International Workshop on Verification and Evaluation of Computer and Communication Systems最新文献

筛选
英文 中文
ON/OFF Control Trajectory Computation for Steady State Reaching in Batches Petri Nets 批量Petri网稳态到达的ON/OFF控制轨迹计算
Ruotian Liu, Rabah Ammour, L. Brenner, I. Demongodin
{"title":"ON/OFF Control Trajectory Computation for Steady State Reaching in Batches Petri Nets","authors":"Ruotian Liu, Rabah Ammour, L. Brenner, I. Demongodin","doi":"10.1007/978-3-030-65955-4_7","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_7","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection 一种基于C-IFGSM的深度学习入侵检测对抗方法
Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu
{"title":"A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection","authors":"Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu","doi":"10.1007/978-3-030-65955-4_15","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_15","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127973379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Evaluation of Estimation Techniques for Probabilistic Verification 概率验证估计技术的评价
M. Vasileva, P. Zuliani
{"title":"An Evaluation of Estimation Techniques for Probabilistic Verification","authors":"M. Vasileva, P. Zuliani","doi":"10.1007/978-3-030-65955-4_12","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_12","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate Strategy for Mixed Criticality Scheduling 混合临界调度的精确策略
Yasmina Abdeddaïm
{"title":"Accurate Strategy for Mixed Criticality Scheduling","authors":"Yasmina Abdeddaïm","doi":"10.1007/978-3-030-65955-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_10","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133269243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets with Novel Colored Capacity 基于有色容量的有色资源Petri网避免柔性制造系统死锁
ZhaoYu Xiang
{"title":"Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets with Novel Colored Capacity","authors":"ZhaoYu Xiang","doi":"10.1007/978-3-030-65955-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_3","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Modeling and Simulation on SRM Drive System Using Variable-Proportional-Desaturation PI Regulator 变比例去饱和PI调节器SRM驱动系统的建模与仿真
Zihan Wei, Mi Zhao, Changxin Fu
{"title":"The Modeling and Simulation on SRM Drive System Using Variable-Proportional-Desaturation PI Regulator","authors":"Zihan Wei, Mi Zhao, Changxin Fu","doi":"10.1007/978-3-030-65955-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_4","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121565262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning for Solving AGVs Routing Problem 深度强化学习解决agv路由问题
Chengxuan Lu, Jinjun Long, Zichao Xing, Weimin Wu, Yong Gu, Jiliang Luo, Yisheng Huang
{"title":"Deep Reinforcement Learning for Solving AGVs Routing Problem","authors":"Chengxuan Lu, Jinjun Long, Zichao Xing, Weimin Wu, Yong Gu, Jiliang Luo, Yisheng Huang","doi":"10.1007/978-3-030-65955-4_16","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_16","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"110 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Verification of a Certified Policy Language 认证政策语言的正式验证
A. Eaman, A. Felty
{"title":"Formal Verification of a Certified Policy Language","authors":"A. Eaman, A. Felty","doi":"10.1007/978-3-030-65955-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_13","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coalition Formation with Multiple Alternatives of Interdependent Tasks 具有相互依赖任务的多个选择的联盟形成
Youcef Sklab, S. Aknine, O. Shehory, Hanane Ariouat
{"title":"Coalition Formation with Multiple Alternatives of Interdependent Tasks","authors":"Youcef Sklab, S. Aknine, O. Shehory, Hanane Ariouat","doi":"10.1007/978-3-030-98850-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-98850-0_6","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"605 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121979823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-scale Risk Assessment Model of Network Security Based on LSTM 基于LSTM的网络安全多尺度风险评估模型
Yinfei Lv, Huorong Ren, Xuefeng Gao, Tong Sun, Haopeng Zhang, Xinyu Guo
{"title":"Multi-scale Risk Assessment Model of Network Security Based on LSTM","authors":"Yinfei Lv, Huorong Ren, Xuefeng Gao, Tong Sun, Haopeng Zhang, Xinyu Guo","doi":"10.1007/978-3-030-65955-4_19","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_19","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信