書目名稱Dependable Computing for Critical Applications 4影響因子(影響力)學(xué)科排名
書目名稱Dependable Computing for Critical Applications 4網(wǎng)絡(luò)公開度
書目名稱Dependable Computing for Critical Applications 4網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Dependable Computing for Critical Applications 4被引頻次
書目名稱Dependable Computing for Critical Applications 4被引頻次學(xué)科排名
書目名稱Dependable Computing for Critical Applications 4年度引用
書目名稱Dependable Computing for Critical Applications 4年度引用學(xué)科排名
書目名稱Dependable Computing for Critical Applications 4讀者反饋
書目名稱Dependable Computing for Critical Applications 4讀者反饋學(xué)科排名
作者: choleretic 時(shí)間: 2025-3-21 23:11
Springer Series in Surface Sciencesailures from consistency conditions, and a . strategy that gives a best estimate of boiler level in light of the reported failures. These strategies are generic and could be used in other safety-critical applications.作者: Harass 時(shí)間: 2025-3-22 02:45 作者: 過(guò)剩 時(shí)間: 2025-3-22 07:57
Ling Hong,Yingwu Zhang,Jun Jiangisory-control systems that are intended for use in such critical missions. The Secure Alpha[3] approach to addressing these conflicts is introduced.. A prototype tradeoff mechanism is described, as are the results of testing the mechanism.作者: 燕麥 時(shí)間: 2025-3-22 09:55 作者: Gustatory 時(shí)間: 2025-3-22 15:35
Using Data Consistency Assumptions to Show System Safetyailures from consistency conditions, and a . strategy that gives a best estimate of boiler level in light of the reported failures. These strategies are generic and could be used in other safety-critical applications.作者: Gustatory 時(shí)間: 2025-3-22 20:56
A Role for Formal Methodistsven with mechanical support, designing a large proof is at least as difficult as designing a large program. We are barely up to the task of building large and complex systems that almost work; we are certainly not up to building such systems twice — once in a programming language and once in a logic — without any flaws at all.作者: 同步左右 時(shí)間: 2025-3-22 22:43 作者: 磨碎 時(shí)間: 2025-3-23 02:30
Fault-Detecting Network Membership Protocols for Unknown Topologies and group membership:.The key issue of our solution is the application of special cryptographic functions instead of usual signatures for message authentication. According to the unlimited fault number the protocol is only fault-detecting, not tolerating.作者: 強(qiáng)化 時(shí)間: 2025-3-23 09:00
A. Yoshimori,K. Makoshi,H. Kawaiol program. The main difficulty is perhaps unsurprising: it is very hard to bridge the divide between theoretical computer science (the needs of formal methods) and engineering practice (in this case, the needs of signal engineers).作者: faddish 時(shí)間: 2025-3-23 13:09
Chaos and the Theory of Electionsisms. We provide examples to illustrate the use of our approach in examining the weaknesses of message integrity protection mechanisms, and also in suggesting modifications in their design parameters.作者: 沉默 時(shí)間: 2025-3-23 13:56
Formal Methods for Safety in Critical Systemsol program. The main difficulty is perhaps unsurprising: it is very hard to bridge the divide between theoretical computer science (the needs of formal methods) and engineering practice (in this case, the needs of signal engineers).作者: 歡樂(lè)東方 時(shí)間: 2025-3-23 20:44
Reasoning about Message Integrityisms. We provide examples to illustrate the use of our approach in examining the weaknesses of message integrity protection mechanisms, and also in suggesting modifications in their design parameters.作者: RAG 時(shí)間: 2025-3-23 23:27
Conference proceedings 1995in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on comput作者: 山頂可休息 時(shí)間: 2025-3-24 04:44
?emal B. Doli?anin,Anatolij B. Antonevichocess augments the traditional review process by providing for frequent monitoring of specific critical attributes of the evolving fault-tolerant design. It uses metrics designed to monitor core features of the fault-tolerant design and their interaction with other system features.作者: Platelet 時(shí)間: 2025-3-24 09:22 作者: invulnerable 時(shí)間: 2025-3-24 10:50 作者: 通知 時(shí)間: 2025-3-24 16:21 作者: 老巫婆 時(shí)間: 2025-3-24 21:52 作者: Sedative 時(shí)間: 2025-3-24 23:56 作者: 偽造 時(shí)間: 2025-3-25 04:15
Can we rely on Formal Methods?e systems is obviously a matter of concern to those involved in building or using such systems. We can also agree that there is a major gap between the reliability levels that are required of these systems and those that are obtainable using traditional hardware and software design methods. The basi作者: 不幸的人 時(shí)間: 2025-3-25 09:37
A Role for Formal Methodistssystem satisfies a non-trivial specification requires a large proof. Without mechanical support, building or checking such a proof is not practical. Even with mechanical support, designing a large proof is at least as difficult as designing a large program. We are barely up to the task of building l作者: 深淵 時(shí)間: 2025-3-25 13:18
Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler the data. The conflicts between computer security requirements and timeliness requirements are described in the context of large, distributed, supervisory-control systems that are intended for use in such critical missions. The Secure Alpha[3] approach to addressing these conflicts is introduced.. 作者: 嘲笑 時(shí)間: 2025-3-25 18:09
Fault-Detecting Network Membership Protocols for Unknown Topologiesnder a general combination of assumptions, which goes beyond known approaches in the fields of network exploration, distributed system level diagnosis and group membership:.The key issue of our solution is the application of special cryptographic functions instead of usual signatures for message aut作者: 輕率看法 時(shí)間: 2025-3-25 23:34 作者: 受人支配 時(shí)間: 2025-3-26 00:55 作者: Cosmopolitan 時(shí)間: 2025-3-26 07:53 作者: 拋物線 時(shí)間: 2025-3-26 11:58 作者: 事情 時(shí)間: 2025-3-26 16:31
On Managing Fault-Tolerant Design Risksf formal reviews and tests to assess the design’s correctness and compliance with requirements. Typically, there are no established formal procedures for monitoring the progress of the design during the implementation phase, the interval between the review and approval of the “paper” design and the 作者: Emmenagogue 時(shí)間: 2025-3-26 18:09
On Doubly Guarded Multiprocessor Control System Designit reacts to spontaneous changes of the controlled process and its environment with minimal delay and it is insensitive to a large class of random processor malfunctions. Both properties improve with increased number of processors involved.作者: 不要嚴(yán)酷 時(shí)間: 2025-3-27 00:26
Formal Methods Panel: Are Formal Methods Ready for Dependable Systems? a few deployed systems. Nevertheless, formal methods have been successfully used on increasingly difficult research problems over the last 5–10 years. A key question arises: “Have we finally reached the place where the transfer of this technology to industry is practical?”作者: 逃避責(zé)任 時(shí)間: 2025-3-27 03:29
Denial of Service: A Perspectivets that drive current research have already been clarified to some extent by prior work. We summarize the general conclusions that have emerged, and assess their implications for the development of denial-of-service protection requirements and the guidance of future research.作者: 極肥胖 時(shí)間: 2025-3-27 07:50 作者: 變量 時(shí)間: 2025-3-27 12:29
https://doi.org/10.1007/978-3-7091-9396-9Mathematica; computer; formal method; formal methods; logic; mathematical logic; safety作者: NAIVE 時(shí)間: 2025-3-27 14:50
978-3-7091-9398-3Springer-Verlag/Wien 1995作者: Infant 時(shí)間: 2025-3-27 19:04 作者: keloid 時(shí)間: 2025-3-27 22:54
https://doi.org/10.1007/978-3-642-82423-4The views expressed in this paper are those of the author and do not necessarily reflect the position of Collins Commercials Avionics or Rockwell International.作者: NAV 時(shí)間: 2025-3-28 06:09 作者: Orthodontics 時(shí)間: 2025-3-28 08:26
Dependable Computing for Critical Applications 4978-3-7091-9396-9Series ISSN 0932-5581 作者: Hypomania 時(shí)間: 2025-3-28 13:15 作者: MONY 時(shí)間: 2025-3-28 17:40 作者: 門閂 時(shí)間: 2025-3-28 20:01 作者: Pigeon 時(shí)間: 2025-3-29 00:01
Alexander B. Kurzhanski,Karl Sigmundalysis of protocol property dependencies. We provide examples to show that, without dependency analysis, the use of some logics for cryptographic protocol analysis yields results that are inconsistent or unrealistic in practice. We identify several types of property dependencies whose use in protocol analysis methods can yield realistic analyses.作者: perimenopause 時(shí)間: 2025-3-29 05:20
https://doi.org/10.1007/978-3-540-76376-5it reacts to spontaneous changes of the controlled process and its environment with minimal delay and it is insensitive to a large class of random processor malfunctions. Both properties improve with increased number of processors involved.作者: conscience 時(shí)間: 2025-3-29 09:43
Springer Series in Surface Sciencess within its safe range by assuming that device failures result in inconsistent readings. Key parts of our approach are a . strategy that determines failures from consistency conditions, and a . strategy that gives a best estimate of boiler level in light of the reported failures. These strategies a作者: Demulcent 時(shí)間: 2025-3-29 15:28
R. K. Bullough,D. J. Pilling,J. T. Timonen a few deployed systems. Nevertheless, formal methods have been successfully used on increasingly difficult research problems over the last 5–10 years. A key question arises: “Have we finally reached the place where the transfer of this technology to industry is practical?”作者: Formidable 時(shí)間: 2025-3-29 19:31
A. Yoshimori,K. Makoshi,H. Kawaithese methods in the analysis of certain aspects of a computer controlled railway signalling system. In seeking to improve confidence in the design and overall safety of these systems, the challenge was to implement a means to mechanically verify the correctness of the data driving the generic contr作者: blithe 時(shí)間: 2025-3-29 23:14 作者: Obituary 時(shí)間: 2025-3-30 03:36