|
|
|
|
LEADER |
07561nam a2200613 4500 |
001 |
978-3-540-48249-9 |
003 |
DE-He213 |
005 |
20191023131818.0 |
007 |
cr nn 008mamaa |
008 |
121227s1999 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540482499
|9 978-3-540-48249-9
|
024 |
7 |
|
|a 10.1007/3-540-48249-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.758
|
072 |
|
7 |
|a UMZ
|2 bicssc
|
072 |
|
7 |
|a COM051230
|2 bisacsh
|
072 |
|
7 |
|a UMZ
|2 thema
|
072 |
|
7 |
|a UL
|2 thema
|
082 |
0 |
4 |
|a 005.1
|2 23
|
245 |
1 |
0 |
|a Computer Safety, Reliability and Security
|h [electronic resource] :
|b 18th International Conference, SAFECOMP'99, Toulouse, France, September 27-29, 1999, Proceedings /
|c edited by Massimo Felici, Karama Kanoun, Alberto Pasquini.
|
250 |
|
|
|a 1st ed. 1999.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 1999.
|
300 |
|
|
|a XVIII, 490 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 1698
|
505 |
0 |
|
|a Invited Talk -- Software Reliability Engineering in Industry -- Assessment and Certification -- A Systematic Approach to Safety Case Maintenance -- SQUALE Dependability Assessment Criteria -- Assessment and Certification of Safety-Critical Digital Architectures - the ACRuDA Project -- Safety Assessment and Human Factors (Poster Session) -- Safety Evaluation of a Train Leader Telephone System -- Safety Analysis Techniques for Validating Formal Models during Verification -- Evaluating the Contribution of DesktopVR for Safety-Critical Applications -- Human Performance Reliability in the Design-for-Usability Life Cycle for Safety Human-Computer Interfaces -- The Impact of Different Media on Safety and Usability of Interactive ATC Applications -- Human Factors -- Patterns for Safer Human-Computer Interfaces -- Impact of Communication on Systems Dependability: Human Factors Perspectives -- A Method for Operator Error Detection Based on Plan Recognition -- Safety Assessment -- Hierarchically Performed Hazard Origin and Propagation Studies -- Hardware Redundant Vital Computers - Demonstration of Safety on the Basis of Current Standards -- Design for Safety (Poster Session) -- System and Software Safety Analysis for the ERA Control Computer -- Safety Markup Language: Concept and Application -- Extendable Ground-to-Air Communication Architecture for CoDySa -- Hierarchical Reliability and Safety Models of Fault Tolerant Distributed Industrial Control Systems -- The Development of a Commercial "Shrink-Wrapped Application" to Safety Integrity Level 2: the DUST-EXPERT™ Story -- Verification and Testing -- Safety Verification of ADA95 Programs Using Software Fault Trees -- Programming Rule Static Verification for Reliable Software -- Automated Black-Box Testing with Abstract VDM Oracle -- Towards Statistical Control of an Industrial Test Process -- Design for Safety -- Choosing Effective Methods for Diversity - How to Progress from Intuition to Science -- A First Step Towards the Integration of Accident Reports and Constructive Design Documents -- A Holistic Design Concept to Improve Safety Related Control Systems -- Dependability Analysis and Evaluation -- Comparing Fault Trees and Bayesian Networks for Dependability Analysis -- FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems -- Structural Software Reliability Estimation -- Formal Methods and Security (Poster Session) -- Hazard Analysis in Formal Specification -- Modeling Safety-Critical Systems with Z and Petri Nets -- On Formal Languages for Sequences of Authorization Transformations -- Scheduling Fault-Tolerant Programs on Multiple Processors to Maximize Schedule Reliability -- Formal Methods -- Forma Design of Distributed Control Systems with Lustre -- Formal Specification and Development of a Safety-Critical Train Management System -- Formal Validation of the GUARDS Inter-consistency Mechanism -- A Graphical Environment for the Specification and Verification of Reactive Systems -- Security -- Dependability Requirements and Security Architectures for the Healthcare/Medical Sector -- Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature -- The Integration of Safety and Security Requirements.
|
520 |
|
|
|a The European Commission emphasizes, in its Fifth Research Framework, the ". . . emerging generic dependability requirements in the information society, stemming both from the ubiquity and volume of embedded and networked systems and services as well as from the global and complex nature of large scale information and communication infrastructures, from citizens, administrations and business in terms of technologies, tools, systems, applications and services". The series of Conference on Computer Safety, Reliability, and Security (Safecomp) contributes to satisfy these requirements by reviewing the state of the art, experiences, and new trends in the relevant scientific and industrial areas. Safecomp is intended to be a platform for technology transfer among academia, industry, and research institutions, providing the opportunity for exchange of ideas, opinions, and visions among experts. This year Safecomp celebrates the 20th anniversary, its first Conference having been organized in Stuttgart by EWICS (European Workshop on Industrial Computer Systems) in 1979, and we hope these Proceedings will contribute to the celebration by supporting Safecomp aims. The Proceedings include the 25 papers that have been presented orally at the Conference and the full version of the 14 papers that have been presented as posters, all of which were selected from 76 submissions. Papers almost uniformly take up Safecomp topics, dealing with the issues of Safety Assessment and Human Factors, Verification and Validation, Design for Safety, Formal Methods, and Security.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computer logic.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
1 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14045
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|0 http://scigraph.springernature.com/things/product-market-codes/I1603X
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I13030
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I24067
|
700 |
1 |
|
|a Felici, Massimo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Kanoun, Karama.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Pasquini, Alberto.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662210239
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540664888
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 1698
|
856 |
4 |
0 |
|u https://doi.org/10.1007/3-540-48249-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|