標(biāo)題: Titlebook: Verification and Evaluation of Computer and Communication Systems; 16th International C Belgacem Ben Hedia,Yassine Maleh,Moez Krichen Confe [打印本頁] 作者: 矜持 時(shí)間: 2025-3-21 16:55
書目名稱Verification and Evaluation of Computer and Communication Systems影響因子(影響力)
書目名稱Verification and Evaluation of Computer and Communication Systems影響因子(影響力)學(xué)科排名
書目名稱Verification and Evaluation of Computer and Communication Systems網(wǎng)絡(luò)公開度
書目名稱Verification and Evaluation of Computer and Communication Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Verification and Evaluation of Computer and Communication Systems被引頻次
書目名稱Verification and Evaluation of Computer and Communication Systems被引頻次學(xué)科排名
書目名稱Verification and Evaluation of Computer and Communication Systems年度引用
書目名稱Verification and Evaluation of Computer and Communication Systems年度引用學(xué)科排名
書目名稱Verification and Evaluation of Computer and Communication Systems讀者反饋
書目名稱Verification and Evaluation of Computer and Communication Systems讀者反饋學(xué)科排名
作者: 碎石頭 時(shí)間: 2025-3-21 20:41
Salwa Habbachi,Imene Ben Hafaiedh,Zhiwu Li,Moez Krichenement the retrieval step in our new gene-CBR system. The proposed method is illustrated with the analysis of microarray data belonging to bone marrow cases from 43 adult patients with cancer plus a group of three cases corresponding to healthy persons.作者: ABYSS 時(shí)間: 2025-3-22 00:44
Samir Ouchani,Otmane Ait Mohamed,Mourad Debbabis presented here. As the current rule validation and rule refinement systems usually rely on CBR, this is a relevant novel contribution for coping with the maintenance problem of large CBR systems for engineering design. The described global mathematical optimization enables a higher quality in the 作者: N斯巴達(dá)人 時(shí)間: 2025-3-22 06:16
Fateh Boudardara,Abderraouf Boussif,Mohamed Ghazel standalone component, providing a deep integration of Explainable AI (XAI) into the CBR cycle. Besides the CBR methods, the methodology was also conceptualized to make use of the currently popular machine learning methods, such as recurrent and convolutional neural networks (RNN, ConvNet) or genera作者: 離開就切除 時(shí)間: 2025-3-22 11:12 作者: countenance 時(shí)間: 2025-3-22 16:37
Hugo Beguinet,Céline Chevalier,Thomas Ricosset,Hugo Senetectives of teammates, align their mental models, and thereby resolve the cognitive dissonance in interdisciplinary design teams. We discuss some implications of our observations for developing case-based systems for collaborative interdisciplinary design.作者: Fortify 時(shí)間: 2025-3-22 17:17 作者: 割公牛膨脹 時(shí)間: 2025-3-22 22:30
Afef Jmal Maalej,Mariam Lahamiion. Handling this application required addressing how to keep LSH practical for skewed data; the resulting efficiency gains in turn enabled applying an adaptation generation strategy that previously was computationally infeasible. Experimental results show that our CBR approach achieves accuracy co作者: 身心疲憊 時(shí)間: 2025-3-23 03:49 作者: DAUNT 時(shí)間: 2025-3-23 09:24
Moussa Amrani,Abdelkader Ouared,Pierre-Yves Schobbenst deep similarity between cases with a time-to-event structure and from the DNN standpoint, case-based reasoning can provide the glass-box approach that remedies the “black box” label attached to them. In this study, we propose a synergy between case-based reasoning and Long Short-Term Memory (LSTM)作者: BRAND 時(shí)間: 2025-3-23 12:02
nics. We developed an MBL method that can build an effective indexing scheme for retrieving good reference cases from a case base of previous ship designs. Empirical results show that the indexing scheme generated by MBL outperforms those by other learning methods such as the decision tree learning.作者: 為寵愛 時(shí)間: 2025-3-23 15:25
,A QoE Driven DRL Approach for?Network Slicing Based on?SFC Orchestration in?SDN/NFV Enabled Networktwork Functions (VNFs) linked through virtual links that packets need to traverse within a network slice to achieve specific service requirements. We show throughout numerical experiments how Dueling DQN outperforms DQN in this scenario and how we can compare its performances with those of reference作者: 肌肉 時(shí)間: 2025-3-23 18:43 作者: convert 時(shí)間: 2025-3-23 22:46
