Workshop on Learning from Authoritative Security Experiment Results最新文献

筛选
英文 中文
A Control-Theoretic Approach to Self-adaptive Systems and an Application to Cloud-Based Software 自适应系统的控制理论方法及其在云软件中的应用
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2013-09-08 DOI: 10.1007/978-3-319-28406-4_3
C. Ghezzi, G. Gibilisco, C. Menghi, Marco Miglierina
{"title":"A Control-Theoretic Approach to Self-adaptive Systems and an Application to Cloud-Based Software","authors":"C. Ghezzi, G. Gibilisco, C. Menghi, Marco Miglierina","doi":"10.1007/978-3-319-28406-4_3","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_3","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122334394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Behaviours as Design Components of Cyber-Physical Systems 行为作为信息物理系统的设计组件
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2013-09-08 DOI: 10.1007/978-3-319-28406-4_2
M. Jackson
{"title":"Behaviours as Design Components of Cyber-Physical Systems","authors":"M. Jackson","doi":"10.1007/978-3-319-28406-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_2","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126586195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
How to Build a Recommendation System for Software Engineering 如何构建面向软件工程的推荐系统
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2013-09-08 DOI: 10.1007/978-3-319-28406-4_1
Sebastian Proksch, V. Bauer, G. Murphy
{"title":"How to Build a Recommendation System for Software Engineering","authors":"Sebastian Proksch, V. Bauer, G. Murphy","doi":"10.1007/978-3-319-28406-4_1","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_1","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129676475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Consistency in Distributed Systems 分布式系统的一致性
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2013-09-08 DOI: 10.1007/978-3-319-28406-4_4
S. Burckhardt
{"title":"Consistency in Distributed Systems","authors":"S. Burckhardt","doi":"10.1007/978-3-319-28406-4_4","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_4","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Mining Studies: Goals, Approaches, Artifacts, and Replicability 软件挖掘研究:目标、方法、工件和可复制性
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2013-09-08 DOI: 10.1007/978-3-319-28406-4_5
Sven Amann, S. Beyer, Katja Kevic, H. Gall
{"title":"Software Mining Studies: Goals, Approaches, Artifacts, and Replicability","authors":"Sven Amann, S. Beyer, Katja Kevic, H. Gall","doi":"10.1007/978-3-319-28406-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-28406-4_5","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Model Checking and the State Explosion Problem 模型检验与状态爆炸问题
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2011-09-04 DOI: 10.1007/978-3-642-35746-6_1
E. Clarke, William Klieber, Milos Novácek, P. Zuliani
{"title":"Model Checking and the State Explosion Problem","authors":"E. Clarke, William Klieber, Milos Novácek, P. Zuliani","doi":"10.1007/978-3-642-35746-6_1","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_1","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121396476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 273
From Program to Logic: An Introduction 从程序到逻辑:导论
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2011-09-04 DOI: 10.1007/978-3-642-35746-6_2
Patrice Godefroid, Shuvendu K. Lahiri
{"title":"From Program to Logic: An Introduction","authors":"Patrice Godefroid, Shuvendu K. Lahiri","doi":"10.1007/978-3-642-35746-6_2","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_2","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121597728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using Dafny, an Automatic Program Verifier 使用Dafny,一个自动程序验证器
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2011-09-04 DOI: 10.1007/978-3-642-35746-6_6
L. Herbert, K. Leino, Jose Quaresma
{"title":"Using Dafny, an Automatic Program Verifier","authors":"L. Herbert, K. Leino, Jose Quaresma","doi":"10.1007/978-3-642-35746-6_6","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_6","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Advanced Theorem Proving Techniques in PVS and Applications pv中的高级定理证明技术及其应用
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2011-09-04 DOI: 10.1007/978-3-642-35746-6_4
C. Muñoz, Ramiro Demasi
{"title":"Advanced Theorem Proving Techniques in PVS and Applications","authors":"C. Muñoz, Ramiro Demasi","doi":"10.1007/978-3-642-35746-6_4","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_4","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Verification of Advanced Object-Oriented Features: The AutoProof Approach 高级面向对象特性的自动验证:自动验证方法
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2011-09-04 DOI: 10.1007/978-3-642-35746-6_5
Julian Tschannen, Carlo A. Furia, M. Nordio, B. Meyer
{"title":"Automatic Verification of Advanced Object-Oriented Features: The AutoProof Approach","authors":"Julian Tschannen, Carlo A. Furia, M. Nordio, B. Meyer","doi":"10.1007/978-3-642-35746-6_5","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_5","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信