作者: barium-study 時間: 2025-3-21 20:49
Wojciech Zamojski,Janusz Kacprzyk,Tomasz WalkowiakRecent research in Dependable Computer Systems.Proceedings of the Sixth International Conference on Dependability and Computer Systems DepCoS-RELCOMEX 2011 held in Wroclaw, Poland, June 27- Jul 11.Wri作者: 狗窩 時間: 2025-3-22 03:03 作者: CHYME 時間: 2025-3-22 08:22 作者: collateral 時間: 2025-3-22 12:20
Nandakumar S. Narayanan,Mark Laubachenvironment. DFC plugin was used to support the dataflow testing while MuClipse and Jumble plugins were used for the mutation testing. The results of testing six Java programs using data flow and mutation techniques are presented. Experiment shown, that the effectiveness of mutation testing is highe作者: 格子架 時間: 2025-3-22 14:46 作者: 格子架 時間: 2025-3-22 19:39 作者: obsession 時間: 2025-3-22 23:06
https://doi.org/10.1007/978-1-84882-691-5cosmic radiation) we had to check their impact on the controller operation. For this purpose we have developed a special test bed. It comprises some universal fault simulator (FITS), a software model of the controller and its environment. Simulation results show relatively high fault robustness. We 作者: 投射 時間: 2025-3-23 02:08
Nikolay Mehandjiev,Paul Grefen,Santi Ristolction methods like file signature and extension analysis, metadata analysis and searching operation system artifacts. We present research on theoretical and practical use of some indicators that can suggest encryption used like entropy, chi-square test, Arithmetic Mean and Monte Carlo Value for Pi.作者: vasospasm 時間: 2025-3-23 08:38
Automotive Industry Case StudiesSpectrum of concepts related to common cause failure (CCF) is expanded, as well as models of multi-version systems (MVS) and multi-version projects (MVP). Approach to metric-probabilistic assessment is proposed and considered in the context of evaluating the software-based and FPGA-based MVS. Direct作者: pacifist 時間: 2025-3-23 09:54 作者: discord 時間: 2025-3-23 16:10 作者: 敏捷 時間: 2025-3-23 18:19 作者: 大看臺 時間: 2025-3-24 01:51 作者: 使成整體 時間: 2025-3-24 05:42
von Start-up-Unternehmen im E-Business a specification of a duration system that is described by a duration graph. Duration graphs are an extension of timed automata and are suitable for modeling the accumulated times spent by computations in duration systems. In this paper, we propose a framework to generate automatically test cases di作者: configuration 時間: 2025-3-24 08:36
Fallübergreifende Auswertung der Ergebnissetion type, the derived models are verified by model checking. The checking is performed on an accessibility graph generated from an initialized dynamic model. We propose, in this paper, an approach to initialize object Petri nets models at a time t different from the initial time. Object Petri nets 作者: 不可知論 時間: 2025-3-24 13:17
https://doi.org/10.1007/978-3-8349-8859-1fety Analysis (MBSA) has been proposed to achieve more-robust and effective safety assessment techniques through automation of the synthesis and analysis of predictive models. Two prominent paradigms of MBSA are Compositional Safety Analysis (CSA) and Behavioural Safety Analysis (BSA). These techniq作者: anthesis 時間: 2025-3-24 18:25
Giovanni Chiorboli,Carlo Morandif use, should be characterised by the high level of reliability. The devices and electronic units applied in the wide range in those systems, the microprocessor systems in particular, require a new perspective on the reliability and the safety of the systems. The paper presents a reliability analysi作者: Instinctive 時間: 2025-3-24 20:11 作者: Highbrow 時間: 2025-3-24 23:21
Dynamic Chemical Processes on Solid Surfaces faulty. With increasing sizes of memory chips the urge not to waste these ‘not quite properly working’ pieces of equipment becomes bigger and bigger. Operating systems such as Linux already provide mechanisms for memory management which could be utilized to avoid allocating bad memory blocks which 作者: 完成 時間: 2025-3-25 06:22 作者: 表否定 時間: 2025-3-25 09:04
https://doi.org/10.1007/3-540-06471-0rces. Existing approaches towards resource co-allocation and multiprocessor job scheduling in economic models of distributed computing are based on search of time-slots in resource occupancy schedules. The sought time-slots must match requirements of necessary span, computational resource properties作者: BOOM 時間: 2025-3-25 12:19 作者: 值得贊賞 時間: 2025-3-25 16:00 作者: 我還要背著他 時間: 2025-3-25 23:48
https://doi.org/10.1007/978-3-642-21393-9Computer Systems; Dependability; Dependable Computer Systems作者: 積極詞匯 時間: 2025-3-26 01:56
978-3-642-21392-2Springer Berlin Heidelberg 2011作者: abysmal 時間: 2025-3-26 08:15
Patterns Improving the Common Criteria Compliant IT Security Development Process,r the purposes of their future Common Criteria certification. The key issues of the patterns-based project are discussed: how to develop the set of patterns for different kinds of evidences to be delivered with the IT product or system for independent evaluation. The author characterizes the IT secu作者: Intellectual 時間: 2025-3-26 09:08 作者: 機制 時間: 2025-3-26 15:51
A New Three Levels Context Based Approach for Web Search Engines Evaluation,user, the manner?in which these approaches measure the adequacy between the user’s query and the returned documents, and the consideration of the search tool characteristics. This critical finding prompted our reflections for the exploitation of contextual elements around the user, the query and the作者: 減震 時間: 2025-3-26 18:55
Quantitative Verification of Non-functional Requirements with Uncertainty,uirements to design models that can be analyzed formally in quantitative terms. We assume that the initial description is given in behavioral terms, using annotated UML Sequence Diagrams. Annotations are used to express environmental assumptions, which are subject to uncertainty, in probabilistic te作者: anesthesia 時間: 2025-3-27 00:57 作者: Sarcoma 時間: 2025-3-27 03:05 作者: Moderate 時間: 2025-3-27 06:13 作者: 復習 時間: 2025-3-27 09:53
Two-Level Software Rejuvenation Model with Increasing Failure Rate Degradation,the main reasons of software failures is software aging. To counteract aging, software rejuvenation has been recently proposed. The main aim when dealing with rejuvenation is to distinguish the optimal time or conditions to trigger it. Rejuvenation can be performed in two levels, partial and full. I作者: CHARM 時間: 2025-3-27 15:12 作者: 翻動 時間: 2025-3-27 17:45
Conjoining Fault Trees with Petri Nets to Model Repair Policies,ators found in the classical logic. Therefore, only by using ‘AND’ as well as ‘OR’ gates a number of system failures can be expressed even by engineers not related to reliability analysis. Doubtless, intuition accompanying fault tree models is their greatest merit. Therefore each attempt to increase作者: 發(fā)電機 時間: 2025-3-27 22:15 作者: VEN 時間: 2025-3-28 05:29 作者: 繁殖 時間: 2025-3-28 09:32
Dynamic Model Initialization Using UML,tion type, the derived models are verified by model checking. The checking is performed on an accessibility graph generated from an initialized dynamic model. We propose, in this paper, an approach to initialize object Petri nets models at a time t different from the initial time. Object Petri nets 作者: 連累 時間: 2025-3-28 10:48 作者: 大約冬季 時間: 2025-3-28 16:02 作者: 和藹 時間: 2025-3-28 22:35
Avoiding Probability Saturation during Adjustment of Markov Models of Ageing Equipment,esent equipment ageing and also incorporate various maintenance activities. Having available some basic model it is possible to adjust its parameters so that it represents some hypothetical new maintenance policy and then to examine impact that this new policy has on various reliability characterist作者: 催眠 時間: 2025-3-29 00:03
Bad Memory Blocks Exclusion in Linux Operating System, faulty. With increasing sizes of memory chips the urge not to waste these ‘not quite properly working’ pieces of equipment becomes bigger and bigger. Operating systems such as Linux already provide mechanisms for memory management which could be utilized to avoid allocating bad memory blocks which 作者: Corral 時間: 2025-3-29 05:39
Metamodel and UML Profile for Functional Programming Languages,ms. Although UML is mainly based on concepts which are native to imperative object-oriented programming languages, this chapter shows how – through the profile mechanism – it can be used to model software that is to be implemented in a functional programming language. In this chapter Haskell was cho作者: 使混合 時間: 2025-3-29 07:39 作者: ETHER 時間: 2025-3-29 14:21
Conference proceedings 2011t and soft computing methods help to resolve fundamental problems of dependability analysis which are caused by the fact that in contemporary computer systems it is often difficult to find a relation between system elements and system events (the relation between reasons and results) and it is even 作者: 壕溝 時間: 2025-3-29 15:35 作者: Aerate 時間: 2025-3-29 21:52
A New Three Levels Context Based Approach for Web Search Engines Evaluation,ts have revealed that the evaluation of?search engines at three different levels of context is a promising way to diagnose the performance, characteristics and behavior of?these engines and the relevance of the results that they return.作者: 獸群 時間: 2025-3-30 00:13
Conjoining Fault Trees with Petri Nets to Model Repair Policies, Turing machines, but their models turned out to be obscure to engineers. Hence, this severe limitation hampers widespread popularity of Petri Nets. By analyzing the constraints of the two languages, we come up with a new modeling technique blending fault trees with Petri nets. We extend the express作者: Champion 時間: 2025-3-30 04:47
Tuberculosis Involving the Airways,ts have revealed that the evaluation of?search engines at three different levels of context is a promising way to diagnose the performance, characteristics and behavior of?these engines and the relevance of the results that they return.作者: 種植,培養(yǎng) 時間: 2025-3-30 08:41
https://doi.org/10.1007/978-3-8349-7182-1 Turing machines, but their models turned out to be obscure to engineers. Hence, this severe limitation hampers widespread popularity of Petri Nets. By analyzing the constraints of the two languages, we come up with a new modeling technique blending fault trees with Petri nets. We extend the express作者: 涂掉 時間: 2025-3-30 14:20 作者: Occipital-Lobe 時間: 2025-3-30 16:35 作者: 燒瓶 時間: 2025-3-30 22:21
Reliability Analysis of Electronic Protection Systems Using Optical Links,oprocessor systems in particular, require a new perspective on the reliability and the safety of the systems. The paper presents a reliability analysis of the electronic protection systems using optical links.作者: 失望昨天 時間: 2025-3-31 04:13
Metamodel and UML Profile for Functional Programming Languages,e profile mechanism – it can be used to model software that is to be implemented in a functional programming language. In this chapter Haskell was chosen as one of the most popular modern, pure functional languages. First, a partial metamodel of Haskell is defined and then the corresponding UML profile is presented.作者: 邊緣 時間: 2025-3-31 05:32 作者: 食品室 時間: 2025-3-31 10:18
Fallübergreifende Auswertung der Ergebnisseare derived from sate machines. They are initialized using object diagrams. The approach associates the object state specified on the object diagram to the one specified on the state machine. A case study is given to illustrate the approach.作者: antidepressant 時間: 2025-3-31 15:02 作者: jumble 時間: 2025-3-31 20:36 作者: 遭遇 時間: 2025-3-31 21:56 作者: 談判 時間: 2025-4-1 04:33
von Start-up-Unternehmen im E-Businesshnique. Test cases are given by considering a discrete time and represented with a tree. In the second, we demonstrate that every test cases derived from the test tree corresponds to a digitization test case of the specification model.作者: transient-pain 時間: 2025-4-1 08:55 作者: 浮雕 時間: 2025-4-1 12:36
https://doi.org/10.1007/3-540-06471-0ulti-variant search. Two algorithms of linear complexity for search of alternative variants are proposed and compared. Having several optional resource configurations for each job makes an opportunity to perform an optimization of execution of the whole batch of jobs and to increase overall efficiency of scheduling.作者: 內(nèi)疚 時間: 2025-4-1 16:07