派博傳思國(guó)際中心

標(biāo)題: Titlebook: New Results in Dependability and Computer Systems; Proceedings of the 8 Wojciech Zamojski,Jacek Mazurkiewicz,Janusz Kacprz Conference proce [打印本頁(yè)]

作者: 力學(xué)    時(shí)間: 2025-3-21 16:44
書目名稱New Results in Dependability and Computer Systems影響因子(影響力)




書目名稱New Results in Dependability and Computer Systems影響因子(影響力)學(xué)科排名




書目名稱New Results in Dependability and Computer Systems網(wǎng)絡(luò)公開度




書目名稱New Results in Dependability and Computer Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱New Results in Dependability and Computer Systems被引頻次




書目名稱New Results in Dependability and Computer Systems被引頻次學(xué)科排名




書目名稱New Results in Dependability and Computer Systems年度引用




書目名稱New Results in Dependability and Computer Systems年度引用學(xué)科排名




書目名稱New Results in Dependability and Computer Systems讀者反饋




書目名稱New Results in Dependability and Computer Systems讀者反饋學(xué)科排名





作者: circumvent    時(shí)間: 2025-3-21 20:26
New Results in Dependability and Computer Systems978-3-319-00945-2Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 不規(guī)則的跳動(dòng)    時(shí)間: 2025-3-22 02:01

作者: Repatriate    時(shí)間: 2025-3-22 05:16
Technical and Program Aspects on Monitoring of Highway Flows (Case Study of Moscow City),ity network (based on case study of Moscow). We discuss one of collect data method based on network of microwave radar SSHD, installed in Moscow last year. Acquiring data allow to analyze of traffic jam causes and to evaluate approximately economic losses for typical junctions of road network.
作者: 撫慰    時(shí)間: 2025-3-22 08:50

作者: insurrection    時(shí)間: 2025-3-22 14:16

作者: 石墨    時(shí)間: 2025-3-22 20:38

作者: 轎車    時(shí)間: 2025-3-23 00:18

作者: ALIBI    時(shí)間: 2025-3-23 04:16

作者: 撫慰    時(shí)間: 2025-3-23 06:50
Jacek Bagińskiive institutions evolved in an almost incremental and partly erratic manner, institution building in former East Germany (GDR) was shaped by a massive . in that the entire legal and administrative model of former West Germany (FRG) was ‘ready-made’ and literally overnight exported and implanted in t
作者: Duodenitis    時(shí)間: 2025-3-23 09:49

作者: 變白    時(shí)間: 2025-3-23 17:08

作者: 類似思想    時(shí)間: 2025-3-23 20:04
M. G. Gorodnichev,A. N. Nigmatulin stations through interviews, observation, focus group discussions, and document review and was analysed using thematic analysis. The five themes that emerged from the data indicated that convergence between digital media and community radio offers multiple platforms of engagement such as social med
作者: dapper    時(shí)間: 2025-3-23 22:57
Franciszek Grabskithree sets of data: Parliament Hansards (596), newspaper articles (1625) and semi-structured interviews (10) in which members of the African National Congress (ANC), the Democratic Alliance (DA), the Economic Freedom Fighters (EFF) and the Congress of South African Trade Unions (COSATU) were consult
作者: 失敗主義者    時(shí)間: 2025-3-24 06:05
saster“ in Unternehmen ungesch?nt beim Namen nennen und ungemütliche Fragen aufwerfen. Die Autoren wissen, wovon sie sprechen. Und das zeigen sie hier mit gro?er Leidenschaft.“.Thomas Blank, Chief Executive Off978-3-658-03286-9978-3-658-03287-6
作者: Conduit    時(shí)間: 2025-3-24 07:20

作者: 怕失去錢    時(shí)間: 2025-3-24 14:26
2194-5357 lligentand soft computing methods.The submissions included in this volume illustrate variety of problems that need to be explored in the dependability analysis: methodologies and practical tools for modeling, d978-3-319-00944-5978-3-319-00945-2Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: circumvent    時(shí)間: 2025-3-24 15:05
Fernando Dettoni,Lau Cheuk Lung,Aldelir Fernando Luiz
作者: Recessive    時(shí)間: 2025-3-24 20:52

