


default search action
30th SAFECOMP 2011: Naples, Italy
- Francesco Flammini

, Sandro Bologna, Valeria Vittorini:
Computer Safety, Reliability, and Security - 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings. Lecture Notes in Computer Science 6894, Springer 2011, ISBN 978-3-642-24269-4
Session 1: Ram Evaluation 1
- Peter T. Popov

, Gabriele Manno:
The Effect of Correlated Failure Rates on Reliability of Continuous Time 1-Out-of-2 Software. 1-14 - Simona Bernardi

, Francesco Flammini
, Stefano Marrone
, José Merseguer
, Camilla Papa, Valeria Vittorini:
Model-Driven Availability Evaluation of Railway Control Systems. 15-28
Session 2: Complex Systems Dependability 1
- Bastian Zimmer, Susanne Bürklen, Michael Knoop, Jens Höfflinger, Mario Trapp:

Vertical Safety Interfaces - Improving the Efficiency of Modular Certification. 29-42 - Pierre Bieber, Remi Delmas, Christel Seguin:

DALculus - Theory and Tool for Development Assurance Level Allocation. 43-56 - Jean-Paul Blanquart, Eric Armengaud

, Philippe Baufreton, Quentin Bourrouilh, Gerhard Griessnig, Martin Krammer, Odile Laurent, Joseph Machrouh, Thomas Peikenkamp, Cecile Schindler, Tormod Wien:
Towards Cross-Domains Model-Based Safety Process, Methods and Tools for Critical Embedded Systems: The CESAR Approach. 57-70
Session 3: Formal Verification 1
- Matthias Kuntz, Florian Leitner-Fischer, Stefan Leue:

From Probabilistic Counterexamples via Causality to Fault Trees. 71-84 - Richard Bonichon, Géraud Canet, Loïc Correnson, Eric Goubault, Emmanuel Haucourt, Michel Hirschowitz, Sébastien Labbé

, Samuel Mimram
:
Rigorous Evidence of Freedom from Concurrency Faults in Industrial Control Software. 85-98
Session 4: Risk and Hazard Analysis
- Massimo Felici, Valentino Meduri, Bjørnar Solhaug, Alessandra Tedeschi:

Evolutionary Risk Analysis: Expert Judgement. 99-112 - Roland Mader, Eric Armengaud, Andrea Leitner, Christian Kreiner, Quentin Bourrouilh, Gerhard Grießnig, Christian Steger, Reinhold Weiß:

Computer-Aided PHA, FTA and FMEA for Automotive Embedded Systems. 113-127
Session 5: Cybersecurity
- Antonio Bovenzi, Francesco Brancati, Stefano Russo

, Andrea Bondavalli
:
A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systems. 128-142 - Luigi Coppolino

, Salvatore D'Antonio, Ivano Alessandro Elia
, Luigi Romano:
Security Analysis of Smart Grid Data Collection Technologies. 143-156
Session 6: RAM Evaluation 2
- Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos

:
Modeling Aircraft Operational Reliability. 157-170 - Antonino Mazzeo

, Nicola Mazzocca
, Roberto Nardone
, Luca D'Acierno
, Bruno Montella
, Vincenzo Punzo
, Egidio Quaglietta
, Immacolata Lamberti, Pietro Marmo:
An Integrated Approach for Availability and QoS Evaluation in Railway Systems. 171-184
Session 7: Case Studies
- Richard Hawkins, Kester Dean Clegg, Robert Alexander, Tim Kelly:

Using a Software Safety Argument Pattern Catalogue: Two Case Studies. 185-198 - Luigi Coppolino

, Salvatore D'Antonio, Valerio Formicola
, Luigi Romano:
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study. 199-212 - Domenico Cotroneo, Domenico Di Leo, Roberto Natella

, Roberto Pietrantuono
:
A Case Study on State-Based Robustness Testing of an Operating System for the Avionic Domain. 213-227
Session 8: Formal Verification 2
- Matthew P. Webster

, Michael Fisher
, Neil Cameron, Mike Jump
:
Formal Methods for the Certification of Autonomous Unmanned Aircraft Systems. 228-242 - Eun-Young Kang

, Pierre-Yves Schobbens
, Paul Pettersson
:
Verifying Functional Behaviors of Automotive Products in EAST-ADL2 Using UPPAAL-PORT. 243-256
Poster Session
- Joachim Hillebrand

, Peter Reichenpfader, Irenka Mandic, Hannes Siegl, Christian Peer:
Establishing Confidence in the Usage of Software Tools in Context of ISO 26262. 257-269 - Rupert Schlick

, Wolfgang Herzner, Elisabeth Jöbstl:
Fault-Based Generation of Test Cases from UML-Models - Approach and Some Experiences. 270-283 - Giuseppe Lami

, Fabrizio Fabbrini, Mario Fusani:
ISO/IEC 15504-10: Motivations for Another Safety Standard. 284-295 - Kumiko Tadano, Jianwen Xiang, Masahiro Kawato, Yoshiharu Maeno:

Automatic Synthesis of SRN Models from System Operation Templates for Availability Analysis. 296-309 - Leonardo Aniello, Giuseppe Antonio Di Luna, Giorgia Lodi

, Roberto Baldoni:
A Collaborative Event Processing System for Protection of Critical Infrastructures from Cyber Attacks. 310-323 - Hananeh Aliee, Hamid R. Zarandi:

A Fault-Tolerant, Dynamically Scheduled Pipeline Structure for Chip Multiprocessors. 324-337 - Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders:

FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment. 338-354 - Federico Cruciani

, Enrico Vicario
:
Reducing Complexity of Data Flow Testing in the Verification of a IEC-62304 Flexible Workflow System. 355-368 - Giuseppe Bonifacio, Pietro Marmo, Antonio Orazzo, Ida Petrone, Luigi Velardi, Alessio Venticinque

:
Improvement of Processes and Methods in Testing Activities for Safety-Critical Embedded Systems. 369-382
Session 9: Formal Verification 3
- Alessandro Fantechi, Stefania Gnesi

:
On the Adoption of Model Checking in Safety-Related Software Industry. 383-396 - Dong-Ah Lee, Junbeom Yoo, Jang-Soo Lee:

Equivalence Checking between Function Block Diagrams and C Programs Using HW-CBMC. 397-408 - Laura Carnevali, Lorenzo Ridi, Enrico Vicario

:
A Framework for Simulation and Symbolic State Space Analysis of Non-Markovian Models. 409-422
Session 10: Optimization Methods
- Matthias Güdemann

, Frank Ortmeier:
Model-Based Multi-objective Safety Optimization. 423-436 - Ismail Assayad, Alain Girault, Hamoudi Kalla

:
Tradeoff Exploration between Reliability, Power Consumption, and Execution Time. 437-451
Session 11: Complex Systems Dependability 2
- Antonio Pecchia, Roberto Pietrantuono

, Stefano Russo
:
Criticality-Driven Component Integration in Complex Software Systems. 452-466 - Andrea Fiaschetti, Francesco Lavorato, Vincenzo Suraci

, Andi Palo, Andrea Taglialatela, Andrea Morgagni, Renato Baldelli, Francesco Flammini
:
On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems. 467-479

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














