• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,248
Next 10 →

Table 4. The update postulates which correspond to certain well-known counterfactual postulates (theorem 7)

in Intertranslating Counterfactuals and Updates
by Mark Ryan, Pierre-Yves Schobbens 1997
Cited by 3

Table 1. Kernel extension safety approaches Name Description Where Used

in 1 Introduction Nooks: An Architecture for Reliable Device Drivers ∗
by Michael M. Swift, Steven Martin, Henry M. Levy, Susan J. Eggers
"... In PAGE 2: ... One difference between safely executing drivers and safely executing general kernel extensions is that one can assume that most device drivers are trustworthy: the problem is one of safety and not security, and abso- lute safety may not even be needed. Table1 shows five key hardware and software techniques that can isolate driver code from the OS kernel. Each of these tech- niques has benefits and drawbacks, and may be ap- propriate in certain situations.... In PAGE 2: ... Each of these tech- niques has benefits and drawbacks, and may be ap- propriate in certain situations. Table1 also shows the systems that used each technique. Table 2 shows the relative advantages and disad- vantages of each approach along the axes of software engineering, performance for large and small volumes of data, and ability to isolate memory corruption and deadlock errors.... ..."

Table 4 presents accident probability versus controllability category and suggests that an uncontrollable hazard is certain to result in a loss of control and hence either an incident (near miss) or an accident. Therefore, using the accident safety target derived in section 5, and since:

in Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems
by Richard Evans, Jonathan Moffett
"... In PAGE 7: ...10-8 lt; P(H4)system.target lt; 10-7 per hour The equivalent results for the remaining controllability categories may be calculated in the same way but with reference to Table4 for the corresponding accident probability. These results have been calculated and are recorded in Table 5.... In PAGE 9: ... Boolean Hazard A hazard is a situation in which there is actual or potential danger to people or the environment. Nuisance, Distracting, Debilitating, Difficult to Control, Uncontrollable Table4 . Probability of an incident/accident by controllability category Controllability category Probability of incident/accident Uncontrollable 1 Difficult to control 1 in 10 Debilitating 1 in 100 Distracting 1 in 1000 Nuisance only 0 Table 5.... ..."

Table 1: Simulation Settings for Data and Updates

in A QoS-Sensitive Approach for Timeliness and Freshness Guarantees in Real-Time Databases
by Kyoung-don Kang, Sang H. Son, John A. Stankovic, Tarek F. Abdelzaher 2002
"... In PAGE 12: ...3.1 Set-Up for Data and Updates The data and update transaction parameters are summarized in Table1 . The modeled database includes 1000 temporal data objects.... In PAGE 12: ... Non-temporal data updates are assumed infrequent and do not affect the performance considerably. Non-temporal data reads/writes can be easily included by adjusting the probability P(temporal data access) in Table1 , if necessary. An update stream, Si, is dedicated to a certain temporal data object i in the modeled database.... ..."
Cited by 15

Table 2: Simulation Settings for Data and Updates

in A QoS-Sensitive Approach for Timeliness and Freshness Guarantees in Real-Time Databases
by Kyoung-don Kang, Sang H. Son, John A. Stankovic, Tarek F. Abdelzaher 2002
"... In PAGE 12: ...2.1 Set-Up for Data and Updates The data and update transaction parameters are summarized in Table2 . The modeled database includes 1000 temporal data objects.... In PAGE 12: ... Non-temporal data updates are assumed infrequent and do not affect the performance considerably. Non-temporal data reads/writes can be easily included by adjusting the probability Pa7 temporal data accessa8 in Table2 , if necessary. An update stream, Si, is dedicated to a certain temporal data object i in the modeled database.... ..."
Cited by 15

Table 1. Safety conditions for different safety policies.

in October 4, 2005 17:16 WSPC/INSTRUCTION FILE ijait AN EMPIRICAL EVALUATION OF AUTOMATED THEOREM PROVERS IN SOFTWARE CERTIFICATION
by Ewen Denney, Bernd Fischer, Johann Schumann
"... In PAGE 6: ...From our perspective here, the safety conditions are the most interesting aspect since they have the greatest bearing on the form of the proof obligations. Table1 summarizes the different conditions and the domain theories needed to reason about them. Both vari- able initialization and usage as well as array bounds certification are logically simple and rely just on propositional and simple arithmetic reasoning, respectively, but can require a lot of information to be propagated throughout the program.... ..."

Table 1 - The safety corpus

in The Terminology of Safety
by Khurshid Ahmad, Andrew Salway 1996
"... In PAGE 3: ... To investigate these ideas we have collated a corpus of safety-related texts representative of the multifarious scenarios in which communication has a safety-critical edge. The research reported in this paper is based on a collection of texts (see Table1 ) that are concerned with safety in a range of disciplines such as: public health engineering, health and safety at work, analysis of risks in high integrity systems. Table 1 - The safety corpus... ..."
Cited by 1

Table 3. Node safety

in Dependability Evaluation Of Fault Tolerant Architectures In Distributed Industrial Control Systems Using Petri Nets
by J. C. Campelo, F. Rodrguez, A. Rubio, J. J. Serrano 1997
"... In PAGE 6: ...99 Ct=0.999 Coverage Failure rate Architecture I Architecture II Architecture III In Table3 we show the results for node safety. In this case, architecture I and II shows similar levels of safety.... ..."
Cited by 1

Table 1: SAFETY MATRIX

in WEB Site: www.eurocontrol.int
by Richard J. Kennedy (boeing, Keith Slater (nats, Andrea Pechhacker, Centre De Bois Des Bordes 2005
"... In PAGE 7: ...igure A-3: The new design around the Brecon area, intended for day 2 ..................................... 12 LIST OF TABLES Table1 : SAFETY MATRIX .... ..."

Table 4 Safety properties

in Abstract Termination Criteria for Bounded Model Checking: Extensions and Comparison 1
by Mohammad Awedh, Fabio Somenzi
"... In PAGE 10: ... In model Ifetch, using a tight automaton does not even capture the value of m for a given value of k. Table4 illustrates the importance of a dedicated criterion for safety properties. All properties in this table are passing properties.... ..."
Next 10 →
Results 1 - 10 of 11,248
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University