Books on software engineering methodologies talk about the significance and need for designing consistent and complete specifications during the requirement analysis and design stages of a software development cycle. ...
详细信息
The present paper deals with the quantitative analysis of the safety-related systems. The configuration of such safety-related system is composed of channels that include both detectable and undetectable failures. It ...
详细信息
ISBN:
(纸本)9781622764365
The present paper deals with the quantitative analysis of the safety-related systems. The configuration of such safety-related system is composed of channels that include both detectable and undetectable failures. It also deals with a possible calculating model of a safety-intrusion and their consequences on the safety-related system, but it is also important to note at this point that information and experimental results for this model with real data are not (public) available yet. This model should clearly demonstrate the possible calculation of safety-intrusion model, based on high reliable architecture, with the help of Markov models.
Dixon Resultant method can eliminate many variables simultaneously. It is often used to solve a system of polynomial equations. However, the Dixon matrix is often singular, and the Dixon Resultant vanishes identically...
详细信息
the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of d...
详细信息
Runtime verification is a special form of runtime testing, employing formal methods and languages. In this work, we utilize next-time free linear-time temporal logic (LTL\X) as formal framework. The discipline serves ...
详细信息
ISBN:
(纸本)1581138334
Runtime verification is a special form of runtime testing, employing formal methods and languages. In this work, we utilize next-time free linear-time temporal logic (LTL\X) as formal framework. The discipline serves the purpose of asserting certain design-time assumptions about object-oriented (OO) entities such as objects, methods, and so forth. In this paper we propose a linear-time logic over join-points [4], and introduce a lightweight runtime verification tool based on this logic, J2SE 5 metadata [3] and an AspectJ-based [2] runtime backend. Implementations have been proposed so far for imperative and functional languages [5]. To our knowledge our approach is the first to allow addressing of entire sets of states, also over subclass boundaries, thus exploiting the OO nature.
Recommender systems allow making personalized recommendations for items or products while browsing online, using numerous algorithms and techniques to predict and recommend potentially useful items to a specific user....
详细信息
In this study, the notions of picture fuzzy -tolerance competition graphs are exhibited adding more uncertainties to the fuzzy -tolerance competition graphs. Taking as max, min and sum functions three special types of...
详细信息
Lazy functional languages have non-strict semantics and are purely declarative, i.e. they support the notion of referential transparency and are devoid of side effects. Traditional debugging techniques are, however, n...
详细信息
The aim of this study is threefold. First, a qualitative information security risk survey is implemented in human resources department of a logistics company. Second, a machine learning risk classification and predict...
详细信息
A lack of adequate and flexible topology support in the popular message passing systems such as Parallel Virtual Machine was a major factor in the development of our Virtual Process Topology Environment. This parallel...
详细信息
暂无评论