توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱A New Approach to Early Software Reliability Prediction Based on a Formal Specification of System
نویسنده(ها): ، ،
اطلاعات انتشار: دوازدهمین کنفرانس سالانه انجمن کامپیوتر ایران، سال
تعداد صفحات: ۴
Prediction of reliability in early phases of software development is one of the discussions which has been attracting more and more attentions during the recent three decades. Techniques and models are mostly used at the test phase; there are only a few models that are employed at early phase of software development. Early prediction, however, is very important for better prognosis and management of risks. In this paper we propose an approach for software reliability early prediction based on software behavior. The major difference between our approach and those of others is the fact that we use a formal method, called Viewcharts [1], to specify the behavior of software systems.<\div>

۲Logical Languages for Specification and Verification of Reactive System's Behavior
نویسنده(ها): ،
اطلاعات انتشار: نهمین کنفرانس سالانه انجمن کامپیوتر ایران، سال
تعداد صفحات: ۱۰
Logical languages are playing important roles in specification and verification of reactive systems. In general, computer system specifications are created based on logical notations and proofs. In the spirit of Logical languages for reactive systems propositional Logic and Ternporal Logic are becoming the center of attention. A number of researches have verification. We believe that a pause is in order, at this point, to analyze and review the current state of the research in this area. In this area. In this paper we review a set of logical theories computational aspects of computer aided verifications of reactive systems. We discuss First order Logic, Multimodal Logic, Temporal logic modal logic , model cheching and buchi – automata Further, we compare first and second order llogic, w–automata and formal languages.<\div>

۳A code based method to retrieve family relationships on genealogy tree
نویسنده(ها): ، ،
اطلاعات انتشار: اولین کنفرانس ملی دانش پژوهان کامپیوتر و فناوری اطلاعات، سال
تعداد صفحات: ۸
genealogy is an important tool to manage individuals familiar information . And it is used to trace inherited diseases. Retrieving family relationship is and important and determinative issue in genealogy tree.these issues are folloved bye the family information banks designers. different methods and algorithms with different features have been provided to manage information of individuals within the genealogy tree.most of these methods and algorithms do not cover the individual familiy relationships perfectly. this peaper presents a code based method witch can retrieve all the family relationships between individuals in a family tree. also we will achieve advance information within the genealogy tree bye using this type of coding .<\div>

۴A Formal Framework for Specifying Dynamic Reconfiguration Of Adaptive Systems
نویسنده(ها): ، ،
اطلاعات انتشار: اولین کنفرانس ملی دانش پژوهان کامپیوتر و فناوری اطلاعات، سال
تعداد صفحات: ۷
We expect modern systems have dynamic reconfigurations to cope with failure or adapt themselves with environment and clients. Software adaptation techniques try to solve the problem of compatible interfaces in components with reconfiguration capabilities and an abstract specification of systems called adaptation contract. In our approach, at first, we represent whole system by a mathematical model and then we build adaptor based on system parts and adaptation contract. After that, we are going to generate net for adaptors by using synchronization vectors to synchronize whole system.<\div>

۵consistency check of live sequence charts spesification based on runs
اطلاعات انتشار: اولین کنفرانس ملی دانش پژوهان کامپیوتر و فناوری اطلاعات، سال
تعداد صفحات: ۶
live sequence charts (lsc) are a tipe of interection diagrams that extend message sequence charts (msc) with various means for distinguishing possible necessary and forbidden behavior. The difinition of lsc is very permissive and allows writing inconsistent specifications wich cannot be realized in an implementation . the paper proposes an approach for generating a set of consistent runs given an instance of (a possibly inconsistent) lsc specification. the foundiation presented for this approach on run in lsc. since run attitude the executing stages o a scenario is a sequence rather single–step we belive that our tathematical foundation would significantly reduce the complexity of consistency check technique ; in particular ; we carry out the cheking consistency of lsc on the level of scenario through run.<\div>

۶Hardware Based Security in Pervasive Computing Environments
اطلاعات انتشار: اولین کنفرانس ملی دانش پژوهان کامپیوتر و فناوری اطلاعات، سال
تعداد صفحات: ۶
The purpose of pervasive computing is anywhere and anytime access to information within computing infrastructures. Pervasive computing poses new security challenges while the information is reachable at anywhere and anytime and it may be applied by malicious users. Additionally, in some special environments such as a military domicile exchanged data between devices may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against strangers. As Hardware based security solutions in most fields of technology can offer greater assurance, in this paper, we present a hardware based security usage in pervasive computing environments, which provides more security in comparison with software program based encryptions. The model not only make appropriate decisions about nodes access rights, but also provides trustworthiness security for pervasive computing and protects the information from software based attacks. Finally, the security degree of the model is analyzed.<\div>
نمایش نتایج ۱ تا ۶ از میان ۶ نتیجه