LEADER 01619nam0 22003371i 450 001 UON00267833 005 20231205103742.412 010 $a88-510-0266-5 100 $a20051014d2005 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aNuove ricerche archeologiche a Pompei ed Ercolano$eatti del convegno internazionale, Roma 28-30 novembre 2002$fa cura di Giovanni Guzzo, Maria Paola Guidobaldi 205 $aNapoli : Electa Napoli$b2005 210 $a395 p.$cill. ; 28 cm 215 $aIn testa al front.$cMinistero per i Beni e le Attivita' Culturali Soprintendenza Archeologica di Pompei 316 $aSoprintendenza Archeologica di Pompei$5IT-UONSI N 2POMPEI042/10 410 1$1001UON00133793$12001 $aStudi della Soprintendenza Archeologica di Pompei$v10 606 $aSCAVI ARCHEOLOGICI$xPompei$xCongressi$3UONC057352$2FI 606 $aSCAVI ARCHEOLOGICI$xErcolano$xCongressi$3UONC057353$2FI 620 $aIT$dNapoli$3UONL000012 676 $a937.07$cSTORIA DELL'IMPERO ROMANO FINO AL 476 d.C.$v21 702 1$aGUIDOBALDI$bMaria Paola$3UONV057413 702 1$aGUZZO$bPier Giovanni$3UONV056937 712 $aElecta Napoli$3UONV269883$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00267833 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI N 2 POMPEI 042 10 $eSI MC 29659 5 10 Soprintendenza Archeologica di Pompei 996 $aNuove ricerche archeologiche a Pompei ed Ercolano$9746062 997 $aUNIOR LEADER 06936nam 22007815 450 001 9910484897303321 005 20251226195932.0 010 $a1-280-38886-2 010 $a9786613566782 010 $a3-642-15651-7 024 7 $a10.1007/978-3-642-15651-9 035 $a(CKB)2670000000036416 035 $a(SSID)ssj0000446369 035 $a(PQKBManifestationID)11249871 035 $a(PQKBTitleCode)TC0000446369 035 $a(PQKBWorkID)10491960 035 $a(PQKB)11138435 035 $a(DE-He213)978-3-642-15651-9 035 $a(MiAaPQ)EBC3065636 035 $a(PPN)149031513 035 $a(EXLCZ)992670000000036416 100 $a20100810d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Safety, Reliability, and Security $e29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings /$fedited by Erwin Schoitsch 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 482 p. 197 illus.) 225 1 $aProgramming and Software Engineering,$x2945-9168 ;$v6351 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-15650-9 320 $aIncludes bibliographical references and index. 327 $aSession 1 -- Reliability Analysis of Safety-Related Communication Architectures -- A Novel HAZOP Study Approach in the RAMS Analysis of a Therapeutic Robot for Disabled Children -- Variability Management of Safety and Reliability Models: An Intermediate Model towards Systematic Reuse of Component Fault Trees -- QoS Analysis of Weighted Multi-state Probabilistic Networks via Decision Diagrams -- Session 2 -- Comparison between IEC 60880 and IEC 61508 for Certification Purposes in the Nuclear Domain -- Deriving Safety Cases for Hierarchical Structure in Model-Based Development -- Assurance of Automotive Safety ? A Safety Case Approach -- How to ?Survive? a Safety Case According to ISO 26262 -- Session 3 -- Benchmarking Software Requirements Documentation for Space Application -- Verifying Mode Consistency for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace -- Session 4 -- Residual Error Probability of Embedded CRC by Stochastic Automata -- ANB- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co-operative Integrated Traffic Management System -- 100% Coverage for Safety-Critical Software ? Efficient Testing by Static Analysis -- MODIFI: A MODel-Implemented Fault Injection Tool -- Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6 -- Overcoming Non-determinism in Testing Smart Devices: A Case Study -- Software Testing by People with Autism -- Session 7 -- Information Flow Analysis of Energy Management in a Smart Grid -- Integrated Cyber-Physical Fault Injection for Reliability Analysis of the Smart Grid -- A Metric for Measuring the Strength of Inter-dependencies -- Session 8 -- SecurityAnalysis of Open Building Automation Systems -- A UML Profile for Requirements Analysis of Dependable Software -- Session 9 -- Model-Based Safety Engineering of Interdependent Functions in Automotive Vehicles Using EAST-ADL2 -- Experiences in Applying Formal Verification in Robotics -- Evolving a Safe System Design Iteratively -- An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems -- Session 10 -- Development of High-Integrity Software Product Lines Using Model Transformation -- On the Safety Implications of E-Governance: Assessing the Hazards of Enterprise Information Architectures in Safety-Critical Applications -- The Right Degree of Configurability for Safety-Critical Embedded Software in Variable Message Signs -- INDEXYS, a Logical Step beyond GENESYS -- Session 11 -- Integrating System Modelling with Safety Activities -- Aspect-Oriented Implementation of Fault Tolerance: An Assessment of Overhead -- Invited Talks (Keynote Abstracts) -- System of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean and Mean). 330 $aComputers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the so-called ?embedded systems? (becoming more and more intelligent, networked and co-operating with each other, with humans and the environment) computers have invaded all aspects of daily life. New paradigms have arisen, like ubiquitous computing, systems-of-systems, energy and resource awareness, enormous complexity issues and the like, requiring a more holistic systems view as well. th So, after 31 years of SAFECOMP, the emphasis of the 29 event is on critical - bedded systems, which are almost omnipresent. Their impact on our lives, risks and challenges are often not well understood (underestimated or exaggerated). The p- mary issue is to cope with complexity, new failure modes and resource management, due to shrinking feature size, multi-core systems and management of multiple variants, while maintaining dependability properties and robustness. 410 0$aProgramming and Software Engineering,$x2945-9168 ;$v6351 606 $aSoftware engineering 606 $aData protection 606 $aComputer networks 606 $aAlgorithms 606 $aComputers and civilization 606 $aSoftware Engineering 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aAlgorithms 606 $aComputers and Society 615 0$aSoftware engineering. 615 0$aData protection. 615 0$aComputer networks. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aSoftware Engineering. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aAlgorithms. 615 24$aComputers and Society. 676 $a005.1 701 $aSchoitsch$b Erwin$01429222 712 12$aSAFECOMP (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484897303321 996 $aComputer safety, reliability, and security$94191371 997 $aUNINA