派博傳思國際中心

標題: Titlebook: Computer Safety, Reliability, and Security; 33rd International C Andrea Bondavalli,Felicita Di Giandomenico Conference proceedings 2014 Spr [打印本頁]

作者: Clique    時間: 2025-3-21 19:15
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)




書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度




書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Safety, Reliability, and Security被引頻次




書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名




書目名稱Computer Safety, Reliability, and Security年度引用




書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名




書目名稱Computer Safety, Reliability, and Security讀者反饋




書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名





作者: 碎石頭    時間: 2025-3-21 22:34
The Business of iPhone App Developmentthe argument-fragment architecture and rules for automatic generation, including their application in an illustrative example. The proposed approach enables safety engineers to focus on increasing the confidence in the knowledge about the system, rather than documenting a safety case.
作者: Jejune    時間: 2025-3-22 03:59
Increasing Awareness for Your iPhone App, system, we demonstrate: first, how expert knowledge of the functional safety domain can be captured, second, how the tedious and error prone task of manually implementing safety mechanisms can be automated, and third, how this serves as a basis for formal safety argumentation.
作者: sorbitol    時間: 2025-3-22 08:06
Making Implicit Safety Requirements Explicittion mechanism fulfills these requirements. A model-based testing approach has been used to test the software implementing such protection mechanism. The model used for testing has been model checked against the contract specification ensuring that the system-level safety requirements are met.
作者: hieroglyphic    時間: 2025-3-22 11:16

作者: 老巫婆    時間: 2025-3-22 13:49

作者: 老巫婆    時間: 2025-3-22 18:02

作者: 小爭吵    時間: 2025-3-23 01:10
The Business of iPhone App Developmentification effort in the presence of change. In this paper we describe how a modular assurance case can be established based upon formal analysis of the necessary preconditions of the component. Our approach supports the reuse of arguments and evidence established for components, including the results of the formal analysis.
作者: convert    時間: 2025-3-23 04:25
Increasing Awareness for Your iPhone App,security of distributed systems. In this work, a trust-based approach is discussed to make WSNs tolerant against attacks targeting their routing layer. We show how such attacks are tolerated with low overhead in comparison to unprotected systems. Preliminary experimental results are presented confirming the validity of the proposed approach.
作者: Kidney-Failure    時間: 2025-3-23 07:08
Assurance Cases for Block-Configurable Softwareification effort in the presence of change. In this paper we describe how a modular assurance case can be established based upon formal analysis of the necessary preconditions of the component. Our approach supports the reuse of arguments and evidence established for components, including the results of the formal analysis.
作者: lymphedema    時間: 2025-3-23 09:50

作者: Firefly    時間: 2025-3-23 16:05

作者: 有其法作用    時間: 2025-3-23 20:28
https://doi.org/10.1007/978-3-540-75267-7ships are represented by a UML notation extended with stereotypes. The UML model enables a rigorous validation of several constraints expressed in OCL. We illustrate our method using an example electronic steering column lock system.
作者: Aggrandize    時間: 2025-3-23 22:32
Protecting Your Intellectual Property,knowledge of the difficulty function. It also discusses the possibility of estimating the model parameters, with one approach based on an empirical analysis of previous systems implemented as logic networks, to support pre-development estimates of expected gain from diversity. The approach is illustrated using a realistic safety system example.
作者: DALLY    時間: 2025-3-24 05:18

