default search action
31st SAFECOMP 2012: Magdeburg, Germany
- Frank Ortmeier, Peter Daniel:
Computer Safety, Reliability, and Security - 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings. Lecture Notes in Computer Science 7612, Springer 2012, ISBN 978-3-642-33677-5
Session I: Tools
- Ewen Denney, Ganesh Pai:
A Lightweight Methodology for Safety Case Assembly. 1-12 - André Alexandersen Hauge, Ketil Stølen:
A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production. 13-24
Session II: Risk Analysis
- Silvia Gil Casals, Philippe Owezarski, Gilles Descargues:
Risk Assessment for Airworthiness Security. 25-36 - Christoph Läsche, Eckard Böde, Thomas Peikenkamp:
A Method for Guided Hazard Identification and Risk Mitigation for Offshore Operations , . 37-48 - Manfred Schäfer:
Risk Analysis and Software Integrity Protection for 4G Network Elements in ASMONIA. 49-61
Session III: Testing
- Christoph Woskowski:
Applying Industrial-Strength Testing Techniques to Critical Care Medical Equipment. 62-73 - Viacheslav Izosimov, Urban Ingelsson, Andreas Wallin:
Requirement Decomposition and Testability in Development of Safety-Critical Automotive Components, . 74-86 - Jan Krause, Elke Hintze, Stephan Magnus, Christian Diedrich:
Model Based Specification, Verification, and Test Generation for a Safety Fieldbus Profile. 87-98
Session IV: Quantitative Analysis
- Ernest Edifor, Martin Walker, Neil A. Gordon:
Quantification of Priority-OR Gates in Temporal Fault Trees. 99-110 - Michael Glaß, Heng Yu, Felix Reimann, Jürgen Teich:
Cross-Level Compositional Reliability Analysis for Embedded Systems. 111-124
Session V: Security
- Tobias Hoppe, Sven Kuhlmann, Stefan Kiltz, Jana Dittmann:
IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data. 125-136 - Hans-Hermann Bock, Jens Braband, Birgit Milius, Hendrik Schäbe:
Towards an IT Security Protection Profile for Safety-Related Communication in Railway Automation. 137-148 - Felix Wieczorek, Christoph Krauß, Frank Schiller, Claudia Eckert:
Towards Secure Fieldbus Communication. 149-160 - Andrey Zakonov, Anatoly Shalyto:
Extracting EFSMs of Web Applications for Formal Requirements Specification. 161-172
Session VI: Formal Methods 1
- Irene Bicchierai, Giacomo Bucci, Carlo Nocentini, Enrico Vicario:
An Ontological Approach to Systematization of SW-FMEA. 173-184 - Roberto Baldoni, Giorgia Lodi, Luca Montanari, Guido Mariotta, Marco Rizzuto:
Online Black-Box Failure Prediction for Mission Critical Distributed Systems. 185-197 - Domenico Di Leo, Fatemeh Ayatolahi, Behrooz Sangchoolie, Johan Karlsson, Roger Johansson:
On the Impact of Hardware Faults - An Investigation of the Relationship between Workload Inputs and Failure Mode Distributions. 198-209
Session VII: Aeronautic
- Anton Tarasyuk, Inna Pereverzeva, Elena Troubitsyna, Timo Latvala, Laura Nummila:
Formal Development and Assessment of a Reconfigurable On-board Satellite System. 210-222 - Olof Hannius, Johan Karlsson:
Impact of Soft Errors in a Jet Engine Controller. 223-234 - Ludovic Pintard, Christel Seguin, Jean-Paul Blanquart:
Which Automata for Which Safety Assessment Step of Satellite FDIR? 235-246
Session VIII: Automotive
- Carl Bergenhem, Rolf Johansson, Henrik Lönn:
A Novel Modelling Pattern for Establishing Failure Models and Assisting Architectural Exploration in an Automotive Context. 247-257 - Ingo Stürmer, Elke Salecker, Hartmut Pohlheim:
Reviewing Software Models in Compliance with ISO 26262. 258-267 - Thomas Novak, Christoph Stoegerer:
Software Architecture of a Safety-Related Actuator in Traffic Management Systems. 268-278
Session IX: Formal Methods 2
- Philipp Helle, Michael Masin, Lev Greenberg:
Approximate Reliability Algebra for Architecture Optimization. 279-290 - Henning Günther, Stefan Milius, Oliver Möller:
On the Formal Verification of Systems of Synchronous Software Components. 291-304
Session X: Process
- Anaheed Ayoub, BaekGyu Kim, Insup Lee, Oleg Sokolsky:
A Systematic Approach to Justifying Sufficient Confidence in Software Safety Arguments. 305-316 - Martin Wildmoser, Jan Philipps, Oscar Slotosch:
Determining Potential Errors in Tool Chains - Strategies to Reach Tool Confidence According to ISO 26262. 317-327 - Bastian Zimmer, Susanne Bürklen, Jens Höfflinger, Mario Trapp, Peter Liggesmeyer:
Safety-Focused Deployment Optimization in Open Integrated Architectures. 328-339 - Fredrik Asplund, Jad El-khoury, Martin Törngren:
Qualifying Software Tools, a Systems Approach. 340-351
Session XI: Case Studies
- Rosana T. Vaccare Braga, Onofre Trindade Júnior, Kalinka Regina Lucas Jaquie Castelo Branco, Luciano de Oliveira Neris, Jaejoon Lee:
Adapting a Software Product Line Engineering Process for Certifying Safety Critical Embedded Systems. 352-363 - Mark-Alexander Sujan, Massimo Felici:
Combining Failure Mode and Functional Resonance Analyses in Healthcare Settings. 364-375 - Tian Song, Deming Zhong, Hang Zhong:
A STAMP Analysis on the China-Yongwen Railway Accident. 376-387 - Rikard Land, Mikael Åkerholm, Jan Carlson:
Efficient Software Component Reuse in Safety-Critical Systems - An Empirical Study. 388-399
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.