標(biāo)題: Titlebook: Computer Safety, Reliability and Security; 18th International C Alberto Pasquini,Massimo Felici,Karama Kanoun Conference proceedings 1999 S [打印本頁(yè)] 作者: 手或腳 時(shí)間: 2025-3-21 18:39
書(shū)目名稱(chēng)Computer Safety, Reliability and Security影響因子(影響力)
書(shū)目名稱(chēng)Computer Safety, Reliability and Security影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Computer Safety, Reliability and Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Computer Safety, Reliability and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Computer Safety, Reliability and Security被引頻次
書(shū)目名稱(chēng)Computer Safety, Reliability and Security被引頻次學(xué)科排名
書(shū)目名稱(chēng)Computer Safety, Reliability and Security年度引用
書(shū)目名稱(chēng)Computer Safety, Reliability and Security年度引用學(xué)科排名
書(shū)目名稱(chēng)Computer Safety, Reliability and Security讀者反饋
書(shū)目名稱(chēng)Computer Safety, Reliability and Security讀者反饋學(xué)科排名
作者: guzzle 時(shí)間: 2025-3-21 21:37 作者: Allodynia 時(shí)間: 2025-3-22 02:16 作者: terazosin 時(shí)間: 2025-3-22 07:34 作者: forestry 時(shí)間: 2025-3-22 09:35 作者: 是貪求 時(shí)間: 2025-3-22 13:04
https://doi.org/10.1007/BFb0039443em, the corresponding safety case can be challenged by changing regulatory requirements, additional safety evidence and a changing design. In order to maintain an accurate account of the safety of the system, all such challenges must be assessed for their impact on the original safety argument. This作者: 是貪求 時(shí)間: 2025-3-22 18:16
Elementary transformation matrices,fe and its disposal, the dependability objectives assigned to it. The SQUALE criteria differ from traditional evaluation methods (security evaluation criteria, standards for the design, development and validation of safety critical systems), by: 1) their independence with respect to the application 作者: 繁殖 時(shí)間: 2025-3-22 21:36
https://doi.org/10.1007/BFb0039443d certification method for safety critical digital architectures for use in the guided transport industry. The assessment process and the criteria were tested in three case studies. This paper gives an overview on the underlying principles of two of these and discusses how the assessment according t作者: 策略 時(shí)間: 2025-3-23 02:27 作者: Scintigraphy 時(shí)間: 2025-3-23 08:08 作者: PAEAN 時(shí)間: 2025-3-23 13:00 作者: Culmination 時(shí)間: 2025-3-23 15:35 作者: CHURL 時(shí)間: 2025-3-23 20:18
Press Freedom and Broadcasting Liberties,tycritical systems. An evaluation of different options concerning the allocation of such media during the design of an application in the Air Traffic Control domain is shown to illustrate and clarify our approach. Particular attention is paid on how different choices in allocating tasks among air tr作者: Aggressive 時(shí)間: 2025-3-24 00:22 作者: Canyon 時(shí)間: 2025-3-24 02:31 作者: 勾引 時(shí)間: 2025-3-24 09:41 作者: Kernel 時(shí)間: 2025-3-24 13:46 作者: 柔軟 時(shí)間: 2025-3-24 17:58 作者: Ibd810 時(shí)間: 2025-3-24 19:29
From Public Service to Professionalism,ion on the International Space Station, supporting the assembly and external servicing of the Russian segment..The safety design concept and implementation of the ERA is described, in particular with respect to the central computer’s software design. A top-down analysis and specification process is 作者: 分期付款 時(shí)間: 2025-3-25 00:33 作者: CYN 時(shí)間: 2025-3-25 06:23
https://doi.org/10.1057/9781137499974 are based on analysis of operating cycle of aircraft. Implementation of CoDySa in practice presumes completing of the steps to modernize existing system. This paper presents further development of the CoDySa principles, namely ground-to-air communication architecture. Possibilities to upload safety作者: 慟哭 時(shí)間: 2025-3-25 10:10
Global Inequality and the Rise of the South,ily study the influence of different parameters in distributed systems. In this paper a hierarchical modelling approach of a distributed industrial control system is presented. In this sense, different fault tolerant techniques to be used are evaluated and different possible system configurations ar作者: Bravado 時(shí)間: 2025-3-25 12:33
Global Inequality and the Rise of the South, software engineering community. Amongst other things, the following are reported on and discussed: the use of formal methods; advisory systems as safety related systems; safety integrity levels and the general construction of DUST-EXPERT’s safety case; statistical testing checked by an “oracle” der作者: 爭(zhēng)論 時(shí)間: 2025-3-25 16:36 作者: Obsessed 時(shí)間: 2025-3-25 20:04 作者: 竊喜 時(shí)間: 2025-3-26 00:43
Human Performance Reliability in the Design-for-Usability Life Cycle for Safety Human-Computer Interperformance reliability can be assimilated in the design of Human- Computer Interface component of safety interactive systems. The benefits of this approach are an interface designed to reduce human errors in addition to a set of documents that allows application of human reliability analysis in licensing.作者: Mucosa 時(shí)間: 2025-3-26 04:37
Genetically Contaminated BALB/c Nude Miceidents. However, it is also important to balance the appeal of these techniques against a longer-term requirement that they actually support the tasks for which they are being developed. This paper, therefore, describes the problems that arose when two design teams attempted to validate the claimed 作者: 流浪 時(shí)間: 2025-3-26 11:26 作者: 難理解 時(shí)間: 2025-3-26 14:09
0302-9743 t by EWICS (European Workshop on Industrial Computer Systems) in 1979, and we hope these Proceedings will contribute to the celebration by supporting Safecomp aims. The Proceedings include the 978-3-540-66488-8978-3-540-48249-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Certainty 時(shí)間: 2025-3-26 19:50 作者: GRIN 時(shí)間: 2025-3-26 21:25
Hierarchical Reliability and Safety Models of Fault Tolerant Distributed Industrial Control Systemse studied. Two fault tolerant architectures for the distributed system nodes are explained and their influence in the whole system is evaluated. Also the benefits of using checkpointing techniques are presented. In order to do the hierarchical models we use stochastic activity networks and the UltraSAN tool.作者: 不朽中國(guó) 時(shí)間: 2025-3-27 02:45 作者: 宏偉 時(shí)間: 2025-3-27 08:31 作者: Altitude 時(shí)間: 2025-3-27 11:12 作者: 懸崖 時(shí)間: 2025-3-27 17:34
From Public Service to Professionalism,rements documents and the critical function list are the key documents in this process. Bottom-up analysis (FMECA) and test, on both subsystem and system level, are the basis for safety verification. A number of examples show the use of the approach and methods used.作者: 贊美者 時(shí)間: 2025-3-27 18:57
Global Inequality and the Rise of the South,, which is closer to human cognition than that obtained from a conventional approach. Potential improvements achieved by this SML-based method include efficient checking of information completeness, tracing of review issues, and reduction of clerical work in license review.作者: 指耕作 時(shí)間: 2025-3-27 23:28
Safety Analysis Techniques for Validating Formal Models during Verificationin this paper integrates traditional deductive and inductive analysis techniques with model checking, a form of formal verification. The aim is to provide the safety analyst with a rigorous approach for the validation of formal models.作者: 帶來(lái) 時(shí)間: 2025-3-28 03:33
Impact of Communication on Systems Dependability: Human Factors Perspectivesobal system dependability which rests on mechanisms such as error detection, recovery, and prevention (by anticipation and regulation). This study helps providing specifications for the design of systems efficiently supporting both human cooperation, and human ability to contribute to dependability.作者: 繁忙 時(shí)間: 2025-3-28 09:35
Hierarchically Performed Hazard Origin and Propagation Studiestrees, and can guarantee the consistency of results. HiP-HOPS is currently supported by a tool called the Safety Argument Manager (SAM). In this paper we introduce the method and we show how it has helped us analyse and improve the safety of a distributed brake-by-wire system for cars.作者: disciplined 時(shí)間: 2025-3-28 11:16
System and Software Safety Analysis for the ERA Control Computerrements documents and the critical function list are the key documents in this process. Bottom-up analysis (FMECA) and test, on both subsystem and system level, are the basis for safety verification. A number of examples show the use of the approach and methods used.作者: restrain 時(shí)間: 2025-3-28 15:51 作者: 先兆 時(shí)間: 2025-3-28 21:46 作者: Eeg332 時(shí)間: 2025-3-28 23:53 作者: fluffy 時(shí)間: 2025-3-29 03:16
Elementary transformation matrices,criteria, standards for the design, development and validation of safety critical systems), by: 1) their independence with respect to the application domains and industrial sectors, 2) their ability to address all dependability attributes, and 3) their progressiveness as a function of more or less strict requirements.作者: inhibit 時(shí)間: 2025-3-29 10:22 作者: 消音器 時(shí)間: 2025-3-29 13:18 作者: 大火 時(shí)間: 2025-3-29 16:37
Press Freedom and Broadcasting Liberties,Control domain is shown to illustrate and clarify our approach. Particular attention is paid on how different choices in allocating tasks among air traffic controllers affect usability and safety of operators’ interactions.作者: 不可知論 時(shí)間: 2025-3-29 21:00 作者: meritorious 時(shí)間: 2025-3-30 00:46
From Public Service to Professionalism,lfil the standard’s requirement. This paper analysis whether the standard’s requirement is consistent with the safety target or not, and whether the measure is suitable to meet the requirement. Alternative requirements and measures are recommended.作者: extrovert 時(shí)間: 2025-3-30 05:04
https://doi.org/10.1057/9781137499974tem. This paper presents further development of the CoDySa principles, namely ground-to-air communication architecture. Possibilities to upload safety-enhancing software components (.) are discussed together with scenarios of their use.作者: 肥料 時(shí)間: 2025-3-30 09:05 作者: Lipoprotein(A) 時(shí)間: 2025-3-30 13:46
Software Reliability Engineering in Industryility engineering is. Then we will discuss the current state of the practice; that is, how industry is using it. The current “best” way of practicing software reliability engineering will be discussed. Finally, we will outline some of the important open research questions; solutions to these problems hold great promise for further advances.作者: 基因組 時(shí)間: 2025-3-30 20:05 作者: Intruder 時(shí)間: 2025-3-30 22:55
Assessment and Certification of Safety-Critical Digital Architectures — the ACRuDA Projecte tested in three case studies. This paper gives an overview on the underlying principles of two of these and discusses how the assessment according to the ACRuDA framework promotes the cross-acceptance of certificates.作者: 致詞 時(shí)間: 2025-3-31 03:49
Safety Evaluation of a Train Leader Telephone Systemse hazards, and FMECA based on Message Sequence Charts to identify possible computer failures which can lead to this faulty information. Emphasis is put on drawing conclusions on the general applicability of these methods.作者: 場(chǎng)所 時(shí)間: 2025-3-31 06:19
The Impact of Different Media on Safety and Usability of Interactive ATC ApplicationsControl domain is shown to illustrate and clarify our approach. Particular attention is paid on how different choices in allocating tasks among air traffic controllers affect usability and safety of operators’ interactions.作者: Relinquish 時(shí)間: 2025-3-31 11:01
Patterns for Safer Human-Computer Interfacesguiding development of human-machine interfaces for safety-critical systems. We consider usability in the context of system safety and present a pattern language for developing safe human-machine interfaces.作者: 忘恩負(fù)義的人 時(shí)間: 2025-3-31 14:53
Hardware Redundant Vital Computers — Demonstration of Safety on the Basis of Current Standardslfil the standard’s requirement. This paper analysis whether the standard’s requirement is consistent with the safety target or not, and whether the measure is suitable to meet the requirement. Alternative requirements and measures are recommended.作者: 灰姑娘 時(shí)間: 2025-3-31 20:29
Extendable Ground-to-Air Communication Architecture for CoDySatem. This paper presents further development of the CoDySa principles, namely ground-to-air communication architecture. Possibilities to upload safety-enhancing software components (.) are discussed together with scenarios of their use.作者: Efflorescent 時(shí)間: 2025-3-31 22:09 作者: generic 時(shí)間: 2025-4-1 05:05