نتایج جستجو برای: conformance in land
تعداد نتایج: 16997024 فیلتر نتایج به سال:
To insure that a Trusted Platform Module (TPM) has been manufactured according to high security standards, Trusted Computing Group (TCG) specifications are accomplished by conformance tests. Conformance describes the correct and secure implementation of a TPM according to the specification and the respective protection profile. Conformance with a protection profile and security target, which bo...
A common problem in applying choreographies and orchestrations is ensuring and enforcing the consistency of the models which is often referred to as “conformance checking”. In this position paper, we introduce a concept for checking the conformance of WS-BPEL based orchestrations to ebBP-ST choreographies: First, the ebBP-ST and WS-BPEL models will be transformed into the process algebra CCS. A...
During the evolution of a large-scale software project, developers produce a large variety of software artifacts such as requirement specifications, design documents, source code, documentation, bug reports, etc. These software documents are not isolated items — they are semantically related to each other. They evolve over time and the set of active semantic relationships among them is also dyn...
Ensuring product conformance according to 3GPP standards TS36.141 Base Station Conformance Test and TS36.521 UE Conformance Specification Radio Transmission and Reception is critical to any LTE device manufacturer. However, conducting common radio transmit characteristics, such as OFDM, MIMO, and Layers 1/2/3, based on these standards efficiently and accurately can be a challenge. Using designa...
The conformance testing problem for dynamical systems asks, given two dynamical models (e.g., as Simulink diagrams), whether their behaviors are “close” to each other. In the semi-formal approach to conformance testing, the two systems are simulated on a large set of tests, and a metric, defined on pairs of real-valued, real-timed trajectories, is used to determine a lower bound on the distance...
As a node monitoring protocol, which is a part of network management, operates in distributed manner, conformance testing of such protocols is more tedious than testing a peer-to-peer protocol. Various works carried out to give the methodology to do conformance testing of distributed protocol. In this paper, we have presented a formal approach for conformance testing of a Node Monitoring Protoc...
Abstract By relating observed and modelled behaviour, conformance checking unleashes the full power of process mining. Techniques from this discipline enable analysis quality a model discovered event data, identification potential deviations, projection real traces onto models. This way, insights gained available data can be transferred to richer conceptual level, amenable for human interpretat...
Based on the framework of shaping the traffic at the source node and policing or reshaping the traffic at further node(s), the objective of this paper is to better understand conformance consistency in QoS contracted networks. It has been pointed out in [1] that an originally conformant packet may become non-conformant at the egress in the presence of variable packet length, even though the pac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید