Results 31 to 40 of about 222,705 (339)

Surrogate Modeling for Scalable Evaluation of Distributed Computing Systems for HEP Applications [PDF]

open access: yesEPJ Web of Conferences
The Worldwide LHC Computing Grid (WLCG) provides the robust computing infrastructure essential for the LHC experiments by integrating global computing resources into a cohesive entity.
Schmid Larissa   +5 more
doaj   +1 more source

An Approach to Model Based Testing of Multiagent Systems

open access: yesThe Scientific World Journal, 2015
Autonomous agents perform on behalf of the user to achieve defined goals or objectives. They are situated in dynamic environment and are able to operate autonomously to achieve their goals.
Shafiq Ur Rehman, Aamer Nadeem
doaj   +1 more source

Phenibut dependence [PDF]

open access: yesBMJ Case Reports, 2013
Phenibut is a γ-aminobutyric acid (GABA) agonist designed and used as an anxiolytic in Russia. In Western countries, phenibut is not a registered medication but is available through online stores as a supplement. We present a case of a patient who used phenibut to self-medicate anxiety, insomnia and cravings for alcohol.
Andriy V, Samokhvalov   +3 more
openaire   +2 more sources

A Comprehensive Dependability Model for QoM-Aware Industrial WSN When Performing Visual Area Coverage in Occluded Scenarios

open access: yesSensors, 2020
In critical industrial monitoring and control applications, dependability evaluation will be usually required. For wireless sensor networks deployed in industrial plants, dependability evaluation can provide valuable information, enabling proper ...
Thiago C. Jesus   +3 more
doaj   +1 more source

Software reliability and dependability: a roadmap [PDF]

open access: yes, 2000
Shifting the focus from software reliability to user-centred measures of dependability in complete software-based systems. Influencing design practice to facilitate dependability assessment.
Littlewood, B., Strigini, L.
core   +3 more sources

An Improved Algorithm for Digital Image Authentication and Forgery Localization Using Demosaicing Artifacts

open access: yesIEEE Access, 2019
This paper focuses on the digital image authentication and forgery localization using demosaicing artifacts. The aim is to build an algorithm allowing a bridge between the color filter array pattern and demosaicing algorithm estimation, and the ...
Nhan Le, Florent Retraint
doaj   +1 more source

Unbounded dependencies

open access: yes, 2021
Unbounded dependencies of the kind that are found in wh-interrogatives, relative clauses, and other constructions have been a major focus of research in HPSG. They typically involve a gap of some kind and some distinctive higher structure, often involving a filler in a non-argument position with the properties of the gap.
Borsley, Robert D., Crysmann, Berthold
openaire   +3 more sources

Confidence: Its role in dependability cases for risk assessment [PDF]

open access: yes, 2007
Society is increasingly requiring quantitative assessment of risk and associated dependability cases. Informally, a dependability case comprises some reasoning, based on assumptions and evidence, that supports a dependability claim at a particular level ...
Bloomfield, R. E.   +2 more
core   +1 more source

Exercise Dependence [PDF]

open access: yesBritish Journal of Addiction, 1987
SummaryExercise can become a compulsive behaviour and harmful to an individual. This review proposes diagnostic criteria for ‘exercise dependence’ to facilitate recognition in Sports clinics and further research. The importance of diagnosing exercise dependence lies in the prevention of morbidity and rarely mortality if exercise is continued in the ...
openaire   +5 more sources

Assessing Asymmetric Fault-Tolerant Software [PDF]

open access: yes, 2010
The most popular forms of fault tolerance against design faults use "asymmetric" architectures in which a "primary" part performs the computation and a "secondary" part is in charge of detecting errors and performing some kind of error processing and ...
Popov, P. T., Strigini, L.
core   +1 more source

Home - About - Disclaimer - Privacy