|
|
|
|
LEADER |
05856nam a22005895i 4500 |
001 |
978-3-540-45416-8 |
003 |
DE-He213 |
005 |
20191025191329.0 |
007 |
cr nn 008mamaa |
008 |
121227s2001 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540454168
|9 978-3-540-45416-8
|
024 |
7 |
|
|a 10.1007/3-540-45416-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Computer Safety, Reliability and Security
|h [electronic resource] :
|b 20th International Conference, SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001 Proceedings /
|c edited by Udo Voges.
|
250 |
|
|
|a 1st ed. 2001.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2001.
|
300 |
|
|
|a XVI, 256 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2187
|
505 |
0 |
|
|a Invited Paper -- Designing Safety into Medical Decisions and Clinical Processes -- Reliability Asessment and Security -- Security Assessments of Safety Critical Systems Using HAZOPs -- Network Security for Substation Automation Systems -- A Bayesian Belief Network for Reliability Assessment -- Safety Case and Safety Analysis -- Checking General Safety Criteria on UML Statecharts -- Presenting a Safety Case - A Case Study - -- Safety Functions versus Control Functions -- Medical Systems -- A Fail-Safe Dual Channel Robot Control for Surgery Applications -- Invited Paper -- Modeling the Human in Human Factors -- Human Machine Interface -- Analyzing Human-Machine Interactions in Safety-Critical Systems: A Basic Applicable Approach -- Analysis of Incidents Involving Interactive Systems -- COTS - Components off the Shelf -- Experimental Evaluation of Fault Handling Mechanisms -- The COTS Debate in Perspective -- Testing -- An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models -- A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures -- The Effectiveness of Statistical Testing when Applied to Logic Systems -- Formal Methods -- A Classification Scheme for Software Verification Tools with Regard to RTCA/DO-178B -- Safety Patterns - The Key to Formal Specification of Safety Requirements -- Formal Support for Fault Modelling and Analysis -- Project Experience with IEC 61508 and Its Consequences -- Project Experience with IEC 61508 and Its Consequences -- About the Design of Distributed Control Systems: The Quasi-Synchronous approach -- About the Design of Distributed Control Systems: The Quasi-Synchronous Approach -- Dependability Evaluation From Functional to Structural Modelling -- Dependability Evaluation -- Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems -- Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems.
|
520 |
|
|
|a This year we celebrated another anniversary: after 20 years of SAFECOMP in 1999, th this was the 20 SAFECOMP since its inauguration in 1979. This series of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and security (applied to safety in terms of integrity and availability) are of importance. The 20th SAFECOMP tried to cover new grounds, both thematically and geographically. The previous 19 SAFECOMPs were held in Austria (1989, 1996), France (1987, 1999), Germany (1979, 1988, 1998), Great Britain (1983, 1986, 1990, 1997), Italy (1985, 1995), Norway (1991), Poland (1993), Switzerland (1992), The th Netherlands (2000), and in the USA (1981, 1992), whereas the 20 was held in Hungary. Authors from 13 countries responded to the Call for Papers, and 10 countries were represented in the final program. The proceedings include 20 papers plus 3 invited papers, covering the areas Reliability Assessment and Security, Safety Case and Safety Analysis, Testing, Formal Methods, Control Systems, and this year covering new grounds with a special emphasis on Human Machine Interface, Components off the Shelf, and Medical Systems.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Computer logic.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I13030
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|0 http://scigraph.springernature.com/things/product-market-codes/I1603X
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I24067
|
700 |
1 |
|
|a Voges, Udo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662182437
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540426073
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2187
|
856 |
4 |
0 |
|u https://doi.org/10.1007/3-540-45416-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|