Systems,e level mutants are then compared with the corresponding source code mutant behavior. In a back-to-back comparative study with mutants based on ten representative programming defects, no difference in the program behavior between source and byte code level mutants could be distinguished.
作者: 畢業(yè)典禮    時間: 2025-3-24 11:27

作者: 征服    時間: 2025-3-24 17:38
End-To-End Worst-Case Response Time Analysis for Hard Real-Time Distributed Systems,recedence relations between tasks on both different processors and the same processor. Simulation results have shown that this algorithm can achieve accurate results and offers good performance for systems with wide range of CPU utilizations and task set size, and therefore is applicable to schedulability analysis of complex distributed systems.
作者: Repatriate    時間: 2025-3-24 20:32
0302-9743 2005, held in Fredrikstad, Norway, in September 2005...The 30 revised full papers were carefully reviewed and selected for inclusion in the book. The papers address all aspects of dependability and survivability of critical computerized systems in various branches and infrastructures..978-3-540-292
作者: 領先    時間: 2025-3-25 01:24

作者: Palpable    時間: 2025-3-25 07:08

作者: 否認    時間: 2025-3-25 09:26
Public-Key Cryptography and Availability,stems that need to be available must exercise the utmost care before applying public-key encryption in any form. We discuss the relation between public-key encryption and timeliness, the tradeoffs that must be made at design time, and how the property of (lack of) availability might very well contaminate other system components.
作者: Cocker    時間: 2025-3-25 13:26

作者: 門閂    時間: 2025-3-25 18:24
0302-9743 papers address all aspects of dependability and survivability of critical computerized systems in various branches and infrastructures..978-3-540-29200-5978-3-540-32000-5Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 地名詞典    時間: 2025-3-25 20:30

作者: adequate-intake    時間: 2025-3-26 01:55
Memetics and Cognitive Mathematics, show how the CEM paradigm can benefit from a standardised syntax and visual representation so that all the different views of a CEM are based on the same underlying data, increasing safety and productivity throughout the lifecycle.
作者: 未開化    時間: 2025-3-26 04:28
Quantification and Calculation in Nature,l clocks are used to represent synchronization of concurrent UML statecharts in probabilistic timed automata. The last one concerns a probabilistic model checking with PRISM tool. This requires specification of dependability properties with a suitable temporal logic.
作者: inclusive    時間: 2025-3-26 09:23
Quantification and Calculation in Nature, this end we present patterns of decomposition based on KAOS tactics of refinement. The application of these patterns, expressed in the Goal Structuring Notation, is illustrated using existing civil aerospace policy (the Rules of the Air Regulations).
作者: 范圍廣    時間: 2025-3-26 13:30
Studies in Fuzziness and Soft Computing tools that are familiar to engineers and we can use the static analysis infrastructure available for these tools. This paper reports our initial experience in using . on an example system taken from the ARP Safety Assessment guidelines document.
作者: HILAR    時間: 2025-3-26 19:44
Modeling of Arithmetic Reasoning,and offers extra cost efficiency over conventional approaches. A walkthrough of the SLANN is presented demonstrating the interrelationship of development and safety processes enabling product-based safety arguments. Results illustrating the benefits and safety of the SCANN in a Gas Turbine Engine Model are provided using the SCANN simulation tool.
作者: 刺穿    時間: 2025-3-26 22:10

作者: 側面左右    時間: 2025-3-27 05:09

作者: 彩色的蠟筆    時間: 2025-3-27 05:56
The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems, show how the CEM paradigm can benefit from a standardised syntax and visual representation so that all the different views of a CEM are based on the same underlying data, increasing safety and productivity throughout the lifecycle.
作者: AORTA    時間: 2025-3-27 10:33

作者: 外星人    時間: 2025-3-27 15:01
Defining and Decomposing Safety Policy for Systems of Systems, this end we present patterns of decomposition based on KAOS tactics of refinement. The application of these patterns, expressed in the Goal Structuring Notation, is illustrated using existing civil aerospace policy (the Rules of the Air Regulations).
作者: 松果    時間: 2025-3-27 21:15

作者: GAVEL    時間: 2025-3-28 01:11
Using Safety Critical Artificial Neural Networks in Gas Turbine Aero-Engine Control,and offers extra cost efficiency over conventional approaches. A walkthrough of the SLANN is presented demonstrating the interrelationship of development and safety processes enabling product-based safety arguments. Results illustrating the benefits and safety of the SCANN in a Gas Turbine Engine Model are provided using the SCANN simulation tool.
作者: 中國紀念碑    時間: 2025-3-28 05:50
,Finding Upper Bounds for Software Failure Probabilities – Experiments and Results,ill later be extended to assess systems consisting of multiple software components. Software components include both general in-house software components, as well as pre-developed software components (e.g. COTS, SOUP, etc).
作者: 散開    時間: 2025-3-28 09:31

