標題: Titlebook: Computer Safety, Reliability and Security; 20th International C Udo Voges Conference proceedings 2001 Springer-Verlag Berlin Heidelberg 200 [打印本頁] 作者: estrange 時間: 2025-3-21 17:35
書目名稱Computer Safety, Reliability and Security影響因子(影響力)
書目名稱Computer Safety, Reliability and Security影響因子(影響力)學科排名
書目名稱Computer Safety, Reliability and Security網絡公開度
書目名稱Computer Safety, Reliability and Security網絡公開度學科排名
書目名稱Computer Safety, Reliability and Security被引頻次
書目名稱Computer Safety, Reliability and Security被引頻次學科排名
書目名稱Computer Safety, Reliability and Security年度引用
書目名稱Computer Safety, Reliability and Security年度引用學科排名
書目名稱Computer Safety, Reliability and Security讀者反饋
書目名稱Computer Safety, Reliability and Security讀者反饋學科排名
作者: 嚴重傷害 時間: 2025-3-21 23:08 作者: 萬花筒 時間: 2025-3-22 01:18 作者: 無禮回復 時間: 2025-3-22 07:04
plausible mental models. Using mechanized formal methods, we can then calculate divergences between the actual system behavior and that suggested by the mental model. These divergences indicate possible automation surprises and other human factors problems and suggest places where the design should be improved.作者: 畸形 時間: 2025-3-22 08:48 作者: Inflated 時間: 2025-3-22 13:41 作者: Inflated 時間: 2025-3-22 17:29 作者: Ambulatory 時間: 2025-3-22 21:42 作者: orthopedist 時間: 2025-3-23 03:52
Information Sources on and Around S-Plus, Unfortunately, the emphasis placed on security issues when developing safety critical systems is to often inadequate, possibly due to the lack of “;safety-compliant” security methods. Having had the opportunity to adapt the HAZOP-principle to the security context, a HAZOP was established which is w作者: chondromalacia 時間: 2025-3-23 08:20 作者: Sinus-Rhythm 時間: 2025-3-23 11:31 作者: gonioscopy 時間: 2025-3-23 16:28
terature are reviewed and automated analysis techniques are proposed. The techniques based on OCL expressions and graph transformations are detailed and their limitations are discussed. To speed up the checker methods, a reduced form for UML statecharts is introduced. Using this form, the correctnes作者: Intact 時間: 2025-3-23 18:03
al parts of the design process and considered on an equal basis at the earliest stage possible in the development. A practical example is given to illustrate this viewpoint. The need to expand and complement the customary set of notions and methodologies is motivated.作者: Instrumental 時間: 2025-3-23 23:40 作者: 楓樹 時間: 2025-3-24 03:01
plausible mental models. Using mechanized formal methods, we can then calculate divergences between the actual system behavior and that suggested by the mental model. These divergences indicate possible automation surprises and other human factors problems and suggest places where the design should 作者: 刪減 時間: 2025-3-24 10:34 作者: 闡明 時間: 2025-3-24 13:33
s that support the train driver in performing his activity and analyses the role of the interactive systems, such as computer based equipments, to understand possible human-machine interaction problems. The application of the methodology has shown that a strong involvement of the users of the intera作者: goodwill 時間: 2025-3-24 17:17
commercial off-the-shelf (COTS) components in safety-related systems, and a usual feature of COTS products is a lack of such evidence. There is therefore a debate as to the appropriateness of COTS products in such applications. This paper discusses not only evidence, but also risk, the other issue a作者: 不容置疑 時間: 2025-3-24 22:40
ability analysis of computer systems early in the design process. The proposed framework combines functional and behavioral modeling, fault injection and simulation. Starting from the RDD-100 model built by the system designers, two techniques are discussed for the mutation of this model to analyze 作者: 細微差別 時間: 2025-3-25 00:18 作者: 我們的面粉 時間: 2025-3-25 04:15 作者: ingestion 時間: 2025-3-25 08:39 作者: AV-node 時間: 2025-3-25 15:31 作者: Vertebra 時間: 2025-3-25 17:42 作者: Ligneous 時間: 2025-3-25 23:47
Udo VogesIncludes supplementary material: 作者: 無王時期, 時間: 2025-3-26 01:39 作者: 啟發(fā) 時間: 2025-3-26 05:29
A brief description of the Computer Based Interlocking system that is to be introduced in Norway is given and the requirements for presenting a safety case are described. Problems in actually fulfilling those requirements and lessons to be learnt are explained.作者: 可耕種 時間: 2025-3-26 12:05 作者: 滴注 時間: 2025-3-26 12:47 作者: invade 時間: 2025-3-26 20:13 作者: FLEET 時間: 2025-3-26 21:59 作者: Cytokines 時間: 2025-3-27 03:47 作者: 內行 時間: 2025-3-27 07:07
Modeling the Human in Human Factorsplausible mental models. Using mechanized formal methods, we can then calculate divergences between the actual system behavior and that suggested by the mental model. These divergences indicate possible automation surprises and other human factors problems and suggest places where the design should be improved.作者: Estrogen 時間: 2025-3-27 10:03
Formal Support for Fault Modelling and Analysisour approach (formal specification, systematic fault identification, fault injection experiments and follow-up) and gives some results related to the application of this method to the industrial case study, a railway signalling system that is presently under development.作者: DIKE 時間: 2025-3-27 13:58 作者: athlete’s-foot 時間: 2025-3-27 18:34
Conference proceedings 2001m 13 countries responded to the Call for Papers, and 10 countries were represented in the final program. The proceedings include 20 papers plus 3 invited papers, covering the areas Reliability Assessment and Security, Safety Case and Safety Analysis, Testing, Formal Methods, Control Systems, and thi作者: 大都市 時間: 2025-3-28 00:46
Information Sources on and Around S-Plus, the more long-term activity by the Halden Reactor Project on the use of BBNs as support for safety assessment of programmable systems. In this report it is discussed how the two approaches can be merged together into one Bayesian Network, and the problems with merging are pinpointed.作者: 不利 時間: 2025-3-28 02:38 作者: 擁護 時間: 2025-3-28 08:46 作者: 啪心兒跳動 時間: 2025-3-28 13:03 作者: auxiliary 時間: 2025-3-28 18:09
Information Sources on and Around S-Plus,attributes, it is quite possible to handle security issues as part of the traditional hazard analysis. In addition, while presenting the modified HAZOP-method, its use on safety related systems will be demonstrated.作者: 收到 時間: 2025-3-28 22:37 作者: 小畫像 時間: 2025-3-29 00:04 作者: 真繁榮 時間: 2025-3-29 05:47 作者: 止痛藥 時間: 2025-3-29 10:17
Designing Safety into Medical Decisions and Clinical Processesafety cases for such applications from the work and experience of the software safety community. Some distinctive challenges also arise in medicine, and some novel safety management techniques to address them are being developed.作者: 類似思想 時間: 2025-3-29 13:01 作者: 河流 時間: 2025-3-29 18:29 作者: 不理會 時間: 2025-3-29 21:29
The Effectiveness of Statistical Testing when Applied to Logic Systemstected a problem, which was missed by all other testing techniques. This together with its potential for reliability quantification illustrates its importance for system validation as part of a risk—based safety—case.作者: 無效 時間: 2025-3-30 03:29 作者: 舊石器 時間: 2025-3-30 06:54
perating, parallel architecture machine with two superscalar processors..The algorithms are studied for their fault tolerance in the presence of an elementary fault detection method based on command duplication and exploiting the parallel architecture.作者: 極小量 時間: 2025-3-30 09:05 作者: minaret 時間: 2025-3-30 12:29
A Bayesian Belief Network for Reliability Assessment the more long-term activity by the Halden Reactor Project on the use of BBNs as support for safety assessment of programmable systems. In this report it is discussed how the two approaches can be merged together into one Bayesian Network, and the problems with merging are pinpointed.作者: incite 時間: 2025-3-30 16:44 作者: 季雨 時間: 2025-3-30 21:18
The COTS Debate in Perspectivet the heart of the COTS debate. It also addresses the other side of the debate: a challenge to the rigorous requirements of the standards. Finally, the paper proposes a convention on the evidence that should be provided to support claims for the safety of COTS items.作者: agenda 時間: 2025-3-31 02:32
Conference proceedings 2001es of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and security (applied to safety in terms of inte作者: 音的強弱 時間: 2025-3-31 08:57
0302-9743 P since its inauguration in 1979. This series of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and s作者: 凹處 時間: 2025-3-31 09:53
nd their limitations are discussed. To speed up the checker methods, a reduced form for UML statecharts is introduced. Using this form, the correctness and completeness of some checker methods can be proven. An example illustrates the application of the tools developed so far.作者: 變化無常 時間: 2025-3-31 13:35 作者: 詞匯記憶方法 時間: 2025-3-31 18:50
plicable technique is presented, to find out critical and problematic humanmachine interactions during the operation of a system. The technique is based on a state-interaction matrix, carefully filled out and afterwards automatically evaluated.作者: 出處 時間: 2025-3-31 23:45 作者: 沉著 時間: 2025-4-1 05:10 作者: Offstage 時間: 2025-4-1 10:04 作者: GEAR 時間: 2025-4-1 11:23
Analyzing Human-Machine Interactions in Safety-Critical Systems: A Basic Applicable Approachplicable technique is presented, to find out critical and problematic humanmachine interactions during the operation of a system. The technique is based on a state-interaction matrix, carefully filled out and afterwards automatically evaluated.作者: Outwit 時間: 2025-4-1 16:10
A Classification Scheme for Software Verification Tools with Regard to RTCA/DO-178Bscheme for software verification tools was needed. This paper provides a tool classification scheme that is based on four basic tool classification categories: “objectives”, “methods”, “metrics”, and “attributes”.作者: 平常 時間: 2025-4-1 20:39 作者: 侵略 時間: 2025-4-1 22:57
Security Assessments of Safety Critical Systems Using HAZOPs Unfortunately, the emphasis placed on security issues when developing safety critical systems is to often inadequate, possibly due to the lack of “;safety-compliant” security methods. Having had the opportunity to adapt the HAZOP-principle to the security context, a HAZOP was established which is w