![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Heterogeneous Multicore Co-scheduling Algorithm Based on Multi-characteristic Fuzzy Cluster
Heterogeneous multicore system integrated with FPGA has been shown to yield superior performance when executing real-time applications. In this paper, we propose a heterogeneous multicore co-scheduling algorit...
-
Chapter and Conference Paper
A Novel Multi-view Fuzzy Clustering Algorithm Based on Fuzzy C-Means
Fuzzy c-means (i.e., FCM) is a representative clustering method that is widely used in machine learning and pattern recognition. It can describe the degree of fuzziness of objects to clusters using memberships...
-
Chapter and Conference Paper
A Trustworthiness Fuzzy Evaluation Model for Open Source Community
With the frequent occurrence of security issues in open-source software, the public is gradually paying attention to the trustworthiness of open-source software. As the cradle of open-source software, the open...
-
Chapter and Conference Paper
A New Fuzzy Analytic Hierarchy Process Method for Software Trustworthiness Measurement
Software trustworthiness measurement becomes a focus in software companies. In software trustworthiness measurement, traditional Analytic Hierarchy Process (shortly, AHP) is usually utilized to estimate softwa...
-
Chapter and Conference Paper
Quantitative BAN Logic Based on Belief Degree
Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design, preventing them from working properly. It is therefore necessary to a...
-
Chapter and Conference Paper
A Novel Trustworthiness Measurement Method for Software System Based on Fuzzy Set
The software has been a part of our daily life. However, software systems are becoming more and more complex, with many uncertainties, unavoidable software bugs, failures, and even disasters. The measurement o...
-
Chapter and Conference Paper
Verification of SysML Activity Diagrams Using Hoare Logic and SOFL
During the process of utilizing Model-Based Systems Engineering (MBSE), SysML activity diagrams are often used for designing the software systems and its correctness is likely to significantly affect the relia...
-
Chapter and Conference Paper
Embedding CCSL into Dynamic Logic: A Logical Approach for the Verification of CCSL Specifications
The Clock Constraint Specification Language (CCSL) is a clock-based specification language for capturing causal and chronometric constraints between events in Real-Time Embedded Systems (RTESs). Due to the lim...
-
Chapter and Conference Paper
Semi-formal Verification with Supporting Tool by Automatic Application of Hoare Logic
Software development is costly endeavors. In general, the cost can be reduced by checking whether the program meets the specification. Usually, software is composed of several modules so that by checking the ...
-
Chapter and Conference Paper
Co-design and Implementation of Image Recognition Based on ARM and FPGA
With the development of the Internet of things, the image recognition system is widely required in many fields. It has very high requirement in real-time, but usually it has high complexity and large data. So ...
-
Chapter and Conference Paper
PSTeC: A Location-Time Driven Modelling Formalism for Probabilistic Real-Time Systems
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have become important topics in both theory and industry. In some application domains, such as when specifying the behaviour of precision mechanics, we...
-
Chapter and Conference Paper
A Framework for Data-Driven Automata Design
The traditional model-driven develo** methods in requirement engineering (RE) have met challenges. Under the dropback of big data, we propose a new framework of software design method based on requirement da...
-
Chapter and Conference Paper
A Software Trustworthiness Measure Based on the Decompositions of Trustworthy Attributes and Its Validation
There exist many software trustworthiness measures based on the decompositions of attributes. However, few of them are concerned with using more rigorous approaches to measure software trustworthiness and carr...
-
Chapter and Conference Paper
Vehicle Scheduling Problem on Trees
In this paper, we study a subproblem of vehicle scheduling problem, which is in general strongly NP-hard. In this problem, the road map is a tree, the release times and the handling times of all the tasks are ...
-
Chapter and Conference Paper
A Proof System in PADS
The PADS (Process Algebra for Demand and Supply) framework is an approach to model resource demand and supply for the formal analysis of hierarchical scheduling. Inspired by the demand relation in PADS, we pro...
-
Chapter and Conference Paper
The Semantics of wlp and slp of Fuzzy Imperative Programming Languages
In this paper, we focus on the weakest liberal precondition semantics (wlp, for short) and the strongest liberal postcondition semantics (slp, for short) of fuzzy imperative programming languages and discuss thei...
-
Chapter and Conference Paper
Average Transitive Trustworthy Degrees for Trustworthy Networks
The goal of this paper is to investigate measurement models of transitive trustworthiness for trustworthy networks. The reals in the interval [0,1] are used to define trust degrees in such a way that the large...