作者: gusher    時間: 2025-3-24 06:41

作者: 遭受    時間: 2025-3-24 14:17

作者: 辭職    時間: 2025-3-24 17:54
A Simulated Fault Injection Framework for Time-Triggered Safety-Critical Embedded Systemsf design pitfalls that might require an expensive redesign of the system. We examine the feasibility of the proposed approach in a case study, where SFI is used to assess the fault tolerance mechanisms designed in a simplified railway signaling system.
作者: AVANT    時間: 2025-3-24 19:48
Systematic Derivation of Functional Safety Requirements for Automotive Systemsships are represented by a UML notation extended with stereotypes. The UML model enables a rigorous validation of several constraints expressed in OCL. We illustrate our method using an example electronic steering column lock system.
作者: BRACE    時間: 2025-3-25 01:34
Estimating Worst Case Failure Dependency with Partial Knowledge of the Difficulty Functionknowledge of the difficulty function. It also discusses the possibility of estimating the model parameters, with one approach based on an empirical analysis of previous systems implemented as logic networks, to support pre-development estimates of expected gain from diversity. The approach is illustrated using a realistic safety system example.
作者: d-limonene    時間: 2025-3-25 07:04

作者: 向外    時間: 2025-3-25 11:00

作者: Mercantile    時間: 2025-3-25 13:17

作者: 瘙癢    時間: 2025-3-25 18:15
Conference proceedings 2014selected from 85 submissions. The papers are organized in topical sections on fault injection techniques, verification and validation techniques, automotive systems, coverage models and mitigation techniques, assurance cases and arguments, system analysis, security and trust, notations/languages for safety related aspects, safety and security.
作者: 急性    時間: 2025-3-25 22:00

作者: Corroborate    時間: 2025-3-26 02:03

作者: CURL    時間: 2025-3-26 04:49

作者: TEN    時間: 2025-3-26 10:46
Conference proceedings 2014 in Florence, Italy, in September 2014. The 20 revised full papers presented together with 3 practical experience reports were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on fault injection techniques, verification and validation techniques, auto
作者: 阻礙    時間: 2025-3-26 13:47

作者: SYN    時間: 2025-3-26 20:09

作者: Crayon    時間: 2025-3-26 21:48
Debugging with Timed Automata Mutationseading to the implementation fault. The technique is implemented for Uppaal’s timed automata models and is based on a language inclusion check via bounded model checking. It adds debugging capability to our existing test-case generators. A car-alarm system serves as illustrating case study.
作者: Oversee    時間: 2025-3-27 01:38

作者: 魯莽    時間: 2025-3-27 07:39

作者: COKE    時間: 2025-3-27 11:08
Exploiting Narrow Data-Width to Mask Soft Errors in Register Filesove the unnecessary masks without scarifying the errors coverage. Under the user-defined overhead constrain, the most cost-effective masking operations can be automatically selected. Experimental results from several benchmarks indicate that the reliability of programs have been averagely improved f
作者: BOOST    時間: 2025-3-27 13:38
Proving the Absence of Stack Overflowsllenge for binary-code level analyzers is to minimize the necessary amount of user interactions, e.g., for function pointer calls. To minimize user interaction, the analysis has to be precise, and the annotation mechanism has to be flexible and easy-to-use. The analyzer configuration has to be done
作者: graphy    時間: 2025-3-27 20:00

作者: garrulous    時間: 2025-3-28 01:13

作者: coltish    時間: 2025-3-28 02:42

作者: 陶醉    時間: 2025-3-28 06:33

作者: 嘲弄    時間: 2025-3-28 12:56
https://doi.org/10.1007/978-3-540-75267-7evant, so as to prevent their future uncovered faults that may lead to system failure. A new coverage model incorporating the timely coverage of the irrelevant components (in addition to the faulty components) is proposed, which opens up a cost-effective approach to improve the system reliability wi
作者: 自戀    時間: 2025-3-28 18:32
Kevin McKague,David Wheeler,Aneel Karnaniove the unnecessary masks without scarifying the errors coverage. Under the user-defined overhead constrain, the most cost-effective masking operations can be automatically selected. Experimental results from several benchmarks indicate that the reliability of programs have been averagely improved f
作者: Laconic    時間: 2025-3-28 20:43

作者: 不適當(dāng)    時間: 2025-3-29 00:15

作者: cardiac-arrest    時間: 2025-3-29 06:26
Management team and organization,ted error-detection methods have been shown to increase the overall resiliency when applied to critical spots in the system. Fault injection (FI) is a common approach to assess a system’s vulnerability to hardware faults. In an FI campaign comprising multiple runs of an application benchmark, each r
作者: 命令變成大炮    時間: 2025-3-29 08:49
Business idea and strategic goals,to provide a test arena for UAVs with various SAA algorithms, in order to explore potential conflict situations. The simulation is configured by a series of parameters, which define a huge input space. Evolutionary search is used to explore the input space and to guide the simulation towards challen
作者: Nomogram    時間: 2025-3-29 12:06

作者: 使更活躍    時間: 2025-3-29 17:57

作者: 財主    時間: 2025-3-29 22:12

作者: 勤勞    時間: 2025-3-30 02:27

作者: drusen    時間: 2025-3-30 07:37
https://doi.org/10.1007/978-3-540-75267-7 is persistent if it is always relevant in the system unless the system is failed, and a system is persistent if all the components are persistent. In traditional imperfect fault coverage models, simply coverage models (CMs), the coverage (including identification and isolation) is typically limited
作者: 熟練    時間: 2025-3-30 10:10
Kevin McKague,David Wheeler,Aneel Karnaniare very frequently accessed and errors occurred in them will propagate to other components quickly, RFs are among the major reasons for affecting systemic reliability. Current protecting techniques usually provoke significant power penalty and performance degradation. This paper proposes a lightwei
作者: Endemic    時間: 2025-3-30 12:29
Money for Nothing: When It Pays to Be Free,that links short phrases used in the argument to detail available elsewhere. However, definitions of the context element admit multiple interpretations and conflict with guidance for building assured safety arguments. If readers do not share an understanding of the meaning of context that makes cont
作者: Condense    時間: 2025-3-30 17:59

作者: Osteons    時間: 2025-3-31 00:35
The Business of iPhone App Development and time needed to achieve certification. The argument-fragments could cover safety aspects relevant for different contexts in which the component can be used. Creating argument-fragments for the out-of-context components is time-consuming and currently no satisfying approach exists to facilitate t
作者: PRISE    時間: 2025-3-31 02:20

作者: Lignans    時間: 2025-3-31 07:27
Protecting Your Intellectual Property,ally known: at configuration time developers have to reserve enough stack space for each task. Stack overflow errors are often hard to find but can cause the system to crash or behave erroneously. All current safety standards, e.g., ISO-26262, require upper estimations of the storage space; due to i
作者: Endometrium    時間: 2025-3-31 12:28
Increasing Awareness for Your iPhone App,However, nodes in a WSN cooperate and this exposes them to several security threats. Trust-based systems constitute an established solution to ensure security of distributed systems. In this work, a trust-based approach is discussed to make WSNs tolerant against attacks targeting their routing layer
作者: 啞劇    時間: 2025-3-31 16:48

作者: Conquest    時間: 2025-3-31 18:51

作者: GRAVE    時間: 2025-3-31 21:42
Protecting Your Intellectual Property,are makes the zero-fault objective hardly attainable, we adopt a fault-tolerance approach. We consider a separate safety channel, called a monitor, that is able to partially observe the system and to trigger safety-ensuring actuations. A systematic process for specifying a safety monitor is presente
作者: 別炫耀    時間: 2025-4-1 04:08

作者: 騎師    時間: 2025-4-1 09:24
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233740.jpg




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
休宁县| 饶阳县| 贵阳市| 三都| 甘孜县| 合肥市| 宜川县| 阳朔县| 盱眙县| 威海市| 四会市| 洞口县| 蓝山县| 通山县| 永新县| 杭锦后旗| 台州市| 东光县| 武功县| 邹城市| 龙泉市| 大理市| 全南县| 武定县| 黄浦区| 永德县| 定州市| 衡东县| 黄平县| 屏东县| 休宁县| 新郑市| 沾益县| 绥中县| 栖霞市| 当涂县| 舞钢市| 宁波市| 怀宁县| 正蓝旗| 辽宁省|