Computer Safety, Reliability, and Security (Record no. 38576)

000 -LEADER
fixed length control field 06458nam a22005655i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783642156519
-- 978-3-642-15651-9
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
245 10 - TITLE STATEMENT
Title Computer Safety, Reliability, and Security
Sub Title 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings /
Statement of responsibility, etc edited by Erwin Schoitsch.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 2010.
300 ## - PHYSICAL DESCRIPTION
Number of Pages X, 482p. 197 illus.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Session 1 -- Reliability Analysis of Safety-Related Communication Architectures -- A Novel HAZOP Study Approach in the RAMS Analysis of a Therapeutic Robot for Disabled Children -- Variability Management of Safety and Reliability Models: An Intermediate Model towards Systematic Reuse of Component Fault Trees -- QoS Analysis of Weighted Multi-state Probabilistic Networks via Decision Diagrams -- Session 2 -- Comparison between IEC 60880 and IEC 61508 for Certification Purposes in the Nuclear Domain -- Deriving Safety Cases for Hierarchical Structure in Model-Based Development -- Assurance of Automotive Safety – A Safety Case Approach -- How to “Survive” a Safety Case According to ISO 26262 -- Session 3 -- Benchmarking Software Requirements Documentation for Space Application -- Verifying Mode Consistency for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace -- Session 4 -- Residual Error Probability of Embedded CRC by Stochastic Automata -- ANB- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co-operative Integrated Traffic Management System -- 100% Coverage for Safety-Critical Software – Efficient Testing by Static Analysis -- MODIFI: A MODel-Implemented Fault Injection Tool -- Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6 -- Overcoming Non-determinism in Testing Smart Devices: A Case Study -- Software Testing by People with Autism -- Session 7 -- Information Flow Analysis of Energy Management in a Smart Grid -- Integrated Cyber-Physical Fault Injection for Reliability Analysis of the Smart Grid -- A Metric for Measuring the Strength of Inter-dependencies -- Session 8 -- Security Analysis of Open Building Automation Systems -- A UML Profile for Requirements Analysis of Dependable Software -- Session 9 -- Model-Based Safety Engineering of Interdependent Functions in Automotive Vehicles Using EAST-ADL2 -- Experiences in Applying Formal Verification in Robotics -- Evolving a Safe System Design Iteratively -- An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems -- Session 10 -- Development of High-Integrity Software Product Lines Using Model Transformation -- On the Safety Implications of E-Governance: Assessing the Hazards of Enterprise Information Architectures in Safety-Critical Applications -- The Right Degree of Configurability for Safety-Critical Embedded Software in Variable Message Signs -- INDEXYS, a Logical Step beyond GENESYS -- Session 11 -- Integrating System Modelling with Safety Activities -- Aspect-Oriented Implementation of Fault Tolerance: An Assessment of Overhead -- Invited Talks (Keynote Abstracts) -- System of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean and Mean).
520 ## - SUMMARY, ETC.
Summary, etc Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the so-called “embedded systems” (becoming more and more intelligent, networked and co-operating with each other, with humans and the environment) computers have invaded all aspects of daily life. New paradigms have arisen, like ubiquitous computing, systems-of-systems, energy and resource awareness, enormous complexity issues and the like, requiring a more holistic systems view as well. th So, after 31 years of SAFECOMP, the emphasis of the 29 event is on critical - bedded systems, which are almost omnipresent. Their impact on our lives, risks and challenges are often not well understood (underestimated or exaggerated). The p- mary issue is to cope with complexity, new failure modes and resource management, due to shrinking feature size, multi-core systems and management of multiple variants, while maintaining dependability properties and robustness.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Software engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer software.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Software Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computers and Society.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Special Purpose and Application-Based Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schoitsch, Erwin.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-15651-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK9282 http://dx.doi.org/10.1007/978-3-642-15651-9 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha