Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
PageMenu
-
Hauptmenü
-
Suchmenü
Einfache Suche
.
Erweiterte Suche
.
Zeitschriften-Suche
.
Suchergebnisse verfeinern
.
Neuerwerbungsliste nach Gruppen
.
Sortierreihenfolge
.
Benutzerdienste
Nutzeranmeldung
.
Mein Konto
.
Erwerbungsvorschlag
.
Fernleihe
.
Vormerkung
.
Verlängerung
.
Weitere Recherchemöglichkeiten
Datenbankinfosystem (DBIS)
.
Karlsruher virtueller Katalog (KVK)
.
Regensburger Systematik (RVK)
.
Elektronische Zeitschriften (EZB)
.
Zeitschriftendatenbank (ZDB)
.
Sitzung beenden
Katalog verlassen
.
Homepage WHZ
.
Hochschulbibliothek
.
© LIBERO v6.4.1sp240211
Page content
Sie befinden sich hier
:
>
Suchergebnisse
>
Verwandte Werke
Katalogdatenanzeige
Katalogdatenanzeige
Vorheriger Titel
.
Dependable Computer Systems
.
Bookmark für diesen Satz setzen
Katalogdatensatz500162788
.
.
Wikipedia-Verfasserlink
.
.
LibraryThing
.
Kataloginformation
Katalogdatensatz500162788
.
Kataloginformation
Feldname
Details
Vorliegende Sprache
eng
Hinweise auf parallele Ausgaben
346072220 Buchausg. u.d.T.: ‡Dependable computer systems
ISBN
978-3-642-21392-2
Name
Zamojski, Wojciech
Kacprzyk, Janusz
ANZEIGE DER KETTE
Kacprzyk, Janusz
Name
Mazurkiewicz, Jacek
Sugier, Jarosław
Walkowiak, Tomasz
T I T E L
Dependable Computer Systems
Verlagsort
Berlin, Heidelberg
Verlag
Springer Berlin Heidelberg
Erscheinungsjahr
2011
2011
Umfang
Online-Ressource (XIV, 314p. 126 illus, digital)
Reihe
Advances in Intelligent and Soft Computing ; 97
Notiz / Fußnoten
Includes bibliographical references and index
Weiterer Inhalt
Title; Preface; Contents; Patterns Improving the Common Criteria Compliant IT Security Development Process; Introduction; Project Background; Patterns in the CCMODE Project; Conclusions; References; A Comparison of Dataflow and Mutation Testing of Java Methods; Introduction; Data Flow and Mutation Testing; Related Work; Comparison of Dataflow and Mutation Testing; Conclusions; References; A New Three Levels Context Based Approach for Web Search Engines Evaluation; Introduction; How Context Can Be Used in IR; Classic Evaluation of IRS, Principles and Limits. Detailed Presentation of the Proposed ApproachApplication of the Proposed Approach to the Evaluation ofSearch Engines; Results and Discussion; Conclusion; References; Quantitative Verification of Non-functional Requirements with Uncertainty; Introduction; The U-MarMo Framework; From Sequence Diagrams to Markov Models; The Framework at Work; Related Work; Conclusions and Future Work; References; Testing Fault Susceptibility of a Satellite Power Controller; Introduction; Satellite Power Controller; Fault Injection Testbed; Experimental Results; Conclusion; References. Theoretical and Practical Aspects of Encrypted Containers Detection - Digital Forensics ApproachIntroduction; Signature Analysis; Statistical Data Analysis Algorithms; Indirect Methods; Summary; References; Metric-Probabilistic Assessment of Multi-Version Systems: Some Models and Techniques; Introduction; Multi-Version Systems and Common Cause Failures:Elements of Taxonomy; Models of MVSs; Metric-Probabilistic Assessment of MVS Safety; Probabilistic Assessment of MVS Safety; Conclusion; References; Two-Level Software Rejuvenation Model with Increasing Failure Rate Degradation; Introduction. Software Rejuvenation ModelSemi-markov Analysis; Numerical Illustration; Conclusions; References; Towards a UML Profile for Maintenance Process and Reliability Analysis; Introduction; Activity Diagrams with READ Transitions in Maintenance Processes Modeling; Probabilistic Fault Trees with Time Dependencies Adapted to Activity Diagrams; The READ UML Profile; Case Study; Conclusions; References; Conjoining Fault Trees with Petri Nets to Model Repair Policies; Introduction; Probabilistic Fault Trees with Time Dependencies; Fault Graphs with Time Dependencies. Applying Fault Graphs with Time Dependencies to Selected Repair PoliciesFinal Remarks; References; Analysis of Geometric Features of Handwriting to Discover a Forgery; Introduction; Geometric Features Derived from Handwritten Text; Verification of the Hypothesis of Common Authorship of QMand RM; Analysis of Similarity of Feature Vectors; Conclusions; References; A Formal Framework for Testing duration Systems; Introduction; Duration Variables Timed Graphs with Inputs Outputs; Digitization; Test Generation Framework; Properties of the Test Tree; Conclusion; References. Dynamic Model Initialization Using UML
Titelhinweis
Buchausg. u.d.T.: ‡Dependable computer systems
ISBN
ISBN 978-3-642-21393-9
Klassifikation
UYQ
COM004000
006.3
004.2
Q342
Kurzbeschreibung
Dependability analysis is the recent approach to performance evaluation of contemporary systems which tries to cope with new challenges that are brought with their unprecedented complexity, size and diversity. Especially in case of computer systems and networks such evaluation must be based on multidisciplinary approach to theory, technology, and maintenance of systems which operate in real (and very often unfriendly) environments. As opposed to 'classic' reliability which focuses mainly on technical aspects of system functioning, dependability studies investigate the systems as multifaceted and sophisticated amalgamations of technical, information and also human resources. This monograph presents selected new developments in such areas of dependability research as mathematical models, evaluation of software, probabilistic assessment, methodologies, tools, and technologies. Intelligent and soft computing methods help to resolve fundamental problems of dependability analysis which are caused by the fact that in contemporary computer systems it is often difficult to find a relation between system elements and system events (the relation between reasons and results) and it is even more difficult to define strict mathematical models with 'analytical' relationships between such phenomena.
1. Schlagwortkette
Datenverarbeitungssystem
Softwaresystem
Zuverlässigkeit
Sicherheit
Leistungsbewertung
Aufsatzsammlung
ANZEIGE DER KETTE
Datenverarbeitungssystem -- Softwaresystem -- Zuverlässigkeit -- Sicherheit -- Leistungsbewertung -- Aufsatzsammlung
SWB-Titel-Idn
347114598
Signatur
Springer E-Book
Bemerkungen
Elektronischer Volltext - Campuslizenz
Elektronische Adresse
$uhttp://dx.doi.org/10.1007/978-3-642-21393-9
Internetseite / Link
Volltext
Siehe auch
Volltext
Siehe auch
Cover
.
ISBD-Anzeige
Katalogdatensatz500162788
.
Kategorien-Anzeige
Katalogdatensatz500162788
.
Verwandte Werke
Katalogdatensatz500162788
.
Titel zur Titelsammlung hinzufügen
Katalogdatensatz500162788
.
Kataloginformation500162788
Datensatzanfang
.
Kataloginformation500162788
Seitenanfang
.
Titel vormerken
Katalogdatensatz500162788
Vollanzeige Katalogdaten
Auf diesem Bildschirm erhalten Sie Katalog- und Exemplarinformationen zum ausgewählten Titel.
Im Bereich
Kataloginformation
werden die bibliographischen Details angezeigt. Per Klick auf Hyperlink-Begriffe wie Schlagwörter, Autoren, Reihen, Körperschaften und Klassifikationen können Sie sich weitere Titel des gewählten Begriffes anzeigen lassen.
Der Bereich
Exemplarinformationen
enthält zum einen Angaben über den Standort und die Verfügbarkeit der Exemplare. Zum anderen haben Sie die Möglichkeit, ausgeliehene Exemplare vorzumerken oder Exemplare aus dem Magazin zu bestellen.
Schnellsuche
Suche nach