default search action
Peter Bishop 0001
Person information
- affiliation: City University London, UK
- affiliation: Adelard LLP, London, UK
Other persons with the same name
- Peter Bishop 0002 — Cirrus Logic, Inc.
- Peter Bishop 0003 — University of Houston, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c28]Peter Bishop, Andrey Povyakalo, Lorenzo Strigini:
Bootstrapping confidence in future safety from past safe operation. ISSRE 2022: 97-108 - [c27]Peter Bishop, Andrey Povyakalo:
Optimising the Reliability that Can Be Claimed for a Software-Based System Based on Failure-Free Tests of Its Components. SAFECOMP 2022: 365-378 - [i2]Peter Bishop, Andrey Povyakalo:
Optimising the reliability that can be claimed for a software-based system based on failure-free tests of its components. CoRR abs/2201.12829 (2022) - 2021
- [i1]Peter Bishop, Andrey Povyakalo, Lorenzo Strigini:
Bootstrapping confidence in future safety based on past safe operation. CoRR abs/2110.10718 (2021) - 2020
- [j8]Peter Bishop, Andrey Povyakalo:
A conservative confidence bound for the probability of failure on demand of a software-based system based on failure-free tests of its components. Reliab. Eng. Syst. Saf. 203: 107060 (2020)
2010 – 2019
- 2018
- [j7]Robin Bloomfield, Peter Bishop, Eoin Butler, Robert J. Stroud:
Security-Informed Safety: Supporting Stakeholders with Codes of Practice. Computer 51(8): 60-65 (2018) - 2017
- [j6]Peter G. Bishop, Andrey Povyakalo:
Deriving a frequentist conservative confidence bound for probability of failure per demand for systems with different operational and test profiles. Reliab. Eng. Syst. Saf. 158: 246-253 (2017) - [c26]Robin Bloomfield, Peter G. Bishop, Eoin Butler, Kateryna Netkachova:
Using an Assurance Case Framework to Develop Security Strategy and Policies. SAFECOMP Workshops 2017: 27-28 - 2016
- [c25]Robin E. Bloomfield, Marcus Bendele, Peter G. Bishop, Robert J. Stroud, Simon Tonks:
The Risk Assessment of ERTMS-Based Railway Systems from a Cyber Security Perspective: Methodology and Lessons Learned. RSSRail 2016: 3-19 - 2015
- [c24]Peter Bishop:
Modeling the Impact of Testing on Diverse Programs. SAFECOMP 2015: 297-309 - 2014
- [j5]Peter G. Bishop, Robin E. Bloomfield, Bev Littlewood, Peter T. Popov, Andrey Povyakalo, Lorenzo Strigini:
A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train. Reliab. Eng. Syst. Saf. 130: 61-68 (2014) - [c23]Peter G. Bishop, Lorenzo Strigini:
Estimating Worst Case Failure Dependency with Partial Knowledge of the Difficulty Function. SAFECOMP 2014: 186-201 - 2013
- [c22]Peter G. Bishop, Robin E. Bloomfield, Lukasz Cyra:
Combining testing and proof to gain high assurance in software: A case study. ISSRE 2013: 248-257 - [c21]Peter Bishop:
Does Software Have to Be Ultra Reliable in Safety Critical Systems? SAFECOMP 2013: 118-129 - 2011
- [j4]Peter G. Bishop, Robin E. Bloomfield, Bev Littlewood, Andrey Povyakalo, David Wright:
Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems. IEEE Trans. Software Eng. 37(5): 708-717 (2011) - [c20]Peter G. Bishop, Robin E. Bloomfield, Ilir Gashi, Vladimir Stankovic:
Diversity for Security: A Study with Off-the-Shelf AntiVirus Engines. ISSRE 2011: 11-19 - 2010
- [c19]Peter G. Bishop, Lukasz Cyra:
Overcoming Non-determinism in Testing Smart Devices: A Case Study. SAFECOMP 2010: 237-250 - [c18]Peter G. Bishop, Konstantinos Tourlas, Nick Chozos:
An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems. SAFECOMP 2010: 375-388 - [c17]Robin E. Bloomfield, Peter G. Bishop:
Safety and Assurance Cases: Past, Present and Possible Future - an Adelard Perspective. SSS 2010: 51-67
2000 – 2009
- 2007
- [c16]Peter G. Bishop, Ilir Gashi, Bev Littlewood, David Wright:
Reliability Modeling of a 1-Out-Of-2 System: Research with Diverse Off-The-Shelf SQL Database Servers. ISSRE 2007: 49-58 - 2005
- [c15]Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra, Konstantinos Tourlas:
Justification of Smart Sensors for Nuclear Applications. SAFECOMP 2005: 194-207 - 2004
- [c14]Meine van der Meulen, Peter G. Bishop, Miguel A. Revilla:
An Exploration of Software Faults and Failure Behaviour in a Large Population of Programs. ISSRE 2004: 101-112 - [c13]J. G. W. Bentley, Peter G. Bishop, Meine van der Meulen:
An Empirical Exploration of the Difficulty Function. SAFECOMP 2004: 60-71 - 2003
- [j3]Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra:
Software criticality analysis of COTS/SOUP. Reliab. Eng. Syst. Saf. 81(3): 291-301 (2003) - [c12]Peter G. Bishop, Robin E. Bloomfield:
Using a Log-normal Failure Rate Distribution for Worst Case Bound Reliability Prediction. ISSRE 2003: 237-245 - [c11]Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra, Claire Jones:
Integrity Static Analysis of COTS/SOUP. SAFECOMP 2003: 63-76 - 2002
- [c10]Peter G. Bishop, Robin E. Bloomfield:
Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects. ISSRE 2002: 295-303 - [c9]Peter G. Bishop:
Rescaling reliability bounds for a new operational profile. ISSTA 2002: 180-190 - [c8]Peter G. Bishop:
Estimating Residual Faults from Code Coverage. SAFECOMP 2002: 163-174 - [c7]Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra:
Software Criticality Analysis of COTS/SOUP. SAFECOMP 2002: 198-211
1990 – 1999
- 1998
- [c6]Peter Bishop, Robin Bloomfield:
A Methodology for Safety Case Development. SSS 1998: 194-203 - 1997
- [c5]Peter G. Bishop:
Using reversible computing to achieve fail-safety. ISSRE 1997: 182-191 - 1996
- [j2]Peter G. Bishop, Robin E. Bloomfield:
A conservative theory for long-term reliability-growth prediction [of software]. IEEE Trans. Reliab. 45(4): 550-560 (1996) - [c4]Peter G. Bishop, Robin E. Bloomfield:
A conservative theory for long term reliability growth prediction. ISSRE 1996: 308-317 - 1995
- [c3]Peter G. Bishop, Robin E. Bloomfield:
The SHIP Safety Case Approach. SAFECOMP 1995: 437-451 - 1993
- [c2]Peter G. Bishop:
The Variation of Software Survival Time for Different Operational Input Profiles. FTCS 1993: 98-107
1980 – 1989
- 1988
- [c1]Peter G. Bishop, F. D. Pullen:
PODS revisited-a study of software failure behaviour. FTCS 1988: 2-8 - 1986
- [j1]Peter G. Bishop, David G. Esp, Mel Barnes, Peter Humphreys, Gustav Dahll, Jaakko Lahti:
PODS - A Project on Diverse Software. IEEE Trans. Software Eng. 12(9): 929-940 (1986)
Coauthor Index
aka: Robin Bloomfield
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint