派博傳思國際中心

標題: Titlebook: Dependable Computing; Second Latin-America Carlos Alberto Maziero,Jo?o Gabriel Silva,Flávio M Conference proceedings 2005 Springer-Verlag B [打印本頁]

作者: JOLT    時間: 2025-3-21 19:51
書目名稱Dependable Computing影響因子(影響力)




書目名稱Dependable Computing影響因子(影響力)學(xué)科排名




書目名稱Dependable Computing網(wǎng)絡(luò)公開度




書目名稱Dependable Computing網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Dependable Computing被引頻次




書目名稱Dependable Computing被引頻次學(xué)科排名




書目名稱Dependable Computing年度引用




書目名稱Dependable Computing年度引用學(xué)科排名




書目名稱Dependable Computing讀者反饋




書目名稱Dependable Computing讀者反饋學(xué)科排名





作者: moribund    時間: 2025-3-21 21:14
0302-9743 Overview: 978-3-540-29572-3978-3-540-32092-0Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: PHIL    時間: 2025-3-22 01:36

作者: CRUDE    時間: 2025-3-22 06:46
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/265704.jpg
作者: opportune    時間: 2025-3-22 11:26
Leslie P. Willcocks,Edgar A. Whitleyave been proposed to validate individual components (e.g., formal methods) or a system as a whole (e.g., red teaming). However, no single technique can provide the breadth of evidence needed to validate a system with respect to high-level survivability requirements. To accomplish this, we propose an
作者: Migratory    時間: 2025-3-22 13:34
John W. Moore,Diana E. J. Blazis failure model. The system model defines the semantics of basic services like process and message services of a distributed system. More advanced system services will be based on these basic services. The failure model specifies the likely failures of the basic services, i.e., these are the failures
作者: Migratory    時間: 2025-3-22 21:01

作者: FRAUD    時間: 2025-3-22 21:48
Research Notes in Neural Computingnent when the application that interacted with it failed. In this work we tackle the injection of errors directly into the interfaces among the target component’s classes. As the component under test has several classes, we use stratified sampling to reduce the amount of injections without losing th
作者: Concrete    時間: 2025-3-23 02:14

作者: 宏偉    時間: 2025-3-23 09:33
Dynamic Learning Spaces in Education of distributed applications; it provides tools to organize the applications using a layered architecture, with the network(s) at the bottom of the architecture. Neko is also a communication platform that allows sending and receiving of generic Java objects. Distributed systems realized within the N
作者: Spangle    時間: 2025-3-23 10:59

作者: hyperuricemia    時間: 2025-3-23 14:13
https://doi.org/10.1007/978-981-10-8521-5tention from existing development methodologies. This work presents a systematic way to deal with exception handling, from the requirement specification phase to the implementation and testing phases, in component-based software development. Testing activities are performed since the early stages of
作者: 搜尋    時間: 2025-3-23 18:09

作者: 群居男女    時間: 2025-3-24 01:45
Springer Series in Design and Innovationem assists the developer in the design and implementation process. Main features of the Zerberus System are generality, dependability, real-time predictability, the ability to be certified and cost-efficiency..The main concept of the Zerberus System is the platform independent specification of the f
作者: 他日關(guān)稅重重    時間: 2025-3-24 06:20
https://doi.org/10.1007/978-3-030-39529-2rable to soft errors originated from energetic nuclear particles or electrical sources. This paper proposes a new protected cache scheme, which provides high performance as well as high fault detection coverage. In this scheme, the cache space is divided into sets of different sizes. Here, the lengt
作者: abstemious    時間: 2025-3-24 07:13
Thomas Schnekenburger,Georg Stellner hardware is initialized, and the processor executes the boot loader followed by kernel initialization. For this reason most system support is not yet available and traditional fault-injection techniques such as . cannot be used. Thus our study was based in the processor’s IEEE?1149.1 (boundary-scan
作者: FLAT    時間: 2025-3-24 14:03
Thomas Schnekenburger,Georg Stellnerject-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network on
作者: 寬宏大量    時間: 2025-3-24 17:39

作者: 態(tài)度暖昧    時間: 2025-3-24 19:24
City System as a Location Factorcation rely on the information provided by failure detectors in order to make progress and terminate. As such, erroneous information provided by the failure detector (or the absence of it) may delay decision-making or lead the upper-layer fault-tolerant mechanism to take incorrect decisions (e.g., t
作者: staging    時間: 2025-3-25 02:15

作者: 攀登    時間: 2025-3-25 03:28

作者: prolate    時間: 2025-3-25 10:35

作者: slipped-disk    時間: 2025-3-25 11:45
https://doi.org/10.1007/11572329Processing; Scheduling; WLAN; algorithms; architecture; communication; dependable computing; distributed sy
作者: 疲憊的老馬    時間: 2025-3-25 18:46

作者: 大漩渦    時間: 2025-3-25 22:59

作者: 謙卑    時間: 2025-3-26 03:33

作者: agenda    時間: 2025-3-26 06:01
Timed Asynchronous Distributed Systems failure model. The system model defines the semantics of basic services like process and message services of a distributed system. More advanced system services will be based on these basic services. The failure model specifies the likely failures of the basic services, i.e., these are the failures
作者: LUCY    時間: 2025-3-26 08:55

作者: Clinch    時間: 2025-3-26 16:10

作者: glowing    時間: 2025-3-26 19:36
A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Softhas been used by hackers to breach security or simply to crash computer systems. The mere presence inside the software code of a vulnerability that allows for buffer overflow exploitations presents a serious risk. So far, all methodologies devised to mitigate this problem assume source code availabi
作者: Excise    時間: 2025-3-26 21:20
Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension of distributed applications; it provides tools to organize the applications using a layered architecture, with the network(s) at the bottom of the architecture. Neko is also a communication platform that allows sending and receiving of generic Java objects. Distributed systems realized within the N
作者: HATCH    時間: 2025-3-27 02:36

作者: Medicaid    時間: 2025-3-27 05:24
A Method for Modeling and Testing Exceptions in Component-Based Software Developmenttention from existing development methodologies. This work presents a systematic way to deal with exception handling, from the requirement specification phase to the implementation and testing phases, in component-based software development. Testing activities are performed since the early stages of
作者: PRE    時間: 2025-3-27 10:37

作者: 間接    時間: 2025-3-27 16:27
The Zerberus Language: Describing the Functional Model of Dependable Real-Time Systemsem assists the developer in the design and implementation process. Main features of the Zerberus System are generality, dependability, real-time predictability, the ability to be certified and cost-efficiency..The main concept of the Zerberus System is the platform independent specification of the f
作者: membrane    時間: 2025-3-27 19:12
Soft Error Mitigation in Cache Memories of Embedded Systems by Means of a Protected Schemerable to soft errors originated from energetic nuclear particles or electrical sources. This paper proposes a new protected cache scheme, which provides high performance as well as high fault detection coverage. In this scheme, the cache space is divided into sets of different sizes. Here, the lengt
作者: phlegm    時間: 2025-3-27 22:39
On the Effects of Errors During Boot hardware is initialized, and the processor executes the boot loader followed by kernel initialization. For this reason most system support is not yet available and traditional fault-injection techniques such as . cannot be used. Thus our study was based in the processor’s IEEE?1149.1 (boundary-scan
作者: obscurity    時間: 2025-3-28 04:33
A Fault Tolerant Approach to Object Oriented Design and Synthesis of Embedded Systemsject-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network on
作者: overhaul    時間: 2025-3-28 07:26

作者: 蔑視    時間: 2025-3-28 12:25

作者: choleretic    時間: 2025-3-28 17:23

作者: 牛的細微差別    時間: 2025-3-28 22:11

作者: Clinch    時間: 2025-3-29 02:00

作者: JEER    時間: 2025-3-29 07:06

作者: fender    時間: 2025-3-29 10:14
https://doi.org/10.1007/978-981-10-0524-4 the effect of accumulated crashes. On the other hand, to save the energy, nodes should remain sleeping as much as possible. In fact, if the energy consumed with the monitoring process is too high, spare nodes may exhaust their batteries (and the batteries of active nodes) before they are needed..Th
作者: ostensible    時間: 2025-3-29 14:00
City System as a Location Factormmunication load conditions. The training patterns used to feed the neural network were obtained by using Simple Network Management Protocol (SNMP) agents over MIB – Management Information Base variables. The output of such neural network is an estimation for the arrival time for the failure detecto
作者: 殖民地    時間: 2025-3-29 15:36

作者: ticlopidine    時間: 2025-3-29 23:33

作者: 角斗士    時間: 2025-3-30 03:25

作者: 神刊    時間: 2025-3-30 06:53
Probabilistic Validation of Computer System Survivabilityother, are integrated to provide a convincing assurance argument. We then illustrate the IVP by applying it to an intrusion-tolerant information system being developed by the U.S. Department of Defense. In addition to validating the system against high-level survivability requirements, we demonstrat
作者: 漂亮才會豪華    時間: 2025-3-30 08:17

作者: Hiatus    時間: 2025-3-30 16:14

作者: 騷動    時間: 2025-3-30 18:03
Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Executionl-active approach. However, a request that exposes faults among the . replicas will incur a higher latency than the all-active approach mainly due to fault detection latency. Under such conditions, the protocol switches to a recovery mode, in which all 2. + 1 replicas execute the request and send th
作者: 國家明智    時間: 2025-3-30 22:00

作者: 寵愛    時間: 2025-3-31 00:51

作者: 圖表證明    時間: 2025-3-31 05:22

作者: Medicaid    時間: 2025-3-31 10:10
https://doi.org/10.1007/978-981-10-8521-5 development, promoting an increase in the quality of the produced system. Our solution refines the Methodology for the Definition of Exception Behavior, MDCE, in the architectural design, implementation, and testing phases. Moreover, the proposed method was adapted to the UML Components process.
作者: Reverie    時間: 2025-3-31 15:52

作者: Minikin    時間: 2025-3-31 19:02
Springer Series in Design and Innovationr a new method for automatically inserting fault behaviours into OBGG models, which is suitable for using verification as the analysis method, is proposed. Moreover, we show how to formally verify OBGG models in the presence of such faults. A two phase commit protocol is used to illustrate the contributions.
作者: 高度贊揚    時間: 2025-4-1 01:31
Springer Series in Design and Innovationfault-tolerance mechanisms. Thus the task of the developer is restricted to the implementation of the application-dependent code..In this paper we present one major part of the Zerberus System: the Zerberus Language that is used to specify the functional model of the control applications.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
黄浦区| 玉溪市| 武隆县| 馆陶县| 康乐县| 罗定市| 南充市| 阳朔县| 衡山县| 昌都县| 荥经县| 临桂县| 南投市| 遂宁市| 平顶山市| 繁昌县| 疏勒县| 北流市| 门源| 垫江县| 澳门| 台南县| 托里县| 永川市| 富锦市| 南宁市| 双峰县| 韩城市| 巴林右旗| 新余市| 嵊泗县| 正阳县| 五原县| 娱乐| 阿瓦提县| 固原市| 高清| 南漳县| 皮山县| 沐川县| 翁牛特旗|