Koornneef / Meulen | Computer Safety, Reliability, and Security | E-Book | sack.de
E-Book

E-Book, Englisch, Band 1943, 438 Seiten, eBook

Reihe: Lecture Notes in Computer Science

Koornneef / Meulen Computer Safety, Reliability, and Security

19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000 Proceedings
Erscheinungsjahr 2003
ISBN: 978-3-540-40891-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000 Proceedings

E-Book, Englisch, Band 1943, 438 Seiten, eBook

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-40891-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Koornneef / Meulen Computer Safety, Reliability, and Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Invited Paper.- The Ten Most Powerful Principles for Quality in (Software and) Software Organizations for Dependable Systems.- Verification and Validation.- Empirical Assessment of Software On-Line Diagnostics Using Fault Injection.- Speeding-Up Fault Injection Campaigns in VHDL Models.- Specification and Verification of a Safety Shell with Statecharts and Extended Timed Graphs.- Validation of Control System Specifications with Abstract Plant Models.- A Constant Perturbation Method for Evaluation of Structural Diversity in Multiversion Software.- Expert Error: The Case of Trouble-Shooting in Electronics.- The Safety Management of Data-Driven Safety-Related Systems.- Software Support for Incident Reporting Systems in Safety-Critical Applications.- Software Process Improvement.- A Dependability-Explicit Model for the Development of Computing Systems.- Deriving Quantified Safety Requirements in Complex Systems.- Improving Software Development by Using Safe Object Oriented Development : OTCD.- A Safety Licensable PES for SIL 4 Applications.- Safety and Security Issues in Electric Power Industry.- Dependability of Computer Control Systems in Power Plants.- A Method of Analysis of Fault Trees with Time Dependencies.- Formal Methods.- A Formal Methods Case Study: Using Light-Weight VDM for the Development of a Security System Module.- Formal Methods: The Problem Is Education.- Formal Methods Diffusion: Past Lessons and Future Prospects.- Invited Paper.- Safe Tech: A Control Oriented Viewpoint.- Safety Guidelines, Standards and Certification.- Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems.- IEC 61508 — A Suitable Basis for the Certification of Safety-Critical Transport-Infrastructure Systems ??.- Hardware Aspects.- An Approach toSoftware Assisted Recovery from Hardware Transient Faults for Real Time Systems.- Programmable Electronic System Design & Verification Utilizing DFM.- SIMATIC S7-400F/FH: Safety-Related Programmable Logic Controller.- Safety Assessment I.- Assessment of the Reliability of Fault-Tolerant Software: A Bayesian Approach.- Estimating Dependability of Programmable Systems Using BBNs.- Design for Safety.- Improvements in Process Control Dependability through Internet Security Technology.- A Survey on Safety-Critical Multicast Networking.- Invited Paper.- Causal Reasoning about Aircraft Accidents.- Transport & Infrastructure.- Controlling Requirements Evolution: An Avionics Case Study.- HAZOP Analysis of Formal Models of Safety-Critical Interactive Systems.- Failure Mode and Effect Analysis for Safety-Critical Systems with Software Components.- Safety Assessment II.- Risk Ordering of States in Safecharts.- Dependability Evaluation: Model and Method Based on Activity Theory.- Forensic Software Engineering and the Need for New Approaches to Accident Investigation.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.