標題: Titlebook: Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems; Communications of NI Yamine Ait-Ameur,Shin Nak [打印本頁] 作者: 評估 時間: 2025-3-21 16:14
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems影響因子(影響力)
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems影響因子(影響力)學(xué)科排名
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems網(wǎng)絡(luò)公開度
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems被引頻次
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems被引頻次學(xué)科排名
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems年度引用
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems年度引用學(xué)科排名
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems讀者反饋
書目名稱Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems讀者反饋學(xué)科排名
作者: CLIFF 時間: 2025-3-21 22:26
Deriving Implicit Security Requirements in Safety-Explicit Formal Development of Control Systemsurity requirements that are implied by the explicit system-level safety goals. We rely on modelling and refinement in Event-B to systematically uncover mutual interdependencies between safety and security and derive the constraints that should be imposed on the system to guarantee its safety in the presence of accidental and malicious faults.作者: 破裂 時間: 2025-3-22 01:52 作者: VEST 時間: 2025-3-22 07:54 作者: implore 時間: 2025-3-22 09:20 作者: Oafishness 時間: 2025-3-22 16:15 作者: 弄臟 時間: 2025-3-22 18:11
The Indefeasibility Criterion for Assurance Casestended to that there is no (or, more realistically, we cannot imagine any) new information that would cause us to change our evaluation. We explore application of this criterion to the interpretation and evaluation of assurance cases and derive a strict but practical characterization for a sound assurance case.作者: Allodynia 時間: 2025-3-23 00:23 作者: 愛社交 時間: 2025-3-23 04:40
Explicit Exploration of Refinement Design in Proof-Based Approach: Refinement Engineering in Event-B is still an “art.” In this chapter, we discuss the problem of refinement design and present our approach for explicitly exploring and manipulating possible refinement designs. Specifically, we report our experiences on refinement planning and refactoring to support engineering activities on refinement.作者: 苦笑 時間: 2025-3-23 09:02
Book 2021 to specify design models. More precisely, it highlights the advances in handling both implicit and explicit semantics in formal system developments, and discusses different contributions expressing different views and perceptions on the implicit and explicit semantics...The book is based on the dis作者: 的事物 時間: 2025-3-23 10:46
Contextual Dependency in State-Based Modellingded from domains classified into constraints, hypotheses, and dependencies according to truthfulness in proofs. The dependency mechanism between two models makes it possible to structure the development of system models, by organizing phases identified in the analyzed process. We illustrate via two simple case studies and on a voting protocol.作者: 轎車 時間: 2025-3-23 16:59
978-981-15-5056-0Springer Nature Singapore Pte Ltd. 2021作者: 坦白 時間: 2025-3-23 18:27 作者: 搏斗 時間: 2025-3-24 00:38
http://image.papertrans.cn/i/image/462690.jpg作者: 使成核 時間: 2025-3-24 05:01
https://doi.org/10.1007/978-981-15-5054-6State based methods; Logic and formal modelling; Knowledge-based engineering; Ontologies; Domain modelli作者: LAIR 時間: 2025-3-24 09:02 作者: 強化 時間: 2025-3-24 13:23
Modelling an E-Voting Domain for the Formal Development of a Software Product Line: When the Implicifor software and system engineers. Software product line (SPL) techniques offer many advantages for the practical development of reliable and trustworthy e-voting systems, but the composition of system features poses significant problems that can be addressed satisfactorily only through the use of f作者: Hearten 時間: 2025-3-24 16:57
Domain-Specific Developments Using Rodin Theorieseasoning about the extended language. We consider in this chapter using Rodin theories to capture domain-specific Abstract Data Types (ADTs) and build dynamic systems using the developed structures. In particular, we propose the notion of theory instantiation to incorporate more concrete representat作者: menopause 時間: 2025-3-24 22:24
Integrating Domain Modeling Within a Formal Requirements Engineering Methodo domain properties. This paper describes a metamodel for a domain modeling language built from . and .. The language is part of the . requirements engineering method which also includes a goal modeling language. The formal semantics of SysML/KAOS models is specified, verified, and validated using t作者: Fibroid 時間: 2025-3-25 02:05
Operations over Lightweight Ontologies and Their Implementationtions help define new ontologies by reusing fragments of other ontologies, the . operation constructs the constraints that hold in two ontologies, and the . operation returns the constraints that hold in one ontology, but not in the other. Then, the chapter discusses how to implement the operations 作者: Functional 時間: 2025-3-25 05:45
Formal Ontological Analysis for Medical Protocols of guidelines and protocols is lacking in quality. Indeed, ambiguity and incompleteness are likely anomalies in medical practice. In order to find anomalies and to improve the quality of medical protocols, this paper presents a stepwise formal development of a medical protocol. In this development,作者: 暫時中止 時間: 2025-3-25 09:20
Deriving Implicit Security Requirements in Safety-Explicit Formal Development of Control Systems should guarantee that the system safety is not jeopardised by the security attacks. However, often the security requirements are not uncovered until the late design stages. Hence, there is a clear need for the modelling techniques that enable a formal reasoning about safety and security interdepend作者: 厚顏 時間: 2025-3-25 11:44 作者: Terminal 時間: 2025-3-25 16:51 作者: Protein 時間: 2025-3-26 00:04 作者: seduce 時間: 2025-3-26 01:24
Configuration of Complex Systems—Maintaining Consistency at Runtimesystem, e.g., platform, middleware, etc. To form a consistent system configuration, these independently developed configurations, also known as partial configurations or configuration fragments, need to be integrated together. This integration is a challenging task, mainly because of overlapping ent作者: cushion 時間: 2025-3-26 07:09 作者: CREEK 時間: 2025-3-26 09:13
The Indefeasibility Criterion for Assurance Casesd the best we humans can achieve is well-justified belief. So what justification should be considered adequate for a belief in safety? We adopt a criterion from epistemology and argue that assurance should be “indefeasible,” meaning that we must be so sure that all doubts and objections have been at作者: ALLEY 時間: 2025-3-26 14:21 作者: 中止 時間: 2025-3-26 20:13
Explicit Exploration of Refinement Design in Proof-Based Approach: Refinement Engineering in Event-Bndability assurance have been used to explore this point by using refinement mechanisms, with which complex models are gradually constructed and verified. However, refinement mechanisms to derive the whole specification of systems are relatively new, as with the Event-B method, and refinement design作者: 定點 時間: 2025-3-26 21:15
Inna Vistbakka,Elena Troubitsynatributors: F. Bogomolov; T. Petrov; Y. Tschinkel; Ch. B?hning; G. Catanese; I. Cheltsov; J. Park; N. Hoffmann; S. J. Hu; M. C. Kang; L. Katzarkov; Y. Prokhorov; A. Pukhlikov.978-0-8176-4934-0Series ISSN 0743-1643 Series E-ISSN 2296-505X 作者: Atmosphere 時間: 2025-3-27 04:31 作者: 羽飾 時間: 2025-3-27 09:14
Neeraj Kumar Singh,Yamine Ait-Ameur,Dominique Méry作者: 頑固 時間: 2025-3-27 10:03 作者: 基因組 時間: 2025-3-27 13:51
Badr Siala,Jean-Paul Bodeveix,Mamoun Filali,Mohamed Tahar Bhiri作者: avenge 時間: 2025-3-27 19:27
Fuyuki Ishikawa,Tsutomu Kobayashi,Shinichi Honiden作者: 感染 時間: 2025-3-28 01:06
Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete SystemsCommunications of NI作者: placebo-effect 時間: 2025-3-28 03:31 作者: 招募 時間: 2025-3-28 07:37 作者: 外形 時間: 2025-3-28 10:24 作者: nutrients 時間: 2025-3-28 15:59
Towards an Integration of Probabilistic and Knowledge-Based Data Analysis Using Probabilistic Knowleaximum entropy semantics for the probabilistic logic the fixed-point construction can be extended resulting in a probabilistic model, i.e. distributions for the randomised relations. It is expected that statistical approaches to data analysis can be interpreted in the context of probabilistic knowle作者: 內(nèi)疚 時間: 2025-3-28 21:11 作者: Fortuitous 時間: 2025-3-29 02:20
Towards Making Safety Case Arguments Explicit, Precise, and Well Foundedis calculus. Moreover, we look into the essential role that evidence plays in safety arguments. Evidence sets apart safety arguments from their traditional logical counterpart, as assumptions in safety arguments must be grounded on (i.e., justified by) data from the empirical world. We present our t作者: 使顯得不重要 時間: 2025-3-29 03:55
Book 2021based modelling, and offers inspiration for researchers and practitioners in the fields of formal methods, system and software engineering, domain knowledge modelling, requirement analysis, and explicit and implicit semantics of modelling languages..作者: Throttle 時間: 2025-3-29 08:12 作者: Musculoskeletal 時間: 2025-3-29 11:42
Humanity-Embedded Service Science Educationitute of Service Science (ISS) in National Tsing Hua University (Taiwan) established in 2008 is the first institute dedicated for Service Science research and education in Taiwan. The master and doctoral programs were designed for interdisciplinary studies of Service Science composed of service mana作者: Crohns-disease 時間: 2025-3-29 17:26
Cross-Domain Local Characteristic Enhanced Deepfake Video Detectionot achieve accurate results when detecting unseen manipulations despite excellent performance on known forgeries. In this paper, we are motivated by the observation that the discrepancies between real and fake videos are extremely subtle and localized, and inconsistencies or irregularities can exist作者: 節(jié)省 時間: 2025-3-29 23:09
Developing Telerehabilitation in Low-Income Countries During COVID-19: Commencement and Acceptabilit-19 epidemic. Demand for digital health services like telemedicine and telerehabilitation has been increasing rapidly due to the COVID-19 factors (e.g., isolation, lockdown) in play. Though telemedicine in lower-income countries like Bangladesh has a little history, telerehabilitation is quite new a作者: dialect 時間: 2025-3-30 00:30
Shunt Lesionsemic vascular resistances which is secondary to the growth of the fetoplacental unit, and left to right shunt decreases. Left-to-right shunt lesions are, thus, considered to be low risk. Despite this, risk of fetal and maternal complications is higher than in the general population. Vaginal delivery作者: 羊欄 時間: 2025-3-30 07:36
ITS Performance Evaluation in Direct Short-Range Communication (IEEE 802.11p) and Cellular Network (5G) (TCP vs UDP)d road safety. Lately, a considerable progress has been made in the radio access technologies for vehicular communication, including Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) technologies. An extensive set of related pilot use-cases have been developed, each pilot use-case with it作者: Flagging 時間: 2025-3-30 10:16 作者: 提名的名單 時間: 2025-3-30 14:54 作者: abduction 時間: 2025-3-30 16:41
Assessing the Usefulness of Information in the Context of Coalition Operations. Specifically, the degree of usefulness of a piece of information is a multifaceted notion which takes into account the fact that it represents potential interest for the user with respect to his request, has the required security clearance level, can be accessed in time and understood by the user, and can be trusted by the user at a given level.作者: fulmination 時間: 2025-3-30 21:05
https://doi.org/10.1007/978-1-4302-1852-4a query rate of 1000 queries per second, and assuming each node is capable of indexing 0.1% of the collection, our analysis indicates that the network traffic is less that 0.07% of global internet traffic.作者: Lipoma 時間: 2025-3-31 01:44
Muslim Kuzbagarov,Askhat Kuzbagarov,Ruslan Akhmedovs and object detection on color images, respectively. To evaluate the benefit of joining color and depth information of multiple cameras, we recorded a novel dataset with four Kinects showing significant improvements over a DPM baseline for 9 object classes aggregated in challenging scenes. In contr作者: confederacy 時間: 2025-3-31 08:36
The Classical African Concept of Maat and Human Communicationommunication within the context of tradition, community, and values. This is why I am proposing a Maatic theory of communication grounded in the ancient classical African idea of ethics (Karenga, .. New York: Routledge, 2003; Asante, .. New York: Universal Write, 2016).作者: 不愿 時間: 2025-3-31 11:07 作者: Outwit 時間: 2025-3-31 17:20
Book 2022 wendete es in einer Studie mit Lehramtsstudierenden, Referendar*innen und Lehrkr?ften an. Sie entwickelt einen Vorschlag für eine Zielvorstellung für die universit?re Lehramtsausbildung für den Umgang von Lehrkr?ften mit Diskontinuit?t im Bereich der Linearen Algebra. Dieser greift eine bestehende 作者: Defraud 時間: 2025-3-31 19:35
The Beginning,istakes at first —you’re on a course to help you learn about aspects of office life. Each assignment contains an Assessment list which tells you what your lecturer is looking for in your work. Then comes the situation you are to imagine yourself in (it may be real-life!) followed by various practica作者: Subdue 時間: 2025-3-31 22:01