標(biāo)題: Titlebook: Verification and Evaluation of Computer and Communication Systems; 11th International C Kamel Barkaoui,Hanifa Boucheneb,Sofiène Tahar Confe [打印本頁(yè)] 作者: Scuttle 時(shí)間: 2025-3-21 19:51
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems影響因子(影響力)
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems被引頻次
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems被引頻次學(xué)科排名
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems年度引用
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems年度引用學(xué)科排名
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems讀者反饋
書(shū)目名稱(chēng)Verification and Evaluation of Computer and Communication Systems讀者反饋學(xué)科排名
作者: Abrupt 時(shí)間: 2025-3-21 22:57
Analyzing Distributed Pi-Calculus Systems by Using the Rewriting Engine Maude,wing to verify properly the properties of the distributed systems. The approach is illustrated by examples of distributed systems analyzed by using the powerful Maude platform. We verify whether some systems are behaviourally equivalent by involving the metalevels of Maude.作者: 有節(jié)制 時(shí)間: 2025-3-22 01:02 作者: 宴會(huì) 時(shí)間: 2025-3-22 05:29
Uppaal vs Event-B for Modelling Optimised Link State Routing,on languages, their update of variables mechanism, their modularity methods, their verification strategies, their scalability potentials and their real-time modelling capabilities. Based on it, we provide several guidelines for when to use Uppaal or Event-B for formal modelling and analysis.作者: interior 時(shí)間: 2025-3-22 08:51
Formal Probabilistic Analysis of a Virtual Fixture Control Algorithm for a Surgical Robot,Given the safety-critical nature of these surgeries, ensuring the accuracy and safety of the control algorithms of these surgical robots is an absolute requirement. However, traditionally these algorithms have been analyzed using simulations and testing methods, which provide in-complete and approxi作者: Proclaim 時(shí)間: 2025-3-22 15:52
Performance Analysis of Multi-services Call Admission Control in Cellular Network Using ProbabilistControl is a mechanism regulating cellular network access to ensure QoS provisioning. From the fact that cellular networks have many classes of services and each class has different QoS requirements, we study CAC schemes supporting two classes of services, real time (RT) and non-real time (NRT), and作者: Dissonance 時(shí)間: 2025-3-22 18:38
Application of Generalized Stochastic Petri Nets to Performance Modeling of the RF Communication inn our model two types of priority requests are considered. In the first type, high priority requests are queued and served according to FIFO discipline. In the second type (case of blocking) low priority requests join the orbit before retrying the request until they find the server free. We consider作者: 祖?zhèn)?nbsp; 時(shí)間: 2025-3-22 21:33
Regression-Based Statistical Bounds on Software Execution Time,Ts can be replaced by less stringent probabilistic bounds, which we call Maximal Execution Times (METs). In our approach, we can obtain adequate probabilistic execution time models by separating the non-random input data dependency from a modeling error that is purely random. To achieve this, we pro作者: 滲透 時(shí)間: 2025-3-23 04:48
WCET Analysis by Model Checking for a Processor with Dynamic Branch Prediction,onsider a microarchitecture inspired by the e200z4 Power 32-bit architecture, with an instruction cache, a dynamic branch prediction mechanism, a branch target buffer (BTB) and an instruction prefetch buffer. The conjoint operation of all these components produce a very complex behaviour that is dif作者: Presbyopia 時(shí)間: 2025-3-23 07:44 作者: 打火石 時(shí)間: 2025-3-23 09:53 作者: 失誤 時(shí)間: 2025-3-23 17:07
Mobility Load Balancing over Intra-frequency Heterogeneous Networks Using Handover Adaptation,ce outdoor macro-cells are often likely to be affected by heavy loaded situations, a major issue in HetNet planning is to ensure that small-cells actually serve enough user equipments (UE). A scenario to consider is the traffic offloading from macro-cells to small-cells. The concept of Mobility Load作者: 針葉 時(shí)間: 2025-3-23 18:37 作者: 初學(xué)者 時(shí)間: 2025-3-23 23:10
