Results 1 - 10
of
11,248
Table 4. The update postulates which correspond to certain well-known counterfactual postulates (theorem 7)
1997
Cited by 3
Table 1. Kernel extension safety approaches Name Description Where Used
"... In PAGE 2: ... One difference between safely executing drivers and safely executing general kernel extensions is that one can assume that most device drivers are trustworthy: the problem is one of safety and not security, and abso- lute safety may not even be needed. Table1 shows five key hardware and software techniques that can isolate driver code from the OS kernel. Each of these tech- niques has benefits and drawbacks, and may be ap- propriate in certain situations.... In PAGE 2: ... Each of these tech- niques has benefits and drawbacks, and may be ap- propriate in certain situations. Table1 also shows the systems that used each technique. Table 2 shows the relative advantages and disad- vantages of each approach along the axes of software engineering, performance for large and small volumes of data, and ability to isolate memory corruption and deadlock errors.... ..."
Table 4 presents accident probability versus controllability category and suggests that an uncontrollable hazard is certain to result in a loss of control and hence either an incident (near miss) or an accident. Therefore, using the accident safety target derived in section 5, and since:
"... In PAGE 7: ...10-8 lt; P(H4)system.target lt; 10-7 per hour The equivalent results for the remaining controllability categories may be calculated in the same way but with reference to Table4 for the corresponding accident probability. These results have been calculated and are recorded in Table 5.... In PAGE 9: ... Boolean Hazard A hazard is a situation in which there is actual or potential danger to people or the environment. Nuisance, Distracting, Debilitating, Difficult to Control, Uncontrollable Table4 . Probability of an incident/accident by controllability category Controllability category Probability of incident/accident Uncontrollable 1 Difficult to control 1 in 10 Debilitating 1 in 100 Distracting 1 in 1000 Nuisance only 0 Table 5.... ..."
Table 1: Simulation Settings for Data and Updates
2002
"... In PAGE 12: ...3.1 Set-Up for Data and Updates The data and update transaction parameters are summarized in Table1 . The modeled database includes 1000 temporal data objects.... In PAGE 12: ... Non-temporal data updates are assumed infrequent and do not affect the performance considerably. Non-temporal data reads/writes can be easily included by adjusting the probability P(temporal data access) in Table1 , if necessary. An update stream, Si, is dedicated to a certain temporal data object i in the modeled database.... ..."
Cited by 15
Table 2: Simulation Settings for Data and Updates
2002
"... In PAGE 12: ...2.1 Set-Up for Data and Updates The data and update transaction parameters are summarized in Table2 . The modeled database includes 1000 temporal data objects.... In PAGE 12: ... Non-temporal data updates are assumed infrequent and do not affect the performance considerably. Non-temporal data reads/writes can be easily included by adjusting the probability Pa7 temporal data accessa8 in Table2 , if necessary. An update stream, Si, is dedicated to a certain temporal data object i in the modeled database.... ..."
Cited by 15
Table 1. Safety conditions for different safety policies.
"... In PAGE 6: ...From our perspective here, the safety conditions are the most interesting aspect since they have the greatest bearing on the form of the proof obligations. Table1 summarizes the different conditions and the domain theories needed to reason about them. Both vari- able initialization and usage as well as array bounds certification are logically simple and rely just on propositional and simple arithmetic reasoning, respectively, but can require a lot of information to be propagated throughout the program.... ..."
Table 1 - The safety corpus
1996
"... In PAGE 3: ... To investigate these ideas we have collated a corpus of safety-related texts representative of the multifarious scenarios in which communication has a safety-critical edge. The research reported in this paper is based on a collection of texts (see Table1 ) that are concerned with safety in a range of disciplines such as: public health engineering, health and safety at work, analysis of risks in high integrity systems. Table 1 - The safety corpus... ..."
Cited by 1
Table 3. Node safety
1997
"... In PAGE 6: ...99 Ct=0.999 Coverage Failure rate Architecture I Architecture II Architecture III In Table3 we show the results for node safety. In this case, architecture I and II shows similar levels of safety.... ..."
Cited by 1
Table 1: SAFETY MATRIX
2005
"... In PAGE 7: ...igure A-3: The new design around the Brecon area, intended for day 2 ..................................... 12 LIST OF TABLES Table1 : SAFETY MATRIX .... ..."
Table 4 Safety properties
"... In PAGE 10: ... In model Ifetch, using a tight automaton does not even capture the value of m for a given value of k. Table4 illustrates the importance of a dedicated criterion for safety properties. All properties in this table are passing properties.... ..."
Results 1 - 10
of
11,248