派博傳思國際中心

標題: Titlebook: Dependability Engineering and Complex Systems; Proceedings of the E Wojciech Zamojski,Jacek Mazurkiewicz,Janusz Kacprz Conference proceedin [打印本頁]

作者: 珍珠無    時間: 2025-3-21 18:45
書目名稱Dependability Engineering and Complex Systems影響因子(影響力)




書目名稱Dependability Engineering and Complex Systems影響因子(影響力)學科排名




書目名稱Dependability Engineering and Complex Systems網(wǎng)絡公開度




書目名稱Dependability Engineering and Complex Systems網(wǎng)絡公開度學科排名




書目名稱Dependability Engineering and Complex Systems被引頻次




書目名稱Dependability Engineering and Complex Systems被引頻次學科排名




書目名稱Dependability Engineering and Complex Systems年度引用




書目名稱Dependability Engineering and Complex Systems年度引用學科排名




書目名稱Dependability Engineering and Complex Systems讀者反饋




書目名稱Dependability Engineering and Complex Systems讀者反饋學科排名





作者: Stable-Angina    時間: 2025-3-21 21:59
Numerical Simulation of the Passenger Side Airbag Deployment in Out-of-Position,me into effect and an airbag now has to meet several requirements that concern out of positioning. In meeting these requirements simulations of folding and deploying airbags are very useful and are widely used. The paper presents a simulation method for the deploying airbags using three materials in
作者: Tinea-Capitis    時間: 2025-3-22 00:23

作者: cacophony    時間: 2025-3-22 04:59
Selection of Metrics for the Defect Prediction,provement efforts to those modules or classes that need it the most. We investigated the classification process (deciding if an element is faulty or not) in which the set of software metrics and several data mining algorithms were used. We conducted an experiment on ten open source projects. The dat
作者: 一小塊    時間: 2025-3-22 10:29
Hybrid Generalized Additive Wavelet-Neuro-Fuzzy-System and Its Adaptive Learning,s system combines the advantages of neuro-fuzzy system of Takagi-Sugeno-Kang, wavelet neural networks and generalized additive models of Hastie-Tibshirani. The proposed system has universal approximation properties and learning capabilities which pertain to the neural networks and neuro-fuzzy system
作者: intention    時間: 2025-3-22 15:58
Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System, sensitive data such as credit card numbers, personal or corporate data. In this paper some analyses of data from a honeypot system of web application, implemented at the Institute of Computer Science, Warsaw University of Technology, are presented. The implemented honeypot has its own management so
作者: intention    時間: 2025-3-22 19:11

作者: hauteur    時間: 2025-3-22 21:27
Estimation of Travel Time in the City Based on Intelligent Transportation System Traffic Data with em in the city of Wroc?aw, Poland. The methodology is explained of using traffic intensity data as neural net inputs and of using car plate number recognition system to provide target training data. The advantages of the suggested solution are pointed out. The results of preliminary research are pre
作者: 缺陷    時間: 2025-3-23 05:11

作者: RENIN    時間: 2025-3-23 06:34
Tracing Life Cycle of Software Bugs,are bug repositories. These data characterize the progress and effectiveness of the above mentioned processes. To analyze these data we have developed a special program which extracts information from typical bug repositories (e.g. Bugzilla) and generates various useful statistics. The analysis meth
作者: glisten    時間: 2025-3-23 12:22

作者: Adenocarcinoma    時間: 2025-3-23 14:23

作者: 量被毀壞    時間: 2025-3-23 21:35
Analytical Identification of Parameters Influencing Measurement Quality Using Flat Brake Tester,at the same conditions and hard to measure and collect braking data. On the other hand testers testing in workshop conditions provide comparable conditions but are less similar to real braking process on the road. Anyway periodical testing of braking systems is performed in workshops equipped with s
作者: 和音    時間: 2025-3-24 02:01

作者: QUAIL    時間: 2025-3-24 03:21
,Stochastic Runge–Kutta Software Package for Stochastic Differential Equations,ent differential equations, was obtained. These are partial differential equations (master equation, the Fokker–Planck equation) and stochastic differential equations (Langevin equation). However, analytical methods do not always allow to research these equations adequately. It is proposed to use th
作者: Accomplish    時間: 2025-3-24 08:03

作者: Dignant    時間: 2025-3-24 13:03

作者: degradation    時間: 2025-3-24 18:03

作者: 束縛    時間: 2025-3-24 21:50
The Problem of Tyre Footprint Width Estimation by Fibre Optic WIM Sensors in Condition of Geometricn and identification, as well as overload enforcement, road maintenance planning, cargo fleet managing in intelligent transport systems, control of the legal use of the transport infrastructure, road surface protection from the early destruction and for the safety on the roads. One of sufficient sub
作者: PANT    時間: 2025-3-25 02:31

作者: insolence    時間: 2025-3-25 05:39

作者: 隨意    時間: 2025-3-25 09:45
Modification of Neural Network Tsang-Wang in Algorithm for CAD of Complex Systems with Higher Degreling of tasks and optimal resources partition are fundamental problems in this algorithm. Presented the CAD algorithm, based on neural networks, may have a practical application in developing tools for rapid prototyping of such systems.
作者: Commemorate    時間: 2025-3-25 12:18
Semi-Markov Model of Damage Process,ity functions and corresponding expectations, second moments and standard deviations are evaluated for the presented cases of the object damage. A special case of the model is a multistate model with two kinds of failures. The presented model is illustrated by numerical example.
作者: 滴注    時間: 2025-3-25 17:02
Dependability Engineering and Complex Systems978-3-319-39639-2Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 惡名聲    時間: 2025-3-25 21:34

作者: 耕種    時間: 2025-3-26 01:02
Bernhard Widder,Gerhard F. Hamannity functions and corresponding expectations, second moments and standard deviations are evaluated for the presented cases of the object damage. A special case of the model is a multistate model with two kinds of failures. The presented model is illustrated by numerical example.
作者: 要塞    時間: 2025-3-26 06:05

作者: 悲觀    時間: 2025-3-26 12:24

作者: 同謀    時間: 2025-3-26 12:40

作者: adroit    時間: 2025-3-26 19:15
Alexander Morrison-Nozik,Saptarsi M. Haldarme into effect and an airbag now has to meet several requirements that concern out of positioning. In meeting these requirements simulations of folding and deploying airbags are very useful and are widely used. The paper presents a simulation method for the deploying airbags using three materials in
作者: Coronary    時間: 2025-3-27 00:29

作者: explicit    時間: 2025-3-27 01:40

作者: Cervical-Spine    時間: 2025-3-27 07:28
Ductile Mode Cutting of Tungsten Carbides system combines the advantages of neuro-fuzzy system of Takagi-Sugeno-Kang, wavelet neural networks and generalized additive models of Hastie-Tibshirani. The proposed system has universal approximation properties and learning capabilities which pertain to the neural networks and neuro-fuzzy system
作者: 嬉耍    時間: 2025-3-27 11:24
Thermally Assisted Ductile Mode Cutting sensitive data such as credit card numbers, personal or corporate data. In this paper some analyses of data from a honeypot system of web application, implemented at the Institute of Computer Science, Warsaw University of Technology, are presented. The implemented honeypot has its own management so
作者: Liberate    時間: 2025-3-27 16:38
Nachgetragen: Erfahrungen mit E-Man,nt and difficult problems are network modelling of traffic flow. There exist many works of experimental and computer simulation types, but exact results fot saturated traffic flow on networks are appeared not often. We consider a movement of particles on network of special type as a set of contours
作者: 猜忌    時間: 2025-3-27 20:50

作者: aerobic    時間: 2025-3-28 01:53
Paradiese mannigfacher Unvollkommenheiten,ation operators. They were also supposed to generate fewer equivalent mutants. In this work we present evaluation of deletion mutation operators in the context of structural and object-oriented operators used in first and second order mutation testing of C# programs. Deletion operators could surpass
作者: discord    時間: 2025-3-28 02:30
https://doi.org/10.1007/978-3-476-04535-5are bug repositories. These data characterize the progress and effectiveness of the above mentioned processes. To analyze these data we have developed a special program which extracts information from typical bug repositories (e.g. Bugzilla) and generates various useful statistics. The analysis meth
作者: insurrection    時間: 2025-3-28 08:30

作者: UTTER    時間: 2025-3-28 14:02

作者: 手段    時間: 2025-3-28 15:17

作者: isotope    時間: 2025-3-28 20:47
Ralph D. Lorenz,James R. Zimbelmanalgorithms. We consider seven bases of finite fields supporting optimal normal bases of types 2 and 3: polynomial, optimal normal, permuted, redundant, reduced, doubled polynomial, and doubled reduced bases. With respect to fields of characteristic .?=?7 we provide complexity estimates for conversio
作者: drusen    時間: 2025-3-29 02:10
Airway Evaluation and Managementent differential equations, was obtained. These are partial differential equations (master equation, the Fokker–Planck equation) and stochastic differential equations (Langevin equation). However, analytical methods do not always allow to research these equations adequately. It is proposed to use th
作者: ARY    時間: 2025-3-29 04:27
Airway Evaluation and Managementg the number of waste indicated for treatment, encouraging the reuse of waste and creating preferences in order to raise the level of recovery processes, in particular, recycling. Realization of the aforementioned establishments in the following years will be significantly dependent from the proper
作者: 慌張    時間: 2025-3-29 09:58
Bernhard Widder,Gerhard F. Hamannents a method to increase the runway safety, where it strongly depends on human made decisions, regulated by national and local laws of deontic nature, i.e. rules of obligation, permission etc. We propose to model and verify such a communication control system, and related behavioral deontic rules,
作者: DUCE    時間: 2025-3-29 12:05

作者: 我沒有強迫    時間: 2025-3-29 18:47
Bernhard Widder,Gerhard F. Hamannn and identification, as well as overload enforcement, road maintenance planning, cargo fleet managing in intelligent transport systems, control of the legal use of the transport infrastructure, road surface protection from the early destruction and for the safety on the roads. One of sufficient sub
作者: Conjuction    時間: 2025-3-29 20:57
2194-5357 plexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are 978-3-319-39638-5978-3-319-39639-2Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 割讓    時間: 2025-3-30 01:52
Conference proceedings 2016y originate from the involved technical and organizational structures but alsofrom the complexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are
作者: 熒光    時間: 2025-3-30 06:37

作者: 協(xié)奏曲    時間: 2025-3-30 11:19
Analytical Identification of Parameters Influencing Measurement Quality Using Flat Brake Tester,thodology of brake testing on flat testers and measurement system is shown. There are discussed measurement errors on flat testers related to the positioning of the vehicle during braking as well as the type and parameters of the test modes. Another paper discusses simulation of the brake process on
作者: decode    時間: 2025-3-30 12:26
The Assessment Method of the Organization of Municipal Waste Collection Zones,ner and having required the values of indicators defining its efficiency. The presented method allows one to assign points (places of waste gathering) in already existing zones, in case of which, it should be considered to transfer them to other zones of waste collection. The improvement of zones fo
作者: WITH    時間: 2025-3-30 17:24

作者: 出汗    時間: 2025-3-30 22:53
Ralph D. Lorenz,James R. Zimbelmanthodology of brake testing on flat testers and measurement system is shown. There are discussed measurement errors on flat testers related to the positioning of the vehicle during braking as well as the type and parameters of the test modes. Another paper discusses simulation of the brake process on
作者: 方便    時間: 2025-3-31 01:50

作者: Interim    時間: 2025-3-31 05:57

作者: BANAL    時間: 2025-3-31 12:06

作者: Obsessed    時間: 2025-3-31 14:11
Thermally Assisted Ductile Mode Cuttingftware that helps to analyze the stored data. The honeypot was operating almost one year. Several data mining techniques were used to analyze the data collected by the honeypot and to detect important patterns and attacks. In this paper the results of the usage of algorithms MaxMiner and SED in the analysis of logs are presented.
作者: nugatory    時間: 2025-3-31 18:17
https://doi.org/10.1007/978-3-476-04535-5odology is based on problem handling graphs (PHGs) and various metrics. The usefulness of this approach has been illustrated for some real open source and commercial projects. We present the measurement methodology and interpretation of the obtained results, which confirmed their practical significance.
作者: indicate    時間: 2025-3-31 22:11

作者: 有偏見    時間: 2025-4-1 05:01
2194-5357 n Brunów, Poland.Presents recent research in Dependability E.These proceedings present the results of the Eleventh International Conference on Dependability and Complex Systems .DepCoS-RELCOMEX .which took place in a picturesque Brunów Palace in Poland from 27th June to 1st July, 2016...DepCoS-RELCO
作者: anniversary    時間: 2025-4-1 07:10

作者: ICLE    時間: 2025-4-1 10:39

作者: 放大    時間: 2025-4-1 14:28
Data Mining Algorithms in the Analysis of Security Logs from a Honeypot System,ftware that helps to analyze the stored data. The honeypot was operating almost one year. Several data mining techniques were used to analyze the data collected by the honeypot and to detect important patterns and attacks. In this paper the results of the usage of algorithms MaxMiner and SED in the analysis of logs are presented.
作者: FAR    時間: 2025-4-1 20:52

作者: GOAT    時間: 2025-4-2 02:33
NuSMV Model Verification of an Airport Traffic Control System with Deontic Rules,as finite state automata in the Symbolic Model Verifier NuSMV, where the deonticity is built in the automata, and the verification thereof uses CTL temporal logic formulas. The method is simple in modeling the system and in specifying and verifying it. It can also easily find a possible path of states leading to a user-defined hazard.
作者: irreparable    時間: 2025-4-2 05:34
Alexander Morrison-Nozik,Saptarsi M. Haldarlow is described by the conservation laws of mass, momentum and energy. The main aim of this study is evaluate the performance of deploying of passenger side airbag using Finite Element Methods (FEM).
作者: 粗鄙的人    時間: 2025-4-2 10:02
Paradiese mannigfacher Unvollkommenheiten,n statement and operator deletion mutation operators. Considering mutation time, it could be profitable to replace other structural mutation operators with the deletion ones, although there are no distinctive results in reduction of the number of equivalent mutants.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
恭城| 突泉县| 周至县| 南通市| 湘潭市| 儋州市| 黎川县| 张家口市| 麻江县| 民和| 霍山县| 灵武市| 济阳县| 河池市| 花莲县| 铁力市| 枣庄市| 平陆县| 临沭县| 咸宁市| 区。| 库尔勒市| 奇台县| 紫阳县| 锦屏县| 肥东县| 绥中县| 远安县| 金寨县| 岑巩县| 东源县| 巩义市| 奉贤区| 扎囊县| 娱乐| 金门县| 新民市| 潮州市| 墨脱县| 遂昌县| 长垣县|