نتایج جستجو برای: code safety

تعداد نتایج: 425957  

Seyyed Ahmad Mirsharifi

At the moment, Moshanir loading code which has been provided by Tavanir Company in 1998 is used for loading transmission line towers. Also ASCE52 are applied for designing these structures. In the above Moshanir loading code, loading parameters such as, maximum yearly ice thickness, maximum monthly ice thickness, maximum yearly wind speed and maximum monthly wind speed have been considered as ...

2010
Nurlida Basir Ewen Denney Bernd Fischer

Model-based development and automated code generation are increasingly used for actual production code, in particular in mathematical and engineering domains. However, since code generators are typically not qualified, there is no guarantee that their output satisfies the system requirements, or is even safe. Here we present an approach to systematically derive safety cases that argue along the...

2009
Susmit Sarkar Robert Harper Peter Lee

Certified code systems enable trust to be generated in untrusted pieces of code. This is done by requiring that a machine–verifiable certificate be packaged with code, which can then be proved safe independently. Safety is defined with respect to a defined safety policy. Recent work has focused on “foundational certified code systems”, which define the safety policy as execution on a concrete m...

2010
Nurlida Basir Ewen Denney Bernd Fischer

Model-based development and automated code generation are increasingly used for actual production code, in particular in mathematical and engineering domains. However, since code generators are typically not qualified, there is no guarantee that their output satisfies the system requirements, or is even safe. Here we present an approach to systematically derive safety cases that argue along the...

2003
Johann Schumann Bernd Fischer Michael W. Whalen Jon Whittle

Although autocoding techniques promise large gains in software development productivity, their “real-world” application has been limited, particularly in safety-critical domains. Often, the major impediment is the missing trustworthiness of these systems: demonstrating—let alone formally certifying—the trustworthiness of automatic code generators is extremely difficult due to their complexity a...

1998
Ken Wong

This paper proposes an approach to the safety verification of the source code of a software-intensive system. This approach centers upon the production of a document intended to ensure the inspectability, maintainability and repeatability of the source code safety verification. This document, called a “safety verification case”, is intended to be a part of the overall system safety case. Althou...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Elvira Albert Germán Puebla Manuel V. Hermenegildo

Recent approaches to mobile code safety, like proof-carrying code, involve associating safety information to programs. The code supplier provides a program and also includes with it a certificate (or proof ) whose validity entails compliance with a predefined safety policy. The intended benefit is that the program consumer can locally validate the certificate w.r.t. the “untrusted” program by m...

2005
Ewen Denney Bernd Fischer

In principle, formal methods offer many advantages for aerospace software development: they can help to achieve ultra-high reliability, and they can be used to provide evidence of the reliability claims which can then be subjected to external scrutiny. However, despite years of research and many advances in the underlying formalisms of specification, semantics, and logic, formal methods are not...

Journal: :تابش و فناوری هسته ای 0
اصغر محمدی دانشگاه آزاد واحد علوم و تحقیقات، تهران، تهران، ایران مصطفی حسن زاده پژوهشکده راکتور، سازمان انرژی اتمی ایران، تهران ، تهران ، ایران مرتضی قریب دانشگاه آزاد واحد علوم و تحقیقات، تهران، تهران، ایران علی مالکی فارسانی سازمان انرژی اتمی ایران ، شرکت پسمانداری صنعت هسته ای ایران، تهران، ایران

in this research, shielding and criticality safety calculations carried out for interim storage and transportation cask in the tehran research reactor. such dual purpose cask is being designed to the spent fuel elements of research reactors. the monte carlo mcnp5 code calculation was utilized for the criticality safety analysis and origen2.1code was used for shielding calculation. according to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید