找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Reliable Software Technology – Ada-Europe 2005; 10th Ada-Europe Inte Tullio Vardanega,Andy Wellings Conference proceedings 2005 Springer-Ve

[复制链接]
楼主: Corrugate
发表于 2025-3-26 22:03:26 | 显示全部楼层
发表于 2025-3-27 05:01:44 | 显示全部楼层
A New Strategy for the HRT-HOOD to Ada Mapping been gained into the practical use of Ada 95 for high-integrity applications, of which the Ravenscar Profile is a notable emanation. In this paper we present a new HRT-HOOD to Ada mapping strategy, which aims to overcome the shortcomings we noted in the original one, by leveraging on the better und
发表于 2025-3-27 08:20:49 | 显示全部楼层
Using the AADL to Describe Distributed Applications from Middleware to Software Componentsrchitecture description languages (ADLs) such as the AADL provide adequate syntax and semantics to express all those properties on each component of a system. DRE systems rely on a key component, the middleware, to address distribution issues. In order to build efficient and verifiable systems, the
发表于 2025-3-27 12:25:06 | 显示全部楼层
发表于 2025-3-27 14:43:37 | 显示全部楼层
发表于 2025-3-27 19:21:15 | 显示全部楼层
Proving Functional Equivalence for Program Slicing in SPARKTMtool that extracts program slices from SPARK procedures and proves that the functionality of the original procedure is equivalent to the functionality of the collection of resulting slices. By showing that the effects of the SPARK statements in the collection of slices has the same effect on the inp
发表于 2025-3-28 01:21:29 | 显示全部楼层
发表于 2025-3-28 04:02:45 | 显示全部楼层
A Comparison of the Mutual Exclusion Features in Ada and the Real-Time Specification for JavaTMatter case the sharing needs to be implemented by some mechanism that ensures mutually exclusive access, or possibly “concurrent read / exclusive write”. Ada and the Real-Time Specification for Java have taken different approaches to mutual exclusion. This paper analyzes and compares them with respe
发表于 2025-3-28 09:34:20 | 显示全部楼层
发表于 2025-3-28 13:34:34 | 显示全部楼层
Non-intrusive System Level Fault-Tolerance faults that remain in software after system design and development behave like hardware transient faults: they appear, do the damage and disappear. The conventional approach used for handling task overruns caused by transient faults is to use a single recovery task that implements minimal functiona
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-17 14:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表