With the rapid advances in computer science and technology, critical computer-based systems, such as those in aerospace, military, and power industries exhibit more complex dependent and dynamic behaviors, which canno...
详细信息
ISBN:
(纸本)9780889867055
With the rapid advances in computer science and technology, critical computer-based systems, such as those in aerospace, military, and power industries exhibit more complex dependent and dynamic behaviors, which cannot be fully captured by existing reliability modeling tools. In this paper, we introduce a new reliability modeling tool, called dynamic reliability block diagrams (DRBD), for modeling dynamic relationships between components, such as state dependency and redundancy. We give formal semantics for some key DRBD constructs using Object-Z formalism. In order to verify and validate the correctness of a DRBD model, we propose to convert a DRBD model into a colored Petri net (CPN), and use an existing Petri net tool, called CPN Tools, to analyze and verify dynamic system behavioral properties. Our case study and experimental results show that DRBD provides a powerful tool for system reliability modeling, and our proposed verification approach can effectively ensure the correct design of DRBD reliability models for complex and large-scale computer-based systems.
We discuss the use of architecture specification languages to drive both automated analytic modeling and automated system implementation. We 'co-generate' various formal models and an implementation from an ar...
详细信息
We discuss the use of architecture specification languages to drive both automated analytic modeling and automated system implementation. We 'co-generate' various formal models and an implementation from an architecture specification in a way that provides high assurance that the analysis results accurately predict implementation behavior. This approach enables improved system quality and functionality due to early and reliable design trade-off studies, rapid and low-cost system development and evolution, and increased
From the newsfeeds, the products and services advertised to us, job screening, risk analysis, facial recognition and to the results we get through search engines, human-curated algorithms sitting behind the scenes, ar...
详细信息
We present an algorithm for generating Chu space models of the behaviors of arbitrarily complex non-iterated systems including those with N-type dependencies. The generated Chu space can be used for verification of sy...
详细信息
ISBN:
(纸本)1601320566
We present an algorithm for generating Chu space models of the behaviors of arbitrarily complex non-iterated systems including those with N-type dependencies. The generated Chu space can be used for verification of system properties. The application of the model generation algorithm is illustrated with a few examples.
Take the design of a performance evaluation system for the R&D staff of a biological institute as an example, we used the use case diagram, package diagram, class diagram, deployment diagram, sequence diagram and ...
详细信息
The proceedings contain 137 papers. The topics discussed include: sexual harassment detection using machine learning and deep learning techniques for Bangla text;optimization strategies for micro-grid energy managemen...
ISBN:
(纸本)9798350345360
The proceedings contain 137 papers. The topics discussed include: sexual harassment detection using machine learning and deep learning techniques for Bangla text;optimization strategies for micro-grid energy management and scheduling systems by sine cosine algorithm;efficient hardware and software co-design for EEG signal classification based on extreme learning machine;measurement and modeling of GaAs based nano-pHEMT: small signal to large signal analysis;Alzheimer’s disease classification from 2D MRI brain scans using convolutional neural networks;faulty classes prediction in object-oriented programming using composed Dagging technique;interpretable multi labeled Bengali toxic comments classification using deep learning;protein structure prediction in structural genomics without alignment using support vector machine with fuzzy logic;and impact of transmission line capacity expansion on electricity operation cost and selling price.
The report seeks to develop an algorithm for polling measurement modules and estimating the error of indirect measurements in a personalized distributed information and measurement system with autonomous measurement m...
详细信息
Over the next several years the performance demands on globally available information servers are expected to increase dramatically. These servers must be capable of sending and receiving data over hundreds or even th...
详细信息
Security is a critical concern for mediator-based data integration among heterogeneous data sources Due to the interconnected and collaborative computing environment, most mediation systems demand flexible and fine-gr...
详细信息
ISBN:
(纸本)9781627486606
Security is a critical concern for mediator-based data integration among heterogeneous data sources Due to the interconnected and collaborative computing environment, most mediation systems demand flexible and fine-grained authorization capability There are three major security challenges faced by mediation systems: context-awareness, semantic heterogeneity, and multiple security policy specification Currently no existing approach addresses all three security challenges in mediation systems This paper provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges This paper presents a generic, extensible modeling method for the security policies in mediation systems A series of authorization constraints are identified based on the relationship on the different security components in the mediation systems Moreover, we enforce the flexible access control to mediation systems while providing uniform access for heterogeneous data sources.
暂无评论