default search action
HASE 1999: Washington, D.C., USA
- 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 17-19 November 1999, Washington, D.C, USA, Proceedings. IEEE Computer Society 1999, ISBN 0-7695-0418-3
Evaluation and Testing
- Ann Q. Gates, Patricia J. Teller:
DynaMICs: An Automated and Independent Software-FaultDetection Approach. 11-19 - Monica Brockmeyer:
Using Modechart Modules for Testing Formal Specifications. 20-26 - Wei-Tek Tsai, Weiguang Shao, Sanjai Rayadurgam, Jinbao Li, Raymond A. Paul:
Assurance-Based Y2K Testing. 27-36
Special Session on UML for High Assurance Systems
- Mario Dal Cin, Gábor Huszerl, Konstantinos Kosmidis:
Quantitative Evaluation of Dependability Critical Systems Based on Guarded Statechart Models. 37-45 - Stefania Gnesi, Diego Latella, Mieke Massink:
Model Checking UML Statechart Diagrams Using JACK. 46-55 - William E. McUmber, Betty H. C. Cheng:
UML-Based Analysis of Embedded Systems Using a Mapping to VHDL. 56-63 - Andrea Bondavalli, Ivan Mura, István Majzik:
Automatic Dependability Analysis for Supporting Design Decisions in UML. 64-74
Experience Reports
- Damien Cailliau, Remy Bellenger:
The CorotInstrument's Software: Towards Intrinsically Reconfigurable Real-Time Embedded Processing Software in Space-Born Instruments. 75-80 - James Kirby Jr., Myla Archer, Constance L. Heitmeyer:
Applying Formal Methods to an Information Security Device: An Experience Report. 81-88 - Li Gong, Satya Dodda:
Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2). 89-96
Fault Analysis
- Ann T. Tai, Savio N. Chau, Leon Alkalai:
COTS-Based Fault Tolerance in Deep Space: Qualitative and Quantitative Analyses of a Bus Network Architecture. 97-104 - Taghi M. Khoshgoftaar, Edward B. Allen:
Predicting Fault-Prone Software Modules in Embedded Systems with Classification Trees. 105-114
Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?
- Raymond A. Paul, Ann T. Tai:
Building High-Assurance Systems Using COTS Components: Whether, Why, When and How? 115 - Savio N. Chau:
Experience of Using COTS Components for Deep Space Missions. 116 - Isaac Levendel:
HASE in Wireless Systems. 117 - Lui Sha:
Using COTS Software in High Assurance Control Applications. 118 - Jeffrey M. Voas:
COTS and High Assurance: An Oxymoron? 119-122
Case Studies
- Dolores R. Wallace, D. Richard Kuhn:
Lessons from 342 Medical Device Failures. 123-131 - Barbara J. Czerny, Mats Per Erik Heimdahl:
Identifying Domain Axioms Using Binary Decision Diagrams. 132-140 - Steve Goddard, Kevin Jeffay:
Analyzing the Real-Time Properties of a U.S. Navy Signal Processing System. 141-150 - Enrico Tronci:
Formally Modeling a Metal Processing Plant and its Closed Loop Specifications. 151-160
Reliable Communications
- I-Ling Yen, Biao Chen, Ing-Ray Chen:
Real-Time Atomic Transaction Processing Using Multi-Invariant Data Structure. 161-168 - Isao Kaji, Yongdong Tan, Kinji Mori:
Autonomous Data Synchronization in Heterogeneous Systems to Assure the Transaction. 169-178 - Haihong Zheng, Sourav Bhattacharya:
Look-Ahead Channel Reservation and Borrowing in Cellular Network System. 179-188
Frameworks, Systems, Tools
- Jennifer Ren, Michel Cukier, Paul Rubel, William H. Sanders, David E. Bakken, David A. Karr:
Building Dependable Distributed Applications Using AQUA. 189-196 - Alec Yasinsac, William A. Wulf:
A Framework for a Cryptographic Protocol Evaluation Workbench. 197-206 - Carol L. Hoover, Jeffery P. Hansen, Philip Koopman, Sandeep Tamboli:
The Amaranth Framework: Probabilistic, Utility-Based Quality of Service Management for High-Assurance Computing. 207-216 - Michael W. Whalen, Mats Per Erik Heimdahl:
On the Requirements of High-Integrity Code Generation. 217-226
What are the Most Critical Challenges to Integrating High Assurance Systems
- Herbert Hecht:
What are the Most Critical Challenges to Integrating High Assurance Systems?. 227-230
Metrics and Modeling
- Diego Del Gobbo, Bojan Cukic, Marcello R. Napolitano, Steve M. Easterbrook:
Fault Detectability Analysis for Requirements Validation of Fault Tolerant Systems. 231-238 - Paul Ammann, Paul E. Black:
A Specification-Based Coverage Metric to Evaluate Test Sets. 239-248 - Tom Chen, Anneliese von Mayrhauser, Amjad Hajjar, Charles Anderson, Mehmet Sahinoglu:
How Much Testing is Enough? Applying Stopping Rules to Behavioral Model Testing. 249-256 - Victor L. Winter:
A Synchronous Paradigm for Modeling Stable Reactive Systems. 257-268
Should High Assurance Systems Use Software? Risk vs. Functionality
- Victor L. Winter, Raymond Berg:
Software Systems: Consequence versus Functionality. 269-270 - John M. Covan:
Why Modern Systems Should Minimize the Use of Safety Critical Software. 271 - Larry J. Dalton:
An "in the limit" View. 272 - Ben L. Di Vito:
Software Can Be Entrusted with High Consequence Functionality. 273 - Jeffrey M. Voas:
A World Without Risks: Let Me Out! 274-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.