Determining The Black-Box Component's Failure.
Many papers propose different approaches to evaluate the reliability of black-box components based on component's success. This paper determines or evaluates component's reliability based on its failure. Since even reliable components might fail, we argue that component's acquirer sh...
| Main Authors: | Hilal, Ibrahim, Jantan, Aman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9405/ http://eprints.usm.my/9405/1/Determining_The_Black-Box_Component%27s_Failure.pdf |
Similar Items
Dependencies Management in Dynamically Updateable Component-Based System.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Protocol Based Interaction in Component-Based Software Systems.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
Toward Pure Componentware
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
A Framework For Dynamic Updating In Component-based
Software Systems
by: Mohammed Alhazbi , Saleh
Published: (2009)
by: Mohammed Alhazbi , Saleh
Published: (2009)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Adapting And Hybrid Ising Harmony Search With Metaheuristic Components For University Course Timetabling
by: Al-Betar, Mohammed Azmi
Published: (2010)
by: Al-Betar, Mohammed Azmi
Published: (2010)
Enhanced Cuckoo Search Algorithm With Metaheuristic Components For Extracting The Maxima Of The Orientation Distribution Function
by: Shehab, Mohammad Mohammad Said
Published: (2018)
by: Shehab, Mohammad Mohammad Said
Published: (2018)
Extracting Single Trial Visual Evoked Potentials using Selective Eigen-Rate Principal Components
by: Andrews, , Samraj, et al.
Published: (2005)
by: Andrews, , Samraj, et al.
Published: (2005)
Extracting single trial visual evoked potentials using selective eigen-rate principal components
by: Andrews, S, S, et al.
Published: (2005)
by: Andrews, S, S, et al.
Published: (2005)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009)
by: Jantan, Azrul Hazri
Published: (2009)
A Neural Network-Based Application to Identify Cubic Structures in Multi Component Crystalline Materials Using X-Ray Diffraction Data.
by: Syukur, Mohammad, et al.
Published: (2007)
by: Syukur, Mohammad, et al.
Published: (2007)
Design Processes For Web-Based Hypermedia Engineering.
by: Jantan, Azrul Hazri, et al.
Published: (2007)
by: Jantan, Azrul Hazri, et al.
Published: (2007)
Systematic Design Processes Of Hypermedia Engineering: A Case Study Of Splea-Web,
by: Jantan, Azrul Hazri, et al.
Published: (2007)
by: Jantan, Azrul Hazri, et al.
Published: (2007)
Determine The Temperature And Occupant Range For Development Of ICONS.
by: Lau, Teng Lye
Published: (2009)
by: Lau, Teng Lye
Published: (2009)
Effect of soft carbon black on tribology of deproteinised and polyisoprene rubbers
by: ELTAYEB, N, et al.
Published: (2007)
by: ELTAYEB, N, et al.
Published: (2007)
Examining the determinants of users' acceptance of IT in the Yemeni public sector: pilot study
by: Wahdain, Esmat Abdulmajeed, et al.
Published: (2015)
by: Wahdain, Esmat Abdulmajeed, et al.
Published: (2015)
Automatic fingerprint center point determination by using modified directional field and morphology
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
Novel Direct and Self-Regulating Approaches to Determine Optimum Growing Multi-Experts Network Structure
by: Loo, C.K., et al.
Published: (2004)
by: Loo, C.K., et al.
Published: (2004)
Deformation Parameter Estimation on IC Failure Locations in Liquid Crystal Images
by: S, Ranjit, et al.
Published: (2008)
by: S, Ranjit, et al.
Published: (2008)
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Gpu Based Fast Phylogenetic Tree
Construction Algorithm With Reduce
Dataset
by: Ibrahim, Najihah
Published: (2016)
by: Ibrahim, Najihah
Published: (2016)
Enhanced Bio-Inspired Algorithm With Pedestrian Simulation
For Spatial Layout Design
by: Ibrahim, Najihah
Published: (2023)
by: Ibrahim, Najihah
Published: (2023)
Two-factor face authentication: Topographic Independent Component Analysis (TICA) and Multispace Random Projection (MRP)
by: Lee, Gin Chong, et al.
Published: (2009)
by: Lee, Gin Chong, et al.
Published: (2009)
Game Theoretic Spatial Evacuation Simulation Models To Predict Crowd Disaster
by: Ibrahim, Azhar Mohd
Published: (2018)
by: Ibrahim, Azhar Mohd
Published: (2018)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
An analysis of leader's bases of power and knowledge management practices: A conceptual approachn
by: Jayasingam, Sharmila, et al.
Published: (2007)
by: Jayasingam, Sharmila, et al.
Published: (2007)
Precise Fingerprint Enrolment through Projection Incorporated Subspace Based on Principal Component Analysis (PCA)
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
VLSI implementation of Inverse Discrete Wavelet Transform for JPEG 2000
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
Enhancing Groupware For Knowledge Management.
by: Cheah, Yu-N
Published: (2007)
by: Cheah, Yu-N
Published: (2007)
Evaluation Of Existing Software For Simulating Of Crowd At Masjid Al-Haram,
by: Sarmady, S., et al.
Published: (2007)
by: Sarmady, S., et al.
Published: (2007)
Similar Items
-
Dependencies Management in Dynamically Updateable Component-Based System.
by: Alhazbi, Saleh, et al.
Published: (2007) -
Protocol Based Interaction in Component-Based Software Systems.
by: Alhazbi, Saleh, et al.
Published: (2007) -
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024) -
Toward Pure Componentware
by: Alhazbi, Saleh, et al.
Published: (2007) -
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.