找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Dependable Computing – EDCC 2024 Workshops; SafeAutonomy, TRUST Behrooz Sangchoolie,Rasmus Adler,Adriano Mancini Conference proceedings 20

[復制鏈接]
樓主: ominous
21#
發(fā)表于 2025-3-25 05:12:45 | 只看該作者
22#
發(fā)表于 2025-3-25 09:31:26 | 只看該作者
Defining an?Effective Context for?the?Safe Operation of?Autonomous Systemsystem (AS). For traditional systems, a human is trusted to provide an oversight of operations, and react safely to unexpected scenarios that occur. For AS we cannot necessarily rely on human oversight to handle unexpected events, and must therefore be more confident that all possible hazardous scena
23#
發(fā)表于 2025-3-25 12:46:34 | 只看該作者
Towards Continuous Assurance Case Creation for?ADS with?the?Evidential Tool Busan be not avoided, system-specific instantiations of assurance case patterns are both costly and time-consuming. It becomes especially complex to maintain an assurance case for a system when the requirements of the System-Under-Assurance change, or an assurance claim becomes invalid due to, e.g., de
24#
發(fā)表于 2025-3-25 16:13:59 | 只看該作者
STARS: A Tool for?Measuring Scenario Coverage When Testing Autonomous Robotic Systemsthe automotive domain. To enable statements on the absolute number or fractions of tested scenarios, methods and tools for computing their coverage are needed. In this paper, we present STARS, a tool for specifying semantic environment features and measuring scenario coverage when testing autonomous
25#
發(fā)表于 2025-3-25 23:51:04 | 只看該作者
Spatial-Temporal Graph Neural Network for Detecting and Localizing Anomalies in PMU Networkser systems. PMUs, being cyber-physical devices, are susceptible to cyber-attacks, such as false data injection (FDI). As FDI can lead to incorrect state estimation and subsequent destructive impacts, the prompt detection of falsified data is crucial to preclude such adverse outcomes. In response to
26#
發(fā)表于 2025-3-26 02:44:29 | 只看該作者
27#
發(fā)表于 2025-3-26 07:35:39 | 只看該作者
Power System Transient Stability Prediction in the Face of Cyber Attacks: Employing LSTM-AE to Combawidely used in transient stability prediction (TSP), significantly contributing to the effective maintenance of power systems post-contingency stability. The accuracy and reliability of data derived from PMUs are crucial for the effective execution of TSP. However, the PMU data is at risk of being c
28#
發(fā)表于 2025-3-26 11:04:10 | 只看該作者
29#
發(fā)表于 2025-3-26 15:34:26 | 只看該作者
An Exploratory Study on Trust in Blockchain-Enabled Energy Tradingrids. The research highlights the various benefits BCT brings to P2P energy trading, such as improved efficiency, cost reduction, and the optimization of renewable energy distribution. However, it also identifies significant barriers to the contribution of BCT to the removal of trust in this context
30#
發(fā)表于 2025-3-26 17:11:42 | 只看該作者
Inspecting Bridges and?Critical Infrastructure: An AI and?Blockchain Approachde. Traditional inspection methods are often time-consuming, prone to human error, and can be economically taxing. The advent of advanced technologies such as Artificial Intelligence (AI) and blockchain offers a transformative approach to inspecting and maintaining these structures. In this extended
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 03:32
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
蓬溪县| 固镇县| 龙泉市| 娄烦县| 平潭县| 鹤峰县| 马尔康县| 苍山县| 衡东县| 新密市| 大竹县| 迁西县| 北辰区| 吉安市| 宣威市| 德安县| 武鸣县| 兴宁市| 浦城县| 湟源县| 栾城县| 于都县| 大新县| 柯坪县| 博野县| 常宁市| 曲周县| 长宁区| 崇阳县| 庆元县| 东至县| 甘南县| 祁东县| 三台县| 阳山县| 河源市| 晋江市| 绍兴县| 鱼台县| 安远县| 保亭|