武士精神 发表于 2025-3-21 17:15:25

书目名称Computer Safety, Reliability, and Security影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0233731<br><br>        <br><br>书目名称Computer Safety, Reliability, and Security读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0233731<br><br>        <br><br>

echnic 发表于 2025-3-22 00:06:47

Discretisation and Interpolation,uppliers typically tackle with this problem by reducing the sensitivity of the system and validating it in hundreds of thousands of test kilometres, this paper presents an approach how it is possible to demonstrate safety with a carefully chosen functionality and less field test kilometres.

Merited 发表于 2025-3-22 00:35:43

http://reply.papertrans.cn/24/2338/233731/233731_3.png

愉快么 发表于 2025-3-22 08:38:02

Approach for Demonstrating Safety for a Collision Avoidance Systemuppliers typically tackle with this problem by reducing the sensitivity of the system and validating it in hundreds of thousands of test kilometres, this paper presents an approach how it is possible to demonstrate safety with a carefully chosen functionality and less field test kilometres.

蕨类 发表于 2025-3-22 08:52:45

Conference proceedings 2015liability, and Security, held in Delft, The Netherlands, in September 2015. ..The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. This year’s workshop are: ASSURE 2015 - Assurance Cases for Software-intensive Systems; DECSoS‘15 - EWICS/ERCIM/ARTEMIS D

清真寺 发表于 2025-3-22 15:05:45

http://reply.papertrans.cn/24/2338/233731/233731_6.png

清真寺 发表于 2025-3-22 21:00:15

http://reply.papertrans.cn/24/2338/233731/233731_7.png

GUILE 发表于 2025-3-23 01:03:53

http://reply.papertrans.cn/24/2338/233731/233731_8.png

烧烤 发表于 2025-3-23 05:16:30

The Boundary Element Method with Programmingpproach is described how to handle a quantitative safety analysis with different rating schemes for safety and security basic events. By doing so, it is possible to take security causes for safety failures into account and to rate their effect on system safety.

发炎 发表于 2025-3-23 08:59:10

Informing Assurance Case Review Through a Formal Interpretation of GSN Core Logicbe answered in the affirmative if a standard safety argument based on natural language is to be believed to be free from inconsistencies. The relevance of these findings to the combination of GSN and controlled natural language with first-order logic semantics is discussed.
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Computer Safety, Reliability, and Security; SAFECOMP 2015 Worksh Floor Koornneef,Coen van Gulijk Conference proceedings 2015 Springer Inter