派博傳思國際中心

標(biāo)題: Titlebook: Dependable Computing; Third Latin-American Andrea Bondavalli,Francisco Brasileiro,Sergio Rajs Conference proceedings 2007 Springer-Verlag B [打印本頁]

作者: 水平    時間: 2025-3-21 19:10
書目名稱Dependable Computing影響因子(影響力)




書目名稱Dependable Computing影響因子(影響力)學(xué)科排名




書目名稱Dependable Computing網(wǎng)絡(luò)公開度




書目名稱Dependable Computing網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Dependable Computing被引頻次




書目名稱Dependable Computing被引頻次學(xué)科排名




書目名稱Dependable Computing年度引用




書目名稱Dependable Computing年度引用學(xué)科排名




書目名稱Dependable Computing讀者反饋




書目名稱Dependable Computing讀者反饋學(xué)科排名





作者: 滔滔不絕地講    時間: 2025-3-21 23:41

作者: Asperity    時間: 2025-3-22 01:35

作者: Ledger    時間: 2025-3-22 06:00
Understanding Hi-tech Business Growth methodology the certification authority or the system integrator can compare among components available the one that best fit for the system that is assembling a component that provides a specific functionality. Based on the results it is also possible to decide whether a software product may be co
作者: Granular    時間: 2025-3-22 10:18
Nonlinear Gas Turbine Modelling attacks are considered from an analysis of use cases. Then the rights of the users are defined from the use cases using a Role-Based Access Control (RBAC) or other security model. The attacks are used to define the policies that could stop them. The rights are reflected in the conceptual class mode
作者: Archipelago    時間: 2025-3-22 13:37
Connectivity in Eventually Quiescent Dynamic Distributed Systemsnnectivity when an arbitrary large number of entities may arrive/depart concurrently at any time, doing so for an arbitrarily long time. A solution is presented achieving overlay connectivity during . of the system: periods in which no more arrivals and departures take place. The paper conveys the f
作者: Archipelago    時間: 2025-3-22 18:06

作者: 把手    時間: 2025-3-23 01:15

作者: DEAF    時間: 2025-3-23 03:30

作者: Deadpan    時間: 2025-3-23 09:32
Security Patterns and Secure Systems Design attacks are considered from an analysis of use cases. Then the rights of the users are defined from the use cases using a Role-Based Access Control (RBAC) or other security model. The attacks are used to define the policies that could stop them. The rights are reflected in the conceptual class mode
作者: 菊花    時間: 2025-3-23 11:31

作者: insert    時間: 2025-3-23 15:18

作者: 鉆孔    時間: 2025-3-23 18:50

作者: 議程    時間: 2025-3-23 22:11
Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluationint paths to the destination, enhancing the path redundancy, and so extending the possibility of using detours, or alternative paths if needed. Route distance is employed as a secondary criterion. Routes may be dynamically changed by intermediate routers, which usually have more recent information a
作者: CLOUT    時間: 2025-3-24 03:52
On the Implementation of Communication-Optimal Failure Detectorscient . algorithms, i.e., algorithms using . links to carry messages forever, being . the number of processes in the system. Moreover, we have recently proposed a . algorithm that uses only . links, being . the number of correct processes. In this paper, we show that . is the minimum number of links
作者: Arable    時間: 2025-3-24 08:40

作者: PATHY    時間: 2025-3-24 12:54
Implementing Fault Tolerance Using Aspect Oriented Programmingis that most present day AOP languages do not offer the level of control needed. This paper addresses the problem by defining a representative set of fault tolerance mechanisms. The set can be used for evaluating the feasibility of languages and for finding needs for improvements. It has been used t
作者: 起草    時間: 2025-3-24 15:06

作者: 我就不公正    時間: 2025-3-24 21:00

作者: expeditious    時間: 2025-3-25 02:38

作者: STERN    時間: 2025-3-25 06:17
Gossiping: Adaptive and Reliable Broadcasting in MANETs delivery of messages. The spreading of broadcast messages has a strong similarity with the spreading of infectious diseases. Applying epidemiological models to broadcasting allows an easy evaluation of such strategies depending on the MANET characteristics, e.g. the node density. In this paper, we
作者: 炸壞    時間: 2025-3-25 09:02
On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenariostly affected by terrain, obstacles, battery exhaustion and node mobility. Existing broadcasting protocols for MANETs are able to deal with mobility, as well as congestion and collision, but only when under a fail-stop failure model. However, this model is not a good representative of the real scenar
作者: 發(fā)炎    時間: 2025-3-25 12:01
Failure Boundedness in Discrete Applicationslous state. This is in contrast with continuous feedback systems where wrong outputs can only gradually deviate the system under control from its intended set point. Transient errors may even be filtered by the latency inherent to the physical application. In this paper we extend our previous experi
作者: Femish    時間: 2025-3-25 16:04

作者: 新星    時間: 2025-3-25 23:34
Component-Based Software Certification Based on Experimental Risk Assessments such as ISO/IEC 9126, ISO/IEC 14598 or ISO/IEC 25051. In many application areas, especially in mission-critical applications, certification is essential or even mandatory. However, the certification of software products using common off-the-shelf (COTS) components is difficult to attain, as detail
作者: resilience    時間: 2025-3-26 00:09
Integrated Intrusion Detection in Databasessms to protect data. However these mechanisms cannot always stop malicious users from accessing the data by exploiting system vulnerabilities. In fact, when a malicious user accesses the database there is no effective way to detect and stop the attack in due time. This practical experience report pr
作者: 闖入    時間: 2025-3-26 06:16

作者: MOAT    時間: 2025-3-26 11:57
Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?y evaluation experiments. The tutorial, intended for researchers working in experimental dependability evaluation, includes a demonstration of the use of these technologies in a concrete example of experimental dependability evaluation.
作者: 生來    時間: 2025-3-26 16:37

作者: laceration    時間: 2025-3-26 20:17
BAR—Where Distributed Computing Meets Game Theoryive because their diffused control structure may yield services that are potentially less costly and more democratic than their more centralized counterparts. Unfortunately, they are also particularly problematic from a dependability standpoint as they challenge the traditional distinction between c
作者: CHARM    時間: 2025-3-26 21:57
Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluationdistance is employed as a secondary criterion. Routes may be dynamically changed by intermediate routers, which usually have more recent information about topology changes. Formal proofs for correctness of the algorithm are also presented. The proposed algorithm was implemented in a simulation environment and experimental results are presented.
作者: 油氈    時間: 2025-3-27 04:12

作者: 沙草紙    時間: 2025-3-27 05:29
Rigid Bodies and Reference Frameso evaluate the AspectC++ language, and a number of limitations have been revealed. AspectC++ was then extended in order to address this. It is also demonstrated how reusable fault tolerance mechanisms can be built using aspect oriented C++, and the advantages compared to using standard C++ are discussed.
作者: carotid-bruit    時間: 2025-3-27 10:43
Closed-loop Subspace Identificatione density and forwarding probability on the quality of gossiping. The result of our investigation is to enable mobile nodes for dynamically adapting their forwarding probability depending on the local node density. Simulation results in ns-2 show the reliability, efficiency and scalability of adaptive gossiping.
作者: intoxicate    時間: 2025-3-27 13:37

作者: BUMP    時間: 2025-3-27 19:58

作者: RALES    時間: 2025-3-28 01:34

作者: genesis    時間: 2025-3-28 04:17

作者: 違反    時間: 2025-3-28 06:49
Implementing Fault Tolerance Using Aspect Oriented Programmingo evaluate the AspectC++ language, and a number of limitations have been revealed. AspectC++ was then extended in order to address this. It is also demonstrated how reusable fault tolerance mechanisms can be built using aspect oriented C++, and the advantages compared to using standard C++ are discussed.
作者: 和音    時間: 2025-3-28 12:26

作者: Obsessed    時間: 2025-3-28 17:58

作者: 填滿    時間: 2025-3-28 21:31
Rigid Bodies and Reference Framesifying important dependability properties. Beyond this, the formal models are also used for generating unit and integration test cases that would be used for validating the final software product. The feasibility of the proposed approach was evaluated on an embedded critical case study.
作者: Bone-Scan    時間: 2025-3-28 23:18

作者: Mediocre    時間: 2025-3-29 06:07

作者: Champion    時間: 2025-3-29 08:16
https://doi.org/10.1007/978-1-84882-681-6tions from a standard database benchmark (TPC-W) and a real database application. Results show that the proposed intrusion detection tool can effectively detect SQL-based attacks with no false positives and no overhead to the server.
作者: 創(chuàng)作    時間: 2025-3-29 13:55
Modelling Back-end Issues in Manufacturingneutral mechanisms that allow the secure designation and identification of participating devices. We show that they can serve as a building block for a wide range of cooperation policies that address most of the security threats we are concerned with. We conclude on future directions.
作者: Demonstrate    時間: 2025-3-29 19:30
Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing?and, thanks to the large scale integration, one may expect the fault tolerance techniques to come to the rescue of the limitations of the currently dominating fault avoidance approaches. After a brief review of each of these issues, we will provide a few hints concerning a proposal for resilient multicore processor chips.
作者: 突變    時間: 2025-3-29 19:51

作者: MOAN    時間: 2025-3-30 00:22
Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study(FCM) clustering algorithm is used. A case study demonstrates and validates the approach. Contrary to other approaches, no prior information is needed about the tests carried out before, e.g., as is case in regression testing.
作者: inconceivable    時間: 2025-3-30 06:45

作者: Fulminate    時間: 2025-3-30 11:14
Integrated Intrusion Detection in Databasestions from a standard database benchmark (TPC-W) and a real database application. Results show that the proposed intrusion detection tool can effectively detect SQL-based attacks with no false positives and no overhead to the server.
作者: 違反    時間: 2025-3-30 15:07
Security Rationale for a Cooperative Backup Service for Mobile Devicesneutral mechanisms that allow the secure designation and identification of participating devices. We show that they can serve as a building block for a wide range of cooperation policies that address most of the security threats we are concerned with. We conclude on future directions.
作者: covert    時間: 2025-3-30 18:16
Gradual Development of a Dynamic Model application-driven architectural designs, e.?g., see [1]. One of the main drivers is the reduction of the size of the elementary devices. Nevertheless, the evolution of nanoscale technologies raises serious challenges with respect to both dependability and security viewpoints. Issues at stake encom
作者: Palpable    時間: 2025-3-31 00:26
Dynamic Modeling for Marine Conservationint paths to the destination, enhancing the path redundancy, and so extending the possibility of using detours, or alternative paths if needed. Route distance is employed as a secondary criterion. Routes may be dynamically changed by intermediate routers, which usually have more recent information a
作者: 他姓手中拿著    時間: 2025-3-31 03:32
Dynamic Modeling for Marine Conservationcient . algorithms, i.e., algorithms using . links to carry messages forever, being . the number of processes in the system. Moreover, we have recently proposed a . algorithm that uses only . links, being . the number of correct processes. In this paper, we show that . is the minimum number of links
作者: 無聊的人    時間: 2025-3-31 05:14
Dynamic Response of Mix Systems,cterizing dimension of these systems is their, possibly, arbitrary large size (number of entities) and the possible arbitrary small part of the system a single entity directly interacts with. This interaction occurs through data exchange over logical links, and the constantly changing graph, formed
作者: Regurgitation    時間: 2025-3-31 11:03
Rigid Bodies and Reference Framesis that most present day AOP languages do not offer the level of control needed. This paper addresses the problem by defining a representative set of fault tolerance mechanisms. The set can be used for evaluating the feasibility of languages and for finding needs for improvements. It has been used t
作者: 使迷醉    時間: 2025-3-31 16:15

作者: Trochlea    時間: 2025-3-31 18:22
https://doi.org/10.1007/978-0-387-28750-8ous features to simultaneously be considered, often leading to a large number of tests. In such cases, because of time and cost constraints the entire set of tests cannot be run. It is then essential to prioritize the tests in sense of a ordering of the relevant events entailed in accordance with th
作者: ovation    時間: 2025-3-31 22:53
Overview of Dynamic Musculoskeletal Modelingy for years, despite having been designed without criticality requirements. However, the requirements of mobility, digital identification and authentication lead to an increasing dependence of societies on the correct behaviour of these ’proxies for the individual’. The Windows Mobile 5.0 release ha
作者: 踉蹌    時間: 2025-4-1 04:41
Closed-loop Subspace Identification delivery of messages. The spreading of broadcast messages has a strong similarity with the spreading of infectious diseases. Applying epidemiological models to broadcasting allows an easy evaluation of such strategies depending on the MANET characteristics, e.g. the node density. In this paper, we




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
错那县| 满洲里市| 徐水县| 安康市| 海淀区| 宕昌县| 孝义市| 准格尔旗| 延庆县| 揭西县| 辽阳县| 牙克石市| 云阳县| 依兰县| 十堰市| 喀什市| 黄梅县| 马关县| 洮南市| 贵阳市| 二连浩特市| 神木县| 盐城市| 花垣县| 贡觉县| 浮山县| 孟津县| 绥阳县| 平武县| 论坛| 山西省| 浦城县| 上蔡县| 金阳县| 申扎县| 靖宇县| 保康县| 汶上县| 吉隆县| 连南| 扎囊县|