標題: Titlebook: Computer Safety, Reliability and Security; 17th International C Wolfgang Ehrenberger Conference proceedings 1998 Springer-Verlag Berlin Hei [打印本頁] 作者: ISSUE 時間: 2025-3-21 17:17
書目名稱Computer Safety, Reliability and Security影響因子(影響力)
書目名稱Computer Safety, Reliability and Security影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability and Security被引頻次
書目名稱Computer Safety, Reliability and Security被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability and Security年度引用
書目名稱Computer Safety, Reliability and Security年度引用學(xué)科排名
書目名稱Computer Safety, Reliability and Security讀者反饋
書目名稱Computer Safety, Reliability and Security讀者反饋學(xué)科排名
作者: 牲畜欄 時間: 2025-3-21 22:01
Information Sources on and Around S-Plus, by designing the certifying tools according to a logging-and-checking architecture. We describe the on-line and on-line logging-and-checking methodology, its application in the frame of an industrial project, and the ongoing logging-and-checking redesign of a state-of-the-art prover which we intend to use in future applications.作者: Phagocytes 時間: 2025-3-22 00:37 作者: 說笑 時間: 2025-3-22 04:40
A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools by designing the certifying tools according to a logging-and-checking architecture. We describe the on-line and on-line logging-and-checking methodology, its application in the frame of an industrial project, and the ongoing logging-and-checking redesign of a state-of-the-art prover which we intend to use in future applications.作者: Senescent 時間: 2025-3-22 11:42 作者: 搏斗 時間: 2025-3-22 13:30
Testing and Documenting Your Model,f Java programs. In this paper, the Java security scheme is examined and current implementations are evaluated on the basis of their efficiency and flexibility. Finally, proposed enhancements and upcoming extensions to the security model are described.作者: 搏斗 時間: 2025-3-22 18:45
Information Sources on and Around S-Plus,opment process. This paper defines a secure software development process to reduce the risk of manipulation and enhance the trustworthiness of critical software produced by renowned manufaturers according to high quality standards. It also explained how this process may be implemented cost efficiently.作者: 代替 時間: 2025-3-23 00:50
Information Sources on and Around S-Plus,rces of weakness recommendations are derived to improve the C code also in view of software modification and maintenance, which is important because of the long life-time of I&C systems in nuclear power plants.作者: 開花期女 時間: 2025-3-23 03:41
An Agenda for Specifying Software Components with Complex Data Modelsach not only provides detailed guidance to specifiers, but it is also part of a more general engineering concept for engineering safety-critical embedded systems that was developed in the ESPRESS project, a joint project of academia and industry.作者: 摘要 時間: 2025-3-23 06:40 作者: 不合 時間: 2025-3-23 11:16 作者: 幼稚 時間: 2025-3-23 14:13 作者: META 時間: 2025-3-23 20:05
Conference proceedings 1998the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives de作者: MULTI 時間: 2025-3-24 01:50
0302-9743 that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the inst作者: 小溪 時間: 2025-3-24 04:37 作者: BALK 時間: 2025-3-24 08:54
Logical-and Structural-Based Calculations,By this approach we will show some formal aspects of our real-time task model and also how this result is used to ensure that the timeliness property and the sizing can be achieved on a safety critical real-time study case.作者: debouch 時間: 2025-3-24 12:35 作者: Gudgeon 時間: 2025-3-24 18:32 作者: 泥沼 時間: 2025-3-24 22:27
Information Sources on and Around S-Plus,ng life time, long maintainability intervals, low costs, fulfillment of standards). This paper addresses a new automotive architecture approach - based on a time triggered architecture - and a framework for the application design of future by-wire systems in vehicles.作者: 公共汽車 時間: 2025-3-25 00:21 作者: Chandelier 時間: 2025-3-25 06:39
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time SystemsBy this approach we will show some formal aspects of our real-time task model and also how this result is used to ensure that the timeliness property and the sizing can be achieved on a safety critical real-time study case.作者: Range-Of-Motion 時間: 2025-3-25 10:54 作者: Communal 時間: 2025-3-25 11:46
Impact of Object-Oriented Software Engineering Applied to the Development of Security Systemsdel based on object-oriented methods, schedulability analysis and validation of software requirements. The application of these methods to a remote receiver unit DEZ-9000 demonstrated improvements in software reliability, significant reduction of time-to-market and development and maintenance efforts.作者: BLOT 時間: 2025-3-25 17:18
Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architectureng life time, long maintainability intervals, low costs, fulfillment of standards). This paper addresses a new automotive architecture approach - based on a time triggered architecture - and a framework for the application design of future by-wire systems in vehicles.作者: Organonitrile 時間: 2025-3-25 21:14
Safety in Production Cell Components: An Approach Combining Formal Real Time Specifications and Pattof a belt component in a production cell which used the HyTech notation. Several specification patterns have been identified; they regard global structure, the use of variable restrictions, of synchronization labels, and the use of locations.作者: Parallel 時間: 2025-3-26 02:46 作者: CRACY 時間: 2025-3-26 07:52
Operator Errors and Their Causes to blame for it. The normative model is meant to serve as a basis for an analysis of operator errors by means of psychological experiments, and the formulation of guidelines for the design of man-machine communication and user interfaces.作者: 哺乳動物 時間: 2025-3-26 10:07
“Profit by Safety” or Quackery in Biomedical Information Technology?ern medicine. Legislation and government actions are not sufficient to make drugs, medical devices and medical procedures adequately safe. Lessons from device failure constitute the challenge to users and creators of dependable systems to combine forces and make things better, or keep the quack alive.作者: MITE 時間: 2025-3-26 15:20
Towards Automated Proof of Fail-Safe Behaviorth FRA. While formal verification focuses on the functional aspects, in particular safety functions, the fault tree analysis with FRA focuses on the system integrity. FRA significantly reduces the effort for the generation of fault trees. This paper describes Formal Risk Analysis and its application for the proof of fail-safe behavior.作者: 矛盾 時間: 2025-3-26 18:48 作者: flex336 時間: 2025-3-26 23:37 作者: 歌劇等 時間: 2025-3-27 02:23 作者: Heresy 時間: 2025-3-27 06:38
The Basics of Financial Modeling to blame for it. The normative model is meant to serve as a basis for an analysis of operator errors by means of psychological experiments, and the formulation of guidelines for the design of man-machine communication and user interfaces.作者: Keratin 時間: 2025-3-27 10:29 作者: Chipmunk 時間: 2025-3-27 15:40 作者: Encephalitis 時間: 2025-3-27 21:02 作者: achlorhydria 時間: 2025-3-28 00:30
Information Sources on and Around S-Plus,the selected programming paradigms to meet the requirements of the individual safety integrity levels and, thus, the trustworthiness of the corresponding results. The programming methods cause/effect tables and function block diagrams on the basis of verified libraries assigned to the two upper safe作者: Graduated 時間: 2025-3-28 03:33 作者: 小爭吵 時間: 2025-3-28 08:56 作者: labile 時間: 2025-3-28 12:51
0302-9743 ftware and production process differ between standard applications and safety related ones: In the safety case it is normally not only the manufacturers and the customers that are involved, but978-3-540-65110-9978-3-540-49646-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 接合 時間: 2025-3-28 16:16 作者: Rodent 時間: 2025-3-28 21:02 作者: 卡死偷電 時間: 2025-3-29 01:26 作者: 發(fā)生 時間: 2025-3-29 06:11
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systemsand its associated techniques to model both real-time tasks and to ensure determinism and dependability concerns when tasks are executed in parallel. By this approach we will show some formal aspects of our real-time task model and also how this result is used to ensure that the timeliness property 作者: Reverie 時間: 2025-3-29 11:16
Linking Hazard Analysis to Formal Specification and Design in Bties which a software controller for the system must satisfy? In addition, what evidential value for the safety of a system are proofs of correctness of a formal specification of its software components? We will examine these issues in the context of a specification and development technique for the作者: 星星 時間: 2025-3-29 11:36 作者: 悶熱 時間: 2025-3-29 16:28
Operator Errors and Their Causesf operator behaviour will be based on the . By this the methods of technical risk assessment, economic decision theory and psychology can be utilised in the assessment of operator behaviour. This view on operator errors is basically a technical one. The notion of operator error does not imply who is作者: Crater 時間: 2025-3-29 21:12 作者: grotto 時間: 2025-3-30 03:40
Towards Secure Downloadable Executable Content: The JAVA Paradigmcation programmer, the most important being that a program may be executed remotely, without any modification, on almost any computer regardless of hardware configuration and operating system differences. However, this advantage raises a serious concern: security. When one downloads and executes cod作者: sphincter 時間: 2025-3-30 04:32 作者: CUMB 時間: 2025-3-30 09:42
Impact of Object-Oriented Software Engineering Applied to the Development of Security Systemsn addition to the classical requirements such as concurrency, schedulability, high reliability and safety. This paper proposes a system development model based on object-oriented methods, schedulability analysis and validation of software requirements. The application of these methods to a remote re作者: foppish 時間: 2025-3-30 12:35
“Profit by Safety” or Quackery in Biomedical Information Technology?ajor hospital. The liability due to unsafe medical equipment and implants not only represents the application risks for patients, but also viability threats to health care providers and manufacturers of medical devices. Safety and credibility of equipment contribute largely to the credibility of mod作者: GRAZE 時間: 2025-3-30 16:54 作者: GIDDY 時間: 2025-3-30 23:25 作者: Archipelago 時間: 2025-3-31 01:08 作者: Irritate 時間: 2025-3-31 05:08 作者: deforestation 時間: 2025-3-31 11:57
A Structured Approach to the Formal Certification of Safety of Computer Aided Development Toolsunterparts. The correctness of the translation is critical to the safety of the resulting systems. However, using non failure-safe components to implement translators is desirable because of the extremely high cost of certified components. In order to ensure the correct behavior of development tools作者: 存心 時間: 2025-3-31 15:53 作者: 綁架 時間: 2025-3-31 21:27 作者: 慢跑鞋 時間: 2025-4-1 00:57
Financial Modeling Best Practices,.The main contributions of the reported work are: the introduction of a notation for modelling entities of the physical environment and controller, based on expressing state transition models as constraints; and providing procedures for the analysis of these models by resolution of a series of const作者: Armada 時間: 2025-4-1 03:21 作者: resistant 時間: 2025-4-1 09:36 作者: 極小量 時間: 2025-4-1 12:45
Logical-and Structural-Based Calculations,and its associated techniques to model both real-time tasks and to ensure determinism and dependability concerns when tasks are executed in parallel. By this approach we will show some formal aspects of our real-time task model and also how this result is used to ensure that the timeliness property 作者: 擁護者 時間: 2025-4-1 17:22
The Basics of Financial Modelingties which a software controller for the system must satisfy? In addition, what evidential value for the safety of a system are proofs of correctness of a formal specification of its software components? We will examine these issues in the context of a specification and development technique for the