Listing 1 - 3 of 3 |
Sort by
|
Choose an application
In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.
Electronic digital computers. --- Electronic digital computers --- Automatic digital computers --- Computers, Electronic digital --- Digital computers, Electronic --- Computers --- Hybrid computers --- Sequential machine theory --- Reliability. --- Automatic control engineering --- Distributed systems --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Electronic digital computers --- Machine theory --- System analysis --- Abstract automata --- Abstract machines --- Automata --- Mathematical machine theory --- Algorithms --- Logic, Symbolic and mathematical --- Recursive functions --- Robotics --- Ordinateurs --- Automates mathématiques, Théorie des --- Systèmes, Analyse de --- Electronic digital computers. --- Machine theory. --- System analysis. --- Computermethoden. --- Systeemtheorie. --- Computing --- Network theory --- Systems analysis --- System theory --- Mathematical optimization --- Automatic digital computers --- Computers, Electronic digital --- Digital computers, Electronic --- Computers --- Hybrid computers --- Sequential machine theory --- Network analysis --- Network science
Choose an application
"Original take on the history of socialist Bulgaria, examined through the prism of computers to make broader claims about political, economic, intelligence, social, and cultural life in Bulgaria, and by extension, the Soviet bloc and state socialism in general"--
Electronic digital computers --- Computers --- Computer industry --- Cold War. --- History --- History. --- COMPUTERS / History --- TECHNOLOGY & ENGINEERING / History --- HISTORY / Modern / 20th Century / Cold War --- World politics --- Electronic industries --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Automatic digital computers --- Computers, Electronic digital --- Digital computers, Electronic --- Hybrid computers --- Sequential machine theory
Listing 1 - 3 of 3 |
Sort by
|