作者: 討厭    時(shí)間: 2025-3-25 01:35
Improving of Non-Interactive Zero-Knowledge Arguments Using Oblivious Transfer,tely to 5./(3.+1) times or reduce the soundness probability of NIZK arguments to the same degree. The above factor for single use NIZK is about two that corresponds to almost quadratic decreasing of soundness probability. For NIZK argument using .+1-out-of-2. OT (.>1), it is shown that its soundness
作者: 可憎    時(shí)間: 2025-3-25 06:16

作者: BILE    時(shí)間: 2025-3-25 11:26
Conference proceedings 2013ty of Technology, since 2006. Its idea came from the heritage of the other two cycles of events: RELCOMEX Conferences (1977 – 89) and Microcomputer Schools (1985 – 95) which were then organized by the Institute of Engineering Cybernetics, the previous name of CECR. In contrast to those preceding mee
作者: 改正    時(shí)間: 2025-3-25 13:44
2194-5357 DepCoS-RELCOMEX 2013 held in Brunow Palace, Wroclaw, PolandDepCoS – RELCOMEX is an annual series of conferences organized by the Institute of Computer Engineering, Control and Robotics (CECR), Wroc?aw University of Technology, since 2006. Its idea came from the heritage of the other two cycles of e
作者: STING    時(shí)間: 2025-3-25 18:49
Reliability Analysis of Discrete Transportation Systems Using Critical States,ical states, i.e. the states when the system is still operational but the probability of failure in near future is unacceptably high. These states can be used as an indicator that the system is degrading dangerously.
作者: deciduous    時(shí)間: 2025-3-25 21:30

作者: Adenocarcinoma    時(shí)間: 2025-3-26 02:49

作者: 殺蟲劑    時(shí)間: 2025-3-26 05:05
Reduction of Computational Cost in Mutation Testing by Sampling Mutants,ere generated and examined. Mutation score and the source code coverage were used to evaluate the effectiveness of mutation testing with subsets of mutants. The ability to detect errors introduced “on purpose” in the source code was also examined.
作者: 依法逮捕    時(shí)間: 2025-3-26 11:04
Use of Neural Network Algorithms in Prediction of XLPE HV Insulation Properties under Thermal Aginge theoretical and the experimental results are concordant. As a neural network application, we propose a new method based on Radial Basis Function Gaussian network (RBFG) trained by two algorithms: Random Optimization Method (ROM) and Back-propagation (BP).
作者: Recess    時(shí)間: 2025-3-26 13:11
Computer Simulation Analysis of Cluster Model of Totally-Connected Flows on the Chain Mail,rst formulated at ITSC-2011, Bugaev etc, and other publications in Russia. It combines limit conditions of leader-following model, Lighthill-Whitham hydrodynamic approach and generalized solutions with Renkine-Hugoniot conditions. Experiments on the basis of each model are carried out, results are obtained and software is developed.
作者: GEN    時(shí)間: 2025-3-26 19:02
Using Virtualization Technology for Fault-Tolerant Replication in LAN,total number of physical replicas from . to . Our approach is based on the concept of twin virtual machines, where there are two virtual machines in each physical host, each one acting as a failure detector of its twin.
作者: 灌輸    時(shí)間: 2025-3-26 21:31
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions,and VMware virtualization platform and verifies its reliability regarding data transfer. The paper includes a number of performance tests to verify the dependability of the proposed solution and provide a proof-of-concept for the network topology during the Design phase of the PPDIOO methodology, right before the Implementation phase.
作者: poliosis    時(shí)間: 2025-3-27 03:12

