Recently, bipolar fuzzy graph is a vastly growing research area as it is the generalization of the fuzzy graphs. In this paper, at first the concepts of regular and totally regular product bipolar fuzzy graphs is intr...
详细信息
This paper focuses on the latest version of a tool developed within the department to guide developer through the various steps of requirements, test-procedures and documentations to finally download the derived algor...
详细信息
This work presents a practical approach of designing a functionally safe ECU for automotive application by implementing the Model Based Development (MBD) methodology. Functional safety (FuSa) in automotive can be achi...
详细信息
This paper presents an automated code generation and validation, verification approach to convert model based developments into IEC 61131-3 conform function blocks. IEC 61131-3 programming languages are supported by P...
This paper presents an automated code generation and validation, verification approach to convert model based developments into IEC 61131-3 conform function blocks. IEC 61131-3 programming languages are supported by PLC manufacturers and software environment developers and provide the possibility that novel and intelligent algorithms can be directly operated on industrial accepted systems. Railway and transportation also receive drastic changes from purely hardware based systems to microcontroller + software driven systems. However, the conversion has to follow certain steps to ensure that the adaptation is done correctly and functionality is not alternated, added or deleted. Concepts suggested by different international standards such as the IEC 61508 can help to derive a tool chain to verify the generated code.
The structured approach to argumentation has seen a surge of models, introducing a multitude of ways to deal with the formalisation of arguments. However, while the development of the mathematical models have flourish...
详细信息
ISBN:
(纸本)9783939897637
The structured approach to argumentation has seen a surge of models, introducing a multitude of ways to deal with the formalisation of arguments. However, while the development of the mathematical models have flourished, the actual implementations and development of methods for implementation of these models have been lagging behind. This paper attempts to alleviate this problem by providing methods that simplify implementation, i.e. we demonstrate how the functional programming language Haskell can naturally express mathematical definitions and sketch how a theorem prover can verify this implementation. Furthermore, we provide methods to streamline the documenting of code, showing how literate programming allows the implementer to write formal definition, implementation and documentation in one file. All code has been made publicly available and reusable.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Symposium on Trends in Functional programming, TFP 2010, held in Norman, OK, USA, in May 2010. The 13 revised full pa...
详细信息
ISBN:
(数字)9783642229411
ISBN:
(纸本)9783642229404
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Symposium on Trends in Functional programming, TFP 2010, held in Norman, OK, USA, in May 2010. The 13 revised full papers presented were carefully reviewed and selected from 26 submissions during two rounds of reviewing and improvement. The papers cover new ideas for refactoring, managing source-code complexity, functional language implementation, graphical languages, applications of functional programming in pure mathematics, type theory, multitasking and parallel processing, distributed systems, scientific modeling, domain specific languages, hardware design, education, and testing.
The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substi...
详细信息
The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substitution, to authenticate system users, to authenticate data, and to provide digital signatures using a nonpublic key encryption algorithm. Key notarization facilities give users the capability of exercising a set of commands for key management as well as for data encryption functions. The facilities perform notarization which, upon encryption, seals a key or password with the identities of the transmitter and intended receiver. Thus, in order to decrypt a message, the receiver must authenticate himself and supply the correct identity of the transmitter. This feature eliminates the threat of key substitution which must be protected against to attain a high level of security.
IEEEXtreme is an IEEE Student Activities Committee initiative to create a worldwide programming contest for IEEE Student Branches. The success of the past editions and the way IEEEXtreme is evolving, suggests that it ...
详细信息
The problem of finding a maximal dense subgraph of a power-law random graph G(n, α) is considered for every value of density c ε (0, 1) and for every a ε (0,+∞). It is shown that in case α p(n1-α/2), in case α ...
详细信息
A graph structure is a useful tool in solving the combinatorial problems in different areas of computer science and computational intelligence systems. In this paper, we present a frame work to handle m-polar fuzzy in...
详细信息
暂无评论