Intertwined Global Optimization Based Reachability Analysis, dynamics with parameter and noise disturbance, a system of stochastic recurrence equations formalism is proposed. Then, a reachability analysis approach is adopted to compute the reachable sets under an interval of initial conditions and in light of system parameters variability. The novelty of our作者: Manifest 時(shí)間: 2025-3-24 04:40
Analyzing Distributed Pi-Calculus Systems by Using the Rewriting Engine Maude,buted .-calculus are translated into a rewriting logic which is executable on the Maude software platform. We prove an operational correspondence allowing to verify properly the properties of the distributed systems. The approach is illustrated by examples of distributed systems analyzed by using th作者: monologue 時(shí)間: 2025-3-24 10:11 作者: 可轉(zhuǎn)變 時(shí)間: 2025-3-24 12:25
Uppaal vs Event-B for Modelling Optimised Link State Routing,one of the proactive routing protocols used in Mobile Ad-hoc Networks (MANETs) and Wireless Mesh Networks (WMNs). We also describe different aspects of the Uppaal and Event-B formalisms. This leads to a more general comparison of both formalisms, considering the following criteria: their specificati作者: Intuitive 時(shí)間: 2025-3-24 17:23 作者: Fester 時(shí)間: 2025-3-24 19:39
Application of Generalized Stochastic Petri Nets to Performance Modeling of the RF Communication invia GSPN formalism. Firstly, we study the case where the high priority requests have non-preemptive priority over lower ones. While, in the second case, we apply the preemptive discipline to the high priority requests. Finally, some numerical examples are given to illustrate our analysis.作者: Deadpan 時(shí)間: 2025-3-24 23:20
Regression-Based Statistical Bounds on Software Execution Time,osed technique cannot directly achieve extreme probability levels that are usually expected for WCETs, it is an attractive alternative for MET analysis, since it can arguably guarantee safe probabilistic bounds. We demonstrate our method on a JPEG decoder running on an industrial SPARC V8 processor.作者: ensemble 時(shí)間: 2025-3-25 05:18 作者: PALMY 時(shí)間: 2025-3-25 07:37 作者: 膠狀 時(shí)間: 2025-3-25 12:28
0302-9743 ?cation and Evaluation of Computer and Communication Systems ( VECoS 2017 ), held at Concordia University, Montreal, Canada, in August 2017.. The 13 full papers, together with 3 abstracts in this volume were carefully reviewed andselected from 35 submissions..The aim of the VECoS conference is to br作者: EXALT 時(shí)間: 2025-3-25 18:07
Muhammad Saad Ayub,Osman Hasanem for the future.. A modern corporate information system (IS) strategy to support the required flexibility is indispensable. One way of reducing the increasing complexity of many products and value-added processes is modularization.. A company concentrates on modules corresponding to its own core c作者: 象形文字 時(shí)間: 2025-3-25 20:38
Sana Younes,Momtez Benmbarekded s- tems are safety- or security-critical such as in medical equipment, nuclear plants, and X-by-wire control systems in naval, ground and aerospace transportation - hicles. With the continuing shift from hardware to software, embedded systems are increasingly dominated by embedded software. Embe作者: hyperuricemia 時(shí)間: 2025-3-26 01:22 作者: peptic-ulcer 時(shí)間: 2025-3-26 07:12
Peter Poplavko,Ayoub Nouri,Lefteris Angelis,Alexandros Zerzelidis,Saddek Bensalem,Panagiotis Katsarois of run-time behavior is made. Those methods that do address run-time behavior suffer from .: the exponential increase of the number of global states, and hence the complexity of the analysis, with the number of components. We present a method for designing component-based systems and verifying th作者: Gobble 時(shí)間: 2025-3-26 08:48 作者: Spina-Bifida 時(shí)間: 2025-3-26 16:35 作者: 愛(ài)好 時(shí)間: 2025-3-26 18:00
Abderraouf Boussif,Mohamed Ghazelis paper proposed a test-broker architecture so that all stakeholder within WS can contribute to improve the testing of the services. The test broker supports the submission, indexing, and querying of test artifacts such as test cases, defect reports and evaluations. It can also provide the services作者: Melodrama 時(shí)間: 2025-3-26 21:03
Hana Jouini,Mohamed Escheikh,Kamel Barkaoui,Tahar Ezzedine to provide ‘consistent’ componential models (i.e. models defining kin terms by necessary and sufficient features) or have failed to list all componential models of specific data sets. The first problem has generally remained unnoticed, while the second was emphasized by Robbins Burling and attracte作者: 傲慢人 時(shí)間: 2025-3-27 04:26
Pierre André,Nicolas Rivière,Hélène WaeselynckSO Publicly Available Specification (PAS) [ISO PAS tba:2002] A specification for the process assessment of human-system issues. It presents a view of the system life cycle with an emphasis on the identification and handling of issues related to people (users and other stakeholders). The model is foc作者: MOAN 時(shí)間: 2025-3-27 06:14
Ibtissem Seghaier,Sofiène Tahartential evapotranspiration (PET at Tunis: 1400 mm; mean rainfall 4–50 mm). The results show that the olive tree has high photosynthetic capacity (compared with other species) but that it is rather affected by extreme watering conditions and by salinity. Excess of water (compared with needs) induces 作者: 殘暴 時(shí)間: 2025-3-27 13:00 作者: Observe 時(shí)間: 2025-3-27 16:50 作者: 整潔漂亮 時(shí)間: 2025-3-27 21:18
Mojgan Kamali,Luigia Petreord high temperature at which a material became superconductor was 23 K and was set in 1974. In 1987, there started appearing reports of superconductivity at temperatures up to 90 or 100 K in samples containing lanthanum, copper, oxygen, and barium or another Ha metal. These new ceramic superconduct作者: surmount 時(shí)間: 2025-3-28 00:44
and since exposure to either the energy emitted from radioactive decay or chemical properties of radionuclides poses dire health risks, radioactive materials must be segregated and controlled. The capture, treatment, and disposition of radioactive materials remain an extraordinary challenge. In her作者: 打折 時(shí)間: 2025-3-28 03:38
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/v/image/981698.jpg作者: 鑒賞家 時(shí)間: 2025-3-28 08:42 作者: consolidate 時(shí)間: 2025-3-28 14:19
Kamel Barkaoui,Hanifa Boucheneb,Sofiène TaharIncludes supplementary material: 作者: 闡明 時(shí)間: 2025-3-28 16:37
978-3-319-66175-9Springer International Publishing AG 2017作者: 路標(biāo) 時(shí)間: 2025-3-28 19:16 作者: debris 時(shí)間: 2025-3-29 00:02
Formal Probabilistic Analysis of a Virtual Fixture Control Algorithm for a Surgical Robot,bout the out-of-boundary problem for the given algorithm and found some new insights, which were not gained in a previous attempt of using formal methods in the same context. For validation, we have also done some experiments by running the considered algorithm on the Al-Zahrawi surgical robot.作者: Angioplasty 時(shí)間: 2025-3-29 04:11
Performance Analysis of Multi-services Call Admission Control in Cellular Network Using Probabilistk we propose to employ Continuous-time Stochastic Logic (CSL) to specify QoS requirements using transient and steady-state formulas supported by this formalism. Indeed, CSL is a specification language that can be used for Continuous Time Markov Chains (CTMCs) and offers the flexibility to express bo作者: 畸形 時(shí)間: 2025-3-29 08:48 作者: GLIDE 時(shí)間: 2025-3-29 12:27 作者: detach 時(shí)間: 2025-3-29 17:27 作者: 壓倒 時(shí)間: 2025-3-29 23:42
Muhammad Saad Ayub,Osman Hasanthe development towards a fully automated enterprise — which is considered as the long-term goal of IS research. I support the assumption of Scheer that the era of rigid monolithic Enterprise Resource Planning (ERP) systems has passed. Service Oriented Architectures (SOA) might be a viable solution 作者: Enrage 時(shí)間: 2025-3-30 02:32 作者: evanescent 時(shí)間: 2025-3-30 04:54
Sedda Hakmi,Ouiza Lekadir,Djamil A?ssanised of a Publish/Subscribe Broker, a component-based service layer and a Policy Manager. The broker manages subscriptions information and the service layer provides mechanisms orthogonal to publish/subscribe core (e.g., diffusion protocols, data communication protocols, data encryption, etc.). The n作者: 樹(shù)膠 時(shí)間: 2025-3-30 09:22
Peter Poplavko,Ayoub Nouri,Lefteris Angelis,Alexandros Zerzelidis,Saddek Bensalem,Panagiotis Katsaromethod checks that behavior of a pair of interacting components conforms to given properties, specified in temporal logic. Interaction of the components is captured in a product of their behavioral automata, which are provided as a part of each component’s interface. We demonstrate the effectiveness作者: 供過(guò)于求 時(shí)間: 2025-3-30 16:10