作者: 斗爭    時間: 2025-3-28 10:43
Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain,tion will be highly beneficial for whom is performing safety analyses. Limited budgets and resources, often, constrain or inhibit the model definition phase as an integral part of safety analysis. This paper is concerned with problems in modeling ATM systems for safety analysis. The main objective i
作者: 高歌    時間: 2025-3-28 16:35

作者: STALL    時間: 2025-3-28 22:20
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233734.jpg
作者: crutch    時間: 2025-3-29 00:38
Computer Safety, Reliability, and Security978-3-540-32000-5Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: stressors    時間: 2025-3-29 04:43

作者: oracle    時間: 2025-3-29 11:14

作者: filicide    時間: 2025-3-29 14:36
Quantification and Calculation in Nature,he methodology is made of three essential steps. The first one is a UML profile called DAMRTS (Dependability Analysis Models for Real-Time Systems) designed using GME tool. The aim is to model a real-time system with qualitative and quantitative information related to its quality of service. In this
作者: 孵卵器    時間: 2025-3-29 17:44
Quantification and Calculation in Nature,redictable, and potentially undesirable, emergent behaviour. A policy is a set of rules that bounds the behaviours of entities. Policy can be expressed at various levels of abstraction. By building on existing goal-based decomposition approaches this paper proposes policy as a means of achieving saf
作者: Robust    時間: 2025-3-29 23:21

作者: Chemotherapy    時間: 2025-3-30 01:41

作者: 無節(jié)奏    時間: 2025-3-30 06:24
Studies in Fuzziness and Soft Computingfrom the entire system down to individual functional elements, the latter often carried out as unit testing. This paper presents results from a unit test performed on a C++ package from a testbed of a safety critical application at the ARC Seibersdorf research lab. After outlining the test environme
作者: 慢慢沖刷    時間: 2025-3-30 11:00

作者: 殘廢的火焰    時間: 2025-3-30 13:49

作者: 指耕作    時間: 2025-3-30 18:56

作者: Hyperalgesia    時間: 2025-3-30 23:37
Modeling of Arithmetic Reasoning,loits safety constraints to ensure identified failure modes are mitigated for highly-dependable roles. It represents both qualitative and quantitative knowledge using fuzzy rules and is described as a ‘hybrid’ neural network. The ‘Safety Lifecycle for Artificial Neural Networks’ (SLANN) has also pre
作者: 含鐵    時間: 2025-3-31 04:06
,The Database for , Genome Studies—BRAD, their outputs and flagging an output as incorrect if it fails the check. However, evaluating how effective they are going to be in a future application is difficult, since the effectiveness of a check depends on the unknown faults of the program to which it is applied. A programming contest, provid
作者: 來就得意    時間: 2025-3-31 09:00

作者: goodwill    時間: 2025-3-31 10:18
The American Connection: Albert,information regarding the software component in addition to testing. The paper shows how different choices of prior probability distributions for a software component’s failure probability influence the number of tests required to obtain adequate confidence in a software component. In addition, it e
作者: 秘方藥    時間: 2025-3-31 15:17
The Brauer Group and Class Field Theory,increasingly being used in the nuclear industry; they have potential benefits such as greater accuracy and better noise filtering, and in many cases their analogue counterparts are no longer manufactured. However, smart sensors (as it is the case for most COTS) are sold as black boxes despite the fa
作者: avarice    時間: 2025-3-31 20:56

作者: slow-wave-sleep    時間: 2025-3-31 23:39





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
定西市| 新和县| 潍坊市| 延长县| 阿拉善右旗| 报价| 尖扎县| 镇江市| 东辽县| 屯门区| 玉树县| 南汇区| 江北区| 灵山县| 察隅县| 东莞市| 腾冲县| 城口县| 武义县| 佳木斯市| 康乐县| 福清市| 富宁县| 静安区| 临澧县| 饶阳县| 井研县| 海兴县| 天门市| 平定县| 夏津县| 黄陵县| 宝坻区| 土默特右旗| 时尚| 辛集市| 泸定县| 五指山市| 沈丘县| 确山县| 循化|