E-Book, Englisch, Band 286, 534 Seiten, eBook
Zamojski / Mazurkiewicz / Sugier Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland
1. Auflage 2014
ISBN: 978-3-319-07013-1
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 286, 534 Seiten, eBook
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-3-319-07013-1
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Framework for the Distributed Computing of the Application Components.- Analysis of statistical characteristics of user arrival process to the testing service.- The Role of Enterprise Social Networking (ESN) on Business: Five Effective Recommendations for ESN.- Dependability and safety analysis of ETCS communication for ERTMS level 3 using performance statecharts and analytic estimation.- Entropy-based Internet Traffic Anomaly Detection: A Case Study.- A Formal Approach for Preventive Maintenance Workload Balancing.- Computer support for the railway safety management system – requirements analysis.- Computer support for the railway safety management system – first validation results.- Reductions of operators in Java mutation testing.- An approach for planning and analysis of the sewage sanitary networks using some calculation formulas and computer simulation.- Mathematical model of task scheduling in educational cloud.- Optimization and control of transport processes in the distributed systems.- On some resources placement schemes in the 4-dimensional soft degradable hypercube processors network.- Efficient training of context-dependent neural nets with conjugate gradient algorithms.- Analysis of Mutation Operators for the Python Language.- Deterministic schedule of task in multiprocessor computer systems with higher degree of dependability.- Using Simulation to Evaluate Dynamic Systems with Weibull or Lognormal Distributions.- FSM simulation of cryptographic protocols using algebraic processor.- Disturbance Injection in Dependability Assessment of Android Applications.- Approximate algorithm for fast capacity provisioning in WANs with trade-off between performance and cost under budget constraint.- Evolution of software quality models in context of the standard ISO 25010.- Model checking of UML activity diagrams in logic controllers design.- Impact of selected Java idioms on source code maintainability – empirical study.- Quantification of TemporalFault Trees Based on Fuzzy Set Theory.- Analysis of physical layer model of WLAN 802.11g data transmission protocol in wireless networks used by telematic systems.- Web systems availability assessment considering attacks on service configuration vulnerabilities.- A Recommender System Based on Content Clustering Used to Propose Forum Articles.- Simple Measure of Network Reliability using the Variance of the Degree Distribution.- CDM: A Prototype Implementation of the Data Mining JDM Standard.- Confidential transportation of data on the technical state of facilities.- Test of the multimedia services implementation in information and communication networks.- Unified Approach to Network Systems Multicriterial Analysis.- A comparison of forecasting methods for Ro-Ro traffic: a case study in the Strait of Gibraltar.- Partial blur: model, detection, deblurring.- Software support for Common Criteria security development process on the example of a data diode.- Increasing performance of SMS based information systems.- Internet-Based Production Monitoring and Reporting.- Reliability analysis of a two-stage Goel-Okumoto and Yamada S-shaped model.- Reliability assessment of cooperation and replacement of surveillance systems in air traffic.- Swarm Intelligence Metaheurisics Application in the Diagnosis of Transformer Oil.- Performance aspect of SaaS application based on tenant-based allocation model in a public Cloud.- Low cost FPGA devices in high speed implementations of Keccak-f hash algorithm.- Distributed time management in Wireless Sensor Networks.- Heuristic Cycle-Based Scheduling with Backfilling for Large-Scale Distributed Environments.- Behavior of web servers in stress tests.- The impact of reconfiguration time on the dependability of complex web based systems.- Propagation losses in urban areas.- Web service for Data Extraction from Semi-Structured Data Sources.- Investigation of system reliability depending on some system components states.- Model fusion forthe compatibility verification of software components.