


default search action
16th SAFECOMP 1997: York, UK
- Peter Daniel:
16th International Conference on Computer Safety, Reliability and Security, Safe Comp 1997, York, UK, September 7-10, 1997. Springer 1997, ISBN 978-3-540-76191-4 - Hélène Papini, Frangois Simon:
Software-based Safety-critical Systems: a Taxonomy. 3-13 - Gustav Dahll:
Safety Assessment of Software Based Systems. 14-24 - Henrik Thane:
Safe and Reliable Computer Control Systems an Overview. 25-36 - Stefan Scheer, Thomas Maier:
Towards Dependable Software Requirement Specifications. 37-51 - Tim P. Kelly, John A. McDermid
:
Safety Case Construction and Reuse Using Patterns. 55-69 - Peter A. Lindsay, John A. McDermid:
A systematic approach to software safety integrity levels. 70-82 - Marc Wilikens, Marcelo Masera, Davide Vallero:
Integration of Safety Requirements in the Initial Phases of the Project Lifecycle of Hardware/Software Systems. 83-97 - David Jenkins, Brian Lees, Daniel Livingstone
, Andrew Reglinski:
Managing the Safety Argument using a Memory Prosthesis. 98-108 - Jens Braband:
Safety and Security Requirements for an Advanced Train Control System. 111-122 - Stefanos Gritzalis, Diomidis Spinellis:
Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools. 123-137 - Andrew M. Dearden, Michael D. Harrison:
Using Executable Interactor Specifications to Explore the Impact of Operator Interaction Errors. 138-147 - Xun Yi, Kwork-Yan Lam, Yongfei Han:
Design, Analysis and Implementation of a New Hash Function Based on Block Cipher. 148-157 - Despina Polemi:
Biometric Techniques Applied In Security Technology. 158-170 - Brian A. Wichmann:
High Integrity Ada. 173-184 - P. D. Edwards, R. S. Rivett, G. F. McCall:
Towards an Automotive 'Safer Subset' of C. 185-196 - Stephen P. Wilson, John A. McDermid, P. M. Kirkham, Clive H. Pygott, David J. Tombs:
Computer Based Support for Standards and Processes in Safety Critical Systems. 197-209 - Konstantinos Tourlas:
An Assessment of the IEC 1131-3 Standard on Languages for Programmable Controllers. 210-219 - Kevin Lano:
Refinement and Safety Analysis. 223-240 - Reiner Lichtenecker, Klaus Gotthardt:
Automated Verification of Safety Requirements using CCS and Binary Decision Diagrams. 241-252 - Yahia Lebbah:
Consistency Checking by Type Inference and Constraint Satisfaction. 253-264 - Bruno Mermet, Dominique Méry:
Safe combinations of services using B. 265-280 - Marko Cepin, Rogério de Lemos, Borut Mavko, Steve Riddle, Amer Saeed:
An Object-Based Approach to Modelling and Analysis of Failure Properties. 281-294 - Maritta Heisel, Carsten Siihl:
Methodological Support for Formally Specifying Safety-Critical Software. 295-308 - Philippe Baufreton, Xavier Méhaut, Éric Rutten:
Embedded Systems in Avionics and the SACRES Approach. 311-320 - Peter R. Croll, Colin Chambers, M. Bowell, Paul W. H. Chung:
Towards Safer Industrial Computer Controlled Systems. 321-331 - Stephen Barker, Ian Kendall, Anthony Darlison:
Safety Cases for Software-intensive Systems: an Industrial Experience Report. 332-342 - Francesca Saglietti:
Dynamic Decision on Checkpointing by Use of Reduced Ordered Binary Decision Diagrams. 345-356 - Ian T. Nabney, Mickael J. S. Paven, Richard C. Eldridge, Clive Lee:
Practical Assessment of Neural Network Applications. 357-368 - John C. Knight, Luís G. Nakano:
Software Test Techniques for System Fault-Tree Analysis. 369-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.