نتایج جستجو برای: assurance game
تعداد نتایج: 125002 فیلتر نتایج به سال:
a {em roman dominating function} on a graph $g = (v ,e)$ is a function $f : vlongrightarrow {0, 1, 2}$ satisfying the condition that every vertex $v$ for which $f (v) = 0$ is adjacent to at least one vertex $u$ for which $f (u) = 2$. the {em weight} of a roman dominating function is the value $w(f)=sum_{vin v}f(v)$. the roman domination number of a graph $g$, denoted by $gamma_r(g)$, equals the...
The rising quality and throughput demands of the manufacturing domain require flexible, accurate explainable computer-vision solutions for defect detection. Deep Neural Networks (DNNs) reach state-of-the-art performance on various tasks but wide-spread application in industrial is blocked by lacking explainability DNN decisions. A promising, human-readable solution given saliency maps, heatmaps...
Assurance provides confidence that a system will work as required and not cause harm. Confidence is based on justified beliefs about the system and its environment, and justification can be developed and documented as an assurance case comprised of a structured argument grounded on evidence. For justification to be compelling, the argument must be indefeasible, meaning that we have so thoroughl...
The U.S. National Institute of Standards and Technology (NIST) is starting two ambitious projects to (1) develop a taxonomy of software security flaws and vulnerabilities, (2) develop a taxonomy of software assurance (SA) functions and techniques which detect those flaws, (3) perform and maintain a survey of SA tools implementing the functions, (4) develop testable specifications of SA function...
A small, manageable number of common software safety assurance principles can be observed from software assurance standards and industry best practice. We briefly describe these assurance principles and explain how they can be used as the basis for creating software safety arguments.
With the continuous expansion of air traffic flow, increasingly serious aviation network security threats have a significant and far-reaching impact on safe operation industry. The networked management (ATM) system is an integrated space–air–ground integrating communication, network, satellite, data chain technology, which adopts network-centric structure to provide network-enabled services app...
the aim of the present study was to investigate the effect of an official basketball game and its result on serum testosterone and cortisol responses as well as a possible difference in these hormones between fixed and reserved players. for this purpose, two teams were purposefully selected from semi-final games of tehran first clubs. the blood samples of 22 female players (mean age: 20 years, ...
Voronoi game presents a simple geometric model for Competitive facility location problems with two players. Voronoi game is played by two players known as White and Black, they play in a continuous arena. In the one-round game, White starts game and places all his points in the arena then Black places her points. Then the arena is divided by distance between two players and the player with the ...
Introduction: This research investigated the effects of violent and football video games on cognitive functions, cortisol levels, and brain waves. Methods: A total of 64 participants competed in a single-elimination tournament. Saliva samples of all players were obtained before and after the games for the assessment of cortisol levels. The cognitive performances of the players were also assess...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید