• No results found

Dependable Systems

A Software Product Certification Model for Dependable Systems Petra M. Heck

A Software Product Certification Model for Dependable Systems Petra M. Heck

... creating dependable systems has become a major scientific and engineering ...embedded systems, communication systems as well as in the field of enterprise information ...of dependable ...

13

Formal Methods in Dependable Systems Engineering: A Survey of Professionals from Europe and North America

Formal Methods in Dependable Systems Engineering: A Survey of Professionals from Europe and North America

... In university courses on software engineering, we learned that FMs are among the best we have to design and assure correct systems. The question “Why are FMs not used more widely?” (Knight et al., 1997) is hence ...

23

Replica determinism and flexible scheduling in hard real-time dependable systems

Replica determinism and flexible scheduling in hard real-time dependable systems

... real-time systems are typically based on active replication, ...real-time systems where this type of resource efficiencyÐwhich, in turn, translates to low system costÐis of utmost impor- ...

13

Quality Analysis of Dependable Systems: A Developer Oriented Approach

Quality Analysis of Dependable Systems: A Developer Oriented Approach

... nowadays, tend to use object- oriented notations for specifying the architecture of their software systems. UML, in particular, is becoming an industrial stan- dard notation for the definition of a family of ...

23

Application of the D3H2 methodology for the cost-effective design of dependable systems

Application of the D3H2 methodology for the cost-effective design of dependable systems

... (aDaptive Dependable Design for systems with Homogeneous and Heterogeneous redundancies) to assist in the systematic identification of heterogeneous redundancies, the design of hardware/software ...

25

Towards the Design of Tunable Dependable Systems

Towards the Design of Tunable Dependable Systems

... FPGA-based systems, on which dynamic partial reconfiguration can be exploited to vary the required reliability of an hardware component) and on the software-level (as in a multi-many core scenario pro- posed as a ...

5

2DCBS: A Model for Developing Dependable Component-Based Software

2DCBS: A Model for Developing Dependable Component-Based Software

... Software must meet a market window set by competitive organizations. High-quality software that meets the requirements of the process to be served with minimal failure and maximum security [10-14]. Nonetheless, several ...

30

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

... tion, and validation of systems that include hardware/software, data, procedures, and facilities. Driven from software development methodology, Model-Driven Engineer- ing (MDE) [3] can be used to analyze certain ...

26

Another look at the middleware for dependable distributed computing

Another look at the middleware for dependable distributed computing

... − Replication in the large: Data as well as object repli- cation techniques for availability have been studied ex- tensively in the literature. Replication protocols can be categorised by the type of consistency they ...

11

Towards Dependable Grid and Web Services

Towards Dependable Grid and Web Services

... Remote method invocations have been used in distributed systems for quite some time. Frameworks such as CORBA from the Object Management Group (OMG) [1] have had schemes in place to facilitate invocations on ...

5

A Virtualization-based Approach to Dependable Service Computing

A Virtualization-based Approach to Dependable Service Computing

... 3. An architectural model for dependability in large scale distributed systems. The proposed dependability approach is part of the architectural model that we proposed in [1]. The general approach to ensuring ...

14

Dependable dewatering. High corrosion resistance.

Dependable dewatering. High corrosion resistance.

... Air-Blowdown Manifolds - Standard on most Star PolyPresses to remove residual water from cakes. Designed with custom internal porting -- also allow you to wash process cakes and/or alter inlet/outlet locations. Sludge ...

8

The early identification of detector locations in dependable software

The early identification of detector locations in dependable software

... There are some limitations to the approach described in this paper. Firstly, the correlation between module coupling and spatial impact has been asserted based on several modules in several applications from different ...

11

LASER GROUP S DEPENDABLE SPIRIT

LASER GROUP S DEPENDABLE SPIRIT

... member runs the meeting. “This isn’t us telling them how to run their business; this is us helping to leverage out of them what their dreams are for their life and their business and documenting that in a simple way that ...

10

Design of Dependable and Trustworthiness Of Data Communication In WSN

Design of Dependable and Trustworthiness Of Data Communication In WSN

... network environment. We suppose that most CMs and CHs are good, where only 20% CMs and CHs are malicious. The comparison results are shown in With the increasing the number of CMs in a cluster, the CM-to-CM communication ...

6

An automated wrapper based approach to the design of dependable software

An automated wrapper based approach to the design of dependable software

... database systems and software ...legacy systems [19], where they act as connectors which allow independent systems to interact and the recon- ciliation of functionality [20] ...database ...

9

SELF-DEPENDABLE EASY NAVIGATION SYSTEM FOR BLIND PERSONS

SELF-DEPENDABLE EASY NAVIGATION SYSTEM FOR BLIND PERSONS

... Keywords :-Obstacle Detection, Ultrasonic Sensor, Micro Controller, Voice Play Back, Vibration.. Motor.[r] ...

7

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

... Permanent repository link: http://openaccess.city.ac.uk/15284/ Link to published version: http://dx.doi.org/10.1016/j.comnet.2016.06.028 Copyright and reuse: City Research Online aims to[r] ...

6

Trust Model for Dependable File Exchange in Cloud Computing

Trust Model for Dependable File Exchange in Cloud Computing

... (e.g., systems, servers, stockpiling, applications, and administrations) that can be quickly provisioned and discharged with negligible administration exertion or administration supplier ...

6

Dependable Interaction with an Intelligent Home Care Robot

Dependable Interaction with an Intelligent Home Care Robot

... One application of the secondary user interface is navigation while using the walking supporters of the robot [5]. In order to enable easy manipulation of the robot platform, the way to use it as a walking aid has been ...

7

Show all 10000 documents...

Related subjects