Computer safety, reliability, and security : 24th international conference, SAFECOMP 2005, Fredrikstad, Norway, September 28 - 30, 2005 ; proceedings (English)
- New search for: SAFECOMP
- Further information on SAFECOMP:
- http://d-nb.info/gnd/10115765-4
- New search for: Winther, Rune
- New search for: SAFECOMP
- Further information on SAFECOMP:
- http://d-nb.info/gnd/10115765-4
2005
-
ISBN:
- Conference Proceedings / Electronic Resource
-
Title:Computer safety, reliability, and security : 24th international conference, SAFECOMP 2005, Fredrikstad, Norway, September 28 - 30, 2005 ; proceedings
-
Contributors:
-
Conference:SAFECOMP 2005 ; 24 ; 2005 ; Fredrikstad
International Conference on Computer Safety, Reliability, and Security ; 24 ; 2005 ; Fredrikstad -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin [u.a.]
-
Publication date:2005
-
Size:Online-Ressource (XIII, 404 S.)
-
Remarks:graph. Darst
Includes bibliographical references and index -
ISBN:
-
DOI:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.33 / 54.38
- Further information on Basic classification
- New search for: 005.3
- Further information on Dewey Decimal Classification
-
Keywords:
-
Classification:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
CMMI RAMS Extension Based on CENELEC Railway StandardFonseca, J. A. / de Almeida Junior, J. R. et al. | 2005
- 13
-
The Importance of Single-Source Engineering of Emergency and Process Shutdown SystemsMartinez, R. / Enkerud, T. et al. | 2005
- 24
-
Combining Extended UML Models and Formal Methods to Analyze Real-Time SystemsAddouche, N. / Antoine, C. / Montmain, J. et al. | 2005
- 37
-
Defining and Decomposing Safety Policy for Systems of SystemsHall-May, M. / Kelly, T. et al. | 2005
- 52
-
Generalising Event Trees Using Bayesian Networks with a Case Study of Train DerailmentBearfield, G. / Marsh, W. et al. | 2005
- 67
-
Control and Data Flow Testing on Function Block DiagramsJee, E. / Yoo, J. / Cha, S. et al. | 2005
- 81
-
Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical SoftwareHerzner, W. / Ramberger, S. / Langer, T. / Reumann, C. / Gruber, T. / Sejkora, C. et al. | 2005
- 94
-
Automatic Analysis of a Safety Critical Tele Control SystemCampagnano, E. / Ciancamerla, E. / Minichino, M. / Tronci, E. et al. | 2005
- 108
-
A Formal Model for Fault-Tolerance in Distributed SystemsHamid, B. / Mosbah, M. et al. | 2005
- 122
-
Model-Based Safety Analysis of Simulink Models Using SCADE Design VerifierJoshi, A. / Heimdahl, M. P. E. et al. | 2005
- 136
-
Using Safety Critical Artificial Neural Networks in Gas Turbine Aero-Engine ControlKurd, Z. / Kelly, T. P. et al. | 2005
- 151
-
On the Effectiveness of Run-Time Checksvan der Meulen, M. J. P. / Strigini, L. / Revilla, M. A. et al. | 2005
- 165
-
A Technique for Fault Tolerance Assessment of COTS Based SystemsAlexandersson, R. / Chaitanya, D. K. / Ohman, P. / Siraj, Y. et al. | 2005
- 179
-
Finding Upper Bounds for Software Failure Probabilities - Experiments and ResultsKristiansen, M. et al. | 2005
- 194
-
Justification of Smart Sensors for Nuclear ApplicationsBishop, P. / Bloomfield, R. / Guerra, S. / Tourlas, K. et al. | 2005
- 208
-
Evolutionary Safety Analysis: Motivations from the Air Traffic Management DomainFelici, M. et al. | 2005
- 222
-
Public-Key Cryptography and AvailabilityStabell-Kulo, T. / Lupetti, S. et al. | 2005
- 233
-
End-To-End Worst-Case Response Time Analysis for Hard Real-Time Distributed SystemsWang, L. / Zhao, M. / Zheng, Z. / Wu, Z. et al. | 2005
- 246
-
Safety Interfaces for Component-Based SystemsElmqvist, J. / Nadjm-Tehrani, S. / Minea, M. et al. | 2005
- 261
-
A Safety-Related PES for Task-Oriented Real-Time Execution Without Asynchronous InterruptsSkambraks, M. et al. | 2005
- 275
-
Are High-Level Languages Suitable for Robust Telecoms Software?Nystrom, J. H. / Trinder, P. W. / King, D. J. et al. | 2005
- 289
-
Functional Apportioning of Safety Requirements on Railway Signalling SystemsLokberg, O. / Skogstad, O. et al. | 2005
- 303
-
Automatic Code Generation for PLC ControllersSacha, K. et al. | 2005
- 317
-
The TACO Approach for Traceability and Communication of RequirementsSivertsen, T. / Fredriksen, R. / Thunem, A. P.-J. / Holmberg, J.-E. / Valkonen, J. / Venta, O. / Andersson, J.-O. et al. | 2005
- 330
-
An IEC 62061 Compliant Safety System Design Method for MachineryLjungquist, B. / Thelin, T. et al. | 2005
- 344
-
Design Evaluation: Estimating Multiple Critical Performance and Cost Impacts of DesignsGilb, T. et al. | 2005
- 357
-
The Application of an Object-Oriented Method in Information System Security EvaluationYan, Q. / Shu, H.-y. et al. | 2005
- 368
-
Towards a Cyber Security Reporting System - A Quality Improvement ProcessGonzalez, J. J. et al. | 2005
- 381
-
Security Research from a Multi-disciplinary and Multi-sectoral PerspectiveThunem, A. P.-J. et al. | 2005
- 390
-
Problem Frames and Architectures for Security ProblemsHatebur, D. / Heisel, M. et al. | 2005