Academic literature on the topic 'Safety logiciel'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Safety logiciel.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Safety logiciel"

1

PENNEROUX, J. "Lancement d'un logiciel de formation à la radioprotection." Radioprotection 29, no. 3 (1994): 405–6. http://dx.doi.org/10.1051/radiopro/1994012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

PIPAUD, J. Y. "RADIOR, un logiciel d'initiation à l'optimisation de la radioprotection." Radioprotection 30, no. 1 (1995): 103–4. http://dx.doi.org/10.1051/radiopro/1995019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Renaud, Ph, H. Maubert, D. Robeau, I. Linge, O. Pavlovsky, and I. Ossipiants. "PARIS : un logiciel de simulation d'états radioécologiques post-accidentels." Radioprotection 32, no. 4 (1997): 521–32. http://dx.doi.org/10.1051/radiopro:1997116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bourgois, L., and H. Lelache. "TransporaD version 2.0 un logiciel sur la réglementation des transports de matières radioactives." Radioprotection 33, no. 2 (1998): 189–91. http://dx.doi.org/10.1051/radiopro:1998105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maubert, Henri, Philippe Renaud, Jean-Christophe Bernié, Guillaume de Drouas, Philippe Fache, and Jean-Michel Métivier. "ASTRAL : un logiciel pour l'évaluation des conséquences d'un rejet accidentel de radionucléides dans l'environnement." Radioprotection 32, no. 3 (1997): 357–69. http://dx.doi.org/10.1051/radiopro:1997112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

JARVIS, N. S., and A. BIRCHALL. "LUDEP 1.0, un logiciel pour ordinateur personnel qui applique le nouveau modèle pulmonaire de la CIPR." Radioprotection 29, no. 1 (1994): 81–86. http://dx.doi.org/10.1051/radiopro/1994023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Egan, Rylan, Jessica Baumhour, Monica Mullin, et al. "Resident and Attending Physician Perceptions of a Quality and Safety Curriculum." Canadian Journal of General Internal Medicine 16, no. 3 (2021): e62-e73. http://dx.doi.org/10.22374/cjgim.v16i3.495.

Full text
Abstract:
This study sought to identify opportunities for improvement of an Internal Medicine (IM) resident quality improvement (QI)/patient safety (PS) program at an academic teaching hospital. The authors conducted semi-structured interviews with 15 residents and 6 attending physicians, which were analyzed from an inductive and thematic lens using NVivo software. Ethics was approved by the institution’s Research Ethics Board (File #: 6026140). Four themes emerged from this analysis. Residents and attending physicians agreed on (i) integrating QI/PS knowledge and skills into practice using active learn
APA, Harvard, Vancouver, ISO, and other styles
8

GROUZELLE, C., F. LAYLAVOIX F., M. F. BAUDOT, and R. DUCOUSSO. "Logiciel pour une évaluation rapide des conséquences d'une retombée radioactive sur la chaîne alimentaire : applications au milieu tropical." Radioprotection 30, no. 1 (1995): 79–88. http://dx.doi.org/10.1051/radiopro/1995024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Degrange, J. P., F. P. Levy, and T. Schneider. "ECRS : Un logiciel pour l'évaluation du risque et des contre-mesures associés à l'exposition au radon dans les habitations." Radioprotection 36, no. 4 (2001): 537–46. http://dx.doi.org/10.1051/radiopro:2001107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lamart, S., L. De Carlan, E. Blanchardon, and D. Franck. "Développements apportés au logiciel OEDIPE de simulation de mesures anthroporadiamétriques pour la prise en compte des données biocinétiques dans la modélisation de la contamination interne." Radioprotection 43, no. 2 (2008): 213–23. http://dx.doi.org/10.1051/radiopro:2007055.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Safety logiciel"

1

Sun, Yanjun. "Consolidation de validation fonctionnelle de systèmes critiques à l'aide de model checking : application au contrôle commande de centrales nucléaires." Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0047.

Full text
Abstract:
La vérification et la validation de systèmes critiques temps réel sont des activités soumises à de contraignants standards et certifications. Les progrès récents en Ingénierie Système basée sur les modèles peuvent être appliqués en utilisant des techniques formelles de vérification dès la phase amont avec un grand bénéfice pour détecter des défauts. Cette thèse propose une méthodologie basée sur les modèles dédiée à la validation fonctionnelle de tels systèmes. La méthode est dirigée par la couverture structurelle du modèle en Lustre d’un système réactif en co-simulation avec un procédé physiq
APA, Harvard, Vancouver, ISO, and other styles
2

Mariano, Georges. "Evaluation de logiciels critiques développés par la méthode B : une approche quantitative." Valenciennes, 1997. https://ged.uphf.fr/nuxeo/site/esupversions/823185e9-e82a-44fc-b3e2-17a0b205165e.

Full text
Abstract:
Dans le cadre de l'utilisation de la méthode formelle B, nous proposons de contribuer à l'évaluation des développements de logiciels critiques, par la mise en place de techniques quantitatives. Ces techniques s'articulent autour de la définition, de l'extraction et de l'interprétation de mesures (ou métriques) issues du produit à évaluer. Notre progression vers cet objectif se décompose en trois étapes. La première étape est constituée par la modélisation des spécifications formelles définissant le logiciel. Le modèle obtenu repose sur l'ensemble des arbres syntaxiques correspondant à chaque c
APA, Harvard, Vancouver, ISO, and other styles
3

Chu, Liu. "Reliability and optimization, application to safety of aircraft structures." Thesis, Rouen, INSA, 2016. http://www.theses.fr/2016ISAM0008/document.

Full text
Abstract:
Les chercheurs dans le domaine de la conception aérodynamique et de la fabrication des avions ont fait beaucoup d'effort pour améliorer les performances des ailes par des techniques d'optimisation. Le développement de la mécanique des fluides numérique a permis de réduire les dépenses en soufflerie tout en fournissant des résultats convaincants pour simuler des situations compliquées des aéronefs. Dans cette thèse, il a été choisi une partie spéciale et importante de l'avion, à savoir, la structure de l'aile. L'optimisation basée sur la fiabilité est une méthode plus appropriée pour les struct
APA, Harvard, Vancouver, ISO, and other styles
4

Pandya, Nishant. "Analyse de sensibilité paramétrique d’un outil de modélisation des conséquences de scénarios d’accidents. Application à la dispersion atmosphérique de rejets avec le logiciel Phast." Thesis, Toulouse, INPT, 2009. http://www.theses.fr/2009INPT031G/document.

Full text
Abstract:
L’objectif de la thèse est d’effectuer l’analyse de sensibilité paramétrique du logiciel Phast de modélisation de la dispersion atmosphérique de gaz toxiques et/ou inflammables. La technique a consisté à coupler Phast et l’outil d’analyse de sensibilité SimLab, ce qui permet d’exécuter automatiquement un grand nombre de simulations en faisant varier l’ensemble des paramètres du modèle de façon simultanée. La méthode d’analyse de sensibilité globale choisie, E-FAST, est basée sur l’analyse de la variance des sorties du modèle pour le calcul des indices de sensibilité. Nous avons étudié des scén
APA, Harvard, Vancouver, ISO, and other styles
5

Gobillot, Nicolas. "Validation d’architectures temps-réel pour la robotique autonome." Thesis, Toulouse, ISAE, 2016. http://www.theses.fr/2016ESAE0006/document.

Full text
Abstract:
Un système robotique est un système complexe, à la fois d’un point de vue matériel et logiciel. Afin de simplifier la conception de ces machines, le développement est découpé en modules qui sont ensuite assemblés pour constituer le système complet. Cependant, la facilité de conception de ces systèmes est bien souvent contrebalancée par la complexité de leur mise en sécurité, à la fois d’un point de vue fonctionnel et temporel. Il existe des ensembles d’outils et de méthodes permettant l’étude d’ordonnançabilité d’un système logiciel à base de tâches. Ces outils permettent de vérifier qu’un sys
APA, Harvard, Vancouver, ISO, and other styles
6

Louis, Christophe. "La protection des logiciels : une solution pour ordinateurs personnels utilisant la carte a micro-calculateur." Paris 6, 1988. http://www.theses.fr/1988PA066373.

Full text
Abstract:
Deux solutions de protection utilisant la carte a microcalculateur ont ete etudiees. L'une est une protection d'acces a la machine. La deuxieme protege le logiciel en chiffrant une partie de ses instructions. Ces solutions ont ete validees par deux maquettes associant du materiel et du logiciel afin de proteger des attaques des utilitaires pour ibm pc
APA, Harvard, Vancouver, ISO, and other styles
7

Godot, Jean. "ALEBAS : une méthodologie de développement et d'analyse de sûreté de fonctionnement des systèmes embarqués." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS057/document.

Full text
Abstract:
De nos jours, l'augmentation de la complexité des systèmes embarqués impose la prise en charge, dès les premiers prototypes et au niveau logiciel, d'exigences habituellement traitées plus tardivement voire même seulement lors du passage en série, comme notamment les contraintes de sûreté de fonctionnement. Nous proposons une méthodologie de développement de logiciels embarqués pouvant répondre aux besoins et contraintes de développement de ces logiciels dans la phase de prototypage. La flexibilité de la méthodologie garantit une meilleure gestion des évolutions récurrentes caractérisant les lo
APA, Harvard, Vancouver, ISO, and other styles
8

Goutal, Pascale. "Jeux non-coopératifs finis appliqués à la sécurité nucléaire." Paris 6, 1997. http://www.theses.fr/1997PA066362.

Full text
Abstract:
Afin de dissuader les eventuels detournements de matieres nucleaires, un inspecteur est charge d'effectuer un certain nombre d'inspections dans une installation nucleaire. Deux inspections ont lieu a des dates fixes et connues de l'inspecteur et d'un eventuel detourneur. Entre les deux dates, un nombre limite d'inspections peuvent etre decidees par l'inspecteur. Nous supposons qu'un detournement est toujours detecte lors de l'inspection suivante. L'inspecteur cherche a minimiser le temps de detection et l'eventuel detourneur a le maximiser. Les jeux d'inspections sont etudies en deux temps. No
APA, Harvard, Vancouver, ISO, and other styles
9

Sirgabsou, Yandika. "Proposition d’une approche dirigée par les modèles pour la sûreté de fonctionnement logicielle - Application à l'architecture logicielle des véhicules connectés et autonomes." Electronic Thesis or Diss., Toulouse, INSA, 2023. http://www.theses.fr/2023ISAT0062.

Full text
Abstract:
Dans le contexte du développement de logiciels automobiles, le problème général qui a motivé ce travail était la complexité croissante des architectures logicielles et les limites des pratiques actuelles en termes d’analyses de sécurité. Malgré le développement du MBSE (Model Based Systems Engineering), ces pratiques sont toujours caractérisées par le recours à des techniques manuelles traditionnelles d’analyse de la sécurité telles que l’analyse par arbre de défaillance (FTA) ou l’analyse des modes de défaillance et de leurs effets (AMDE). Bien qu’elles soient toujours utiles, ces techniques
APA, Harvard, Vancouver, ISO, and other styles
10

Moy, Yannick. "Automatic modular static safety checking for C programs." Paris 11, 2009. http://www.theses.fr/2009PA112001.

Full text
Abstract:
Cette thèse propose des solutions automatiques et modulaires aux trois problèmes principaux à résoudre pour appliquer les techniques de preuve déductive aux programmes C, dans le but de prouver l'absence de faille de sécurité exploitant une corruption mémoire. Ces problèmes sont la génération d'annotations logiques, la séparation mémoire et la prise en compte des unions et des casts. La preuve déductive repose sur la présence d'annotations logiques dans les programmes, qu'il n'est pas possible en pratique d'ajouter à la main en totalité. Nous proposons une méthode de génération d'annotations l
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Safety logiciel"

1

Developing safety systems: A guide using Ada. Prentice Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Transport, European Commission Directorate-General, ed. Comfortable: Comfort - advanced benefits for logical VTS equipment. Office for Official Publications of the European Communities, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1946-, Voges U., ed. Computer safety, reliability and security: 20th international conference, SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001 : proceedings. Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The e-policy handbook: Rules and best practices to safely manage your company's e-mail, blogs, social networking, and other electronic communication tools. 2nd ed. American Management Association, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pham, Hoang. System Software Reliability. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pham, Hoang. System Software Reliability. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

System Software Reliability (Springer Series in Reliability Engineering). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Akimkin, Vasily G., ed. Control and prevention of infections associated with health care (HAIs-2020). Central Research Institute for Epidemiology, 2020. http://dx.doi.org/10.36233/978-5-6045286-1-7.

Full text
Abstract:
Ensuring epidemiological safety as a component of the quality and safety of medical ser-vices requires the introduction of new methods of prevention, diagnosis and treatment of health care-associated infections (HAIs) into clinical practice.The high prevalence of HAIs in medical organizations of various specialties, significant damage to the health of the population, the economy and the demographic situation all over the world determine the relevance of their prevention at the present time.Conference abstracts were submitted by leading epidemiologists, young researchers and medical practitione
APA, Harvard, Vancouver, ISO, and other styles
9

Licensing Issues Associated With the Use of Computers in the Nuclear Industry (Nuclear Science and Technology (European Comm Info Serv)). European Communities, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Davim, J. Paulo, Kaushik Kumar, and Chikesh Ranjan. Understanding CATIA: A Tutorial Approach. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Safety logiciel"

1

Platzer, André. "Safety & Contracts." In Logical Foundations of Cyber-Physical Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63588-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barthe, Gilles, Juan Manuel Crespo, and César Kunz. "Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification." In Logical Foundations of Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35722-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saglietti, Francesca. "Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets." In Computer Safety, Reliability and Security. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49646-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Speiser, Kilian, Kepeng Hong, and Jochen Teizer. "Enhancing the Realism of Virtual Construction Safety Training: Integration of Real-Time Location Systems for Real-World Hazard Simulations." In CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality. Firenze University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0289-3.15.

Full text
Abstract:
In numerous studies, virtual training for construction safety has been proposed as a promising approach. However, creating realistic training scenarios requires significant resources, encompassing various elements such as sound, graphics, agent behavior, and realistic hazards. Digital Twins have revolutionized this process, and although so far, on a conceptual level only, significantly reducing the associated workload, it is still not exploiting its full potential. In this work, we propose a novel approach that leverages Real-time Location Systems (RTLS) data to simulate the real-world behavior of construction workers and equipment within Virtual Training Environments (VTEs). We aim to create training scenarios with dynamic real-world instead of hardcoded made-up hazardous events. To achieve this, we propose an extension to our Digital Twin for Construction Safety (DTCS) framework that now integrates (a) trajectory data streams of construction personnel and equipment and (b) technical specifications of the construction site work environment, including location and geometry of terrain and surface objects, to simulate real-world hazards in virtual safety training scenarios. Our further contribution is a case study application to explore the DTCS training capacity. Applying a logical filtering algorithm, we can process the RTLS data and ensure that the movements of the workers and equipment within the virtual environment are as realistic and representative as within the real world. This then enables the creation of realistic hazards that trainees can encounter in the training phase. Preliminary results with trainees suggest that the proposed work can have a high potential to enhance the realism of safety training, especially when they need to experience human-machine-related interactions safely. However, further work is required to create more responsive learning environments where the equipment follows real trajectories but also responds intelligently to the trainees' actions. By leveraging real-time data and advanced visualization technologies, we bridge the gap between the physical and virtual realms, enabling trainees to interact and navigate within a realistic virtual environment
APA, Harvard, Vancouver, ISO, and other styles
5

Speiser, Kilian, Kepeng Hong, and Jochen Teizer. "Enhancing the Realism of Virtual Construction Safety Training: Integration of Real-Time Location Systems for Real-World Hazard Simulations." In CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality. Firenze University Press, 2023. http://dx.doi.org/10.36253/10.36253/979-12-215-0289-3.15.

Full text
Abstract:
In numerous studies, virtual training for construction safety has been proposed as a promising approach. However, creating realistic training scenarios requires significant resources, encompassing various elements such as sound, graphics, agent behavior, and realistic hazards. Digital Twins have revolutionized this process, and although so far, on a conceptual level only, significantly reducing the associated workload, it is still not exploiting its full potential. In this work, we propose a novel approach that leverages Real-time Location Systems (RTLS) data to simulate the real-world behavior of construction workers and equipment within Virtual Training Environments (VTEs). We aim to create training scenarios with dynamic real-world instead of hardcoded made-up hazardous events. To achieve this, we propose an extension to our Digital Twin for Construction Safety (DTCS) framework that now integrates (a) trajectory data streams of construction personnel and equipment and (b) technical specifications of the construction site work environment, including location and geometry of terrain and surface objects, to simulate real-world hazards in virtual safety training scenarios. Our further contribution is a case study application to explore the DTCS training capacity. Applying a logical filtering algorithm, we can process the RTLS data and ensure that the movements of the workers and equipment within the virtual environment are as realistic and representative as within the real world. This then enables the creation of realistic hazards that trainees can encounter in the training phase. Preliminary results with trainees suggest that the proposed work can have a high potential to enhance the realism of safety training, especially when they need to experience human-machine-related interactions safely. However, further work is required to create more responsive learning environments where the equipment follows real trajectories but also responds intelligently to the trainees' actions. By leveraging real-time data and advanced visualization technologies, we bridge the gap between the physical and virtual realms, enabling trainees to interact and navigate within a realistic virtual environment
APA, Harvard, Vancouver, ISO, and other styles
6

Kvassay, M., E. Zaitseva, J. Kostolny, and V. Levashenko. "Reliability analysis of noncoherent systems based on logical differential calculus." In Risk, Reliability and Safety: Innovating Theory and Practice. CRC Press, 2016. http://dx.doi.org/10.1201/9781315374987-205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Clote, Peter. "A safe recursion scheme for exponential time." In Logical Foundations of Computer Science. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63045-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cholvy, Laurence, Robert Demolombe, and Andrew Jones. "Reasoning about the safety of information: from logical formalization to operational definition." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58495-1_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Blicha, Martin, Konstantin Britikov, and Natasha Sharygina. "The Golem Horn Solver." In Computer Aided Verification. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37703-7_10.

Full text
Abstract:
AbstractThe logical framework of Constrained Horn Clauses (CHC) models verification tasks from a variety of domains, ranging from verification of safety properties in transition systems to modular verification of programs with procedures. In this work we present Golem, a flexible and efficient solver for satisfiability of CHC over linear real and integer arithmetic. Golem provides flexibility with modular architecture and multiple back-end model-checking algorithms, as well as efficiency with tight integration with the underlying SMT solver. This paper describes the architecture of Golem and its back-end engines, which include our recently introduced model-checking algorithm TPA for deep exploration. The description is complemented by extensive evaluation, demonstrating the competitive nature of the solver.
APA, Harvard, Vancouver, ISO, and other styles
10

Cassano, Valentín, Thomas S. E. Maibaum, and Silviya Grigorova. "A (Proto) Logical Basis for the Notion of a Structured Argument in a Safety Case." In Formal Methods and Software Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Safety logiciel"

1

Yang, Wen-Chi, Giuseppe Marra, Gavin Rens, and Luc De Raedt. "Safe Reinforcement Learning via Probabilistic Logic Shields." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/637.

Full text
Abstract:
Safe Reinforcement learning (Safe RL) aims at learning optimal policies while staying safe. A popular solution to Safe RL is shielding, which uses a logical safety specification to prevent an RL agent from taking unsafe actions. However, traditional shielding techniques are difficult to integrate with continuous, end-to-end deep RL methods. To this end, we introduce Probabilistic Logic Policy Gradient (PLPG). PLPG is a model-based Safe RL technique that uses probabilistic logic programming to model logical safety constraints as differentiable functions. Therefore, PLPG can be seamlessly applie
APA, Harvard, Vancouver, ISO, and other styles
2

Fengfeng, Wu, Jia Song, Yang Kai, Zhao Xiongbo, and Wu Guirong. "Design of RapidIO logical core based on safety arbitration mechanisms." In Electronics (PrimeAsia). IEEE, 2010. http://dx.doi.org/10.1109/primeasia.2010.5604940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Safety and Security in Networked Robotic Systems Via Logical Consensus." In International Workshop on “Networked embedded and control system technologies: European and Russian R&D cooperation”. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002278600000000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Creese, Sadie, Michael H. Goldsmith, and Adedayo O. Adetoye. "A logical high-level framework for Critical Infrastructure resilience and risk assessment." In 2011 International Workshop on Cyberspace Safety and Security (CSS). IEEE, 2011. http://dx.doi.org/10.1109/css.2011.6058564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kammuller, Florian, and Manfred Kerber. "Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling." In 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 2016. http://dx.doi.org/10.1109/spw.2016.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ayestaran, Iban, Carlos F. Nicolas, Jon Perez, and Peter Puschner. "Modeling logical execution time based safety-critical embedded systems in SystemC." In 2014 3rd Mediterranean Conference on Embedded Computing (MECO). IEEE, 2014. http://dx.doi.org/10.1109/meco.2014.6862662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Giunchiglia, Eleonora, Mihaela Catalina Stoian, and Thomas Lukasiewicz. "Deep Learning with Logical Constraints." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/767.

Full text
Abstract:
In recent years, there has been an increasing interest in exploiting logically specified background knowledge in order to obtain neural models (i) with a better performance, (ii) able to learn from less data, and/or (iii) guaranteed to be compliant with the background knowledge itself, e.g., for safety-critical applications. In this survey, we retrace such works and categorize them based on (i) the logical language that they use to express the background knowledge and (ii) the goals that they achieve.
APA, Harvard, Vancouver, ISO, and other styles
8

Coleman, James R. "A Logical Approach to Designing Safety Test Plans for Space Nuclear Systems." In SPACE TECHNOLOGY AND APPLICATIONS INTERNAT.FORUM-STAIF 2004: Conf.on Thermophys.in Microgravity; Commercial/Civil Next Gen.Space Transp.; 21st Symp.Space Nuclear Power & Propulsion; Human Space Explor.; Space Colonization; New Frontiers & Future Concepts. AIP, 2004. http://dx.doi.org/10.1063/1.1649590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Yanchun, Ting Lei, Yujie Liu, Hongqi Yang, and Ning Hu. "Research on the logical relation of safety work items in GJB 900A-2012." In 2023 5th International Conference on System Reliability and Safety Engineering (SRSE). IEEE, 2023. http://dx.doi.org/10.1109/srse59585.2023.10336061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Russo, F., and C. Rindone. "Safety of users in road evacuation: the logical framework approach in evacuation planning." In URBAN TRANSPORT 2008. WIT Press, 2008. http://dx.doi.org/10.2495/ut080721.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Safety logiciel"

1

Zimmerman and Chen. L51769 Limit States and Reliability-Based Pipeline Design. Pipeline Research Council International, Inc. (PRCI), 1997. http://dx.doi.org/10.55274/r0010325.

Full text
Abstract:
The objective is to develop fully calibrated limit states design (LSD) procedures for pipelines. Limit states design, also known as load and resistance factor design (LRFD), provides a unified approach to dealing with all relevant failure modes and load combinations of concern. It explicitly accounts for the uncertainties that naturally occur in the determination of the loads which act on a pipeline and in the resistance of the pipe to failure. The load and resistance factors used are based on reliability considerations; however, the designer is not faced with carrying out probabilistic calcul
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!