Abstract is missing.
- High Assurance Life and DeathNorman E. Johnson. 2 [doi]
- Specification and Testing of High-Assurance SystemsDavid L. MacPherson. 8-15 [doi]
- Specifying fault tolerance in mission critical systemsTolety Siva Perraju, Satyendra Pal Rana, Susanta P. Sarkar. 24-31 [doi]
- Specifying timing constraints in real-time object-oriented systemsRamakrishna V. Vishnuvajjala, Wei-Tek Tsai, Ramin Mojdehbakhsh, Lynn Elliott. 32-39 [doi]
- A technique for validating Booch object-oriented designs from extensions to the Descartes specification languageRamkumar V. Pichai, Joseph E. Urban. 40 [doi]
- Computer security: the good, the bad and the uglyI-Ling Yen. 52-53 [doi]
- Ten practical techniques for high assurance systems engineeringV. T. Thomas. 55-56 [doi]
- Software on the edgeVictor L. Winter. 57 [doi]
- Ensuring quality in distributed multimedia systemsRaymond A. Paul, M. Farrukh Khan, Shahab Baqai, Arif Ghafoor. 60-67 [doi]
- Proving refinement transformations for deriving high-assurance softwareVictor L. Winter, James M. Boyle. 68-77 [doi]
- Investigating rare-event failure tolerance: reductions in future uncertaintyJeffrey M. Voas, Frank Charron, Keith W. Miller. 78-85 [doi]
- Applying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD)Roymond S. C. Shanahan. 86-92 [doi]
- Writing a user functional description for an Army software metrics support toolJosé M. Drake. 93 [doi]
- A new compositional method for condensed state-space verificationEric Y. T. Juan, Jeffrey J. P. Tsai, Tadao Murata. 104-111 [doi]
- Selecting and mapping test sequences from formal specifications of concurrent programsJian Chen, Richard H. Carver. 112 [doi]
- The Department of Defense Science and Technology (S&T) ProgramVirginia L. Castor. 130 [doi]
- Adaptive recovery for mobile environmentsNuno Neves, W. Kent Fuchs. 134-141 [doi]
- Fault injection experiments on real-time protocols using ORCHESTRAScott Dawson, Farnam Jahanian, Todd Mitton. 142-149 [doi]
- Policy-independent real-time operating system mechanisms for timing error detection, handling and monitoringDavid B. Stewart, Pradeep K. Khosla. 150-157 [doi]
- Transaction integration for reusable hard real-time componentsJeffrey J. P. Tsai, Bing Li, Eric Y. T. Juan. 166-175 [doi]
- Flow analysis for concurrent, reactive, real-time systemsRamakrishna V. Vishnuvajjala, Satish Subramanian, Wei-Tek Tsai, Ramin Mojdehbakhsh, Lynn Elliott. 176-183 [doi]
- Real-time multicast connection establishment over ATM networksSanghyun Ahn. 184 [doi]
- Active Multimedia Communication SystemsShi-Kuo Chang. 194 [doi]
- A framework for MLS interoperabilityMyong H. Kang, Judith N. Froscher, Ira S. Moskowitz. 198-205 [doi]
- A multiversion transaction scheduler for centralized multilevel secure database systemsThomas F. Keefe, Wei-Tek Tsai. 206-213 [doi]
- Impact of program transformation on software reliability assessmentFarokh B. Bastani, Bojan Cukic. 214-221 [doi]
- Software reliability growth analysis-application of NHPP models and its evaluationTakamasa Nara, Masahiro Nakata, Akihiro Ooishi. 222-227 [doi]
- Reliability prediction method for electronic systems: a comparative reliability assessment methodRichard Yu. 237 [doi]
- A tree-based classification model for analysis of a military software systemTaghi M. Khoshgoftaar, Edward B. Allen, Lofton A. Bullard, Robert Halstead, Gary P. Trio. 244 [doi]
- Using PVS to analyze hierarchical state-based requirements for completeness and consistencyMats Per Erik Heimdahl, Barbara J. Czerny. 252-262 [doi]
- A general approach to secure components compositionQi Shi, Ning Zhang. 263-286 [doi]
- Top-down development of real-time software specificationJyhjong Lin, David Chenho Kung, Pei Hsia. 271 [doi]
- Data flow transformations to detect results which are corrupted by hardware faultsHeidrun Engel. 279-251 [doi]