作者: 一條卷發(fā)    時(shí)間: 2025-3-27 06:12
Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case,e case relates to the assessment and selection of flood countermeasures. The main objective of the validation is to find out if the risk assessment method implemented in OSCAD can be used for the flood issue.
作者: Feckless    時(shí)間: 2025-3-27 11:23
Quantification of Simultaneous-AND Gates in Temporal Fault Trees,ined period of time. This work then derives an expression for the exact quantification of pSAND for exponentially distributed events and provides an approximation using Monte Carlo simulation which can be used for other distributions.
作者: DOSE    時(shí)間: 2025-3-27 13:48
Generating Repair Rules for Database Integrity Maintenance,ation after the update operation but before the repair. The focus of this paper is to generate repairs for all first order constraints, and by using only substitution with no resolution search. Multiple constraints can be satisfied in parallel without a sequential process with no possibility of cyclic violation.
作者: 可能性    時(shí)間: 2025-3-27 21:43
Risk Assessment Aspects in Mastering the Value Function of Security Measures,management is a broad issue, especially in five of the project assumed contexts. For this reason more specialized components are allowed for the RRA pillar. Currently the project passes to the implementation and use case experimentation phase. The chapter shows the general architecture, currently implemented and the RRA component example.
作者: fallible    時(shí)間: 2025-3-27 22:48

作者: 我不怕犧牲    時(shí)間: 2025-3-28 02:59
n einen Gesamtkontext ein.Mit exklusiven Gastbeitr?gen renom.Change in der Krise kann jeder - das ist keine Management-Kunst. Doch wie bekommen Sie Ihre Mannschaft bewegt, wenn der Ver?nderungsdruck noch nicht in den Quartalszahlen spürbar ist? Change-Prozesse gestalten hei?t: das Spiel kontrolliere
作者: 牽索    時(shí)間: 2025-3-28 09:34
Razvan-Mihai Aciu,Horia Ciocarlieentation.. They take place in an overall process of societal change. In the Czech case, a new constitutional legislation has provided the basis for the institutionalization of local government, the reorganization of municipal boundaries and a new division of powers and responsibilities. This process
作者: 串通    時(shí)間: 2025-3-28 11:16

作者: grudging    時(shí)間: 2025-3-28 17:56

作者: 多骨    時(shí)間: 2025-3-28 20:51
Ilona Bluemke,Karol Kuleszarate British colonies and now comprises one federal and eight state or territory-based governments. Although the Australian constitution established a division of powers between the commonwealth or federal and state governments, each has a series of administrative departments covering areas such as
作者: OVER    時(shí)間: 2025-3-29 02:40

作者: Finasteride    時(shí)間: 2025-3-29 03:12
Franciszek Grabskith some scepticism, specifically from political stakeholders. Strategic communication is necessary for reducing the resistance to change that often comes with the introduction of a new economic plan. An effective communication strategy would therefore be needed for the implementation of the NDP. The
作者: 鄙視讀作    時(shí)間: 2025-3-29 09:01

作者: Memorial    時(shí)間: 2025-3-29 13:26
Application Level Execution Model for Transparent Distributed Computing, like JVM or .NET. These are independent pieces of software and gluing them together adds complexity which can be error prone. Still, some issues such as transparent creation and synchronization of the parallel distributed threads, code replication, data communication and hardware and software platf
作者: coagulation    時(shí)間: 2025-3-29 17:18
Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case,rocess. First, general information about risk management and risk assessment is given, and relations of the risk assessment with the flood issue are described. Basic information about the ValueSec project and its relations with risk assessment is presented. Next, the results of first experiments hea
作者: choroid    時(shí)間: 2025-3-29 21:40
Risk Assessment Aspects in Mastering the Value Function of Security Measures,llars: Risk Reduction Assessment (RRA), Cost-Benefit-Analysis (CBA) and Qualitative Criteria Assessment (QCA). The ValueSec tool set, which is elaborated in the project, should be equipped with components corresponding to these pillars. The chapter overviews the researches of the project focused on
作者: BLANC    時(shí)間: 2025-3-30 03:29

