Literatura académica sobre el tema "Safety logiciel"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Safety logiciel".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Safety logiciel"
PENNEROUX, J. "Lancement d'un logiciel de formation à la radioprotection". Radioprotection 29, n.º 3 (julio de 1994): 405–6. http://dx.doi.org/10.1051/radiopro/1994012.
Texto completoPIPAUD, J. Y. "RADIOR, un logiciel d'initiation à l'optimisation de la radioprotection". Radioprotection 30, n.º 1 (enero de 1995): 103–4. http://dx.doi.org/10.1051/radiopro/1995019.
Texto completoRenaud, Ph, H. Maubert, D. Robeau, I. Linge, O. Pavlovsky y I. Ossipiants. "PARIS : un logiciel de simulation d'états radioécologiques post-accidentels". Radioprotection 32, n.º 4 (octubre de 1997): 521–32. http://dx.doi.org/10.1051/radiopro:1997116.
Texto completoBourgois, L. y H. Lelache. "TransporaD version 2.0 un logiciel sur la réglementation des transports de matières radioactives". Radioprotection 33, n.º 2 (abril de 1998): 189–91. http://dx.doi.org/10.1051/radiopro:1998105.
Texto completoMaubert, Henri, Philippe Renaud, Jean-Christophe Bernié, Guillaume de Drouas, Philippe Fache y Jean-Michel Métivier. "ASTRAL : un logiciel pour l'évaluation des conséquences d'un rejet accidentel de radionucléides dans l'environnement". Radioprotection 32, n.º 3 (julio de 1997): 357–69. http://dx.doi.org/10.1051/radiopro:1997112.
Texto completoJARVIS, N. S. y A. BIRCHALL. "LUDEP 1.0, un logiciel pour ordinateur personnel qui applique le nouveau modèle pulmonaire de la CIPR". Radioprotection 29, n.º 1 (enero de 1994): 81–86. http://dx.doi.org/10.1051/radiopro/1994023.
Texto completoEgan, Rylan, Jessica Baumhour, Monica Mullin, Amelia Wilkinson, Sara Awad, Johanna Murphy, Nancy Dalgarno, Angela Coderre-Ball y Geneviève Digby. "Resident and Attending Physician Perceptions of a Quality and Safety Curriculum". Canadian Journal of General Internal Medicine 16, n.º 3 (21 de septiembre de 2021): e62-e73. http://dx.doi.org/10.22374/cjgim.v16i3.495.
Texto completoGROUZELLE, C., F. LAYLAVOIX F., M. F. BAUDOT y R. DUCOUSSO. "Logiciel pour une évaluation rapide des conséquences d'une retombée radioactive sur la chaîne alimentaire : applications au milieu tropical". Radioprotection 30, n.º 1 (enero de 1995): 79–88. http://dx.doi.org/10.1051/radiopro/1995024.
Texto completoDegrange, J. P., F. P. Levy y T. Schneider. "ECRS : Un logiciel pour l'évaluation du risque et des contre-mesures associés à l'exposition au radon dans les habitations". Radioprotection 36, n.º 4 (octubre de 2001): 537–46. http://dx.doi.org/10.1051/radiopro:2001107.
Texto completoLamart, S., L. De Carlan, E. Blanchardon y D. Franck. "Développements apportés au logiciel OEDIPE de simulation de mesures anthroporadiamétriques pour la prise en compte des données biocinétiques dans la modélisation de la contamination interne". Radioprotection 43, n.º 2 (abril de 2008): 213–23. http://dx.doi.org/10.1051/radiopro:2007055.
Texto completoTesis sobre el tema "Safety logiciel"
Sun, Yanjun. "Consolidation de validation fonctionnelle de systèmes critiques à l'aide de model checking : application au contrôle commande de centrales nucléaires". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0047.
Texto completoThe verification and validation of safety-critical real-time system are subject to stringent standards and certifications. Recent progress in model-based system engineering should be applied to such systems since it allows early detection of defects and formal verification techniques. This thesis proposes a model-based testing (MBT) methodology dedicated to functional validation of safety-critical real-time systems. The method is directed by the structural coverage of the Lustre model co-simulated with tje physical process and also by the functional requirements. It relies on a repetitive use of a model checker to generate coverage-based open-loop test sequences. We also propose a refinement technique of progressively adding environment constraints during test generation. The refinement is expected to support the passage from coverage-based open-loop test sequence to functional requirements-based closed-loop test case. Our methodology also considers the state explosion problem of a model checker and proposes a heuristic called hybrid verification combining model checking and simulation
Mariano, Georges. "Evaluation de logiciels critiques développés par la méthode B : une approche quantitative". Valenciennes, 1997. https://ged.uphf.fr/nuxeo/site/esupversions/823185e9-e82a-44fc-b3e2-17a0b205165e.
Texto completoChu, Liu. "Reliability and optimization, application to safety of aircraft structures". Thesis, Rouen, INSA, 2016. http://www.theses.fr/2016ISAM0008/document.
Texto completoTremendous struggles of researchers in the field of aerodynamic design and aircraft production were made to improve wing airfoil by optimization techniques. The development of computational fluid dynamic (CFD) in computer simulation cuts the expense of aerodynamic experiment while provides convincing results to simulate complicated situation of aircraft. In our work, we chose a special and important part of aircraft, namely, the structure of wing.Reliability based optimization is one of the most appropriate methods for structural design under uncertainties. It struggles to seek for the best compromise between cost and safety while considering system uncertainties by incorporating reliability measures within the optimization. Despite the advantages of reliability based optimization, its application to practical engineering problem is still quite challenging. In our work, uncertainty analysis in numerical simulation is introduced and expressed by probability theory. Monte Carlo simulation as an effective method to propagate the uncertainties in the finite element model of structure is applied to simulate the complicate situations that may occur. To improve efficiency of Monte Carlo simulation in sampling process, Latin Hypercube sampling is performed. However, the huge database of sampling is difficult to provide explicit evaluation of reliability. Polynomial chaos expansion is presented and discussed. Kriging model as a surrogate model play an important role in the reliability analysis.Traditional methods of optimization have disadvantages in unacceptable time-complexity or natural drawbacks of premature convergence because of finding the nearest local optima of low quality. Simulated Annealing is a local search-based heuristic, Genetic Algorithm draws inspiration from the principles and mechanisms of natural selection, that makes us capable of escaping from being trapped into a local optimum. In reliability based design optimization, these two methods were performed as the procedure of optimization. The loop of reliability analysis is running in surrogate model
Pandya, Nishant. "Analyse de sensibilité paramétrique d’un outil de modélisation des conséquences de scénarios d’accidents. Application à la dispersion atmosphérique de rejets avec le logiciel Phast". Thesis, Toulouse, INPT, 2009. http://www.theses.fr/2009INPT031G/document.
Texto completoWe have undertaken a parametric sensitivity analysis of the Phast software tool’s models for atmospheric dispersion of toxic and/or inflammable gases. We have coupled Phast with the sensitivity analysis tool SimLab, and have automated the execution of a large number of simulations while varying simultaneously selected model parameters. The global sensitivity analysis method used, E-FAST, is based on analysis of the variance of model outputs, and allows us to estimate sensitivity indices. We have studied continuous release scenarios for six different products (nitric oxide, ammonia, chlorine, nitrogen, n-hexane and hydrogen fluoride), which were chosen to cover a wide range of physical characteristics and storage conditions. Our analysis of Phast’s Unified Dispersion Model comprises two phases: a screening phase which allows the sensitivity of a wide range of parameters to be compared, followed by a phase focusing on the sensitivity of internal model parameters (excluding weather and source term variables), over a wide input range. For each product, we have broken down base-case scenarios into a number of sub-scenarios corresponding to different release conditions. This work has allowed us to rank model parameters according to their influence on the variability of a number of model outputs. It also includes a per-product comparative analysis indicating, for each release condition studied, which parameters have the most influence on the outputs. In the final part of the work, we have analyzed the local sensitivity of these parameters in a narrow range around their default values
Gobillot, Nicolas. "Validation d’architectures temps-réel pour la robotique autonome". Thesis, Toulouse, ISAE, 2016. http://www.theses.fr/2016ESAE0006/document.
Texto completoA robot is a complex system combining hardware and software parts. In order to simplify the robot design, the whole system is split in several separated modules. However, the complexity of the functional and temporal validation to improve the safety counterweights the robot design simplicity. We can find scheduling analysis tools for task-based software. These tools are used to check and validate the schedulability of the tasks involved in a software, run on a specific hardware. However, these methods considers the tasks as monolithic entities, without taking into account their internal structure. The resulting analyses may be too much pessimistic and therefore not applicable to robotic applications. In this work, we have modeled the internal structure of the tasks as state-machines and used these state-machines into the schedulability analysis in order to improve the analysis precision. Moreover, the tools developed during this work have been tested on real robotic use-cases
Louis, Christophe. "La protection des logiciels : une solution pour ordinateurs personnels utilisant la carte a micro-calculateur". Paris 6, 1988. http://www.theses.fr/1988PA066373.
Texto completoGodot, Jean. "ALEBAS : une méthodologie de développement et d'analyse de sûreté de fonctionnement des systèmes embarqués". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS057/document.
Texto completoNowadays, the increasing complexity of embedded systems requires the management, from the first prototypes and software level, of requirements usually handled later even only when passing in production, such as including dependability constraints. We propose a development methodology for embedded software that can meet the needs and constraints of developing this software in the prototyping phase. The flexibility of the methodology ensures better management of recurring changes characterizing the software in the prototyping phase. Also, due to its well-adapted structure, and automated aspect of its integration and implementation, our methodology ensures a significant cost reduction of serialization and implementation of norms such as ISO 26262 or DO-178. To illustrate the results, we apply our methodology and the associated toolchain to an innovative industrial project which consists to robotize a prototype car. The case study focuses on the accelerator function of the prototype
Goutal, Pascale. "Jeux non-coopératifs finis appliqués à la sécurité nucléaire". Paris 6, 1997. http://www.theses.fr/1997PA066362.
Texto completoSirgabsou, Yandika. "Proposition d’une approche dirigée par les modèles pour la sûreté de fonctionnement logicielle - Application à l'architecture logicielle des véhicules connectés et autonomes". Electronic Thesis or Diss., Toulouse, INSA, 2023. http://www.theses.fr/2023ISAT0062.
Texto completoIn the context of automotive software development, the general problem that motivated this work was the growing complexity of software architectures and the limitations of the current practices in terms of safety analyses. Despite the development of MBSE (Model Based Systems Engineering), these practices are still characterized by the reliance on manual traditional safety analysis techniques such as Fault Tree Analysis (FTA) or Failure Modes and Effect Analysis (FMEA). Although still useful, these techniques fall short when faced with complexity with the possibility of resulting in subjective, inefficient, poor quality and error-prone analyses. Hence, to improve the state of the current practice in the automotive context, our proposal is to apply the Model Based Safety Analysis (MBSA) approach that is a relevant Model Driven Engineering approach applied to safety. However, the review of the current state of the art of current MBSA approaches suggests that most of these approaches are systems oriented and lack clear methodological support. In addition, some of the MBSA approaches (especially those relying on a dedicated model) require deep understanding (in terms of modeling paradigm) and can be challenging to implement in the case of complex systems (limitations of manual modeling). Also in current practices, safety analysis at software level suffers of poor integration with the software development process, which can result in inconsistent safety analyses. To address these issues, the essence of our contribution is to provide a methodology that adapts the concepts, principles, and methods of MBSA for the purpose of improving the practice of software safety analysis, taking into consideration the current state of practices (in the existing software development process).Our first contribution consists of a methodology covering all the steps required to perform safety analysis on automotive software architectures using the model-based approach while addressing the challenges presented by the lack of inadequate inputs brought by the use of document-centric artifact in some parts of the software engineering process. Through this contribution, we propose a step-by-step methodology for defining the safety analysis context, constructing the dysfunctional architecture, and using it for safety analyses relying on a dedicated model approach.The second proposal, also methodological, aims to address some challenges related to complexity brought by the limitations of a dedicated model approach. It consists of using software fault patterns based on ISO 26262 software fault templates to ease the construction of the dysfunctional model. Through this proposal, prototypes of common software fault patterns are developed and reused to build the dysfunctional model.The third contribution, still undergoing development, is a tooling proposal to partially automated and ease the construction of software component’s fault behavior and propagation through functional to dysfunctional logic translation. It aims to ensure a better consistency of software safety analyses with the software development process constantly with ISO 26262 recommendations
Moy, Yannick. "Automatic modular static safety checking for C programs". Paris 11, 2009. http://www.theses.fr/2009PA112001.
Texto completoIn this PhD thesis, we present automatic and modular solutions to the three main problems that come up when applying deductive verification techniques to C programs, in order to prove the absence of security flaws that exploit memory corruption. These problems are the generation of logical annotations, memory separation and the treatment of unions and casts. Deductive verification relies on the presence of logical annotations in programs. In practice, it is not possible to add all annotations manually. We propose a technique to generate such annotations based on abstract interpretation, weakest precondition calculus and quantifier elimination. When programs contain pointers, deductive verification is precise enough only if memory regions pointed-to are disjoint. We propose a technique to separate memory regions based on a contextual version of Steensgaard's alias analysis, whose correction is guaranteed by generating additional preconditions. When programs contain unions and casts, the usual hypothesis made in deductive verification that fields of structures are separated is not valid anymore. We propose a classification of unions and casts, as well as a combination of typed memory model and byte-level memory model, that validates the usual hypothesis of field separation. We have implemented these techniques in Frama-C and Why platforms. By applying them to the verification of existing libraries for strings, we both managed to find memory safety bugs in the original versions and to check the safety of corrected versions of the same libraries
Libros sobre el tema "Safety logiciel"
Developing safety systems: A guide using Ada. New York: Prentice Hall, 1991.
Buscar texto completoTransport, European Commission Directorate-General, ed. Comfortable: Comfort - advanced benefits for logical VTS equipment. Luxembourg: Office for Official Publications of the European Communities, 1999.
Buscar texto completo1946-, Voges U., ed. Computer safety, reliability and security: 20th international conference, SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001 : proceedings. Berlin: Springer, 2001.
Buscar texto completoThe e-policy handbook: Rules and best practices to safely manage your company's e-mail, blogs, social networking, and other electronic communication tools. 2a ed. New York: American Management Association, 2009.
Buscar texto completoPham, Hoang. System Software Reliability. Springer, 2010.
Buscar texto completoPham, Hoang. System Software Reliability. Springer London, Limited, 2007.
Buscar texto completoSystem Software Reliability (Springer Series in Reliability Engineering). Springer, 2006.
Buscar texto completoAkimkin, Vasily G., ed. Control and prevention of infections associated with health care (HAIs-2020). Central Research Institute for Epidemiology, 2020. http://dx.doi.org/10.36233/978-5-6045286-1-7.
Texto completoLicensing Issues Associated With the Use of Computers in the Nuclear Industry (Nuclear Science and Technology (European Comm Info Serv)). European Communities, 1988.
Buscar texto completoDavim, J. Paulo, Kaushik Kumar y Chikesh Ranjan. Understanding CATIA: A Tutorial Approach. Taylor & Francis Group, 2021.
Buscar texto completoCapítulos de libros sobre el tema "Safety logiciel"
Platzer, André. "Safety & Contracts". En Logical Foundations of Cyber-Physical Systems, 95–136. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63588-0_4.
Texto completoBarthe, Gilles, Juan Manuel Crespo y César Kunz. "Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification". En Logical Foundations of Computer Science, 29–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35722-0_3.
Texto completoSaglietti, Francesca. "Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets". En Computer Safety, Reliability and Security, 319–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49646-7_25.
Texto completoSpeiser, Kilian, Kepeng Hong y Jochen Teizer. "Enhancing the Realism of Virtual Construction Safety Training: Integration of Real-Time Location Systems for Real-World Hazard Simulations". En CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 155–66. Florence: Firenze University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0289-3.15.
Texto completoSpeiser, Kilian, Kepeng Hong y Jochen Teizer. "Enhancing the Realism of Virtual Construction Safety Training: Integration of Real-Time Location Systems for Real-World Hazard Simulations". En CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 155–66. Florence: Firenze University Press, 2023. http://dx.doi.org/10.36253/10.36253/979-12-215-0289-3.15.
Texto completoKvassay, M., E. Zaitseva, J. Kostolny y V. Levashenko. "Reliability analysis of noncoherent systems based on logical differential calculus". En Risk, Reliability and Safety: Innovating Theory and Practice, 1367–74. Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press, 2016. http://dx.doi.org/10.1201/9781315374987-205.
Texto completoClote, Peter. "A safe recursion scheme for exponential time". En Logical Foundations of Computer Science, 44–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63045-7_5.
Texto completoCholvy, Laurence, Robert Demolombe y Andrew Jones. "Reasoning about the safety of information: from logical formalization to operational definition". En Lecture Notes in Computer Science, 488–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58495-1_49.
Texto completoBlicha, Martin, Konstantin Britikov y Natasha Sharygina. "The Golem Horn Solver". En Computer Aided Verification, 209–23. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37703-7_10.
Texto completoCassano, Valentín, Thomas S. E. Maibaum y Silviya Grigorova. "A (Proto) Logical Basis for the Notion of a Structured Argument in a Safety Case". En Formal Methods and Software Engineering, 1–17. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_1.
Texto completoActas de conferencias sobre el tema "Safety logiciel"
Yang, Wen-Chi, Giuseppe Marra, Gavin Rens y Luc De Raedt. "Safe Reinforcement Learning via Probabilistic Logic Shields". En Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/637.
Texto completoFengfeng, Wu, Jia Song, Yang Kai, Zhao Xiongbo y Wu Guirong. "Design of RapidIO logical core based on safety arbitration mechanisms". En Electronics (PrimeAsia). IEEE, 2010. http://dx.doi.org/10.1109/primeasia.2010.5604940.
Texto completo"Safety and Security in Networked Robotic Systems Via Logical Consensus". En International Workshop on “Networked embedded and control system technologies: European and Russian R&D cooperation”. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002278600000000.
Texto completoCreese, Sadie, Michael H. Goldsmith y Adedayo O. Adetoye. "A logical high-level framework for Critical Infrastructure resilience and risk assessment". En 2011 International Workshop on Cyberspace Safety and Security (CSS). IEEE, 2011. http://dx.doi.org/10.1109/css.2011.6058564.
Texto completoKammuller, Florian y Manfred Kerber. "Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling". En 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 2016. http://dx.doi.org/10.1109/spw.2016.47.
Texto completoAyestaran, Iban, Carlos F. Nicolas, Jon Perez y Peter Puschner. "Modeling logical execution time based safety-critical embedded systems in SystemC". En 2014 3rd Mediterranean Conference on Embedded Computing (MECO). IEEE, 2014. http://dx.doi.org/10.1109/meco.2014.6862662.
Texto completoGiunchiglia, Eleonora, Mihaela Catalina Stoian y Thomas Lukasiewicz. "Deep Learning with Logical Constraints". En Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/767.
Texto completoColeman, James R. "A Logical Approach to Designing Safety Test Plans for Space Nuclear Systems". En SPACE TECHNOLOGY AND APPLICATIONS INTERNAT.FORUM-STAIF 2004: Conf.on Thermophys.in Microgravity; Commercial/Civil Next Gen.Space Transp.; 21st Symp.Space Nuclear Power & Propulsion; Human Space Explor.; Space Colonization; New Frontiers & Future Concepts. AIP, 2004. http://dx.doi.org/10.1063/1.1649590.
Texto completoLu, Yanchun, Ting Lei, Yujie Liu, Hongqi Yang y Ning Hu. "Research on the logical relation of safety work items in GJB 900A-2012". En 2023 5th International Conference on System Reliability and Safety Engineering (SRSE). IEEE, 2023. http://dx.doi.org/10.1109/srse59585.2023.10336061.
Texto completoRusso, F. y C. Rindone. "Safety of users in road evacuation: the logical framework approach in evacuation planning". En URBAN TRANSPORT 2008. Southampton, UK: WIT Press, 2008. http://dx.doi.org/10.2495/ut080721.
Texto completoInformes sobre el tema "Safety logiciel"
Zimmerman y Chen. L51769 Limit States and Reliability-Based Pipeline Design. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), junio de 1997. http://dx.doi.org/10.55274/r0010325.
Texto completo