標(biāo)題: Titlebook: Dependable Computing; Third Latin-American Andrea Bondavalli,Francisco Brasileiro,Sergio Rajs Conference proceedings 2007 Springer-Verlag B [打印本頁] 作者: 水平 時間: 2025-3-21 19:10
書目名稱Dependable Computing影響因子(影響力)
書目名稱Dependable Computing影響因子(影響力)學(xué)科排名
書目名稱Dependable Computing網(wǎng)絡(luò)公開度
書目名稱Dependable Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Dependable Computing被引頻次
書目名稱Dependable Computing被引頻次學(xué)科排名
書目名稱Dependable Computing年度引用
書目名稱Dependable Computing年度引用學(xué)科排名
書目名稱Dependable Computing讀者反饋
書目名稱Dependable Computing讀者反饋學(xué)科排名
作者: 滔滔不絕地講 時間: 2025-3-21 23:41 作者: Asperity 時間: 2025-3-22 01:35 作者: Ledger 時間: 2025-3-22 06:00
Understanding Hi-tech Business Growth methodology the certification authority or the system integrator can compare among components available the one that best fit for the system that is assembling a component that provides a specific functionality. Based on the results it is also possible to decide whether a software product may be co作者: Granular 時間: 2025-3-22 10:18
Nonlinear Gas Turbine Modelling attacks are considered from an analysis of use cases. Then the rights of the users are defined from the use cases using a Role-Based Access Control (RBAC) or other security model. The attacks are used to define the policies that could stop them. The rights are reflected in the conceptual class mode作者: Archipelago 時間: 2025-3-22 13:37
Connectivity in Eventually Quiescent Dynamic Distributed Systemsnnectivity when an arbitrary large number of entities may arrive/depart concurrently at any time, doing so for an arbitrarily long time. A solution is presented achieving overlay connectivity during . of the system: periods in which no more arrivals and departures take place. The paper conveys the f作者: Archipelago 時間: 2025-3-22 18:06 作者: 把手 時間: 2025-3-23 01:15 作者: DEAF 時間: 2025-3-23 03:30 作者: Deadpan 時間: 2025-3-23 09:32
Security Patterns and Secure Systems Design attacks are considered from an analysis of use cases. Then the rights of the users are defined from the use cases using a Role-Based Access Control (RBAC) or other security model. The attacks are used to define the policies that could stop them. The rights are reflected in the conceptual class mode作者: 菊花 時間: 2025-3-23 11:31 作者: insert 時間: 2025-3-23 15:18 作者: 鉆孔 時間: 2025-3-23 18:50 作者: 議程 時間: 2025-3-23 22:11
Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluationint paths to the destination, enhancing the path redundancy, and so extending the possibility of using detours, or alternative paths if needed. Route distance is employed as a secondary criterion. Routes may be dynamically changed by intermediate routers, which usually have more recent information a作者: CLOUT 時間: 2025-3-24 03:52
On the Implementation of Communication-Optimal Failure Detectorscient . algorithms, i.e., algorithms using . links to carry messages forever, being . the number of processes in the system. Moreover, we have recently proposed a . algorithm that uses only . links, being . the number of correct processes. In this paper, we show that . is the minimum number of links作者: Arable 時間: 2025-3-24 08:40 作者: PATHY 時間: 2025-3-24 12:54
Implementing Fault Tolerance Using Aspect Oriented Programmingis that most present day AOP languages do not offer the level of control needed. This paper addresses the problem by defining a representative set of fault tolerance mechanisms. The set can be used for evaluating the feasibility of languages and for finding needs for improvements. It has been used t作者: 起草 時間: 2025-3-24 15:06 作者: 我就不公正 時間: 2025-3-24 21:00 作者: expeditious 時間: 2025-3-25 02:38 作者: STERN 時間: 2025-3-25 06:17
Gossiping: Adaptive and Reliable Broadcasting in MANETs delivery of messages. The spreading of broadcast messages has a strong similarity with the spreading of infectious diseases. Applying epidemiological models to broadcasting allows an easy evaluation of such strategies depending on the MANET characteristics, e.g. the node density. In this paper, we 作者: 炸壞 時間: 2025-3-25 09:02
On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenariostly affected by terrain, obstacles, battery exhaustion and node mobility. Existing broadcasting protocols for MANETs are able to deal with mobility, as well as congestion and collision, but only when under a fail-stop failure model. However, this model is not a good representative of the real scenar作者: 發(fā)炎 時間: 2025-3-25 12:01
Failure Boundedness in Discrete Applicationslous state. This is in contrast with continuous feedback systems where wrong outputs can only gradually deviate the system under control from its intended set point. Transient errors may even be filtered by the latency inherent to the physical application. In this paper we extend our previous experi作者: Femish 時間: 2025-3-25 16:04 作者: 新星 時間: 2025-3-25 23:34
Component-Based Software Certification Based on Experimental Risk Assessments such as ISO/IEC 9126, ISO/IEC 14598 or ISO/IEC 25051. In many application areas, especially in mission-critical applications, certification is essential or even mandatory. However, the certification of software products using common off-the-shelf (COTS) components is difficult to attain, as detail作者: resilience 時間: 2025-3-26 00:09
Integrated Intrusion Detection in Databasessms to protect data. However these mechanisms cannot always stop malicious users from accessing the data by exploiting system vulnerabilities. In fact, when a malicious user accesses the database there is no effective way to detect and stop the attack in due time. This practical experience report pr作者: 闖入 時間: 2025-3-26 06:16 作者: MOAT 時間: 2025-3-26 11:57
Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?y evaluation experiments. The tutorial, intended for researchers working in experimental dependability evaluation, includes a demonstration of the use of these technologies in a concrete example of experimental dependability evaluation.作者: 生來 時間: 2025-3-26 16:37 作者: laceration 時間: 2025-3-26 20:17
BAR—Where Distributed Computing Meets Game Theoryive because their diffused control structure may yield services that are potentially less costly and more democratic than their more centralized counterparts. Unfortunately, they are also particularly problematic from a dependability standpoint as they challenge the traditional distinction between c作者: CHARM 時間: 2025-3-26 21:57
Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluationdistance is employed as a secondary criterion. Routes may be dynamically changed by intermediate routers, which usually have more recent information about topology changes. Formal proofs for correctness of the algorithm are also presented. The proposed algorithm was implemented in a simulation environment and experimental results are presented.作者: 油氈 時間: 2025-3-27 04:12 作者: 沙草紙 時間: 2025-3-27 05:29
Rigid Bodies and Reference Frameso evaluate the AspectC++ language, and a number of limitations have been revealed. AspectC++ was then extended in order to address this. It is also demonstrated how reusable fault tolerance mechanisms can be built using aspect oriented C++, and the advantages compared to using standard C++ are discussed.作者: carotid-bruit 時間: 2025-3-27 10:43
Closed-loop Subspace Identificatione density and forwarding probability on the quality of gossiping. The result of our investigation is to enable mobile nodes for dynamically adapting their forwarding probability depending on the local node density. Simulation results in ns-2 show the reliability, efficiency and scalability of adaptive gossiping.作者: intoxicate 時間: 2025-3-27 13:37 作者: BUMP 時間: 2025-3-27 19:58 作者: RALES 時間: 2025-3-28 01:34 作者: genesis 時間: 2025-3-28 04:17 作者: 違反 時間: 2025-3-28 06:49
Implementing Fault Tolerance Using Aspect Oriented Programmingo evaluate the AspectC++ language, and a number of limitations have been revealed. AspectC++ was then extended in order to address this. It is also demonstrated how reusable fault tolerance mechanisms can be built using aspect oriented C++, and the advantages compared to using standard C++ are discussed.作者: 和音 時間: 2025-3-28 12:26 作者: Obsessed 時間: 2025-3-28 17:58 作者: 填滿 時間: 2025-3-28 21:31
Rigid Bodies and Reference Framesifying important dependability properties. Beyond this, the formal models are also used for generating unit and integration test cases that would be used for validating the final software product. The feasibility of the proposed approach was evaluated on an embedded critical case study.作者: Bone-Scan 時間: 2025-3-28 23:18 作者: Mediocre 時間: 2025-3-29 06:07 作者: Champion 時間: 2025-3-29 08:16
https://doi.org/10.1007/978-1-84882-681-6tions from a standard database benchmark (TPC-W) and a real database application. Results show that the proposed intrusion detection tool can effectively detect SQL-based attacks with no false positives and no overhead to the server.作者: 創(chuàng)作 時間: 2025-3-29 13:55
Modelling Back-end Issues in Manufacturingneutral mechanisms that allow the secure designation and identification of participating devices. We show that they can serve as a building block for a wide range of cooperation policies that address most of the security threats we are concerned with. We conclude on future directions.作者: Demonstrate 時間: 2025-3-29 19:30
Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing?and, thanks to the large scale integration, one may expect the fault tolerance techniques to come to the rescue of the limitations of the currently dominating fault avoidance approaches. After a brief review of each of these issues, we will provide a few hints concerning a proposal for resilient multicore processor chips.作者: 突變 時間: 2025-3-29 19:51 作者: MOAN 時間: 2025-3-30 00:22
Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study(FCM) clustering algorithm is used. A case study demonstrates and validates the approach. Contrary to other approaches, no prior information is needed about the tests carried out before, e.g., as is case in regression testing.作者: inconceivable 時間: 2025-3-30 06:45 作者: Fulminate 時間: 2025-3-30 11:14
Integrated Intrusion Detection in Databasestions from a standard database benchmark (TPC-W) and a real database application. Results show that the proposed intrusion detection tool can effectively detect SQL-based attacks with no false positives and no overhead to the server.作者: 違反 時間: 2025-3-30 15:07
Security Rationale for a Cooperative Backup Service for Mobile Devicesneutral mechanisms that allow the secure designation and identification of participating devices. We show that they can serve as a building block for a wide range of cooperation policies that address most of the security threats we are concerned with. We conclude on future directions.作者: covert 時間: 2025-3-30 18:16
Gradual Development of a Dynamic Model application-driven architectural designs, e.?g., see [1]. One of the main drivers is the reduction of the size of the elementary devices. Nevertheless, the evolution of nanoscale technologies raises serious challenges with respect to both dependability and security viewpoints. Issues at stake encom作者: Palpable 時間: 2025-3-31 00:26
Dynamic Modeling for Marine Conservationint paths to the destination, enhancing the path redundancy, and so extending the possibility of using detours, or alternative paths if needed. Route distance is employed as a secondary criterion. Routes may be dynamically changed by intermediate routers, which usually have more recent information a作者: 他姓手中拿著 時間: 2025-3-31 03:32
Dynamic Modeling for Marine Conservationcient . algorithms, i.e., algorithms using . links to carry messages forever, being . the number of processes in the system. Moreover, we have recently proposed a . algorithm that uses only . links, being . the number of correct processes. In this paper, we show that . is the minimum number of links作者: 無聊的人 時間: 2025-3-31 05:14
Dynamic Response of Mix Systems,cterizing dimension of these systems is their, possibly, arbitrary large size (number of entities) and the possible arbitrary small part of the system a single entity directly interacts with. This interaction occurs through data exchange over logical links, and the constantly changing graph, formed 作者: Regurgitation 時間: 2025-3-31 11:03
Rigid Bodies and Reference Framesis that most present day AOP languages do not offer the level of control needed. This paper addresses the problem by defining a representative set of fault tolerance mechanisms. The set can be used for evaluating the feasibility of languages and for finding needs for improvements. It has been used t作者: 使迷醉 時間: 2025-3-31 16:15 作者: Trochlea 時間: 2025-3-31 18:22
https://doi.org/10.1007/978-0-387-28750-8ous features to simultaneously be considered, often leading to a large number of tests. In such cases, because of time and cost constraints the entire set of tests cannot be run. It is then essential to prioritize the tests in sense of a ordering of the relevant events entailed in accordance with th作者: ovation 時間: 2025-3-31 22:53
Overview of Dynamic Musculoskeletal Modelingy for years, despite having been designed without criticality requirements. However, the requirements of mobility, digital identification and authentication lead to an increasing dependence of societies on the correct behaviour of these ’proxies for the individual’. The Windows Mobile 5.0 release ha作者: 踉蹌 時間: 2025-4-1 04:41
Closed-loop Subspace Identification delivery of messages. The spreading of broadcast messages has a strong similarity with the spreading of infectious diseases. Applying epidemiological models to broadcasting allows an easy evaluation of such strategies depending on the MANET characteristics, e.g. the node density. In this paper, we