派博傳思國際中心

標(biāo)題: Titlebook: Dependable Computing – EDCC 2024 Workshops; SafeAutonomy, TRUST Behrooz Sangchoolie,Rasmus Adler,Adriano Mancini Conference proceedings 20 [打印本頁]

作者: ominous    時間: 2025-3-21 18:56
書目名稱Dependable Computing – EDCC 2024 Workshops影響因子(影響力)




書目名稱Dependable Computing – EDCC 2024 Workshops影響因子(影響力)學(xué)科排名




書目名稱Dependable Computing – EDCC 2024 Workshops網(wǎng)絡(luò)公開度




書目名稱Dependable Computing – EDCC 2024 Workshops網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Dependable Computing – EDCC 2024 Workshops被引頻次




書目名稱Dependable Computing – EDCC 2024 Workshops被引頻次學(xué)科排名




書目名稱Dependable Computing – EDCC 2024 Workshops年度引用




書目名稱Dependable Computing – EDCC 2024 Workshops年度引用學(xué)科排名




書目名稱Dependable Computing – EDCC 2024 Workshops讀者反饋




書目名稱Dependable Computing – EDCC 2024 Workshops讀者反饋學(xué)科排名





作者: 細(xì)微的差異    時間: 2025-3-22 00:11

作者: Bravado    時間: 2025-3-22 02:40
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/265716.jpg
作者: Sigmoidoscopy    時間: 2025-3-22 08:12
STARS: A Tool for?Measuring Scenario Coverage When Testing Autonomous Robotic Systemsthe automotive domain. To enable statements on the absolute number or fractions of tested scenarios, methods and tools for computing their coverage are needed. In this paper, we present STARS, a tool for specifying semantic environment features and measuring scenario coverage when testing autonomous systems.
作者: Thyroiditis    時間: 2025-3-22 10:45
https://doi.org/10.1007/978-3-0348-9236-0testing methods, become infeasible. Virtual testing seems like a promising alternative to traditional methods, especially as part of a scenario-based verification and validation methodology. But in order to transfer the test results of a system from a simulation to the real world, we need to argue t
作者: amygdala    時間: 2025-3-22 15:49

作者: amygdala    時間: 2025-3-22 20:44

作者: 不可接觸    時間: 2025-3-23 00:46

作者: Synchronism    時間: 2025-3-23 04:23
Linear Discrete Dynamical Systems,an be not avoided, system-specific instantiations of assurance case patterns are both costly and time-consuming. It becomes especially complex to maintain an assurance case for a system when the requirements of the System-Under-Assurance change, or an assurance claim becomes invalid due to, e.g., de
作者: Paradox    時間: 2025-3-23 06:05
Computational Dynamical Systems Using XPPAUTthe automotive domain. To enable statements on the absolute number or fractions of tested scenarios, methods and tools for computing their coverage are needed. In this paper, we present STARS, a tool for specifying semantic environment features and measuring scenario coverage when testing autonomous
作者: 反對    時間: 2025-3-23 11:38
Johan M. Tuwankotta,Eric Harjanto,Livia Owener systems. PMUs, being cyber-physical devices, are susceptible to cyber-attacks, such as false data injection (FDI). As FDI can lead to incorrect state estimation and subsequent destructive impacts, the prompt detection of falsified data is crucial to preclude such adverse outcomes. In response to
作者: POWER    時間: 2025-3-23 13:56
Johan M. Tuwankotta,Eric Harjanto,Livia Oweney solutions to reduce the operational cost of the future energy system. Therefore, the local and intelligent principles of microgrids in which users can directly exchange energy with other local users via peer-to-peer energy trading functionalities for flexible energy management are of paramount im
作者: 整頓    時間: 2025-3-23 18:24

作者: 放逐    時間: 2025-3-23 23:43
Hyperbolicity and Structural Stability,ct fundamental human rights following the opportunities and addressing challenges, even threats, presented by AI applications in everyday life. It aims to set future-proof and innovation-friendly standards, draft legal frameworks, develop new global norms, and harmonize landmark rules to ensure AI c
作者: maladorit    時間: 2025-3-24 04:30

作者: Keshan-disease    時間: 2025-3-24 07:19

作者: Urea508    時間: 2025-3-24 14:24
https://doi.org/10.1007/978-3-031-56776-6artificial intelligence; blockchain; energy trading; demand response; cyber security; forecasting; deep le
作者: 金絲雀    時間: 2025-3-24 16:51

作者: 新奇    時間: 2025-3-24 20:52
Providing Evidence for?the?Validity of?the?Virtual Verification of?Automated Driving Systemstesting methods, become infeasible. Virtual testing seems like a promising alternative to traditional methods, especially as part of a scenario-based verification and validation methodology. But in order to transfer the test results of a system from a simulation to the real world, we need to argue t
作者: cogitate    時間: 2025-3-25 00:51
What Level of?Power Should We Give an?Automation?e human-machine interface. This is particularly important in safety-critical applications, where the multi-faceted interaction between the automated system and humans must be carefully analyzed to identify potential risks to the overall safety. This paper presents our vision of an approach determini
作者: Collar    時間: 2025-3-25 05:12

作者: Ingest    時間: 2025-3-25 09:31
Defining an?Effective Context for?the?Safe Operation of?Autonomous Systemsystem (AS). For traditional systems, a human is trusted to provide an oversight of operations, and react safely to unexpected scenarios that occur. For AS we cannot necessarily rely on human oversight to handle unexpected events, and must therefore be more confident that all possible hazardous scena
作者: ascetic    時間: 2025-3-25 12:46
Towards Continuous Assurance Case Creation for?ADS with?the?Evidential Tool Busan be not avoided, system-specific instantiations of assurance case patterns are both costly and time-consuming. It becomes especially complex to maintain an assurance case for a system when the requirements of the System-Under-Assurance change, or an assurance claim becomes invalid due to, e.g., de
作者: 小鹿    時間: 2025-3-25 16:13
STARS: A Tool for?Measuring Scenario Coverage When Testing Autonomous Robotic Systemsthe automotive domain. To enable statements on the absolute number or fractions of tested scenarios, methods and tools for computing their coverage are needed. In this paper, we present STARS, a tool for specifying semantic environment features and measuring scenario coverage when testing autonomous
作者: 哺乳動物    時間: 2025-3-25 23:51
Spatial-Temporal Graph Neural Network for Detecting and Localizing Anomalies in PMU Networkser systems. PMUs, being cyber-physical devices, are susceptible to cyber-attacks, such as false data injection (FDI). As FDI can lead to incorrect state estimation and subsequent destructive impacts, the prompt detection of falsified data is crucial to preclude such adverse outcomes. In response to
作者: 剛毅    時間: 2025-3-26 02:44

作者: 使尷尬    時間: 2025-3-26 07:35
Power System Transient Stability Prediction in the Face of Cyber Attacks: Employing LSTM-AE to Combawidely used in transient stability prediction (TSP), significantly contributing to the effective maintenance of power systems post-contingency stability. The accuracy and reliability of data derived from PMUs are crucial for the effective execution of TSP. However, the PMU data is at risk of being c
作者: CBC471    時間: 2025-3-26 11:04

作者: Salivary-Gland    時間: 2025-3-26 15:34
An Exploratory Study on Trust in Blockchain-Enabled Energy Tradingrids. The research highlights the various benefits BCT brings to P2P energy trading, such as improved efficiency, cost reduction, and the optimization of renewable energy distribution. However, it also identifies significant barriers to the contribution of BCT to the removal of trust in this context
作者: 提名    時間: 2025-3-26 17:11
Inspecting Bridges and?Critical Infrastructure: An AI and?Blockchain Approachde. Traditional inspection methods are often time-consuming, prone to human error, and can be economically taxing. The advent of advanced technologies such as Artificial Intelligence (AI) and blockchain offers a transformative approach to inspecting and maintaining these structures. In this extended
作者: 指派    時間: 2025-3-26 22:11
A Physics-Based Fault Tolerance Mechanism for?UAVs’ Flight Controllertion, enables real-time and precise estimation of the drone’s position in faulty conditions throughout a mission. Thus, the physics model’s values can replace the erroneous GPS input values. The results obtained through our experiments, conducted using fault-injection techniques in a simulated envir
作者: occult    時間: 2025-3-27 04:19

作者: 解凍    時間: 2025-3-27 07:44
Towards Continuous Assurance Case Creation for?ADS with?the?Evidential Tool Bus present the formalization of the provided assurance case pattern in the . processable logical specification language of workflows. Our findings, show that . is able to create and maintain evidence required for the construction of an assurance case.
作者: prostate-gland    時間: 2025-3-27 11:12
Spatial-Temporal Graph Neural Network for Detecting and Localizing Anomalies in PMU NetworksUs, thereby enhancing its precision in detecting and pinpointing anomalies, even under sophisticated stealth false data injection attacks. The performance of this framework has been thoroughly evaluated on two IEEE test systems, the 39-bus and 127-bus systems, across a variety of attack scenarios. T
作者: 壓迫    時間: 2025-3-27 15:08
On the Application of Blockchain Technology in Microgridssystem. By overviewing the available literature on the application of blockchain technology, this article also aims to provide a critical view on the applicability of this particular technology for peer-to-peer energy trading purposes.
作者: Ceramic    時間: 2025-3-27 19:34
Power System Transient Stability Prediction in the Face of Cyber Attacks: Employing LSTM-AE to Combaoficiently capture and learn the normative spatial and temporal correlations and patterns present in time-series PMU data, across both steady-state and transient operational states. Consequently, this approach facilitates the algorithmic reconstruction and rectification of PMU measurements that have
作者: reflection    時間: 2025-3-27 22:01

作者: 含水層    時間: 2025-3-28 02:50

作者: Erythropoietin    時間: 2025-3-28 06:45

作者: Texture    時間: 2025-3-28 13:34

作者: Flounder    時間: 2025-3-28 16:22
A Tutorial Introduction to Maple,aches to defining the CSO for AS are generally seen to be disjoint (in that each of the elements is considered and specified in isolation) and lacking in focus (in that the level of detail is found to be inconsistent and often inappropriate). What is required therefore is a targeted, iterative and i
作者: 人類學(xué)家    時間: 2025-3-28 20:50
Linear Discrete Dynamical Systems, present the formalization of the provided assurance case pattern in the . processable logical specification language of workflows. Our findings, show that . is able to create and maintain evidence required for the construction of an assurance case.
作者: 絕食    時間: 2025-3-29 02:41

作者: Glossy    時間: 2025-3-29 03:56

作者: peritonitis    時間: 2025-3-29 10:49

作者: sigmoid-colon    時間: 2025-3-29 13:10
Hyperbolicity and Structural Stability,rating potential danger, clear threat, and causing unacceptable risk. Several countries worldwide (Australia, Brazil, Canada, China, India, Japan, Korea, New Zealand, Saudi Arabia, Singapore, the United Kingdom, and the USA) have adopted a proactive approach toward AI regulation. Those countries aim
作者: 壓倒性勝利    時間: 2025-3-29 18:38
A looming detector for collision avoidance able to remove the need for trust and trusted intermediaries in P2P energy trading and calls for more qualitative research to assess the actual impact of BCT on trust in P2P energy trading and to compare traditional and blockchain-based systems in this domain.
作者: 道學(xué)氣    時間: 2025-3-29 23:44
Dynamical Systems of Algebraic Originng an appropriate level of automation taking into account the automation’s impact on the human. The approach is based on a game theoretic framework where we investigate whether the automation’s controller can be synthesized as a strategy considering human behavior and thus ensuring human-adaptive control.
作者: 旅行路線    時間: 2025-3-30 03:32

作者: 干旱    時間: 2025-3-30 07:34
Conference proceedings 2024egular technical papers, case studies, PhD forum papers, as well as position papers. They deal with?latest research results?on theory, techniques, systems, and tools for the design, validation, operationand evaluation of dependable and secure computing systems.?.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
杨浦区| 鹤庆县| 朝阳县| 四子王旗| 东山县| 胶南市| 郑州市| 东源县| 台中县| 安义县| 通许县| 木兰县| 麻江县| 锦州市| 苍梧县| 扶风县| 天祝| 宁海县| 兴宁市| 西昌市| 融水| 凉城县| 湖南省| 洛南县| 元朗区| 嵊泗县| 航空| 福海县| 沁源县| 平舆县| 繁昌县| 托克托县| 刚察县| 瓮安县| 潢川县| 瓦房店市| 望城县| 江华| 彭山县| 临泉县| 富蕴县|