Abstract is missing.
- Engineering ethics: principles and practical maximsJohn H. Stichman. 3-4 [doi]
- Constructions of behaviour observation schemes in software testingHong Zhu, Xudong He. 7-16 [doi]
- Determining the expected time to unsafe failureD. Todd Smith, Todd A. DeLong, Barry W. Johnson, Ted C. Giras. 17-24 [doi]
- Analysis of software cost models with rejuvenationTadashi Dohi, Katerina Goseva-Popstojanova, Kishor S. Trivedi. 25-34 [doi]
- Integration of system dependability and software reliability growth models for e-commerce systemsMyron Hecht, Yutao He, Herbert Hecht, Xuegao An. 35-42 [doi]
- How can symposia be structured to benefit both industry and academia?Ann Q. Gates. 45-46 [doi]
- Issues concerning the future of computer scienceDaniel E. Cooke. 47-48 [doi]
- Four areas of overlapping interestRobyn R. Lutz. 49-50 [doi]
- On how symposia can be structured to benefit academia and industryJohn H. Stichman. 51-52 [doi]
- A stochastic extension of a behavioural subset of UML statechart diagramsStefania Gnesi, Diego Latella, Mieke Massink. 55-64 [doi]
- Capturing an application's temporal properties with UML for Real-TimeWeiguo He, Steve Goddard. 65-74 [doi]
- The DADSim air defense simulation environmentSang-Yeong Choi, Duminda Wijesekera. 75-82 [doi]
- Quantitative analysis of dependability critical systems based on UML statechart modelsHuszerl Gábor, Majzik István. 83-92 [doi]
- Disappearing formal methodsJohn Rushby. 95-96 [doi]
- A flexible real-time architectureGregory L. Wickstrom. 99-106 [doi]
- An embedded system for safe, secure and reliable execution of high consequence softwareJames A. McCoy. 107-114 [doi]
- Application of the B formal method to the proof of a type verification algorithmAntoine Requet, Ludovic Casset, Gilles Grimaud. 115-124 [doi]
- Generating evidence for certification of modern processors for use in safety-critical systemsIain Bate, Philippa Conmy, John A. McDermid. 125-134 [doi]
- Do formal methods really belong in the toolbox of the practicing engineer?Lawrence A. King. 137-139 [doi]
- Reliable software construction: a logic programming based methodologyGopal Gupta. 140-141 [doi]
- The use of formal methods in hardware and software cannot be abandonedD. Kapur. 142-143 [doi]
- Automatic abstractions of real-time specificationsMonica Brockmeyer. 147-158 [doi]
- Safety analysis of an evolving software architectureRogério de Lemos. 159-168 [doi]
- Requirements formalization and validation for a telecommunication equipment protection switcherMichele Cecconi, Enrico Tronci. 169-176 [doi]
- The synthesis of real-time systems from processing graphsSteve Goddard, Kevin Jeffay. 177-186 [doi]
- Providing convincing evidence of safety in X-by-wire automotive systemsBarbara J. Czerny, Joseph G. D'Ambrosio, Brian T. Murray. 189-192 [doi]
- The experience of auditing software for safety critical railway signalling equipmentTapan Kumar Ghoshal, S. Bhattacharya, K. Datta. 193-196 [doi]
- Providing guaranteed assurance to connection-oriented group communications using disjoint routingWilliam Yurcik, David Tipper. 197-198 [doi]
- A layered framework strategy for deploying high assurance VPNsSamuel Patton, Bryan Smith, David Doss, William Yurcik. 199-202 [doi]
- Formal specification techniques as a catalyst in validationBernhard K. Aichernig, Andreas Gerstinger, Robert Aster. 203-206 [doi]
- High assurance software testing in business and DoDCoskun Bayrak, Mehmet Sahinoglu, Timothy Cummings. 207-211 [doi]
- GSU middleware architecture designKam S. Tso, Ann T. Tai, Leon Alkalai, Savio N. Chau, William H. Sanders. 212-215 [doi]
- First principles applied to software safety - the novel use of silicon machineryLarry J. Dalton. 216-218 [doi]
- Structured language for specifications of quantitative requirementsMario Dal Cin. 221-227 [doi]
- Safety validation of embedded control software using Z animationBrenton Atchison, Peter A. Lindsay. 228-237 [doi]
- Modeling with extended fault treesKerstin Buchacker. 238-246 [doi]
- Analysis of group communication protocols to assess quality of service propertiesAndrea Coccoli, Stefan Schemmer, Felicita Di Giandomenico, Michael Mock, Andrea Bondavalli. 247-256 [doi]
- Measuring and assessing software test processes using test dataYutao He, Herbert Hecht, Raymond A. Paul. 259-264 [doi]
- A high-assurance measurement repository systemFarokh B. Bastani, Simeon Ntafos, I-Ling Yen, Doug E. Harris, Richard R. Morrow, Raymond A. Paul. 265-272 [doi]
- Assurance system architecture for information service by utilizing autonomous mobile agentsKinji Mori. 273-280 [doi]
- Prediction of software faults using fuzzy nonlinear regression modelingZhiwei Xu, Taghi M. Khoshgoftaar, Edward B. Allen. 281-290 [doi]
- On the sensitivity of NMR unreliability to non-exponential repair distributionsRoger M. Kieckhafer, Mohammad H. Azadmanesh, Yongqin Hui. 293-300 [doi]
- Using product, process, and execution metrics to predict fault-prone software modules with classification treesTaghi M. Khoshgoftaar, Ruqun Shan, Edward B. Allen. 301-310 [doi]
- An exception handling software architecture for developing fault-tolerant softwareAlessandro F. Garcia, Delano M. Beder, Cecília M. F. Rubira. 311-320 [doi]
- Bayesian framework for reliability assurance of a deployed safety critical systemBojan Cukic, Diwakar Chakravarthy. 321-329 [doi]