418 resultados para Evaluation Dewey Library Joaquín García Monge


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the past years, the paradigm of component-based software engineering has been established in the construction of complex mission-critical systems. Due to this trend, there is a practical need for techniques that evaluate critical properties (such as safety, reliability, availability or performance) of these systems. In this paper, we review several high-level techniques for the evaluation of safety properties for component-based systems and we propose a new evaluation model (State Event Fault Trees) that extends safety analysis towards a lower abstraction level. This model possesses a state-event semantics and strong encapsulation, which is especially useful for the evaluation of component-based software systems. Finally, we compare the techniques and give suggestions for their combined usage

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In order to understand the metallurgical influences on Rock Bolt SCC, an evaluation has been carried out on carbon, carbon + manganese, alloy and microalloyed steels subjected to the conditions previously identified as producing laboratory SCC similar to that observed for rock bolts in service. The approach has been to use the LIST test (Linearly increasing stress test) for samples exposed to a dilute pH 2.1-sulphate solution, as per our prior studies. SCC was evaluated from the decrease in tensile strength, ductility and fractography as revealed by SEM observation. A range of SCC susceptibilities was observed. Ten of these steels showed SCC, however there was no SCC for one carbon, two carbon + manganese and two alloy steels.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.