An Enhanced Interface-Based Probabilistic Compositional Verification Approach,erence on the global requirement from local results. Moreover, the soundness of our proposed framework has been substantiated, ensuring that it correctly interprets and applies the properties of the system under scrutiny. In the final phase, we leveraged the PRISM model checker to assess the effecti作者: 免除責(zé)任 時(shí)間: 2025-3-24 04:51
A Sound Abstraction Method Towards Efficient Neural Networks Verification,er-approximates the original one. Concretely, it consists in merging a set of neurons that have positive outgoing weights and substituting it with a single abstract neuron, while ensuring that if a given property holds on the abstract network, it necessarily holds on the original one. In order to as作者: ELUDE 時(shí)間: 2025-3-24 07:05 作者: LURE 時(shí)間: 2025-3-24 14:37 作者: 低位的人或事 時(shí)間: 2025-3-24 16:53
,Command & Control in?UAVs Fleets: Coordinating Drones for?Ground Missions in?Changing Contexts,and driven towards the achievement of tasks at the service of a high-level objective. With the recent increase in distributiveness and variety of information, C2 found new interesting application areas (disaster relief and financial operations; mass vaccination campaigns; etc.).This paper explores t作者: 連系 時(shí)間: 2025-3-24 22:42
Verification and Evaluation of Computer and Communication Systems16th International C作者: BOGUS 時(shí)間: 2025-3-25 00:36 作者: 滋養(yǎng) 時(shí)間: 2025-3-25 04:57
Salwa Habbachi,Imene Ben Hafaiedh,Zhiwu Li,Moez Krichenession profiles are composed of thousands of genes at the same time, representing complex relationships between them. One of the well-known constraints specifically related to microarray data is the large number of genes in comparison with the small number of available experiments or cases. In this 作者: BARK 時(shí)間: 2025-3-25 09:58
Samir Ouchani,Otmane Ait Mohamed,Mourad Debbabieristic. Therefore the adaptation problem emerges also as a validation and refinement problem to be solved by global CBR approaches in an optimal way. The optimal refinement of engineering rule bases for adaptation improves the performance of expert systems for engineering design and provides a basi作者: Blemish 時(shí)間: 2025-3-25 11:56
Fateh Boudardara,Abderraouf Boussif,Mohamed GhazelR cycle with a flexible order of execution of its main steps. Additionally, a number of combinatorial features for a more comprehensive and enhanced composition can be used. FLEA is an acronym for . and was initially created to solve the restrictiveness issues of case-based design (CBD) where many e作者: 土產(chǎn) 時(shí)間: 2025-3-25 18:33 作者: A簡潔的 時(shí)間: 2025-3-25 22:13 作者: 赦免 時(shí)間: 2025-3-26 02:48 作者: Monotonous 時(shí)間: 2025-3-26 06:05 作者: Opponent 時(shí)間: 2025-3-26 11:46
Mariem Fourati,Amel Meddeb-Makhlouf,Faouzi Zaraiired case adaptation knowledge is a classic problem. A popular method for addressing it is the case difference heuristic (CDH) approach, which learns adaptations from pairs of cases based on their problem differences and solution differences. The CDH approach was originally used to generate adaptati作者: 浪費(fèi)物質(zhì) 時(shí)間: 2025-3-26 16:34
Moussa Amrani,Abdelkader Ouared,Pierre-Yves Schobbenshe prediction of any future event. It is routinely used in medical research to stratify patients in groups based on risk, such as high-risk groups and low-risk groups, and has paramount important in patient stratification and treatment. Recently, deep neural networks (DNNs) have raised considerable 作者: 上釉彩 時(shí)間: 2025-3-26 18:13
ases during the conceptual design phase of a new ship. The conceptual ship design process begins with selecting previously designed reference ships of the same type with similar sizes and speeds. These reference ships are used for deriving an initial design of a new ship, and then the initial design作者: 粗糙濫制 時(shí)間: 2025-3-26 23:06 作者: abreast 時(shí)間: 2025-3-27 01:44
,White-Box Mutation Testing of?Smart Contracts: A Quick Review,ion testing based on a collection of several papers. In particular, we analysed in which quality assurance processes mutation testing of smart contracts is used, which mutation tools and which mutation operators are employed.作者: LUMEN 時(shí)間: 2025-3-27 08:53 作者: annexation 時(shí)間: 2025-3-27 10:41 作者: intention 時(shí)間: 2025-3-27 14:21
0302-9743 selected from 36 submissions.?.The topics presented covered a range of subjects, including approaches?to improving the scalability and efficiency of formal verification and their applications to blockchain, smart contracts and neural networks. .978-3-031-49736-0978-3-031-49737-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Endometrium 時(shí)間: 2025-3-27 19:36 作者: Respond 時(shí)間: 2025-3-27 23:21
,A Comparative Study of?Online Cybersecurity Training Platforms, discussion of platform-specific features based on a proposed software taxonomy that aids in the classification is presented. The findings of this study can be useful to both developers and contributors of cybersecurity training platforms for further improvements or to develop new ones.作者: 掙扎 時(shí)間: 2025-3-28 03:29 作者: Preamble 時(shí)間: 2025-3-28 08:43 作者: 褪色 時(shí)間: 2025-3-28 13:42
Verified High Performance Computing: The SyDPaCC Approach,from specifications. These specifications are written as inefficient (potentially with a high computational complexity) sequential programs. We obtain efficient parallel programs implemented using algorithmic skeletons that are higher-order functions implemented in parallel on distributed data struc作者: 感染 時(shí)間: 2025-3-28 15:54 作者: murmur 時(shí)間: 2025-3-28 19:55 作者: 招惹 時(shí)間: 2025-3-29 01:40 作者: 使出神 時(shí)間: 2025-3-29 05:17
A Sound Abstraction Method Towards Efficient Neural Networks Verification,lthough several NN verification techniques have been developed in recent years, these techniques are often limited to small networks and do not scale well to larger NN. The primarily reason for this limitation is the complexity and non-linearity of neural network models. Abstraction and model reduct作者: 口味 時(shí)間: 2025-3-29 08:13
,Towards Formal Verification of?Node RED-Based IoT Applications,tunities they can bring in various domains. However, the widespread adoption of IoT technologies highlights the importance of ensuring the correctness of these applications, which can have an impact on their security and reliability. The work presented in this paper contributes to the efforts addres作者: BIDE 時(shí)間: 2025-3-29 12:38
,Formal Verification of?a?Post-quantum Signal Protocol with?Tamarin,d WhatsApp. However, advances in quantum computing threaten the security of the cornerstone of this protocol: the Diffie-Hellman key exchange. There actually are resistant alternatives, called post-quantum secure, but replacing the Diffie-Hellman key exchange with these new primitives requires a dee作者: DIS 時(shí)間: 2025-3-29 18:59 作者: 彎腰 時(shí)間: 2025-3-29 21:40
,White-Box Mutation Testing of?Smart Contracts: A Quick Review,ing (MT) can significantly increase the utility of a test for smart contracts. MT is a type of white-box testing which is mainly used for unit testing. In fact, certain statements of the source code are changed to check if the test cases are able to find errors in source code. The main objective of 作者: Expediency 時(shí)間: 2025-3-30 01:43
Blockchain-Based Trust Management for IoMT Environment,makes people’s lives easier. Nevertheless, securing these systems is a big challenge. To address this challenge, several methods have been proposed to establish a trust level for entities considering different characteristics, basically the direct observations and feedbacks. In this paper, we presen作者: microscopic 時(shí)間: 2025-3-30 06:22
,Command & Control in?UAVs Fleets: Coordinating Drones for?Ground Missions in?Changing Contexts,advances in robotics and Artificial Intelligence, deploying a swarm of Unmanned Aerial Vehicules (UAVs) (also known as drones) for these missions, has become a promising direction to facilitate first responders’ work. However, despite these recent advances, this remains a difficult challenge because作者: invert 時(shí)間: 2025-3-30 09:13 作者: 變量 時(shí)間: 2025-3-30 15:47 作者: FEAS 時(shí)間: 2025-3-30 16:40