036a | XA-DE |
037b | eng |
077a | 346072220 Buchausg. u.d.T.: ‡Dependable computer systems |
087q | 978-3-642-21392-2 |
100 | Zamojski, Wojciech |
104b | Kacprzyk, Janusz |
108b | Mazurkiewicz, Jacek |
112b | Sugier, Jarosław |
116b | Walkowiak, Tomasz |
331 | Dependable Computer Systems |
410 | Berlin, Heidelberg |
412 | Springer Berlin Heidelberg |
425 | 2011 |
425a | 2011 |
433 | Online-Ressource (XIV, 314p. 126 illus, digital) |
451 | Advances in Intelligent and Soft Computing ; 97 |
501 | Includes bibliographical references and index |
517 | Title; Preface; Contents; Patterns Improving the Common Criteria Compliant IT Security Development Process; Introduction; Project Background; Patterns in the CCMODE Project; Conclusions; References; A Comparison of Dataflow and Mutation Testing of Java Methods; Introduction; Data Flow and Mutation Testing; Related Work; Comparison of Dataflow and Mutation Testing; Conclusions; References; A New Three Levels Context Based Approach for Web Search Engines Evaluation; Introduction; How Context Can Be Used in IR; Classic Evaluation of IRS, Principles and Limits. Detailed Presentation of the Proposed ApproachApplication of the Proposed Approach to the Evaluation ofSearch Engines; Results and Discussion; Conclusion; References; Quantitative Verification of Non-functional Requirements with Uncertainty; Introduction; The U-MarMo Framework; From Sequence Diagrams to Markov Models; The Framework at Work; Related Work; Conclusions and Future Work; References; Testing Fault Susceptibility of a Satellite Power Controller; Introduction; Satellite Power Controller; Fault Injection Testbed; Experimental Results; Conclusion; References. Theoretical and Practical Aspects of Encrypted Containers Detection - Digital Forensics ApproachIntroduction; Signature Analysis; Statistical Data Analysis Algorithms; Indirect Methods; Summary; References; Metric-Probabilistic Assessment of Multi-Version Systems: Some Models and Techniques; Introduction; Multi-Version Systems and Common Cause Failures:Elements of Taxonomy; Models of MVSs; Metric-Probabilistic Assessment of MVS Safety; Probabilistic Assessment of MVS Safety; Conclusion; References; Two-Level Software Rejuvenation Model with Increasing Failure Rate Degradation; Introduction. Software Rejuvenation ModelSemi-markov Analysis; Numerical Illustration; Conclusions; References; Towards a UML Profile for Maintenance Process and Reliability Analysis; Introduction; Activity Diagrams with READ Transitions in Maintenance Processes Modeling; Probabilistic Fault Trees with Time Dependencies Adapted to Activity Diagrams; The READ UML Profile; Case Study; Conclusions; References; Conjoining Fault Trees with Petri Nets to Model Repair Policies; Introduction; Probabilistic Fault Trees with Time Dependencies; Fault Graphs with Time Dependencies. Applying Fault Graphs with Time Dependencies to Selected Repair PoliciesFinal Remarks; References; Analysis of Geometric Features of Handwriting to Discover a Forgery; Introduction; Geometric Features Derived from Handwritten Text; Verification of the Hypothesis of Common Authorship of QMand RM; Analysis of Similarity of Feature Vectors; Conclusions; References; A Formal Framework for Testing duration Systems; Introduction; Duration Variables Timed Graphs with Inputs Outputs; Digitization; Test Generation Framework; Properties of the Test Tree; Conclusion; References. Dynamic Model Initialization Using UML |
527 | Buchausg. u.d.T.: ‡Dependable computer systems |
540a | ISBN 978-3-642-21393-9 |
700 | |UYQ |
700 | |COM004000 |
700b | |006.3 |
700b | |004.2 |
700c | |Q342 |
750 | Dependability analysis is the recent approach to performance evaluation of contemporary systems which tries to cope with new challenges that are brought with their unprecedented complexity, size and diversity. Especially in case of computer systems and networks such evaluation must be based on multidisciplinary approach to theory, technology, and maintenance of systems which operate in real (and very often unfriendly) environments. As opposed to 'classic' reliability which focuses mainly on technical aspects of system functioning, dependability studies investigate the systems as multifaceted and sophisticated amalgamations of technical, information and also human resources. This monograph presents selected new developments in such areas of dependability research as mathematical models, evaluation of software, probabilistic assessment, methodologies, tools, and technologies. Intelligent and soft computing methods help to resolve fundamental problems of dependability analysis which are caused by the fact that in contemporary computer systems it is often difficult to find a relation between system elements and system events (the relation between reasons and results) and it is even more difficult to define strict mathematical models with 'analytical' relationships between such phenomena. |
902s | 209574836 Datenverarbeitungssystem |
902s | 209676310 Softwaresystem |
902s | 209130075 Zuverlässigkeit |
902s | 209110589 Sicherheit |
902s | 209907495 Leistungsbewertung |
902f | 00000011 Aufsatzsammlung |
012 | 347114598 |
081 | Zamojski, Wojciech: Dependable Computer Systems |
100 | Springer E-Book |
125a | Elektronischer Volltext - Campuslizenz |
655e | $uhttp://dx.doi.org/10.1007/978-3-642-21393-9 |