• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Computer safety, reliability and security :

پدید آورنده
of the 15th International conference on ..., SAFECOMP'96, Vienna, Austria, 23-25 October 1996 ; ed. Erwin Schoitsch ; org. Austrian research centre Seibersdorf.

موضوع

رده
QA76
.
76
.
R44
O384
1997

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3540760709
(Number (ISBN
9783540760702

NATIONAL BIBLIOGRAPHY NUMBER

Number
b547812

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Computer safety, reliability and security :
General Material Designation
[Book]
Other Title Information
proceedings
First Statement of Responsibility
of the 15th International conference on ..., SAFECOMP'96, Vienna, Austria, 23-25 October 1996 ; ed. Erwin Schoitsch ; org. Austrian research centre Seibersdorf.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
London ; Berlin ; Paris
Name of Publisher, Distributor, etc.
Springer
Date of Publication, Distribution, etc.
1997

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
XVII-424 p. ; 24 cm

CONTENTS NOTE

Text of Note
Invited Paper.- Systematic Design of Fault-Tolerant Computers.- Session 1: Formal Methods and Models.- Formal Verification of Safety Requirements on Complex Systems.- Formal Specification of Safety-Critical Software with Z and Real-Time CSP.- Safety Analysis Based on Object-oriented Modelling of Critical Systems.- A Processor Architecture Designed to Faciliate the Safety Certification of Hard Real Time Systems.- Session 2: Testing, V&V.- Formal Verification as a Design Tool - The Transponder Lock Example.- Acceptance Criteria for Critical Software Based on Testability Estimates and Test Results.- Developing Dependable Software Using Prototyping and Test-Diversity.- Software Reliability Models and Test Coverage.- Defining the Unit Testing Level of Synchronous Data Flow Programs.- Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?.- Modeling Software Dependability Growth under Input Partition Testing.- Round Table.- An Holistic Approach to Dependability?.- Invited Paper.- Software-based critical systems.- Session 3: Reliability and Safety Assessment.- Systematic Development of Markov Models for the 1oo2D Programmable Electronic System Architecture - Analysis of Safety and Availability.- Failure Risk Estimation via Markov Software Usage Models.- Design Methodologies and Systems Safety.- Session 4: Industrial Applications and Experience.- Reliability and Vulnerability Assessment as Decision Support during Purchase and Design of Complex, Technical Systems.- Safety Analysis and Evaluation of an Air Traffic Control Computing System.- Creating Markov Models for Applications in the Process Industry.- Session 5: Railway Applications and Experience.- Specifying Railway Interlocking Requirements for Practical Use.- SIGAV, the Italian High Speed Railway Integrated Management System: Safety and Reliability Overview.- A Safe, Reliable Control and Supervisory System for Railway Networks.- Assessment and Certification Requirements in the European Railway Industry.- Session 6: Management and Development.- Failure Classification Schemes for Analysing System Dependability.- Session 7: Human Factors.- Human Factors in High Integrity Software Development: A Field Study.- Human Factors in Safety-Critical Systems: An underestimated contribution?.- PERE: Evaluation and Improvement of Dependable Processes.- Safety and Technology Transfer.- Invited Paper.- Safety Case for the NERC Air Traffic Control System.- Session 8: The Safety Case Legal Aspects.- Integrity Levels and their Application to Road Transport Systems.- Legal Sufficiency of Testing Processes.- Session 9: Security.- Application of Formal Methods in the Scope of IT-Security.- Reliability and Security in Communication Software: PBX Systems and CSTA Applications.- Byzantine Agreement with Limited Authentication.- Implementation of a Security Policy in Distributed Safety Related I&C Systems - A Case Study.- Author Index.

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
76
.
R44
Book number
O384
1997

PERSONAL NAME - PRIMARY RESPONSIBILITY

of the 15th International conference on ..., SAFECOMP'96, Vienna, Austria, 23-25 October 1996 ; ed. Erwin Schoitsch ; org. Austrian research centre Seibersdorf.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Erwin Schoitsch
European Workshop on Industrial Computer Systems.

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival