The SCEAS System
Navigation Menu

Conferences in DBLP

High-Assurance Systems (HASE) (hase)
1999 (conf/hase/1999)

  1. Ann Q. Gates, Patricia J. Teller
    DynaMICs: An Automated and Independent Software-FaultDetection Approach. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:11-19 [Conf]
  2. Monica Brockmeyer
    Using Modechart Modules for Testing Formal Specifications. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:20-26 [Conf]
  3. Wei-Tek Tsai, Weiguang Shao, Sanjai Rayadurgam, Jinbao Li, Raymond A. Paul
    Assurance-Based Y2K Testing. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:27-37 [Conf]
  4. Mario Dal Cin, Gábor Huszerl, Konstantinos Kosmidis
    Quantitative Evaluation of Dependability Critical Systems Based on Guarded Statechart Models. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:37-45 [Conf]
  5. Stefania Gnesi, Diego Latella, Mieke Massink
    Model Checking UML Statechart Diagrams Using JACK. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:46-55 [Conf]
  6. William E. McUmber, Betty H. C. Cheng
    UML-Based Analysis of Embedded Systems Using a Mapping to VHDL. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:56-63 [Conf]
  7. Andrea Bondavalli, Ivan Mura, István Majzik
    Automatic Dependability Analysis for Supporting Design Decisions in UML. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:64-0 [Conf]
  8. Damien Cailliau, Remy Bellenger
    The CorotInstrument's Software: Towards Intrinsically Reconfigurable Real-Time Embedded Processing Software in Space-Born Instruments. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:75-80 [Conf]
  9. James Kirby Jr., Myla Archer, Constance L. Heitmeyer
    Applying Formal Methods to an Information Security Device: An Experience Report. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:81-88 [Conf]
  10. Li Gong, Satya Dodda
    Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2). [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:89-0 [Conf]
  11. Ann T. Tai, Savio N. Chau, Leon Alkalai
    COTS-Based Fault Tolerance in Deep Space: Qualitative and Quantitative Analyses of a Bus Network Architecture. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:97-104 [Conf]
  12. Taghi M. Khoshgoftaar, Edward B. Allen
    Predicting Fault-Prone Software Modules in Embedded Systems with Classification Trees. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:105-0 [Conf]
  13. Raymond A. Paul, Ann T. Tai
    Building High-Assurance Systems Using COTS Components: Whether, Why, When and How? [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:115- [Conf]
  14. Savio N. Chau
    Experience of Using COTS Components for Deep Space Missions. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:116- [Conf]
  15. Isaac Levendel
    HASE in Wireless Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:117- [Conf]
  16. Lui Sha
    Using COTS Software in High Assurance Control Applications. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:118- [Conf]
  17. Jeffrey M. Voas
    COTS and High Assurance: An Oxymoron? [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:119-0 [Conf]
  18. Dolores R. Wallace, D. Richard Kuhn
    Lessons from 342 Medical Device Failures. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:123-131 [Conf]
  19. Barbara J. Czerny, Mats Per Erik Heimdahl
    Identifying Domain Axioms Using Binary Decision Diagrams. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:132-140 [Conf]
  20. Steve Goddard, Kevin Jeffay
    Analyzing the Real-Time Properties of a U.S. Navy Signal Processing System. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:141-150 [Conf]
  21. Enrico Tronci
    Formally Modeling a Metal Processing Plant and its Closed Loop Specifications. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:151-0 [Conf]
  22. I-Ling Yen, Biao Chen, Ing-Ray Chen
    Real-Time Atomic Transaction Processing Using Multi-Invariant Data Structure. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:161-168 [Conf]
  23. Isao Kaji, Yongdong Tan, Kinji Mori
    Autonomous Data Synchronization in Heterogeneous Systems to Assure the Transaction. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:169-178 [Conf]
  24. Haihong Zheng, Sourav Bhattacharya
    Look-Ahead Channel Reservation and Borrowing in Cellular Network System. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:179-0 [Conf]
  25. Jennifer Ren, Michel Cukier, Paul Rubel, William H. Sanders, David E. Bakken, David A. Karr
    Building Dependable Distributed Applications Using AQUA. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:189-196 [Conf]
  26. Alec Yasinsac, William A. Wulf
    A Framework for a Cryptographic Protocol Evaluation Workbench. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:197-206 [Conf]
  27. Carol L. Hoover, Jeffery P. Hansen, Philip Koopman, Sandeep Tamboli
    The Amaranth Framework: Probabilistic, Utility-Based Quality of Service Management for High-Assurance Computing. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:207-216 [Conf]
  28. Michael W. Whalen, Mats Per Erik Heimdahl
    On the Requirements of High-Integrity Code Generation. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:217-0 [Conf]
  29. Herbert Hecht
    What are the Most Critical Challenges to Integrating High Assurance Systems?. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:227-230 [Conf]
  30. Diego Del Gobbo, Bojan Cukic, Marcello R. Napolitano, Steve M. Easterbrook
    Fault Detectability Analysis for Requirements Validation of Fault Tolerant Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:231-238 [Conf]
  31. Paul Ammann, Paul E. Black
    A Specification-Based Coverage Metric to Evaluate Test Sets. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:239-248 [Conf]
  32. Tom Chen, Anneliese von Mayrhauser, Amjad Hajjar, Charles Anderson, Mehmet Sahinoglu
    How Much Testing is Enough? Applying Stopping Rules to Behavioral Model Testing. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:249-256 [Conf]
  33. Victor L. Winter
    A Synchronous Paradigm for Modeling Stable Reactive Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:257-0 [Conf]
  34. Victor L. Winter, Raymond Berg
    Software Systems: Consequence versus Functionality. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:269-270 [Conf]
  35. John M. Covan
    Why Modern Systems Should Minimize the Use of Safety Critical Software. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:271-271 [Conf]
  36. Larry J. Dalton
    An "in the limit" View. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:272-272 [Conf]
  37. Ben L. Di Vito
    Software Can Be Entrusted with High Consequence Functionality. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:273-272 [Conf]
  38. Jeffrey M. Voas
    A World Without Risks: Let Me Out! [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:274-274 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002