![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2005
- Nawal Addouche, Christian Antoine, Jacky Montmain
:
Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems. SAFECOMP 2005: 24-36 - Ruben Alexandersson, D. Krishna Chaitanya, Peter Öhman, Yasir Siraj:
A Technique for Fault Tolerance Assessment of COTS Based Systems. SAFECOMP 2005: 165-178 - George Bearfield, William Marsh
:
Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment. SAFECOMP 2005: 52-66 - Peter G. Bishop
, Robin E. Bloomfield, Sofia Guerra, Konstantinos Tourlas:
Justification of Smart Sensors for Nuclear Applications. SAFECOMP 2005: 194-207 - Edoardo Campagnano, Ester Ciancamerla, Michele Minichino, Enrico Tronci
:
Automatic Analysis of a Safety Critical Tele Control System. SAFECOMP 2005: 94-107 - Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea:
Safety Interfaces for Component-Based Systems. SAFECOMP 2005: 246-260 - Massimo Felici:
Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain. SAFECOMP 2005: 208-221 - Jose Antonio Fonseca, Jorge Rady de Almeida Jr.
:
CMMI RAMS Extension Based on CENELEC Railway Standard. SAFECOMP 2005: 1-12 - Tom Gilb:
Design Evaluation: Estimating Multiple Critical Performance and Cost Impacts of Designs. SAFECOMP 2005: 344-356 - Jose J. Gonzalez:
Towards a Cyber Security Reporting System - A Quality Improvement Process. SAFECOMP 2005: 368-380 - Martin Hall-May, Tim Kelly:
Defining and Decomposing Safety Policy for Systems of Systems. SAFECOMP 2005: 37-51 - Brahim Hamid
, Mohamed Mosbah
:
A Formal Model for Fault-Tolerance in Distributed Systems. SAFECOMP 2005: 108-121 - Denis Hatebur, Maritta Heisel:
Problem Frames and Architectures for Security Problems. SAFECOMP 2005: 390-404 - Wolfgang Herzner, Stephan Ramberger, Thomas Länger, Christian Reumann, Thomas Gruber, Christian Sejkora:
Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Software. SAFECOMP 2005: 81-93 - Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha:
Control and Data Flow Testing on Function Block Diagrams. SAFECOMP 2005: 67-80 - Anjali Joshi, Mats Per Erik Heimdahl:
Model-Based Safety Analysis of Simulink Models Using SCADE Design Verifier. SAFECOMP 2005: 122-135 - Monica Kristiansen:
Finding Upper Bounds for Software Failure Probabilities - Experiments and Results. SAFECOMP 2005: 179-193 - Zeshan Kurd, Tim P. Kelly:
Using Safety Critical Artificial Neural Networks in Gas Turbine Aero-Engine Control. SAFECOMP 2005: 136-150 - Bengt Ljungquist
, Thomas Thelin:
An IEC 62061 Compliant Safety System Design Method for Machinery. SAFECOMP 2005: 330-343 - Ola Løkberg, Øystein Skogstad:
Functional Apportioning of Safety Requirements on Railway Signalling Systems. SAFECOMP 2005: 289-302 - Robert Martinez, Torgeir Enkerud:
The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems. SAFECOMP 2005: 13-23 - Meine van der Meulen, Lorenzo Strigini, Miguel A. Revilla:
On the Effectiveness of Run-Time Checks. SAFECOMP 2005: 151-164 - Jan Henry Nyström, Philip W. Trinder, David J. King:
Are High-Level Languages Suitable for Robust Telecoms Software?. SAFECOMP 2005: 275-288 - Krzysztof Sacha:
Automatic Code Generation for PLC Controllers. SAFECOMP 2005: 303-316 - Terje Sivertsen, Rune Fredriksen, Atoosa P.-J. Thunem, Jan-Erik Holmberg, Janne Valkonen, Olli Ventä, Jan-Ove Andersson:
The TACO Approach for Traceability and Communication of Requirements. SAFECOMP 2005: 317-329 - Martin Skambraks:
A Safety-Related PES for Task-Oriented Real-Time Execution Without Asynchronous Interrupts. SAFECOMP 2005: 261-274 - Tage Stabell-Kulø, Simone Lupetti:
Public-Key Cryptography and Availability. SAFECOMP 2005: 222-232 - Atoosa P.-J. Thunem:
Security Research from a Multi-disciplinary and Multi-sectoral Perspective. SAFECOMP 2005: 381-389 - Lei Wang, Mingde Zhao, Zengwei Zheng, Zhaohui Wu:
End-To-End Worst-Case Response Time Analysis for Hard Real-Time Distributed Systems. SAFECOMP 2005: 233-245 - Qiang Yan, Huaying Shu:
The Application of an Object-Oriented Method in Information System Security Evaluation. SAFECOMP 2005: 357-367
skipping 1 more match
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 16:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint