default search action
24th SAFECOMP 2005: Fredrikstad, Norway
- Rune Winther, Bjørn Axel Gran, Gustav Dahll:
Computer Safety, Reliability, and Security, 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005, Proceedings. Lecture Notes in Computer Science 3688, Springer 2005, ISBN 3-540-29200-4 - Jose Antonio Fonseca, Jorge Rady de Almeida Jr.:
CMMI RAMS Extension Based on CENELEC Railway Standard. 1-12 - Robert Martinez, Torgeir Enkerud:
The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems. 13-23 - Nawal Addouche, Christian Antoine, Jacky Montmain:
Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems. 24-36 - Martin Hall-May, Tim Kelly:
Defining and Decomposing Safety Policy for Systems of Systems. 37-51 - George Bearfield, William Marsh:
Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment. 52-66 - Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha:
Control and Data Flow Testing on Function Block Diagrams. 67-80 - Wolfgang Herzner, Stephan Ramberger, Thomas Länger, Christian Reumann, Thomas Gruber, Christian Sejkora:
Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Software. 81-93 - Edoardo Campagnano, Ester Ciancamerla, Michele Minichino, Enrico Tronci:
Automatic Analysis of a Safety Critical Tele Control System. 94-107 - Brahim Hamid, Mohamed Mosbah:
A Formal Model for Fault-Tolerance in Distributed Systems. 108-121 - Anjali Joshi, Mats Per Erik Heimdahl:
Model-Based Safety Analysis of Simulink Models Using SCADE Design Verifier. 122-135 - Zeshan Kurd, Tim P. Kelly:
Using Safety Critical Artificial Neural Networks in Gas Turbine Aero-Engine Control. 136-150 - Meine van der Meulen, Lorenzo Strigini, Miguel A. Revilla:
On the Effectiveness of Run-Time Checks. 151-164 - Ruben Alexandersson, D. Krishna Chaitanya, Peter Öhman, Yasir Siraj:
A Technique for Fault Tolerance Assessment of COTS Based Systems. 165-178 - Monica Kristiansen:
Finding Upper Bounds for Software Failure Probabilities - Experiments and Results. 179-193 - Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra, Konstantinos Tourlas:
Justification of Smart Sensors for Nuclear Applications. 194-207 - Massimo Felici:
Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain. 208-221 - Tage Stabell-Kulø, Simone Lupetti:
Public-Key Cryptography and Availability. 222-232 - Lei Wang, Mingde Zhao, Zengwei Zheng, Zhaohui Wu:
End-To-End Worst-Case Response Time Analysis for Hard Real-Time Distributed Systems. 233-245 - Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea:
Safety Interfaces for Component-Based Systems. 246-260 - Martin Skambraks:
A Safety-Related PES for Task-Oriented Real-Time Execution Without Asynchronous Interrupts. 261-274 - Jan Henry Nyström, Philip W. Trinder, David J. King:
Are High-Level Languages Suitable for Robust Telecoms Software?. 275-288 - Ola Løkberg, Øystein Skogstad:
Functional Apportioning of Safety Requirements on Railway Signalling Systems. 289-302 - Krzysztof Sacha:
Automatic Code Generation for PLC Controllers. 303-316 - Terje Sivertsen, Rune Fredriksen, Atoosa P.-J. Thunem, Jan-Erik Holmberg, Janne Valkonen, Olli Ventä, Jan-Ove Andersson:
The TACO Approach for Traceability and Communication of Requirements. 317-329 - Bengt Ljungquist, Thomas Thelin:
An IEC 62061 Compliant Safety System Design Method for Machinery. 330-343 - Tom Gilb:
Design Evaluation: Estimating Multiple Critical Performance and Cost Impacts of Designs. 344-356 - Qiang Yan, Huaying Shu:
The Application of an Object-Oriented Method in Information System Security Evaluation. 357-367 - Jose J. Gonzalez:
Towards a Cyber Security Reporting System - A Quality Improvement Process. 368-380 - Atoosa P.-J. Thunem:
Security Research from a Multi-disciplinary and Multi-sectoral Perspective. 381-389 - Denis Hatebur, Maritta Heisel:
Problem Frames and Architectures for Security Problems. 390-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.