E-Book, Englisch, Band 12519, 281 Seiten, eBook
Ben Hedia / Chen / Liu Verification and Evaluation of Computer and Communication Systems
1. Auflage 2020
ISBN: 978-3-030-65955-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
14th International Conference, VECoS 2020, Xi'an, China, October 26–27, 2020, Proceedings
E-Book, Englisch, Band 12519, 281 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-65955-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Petri-Net, Simulation, and Scheduling.- An Approach for Supervisor Reduction of Discrete-event Systems.- Multi-robot path planning using Petri nets.- Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets With Novel Colored Capacity.- The Modeling and Simulation on SRM Drive System Using Variable-proportional-desaturation PI Regulator.- Vehicle Scheduling Problem in Terminals: a Review.- Coverage Analysis of Net Inscriptions in Coloured Petri Net Models.- ON/OFF control trajectory computation for steady state reaching in batches Petri nets.- Towards efficient partial order techniques for time Petri nets.- Towards a Generic Framework for Formal Verification and Performance Analysis of Real-time Scheduling Algorithms.- Accurate Strategy for Mixed Criticality Scheduling.- Formal Modeling and Verification, Testing.- Model-based Design of Resilient Systems Using Quantitative Risk Assessment.- An Evaluation of Estimation Techniques for Probabilistic Verification.- Formal Verification of a Certified Policy Language.- Multi-path Coverage of all Final States for Model-Based Testing Theory using Spark In-memory Design.- Artificial Intelligence and Machine Learning.- A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.- Deep Reinforcement Learning for Solving AGVs Routing Problem.- Research on Vehicle Detection based on Visual Convolution Network Optimization.- A Self-Adaptive Multi-Hierarchical Modular Neural Network for Complex Problems.- Multi-Scale Risk Assessment Model of Network Security Based on LSTM.- Weighted lightweight image retrieval method based on linear regression.