000 | 07232nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-540-48249-9 | ||
003 | DE-He213 | ||
005 | 20240423132508.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1999 gw | s |||| 0|eng d | ||
020 |
_a9783540482499 _9978-3-540-48249-9 |
||
024 | 7 |
_a10.1007/3-540-48249-0 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051230 _2bisacsh |
|
072 | 7 |
_aUMZ _2thema |
|
082 | 0 | 4 |
_a005.1 _223 |
245 | 1 | 0 |
_aComputer Safety, Reliability and Security _h[electronic resource] : _b18th International Conference, SAFECOMP'99, Toulouse, France, September 27-29, 1999, Proceedings / _cedited by Massimo Felici, Karama Kanoun, Alberto Pasquini. |
250 | _a1st ed. 1999. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c1999. |
|
300 |
_aXVIII, 490 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1698 |
|
505 | 0 | _aInvited Talk -- Software Reliability Engineering in Industry -- Assessment and Certification -- A Systematic Approach to Safety Case Maintenance -- SQUALE Dependability Assessment Criteria -- Assessment and Certification of Safety-Critical Digital Architectures — the ACRuDA Project -- Safety Assessment and Human Factors (Poster Session) -- Safety Evaluation of a Train Leader Telephone System -- Safety Analysis Techniques for Validating Formal Models during Verification -- Evaluating the Contribution of DesktopVR for Safety—Critical Applications -- Human Performance Reliability in the Design-for-Usability Life Cycle for Safety Human-Computer Interfaces -- The Impact of Different Media on Safety and Usability of Interactive ATC Applications -- Human Factors -- Patterns for Safer Human-Computer Interfaces -- Impact of Communication on Systems Dependability: Human Factors Perspectives -- A Method for Operator Error Detection Based on Plan Recognition -- Safety Assessment -- Hierarchically Performed Hazard Origin and Propagation Studies -- Hardware Redundant Vital Computers — Demonstration of Safety on the Basis of Current Standards -- Design for Safety (Poster Session) -- System and Software Safety Analysis for the ERA Control Computer -- Safety Markup Language: Concept and Application -- Extendable Ground-to-Air Communication Architecture for CoDySa -- Hierarchical Reliability and Safety Models of Fault Tolerant Distributed Industrial Control Systems -- The Development of a Commercial “Shrink-Wrapped Application” to Safety Integrity Level 2: the DUST-EXPERT™ Story -- Verification and Testing -- Safety Verification of ADA95 Programs Using Software Fault Trees -- Programming Rule Static Verification for Reliable Software -- Automated Black-Box Testing with Abstract VDM Oracle -- TowardsStatistical Control of an Industrial Test Process -- Design for Safety -- Choosing Effective Methods for Diversity — How to Progress from Intuition to Science -- A First Step Towards the Integration of Accident Reports and Constructive Design Documents -- A Holistic Design Concept to Improve Safety Related Control Systems -- Dependability Analysis and Evaluation -- Comparing Fault Trees and Bayesian Networks for Dependability Analysis -- FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems -- Structural Software Reliability Estimation -- Formal Methods and Security (Poster Session) -- Hazard Analysis in Formal Specification -- Modeling Safety-Critical Systems with Z and Petri Nets -- On Formal Languages for Sequences of Authorization Transformations -- Scheduling Fault-Tolerant Programs on Multiple Processors to Maximize Schedule Reliability -- Formal Methods -- Forma Design of Distributed Control Systems with Lustre -- Formal Specification and Development of a Safety-Critical Train Management System -- Formal Validation of the GUARDS Inter-consistency Mechanism -- A Graphical Environment for the Specification and Verification of Reactive Systems -- Security -- Dependability Requirements and Security Architectures for the Healthcare/Medical Sector -- Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature -- The Integration of Safety and Security Requirements. | |
520 | _aThe European Commission emphasizes, in its Fifth Research Framework, the “. . . emerging generic dependability requirements in the information society, stemming both from the ubiquity and volume of embedded and networked systems and services as well as from the global and complex nature of large scale information and communication infrastructures, from citizens, administrations and business in terms of technologies, tools, systems, applications and services". The series of Conference on Computer Safety, Reliability, and Security (Safecomp) contributes to satisfy these requirements by reviewing the state of the art, experiences, and new trends in the relevant scientific and industrial areas. Safecomp is intended to be a platform for technology transfer among academia, industry, and research institutions, providing the opportunity for exchange of ideas, opinions, and visions among experts. This year Safecomp celebrates the 20th anniversary, its first Conference having been organized in Stuttgart by EWICS (European Workshop on Industrial Computer Systems) in 1979, and we hope these Proceedings will contribute to the celebration by supporting Safecomp aims. The Proceedings include the 25 papers that have been presented orally at the Conference and the full version of the 14 papers that have been presented as posters, all of which were selected from 76 submissions. Papers almost uniformly take up Safecomp topics, dealing with the issues of Safety Assessment and Human Factors, Verification and Validation, Design for Safety, Formal Methods, and Security. | ||
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputer science. | |
650 | 0 | _aComputers, Special purpose. | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 1 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aComputer Science Logic and Foundations of Programming. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aIT Operations. |
700 | 1 |
_aFelici, Massimo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKanoun, Karama. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPasquini, Alberto. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540664888 |
776 | 0 | 8 |
_iPrinted edition: _z9783662210239 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1698 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/3-540-48249-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c188375 _d188375 |