


default search action
31st SAFECOMP 2012: Magdeburg, Germany
- Frank Ortmeier, Peter Daniel:

Computer Safety, Reliability, and Security - 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings. Lecture Notes in Computer Science 7612, Springer 2012, ISBN 978-3-642-33677-5
Session I: Tools
- Ewen Denney, Ganesh Pai:

A Lightweight Methodology for Safety Case Assembly. 1-12 - André Alexandersen Hauge, Ketil Stølen:

A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production. 13-24
Session II: Risk Analysis
- Silvia Gil Casals, Philippe Owezarski, Gilles Descargues:

Risk Assessment for Airworthiness Security. 25-36 - Christoph Läsche, Eckard Böde

, Thomas Peikenkamp:
A Method for Guided Hazard Identification and Risk Mitigation for Offshore Operations , . 37-48 - Manfred Schäfer:

Risk Analysis and Software Integrity Protection for 4G Network Elements in ASMONIA. 49-61
Session III: Testing
- Christoph Woskowski:

Applying Industrial-Strength Testing Techniques to Critical Care Medical Equipment. 62-73 - Viacheslav Izosimov, Urban Ingelsson, Andreas Wallin:

Requirement Decomposition and Testability in Development of Safety-Critical Automotive Components, . 74-86 - Jan Krause, Elke Hintze, Stephan Magnus, Christian Diedrich

:
Model Based Specification, Verification, and Test Generation for a Safety Fieldbus Profile. 87-98
Session IV: Quantitative Analysis
- Ernest Edifor, Martin Walker

, Neil A. Gordon
:
Quantification of Priority-OR Gates in Temporal Fault Trees. 99-110 - Michael Glaß

, Heng Yu
, Felix Reimann, Jürgen Teich:
Cross-Level Compositional Reliability Analysis for Embedded Systems. 111-124
Session V: Security
- Tobias Hoppe, Sven Kuhlmann, Stefan Kiltz, Jana Dittmann:

IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data. 125-136 - Hans-Hermann Bock, Jens Braband, Birgit Milius

, Hendrik Schäbe:
Towards an IT Security Protection Profile for Safety-Related Communication in Railway Automation. 137-148 - Felix Wieczorek, Christoph Krauß

, Frank Schiller, Claudia Eckert:
Towards Secure Fieldbus Communication. 149-160 - Andrey Zakonov, Anatoly Shalyto

:
Extracting EFSMs of Web Applications for Formal Requirements Specification. 161-172
Session VI: Formal Methods 1
- Irene Bicchierai, Giacomo Bucci, Carlo Nocentini, Enrico Vicario

:
An Ontological Approach to Systematization of SW-FMEA. 173-184 - Roberto Baldoni, Giorgia Lodi

, Luca Montanari, Guido Mariotta, Marco Rizzuto:
Online Black-Box Failure Prediction for Mission Critical Distributed Systems. 185-197 - Domenico Di Leo, Fatemeh Ayatolahi, Behrooz Sangchoolie, Johan Karlsson, Roger Johansson:

On the Impact of Hardware Faults - An Investigation of the Relationship between Workload Inputs and Failure Mode Distributions. 198-209
Session VII: Aeronautic
- Anton Tarasyuk, Inna Pereverzeva, Elena Troubitsyna, Timo Latvala, Laura Nummila:

Formal Development and Assessment of a Reconfigurable On-board Satellite System. 210-222 - Olof Hannius, Johan Karlsson:

Impact of Soft Errors in a Jet Engine Controller. 223-234 - Ludovic Pintard, Christel Seguin, Jean-Paul Blanquart:

Which Automata for Which Safety Assessment Step of Satellite FDIR? 235-246
Session VIII: Automotive
- Carl Bergenhem, Rolf Johansson, Henrik Lönn:

A Novel Modelling Pattern for Establishing Failure Models and Assisting Architectural Exploration in an Automotive Context. 247-257 - Ingo Stürmer, Elke Salecker, Hartmut Pohlheim:

Reviewing Software Models in Compliance with ISO 26262. 258-267 - Thomas Novak, Christoph Stoegerer:

Software Architecture of a Safety-Related Actuator in Traffic Management Systems. 268-278
Session IX: Formal Methods 2
- Philipp Helle, Michael Masin, Lev Greenberg:

Approximate Reliability Algebra for Architecture Optimization. 279-290 - Henning Günther, Stefan Milius, Oliver Möller:

On the Formal Verification of Systems of Synchronous Software Components. 291-304
Session X: Process
- Anaheed Ayoub, BaekGyu Kim

, Insup Lee, Oleg Sokolsky
:
A Systematic Approach to Justifying Sufficient Confidence in Software Safety Arguments. 305-316 - Martin Wildmoser, Jan Philipps, Oscar Slotosch:

Determining Potential Errors in Tool Chains - Strategies to Reach Tool Confidence According to ISO 26262. 317-327 - Bastian Zimmer, Susanne Bürklen, Jens Höfflinger, Mario Trapp, Peter Liggesmeyer:

Safety-Focused Deployment Optimization in Open Integrated Architectures. 328-339 - Fredrik Asplund

, Jad El-khoury, Martin Törngren
:
Qualifying Software Tools, a Systems Approach. 340-351
Session XI: Case Studies
- Rosana T. Vaccare Braga

, Onofre Trindade Júnior, Kalinka Regina Lucas Jaquie Castelo Branco, Luciano de Oliveira Neris, Jaejoon Lee
:
Adapting a Software Product Line Engineering Process for Certifying Safety Critical Embedded Systems. 352-363 - Mark-Alexander Sujan

, Massimo Felici:
Combining Failure Mode and Functional Resonance Analyses in Healthcare Settings. 364-375 - Tian Song, Deming Zhong, Hang Zhong:

A STAMP Analysis on the China-Yongwen Railway Accident. 376-387 - Rikard Land, Mikael Åkerholm, Jan Carlson

:
Efficient Software Component Reuse in Safety-Critical Systems - An Empirical Study. 388-399

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














