標題: Titlebook: Engineering in Dependability of Computer Systems and Networks; Proceedings of the F Wojciech Zamojski,Jacek Mazurkiewicz,Janusz Kacprz Conf [打印本頁] 作者: 機會 時間: 2025-3-21 16:59
書目名稱Engineering in Dependability of Computer Systems and Networks影響因子(影響力)
書目名稱Engineering in Dependability of Computer Systems and Networks影響因子(影響力)學科排名
書目名稱Engineering in Dependability of Computer Systems and Networks網絡公開度
書目名稱Engineering in Dependability of Computer Systems and Networks網絡公開度學科排名
書目名稱Engineering in Dependability of Computer Systems and Networks被引頻次
書目名稱Engineering in Dependability of Computer Systems and Networks被引頻次學科排名
書目名稱Engineering in Dependability of Computer Systems and Networks年度引用
書目名稱Engineering in Dependability of Computer Systems and Networks年度引用學科排名
書目名稱Engineering in Dependability of Computer Systems and Networks讀者反饋
書目名稱Engineering in Dependability of Computer Systems and Networks讀者反饋學科排名
作者: trigger 時間: 2025-3-21 20:30
A Comparative Study of Statistical and Neural Network Models for PLC Network Traffic Anomaly Detectsolutions to the problem is detection and classification of abnormal behaviors reflected in the analyzed network traffic. In the presented article we attempt to resolve the problem by anomaly detection in the analyzed network traffic described with the use of three different models. We tested two cl作者: MAG 時間: 2025-3-22 01:06
Spreading Information in Distributed Systems Using Gossip Algorithm,ip protocol are presented. The main goal of the article is to examine and analyze the operation of Gossip algorithm, taking into consideration chosen mode and values of parameters. In the beginning, problem of exchanging information in the distributed system is presented and different algorithms sol作者: 權宜之計 時間: 2025-3-22 05:20 作者: observatory 時間: 2025-3-22 12:45 作者: Texture 時間: 2025-3-22 15:42
Development of the Multi-platform Human-Computer Interaction for Mobile and Wearable Devices,ent of applications dedicated to multiple mobile platforms, FMX enables faster testing at desktop environment, convenient porting the project to another target platform, as well as internationalization and localization of the software. In this paper we discuss the details of several case-studies ill作者: Texture 時間: 2025-3-22 19:57
Tool for Assessment of Testing Effort,amount of expenditures required to test the software, called testing effort, would considerably facilitate the project management process. Early estimation of the test effort, e.g. during design process, can significantly facilitate project management and resources distribution optimization. We made作者: 濕潤 時間: 2025-3-22 23:07 作者: Gentry 時間: 2025-3-23 04:37 作者: opportune 時間: 2025-3-23 09:16
Framework to Verify Distributed IoT Solutions for Traffic Analysis in ATN Stations, their internal states especially needs to be based on new significant scientific solutions. To pursue this goal we propose a dual formalism for a distributed systems being IoT networks. We refer to it as the Integrated Model of Distributed Systems (IMDS), implemented in the Dedan framework. In this作者: Modify 時間: 2025-3-23 10:40
The Picking Process Model in e-Commerce Industry,sional handling and order processing in logistics system. Particularly in the preparation of goods for shipment to the customer..This article describes the model of picking process carried out in accordance with the person-to-goods principle. The person-to-goods principle is currently most commonly 作者: 臭名昭著 時間: 2025-3-23 17:24 作者: conjunctiva 時間: 2025-3-23 20:39 作者: gerontocracy 時間: 2025-3-24 00:21 作者: Offensive 時間: 2025-3-24 06:23 作者: 濃縮 時間: 2025-3-24 07:22 作者: 鋸齒狀 時間: 2025-3-24 10:50
Graph-Based Vehicle Traffic Modelling for More Efficient Road Lighting,s. However, traffic flow can also be modelled with regard to the number of vehicles. This approach can be applied e.g. to dynamic adjustment of street lighting intensity, provided the data is available and comes from a reliable source. This paper proposes a new model – the Traffic Flow Graph – which作者: 落葉劑 時間: 2025-3-24 18:40 作者: Spongy-Bone 時間: 2025-3-24 21:06 作者: 階層 時間: 2025-3-25 00:25
Wojciech Zamojski,Jacek Mazurkiewicz,Janusz KacprzPresents recent research in Complex Systems and Dependability.Gathers the Proceedings of the Fourteenth International Conference on Dependability and Complex Systems (DepCoS-RELCOMEX), held in Brunów,作者: 分解 時間: 2025-3-25 04:28 作者: STELL 時間: 2025-3-25 09:23 作者: 我們的面粉 時間: 2025-3-25 14:28 作者: Spina-Bifida 時間: 2025-3-25 16:30 作者: 責問 時間: 2025-3-25 23:10 作者: TATE 時間: 2025-3-26 04:07 作者: Nefarious 時間: 2025-3-26 07:46
The Future of Product Developmentent of applications dedicated to multiple mobile platforms, FMX enables faster testing at desktop environment, convenient porting the project to another target platform, as well as internationalization and localization of the software. In this paper we discuss the details of several case-studies ill作者: disparage 時間: 2025-3-26 09:12 作者: 有特色 時間: 2025-3-26 14:38
https://doi.org/10.1007/978-3-030-37510-2e communication channel. Currently, in practical applications correspondents are using either one known to them pair of keys (what has negative influence on security), use Public Key Infrastructure or as the simplest solution they are exchanging key through another channel. Additional benefits of ou作者: 煩人 時間: 2025-3-26 18:55 作者: 代理人 時間: 2025-3-26 22:16
https://doi.org/10.1007/978-3-030-16526-0 their internal states especially needs to be based on new significant scientific solutions. To pursue this goal we propose a dual formalism for a distributed systems being IoT networks. We refer to it as the Integrated Model of Distributed Systems (IMDS), implemented in the Dedan framework. In this作者: 地殼 時間: 2025-3-27 01:53 作者: 增減字母法 時間: 2025-3-27 07:18
https://doi.org/10.1007/978-1-349-14797-7perimental research has considered these issues but almost none related to C# programs. This paper examines utilization of Gang-of-Four design patterns combined with results of software metrics calculated on a set of C# programs. The design patterns have been automatically detected in source code. A作者: 江湖騙子 時間: 2025-3-27 10:06 作者: bonnet 時間: 2025-3-27 17:38
https://doi.org/10.1007/978-3-030-76371-8tition of resources, and allocation of tasks and resources, with results obtained from other - known from world literature - algorithms in which partition of resources, task scheduling and allocation of tasks and resources are not run in parallel. This parallelism is described in detail in [.] and i作者: 過濾 時間: 2025-3-27 19:06
https://doi.org/10.1007/978-1-349-20369-7nd allocation resources and scheduling of tasks should be implemented. These problems are computational NP-complete (exact: their decision versions are NP-complete [.]), so CAD procedures usually calculate suboptimal but polynomial solutions. Such procedures are most often based on metaheuristic app作者: 調情 時間: 2025-3-28 01:47 作者: BARB 時間: 2025-3-28 02:56 作者: Coterminous 時間: 2025-3-28 06:49
https://doi.org/10.1007/1-4020-4908-0imes it is possible to affect the disrupted traffic by dispatching actions. Traffic reconfiguration may lead to a quick system recovery, but on the other hand it may lead also to cascade failures and safety infringement. The examination of a recovery strategy is hard to perform due to parameters tha作者: 我不死扛 時間: 2025-3-28 10:53
978-3-030-19500-7Springer Nature Switzerland AG 2020作者: flaunt 時間: 2025-3-28 16:09
Engineering in Dependability of Computer Systems and Networks978-3-030-19501-4Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 不斷的變動 時間: 2025-3-28 21:52
https://doi.org/10.1057/9780230509566The work presents a multi-machine flow shop problem with minimization of the completion time of all tasks. Different temporal couplings concerning machine operation have been proposed, resulting from the analysis of practical cases. Their mathematical models were presented, an exact algorithm and two approximate algorithms were implemented.作者: 裝飾 時間: 2025-3-28 23:16 作者: 衰老 時間: 2025-3-29 04:56
Conference proceedings 2020rything) and online applications, often ?operating in hostile environments. The diversity of topics covered, illustrates the variety of methods used in this area, often with the help of the latest results in artificial and computational intelligence...?.作者: heartburn 時間: 2025-3-29 07:13 作者: Ballerina 時間: 2025-3-29 13:26
https://doi.org/10.1007/978-3-030-16526-0artially deadlocked/terminated. Automated verification supports the rapid development of IoT protocols. In this paper, we also discuss the problem of how the exhaustive search in the process of deadlock detection can be improved by probabilistic search using machine learning.作者: 聲音刺耳 時間: 2025-3-29 19:03 作者: foodstuff 時間: 2025-3-29 22:48 作者: AVANT 時間: 2025-3-30 01:42 作者: 裹住 時間: 2025-3-30 04:29
Spreading Information in Distributed Systems Using Gossip Algorithm,and ten connected computers was examined. Research was made for deferent working modes of Gossip protocol. To present operation and scalability of Gossip algorithm, the mathematical model of the algorithm and graph presenting percentage of infected nodes in individual iterations, is shown. In order 作者: 服從 時間: 2025-3-30 10:47 作者: SEED 時間: 2025-3-30 14:55 作者: Mingle 時間: 2025-3-30 18:05
,The Concept of the ALMM Solver Knowledge Base Retrieval Using Protégé Environment,lasses and related properties of solved problems: axioms and assertions were proposed. An on-line knowledge base representing specific classes of problems together with its own query language can be a scenario for pre-modeling the architecture of the final application. For the ontological architectu作者: insecticide 時間: 2025-3-30 23:10 作者: hidebound 時間: 2025-3-31 01:02
2194-5357 of topics covered, illustrates the variety of methods used in this area, often with the help of the latest results in artificial and computational intelligence...?.978-3-030-19500-7978-3-030-19501-4Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 有抱負者 時間: 2025-3-31 06:24
Engineering in Dependability of Computer Systems and NetworksProceedings of the F作者: Defiance 時間: 2025-3-31 10:35 作者: 溫和女孩 時間: 2025-3-31 16:32 作者: 糾纏,纏繞 時間: 2025-3-31 20:42 作者: Ballad 時間: 2025-3-31 21:44
Scheduling Tasks in a System with a Higher Level of Dependability,ks is prepared on NoC architecture which consists of three processors. In this paper, algorithm of scheduling tasks using new approach to prioritize and prepare ranking of tasks on chosen architecture, is presented.作者: Foment 時間: 2025-4-1 03:06
https://doi.org/10.1057/9780230606906ssessment. The process activities, input and output information, are identified and specified in a pseudocode. The process verification against CEM is performed. The conclusions summarize the verification and propose future works to build the ontology, knowledge base and the vulnerability assessment tool.作者: dermatomyositis 時間: 2025-4-1 08:48 作者: 重疊 時間: 2025-4-1 13:37 作者: 新手 時間: 2025-4-1 16:58
https://doi.org/10.1007/978-94-009-4139-7Zigbee). Base stations will be connected to the Internet using the Ethernet shield. The results indicate that a reliable monitoring system can be designed with appropriate calibration of sensors; this will allow us to continue monitoring the quality of the water at higher spatial resolution.