LEADER 05568nam 22007575 450 001 996418294903316 005 20230330025830.0 010 $a3-030-65955-0 024 7 $a10.1007/978-3-030-65955-4 035 $a(CKB)4100000011665417 035 $a(DE-He213)978-3-030-65955-4 035 $a(MiAaPQ)EBC6434462 035 $a(PPN)252514807 035 $a(EXLCZ)994100000011665417 100 $a20201219d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aVerification and Evaluation of Computer and Communication Systems$b[electronic resource] $e14th International Conference, VECoS 2020, Xi'an, China, October 26?27, 2020, Proceedings /$fedited by Belgacem Ben Hedia, Yu-Fang Chen, Gaiyun Liu, Zhenhua Yu 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XII, 281 p. 107 illus., 66 illus. in color.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v12519 311 $a3-030-65954-2 327 $aPetri-Net, Simulation, and Scheduling -- An Approach for Supervisor Reduction of Discrete-event Systems -- Multi-robot path planning using Petri nets -- Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets With Novel Colored Capacity -- The Modeling and Simulation on SRM Drive System Using Variable-proportional-desaturation PI Regulator -- Vehicle Scheduling Problem in Terminals: a Review -- Coverage Analysis of Net Inscriptions in Coloured Petri Net Models -- ON/OFF control trajectory computation for steady state reaching in batches Petri nets -- Towards efficient partial order techniques for time Petri nets -- Towards a Generic Framework for Formal Verification and Performance Analysis of Real-time Scheduling Algorithms -- Accurate Strategy for Mixed Criticality Scheduling -- Formal Modeling and Verification, Testing -- Model-based Design of Resilient Systems Using Quantitative Risk Assessment -- An Evaluation of Estimation Techniques for Probabilistic Verification -- Formal Verification of a Certified Policy Language -- Multi-path Coverage of all Final States for Model-Based Testing Theory using Spark In-memory Design -- Artificial Intelligence and Machine Learning -- A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection -- Deep Reinforcement Learning for Solving AGVs Routing Problem -- Research on Vehicle Detection based on Visual Convolution Network Optimization -- A Self-Adaptive Multi-Hierarchical Modular Neural Network for Complex Problems -- Multi-Scale Risk Assessment Model of Network Security Based on LSTM -- Weighted lightweight image retrieval method based on linear regression. 330 $aThis book constitutes the proceedings of the 14th International Conference on Veri?cation and Evaluation of Computer and Communication Systems, VECoS 2020, which was supposed to be held in Xi?an, China, in October 2020, but was held virtually instead. The 19 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 60 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of veri?cation, control, performance, and dependability evaluation in order to discuss state of the art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal veri?cation and evaluation approaches, methods and techniques, and especially those developed for concurrent and distributed hardware/software systems. The papers are organized in the following topical sections: petri-net, simulation, and scheduling; formal modeling and verification, testing; and artificial intelligence and machine learning. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v12519 606 $aComputer engineering 606 $aComputer networks 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aSoftware engineering 606 $aMachine theory 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer Engineering and Networks 606 $aDesign and Analysis of Algorithms 606 $aMathematics of Computing 606 $aSoftware Engineering 606 $aFormal Languages and Automata Theory 606 $aData Structures and Information Theory 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aSoftware engineering. 615 0$aMachine theory. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 14$aComputer Engineering and Networks. 615 24$aDesign and Analysis of Algorithms. 615 24$aMathematics of Computing. 615 24$aSoftware Engineering. 615 24$aFormal Languages and Automata Theory. 615 24$aData Structures and Information Theory. 676 $a001.64404 702 $aBen Hedia$b Belgacem 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996418294903316 996 $aVerification and Evaluation of Computer and Communication Systems$92809930 997 $aUNISA