Analysis and optimisation of mixed-criticality applications on partitioned distributed architectures (Englisch)
- Neue Suche nach: Tamas-Selicean, D.
- Neue Suche nach: Marinescu, S.O.
- Neue Suche nach: Pop, P.
- Neue Suche nach: Institution of Engineering and Technology
- Neue Suche nach: Tamas-Selicean, D.
- Neue Suche nach: Marinescu, S.O.
- Neue Suche nach: Pop, P.
- Neue Suche nach: Institution of Engineering and Technology
In:
System safety conference
607
;
2.a.1
;
2012
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Analysis and optimisation of mixed-criticality applications on partitioned distributed architectures
-
Beteiligte:Tamas-Selicean, D. ( Autor:in ) / Marinescu, S.O. ( Autor:in ) / Pop, P. ( Autor:in ) / Institution of Engineering and Technology
-
Kongress:7th, System safety conference ; 2012 ; Edinburgh
-
Erschienen in:System safety conference , 607 ; 2.a.1IET CONFERENCE PUBLICATION , 607 ; 2.a.1
-
Verlag:
- Neue Suche nach: IET
-
Erscheinungsort:Stevenage
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:2.a.1
-
Anmerkungen:Title from start screen.
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Unplugged perils, lost hazards and failed mitigationsBarton, N. / Rae, A.J. / Institution of Engineering and Technology et al. | 2012
-
Capitalise on complexityGuire, N.M. / Kreidl, M. / Cheng, S. / Institution of Engineering and Technology et al. | 2012
-
On the relationship of hazards and threats in railway signallingBraband, J. / Seemann, M. / Institution of Engineering and Technology et al. | 2012
-
The SAVE ME project real-time disaster mitigation and evacuation management systemTsekourakis, I. / Orlis, C.H. / Ioannidis, D. / Tzovaras, D. / Institution of Engineering and Technology et al. | 2012
-
The uses and abuses of ASIL decomposition in ISO 26262Ward, D. / Crozier, S.E. / Institution of Engineering and Technology et al. | 2012
-
Safety enhancement through situation-aware user interfacesDe Florio, V. / Blondia, C. / Institution of Engineering and Technology et al. | 2012
-
ISO 26262 concept phase safety argument for a complex itemIbarra, J. / Hartley, S. / Crozier, S. / Ward, D. / Institution of Engineering and Technology et al. | 2012
-
Evidence-based development - coupling structured argumentation with requirements developmentDick, A.J.J. / Institution of Engineering and Technology et al. | 2012
-
What does the assurance case approach deliver for critical information infrastructure protection in cyber security?Goodger, A.C. / Caldwell, N.H.M. / Knowles, J.T. / Institution of Engineering and Technology et al. | 2012
-
Securing the human to protect the system: Human factors in cyber securityLee, M.G. / Institution of Engineering and Technology et al. | 2012
-
System security assessments using a cyber rangeWinter, H. / Institution of Engineering and Technology et al. | 2012
-
A practical proposal for ensuring the provenance of hardware devices and their safe operationKovalchuk, Y. / Hu, H. / Gu, D. / McDonald-Maier, K.D. / Howells, W.G.J. / Institution of Engineering and Technology et al. | 2012
-
Trust and control: A safety model for people and organisationsHoskins, W.A. / Institution of Engineering and Technology et al. | 2012
-
Emerging technologies with the potential to impact safety in defenceCaseley, P.R. / Strong, G.T. / Smith, D.J.H. / Bown, K.J. / Madahar, B.K. / Institution of Engineering and Technology et al. | 2012
-
Analysis and optimisation of mixed-criticality applications on partitioned distributed architecturesTamas-Selicean, D. / Marinescu, S.O. / Pop, P. / Institution of Engineering and Technology et al. | 2012
-
Emerging good practice for cyber security of industrial control systems and SCADAPiggin, R.S.H. / Institution of Engineering and Technology et al. | 2012
-
Preparing for cyber-attacks on air traffic management infrastructures: Cyber-safety scenario generationJohnson, C.W. / Institution of Engineering and Technology et al. | 2012
-
Cost effective assessment of the infrastructure security postureWilliams, G.P. / Institution of Engineering and Technology et al. | 2012
-
Applying failure mode modular decomposition (FMMD) across the software/hardware interfaceClark, R. / Fish, A. / Garret, C. / Howse, J. / Institution of Engineering and Technology et al. | 2012
-
Poster Assessing and improving software quality in safety critical systems bythe application of a software test maturity modelDuncan, F.I. / Smeaton, A.G. / Institution of Engineering and Technology et al. | 2012
-
The four principles of product safetySibley, N. / Walby, B. / Priestley, D. / Institution of Engineering and Technology et al. | 2012
-
(SMA)2 - A social media audience sharing model for authorities to support effective crisis communicationRaue, S. / Johnson, C.W. / Storer, T. / Institution of Engineering and Technology et al. | 2012
-
A framework for determining the sufficiency of software safety assuranceHawkins, R.D. / Kelly, T.P. / Institution of Engineering and Technology et al. | 2012
-
Agonising over ASILS: Controllability and the in-wheel motorEllims, M. / Monkhouse, H.E. / Institution of Engineering and Technology et al. | 2012
-
Towards understanding the DO-178C / ED-12C assurance caseHolloway, C.M. / Institution of Engineering and Technology et al. | 2012
-
Generic security cases for information system security in healthcare systemsHe, Y. / Johnson, C.W. / Institution of Engineering and Technology et al. | 2012