default search action
14th VECoS 2020: Xi'an, China
- Belgacem Ben Hedia, Yu-Fang Chen, Gaiyun Liu, Zhenhua Yu:
Verification and Evaluation of Computer and Communication Systems - 14th International Conference, VECoS 2020, Xi'an, China, October 26-27, 2020, Proceedings. Lecture Notes in Computer Science 12519, Springer 2020, ISBN 978-3-030-65954-7
Petri-Net, Simulation, and Scheduling
- Huimin Zhang, Lei Feng, Wu Xie, Feng Yu:
An Approach for Supervisor Reduction of Discrete-Event Systems. 3-14 - Hongbin Zhang, Jiliang Luo, Jinjun Long, Yisheng Huang, Weimin Wu:
Multi-robot Path Planning Using Petri Nets. 15-26 - ZhaoYu Xiang:
Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets with Novel Colored Capacity. 27-40 - Zihan Wei, Mi Zhao, Changxin Fu:
The Modeling and Simulation on SRM Drive System Using Variable-Proportional-Desaturation PI Regulator. 41-53 - Pei Wang:
Vehicle Scheduling Problem in Terminals: A Review. 54-67 - Faustin Ahishakiye, José Ignacio Requeno Jarabo, Lars Michael Kristensen, Volker Stolz:
Coverage Analysis of Net Inscriptions in Coloured Petri Net Models. 68-83 - Ruotian Liu, Rabah Ammour, Leonardo Brenner, Isabel Demongodin:
ON/OFF Control Trajectory Computation for Steady State Reaching in Batches Petri Nets. 84-99 - Kuangze Wang, Hanifa Boucheneb, Kamel Barkaoui, Zhiwu Li:
Towards Efficient Partial Order Techniques for Time Petri Nets. 100-115 - Salwa Habbachi, Zhiwu Li, Mohamed Khalgui:
Towards a Generic Framework for Formal Verification and Performance Analysis of Real-Time Scheduling Algorithms. 116-130 - Yasmina Abdeddaïm:
Accurate Strategy for Mixed Criticality Scheduling. 131-146
Formal Modeling and Verification, Testing
- Braham Lotfi Mediouni, Iulia Dragomir, Ayoub Nouri, Saddek Bensalem:
Model-Based Design of Resilient Systems Using Quantitative Risk Assessment. 149-164 - Mariia Vasileva, Paolo Zuliani:
An Evaluation of Estimation Techniques for Probabilistic Verification. 165-179 - Amir Eaman, Amy P. Felty:
Formal Verification of a Certified Policy Language. 180-194 - Wilfried Yves Hamilton Adoni, Moez Krichen, Tarik Nahhal, Abdeltif Elbyed:
Multi-path Coverage of All Final States for Model-Based Testing Theory Using Spark In-memory Design. 195-204
Artificial Intelligence and Machine Learning
- Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. 207-221 - Chengxuan Lu, Jinjun Long, Zichao Xing, Weimin Wu, Yong Gu, Jiliang Luo, Yisheng Huang:
Deep Reinforcement Learning for Solving AGVs Routing Problem. 222-236 - Nanyan Liu, Jingyang You:
Research on Vehicle Detection Based on Visual Convolution Network Optimization. 237-243 - ZhaoZhao Zhang, Qiu-wan Wang, Ying-qin Zhu:
A Self-adaptive Multi-hierarchical Modular Neural Network for Complex Problems. 244-256 - Yinfei Lv, Huorong Ren, Xuefeng Gao, Tong Sun, Haopeng Zhang, Xinyu Guo:
Multi-scale Risk Assessment Model of Network Security Based on LSTM. 257-267 - Lina Zhang, Xiangqin Zheng, Xuan Dang, Jiehui Zhang:
Weighted Lightweight Image Retrieval Method Based on Linear Regression. 268-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.