default search action
17th SAFECOMP 1998: Heidelberg, Germany
- Wolfgang D. Ehrenberger:
Computer Safety, Reliability and Security, 17th International Conference, SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings. Lecture Notes in Computer Science 1516, Springer 1998, ISBN 3-540-65110-1
Formal Methods I - Analysis and Specification
- Kevin Hollingworth, Amer Saeed:
CoRSA - A Constraint Based Approach to Requirements and Safety Analysis. 3-15 - Kirsten Winter, Thomas Santen, Maritta Heisel:
An Agenda for Specifying Software Components with Complex Data Models. 16-31 - Heinrich Rust:
Safety in Production Cell Components: An Appraoch Combining Formal Real-Time Specifications and Patterns. 32-44 - Vincent David, Jean Delcoigne, Evelyne Leret, Alain Ourghanlian, Philippe Hilsenkopf, Philippe Paris:
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems. 45-59 - Kevin Lano, Pauline Kan, Arturo Sanchez:
Linking Hazard Analysis to Formal Specification and Design in B. 60-74
Management and Human Factors
- Nicolás Martín-Vivaldi, Peter Isacsson:
Controlling your Design through your Software Process. 77-88 - Timm Grams:
Operator Errors and Their Causes. 89-99
Security
- Andrew Hutchinson, Michael Wallbaum:
A Performance Comparison of Group Security Mechanisms. 103-116 - John Iliadis, Stefanos Gritzalis, V. Oikonomou:
Towards Secure Downloadable Executable Content: The Java Paradigm. 117-127 - Ferdinand J. Dafelmair:
Model and Implementation of a Secure SW-Development Process for Mission Critical Software. 128-142 - Silvije Jovalekic, Bernd Rist:
Impact of Object-Oriented Software Engineering Applied to the Development of Security Systems. 143-155
Medical Informatics
- Bas A. de Mol, Floor Koornneef:
"Profit by Safety" or Quackery in Biomedical Information Technology? 159-166
Formal Methods II - Languages and Verification
- Peter Liggesmeyer, Martin Rothfelder:
Towards Automated Proof of Fail-Safe Behaviour. 169-184 - Agathe Merceron, Monika Müllerburg, G. Michele Pinna:
Verifying a Time-Triggered Protocol in a Multi-language Environment. 185-195 - Wolfgang A. Halang, Alceu Heinke Frigeri:
Methods and Languages for Safety-Related Real-Time Programming. 196-208 - Arndt Lindner:
ANSI-C in Safety Critical Applications - Lessons-Learned from Software Evaluation. 209-217
Applications
- Piergiorgio Bertoli, Alessandro Cimatti, Fausto Giunchiglia, Paolo Traverso:
A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools. 221-230 - Sandro Bologna, Rocco Bove, Giovanni Dipoppa, Giorgio Mongardi, Gino Biondi, Carmen Porzia, Benny Graft Mortensen, Niels Kirkegaard:
Applying Formal Methods in Industry The UseGat Project. 231-242 - Thomas Ringler, J. Steiner, Ralf Belschner, Bernd Hedenetz:
Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture. 243-253 - Hans-Dieter Kochs, Walter Geisselhardt, Holger Hilmer, Matthias Lenord:
Fault-Tolerant Communication in Large-Scale Manipulators. 254-266 - Elmar Dilger, Thomas Führer, Bernd Müller:
Distributed Fault-Tolerant and Safety-Critical Application in Vehicles - A Time-Triggered Approach. 267-283 - Alessandro Cimatti, Fausto Giunchiglia, Giorgio Mongardi, Dario Romano, Fernando Torielli, Paolo Traverso:
Model Checking Safety Critical Software with SPIN: An Application to a Railway Interlocking System. 284-295 - Fokko van Dijk, Wan J. Fokkink, Gea Kolk, Paul van de Ven, Bas van Vlijmen:
EURIS, a Specification Method for Distributed Interlockings. 296-305 - Bartosz Nowicki, Janusz Górski:
Object Oriented Safety Analysis of an Extra High Voltage Substation Bay. 306-315
Formal Methods III - Petri Nets
- Francesca Saglietti:
Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets. 319-328 - Krzysztof Sacha:
Safety Verification of Software Using Structured Petri Nets. 329-342
Reliability
- Ken Wong, Jeff Joyce:
Refinement of Safety-Related Hazards into Verifiable Code Assertions. 345-358 - Bert Knegtering, Aarnout Brombacher:
Conceptual Comparison of Two Commonly Used Safeguarding Principles. 359-368 - Gerald Sonneck, Erwin Schoitsch, Lorenzo Strigini:
A Holistic View on the Dependability of Software-Intensive Systems. 369-379 - Rolf Drechsler:
Verifying Integrity of Decision Diagrams. 380-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.