


default search action
HASE 1996: Niagara, Canada
- 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings. IEEE Computer Society 1996, ISBN 0-8186-7629-9

Keynote Speech
- Norman E. Johnson:

High Assurance Life and Death. 2-
Specification and Testing of High-Assurance Systems
- David L. MacPherson:

Specification and Testing of High-Assurance Systems. 8-15 - Tolety Siva Perraju, Satyendra Pal Rana, Susanta P. Sarkar:

Specifying fault tolerance in mission critical systems. 24-31 - Jyhjong Lin, David Chenho Kung, Pei Hsia:

Top-down development of real-time software specification. 271-278 - Ramakrishna V. Vishnuvajjala, Wei-Tek Tsai, Ramin Mojdehbakhsh, Lynn Elliott:

Specifying timing constraints in real-time object-oriented systems. 32-39 - Ramkumar V. Pichai, Joseph E. Urban:

A technique for validating Booch object-oriented designs from extensions to the Descartes specification language. 40-49
Panel I
- I-Ling Yen:

Computer security: the good, the bad and the ugly. 52-53 - V. T. Thomas:

Ten practical techniques for high assurance systems engineering. 55-56 - Victor L. Winter:

Software on the edge. 57-59
Quality and High-Assurance
- Raymond A. Paul, M. Farrukh Khan, Shahab Baqai, Arif Ghafoor:

Ensuring quality in distributed multimedia systems. 60-67 - Victor L. Winter, James M. Boyle:

Proving refinement transformations for deriving high-assurance software. 68-77 - Jeffrey M. Voas, Frank Charron, Keith W. Miller:

Investigating rare-event failure tolerance: reductions in future uncertainty. 78-85 - Roymond S. C. Shanahan:

Applying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD). 86-92 - José M. Drake:

Writing a user functional description for an Army software metrics support tool. 93-103
Concurrency and High-Assurance
- Eric Y. T. Juan, Jeffrey J. P. Tsai, Tadao Murata:

A new compositional method for condensed state-space verification. 104-111 - Jian Chen, Richard H. Carver:

Selecting and mapping test sequences from formal specifications of concurrent programs. 112-119
Keynote Speech
- Virginia L. Castor:

The Department of Defense Science and Technology (S&T) Program. 130-
High-Assurance Execution Environments
- Nuno Neves, W. Kent Fuchs:

Adaptive recovery for mobile environments. 134-141 - Scott Dawson, Farnam Jahanian, Todd Mitton:

Fault injection experiments on real-time protocols using ORCHESTRA. 142-149 - David B. Stewart, Pradeep K. Khosla:

Policy-independent real-time operating system mechanisms for timing error detection, handling and monitoring. 150-157 - Jeffrey J. P. Tsai, Bing Li, Eric Y. T. Juan:

Transaction integration for reusable hard real-time components. 166-175 - Ramakrishna V. Vishnuvajjala, Satish Subramanian, Wei-Tek Tsai, Ramin Mojdehbakhsh, Lynn Elliott:

Flow analysis for concurrent, reactive, real-time systems. 176-183 - Sanghyun Ahn:

Real-time multicast connection establishment over ATM networks. 184-197
Speech
- Shi-Kuo Chang:

Active Multimedia Communication Systems. 194-
Security, Reliability and High-Assurance
- Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz:

A framework for MLS interoperability. 198-205 - Thomas F. Keefe, Wei-Tek Tsai:

A multiversion transaction scheduler for centralized multilevel secure database systems. 206-213 - Farokh B. Bastani, Bojan Cukic:

Impact of program transformation on software reliability assessment. 214-221 - Takamasa Nara, Masahiro Nakata, Akihiro Ooishi:

Software reliability growth analysis-application of NHPP models and its evaluation. 222-227 - Richard Yu:

Reliability prediction method for electronic systems: a comparative reliability assessment method. 237-243
High-Assurance Potpourri
- Taghi M. Khoshgoftaar, Edward B. Allen, Lofton A. Bullard, Robert Halstead, Gary P. Trio:

A tree-based classification model for analysis of a military software system. 244-251 - Heidrun Engel:

Data flow transformations to detect results which are corrupted by hardware faults. 279- - Mats Per Erik Heimdahl, Barbara J. Czerny:

Using PVS to analyze hierarchical state-based requirements for completeness and consistency. 252-262 - Qi Shi, Ning Zhang:

A general approach to secure components composition. 263-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














