LEADER 07639nam 22007695 450 001 996466275803316 005 20200705002539.0 010 $a1-280-38886-2 010 $a9786613566782 010 $a3-642-15651-7 024 7 $a10.1007/978-3-642-15651-9 035 $a(CKB)2670000000036416 035 $a(SSID)ssj0000446369 035 $a(PQKBManifestationID)11249871 035 $a(PQKBTitleCode)TC0000446369 035 $a(PQKBWorkID)10491960 035 $a(PQKB)11138435 035 $a(DE-He213)978-3-642-15651-9 035 $a(MiAaPQ)EBC3065636 035 $a(PPN)149031513 035 $a(EXLCZ)992670000000036416 100 $a20100810d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Safety, Reliability, and Security$b[electronic resource] $e29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings /$fedited by Erwin Schoitsch 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 482 p. 197 illus.) 225 1 $aProgramming and Software Engineering ;$v6351 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-15650-9 320 $aIncludes bibliographical references and index. 327 $aSession 1 -- Reliability Analysis of Safety-Related Communication Architectures -- A Novel HAZOP Study Approach in the RAMS Analysis of a Therapeutic Robot for Disabled Children -- Variability Management of Safety and Reliability Models: An Intermediate Model towards Systematic Reuse of Component Fault Trees -- QoS Analysis of Weighted Multi-state Probabilistic Networks via Decision Diagrams -- Session 2 -- Comparison between IEC 60880 and IEC 61508 for Certification Purposes in the Nuclear Domain -- Deriving Safety Cases for Hierarchical Structure in Model-Based Development -- Assurance of Automotive Safety ? A Safety Case Approach -- How to ?Survive? a Safety Case According to ISO 26262 -- Session 3 -- Benchmarking Software Requirements Documentation for Space Application -- Verifying Mode Consistency for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace -- Session 4 -- Residual Error Probability of Embedded CRC by Stochastic Automata -- ANB- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co-operative Integrated Traffic Management System -- 100% Coverage for Safety-Critical Software ? Efficient Testing by Static Analysis -- MODIFI: A MODel-Implemented Fault Injection Tool -- Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6 -- Overcoming Non-determinism in Testing Smart Devices: A Case Study -- Software Testing by People with Autism -- Session 7 -- Information Flow Analysis of Energy Management in a Smart Grid -- Integrated Cyber-Physical Fault Injection for Reliability Analysis of the Smart Grid -- A Metric for Measuring the Strength of Inter-dependencies -- Session 8 -- Security Analysis of Open Building Automation Systems -- A UML Profile for Requirements Analysis of Dependable Software -- Session 9 -- Model-Based Safety Engineering of Interdependent Functions in Automotive Vehicles Using EAST-ADL2 -- Experiences in Applying Formal Verification in Robotics -- Evolving a Safe System Design Iteratively -- An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems -- Session 10 -- Development of High-Integrity Software Product Lines Using Model Transformation -- On the Safety Implications of E-Governance: Assessing the Hazards of Enterprise Information Architectures in Safety-Critical Applications -- The Right Degree of Configurability for Safety-Critical Embedded Software in Variable Message Signs -- INDEXYS, a Logical Step beyond GENESYS -- Session 11 -- Integrating System Modelling with Safety Activities -- Aspect-Oriented Implementation of Fault Tolerance: An Assessment of Overhead -- Invited Talks (Keynote Abstracts) -- System of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean and Mean). 330 $aComputers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the so-called ?embedded systems? (becoming more and more intelligent, networked and co-operating with each other, with humans and the environment) computers have invaded all aspects of daily life. New paradigms have arisen, like ubiquitous computing, systems-of-systems, energy and resource awareness, enormous complexity issues and the like, requiring a more holistic systems view as well. th So, after 31 years of SAFECOMP, the emphasis of the 29 event is on critical - bedded systems, which are almost omnipresent. Their impact on our lives, risks and challenges are often not well understood (underestimated or exaggerated). The p- mary issue is to cope with complexity, new failure modes and resource management, due to shrinking feature size, multi-core systems and management of multiple variants, while maintaining dependability properties and robustness. 410 0$aProgramming and Software Engineering ;$v6351 606 $aSoftware engineering 606 $aComputer security 606 $aComputer communication systems 606 $aAlgorithms 606 $aComputers and civilization 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aSoftware engineering. 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aSoftware Engineering/Programming and Operating Systems. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 676 $a005.1 702 $aSchoitsch$b Erwin$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Computer Safety, Reliability, and Security 906 $aBOOK 912 $a996466275803316 996 $aComputer Safety, Reliability, and Security$9772429 997 $aUNISA