نتایج جستجو برای: safe

تعداد نتایج: 125597  

Journal: :IEEE Trans. Computers 1974
Yoshihiro Tohma

A method for the realization of fail-safe sequential circuits is presented where flip-flops are employed for representing the internal states. First, such a design technique where the circuit will be trapped in an erroneous state into which it is transferred by a fault is shown. Further, the condition for assuring that the circuit will be dropped into the particular (predetermined) final state ...

Journal: :Research in Computing Science 2014
Carolina Fócil Arias Amadeo José Argüelles-Cruz Itzamá López-Yáñez

One of the relevant tasks of the teaching-learning process is that of evaluation. In this sense, estimating the academic performance exhibited by the final evaluation of a student, at the end of the current semester, has become of particular interest for students, parents, educators, educative managers and researchers alike. More specifically, the current paper is focused in determining whether...

1990
Soma Chaudhuri Jennifer L. Welch

A fundamental aspect of any concurrent system is how processes communicate with each other. Ultimately, all communication involves concurrent reads and writes of shared memory cells, or registers. The stronger the guarantees provided by a register, the more useful it is to the user, but the harder it may be to implement in practice. Thus it is of interest to determine which types of registers c...

2004

In this study, one group of respondents is offered to purchase a safety device to be installed in their cars, while another group is offered a public safety, program (improved road quality) which results in the same size risk reduction. In terms of the value of a statistical life, our results are very, reasonable. However, the WTP for the private safety device is higher than the WTP for the pub...

2012
Shigeo Hirano James M. Snyder

One key role of elections is to allow voters to remove politicians who perform poorly in office. We analyze the extent to which incumbents who are involved in relatively serious political scandals lose elections. More importantly, we assess the relative importance of primary and general elections in removing such incumbents. How often do incumbents involved in relatively serious scandals lose i...

Journal: :IEEE Trans. Computers 1974
William W. Patterson Gernot Metze

This paper examines the dynamic fault behavior of asynchronous sequential machines, specifically identifying the faults which cause critical races and hazards, and presents a state assignment technique leading to a machine that enters one of a small set of error states whenever a fault occurs. Entry into an error state can be checked by very simple check circuits; a self-testing check circuit a...

2010
V. Bobin

This paper reports a design technique to make Complex CMOS Gates fail-safe for a class of faults. Two classes of faults are denned. The failsafe design presented has limited fault-tolerance capability. Multiple faults are also covered.

2002
L. Cui X. Zhao J. Li

In this paper two system safety models are built based on some practical situations. The system state can be distinguished into three states: working, fail-safe and fail-dangerous.The probabilities that the system are in working state, fail-safe state and fail-dangerous state, respectively, are derived. Also the mean times for the system working, fail-safe and fail-dangerous, are given. Finally...

2008
Alex Voorhoeve

WHAT role do a person’s opportunities to choose play in the justification of social arrangements? We need to answer this question in order to arrive at a theory of substantive responsibility, which tells us the way in which a person’s claims on others, others’ claims on her, and the quality of her situation should depend on the opportunities she has and the choices she makes. To get a handle on...

2003
Takahiro Shinagawa Kenji Kono Takashi Masuda

Executable content poses a threat of unauthorized access because it contains program code running on the user’s machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید