標題: Titlebook: Industrial Deployment of System Engineering Methods; Alexander Romanovsky,Martyn Thomas Book 2013 Springer-Verlag Berlin Heidelberg 2013 D [打印本頁] 作者: 我在爭斗志 時間: 2025-3-21 17:05
書目名稱Industrial Deployment of System Engineering Methods影響因子(影響力)
書目名稱Industrial Deployment of System Engineering Methods影響因子(影響力)學科排名
書目名稱Industrial Deployment of System Engineering Methods網絡公開度
書目名稱Industrial Deployment of System Engineering Methods網絡公開度學科排名
書目名稱Industrial Deployment of System Engineering Methods被引頻次
書目名稱Industrial Deployment of System Engineering Methods被引頻次學科排名
書目名稱Industrial Deployment of System Engineering Methods年度引用
書目名稱Industrial Deployment of System Engineering Methods年度引用學科排名
書目名稱Industrial Deployment of System Engineering Methods讀者反饋
書目名稱Industrial Deployment of System Engineering Methods讀者反饋學科排名
作者: Anhydrous 時間: 2025-3-22 00:15 作者: 堅毅 時間: 2025-3-22 01:07 作者: arousal 時間: 2025-3-22 07:03
Rainer Gmehlich,Cliff Joneso achieve adversarial goals at test time. Although existing poisoning techniques prove to be effective in various scenarios, they rely on certain assumptions on the adversary knowledge and capability to ensure efficacy, which may be unrealistic in practice. This paper presents a new, practical targe作者: Confess 時間: 2025-3-22 09:57 作者: Suggestions 時間: 2025-3-22 16:38 作者: Palate 時間: 2025-3-22 17:43
Sebastian Wieczorek,Vitaly Kozyura,Wei Wei,Andreas Roth,Alin Stefanescu the Trojan attack (or poisoning backdoor attack). The lack of robustness of DNNs against Trojan attacks could significantly harm real-life machine learning (ML) systems in downstream applications, therefore posing widespread concern to their trustworthiness. In this paper, we study the problem of t作者: inchoate 時間: 2025-3-23 01:01
Aryldo G. Russo Jr.ned control over the generative process has lagged behind. If this new technology is to find practical uses, we need to achieve a level of control over generative networks which, without sacrificing realism, is on par with that seen in computer graphics and character animation. To this end we propos作者: 砍伐 時間: 2025-3-23 02:04
Alex Hill,Jose Reis,Paulo Carvalhogning specific data augmentation methods for individual architectures. In this work, we present the first attempt to automate the design of data augmentation policies for 3D object detection. We introduce the Progressive Population Based Augmentation (PPBA) algorithm, which learns to optimize augmen作者: 豎琴 時間: 2025-3-23 05:56
Stephen Wright,Kerstin Edererent HOI categories has similar visual characteristics, while ignoring the diverse semantic meanings of the verb. To address this issue, in this paper, we propose a novel Polysemy Deciphering Network (PD-Net), which decodes the visual polysemy of verbs for HOI detection in three ways. First, PD-Net作者: laceration 時間: 2025-3-23 11:04 作者: Myosin 時間: 2025-3-23 17:41 作者: Irrigate 時間: 2025-3-23 20:27
Michael Butler,Laurent Voisin,Thomas Mullererent HOI categories has similar visual characteristics, while ignoring the diverse semantic meanings of the verb. To address this issue, in this paper, we propose a novel Polysemy Deciphering Network (PD-Net), which decodes the visual polysemy of verbs for HOI detection in three ways. First, PD-Net作者: 修正案 時間: 2025-3-24 00:07 作者: expire 時間: 2025-3-24 03:46 作者: Nonporous 時間: 2025-3-24 08:05 作者: 壕溝 時間: 2025-3-24 14:30
ect Permanence is critical for building a model of the world, since objects in natural visual scenes dynamically occlude and contain each-other. Intensive studies in developmental psychology suggest that object permanence is a challenging task that is learned through extensive experience..Here we in作者: 歌劇等 時間: 2025-3-24 15:34
Experience of Deployment in the Automotive Industry,es and practices is followed by a detailed description of the process used to experiment with the adoption of more formal methods by Bosch Research. One conclusion is that there is a need for semi-formal methods for bridging the gap between the initial (natural language) requirements and the creatio作者: 官僚統(tǒng)治 時間: 2025-3-24 22:27
Improving Railway Data Validation with ProB, to develop software components for the zone and carborne controllers of CBTC systems. However, the development relies on certain assumptions about the actual rail network topology which have to be validated separately in order to ensure safe operation. For this purpose, Siemens has developed custom作者: 冷淡周邊 時間: 2025-3-25 00:36
Deployment in the Space Sector,ey have been properly implemented, and that the overall system therefore complies with the standards adopted in the sector. In addition, the software development process is often influenced by a number of factors, such as constraints on the hardware platform, stringent performance requirements, and 作者: narcotic 時間: 2025-3-25 04:06
Business Information Sector, introduction of formal methods to business software development. This deployment came in three phases: modelling, formal verification and model-based testing. For each phase, we describe a few representative deployment cases in detail, and discuss the problems that we encountered and the decisions 作者: Brittle 時間: 2025-3-25 10:16 作者: famine 時間: 2025-3-25 14:45
,Critical Software Technologies’ Experience with Formal Methods,FD), used on board commercial and military aircraft. The case study was used to explore and learn about both the Event-B method and the Rodin toolset. This chapter relates the experience of CSWT with Event-B in the context of DEPLOY, describing the advantages of this formal method for safety- and mi作者: 天氣 時間: 2025-3-25 18:15 作者: 高深莫測 時間: 2025-3-25 22:36 作者: 盲信者 時間: 2025-3-26 02:23
Tooling,chapter outlines the management of the development and evolution of these tools during the lifetime of the DEPLOY project in response to deployment needs and methodological developments. The planning and maintenance process is described and a range of specific tool features developed to meet specifi作者: Scleroderma 時間: 2025-3-26 07:46 作者: aesthetic 時間: 2025-3-26 10:09 作者: incredulity 時間: 2025-3-26 15:39 作者: legitimate 時間: 2025-3-26 17:21 作者: 一美元 時間: 2025-3-26 21:07 作者: garrulous 時間: 2025-3-27 03:27 作者: 合法 時間: 2025-3-27 09:21
Introducing Formal Methods into Existing Industrial Practices,This chapter discusses various methodological issues faced when integrating formal methods into existing industrial practices. It describes the experience of the DEPLOY industrial partners and the DEPLOY Associates gained during the deployment of Event-B and the supporting toolset in their industrial settings.作者: Aspiration 時間: 2025-3-27 12:16
Industrial Software Engineering and Formal Methods,In this chapter the editors consider the current state of professional software development in industry and commerce, the need for improvement, the role of formal methods and the opportunities and barriers that have been revealed by DEPLOY.作者: 難管 時間: 2025-3-27 14:15 作者: Osteoporosis 時間: 2025-3-27 18:27 作者: chronicle 時間: 2025-3-28 00:02
Technology Transfer, the challenges that we faced over the course of the project and the decisions that we made, along with their justification. We also summarise the lessons learned and what we would do differently in future technology transfer projects.作者: 睨視 時間: 2025-3-28 03:25 作者: amplitude 時間: 2025-3-28 08:09 作者: 行業(yè) 時間: 2025-3-28 12:28
Experience of Deployment in the Automotive Industry,blem Frames Approach and that envisaged in Event-B. Finally, the experience gained by the main support contact (Newcastle University) is analysed in the hope that these lessons will assist future projects.作者: aphasia 時間: 2025-3-28 15:16 作者: micronized 時間: 2025-3-28 21:49
Book 2013e useful.?This book summarizes the results of the DEPLOY research project on engineering methods for dependable systems through the industrial deployment of formal methods in software development. The applications considered were in automotive, aerospace, railway, and enterprise information systems,作者: FANG 時間: 2025-3-29 01:48
Business Information Sector, testing. For each phase, we describe a few representative deployment cases in detail, and discuss the problems that we encountered and the decisions that we had to make. The work discussed here was carried out to focus on issues of interest to SAP, the world’s leading provider of enterprise software.作者: Enervate 時間: 2025-3-29 04:00 作者: 討人喜歡 時間: 2025-3-29 09:55 作者: 喃喃而言 時間: 2025-3-29 12:46 作者: chondromalacia 時間: 2025-3-29 19:08
isational challenges.Of value to researchers, systems and so.A formal method is not the main engine of a development process, its contribution is to improve system dependability by motivating formalisation where useful.?This book summarizes the results of the DEPLOY research project on engineering m作者: antiandrogen 時間: 2025-3-29 21:33
Industrial Deployment of System Engineering Methods作者: 異端邪說下 時間: 2025-3-30 02:25 作者: 依法逮捕 時間: 2025-3-30 04:19 作者: 西瓜 時間: 2025-3-30 09:29 作者: deface 時間: 2025-3-30 13:10 作者: Bereavement 時間: 2025-3-30 16:42
Alexander Romanovskyensive experiments on two lane detection benchmark datasets show that our method could achieve the state-of-the-art performance in terms of both speed and accuracy. A light weight version could even achieve 300+ frames per second with the same resolution, which is at least 4x faster than previous st作者: Flounder 時間: 2025-3-30 23:53
Rainer Gmehlich,Cliff Jonestimization which is pervasively adopted in DNN models. We evaluate the efficacy of .?for generating targeted poisoning attacks via extensive experiments using various datasets and DNN models. Results show that .?is effective with a rather high success rate while preserving all the claimed properties作者: 神圣將軍 時間: 2025-3-31 01:15
Jér?me Falampin,Hung Le-Dang,Michael Leuschel,Mikael Mokrani,Daniel Plaggeraining data. Our method is developed without extra-dependency, thus can be flexibly integrated with the existing loss functions and network architectures. Extensive experiments on various benchmarks of face recognition show the proposed method significantly improves the training, not only in shallo作者: 赦免 時間: 2025-3-31 07:30 作者: 極微小 時間: 2025-3-31 12:52
Sebastian Wieczorek,Vitaly Kozyura,Wei Wei,Andreas Roth,Alin Stefanescu as all-sample universal attack. In addition, we propose a data-free TND, which can detect a TrojanNet without accessing any data samples. We show that such a TND can be built by leveraging the internal response of hidden neurons, which exhibits the Trojan behavior even at random noise inputs. The e作者: bronchodilator 時間: 2025-3-31 13:21
Aryldo G. Russo Jr.ng aspects such as head pose, facial expression, hair style, illumination, and many others which are very hard to annotate in real data. The real images, which are presented to the network without labels, extend the variety of the generated images and encourage realism. Finally, we propose an evalua作者: 時代 時間: 2025-3-31 19:46