In [13] the authors developed a logical system based on the definition of a new non-classical connective ⊗ originally capturing the notion of reparative obligation. The operator...
One of the most popular methods of knowledge representation are the fuzzy rules. One of the ways of representation of fuzzy rules is the functional representation. From over eight ...
—Archival data storage systems contain data that must be preserved over long periods of time but which are often unlikely to be accessed during their lifetime. The best strategy ...
Thomas J. E. Schwarz, Ahmed Amer, Jehan-Fran&ccedi...
Abstract—We present a disk array organization that can survive three simultaneous disk failures while only using exclusiveor operations to calculate the parities that generate th...
Thomas J. E. Schwarz, Darrell D. E. Long, Jehan-Fr...
—Safety cases need significant amount of time and effort to produce. The required amount of time and effort can be dramatically increased due to system changes as safety cases s...
Abstract—As computing systems become increasingly pervasive, the number of applications that can benefit from or require localization capabilities continuously increases. In ind...
Safety-critical systems usually need to be compliant with a domainspecific safety standard, which in turn requires an explained and wellfounded body of evidence to show that the ...
Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans H...
—The applicability of wireless sensor networks (WSNs) to data-intensive structural health monitoring (SHM) is being heavily studied recently by the computer science domain. The a...
Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xia...
Abstract—In this paper, we discuss several scheduling algorithms to execute independent tasks with voltage overscaling. Given a frequency to execute the tasks, operating at a vol...
Extreme weather events such as ice storms cause significant damage to life and property. Accurately forecasting ice storms sufficiently in advance to offset their impacts is very...