


default search action
22nd SAFECOMP 2003: Edinburgh, UK
- Stuart Anderson, Massimo Felici, Bev Littlewood:
Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings. Lecture Notes in Computer Science 2788, Springer 2003, ISBN 3-540-20126-2
Keynote Talk
- M. Thomas:
Issues in Safety Assurance. 1-7
Formal Methods
- David Wright:
Elicitation and Validation of Graphical Dependability Models. 8-21 - Asif Iqbal, A. K. Bhattacharjee, S. D. Dhodapkar, S. Ramesh:
Visual Modeling and Verification of Distributed Reactive Systems. 22-34 - Ester Ciancamerla, Michele Minichino, S. Serro, Enrico Tronci:
Automatic Timeliness Verification of a Public Mobile Network. 35-48 - Marco Bozzano, Adolfo Villafiorita:
Improving System Reliability via Model Checking: The FSAP/NuSMV-SA Safety Analysis Platform. 49-62
Design for Dependability
- Peter G. Bishop
, Robin E. Bloomfield, Tim Clement, Sofia Guerra, Claire Jones:
Integrity Static Analysis of COTS/SOUP. 63-76 - Zeshan Kurd, Tim Kelly:
Safety Lifecycle for Developing Safety Critical Artificial Neural Networks. 77-91 - Atte Helminen, U. Pulkkinen:
Quantitative Reliability Estimation of a Computer-Based Motor Protection Relay Using Bayesian Networks. 92-102 - Guy Dewsbury, Ian Sommerville, Karen Clarke, Mark Rouncefield:
A Dependability Model for Domestic Systems. 103-115
Security and Formal Methods
- Johannes Grünbauer, Helia Hollmann, Jan Jürjens, Guido Wimmel:
Modelling and Verification of Layered Security Protocols: A Bank Application. 116-129 - Stefano Bistarelli
, Simon N. Foley:
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. 130-143 - Hongxia Jin, Gregory F. Sullivan, Gerald M. Masson:
Software Tamper Resistance Using Program Certificates. 144-158
Keynote Talk
- Constance L. Heitmeyer:
Developing High Assurance Systems: On the Role of Software Tools. 159-164
Dependability and Performance Analysis
- Magnos Martinello, Mohamed Kaâniche, Karama Kanoun:
Web Service Availability - Impact of Error Recovery. 165-178 - Stephen Gilmore, Leïla Kloul:
A Unified Tool for Performance Modelling and Prediction. 179-192
Dependability of Medical Systems
- Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna
, Jakub Miler, Marcin Olszewski:
An Approach to Trust Case Development. 193-206 - Joe Gorman, Ståle Walderhaug
, Håvard Kvålen:
Reliable Data Replication in a Wireless Medical Emergency Network. 207-220 - Andrew Rae
, Daniel Jackson, Prasad Ramanan, Jay Flanz, Didier Leyman:
Critical Feature Analysis of a Radiotherapy Machine. 221-234
Fault Tolerance
- K. Driscoll, B. Hall, Håkan Sivencrona, P. Zumsteg:
Byzantine Fault Tolerance, from Theory to Reality. 235-248 - Oliver Rooks, Michael Armbruster, S. Büchli, Armin Sulzmann, Gernot Spiegelberg, Uwe Kiencke:
Redundancy Management for Drive-by-Wire Computer Systems. 249-262 - César Mataix, Pedro Martín, Francisco Javier Rodríguez, Maria J. Manzano, Javier Pozo:
Fault-Tolerant Communication System to Improve Safety in Railway Environments. 263-274 - Nagarajan Kandasamy, John P. Hayes, Brian T. Murray:
Dependable Communication Synthesis for Distributed Embedded Systems. 275-288
Tools for Dependable Design
- Wolfgang Weber, Heidemarie Tondok, Michael Bachmayer:
Enhancing Software Safety by Fault Trees: Experiences from an Application to Flight Critical SW. 289-302 - Paul Mason, Amer Saeed, Steve Riddle:
On the Role of Traceability for Standards Compliance: Tracking Requirements to Code. 303-316 - Kimberly S. Wasson, John C. Knight, Elisabeth A. Strunk, Sean R. Travis:
Tools Supporting the Communication of Critical Domain Knowledge in High-Consequence Systems Development. 317-330
Dependability of Critical Infrastructures
- George Angelis, Stefanos Gritzalis, Costas Lambrinoudakis
:
Security Policy Configuration Issues in Grid Computing Environments. 331-341 - Sandro Bologna, Claudio Balducelli, Giovanni Dipoppa, Giordano Vicoli:
Dependability and Survivability of Large Complex Critical Infrastructures. 342-353
Hazard and Safety Analysis
- Alberto Pasquini, Simone Pozzi:
Safety Assessment of Experimental Air Traffc Management Procedures. 354-367 - Chris W. Johnson:
The Application of Causal Analysis Techniques for Computer-Related Mishaps. 368-381 - Shamus P. Smith
, Michael D. Harrison:
Reuse in Hazard Analysis: Identification and Support. 382-395
Design for Dependability
- N. Storey, Alastair Faulkner
:
The Characteristics of Data in Data-Intensive Safety-Related Systems. 396-409 - Chris W. Johnson:
Using IEC 61508 to Guide the Investigation of Computer-Related Incidents and Accidents. 410-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.