Abstract is missing.
- Checking Modification ToleranceMario Dal Cin. 4-12 [doi]
- Formal Specification in Collaborative Design of Critical Software ToolsDavid Coppit, Kevin J. Sullivan. 13-20 [doi]
- Combining Various Solution Techniques for Dynamic Fault Tree Analysis of Computer SystemsRagavan Manian, Joanne Bechta Dugan, David Coppit, Kevin J. Sullivan. 21-28 [doi]
- Using Composition to Design Secure, Fault-Tolerant SystemsDuane E. Olawsky, Charles Payne, Thomas Sundquist, David Apostal, Todd Fine. 29 [doi]
- Log-Logistic Software Reliability Growth ModelSwapna S. Gokhale, Kishor S. Trivedi. 34-41 [doi]
- A Flexible Software Architecture for High Availability ComputingRavishankar K. Iyer, Zbigniew Kalbarczyk, Keith Whisnant, Saurabh Bagchi. 42-49 [doi]
- ROAFTS: A Middleware Architecture for Real-Time Object-Oriented Adaptive Fault Tolerance SupportK. H. Kim. 50 [doi]
- System Requirements and Analysis Issues for High Assurance SystemsGary Johnson, John Calvert, Kelly J. Hayhurst, John Janeri, Herbert Hecht. 60 [doi]
- Design Considerations in Boeing 777 Fly-By-Wire ComputersYing C. (Bob) Yeh. 64 [doi]
- Software Component IndependenceDenise M. Woit, David V. Mason. 74-81 [doi]
- Using Classification Trees for Software Quality Models: Lessons LearnedTaghi M. Khoshgoftaar, Edward B. Allen, Archana Naik, Wendell D. Jones, John P. Hudepohl. 82-89 [doi]
- The Application of Fuzzy Enhanced Case-Based Reasoning for Identifying Fault-Prone ModulesDonald F. Schenker, Taghi M. Khoshgoftaar. 90-97 [doi]
- Estimating the Number of Residual DefectsYashwant K. Malaiya, Jason Denton. 98 [doi]
- System Survivability through Security Bug ToleranceCalton Pu, Crispin Cowan. 108-108 [doi]
- Design for Constraint Violation Detection in Safety-Critical SystemsSatish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsai. 109-116 [doi]
- Fault and Leak Tolerance in Firewall EngineeringRobert N. Smith, Sourav Bhattacharya. 117 [doi]
- Verification in Concurrent Programming with Petri Nets Structural TechniquesKamel Barkaoui, Jean-François Pradat-Peyre. 124-133 [doi]
- Automatic Verification on the LargeFarn Wang, Pao-Ann Hsiung. 134-141 [doi]
- Incremental Development of a High Integrity Compiler: Experience from an Industrial DevelopmentSusan Stepney. 142-149 [doi]
- Specifying and Verifying Temporal Behavior of High Assurance Systems Using Reachability Tree LogicStephen J. H. Yang, Sam Lin, Jonathan Lee, William C. Chu. 150 [doi]
- Object-Oriented Software Testing: Some Research and DevelopmentDavid Chenho Kung, Pei Hsia, Yasufumi Toyoshima, Cris Chen, Jerry Gao. 158-165 [doi]
- Good Enough versus High Assurance Software Testing and Evaluation MethodsWilliam E. Howden. 166 [doi]
- Enhancing Competitiveness via a Public Fault & Failure Data Repository Dolores R. Wallace. 178 [doi]
- Analytical Partition of Software Components for Evolvable and Reliable MEMS Design ToolsCarol L. Hoover, Pradeep K. Khosla. 188-199 [doi]
- Predictable Safety in the Control of High Consequence SystemsJohn M. Covan, J. Arlin Cooper. 200-204 [doi]
- A Firewalling Scheme for Securing MPOA-Based Enterprise NetworksJun Xu, Mukesh Singhal. 205-208 [doi]
- Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification SchemeDiego Del Gobbo, Marcello R. Napolitano, John Callahan, Bojan Cukic. 209 [doi]
- Optimal Discrimination between Transient and Permanent FaultsM. Pizza, Lorenzo Strigini, Andrea Bondavalli, Felicita Di Giandomenico. 214-223 [doi]
- A New Heuristic to Discriminate between Transient and Intermittent FaultsFabrizio Grandoni 0002, Andrea Bondavalli, Silvano Chiaradonna. 224-231 [doi]
- Error and Failure Analysis of a UNIX ServerRonjeet Lal, Gwan S. Choi. 232-239 [doi]
- On-Chip Cache Memory ResilienceSeung H. Hwang, Gwan S. Choi. 240-247 [doi]
- Matching Software Fault Tolerance with Application NeedsEltefaat Shokri, Herbert Hecht. 248 [doi]
- In-Parameter-Order: A Test Generation Strategy for Pairwise TestingYu Lei, Kuo-Chung Tai. 254-261 [doi]
- Fast Antirandom (FAR) Test GenerationAnneliese Amschler Andrews, Andre Bai, Tom Chen, Charles Anderson, Amjad Hajjar. 262-269 [doi]
- Integrated Architectural Modeling and Analysis for High-Assurance Command and Control System DesignYi Deng, Jiacun Wang. 270-278 [doi]
- A Two-Version Approach for Real-Time Concurrency Control and RecoveryTei-Wei Kuo, Yuan-Ting Kao, LihChyun Shu. 279 [doi]
- Assurance of Transactions in Allied Heterogeneous Systems by Autonomous Decentralized System TechniquesHideo Hanamura, Kinji Mori. 288-295 [doi]
- Coordination of Engineering Design Agents for High Assurance in Complex Dynamic System DesignShashi Phoha, Eugene Eberbach, Eileen Peluso, Atilla P. Kiraly. 296-303 [doi]
- Agent Information Contracts within Virtual Private NetworksManuel Aparicio IV, Peter Herman, Wendy Stephens, Anuj K. Jain, Munindar P. Singh. 304-311 [doi]
- Human-Centered Virtual Machine of Problem Solving Agents, Software Agents, Intelligent Agents and ObjectsRajiv Khosla. 312 [doi]