Heart-Rate 发表于 2025-3-23 10:59:25

http://reply.papertrans.cn/24/2338/233732/233732_11.png

ornithology 发表于 2025-3-23 14:17:24

Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfigurationor systems with online-reconfiguration in a cost-efficient manner. Therefore, the required hazard analysis has to consider not only a concrete system and its embedded software but also the different software configurations. We present several extensions to an existing component-based hazard analysis

Insubordinate 发表于 2025-3-23 19:47:23

New VoIP Traffic Security Scheme with Digital Watermarkingprotocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is bas

animated 发表于 2025-3-24 00:47:24

http://reply.papertrans.cn/24/2338/233732/233732_14.png

Graduated 发表于 2025-3-24 02:56:30

Using Group Overlapping to Protect Server from Attack in Grid Computingre relayed through the adjacent nodes and do not contain identity information about the sender. Since these packets are passed through a dynamically-formed path and since the final destination is not known until the last time, it is impossible to know who has sent it in the beginning and who will be

表皮 发表于 2025-3-24 07:34:49

http://reply.papertrans.cn/24/2338/233732/233732_16.png

conjunctivitis 发表于 2025-3-24 13:48:41

http://reply.papertrans.cn/24/2338/233732/233732_17.png

遍及 发表于 2025-3-24 16:10:51

http://reply.papertrans.cn/24/2338/233732/233732_18.png

发表于 2025-3-24 20:20:31

http://reply.papertrans.cn/24/2338/233732/233732_19.png

赞美者 发表于 2025-3-24 23:23:28

The Boundary Element Method with Programmingducts. This paper proposes an Agent-based Software Configuration Management (ABSCM) System based on the CM process area of CMMI as well as nuclear safety-related regulations to support the operation of nuclear power plant.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Computer Safety, Reliability, and Security; 25th International C Janusz Górski Conference proceedings 2006 Springer-Verlag Berlin Heidelber