Abstract is missing.
- A Method and a Technique to Model and Ensure Timeliness in Safety Critical Real-Time SystemsChristophe Aussaguès, Vincent David. 2-12 [doi]
- Evaluating the Performance of Group Membership ProtocolsOliver Suciu, Flaviu Cristian. 13-23 [doi]
- Inter-Completion Time Scheduling (ICTS): Non-Preemptive Scheduling to Maximize the Minimum Inter-Completion TimeCarlos C. Amaro, Alexander D. Stoyen, Sanjoy K. Baruah. 24-35 [doi]
- Metrics and Tool for System AssessmentGiacomo Bucci, Fabrizio Fioravanti, Paolo Nesi, Sandro Perlini. 36-46 [doi]
- Design Patterns in Petri Net System ModelingMartin Naedele, Jörn W. Janneck. 47-54 [doi]
- Building Soft Real-Time Monitors Based on Software ReuseM.-L. Hsu, T.-W. Kuo. 55-67 [doi]
- The Architecture Tradeoff Analysis MethodRick Kazman, Mark H. Klein, Mario Barbacci, Thomas A. Longstaff, Howard F. Lipson, S. Jeromy Carrière. 68-78 [doi]
- Open Complex Computer Systems are No Silver BulletTim O Neill, John Leaney. 79-86 [doi]
- Applying Slicing Technique to Software ArchitecturesJianjun Zhao. 87-99 [doi]
- An Approach to Specifying and Verifying Safety-Critical Systems with Practical Formal Method SOFLShaoying Liu, Masashi Asuka, Kiyotoshi Komaya, Yasuaki Nakamura. 100-114 [doi]
- Risk Assessment and Integrity in System DesignRaymond Berg, Victor L. Winter. 115-120 [doi]
- VP Reservation for Rapid Restoration Using MultiagentsYoshiaki Kakuda, Shin ichi Nagano, Tohru Kikuno, Masahiro Terabe. 121-128 [doi]