Abstract is missing.
- Systematic Design of Fault-Tolerant ComputersAlgirdas Avizienis. 3-18 [doi]
- Formal Verification of Safety Requirements on Complex SystemsCinzia Bernardeschi, Alessandro Fantechi, Stefania Gnesi. 21-30 [doi]
- Formal Specification of Safety-Critical Software with Z and Real-Time CSPMaritta Heisel, Carsten Sühl. 31-45 [doi]
- Safety Analysis Based on Object-oriented Modelling of Critical SystemsJanusz Górski, Bartosz Nowicki. 46-60 [doi]
- A Processor Architecture Designed to Faciliate the Safety Certification of Hard Real Time SystemsHans-Peter Meske, Wolfgang A. Halang. 61-70 [doi]
- Formal Verification as a Design Tool - The Transponder Lock ExampleReinhard Budde, Agathe Merceron, Karl-Heinz Sylla. 73-82 [doi]
- Acceptance Criteria for Critical Software Based on Testability Estimates and Test ResultsAntonia Bertolino, Lorenzo Strigini. 83-94 [doi]
- Developing Dependable Software Using Prototyping and Test-DiversityW. Kuhn, H. Selami. 95-104 [doi]
- Software Reliability Models and Test CoverageBruno Ciciani, Alberto Pasquini. 105-114 [doi]
- Defining the Unit Testing Level of Synchronous Data Flow ProgramsPascale Thévenod-Fosse, Christine Mazuet, Yves Crouzet. 115-125 [doi]
- Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?Jeffrey M. Voas, Frank Charron, Keith W. Miller. 126-135 [doi]
- Modeling Software Dependability Growth under Input Partition TestingYinong Chen, Jean Arlat. 136-145 [doi]
- An Holistic Approach to Dependability?Alberto Pasquini, Winfried Görke, Karama Kanoun, Antonio Rizzo. 149-154 [doi]
- Software-based critical systemsJean-Claude Laprie. 157-170 [doi]
- Systematic Development of Markov Models for the 1oo2D Programmable Electronic System Architecture - Analysis of Safety and AvailabilityWilliam M. Goble, Julia V. Bukowski, Aarnout C. Brombacher. 173-182 [doi]
- Failure Risk Estimation via Markov Software Usage ModelsWalter J. Gutjahr. 183-192 [doi]
- Design Methodologies and Systems SafetyDaniel E. Sniezek. 193-202 [doi]
- Reliability and Vulnerability Assessment as Decision Support during Purchase and Design of Complex, Technical SystemsRemi Eriksen, Terje Andersen, Claus Feyling, Hans-Joachim Petersen. 205-218 [doi]
- Safety Analysis and Evaluation of an Air Traffic Control Computing SystemNicolae Fota, Mohamed Kaâniche, Karama Kanoun, Alain Peytavin. 219-229 [doi]
- Creating Markov Models for Applications in the Process IndustryMichel Houtermans, William M. Goble, Aarnout C. Brombacher. 230-239 [doi]
- Specifying Railway Interlocking Requirements for Practical UseLars-Henrik Eriksson. 243-249 [doi]
- SIGAV, the Italian High Speed Railway Integrated Management System: Safety and Reliability OverviewG. Aprea, P. Colantuoni, P. Firpo, R. Lido, D. Pellegrino, M. Rapone, F. Senesi. 250-265 [doi]
- A Safe, Reliable Control and Supervisory System for Railway NetworksNeville Rowden. 266-275 [doi]
- Assessment and Certification Requirements in the European Railway IndustrySwapan Mitra, I. D. R. Shannon. 276-285 [doi]
- Failure Classification Schemes for Analysing System DependabilityChris W. Loftus, Fred Long, David Pugh, Ian Pyle. 289-298 [doi]
- Human Factors in High Integrity Software Development: a Field StudyJacqui Griffyth. 301-310 [doi]
- Human Factors in Safety-Critical Systems: An underestimated contribution?Stephen J. Westerman, G. Robert J. Hockey. 311-321 [doi]
- PERE: Evaluation and Improvement of Dependable ProcessesRobin Bloomfield, John Bowers, Luke Emmet, Stephen Viller. 322-331 [doi]
- Safety and Technology TransferZdzislaw Zurakowski. 332-342 [doi]
- Safety Case for the NERC Air Traffic Control SystemShoky Visram, Werner Artner, Philip Marsden. 345 [doi]
- Part 1: Customer Safety Requirements for the NERC Air Traffic Control SystemShoky Visram. 346-350 [doi]
- Part 2: Bringing the Safety Dimension into the System and the Software DevelopmentPhilip Marsden. 351-356 [doi]
- Part 3: Challenge and Effect of NERC on an Austrian CompanyWerner Artner. 357-361 [doi]
- Integrity Levels and their Application to Road Transport SystemsPeter H. Jesty, Keith M. Hobley. 365-374 [doi]
- Legal Sufficiency of Testing ProcessesClark Savage Turner, Debra J. Richardson, John L. King. 375-385 [doi]
- Application of Formal Methods in the Scope of IT-SecurityFrank Koob, Markus Ullmann, Stefan Wittmann. 389-394 [doi]
- Reliability and Security in Communication Software: PBX Systems and CSTA ApplicationsHerwig Stöckl. 395-403 [doi]
- Byzantine Agreement with Limited AuthenticationMalte Borcherding. 404-413 [doi]
- Implementation of a Security Policy in Distributed Safety Related I&C SystemsFerdinand J. Dafelmair. 414-424 [doi]