default search action
12th SAFECOMP 1993: Poznań-Kiekrz, Poland
- Janusz Górski:
The 12th International Conference on Computer Safety, Reliability and Security, SAFECOMP 1993, Poznań-Kiekrz, Poland, October 27-29, 1993. Springer 1993, ISBN 978-3-540-19838-3 - Tom Anderson:
Safety - status and perspectives. 3-6 - Cinzia Bernardeschi, Luca Simoncini, Andrea Bondavalli:
Data Flow Control Systems: an Example of Safety Validation. 9-20 - Glenn Bruns, Stuart Anderson:
Validating Safety Models with Fault Trees. 21-30 - Zhiming Liu, Jens Nordahl, Erling Vagn Sørensen:
Composition and Refinement of Probabilistic Real-Time Systems. 31-40 - Paul O. Collinson, Susan Oppert, Steven Hughes:
The Application of Formal Methods for the Redevelopment of a Laboratory Information Management System. 41-49 - Wolfgang A. Halang, Johan Scheepstra:
PLC-Implementation of Emergency Shut-Down Systems. 53-62 - Gioacchino A. Mutone, Martin Rothfelder:
The Fast Cost Effective Design and Concurrent Certification of the Safe Computer for a Real Time Train Control Application. 63-72 - Harvey E. Rhody, Vittorio Manoni, James R. Hoelscher:
Design and Analysis of a Failsafe Algorithm for Solving Boolean Equations. 73-82 - Meine Jochum Peter van der Meulen, Tor Stålhane, B. Cole:
Programmable Electronic System Analysis Technique in Safety Critical Applications. 85-90 - C. J. Goring:
Safety Assessment - The Critical System Suppliers View. 91-98 - Morris F. Chudleigh:
Hazard Analysis Using HAZOP: A Case Study. 99-108 - S. S. Dhanjal, R. Fink:
Safety Analysis of Clinical Laboratory Systems. 111-122 - Morris F. Chudleigh, J. N. Clare:
The Benefits of SUSI: Safety Analysis of User System Interaction. 123-132 - Felix Redmill:
Issues Affecting Technology Transfer and Experience with a Community Club. 135-141 - Jean-Pierre Banâtre:
Subsidiaries and start-up Spin-off companies of Inria. 142-144 - Wojciech Cellary:
Human Medium in Technology Transfer. 145-146 - Bob Malcolm:
Technology Transfer - from Purpose to Practice. 147-153 - Jean-Claude Laprie:
Dependability: from Concepts to Limits. 157-168 - N. J. Ward:
The Rigorous Retrospective Static Analysis of the Sizewell 'B' Primary Protection System Software. 171-181 - Bernhard Stamm, René Baumann, Martin Kündig-Herzog:
A Safety Critical Computer System in a Railway Application. 182-193 - Jeffrey M. Voas, Christoph C. Michael, Keith W. Miller:
Confidently Assessing a Zero Probability of Software Failure. 197-206 - Igor M. Galkin:
A Knowledge-Based Approach to Program Testing and Analysis. 207-216 - Amer Saeed, Rogério de Lemos, Tom Anderson:
Robust Requirements Specifications for Safety - Critical Systems. 219-229 - Mohamed Kaâniche, Karama Kanoun:
Software Failure Data Analysis of two Successive Generations of a Switching System. 230-239 - Johannes Rainer:
Software validation with CASE-TOOLS. 240-249 - Walter Kuhn, Erwin Schoitsch:
Dependability of Scaleable, Distributed Systems: Communication Strategies for Redundant Processes. 253-264 - Rudolph E. Seviora:
Real-Time Detection of Failures of Reactive Systems. 265-275 - Henryk Krawczyk, Saleh Al-Karaawy:
Reliability and Safety Analysis of Hierarchical Voting Schemes. 276-285 - G. Sen, J. Brummer:
Designing a High-level Language for Safety Systems. 289-301 - Pierre Molinaro, Olivier H. Roux:
Oreste : a Reliable Reactive Real-Time Language. 302-310 - Carl E. Landwehr:
How Far Can You Trust A Computer? 313-325 - Ludovic Mé:
Security Audit Trail Analysis Using Genetic Algorithms. 329-340 - Reinhard Posch:
MRSA - a new public key encryption method. 341-348 - Martin Witte, Wolfgang A. Halang:
A Virus-Resistant Network Interface. 349-357 - Hugo Fierz, Hansruedi Müller, Spiros Netos:
CIP - Communicating Interacting Processes A Formal Method for the Development of Reactive Systems. 361-370 - Matjaz Colnaric, Wolfgang A. Halang:
Exception Handling and Predictability in Hard Real-Time Systems. 371-378 - M. B. Schrönen, Michael R. Inggs:
Development of a Fail-Safe Data Transmission System for use in Life-Critical Applications. 379-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.