Verification and evaluation of compu...
VECoS (Conference) (2020 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Verification and evaluation of computer and communication systems = 14th International Conference, VECoS 2020, Xi'an, China, October 26-27, 2020 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Verification and evaluation of computer and communication systems/ edited by Belgacem Ben Hedia ... [et al.].
    Reminder of title: 14th International Conference, VECoS 2020, Xi'an, China, October 26-27, 2020 : proceedings /
    remainder title: VECoS 2020
    other author: Ben Hedia, Belgacem.
    corporate name: VECoS (Conference)
    Published: Cham :Springer International Publishing : : 2020.,
    Description: xii, 281 p. :ill., digital ;24 cm.
    [NT 15003449]: Petri-Net, Simulation, and Scheduling -- An Approach for Supervisor Reduction of Discrete-event Systems -- Multi-robot path planning using Petri nets -- Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets With Novel Colored Capacity -- The Modeling and Simulation on SRM Drive System Using Variable-proportional-desaturation PI Regulator -- Vehicle Scheduling Problem in Terminals: a Review -- Coverage Analysis of Net Inscriptions in Coloured Petri Net Models -- ON/OFF control trajectory computation for steady state reaching in batches Petri nets -- Towards efficient partial order techniques for time Petri nets -- Towards a Generic Framework for Formal Verification and Performance Analysis of Real-time Scheduling Algorithms -- Accurate Strategy for Mixed Criticality Scheduling -- Formal Modeling and Verification, Testing -- Model-based Design of Resilient Systems Using Quantitative Risk Assessment -- An Evaluation of Estimation Techniques for Probabilistic Verification -- Formal Verification of a Certified Policy Language -- Multi-path Coverage of all Final States for Model-Based Testing Theory using Spark In-memory Design -- Artificial Intelligence and Machine Learning -- A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection -- Deep Reinforcement Learning for Solving AGVs Routing Problem -- Research on Vehicle Detection based on Visual Convolution Network Optimization -- A Self-Adaptive Multi-Hierarchical Modular Neural Network for Complex Problems -- Multi-Scale Risk Assessment Model of Network Security Based on LSTM -- Weighted lightweight image retrieval method based on linear regression.
    Contained By: Springer Nature eBook
    Subject: Computer networks - Congresses. - Evaluation -
    Online resource: https://doi.org/10.1007/978-3-030-65955-4
    ISBN: 9783030659554
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login