default search action
HASE 2000: Albuquerque, NM, USA
- 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 15-17 November 2000, Albuquerque, NM, USA, Proceedings. IEEE Computer Society 2000, ISBN 0-7695-0927-4
- John H. Stichman:
Engineering ethics: principles and practical maxims. 3-4 - Hong Zhu, Xudong He:
Constructions of behaviour observation schemes in software testing. 7-16 - D. Todd Smith, Todd A. DeLong, Barry W. Johnson, Ted C. Giras:
Determining the expected time to unsafe failure. 17-24 - Tadashi Dohi, Katerina Goseva-Popstojanova, Kishor S. Trivedi:
Analysis of software cost models with rejuvenation. 25-34 - Myron Hecht, Yutao He, Herbert Hecht, Xuegao An:
Integration of system dependability and software reliability growth models for e-commerce systems. 35-42 - Ann Q. Gates:
How can symposia be structured to benefit both industry and academia? 45-46 - Daniel E. Cooke:
Issues concerning the future of computer science. 47-48 - Robyn R. Lutz:
Four areas of overlapping interest. 49-50 - John H. Stichman:
On how symposia can be structured to benefit academia and industry. 51-52 - Stefania Gnesi, Diego Latella, Mieke Massink:
A stochastic extension of a behavioural subset of UML statechart diagrams. 55-64 - Weiguo He, Steve Goddard:
Capturing an application's temporal properties with UML for Real-Time. 65-74 - Sang-Yeong Choi, Duminda Wijesekera:
The DADSim air defense simulation environment. 75-82 - Gábor Huszerl, István Majzik:
Quantitative analysis of dependability critical systems based on UML statechart models. 83-92 - John Rushby:
Disappearing formal methods. 95-96 - Gregory L. Wickstrom:
A flexible real-time architecture. 99-106 - James A. McCoy:
An embedded system for safe, secure and reliable execution of high consequence software. 107-114 - Antoine Requet, Ludovic Casset, Gilles Grimaud:
Application of the B formal method to the proof of a type verification algorithm. 115-124 - Iain Bate, Philippa Conmy, John A. McDermid:
Generating evidence for certification of modern processors for use in safety-critical systems. 125-134 - Lawrence A. King:
Do formal methods really belong in the toolbox of the practicing engineer? 137-139 - Gopal Gupta:
Reliable software construction: a logic programming based methodology. 140-141 - D. Kapur:
The use of formal methods in hardware and software cannot be abandoned. 142-143 - Monica Brockmeyer:
Automatic abstractions of real-time specifications. 147-158 - Rogério de Lemos:
Safety analysis of an evolving software architecture. 159-168 - Michele Cecconi, Enrico Tronci:
Requirements formalization and validation for a telecommunication equipment protection switcher. 169-176 - Steve Goddard, Kevin Jeffay:
The synthesis of real-time systems from processing graphs. 177-186 - Barbara J. Czerny, Joseph G. D'Ambrosio, Brian T. Murray:
Providing convincing evidence of safety in X-by-wire automotive systems. 189-192 - Tapan Kumar Ghoshal, S. Bhattacharya, K. Datta:
The experience of auditing software for safety critical railway signalling equipment. 193-196 - William Yurcik, David Tipper:
Providing guaranteed assurance to connection-oriented group communications using disjoint routing. 197-198 - Samuel Patton, Bryan Smith, David Doss, William Yurcik:
A layered framework strategy for deploying high assurance VPNs. 199-202 - Bernhard K. Aichernig, Andreas Gerstinger, Robert Aster:
Formal specification techniques as a catalyst in validation. 203-206 - Coskun Bayrak, Mehmet Sahinoglu, Timothy Cummings:
High assurance software testing in business and DoD. 207-211 - Kam S. Tso, Ann T. Tai, Leon Alkalai, Savio N. Chau, William H. Sanders:
GSU middleware architecture design. 212-215 - Larry J. Dalton:
First principles applied to software safety - the novel use of silicon machinery. 216-218 - Mario Dal Cin:
Structured language for specifications of quantitative requirements. 221-227 - Brenton Atchison, Peter A. Lindsay:
Safety validation of embedded control software using Z animation. 228-237 - Kerstin Buchacker:
Modeling with extended fault trees. 238-246 - Andrea Coccoli, Stefan Schemmer, Felicita Di Giandomenico, Michael Mock, Andrea Bondavalli:
Analysis of group communication protocols to assess quality of service properties. 247-256 - Yutao He, Herbert Hecht, Raymond A. Paul:
Measuring and assessing software test processes using test data. 259-264 - Farokh B. Bastani, Simeon C. Ntafos, I-Ling Yen, Doug E. Harris, Richard R. Morrow, Raymond A. Paul:
A high-assurance measurement repository system. 265-272 - Kinji Mori:
Assurance system architecture for information service by utilizing autonomous mobile agents. 273-280 - Zhiwei Xu, Taghi M. Khoshgoftaar, Edward B. Allen:
Prediction of software faults using fuzzy nonlinear regression modeling. 281-290 - Roger M. Kieckhafer, Mohammad H. Azadmanesh, Yongqin Hui:
On the sensitivity of NMR unreliability to non-exponential repair distributions. 293-300 - Taghi M. Khoshgoftaar, Ruqun Shan, Edward B. Allen:
Using product, process, and execution metrics to predict fault-prone software modules with classification trees. 301-310 - Alessandro F. Garcia, Delano M. Beder, Cecília M. F. Rubira:
An exception handling software architecture for developing fault-tolerant software. 311-320 - Bojan Cukic, Diwakar Chakravarthy:
Bayesian framework for reliability assurance of a deployed safety critical system. 321-329
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.