SEHAS ' 03 International Workshop on Software Engineering for High Assurance Systems
暂无分享,去创建一个
[1] Andrew P. Moore,et al. Trustworthy Refinement Through Intrusion-Aware Design (TRIAD) , 2003 .
[2] Michael R. Lowry,et al. Verification and Validation of AI Systems that Control Deep-Space Spacecraft , 1997, ISMIS.
[3] Maarten Sierhuis,et al. Management of interdependencies in collaborative software development , 2003, 2003 International Symposium on Empirical Software Engineering, 2003. ISESE 2003. Proceedings..
[4] C. V. Ramamoorthy,et al. Performance Evaluation of Asynchronous Concurrent Systems Using Petri Nets , 1980, IEEE Transactions on Software Engineering.
[5] Sanjai Rayadurgam,et al. Test-sequence generation from formal requirement models , 2001, Proceedings Sixth IEEE International Symposium on High Assurance Systems Engineering. Special Topic: Impact of Networking.
[6] Hoyt Lougee,et al. SOFTWARE CONSIDERATIONS IN AIRBORNE SYSTEMS AND EQUIPMENT CERTIFICATION , 2001 .
[7] Richard N. Taylor,et al. A Component- and Message-Based Architectural Style for GUI Software , 1995, 1995 17th International Conference on Software Engineering.
[8] James I. McManus,et al. Handbook of Software Quality Assurance , 1987 .
[9] John Penix,et al. Verification of time partitioning in the DEOS scheduler kernel , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[10] Cliff B. Jones,et al. Systematic software development using VDM , 1986, Prentice Hall International Series in Computer Science.
[11] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[12] Steve King,et al. The Value of Verification: Positive Experience of Industrial Proof , 1999, World Congress on Formal Methods.
[13] David Lorge Parnas,et al. Requirements-based monitors for real-time systems , 2000, ISSTA '00.
[14] A. Hilton,et al. On Applying Software Development Best Practice to FPFAs in Safety Critical Systems , 2000, FPL.
[15] Dan Craigen,et al. Experience with formal methods in critical systems , 1994, IEEE Software.
[16] Editors , 1986, Brain Research Bulletin.
[17] Anthony Hall,et al. Seven myths of formal methods , 1990, IEEE Software.
[18] John McHugh,et al. A risk driven process model for the development of trusted systems , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[19] David Lorge Parnas,et al. A rational design process: How and why to fake it , 1986, IEEE Transactions on Software Engineering.
[20] John McHugh,et al. Managing Software Development for Survivable Systems , 2001, Ann. Softw. Eng..
[21] Daniel Gross,et al. From Non-Functional Requirements to Design through Patterns , 2001, Requirements Engineering.
[22] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[23] Nancy G. Leveson,et al. An investigation of the Therac-25 accidents , 1993, Computer.
[24] Jon G. Hall,et al. Mandated Requirements for Hardware / Software Combination in Safety-Critical Systems , 2002 .
[25] R. Valette,et al. Fuzzy Petri nets and linear logic , 1993, Proceedings of IEEE Systems Man and Cybernetics Conference - SMC.
[26] Kurt Jensen,et al. An Introduction to the Theoretical Aspects of Coloured Petri Nets , 1993, REX School/Symposium.
[27] Gavin Mooney,et al. Air vehicle Software Static Code Analysis Lessons Learnt , 2001 .
[28] Michael R. Lowry,et al. Formal Analysis of a Space-Craft Controller Using SPIN , 2001, IEEE Trans. Software Eng..
[29] Peter Amey. Logic versus Magic in Critical Systems , 2001, Ada-Europe.
[30] Ben L. Di Vito. High-automation proofs for properties of requirements models , 2000, International Journal on Software Tools for Technology Transfer.
[31] Bev Littlewood,et al. Validation of ultrahigh dependability for software-based systems , 1993, CACM.
[32] Klaus Pohl,et al. Adapting traceability environments to project-specific needs , 1998, CACM.
[33] Steve Easterbrook,et al. Formal methods for verification and validation of partial specifications: A case study , 1998, J. Syst. Softw..
[34] David Lorge Parnas,et al. An Invitation to Formal Methods , 1996, Computer.
[35] Carl K. Chang,et al. Robust requirements traceability for handling evolutionary and speculative change , 2002 .
[36] Dieter Hogrefe,et al. -Autolink- A Tool for the Automatic and Semi-Automatic Test Generation , 1997, FBT.
[37] Carl K. Chang,et al. Supporting event based traceability through high-level recognition of change events , 2002, Proceedings 26th Annual International Computer Software and Applications.
[38] F E O'Neill,et al. USE OF THE C LANGUAGE IN VEHICLE BASED SOFTWARE , 1998 .
[39] Peter G. Bishop,et al. The Practicalities of Goal-Based Safety Regulation , 2001 .
[40] Jonathan P. Bowen,et al. Seven More Myths of Formal Methods , 1994, FME.
[41] Anthony Hall. Using Formal Methods to Develop an ATC Information System , 1996, IEEE Softw..
[42] P. Kidwell,et al. The mythical man-month: Essays on software engineering , 1996, IEEE Annals of the History of Computing.
[43] Angelo Gargantini,et al. Using model checking to generate tests from requirements specifications , 1999, ESEC/FSE-7.
[44] Wil M.P. van der Aalst,et al. Putting Petri nets to work in Industry , 2002 .
[45] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[46] Frank Waters,et al. The B Book , 1971 .
[47] Ashish Tiwari,et al. Invisible formal methods for embedded control systems , 2003, Proc. IEEE.
[48] H. Penny Nii,et al. Blackboard systems: the blackboard model of problem solving and the evolution of blackboard architectures , 1995 .
[49] David S. Rosenblum,et al. Merging component models and architectural styles , 1998, ISAW '98.
[50] Peter Neumann,et al. Safeware: System Safety and Computers , 1995, SOEN.
[51] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[52] Nick Roussopoulos,et al. Timing Requirements for Time-Driven Systems Using Augmented Petri Nets , 1983, IEEE Transactions on Software Engineering.
[53] 蔡進發,et al. Monitoring and Debugging Distributed Real-Time Systems , 1993 .
[54] Xavier Franch,et al. Putting non-functional requirements into software architecture , 1998, Proceedings Ninth International Workshop on Software Specification and Design.
[55] Dino Mandrioli,et al. From formal models to formally based methods: an industrial experience , 1999, TSEM.
[56] Edsger W. Dijkstra,et al. A Discipline of Programming , 1976 .
[57] Mary Shaw,et al. Software architecture - perspectives on an emerging discipline , 1996 .
[58] Sung Deok Cha,et al. Safety analysis using coloured Petri nets , 1996, Proceedings 1996 Asia-Pacific Software Engineering Conference.
[59] John McHugh,et al. Life-Cycle Models for Survivable Systems , 2002 .
[60] W. Royce. Managing the development of large software systems: concepts and techniques , 2021, ICSE '87.
[61] John Penix,et al. Formal Analysis of the Remote Agent Before and After Flight , 2000 .
[62] Gerard J. Holzmann,et al. Validating requirements for fault tolerant systems using model checking , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.
[63] David Lorge Parnas,et al. Review of David L. Parnas' "Designing Software for Ease of Extension and Contraction" , 2004 .
[64] Andrew Taylor,et al. IT projects: sink or swim , 2000 .
[65] P. Merlin,et al. Recoverability of Communication Protocols - Implications of a Theoretical Study , 1976, IEEE Transactions on Communications.
[66] Harald Ruess,et al. Lazy Theorem Proving for Bounded Model Checking over Infinite Domains , 2002, CADE.