作者: 抵消    時(shí)間: 2025-3-30 04:09
Use of Neural Network Algorithms in Prediction of XLPE HV Insulation Properties under Thermal Agingduce the aging experiment time. In this work we present a short comparison of the obtained results in the case of Cross-linked Polyethylene (XLPE). The theoretical and the experimental results are concordant. As a neural network application, we propose a new method based on Radial Basis Function Gau
作者: violate    時(shí)間: 2025-3-30 09:13

作者: 逃避系列單詞    時(shí)間: 2025-3-30 14:34
Assessment of Network Coding Mechanism for the Network Protocol Stack 802.15.4/6LoWPAN,g systems. However, it improved mechanism for more efficient use of limited radio bandwidth. This mechanism is network coding, which is devoted to this article. The purpose of this article is to evaluate the effectiveness of network coding mechanism implemented on a network component that uses Atmel
作者: 漸變    時(shí)間: 2025-3-30 19:53
Reliability Analysis of Discrete Transportation Systems Using Critical States,The simulation results are used to determine the initial level of resources that ensures seamless operation of the system. The simulator is also used to assess the conditional probability of system failure after reaching a specific set of reliability states. This is used to determine the set of crit
作者: outer-ear    時(shí)間: 2025-3-30 21:09
A Reference Model for the Selection of Open Source Tools for Requirements Management, The construction of the reference model results from the needs of companies producing software which are also interested in streamlining the process of managing requirements using Open Source tools. This interest in Open Source tools is, in turn, a consequence of licensing costs, integration with t
作者: 會(huì)議    時(shí)間: 2025-3-31 02:43
A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms, this paper a probabilistic solution to this problem is proposed. It is argued that by the use of a Bloom Filter added to the routing message the routing loops will with high probability not form. An experimental analysis of this solution for use in Wireless Sensor Networks in practice is also inclu
作者: Hemiplegia    時(shí)間: 2025-3-31 05:57
A Quality Estimation of Mutation Clustering in C# Programs, experimental evaluation of mutation clustering is presented. The approach was applied for object-oriented and standard mutation testing of C# programs. The quality metric was used to compare different solutions. It calculates a tradeoff between mutations score accuracy and mutation costs in terms o
作者: gerontocracy    時(shí)間: 2025-3-31 10:57
Using Virtualization Technology for Fault-Tolerant Replication in LAN,ation to reliably detect and tolerate faulty replicas, allowing the transformation of Byzantine faults into omission faults. Our approach reduces the total number of physical replicas from . to . Our approach is based on the concept of twin virtual machines, where there are two virtual machines in e
作者: DEBT    時(shí)間: 2025-3-31 14:01
Quantification of Simultaneous-AND Gates in Temporal Fault Trees,ehaviours exhibited by modern systems with redundant components. However, none of these extended FTA approaches provide much support for modelling situations where events have to be "nearly simultaneous", i.e., where events must occur within a certain interval to cause a failure. Although one such e
作者: 怕失去錢    時(shí)間: 2025-3-31 18:24
Improving of Non-Interactive Zero-Knowledge Arguments Using Oblivious Transfer,t the prover is computationally bounded. As opposed to the single theorem NIZK proof protocols using common random string, NIZK argument protocols using OT are ?multilingual? that is language . or the one-way function can be chosen and declared by prover in non-interactive mode. These protocols use




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
漠河县| 江口县| 多伦县| 马山县| 汶川县| 湟中县| 深水埗区| 东港市| 鹤庆县| 福鼎市| 扎兰屯市| 蒲城县| 茌平县| 和田市| 微博| 池州市| 项城市| 西安市| 苏州市| 社旗县| 临洮县| 香河县| 无锡市| 休宁县| 密山市| 精河县| 蒲城县| 浦北县| 武邑县| 阿克苏市| 遵义县| 贵定县| 梁山县| 普定县| 涟水县| 通海县| 隆尧县| 阿坝县| 沈阳市| 华坪县| 正蓝旗|