调整
发表于 2025-3-26 22:03:26
http://reply.papertrans.cn/83/8265/826465/826465_31.png
欲望小妹
发表于 2025-3-27 05:01:44
A New Strategy for the HRT-HOOD to Ada Mapping been gained into the practical use of Ada 95 for high-integrity applications, of which the Ravenscar Profile is a notable emanation. In this paper we present a new HRT-HOOD to Ada mapping strategy, which aims to overcome the shortcomings we noted in the original one, by leveraging on the better und
协迫
发表于 2025-3-27 08:20:49
Using the AADL to Describe Distributed Applications from Middleware to Software Componentsrchitecture description languages (ADLs) such as the AADL provide adequate syntax and semantics to express all those properties on each component of a system. DRE systems rely on a key component, the middleware, to address distribution issues. In order to build efficient and verifiable systems, the
Cougar
发表于 2025-3-27 12:25:06
http://reply.papertrans.cn/83/8265/826465/826465_34.png
Missile
发表于 2025-3-27 14:43:37
http://reply.papertrans.cn/83/8265/826465/826465_35.png
刚毅
发表于 2025-3-27 19:21:15
Proving Functional Equivalence for Program Slicing in SPARKTMtool that extracts program slices from SPARK procedures and proves that the functionality of the original procedure is equivalent to the functionality of the collection of resulting slices. By showing that the effects of the SPARK statements in the collection of slices has the same effect on the inp
沙发
发表于 2025-3-28 01:21:29
http://reply.papertrans.cn/83/8265/826465/826465_37.png
蚀刻术
发表于 2025-3-28 04:02:45
A Comparison of the Mutual Exclusion Features in Ada and the Real-Time Specification for JavaTMatter case the sharing needs to be implemented by some mechanism that ensures mutually exclusive access, or possibly “concurrent read / exclusive write”. Ada and the Real-Time Specification for Java have taken different approaches to mutual exclusion. This paper analyzes and compares them with respe
micronutrients
发表于 2025-3-28 09:34:20
http://reply.papertrans.cn/83/8265/826465/826465_39.png
史前
发表于 2025-3-28 13:34:34
Non-intrusive System Level Fault-Tolerance faults that remain in software after system design and development behave like hardware transient faults: they appear, do the damage and disappear. The conventional approach used for handling task overruns caused by transient faults is to use a single recovery task that implements minimal functiona