000 05735nam a22006975i 4500
001 978-3-030-65955-4
003 DE-He213
005 20240730175031.0
007 cr nn 008mamaa
008 201219s2020 sz | s |||| 0|eng d
020 _a9783030659554
_9978-3-030-65955-4
024 7 _a10.1007/978-3-030-65955-4
_2doi
050 4 _aTK7885-7895
050 4 _aTK5105.5-5105.9
072 7 _aUK
_2bicssc
072 7 _aCOM067000
_2bisacsh
072 7 _aUK
_2thema
082 0 4 _a621.39
_223
082 0 4 _a004.6
_223
245 1 0 _aVerification and Evaluation of Computer and Communication Systems
_h[electronic resource] :
_b14th International Conference, VECoS 2020, Xi'an, China, October 26-27, 2020, Proceedings /
_cedited by Belgacem Ben Hedia, Yu-Fang Chen, Gaiyun Liu, Zhenhua Yu.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXII, 281 p. 107 illus., 66 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v12519
505 0 _aPetri-Net, Simulation, and Scheduling -- An Approach for Supervisor Reduction of Discrete-event Systems -- Multi-robot path planning using Petri nets -- Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets With Novel Colored Capacity -- The Modeling and Simulation on SRM Drive System Using Variable-proportional-desaturation PI Regulator -- Vehicle Scheduling Problem in Terminals: a Review -- Coverage Analysis of Net Inscriptions in Coloured Petri Net Models -- ON/OFF control trajectory computation for steady state reaching in batches Petri nets -- Towards efficient partial order techniques for time Petri nets -- Towards a Generic Framework for Formal Verification and Performance Analysis of Real-time Scheduling Algorithms -- Accurate Strategy for Mixed Criticality Scheduling -- Formal Modeling and Verification, Testing -- Model-based Design of Resilient Systems Using Quantitative Risk Assessment -- An Evaluation of Estimation Techniques for Probabilistic Verification -- Formal Verification of a Certified Policy Language -- Multi-path Coverage of all Final States for Model-Based Testing Theory using Spark In-memory Design -- Artificial Intelligence and Machine Learning -- A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection -- Deep Reinforcement Learning for Solving AGVs Routing Problem -- Research on Vehicle Detection based on Visual Convolution Network Optimization -- A Self-Adaptive Multi-Hierarchical Modular Neural Network for Complex Problems -- Multi-Scale Risk Assessment Model of Network Security Based on LSTM -- Weighted lightweight image retrieval method based on linear regression.
520 _aThis book constitutes the proceedings of the 14th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2020, which was supposed to be held in Xi'an, China, in October 2020, but was held virtually instead. The 19 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 60 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of verification, control, performance, and dependability evaluation in order to discuss state of the art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and distributed hardware/software systems. The papers are organized in the following topical sections: petri-net, simulation, and scheduling; formal modeling and verification, testing; and artificial intelligence and machine learning.
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aAlgorithms.
_93390
650 0 _aComputer science
_xMathematics.
_93866
650 0 _aSoftware engineering.
_94138
650 0 _aMachine theory.
_9115166
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 1 4 _aComputer Engineering and Networks.
_9115167
650 2 4 _aDesign and Analysis of Algorithms.
_931835
650 2 4 _aMathematics of Computing.
_931875
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aFormal Languages and Automata Theory.
_9115168
650 2 4 _aData Structures and Information Theory.
_931923
700 1 _aBen Hedia, Belgacem.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115169
700 1 _aChen, Yu-Fang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115170
700 1 _aLiu, Gaiyun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115171
700 1 _aYu, Zhenhua.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115172
710 2 _aSpringerLink (Online service)
_9115173
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030659547
776 0 8 _iPrinted edition:
_z9783030659561
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v12519
_9115174
856 4 0 _uhttps://doi.org/10.1007/978-3-030-65955-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89749
_d89749