Abstract is missing.
- Decomposition of Fairness and Performance Aspects for High-Assurance Continuous Process-Control SystemsDongfeng Wang, Hui Ma, Farokh B. Bastani, I-Ling Yen. 3-11 [doi]
- Software Fault Tree Analysis for Product LinesJosh Dehlinger, Robyn R. Lutz. 12-21 [doi]
- Flexible Design of Complex High-Integrity Systems Using Trade OffsIain Bate, Neil C. Audsley. 22-31 [doi]
- Multi-View Modeling and Analysis of Embedded Real-Time Software with Meta-Modeling and Model TransformationZonghua Gu, Shige Wang, Sharath Kodase, Kang G. Shin. 32-41 [doi]
- Knowledge-Centric and Language Independent Framework for Safety Analysis ToolsS. C. Kothari, Luke Bishop, Jeremias Sauceda, Gary Daugherty. 45-55 [doi]
- Reducing Overfitting in Genetic Programming Models for Software Quality ClassificationYi Liu, Taghi M. Khoshgoftaar. 56-65 [doi]
- An Approach for Designing and Assessing Detectors for Dependable Component-Based SystemsArshad Jhumka, Martin Hiller, Neeraj Suri. 69-78 [doi]
- Decentralized Workload Management for Assurance According to Heterogeneous Service LevelsIvan Luque, Xiaodong Lu, Misato Tasaka, Kinji Mori, Yasushi Kuba. 79-88 [doi]
- Structural Analysis of Explicit Fault-Tolerant ProgramsStefan Gossens, Mario Dal Cin. 89-96 [doi]
- Multi-Function System Testing: Composition of Test SetsMark Sh. Levin, Mark Last. 99-108 [doi]
- Testing Large Scale Streaming Internet Applications over Wireless LANsPraveen Ikkurthy, John Shahbazian, Miguel A. Labrador, Kenneth J. Christensen. 109-115 [doi]
- Knowledge Management for Computational Intelligence SystemsRosina Weber, Duanqing Wu. 116-125 [doi]
- How Good Is Your Blind Spot Sampling Policy?Tim Menzies, Justin S. Di Stefano. 129-138 [doi]
- Assessing Reliability Risk Using Fault Correction ProfilesNorman F. Schneidewind. 139-148 [doi]
- Unsupervised Learning for Expert-Based Software Quality EstimationShi Zhong, Taghi M. Khoshgoftaar, Naeem Seliya. 149-155 [doi]
- A Method for Solving Trade-Off among Cost for Owned/Borrowed Resource and Loss of Business ChancesTetsuya Masuishi, Kinji Mori. 156-164 [doi]
- The SSP: An Example of High-Assurance Systems EngineeringGregory L. Wickstrom, Jared Davis, Steven E. Morrison, Steve Roach, Victor L. Winter. 167-177 [doi]
- Specification Test Coverage Adequacy Criteria = Specification Test Generation Inadequacy Criteria?Mats Per Erik Heimdahl, George Devaraj, Robert Weber. 178-186 [doi]
- RUBASTEM: A Method for Testing VHDL Behavioral ModelsAnneliese Amschler Andrews, Andrew O Fallon, Tom Chen. 187-196 [doi]
- A Formal Specification-Based Approach to Distributed Parallel ProgrammingChia-Chu Chiang. 197-205 [doi]
- Software Reliability Estimation under Uncertainty: Generalization of the Method of MomentsKaterina Goseva-Popstojanova, Sunil Kamavaram. 209-218 [doi]
- EM Algorithm for Discrete Software Reliability Models: A Unified Parameter Estimation MethodHiroyuki Okamura, Atsushi Murayama, Tadashi Dohi. 219-228 [doi]
- Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase ProtocolJan Jürjens. 231-240 [doi]
- Multiparty Computation with Full Computation Power and Reduced OverheadQingkai Ma, Wei Hao, I-Ling Yen, Farokh B. Bastani. 241-248 [doi]
- Resource-Sensitive Intrusion Detection Models for Network TrafficTaghi M. Khoshgoftaar, Mohamed E. Abushadi. 249-258 [doi]
- Investigating the Performance of Genetic Algorithm-Based Software Test Case GenerationDonald J. Berndt, Alison Watkins. 261-262 [doi]
- Automated Detection of Injected Faults in a Differential Equation SolverMark Last, Menahem Friedman. 263-264 [doi]
- Automated Detection of Injected Faults in a Differential Equation Solver Network Systems DevelopmentRichard C. Linger, Alan R. Hevner, Gwendolyn H. Walton, Mark G. Pleszkoch. 265-266 [doi]
- Function Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance SystemsRichard C. Linger, Mark G. Pleszkoch. 267-268 [doi]
- Architectural Overview of the Computational Intelligence Testing Tool: CI-ToolThomas Barr. 269-270 [doi]
- Evaluation of Software Development Tools for High Assurance Safety Critical SystemsAndrew J. Kornecki, Kimberley Hall, Darryl Hearn, Herman Lau, Janusz Zalewski. 273-274 [doi]
- Autonomous Rating Oriented Agent Allocation to Achieve High Response in Demand-Oriented Information Service SystemXiaodong Lu, Yi Zhou, Misato Tasaka, Ivan Luque, Kinji Mori, Ryuji Takanuki. 275-276 [doi]
- A Tool for Verification and Validation of Neural Network Based Adaptive Controllers for High Assurance SystemsPramod Gupta, Johann Schumann. 277-278 [doi]
- Combining Testing and Model Checking for Verification of High Assurance SystemsDejan Desovski. 279-280 [doi]
- Developing a Data Driven Prognostic System with Limited System InformationLaura Pullum, Marjorie Darrah, Spiro T. Skias, Kam S. Tso, Ann T. Tai. 281-282 [doi]
- Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC)Seo Ryong Koo, Poong-Hyun Seong, Sung Deok Cha. 283-284 [doi]
- Development of a Verification Method for Timed Function Blocks Using ESDT and SMVMyung Jun Song, Seo Ryong Koo, Poong-Hyun Seong. 285-286 [doi]
- A Study of Automatic Code Generation for Safety-Critical Software: Preliminary ReportLazar Crawford, Jared Erwin, Steafano Grimaldi, Soma Mitra, Andrew J. Kornecki, David P. Gluch. 287-288 [doi]
- A Formal Approach to Designing Secure Software ArchitecturesHuiqun Yu, Xudong He, Yi Deng, Lian Mo. 289-290 [doi]
- Managing Secure Survivable Critical Infrastructures to Avoid VulnerabilitiesFrederick T. Sheldon, Thomas E. Potok, Andy Loebl, Axel W. Krings, Paul W. Oman. 293-296 [doi]
- Adding Assurance to Automatically Generated CodeEwen Denney, Bernd Fischer, Johann Schumann. 297-299 [doi]
- KEEL Technology Applied to Highly Distributed Loosely Coupled SystemsTom Keeley. 300-301 [doi]
- A Rule-Based Component Customization Technique for QoS PropertiesJia Zhou, Kendra Cooper, I-Ling Yen. 302-303 [doi]
- State Oriented ProgrammingHideki Nomoto. 304-305 [doi]
- Towards Trusted Composition in Software DesignJing Dong, Sheng Yang. 306-307 [doi]
- Analyze the Worm-Based Attack in Large Scale P2PWei Yu. 308-309 [doi]
- Automating the Failure Modes and Effects Analysis of Safety Critical SystemsYiannis Papadopoulos, David Parker 0002, Christian Grante. 310-311 [doi]
- Enhancing Testability in Architectural Design for the New Generation of Core-Based Embedded SystemsMansour H. Assaf, Sunil R. Das, Emil M. Petriu, Mehmet Sahinoglu. 312-313 [doi]