Tag #safety
473 papers:
- POPL-2020-FarzanV #proving #reduction
- Reductions for safety proofs (AF, AV), p. 28.
- POPL-2020-MathurMKMV #memory management #source code
- Deciding memory safety for single-pass heap-manipulating programs (UM, AM, PK, PM, MV0), p. 29.
- ICSA-2019-DajsurenL #analysis
- Safety Analysis Method for Cooperative Driving Systems (YD, GL), pp. 181–190.
- IFM-2019-OortwijnH19a #industrial #verification
- Formal Verification of an Industrial Safety-Critical Traffic Tunnel Control System (WO, MH), pp. 418–436.
- VS-Games-2019-ZahedWQ #education #game studies
- Play It Safe: An Educational Cyber Safety Game for Children in Elementary School (BTZ, GW, JQ), pp. 1–4.
- OOPSLA-2019-FernandoJM #approximate #canonical #parallel #source code #verification
- Verifying safety and accuracy of approximate parallel programs via canonical sequentialization (VF, KJ, SM), p. 29.
- PLATEAU-2019-KambhatlaCOSAM #case study #programming language #usability
- A Pilot Study of the Safety and Usability of the Obsidian Blockchain Programming Language (GK, MJC, RO, JS, JA, BAM), p. 11.
- SAS-2019-YanCSZZX #adaptation #analysis #verification
- Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis (HY, SC0, YS, YZ, CZ, JX), pp. 48–72.
- ASE-2019-Wu0C #case study #development #experience
- Better Development of Safety Critical Systems: Chinese High Speed Railway System Development Experience Report (ZW, JL0, XC), pp. 1216–1217.
- ESEC-FSE-2019-BanerjeeCS #java #named #null #type system
- NullAway: practical type-based null safety for Java (SB, LC, MS), pp. 740–750.
- ESEC-FSE-2019-Kwiatkowska #learning #robust
- Safety and robustness for deep learning with provable guarantees (keynote) (MK), p. 2.
- ICSE-2019-AgrawalKVRCL #reuse
- Leveraging artifact trees to evolve and reuse safety cases (AA, SK, MV, MR, JCH, RRL), pp. 1222–1233.
- ICSE-2019-HuangGLLQC0 #api #java #named
- SafeCheck: safety enhancement of Java unsafe API (SH, JG, SL, XL, YQ, KC, JH0), pp. 889–899.
- ASPLOS-2019-ZhangLJ #memory management #named
- BOGO: Buy Spatial Memory Safety, Get Temporal Memory Safety (Almost) Free (TZ, DL, CJ), pp. 631–644.
- CASE-2019-SchlotzhauerKWB #2d #collaboration #metric #on the
- On the trustability of the safety measures of collaborative robots: 2D Collision-force-map of a sensitive manipulator for safe HRC (AS, LK, JW, MB, MWH), pp. 1676–1683.
- CASE-2019-ThonnessenSFCK #quickcheck #testing #using
- Testing Safety PLCs Using QuickCheck (DT, NS, MF, KC, SK), pp. 1–6.
- FASE-2019-HuangK #constraints #security #verification
- Formal Verification of Safety & Security Related Timing Constraints for a Cooperative Automotive System (LH, EYK0), pp. 210–227.
- CAV-2019-BansalV #automaton
- Safety and Co-safety Comparator Automata for Discounted-Sum Inclusion (SB, MYV), pp. 60–78.
- ICST-2019-Wei #analysis
- AADL-Based Safety Analysis Approaches for Safety-Critical Systems (XW), pp. 481–482.
- FM-2018-KastnerMF #abstract interpretation #on the #security
- On Software Safety, Security, and Abstract Interpretation (DK, LM, CF), pp. 662–665.
- SEFM-2018-SchuppA #analysis #concurrent #hybrid #multi #thread
- Spread the Work: Multi-threaded Safety Analysis for Hybrid Systems (SS, EÁ), pp. 89–104.
- ICFP-2018-Campora0W #performance #type system
- Casts and costs: harmonizing safety and performance in gradual typing (JPCI, SC0, EW), p. 30.
- CIKM-2018-Kakar0SMTZRHSD #interactive #named
- DEVES: Interactive Signal Analytics for Drug Safety (TK, XQ0, AS, BM, HQT, BZ, EAR, LH, SKS, SD), pp. 1891–1894.
- KDD-2018-Janakiraman #learning #multi #using
- Explaining Aviation Safety Incidents Using Deep Temporal Multiple Instance Learning (VMJ), pp. 406–415.
- MoDELS-2018-NordmannM #assessment #component #fault #lessons learnt #modelling
- Lessons Learned from Model-Based Safety Assessment with SysML and Component Fault Trees (AN, PM), pp. 134–143.
- AdaEurope-2018-JaradatP #contract #design #runtime #using #verification
- Using Safety Contracts to Verify Design Assumptions During Runtime (OJ, SP), pp. 3–18.
- AdaEurope-2018-SljivoGCHP #component #reuse #specification
- Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation (IS, BG, JC, HH, SP), pp. 19–33.
- POPL-2018-Kuncar0 #higher-order
- Safety and conservativity of definitions in HOL and Isabelle/HOL (OK, AP0), p. 26.
- POPL-2018-PadonHLPSS #first-order #liveness #logic
- Reducing liveness to safety in first-order logic (OP, JH, GL, AP, MS, SS), p. 33.
- PPDP-2018-ContrastinOR #automation #data flow #datalog #order
- Automatic Reordering for Dataflow Safety of Datalog (MC, DAO, ACR), p. 17.
- SAS-2018-PrabhuMV #behaviour #learning #proving
- Efficiently Learning Safety Proofs from Appearance as well as Behaviours (SP, KM, RV), pp. 326–343.
- CSL-2018-AvronLL
- Safety, Absoluteness, and Computability (AA, SL, NL), p. 17.
- IFM-2017-BaxterC #algebra #bytecode #compilation #java
- Algebraic Compilation of Safety-Critical Java Bytecode (JB, AC), pp. 161–176.
- IFM-2017-Linker #higher-order #reasoning
- Spatial Reasoning About Motorway Traffic Safety with Isabelle/HOL (SL), pp. 34–49.
- SEFM-2017-MasciZJC #analysis #identification #requirements #user interface
- A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices (PM, YZ0, PLJ, JCC), pp. 284–299.
- CHI-PLAY-2017-HartIAOM #comprehension #game studies
- Understanding Engagement within the Context of a Safety Critical Game (JH, II, AA, MO, MM), pp. 253–264.
- VS-Games-2017-JacobNCR #adaptation #game studies
- Adaptivity and safety in location-based games (JTPNJ, RN, AC, RR0), pp. 173–174.
- ECIR-2017-CohanFGR #categorisation
- A Neural Attention Model for Categorizing Patient Safety Events (AC, AF, NG, RMR), pp. 720–726.
- KDD-2017-WangCWX
- No Longer Sleeping with a Bomb: A Duet System for Protecting Urban Safety from Dangerous Goods (JW, CC, JW, ZX), pp. 1673–1681.
- MoDELS-2017-DenneyPW #architecture #development #modelling
- Model-Driven Development of Safety Architectures (ED, GP, IW), pp. 156–166.
- AdaEurope-2017-CasimiroGR
- Enforcing Timeliness and Safety in Mission-Critical Systems (AC, IG, JR), pp. 53–69.
- AdaEurope-2017-RoyuelaMQP #ada #correctness
- OpenMP Tasking Model for Ada: Safety and Correctness (SR, XM, EQ, LMP), pp. 184–200.
- POPL-2017-KonnovLVW #algorithm #distributed #fault tolerance #liveness #verification
- A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms (IVK0, ML, HV, JW), pp. 719–734.
- POPL-2017-LangeNTY #liveness #programming
- Fencing off go: liveness and safety for channel-based programming (JL, NN, BT, NY), pp. 748–761.
- ASE-2017-RahimiXCL #problem
- Diagnosing assumption problems in safety-critical products (MR, WX, JCH, RRL), pp. 473–484.
- ICSE-2017-ChoudharyLP #concurrent #detection #generative #performance #testing #thread
- Efficient detection of thread safety violations via coverage-guided generation of concurrent tests (AC, SL, MP), pp. 266–277.
- CASE-2017-KhanFF #automation #framework #generative #logic
- Virtual engineering framework for automatic generation of control logic including safety (AK, PF, MF), pp. 648–653.
- CADE-2017-BrockschmidtJT0 #integer #proving #termination
- Certifying Safety and Termination Proofs for Integer Transition Systems (MB, SJCJ, RT, AY0), pp. 454–471.
- CAV-2017-HuangKWW #network #verification
- Safety Verification of Deep Neural Networks (XH0, MK, SW, MW), pp. 3–29.
- ICST-2017-DarkeCCV #abstraction #bound #model checking #performance #proving #using
- Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
- FM-2016-PeleskaH #modelling #testing
- Industrial-Strength Model-Based Testing of Safety-Critical Systems (JP0, WlH), pp. 3–22.
- IFM-2016-DarvasMV #verification
- Formal Verification of Safety PLC Based Control Software (DD, IM, EBV), pp. 508–522.
- IFM-2016-LuckcuckCW #formal method #java #paradigm
- A Formal Model of the Safety-Critical Java Level 2 Paradigm (ML, AC, AJW), pp. 226–241.
- IFM-2016-MullerMRSP #approach #component #hybrid #verification
- A Component-Based Approach to Hybrid Systems Safety Verification (AM0, SM, WR, WS, AP), pp. 441–456.
- SEFM-2016-BendikBBC #analysis #bound #order #requirements #set
- Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (JB, NB, JB, IC), pp. 121–136.
- VS-Games-2016-JiangCDJYZ #comprehension #game studies #process #prototype
- Game Prototype for Understanding Safety Issues of Life Boat Launching Process (MJ0, JC, MD, JJ, HjY, JJZ0), pp. 1–8.
- MoDELS-2016-Blache #bound #c #development #embedded #modelling #using
- Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
- PLDI-2016-PadonMPSS #interactive #named #verification
- Ivy: safety verification by interactive generalization (OP, KLM, AP, MS, SS), pp. 614–630.
- FSE-2016-GhassabaniGW #generative #induction #performance
- Efficient generation of inductive validity cores for safety properties (EG, AG, MWW), pp. 314–325.
- CAV-2016-PernsteinerLTTW #modelling #using
- Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers (SP, CL, ET, ZT, XW0, MDE, JJ), pp. 23–41.
- ICST-2016-EnoiuCSP #embedded #empirical #testing
- A Controlled Experiment in Testing of Safety-Critical Embedded Software (EPE, AC, DS, PP), pp. 1–11.
- QoSA-2015-Bozhinoski #adaptation #mobile #multi
- Managing Safety and Adaptability in Mobile Multi-Robot Systems (DB), pp. 135–140.
- FM-2015-BratBDGHK #verification
- Verifying the Safety of a Flight-Critical System (GB, DHB, MD, DG, FH, TK), pp. 308–324.
- FM-2015-DeboisHS #composition #information management #liveness #process #refinement #runtime
- Safety, Liveness and Run-Time Refinement for Modular Process-Aware Information Systems with Dynamic Sub Processes (SD, TTH, TS), pp. 143–160.
- FM-2015-KroeningLW #automaton #bound #model checking #proving
- Proving Safety with Trace Automata and Bounded Model Checking (DK, ML, GW), pp. 325–341.
- HCI-UC-2015-NakanishiTUYS
- Fukushima No. 1 Nuclear Power Plant: The Moment of “Safety Myth” Collapses (AN, TT, HU, MY, DS), pp. 350–357.
- HIMI-IKC-2015-LiangG #approach #information management #ontology #semantics #web
- Improving Knowledge Management in Patient Safety Reporting: A Semantic Web Ontology Approach (CL, YG), pp. 118–128.
- SEKE-2015-QinMDJ #case study #modelling
- Study on the Accident-causing Model Based on Safety Region and Applications in China Railway Transportation System (YQ, HM, MD, LJ), pp. 528–535.
- PLEASE-2015-Gallina #product line #reuse #towards
- Towards Enabling Reuse in the Context of Safety-Critical Product Lines (BG), pp. 15–18.
- SPLC-2015-DomisAB #analysis #modelling #tool support #uml #using #variability
- Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
- SPLC-2015-KassmeyerSS #impact analysis #process #variability
- A process to support a systematic change impact analysis of variability and safety in automotive functions (MK, MS, MS), pp. 235–244.
- AdaEurope-2015-JaradatBP #analysis #maintenance #using
- Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
- AdaEurope-2015-KhanfarLM #slicing
- Static Backward Program Slicing for Safety-Critical Systems (HK, BL, ANM), pp. 50–65.
- AdaEurope-2015-PerezGTT #clustering #concept #manycore
- A Safety Concept for an IEC-61508 Compliant Fail-Safe Wind Power Mixed-Criticality System Based on Multicore and Partitioning (JP, DG, ST, TT), pp. 3–17.
- PPDP-2015-ChenLJZL #automation #declarative #network #source code #verification
- Automated verification of safety properties of declarative networking programs (CC, LKL, LJ, WZ, BTL), pp. 79–90.
- SAS-2015-Brain0KS #invariant #verification
- Safety Verification and Refutation by k-Invariants and k-Induction (MB, SJ, DK, PS), pp. 145–161.
- ICSE-v2-2015-DenneyPH #assurance
- Dynamic Safety Cases for Through-Life Safety Assurance (ED, GJP, IH), pp. 587–590.
- SAC-2015-BurtonS #composition #mixin
- The safety of dynamic mixin composition (EB, ES), pp. 1992–1999.
- SAC-2015-ByunC #automation #constraints #operating system #testing #using
- Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
- CASE-2015-ForstnerM #optimisation #using
- Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
- DAC-2015-ChaariENTK #approach #modelling
- A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems (MC, WE, CN, BAT, TK), p. 6.
- DAC-2015-ShererRO #functional
- Ensuring functional safety compliance for ISO 26262 (ADS, JR, RO), p. 3.
- DATE-2015-HernandezA #low cost
- Low-cost checkpointing in automotive safety-relevant systems (CH, JA), pp. 91–96.
- ESOP-2015-DavidKL15a #reasoning #source code #termination
- Propositional Reasoning about Safety and Termination of Heap-Manipulating Programs (CD, DK, ML), pp. 661–684.
- TACAS-2015-NutzDMP #contest #memory management
- ULTIMATE KOJAK with Memory Safety Checks — (Competition Contribution) (AN, DD, MMM, AP), pp. 458–460.
- TACAS-2015-StroderAFHG #c #contest #memory management #named #source code #termination
- AProVE: Termination and Memory Safety of C Programs — (Competition Contribution) (TS, CA, FF, JH, JG), pp. 417–419.
- CAV-2015-BozzanoCGM #analysis #modelling #performance
- Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
- CAV-2015-BozzanoCPJKPRT #analysis #design
- Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
- CAV-2015-ZouFZM #automation #difference #equation #verification
- Automatic Verification of Stability and Safety for Delay Differential Equations (LZ, MF, NZ, PNM), pp. 338–355.
- VMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #testing #using
- Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
- ECSA-2014-GurbuzTE #architecture #design
- Safety Perspective for Supporting Architectural Design of Safety-Critical Systems (HGG, BT, NPE), pp. 365–373.
- WICSA-2014-UusitaloRKMM #architecture #automation #lessons learnt
- Lessons Learned from Safety-Critical Software-Based Automation Architectures of Nuclear Power Plants (EJU, MR, MK, VM, TM), pp. 45–48.
- SCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #thread
- C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
- CHI-2014-DunwellFPHALS #approach #game studies #learning
- A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
- CSCW-2014-WisniewskiXRC #online
- Adolescent online safety: the “moral” of the story (PJW, HX, MBR, JMC), pp. 1258–1271.
- DHM-2014-ButlewskiMC #development
- Non-financial Factors of Job Satisfaction in the Development of a Safety Culture Based on Examples from Poland and Romania (MB, AM, RC), pp. 577–587.
- DUXU-ELAS-2014-YangWW #multi
- Impact of Multi-sensory On-Bicycle Rider Assistance Devices on Rider Concentration and Safety (CYY, YTW, CTW), pp. 378–388.
- DUXU-TMT-2014-CorreiaSCBS #design #risk management
- Design as a Tool for Managing Risks and Vulnerabilities Regarding Artifacts of Public Safety (WC, SXdS, FC, MLNB, MMS), pp. 437–444.
- HCI-AS-2014-StelzerSO #novel #user interface
- Evaluating Novel User Interfaces in (Safety Critical) Railway Environments (AS, IS, AO), pp. 502–512.
- HIMI-AS-2014-AbujaradSDP #online
- Management of On-Line Registries Information for Patient Safety in Long-Term Care (FA, SJS, TAD, LAP), pp. 307–316.
- KDD-2014-KateCPK #mining #named
- FoodSIS: a text mining system to improve the state of food safety in singapore (KK, SC, AP, JK), pp. 1709–1718.
- SPLC-2014-LanduytbHMJMJBA #design #towards #variability
- Towards managing variability in the safety design of an automotive hall effect sensor (DVL, SOdb, AH, SM, WJ, SM, GdJ, OB, MA), pp. 304–309.
- AdaEurope-2014-ZhouLL #approach #embedded #requirements #validation
- A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
- PLDI-2014-HanxledenDMSMAMO #named
- SCCharts: sequentially constructive statecharts for safety-critical applications: HW/SW-synthesis for a conservative extension of synchronous statecharts (RvH, BD, CM, SS, MM, JA, SM, OO), p. 39.
- PPDP-2014-Ramsay #abstraction #recursion
- Exact Intersection Type Abstractions for Safety Checking of Recursion Schemes (SJR), pp. 175–186.
- SAS-2014-BrotherstonG #abduction #termination
- Cyclic Abduction of Inductively Defined Safety and Termination Preconditions (JB, NG), pp. 68–84.
- RE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #using
- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
- REFSQ-2014-NairVMTdB #analysis #problem #traceability
- Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
- FSE-2014-Kan #model checking #traceability #verification
- Traceability and model checking to support safety requirement verification (SK), pp. 783–786.
- SAC-2014-Gutierrez-GarciaG #multi #simulation
- Multi-agent simulation of perception of safety from crime (JOGG, AGdSG), pp. 573–578.
- CASE-2014-KaiS #development
- Development of a velocity and contact force-based mechanical safety device for service robots (YK, SS), pp. 1188–1193.
- CASE-2014-RahmanCBM #approach #assessment
- Ex-ante assessment of struck-by safety hazards in construction projects: A motion-planning approach (MMR, TC, LB, AM), pp. 277–282.
- DAC-2014-HernandezA #detection #fault #named
- LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
- DAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #state of the art #using
- Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
- DAC-2014-Rodriguez-NavasSHNLL #approach #automation #functional #specification #verification
- Automated Specification and Verification of Functional Safety in Heavy-Vehicles: the VeriSpec Approach (GRN, CCS, HH, MN, OL, HL), p. 4.
- DATE-2014-IliasovASM #design #refinement
- Design of safety critical systems by refinement (AI, AA, DS, AM), pp. 1–4.
- DATE-2014-NuzzoFIS #contract #cyber-physical #design #protocol
- Contract-based design of control protocols for safety-critical cyber-physical systems (PN, JBF, AI, ALSV), pp. 1–4.
- DATE-2014-PandeyV #analysis #fault
- Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
- TACAS-2014-ChenCFNO #proving
- Proving Nontermination via Safety (HYC, BC, CF, KN, PWO), pp. 156–171.
- TACAS-2014-Kupferman
- Variations on Safety (OK), pp. 1–14.
- CAV-2014-DilligDC #memory management #synthesis
- Optimal Guard Synthesis for Memory Safety (TD, ID, SC), pp. 491–507.
- IJCAR-2014-StroderGBFFHS #memory management #pointer #proving #source code #termination
- Proving Termination and Memory Safety for Programs with Pointer Arithmetic (TS, JG, MB, FF, CF, JH, PSK), pp. 208–223.
- VMCAI-2014-BloemKS #satisfiability #specification #synthesis
- SAT-Based Synthesis Methods for Safety Specs (RB, RK, MS), pp. 1–20.
- VMCAI-2014-BozgaIK #integer #problem #source code
- Safety Problems Are NP-complete for Flat Integer Programs with Octagonal Loops (MB, RI, FK), pp. 242–261.
- VMCAI-2014-KiniV #automaton #ltl #probability #specification
- Probabilistic Automata for Safety LTL Specifications (DK, MV), pp. 118–136.
- VS-Games-2013-HerpersSVSFHSH #automation #evaluation #tool support
- Vr-Based Safety Evaluation of Automatically Controlled Machine Tools (RH, DS, MV, TS, SF, TH, MS, MH), pp. 1–4.
- DHM-HB-2013-HartwigW #health #persuasion
- Safety and Health at Work through Persuasive Assistance Systems (MH, AW), pp. 40–49.
- DHM-SET-2013-Bretschneider-Hagemes #aspect-oriented #health
- AmI-Technology at Work — A Sociological Perspective Covering Aspects of Occupational Safety and Health (OSH) (MBH), pp. 289–296.
- DHM-SET-2013-LuL #design #modelling
- Constructing Ergonomic Safety Modelling for Evaluating New Designs of Child Car Seats (CYL, HHL), pp. 338–347.
- DHM-SET-2013-SunNHMDJMQ #adaptation #design #interactive #physics
- Adaptive User-Centered Design for Safety and Comfort of Physical Human Nursing — Care Robot Interaction (MS, HN, SH, KM, MD, CaJ, TM, GQ), pp. 365–372.
- DHM-SET-2013-YangYF #using
- Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
- DUXU-NTE-2013-AbujaradSDP #monitoring
- Rap Backs: Continuous Workforce Monitoring to Improve Patient Safety in Long-Term Care (FA, SJS, TAD, LAP), pp. 3–9.
- DUXU-NTE-2013-IbrahimABSBL
- Safety of Natural Disasters (LFI, RA, SB, RS, MB, TAAL), pp. 85–94.
- HCI-AMTE-2013-FearyBCHLSS #design #evaluation #interface
- Linking Context to Evaluation in the Design of Safety Critical Interfaces (MF, DB, XC, AH, RLL, LS, SPS), pp. 193–202.
- HCI-AS-2013-HuaG #comprehension #difference #evaluation #predict #protocol #usability
- Usability Evaluation of a Voluntary Patient Safety Reporting System: Understanding the Difference between Predicted and Observed Time Values by Retrospective Think-Aloud Protocols (LH, YG), pp. 94–100.
- HIMI-HSM-2013-ArimaUA
- Supporting Residents Evacuation and Safety Inquiry in Case of Disaster (MA, TU, MA), pp. 443–452.
- HIMI-HSM-2013-Campbell #simulation #using
- Safety Culture: An Examination of the Relationship between a Safety Management System and Pilot Judgment Using Simulation in Aeronautics (SAC), pp. 453–459.
- HIMI-HSM-2013-KarashimaN #behaviour
- Influence of the Safety Margin on Behavior that Violates Rules (MK, HN), pp. 497–506.
- HIMI-HSM-2013-SavoyM #flexibility #interactive
- A Precursory Look at Potential Interaction Objectives Affecting Flexible Robotic Cell Safety (AS, AM), pp. 198–206.
- KDIR-KMIS-2013-BachmannNMBAC #information management #process
- Preservation and Redeployment of Sensor Acquisition Processes from a Dam Safety Information System (AB, MAN, HM, JB, GA, AC), pp. 490–495.
- KEOD-2013-TimonenPT #fuzzy #modelling #ontology #using
- Using Associations and Fuzzy Ontologies for Modeling Chemical Safety Information (MT, AP, TT), pp. 26–37.
- MoDELS-2013-VaraP #metamodelling #named #standard
- SafetyMet: A Metamodel for Safety Standards (JLdlV, RKPW), pp. 69–86.
- SPLC-2013-SchulzeMB #functional #question #variability
- Functional safety and variability: can it be brought together? (MS, JM, DB), pp. 236–243.
- AdaEurope-2013-AsensioLCN #analysis #approach #execution #worst-case
- Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
- AdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #using
- Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
- AdaEurope-2013-SalazarAMP #ada #framework #modelling #realtime
- A Model-Based Framework for Developing Real-Time Safety Ada Systems (ES, AA, MAdM, JAdlP), pp. 127–142.
- HILT-2013-LarsonHFD #fault #modelling #using
- Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
- HILT-2013-Taft #concurrent #named #parallel #proving #source code #thread #tutorial
- Tutorial: proving safety of parallel / multi-threaded programs (STT), pp. 1–2.
- RE-2013-GuillermDS
- A safety requirement engineering method and tool (RG, HD, NS), pp. 328–329.
- RE-2013-Nair #assurance #certification
- Evidence management for evolutionary safety assurance and certification (SN), pp. 385–388.
- SAC-PL-J-2010-PopeeaC13 #analysis #debugging #proving
- Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
- SAC-2013-BrunsKB
- Virtualization for safety-critical, deeply-embedded devices (FB, DK, AB), pp. 1485–1492.
- SAC-2013-NotanderRH #design #development #flexibility #framework #modelling
- A model-based framework for flexible safety-critical software development: a design study (JPN, PR, MH), pp. 1137–1144.
- DATE-2013-AbdullaDRSZ #hybrid #liveness #memory management #transaction #verification
- Verifying safety and liveness for the FlexTM hybrid transactional memory (PAA, SD, AR, AS, YZ), pp. 785–790.
- CAV-2013-KongHSHG #generative #hybrid #verification
- Exponential-Condition-Based Barrier Certificate Generation for Safety Verification of Hybrid Systems (HK, FH, XS, WNNH, MG), pp. 242–257.
- ICST-2013-GraslandBGP #approach #functional #hybrid #testing
- A Functional Testing Approach for Hybrid Safety Properties with Incomplete Information (YG, LdB, RG, IP), pp. 104–113.
- ICST-2013-NairVSB #assessment #classification #overview #perspective
- Classification, Structuring, and Assessment of Evidence for Safety — A Systematic Literature Review (SN, JLdlV, MS, LCB), pp. 94–103.
- ISSTA-2013-Bonacchi #case study #proving
- Formal safety proof: a real case study in a railway interlocking system (AB0), pp. 378–381.
- ITiCSE-2012-BaghdadiAR #case study #distance #learning #tool support
- Applying advanced technology tools in distance learning: case study: traffic data and road safety (MB, KA, JR), p. 389.
- IFM-2012-IsobeMNR #approach #capacity #csp
- Safety and Line Capacity in Railways — An Approach in Timed CSP (YI, FM, HNN, MR), pp. 54–68.
- RTA-2012-Lisitsa #automaton #finite #modelling #verification
- Finite Models vs Tree Automata in Safety Verification (AL), pp. 225–239.
- VS-Games-2012-TeseiBK #game studies #overview #security
- Survey on Serious Games Applied to Security, Safety and Crisis Management (AT, AB, RTK), pp. 320–321.
- CHI-2012-VinotA #design
- Legible, are you sure?: an experimentation-based typographical design in safety-critical context (JLV, SA), pp. 2287–2296.
- ICEIS-v2-2012-CapelM #approach #automation #composition #correctness #model checking #verification
- A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
- SEKE-2012-SubburajUS #specification
- Specification of Safety Critical Systems with Intelligent Software Agent Method (VHS, JEU, MRS), pp. 578–581.
- SIGIR-2012-MacdonaldTO12a #effectiveness #learning #rank
- Effect of dynamic pruning safety on learning to rank effectiveness (CM, NT, IO), pp. 1051–1052.
- ECMFA-2012-GeP #framework #realtime #uml #verification
- Time Properties Verification Framework for UML-MARTE Safety Critical Real-Time Systems (NG, MP), pp. 352–367.
- MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
- PLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #towards #using
- Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
- HILT-2012-LevesonFT #embedded
- Safety of embedded software (NGL, CHF, JT), pp. 7–8.
- HILT-2012-Nilsen #comprehension #java #memory management #overview #tutorial
- Tutorial overview: understanding dynamic memory management in safety critical java (KN), pp. 15–22.
- PLDI-2012-PradelG #automation #concurrent #detection #precise #thread
- Fully automatic and precise detection of thread safety violations (MP, TRG), pp. 521–530.
- QAPL-2012-YasuokaT #data flow #liveness
- Quantitative Information Flow as Safety and Liveness Hyperproperties (HY, TT), pp. 77–91.
- REFSQ-2012-Cleland-HuangHHLM #assurance #query #requirements
- Trace Queries for Safety Requirements in High Assurance Systems (JCH, MPEH, JHH, RRL, PM), pp. 179–193.
- ICSE-2012-EsteveKNPY #analysis #correctness #dependence #performance
- Formal correctness, safety, dependability, and performance analysis of a satellite (MAE, JPK, VYN, BP, YY), pp. 1022–1031.
- SAC-2012-MaggiorePBA #3d #compilation #performance
- A compilation technique to increase X3D performance and safety (GM, FP, MB, MA), pp. 969–974.
- SAC-2012-MonakovaBS #process #security
- Security and safety of assets in business processes (GM, ADB, AS), pp. 1667–1673.
- CASE-2012-IdenP #algorithm #aspect-oriented #detection #functional
- Functional safety aspects of pattern detection algorithms (JI, CIP), pp. 747–752.
- DATE-2012-EllenEO #automation #development #embedded #process
- Automatic transition between structural system views in a safety relevant embedded systems development process (CE, CE, MO), pp. 820–823.
- CAV-2012-ChuJ #reduction #symmetry #verification
- A Complete Method for Symmetry Reduction in Safety Verification (DHC, JJ), pp. 616–633.
- CAV-2012-HarrisJR #automaton #game studies #programming
- Secure Programming via Visibly Pushdown Safety Games (WRH, SJ, TWR), pp. 581–598.
- LICS-2012-CarayolS #automaton #effectiveness #equivalence #recursion
- Collapsible Pushdown Automata and Labeled Recursion Schemes: Equivalence, Safety and Effective Selection (AC, OS), pp. 165–174.
- QoSA-ISARCS-2011-HillenbrandHMA #architecture #workflow
- A metric-based safety workflow for electric/electronic architectures of vehicles (MH, MH, KDMG, NA), pp. 105–114.
- FM-2011-CavalcantiWW #formal method #java #memory management
- The Safety-Critical Java Memory Model: A Formal Account (AC, AJW, JW), pp. 246–261.
- SEFM-2011-SoleimanifardGH #composition #named #verification
- ProMoVer: Modular Verification of Temporal Safety Properties (SS, DG, MH), pp. 366–381.
- CHI-2011-AzenkotPBFLW #independence
- Enhancing independence and safety for blind and deaf-blind public transit riders (SA, SP, AB, EF, REL, JOW), pp. 3247–3256.
- CHI-2011-WoelferIHFG #mobile #people
- Improving the safety of homeless young people with mobile phones: values, form and function (JPW, AI, DGH, BF, BTG), pp. 1707–1716.
- DUXU-v1-2011-KarschS #precise #usability
- Terminological Precision — A Key Factor in Product Usability and Safety (BIK, GS), pp. 138–147.
- DUXU-v2-2011-ArdavanC #3d #exclamation #towards
- Listen! Somebody Is Walking towards Your Car (Introducing the Awareness-3D Sound System into the Driver to Increase the Pedestrian’s Safety) (MA, FC), pp. 89–98.
- HCD-2011-ChaudronGMC #process
- Building Human Profile by Aggregation of Activities — Application to Aeronautics Safety (LC, DG, NM, JC), pp. 389–396.
- ICEIS-J-2011-GuLZWLSLW #enterprise #evaluation #generative #information management #process
- Intelligent Information Acquisition and Utilization in Safety Evaluation Decision Making Process of Power Generation Enterprises (DxG, CyL, JZ, JW, WL, JS, WL, YW), pp. 162–177.
- ICEIS-v2-2011-GuLZBWC #assessment #enterprise #information management
- A Case-based Enterprise Information System for Thermal Power Plants’ Safety Assessment (DxG, CyL, CrZ, IB, JW, WeC), pp. 32–39.
- QAPL-2011-LeitnerFischerL #analysis #modelling #named #quantum #uml
- QuantUM: Quantitative Safety Analysis of UML Models (FLF, SL), pp. 16–30.
- SIGAda-2011-Brosgol #named #standard
- Do-178c: the next avionics safety standard (BMB), pp. 5–6.
- SIGAda-2011-Rogers
- Language choice for safety critical applications (JSR), pp. 81–90.
- ESEC-FSE-2011-FalessiNSBM #design #named #slicing
- SafeSlice: a model slicing and design safety inspection tool for SysML (DF, SN, MS, LCB, AM), pp. 460–463.
- ICSE-2011-LaymanBZF #case study #process
- A case study of measuring process risk for early insights into software safety (LL, VRB, MVZ, KLF), pp. 623–632.
- CASE-2011-SharviaP #approach #assessment #named #towards
- IACoB-SA: An approach towards integrated safety assessment (SS, YP), pp. 220–225.
- CASE-2011-Soressi #industrial
- Introduction of safety rule IEC EN62061 in Metal Industry (ES), pp. 195–200.
- CASE-2011-ThramboulidisSF #automation #industrial #process #towards #verification
- Towards an automated verification process for industrial safety applications (KT, DS, GF), pp. 482–487.
- DATE-2011-EbrahimiMA #fault #named
- ScTMR: A scan chain-based error recovery technique for TMR systems in safety-critical applications (ME, SGM, HA), pp. 298–292.
- DATE-2011-MeyerGCLS #cost analysis #execution #using
- Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
- PPoPP-2011-BotincanDDP #automation #memory management #proving
- Automatic safety proofs for asynchronous memory operations (MB, MD, AFD, MJP), pp. 313–314.
- CAV-2011-BerdineCI #memory management #named
- SLAyer: Memory Safety for Systems-Level Code (JB, BC, SI), pp. 178–183.
- CSEET-2010-WongD #research
- An Undergraduate Summer Research Program in Software Safety (WEW, VD), pp. 157–164.
- ICPC-2010-AreiasCP #contract #reuse #slicing
- Contract-Based Slicing Helps on Safety Reuse (SA, DCdC, JSP), pp. 62–63.
- SCAM-2010-SimpsonB #c #memory management #named #runtime
- MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime (MSS, RB), pp. 199–208.
- SEFM-2010-LindsayWY #assessment #behaviour #model checking #using
- Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
- CHI-2010-BlomVSGAA #mobile #security
- Fear and the city: role of mobile services in harnessing safety and security in urban use contexts (JB, DV, MS, JG, KA, RA), pp. 1841–1850.
- CAiSE-2010-StalhaneSB #analysis #case study #diagrams #sequence chart
- Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases (TS, GS, LdB), pp. 165–179.
- ICML-2010-ChakrabortyS #convergence #learning #multi
- Convergence, Targeted Optimality, and Safety in Multiagent Learning (DC, PS), pp. 191–198.
- KDD-2010-DasMSO #algorithm #case study #detection #kernel #learning #multi
- Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study (SD, BLM, ANS, NCO), pp. 47–56.
- QAPL-2010-GuedemannO #analysis #modelling #probability
- Probabilistic Model-Based Safety Analysis (MG, FO), pp. 114–128.
- RE-2010-HillT #legacy #requirements #traceability
- Creating Safety Requirements Traceability for Assuring and Recertifying Legacy Safety-Critical Systems (JH, SRT), pp. 297–302.
- ICSE-2010-ChenM #approach #evolution #monitoring #requirements #towards
- Towards better support for the evolution of safety requirements via the model monitoring approach (ZC, GM), pp. 219–222.
- SAC-2010-PopeeaC #analysis #debugging #proving
- Dual analysis for proving safety and finding bugs (CP, WNC), pp. 2137–2143.
- CASE-2010-Hsu #bound #markov
- Control of continuous-time Markov chains with safety upper bounds (SPH), pp. 990–993.
- DATE-2010-VazquezCTST #programmable
- Programmable aging sensor for automotive safety-critical applications (JCV, VHC, ICT, MBS, JPT), pp. 618–621.
- ISMM-2010-NagarakatteZMZ #c #compilation #named
- CETS: compiler enforced temporal safety for C (SN, JZ, MMKM, SZ), pp. 31–40.
- LCTES-2010-BiehlCT #analysis #development #embedded #modelling
- Integrating safety analysis into the model-based development toolchain of automotive embedded systems (MB, DJC, MT), pp. 125–132.
- CAV-2010-KawaguchiRJ #named #verification
- Dsolve: Safety Verification via Liquid Types (MK, PMR, RJ), pp. 123–126.
- CAV-2010-ZhangSRHH #hybrid #probability #verification
- Safety Verification for Probabilistic Hybrid Systems (LZ, ZS, SR, HH, EMH), pp. 196–211.
- ICST-2010-Panesar-WalawegeSBC #concept #modelling #standard
- Characterizing the Chain of Evidence for Software Safety Cases: A Conceptual Model Based on the IEC 61508 Standard (RKPW, MS, LCB, TC), pp. 335–344.
- IJCAR-2010-ChaudhuriDLM #proving #verification
- Verifying Safety Properties with the TLA+ Proof System (KC, DD, LL, SM), pp. 142–148.
- ISSTA-2010-GodefroidK #float #memory management #program analysis #proving
- Proving memory safety of floating-point computations by combining static and dynamic program analysis (PG, JK), pp. 1–12.
- ICALP-v2-2009-AcciaiB #behaviour #infinity #π-calculus
- Deciding Safety Properties in Infinite-State π-Calculus via Behavioural Types (LA, MB), pp. 31–42.
- ICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #tool support #using
- Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
- VS-Games-2009-ChittaroR #game studies
- Serious Games for Training Occupants of a Building in Personal Fire Safety Skills (LC, RR), pp. 76–83.
- DHM-2009-DzaackU #analysis #modelling #multi #performance
- Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
- HIMI-II-2009-FujitaS #case study #process
- The Importance of Information in the Process of Acquisition and Usage of a Medicine for Patient Safety: A Study of the Brazilian Context (PLF, CGS), pp. 489–496.
- HIMI-II-2009-LeeD
- Impact of Healthcare Information Technology Systems on Patient Safety (BCL, VGD), pp. 559–565.
- HIMI-II-2009-LevaKCLKSM #performance
- Unique Reporting Form: Flight Crew Auditing of Everyday Performance in an Airline Safety Management System (MCL, AMK, JC, GL, SK, DS, NM), pp. 806–815.
- HIMI-II-2009-SpinilloPL #analysis
- Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
- ICEIS-J-2009-CarrascoHRSE #embedded #interface #monitoring #using
- Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems (AC, MDH, MCR, FS, JIE), pp. 737–744.
- AdaEurope-2009-DelangePF #architecture #requirements #security #validation
- Validating Safety and Security Requirements for Partitioned Architectures (JD, LP, PHF), pp. 30–43.
- PLDI-2009-NagarakatteZMZ #bound #c #memory management #named
- SoftBound: highly compatible and complete spatial memory safety for c (SN, JZ, MMKM, SZ), pp. 245–258.
- SIGAda-2009-Gardinier #ada #development #open source
- Open source development of a safety critical dual redundant (Ada95/C++) signal control program environment (SCOPE) (MG), pp. 23–30.
- SAC-2009-KimmSHS #development
- Failure management development for integrated automotive safety-critical software systems (HK, SYS, HsH, COS), pp. 517–521.
- CASE-2009-TanDZKA #collaboration #design #development
- Safety design and development of human-robot collaboration in cellular manufacturing (JTCT, FD, YZ, RK, TA), pp. 537–542.
- TACAS-2009-KuijperP #game studies
- Computing Weakest Strategies for Safety Games of Imperfect Information (WK, JvdP), pp. 92–106.
- TACAS-2009-PlakuKV #hybrid #ltl
- Falsification of LTL Safety Properties in Hybrid Systems (EP, LEK, MYV), pp. 368–382.
- ICEIS-AIDSS-2008-SharpanskykhSB #analysis #modelling
- Organizational Modeling and Analysis of Safety Occurrence Reporting in Air Traffic (AS, SHS, HAPB), pp. 225–230.
- MoDELS-2008-StalhaneS #case study #comparison #diagrams #identification
- Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
- MoDELS-2008-StalhaneS #case study #comparison #diagrams #identification
- Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
- SIGAda-2008-Brosgol #assessment #named
- MP1: languages for safety-critical software: issues and assessment (BMB), pp. 7–8.
- ICSE-2008-McCafferyPR #agile #assessment #hybrid #named
- Ahaa — agile, hybrid assessment method for automotive, safety critical smes (FM, MP, IR), pp. 551–560.
- ATEM-J-2006-MiguelBSA #analysis #development #integration #modelling
- Integration of safety analysis in model-driven software development (MAdM, JFB, JPS, AA), pp. 260–280.
- ASPLOS-2008-DeviettiBMZ #architecture #bound #c #named #programming language
- Hardbound: architectural support for spatial safety of the C programming language (JD, CB, MMKM, SZ), pp. 103–114.
- CASE-2008-LiuYGB #certification #functional
- Functional safety certification: Practice and issues (JL, CY, FG, SB), pp. 412–417.
- CC-2008-ProkopskiV #virtual machine
- Compiler-Guaranteed Safety in Code-Copying Virtual Machines (GBP, CV), pp. 163–177.
- DATE-2008-Fuss
- Tailored Solutions for Safety-Installations in the Loetschberg Tunnel — A Project with Importance for the Trans-European Rail Traffic (WF), pp. 21–25.
- DATE-2008-PenazziCDSSM #multi
- Cooperative Safety: a Combination of Multiple Technologies (RP, PC, MD, AS, MS, EM), pp. 959–961.
- DATE-2008-SterponeATG #design #fault tolerance #on the
- On the design of tunable fault tolerant circuits on SRAM-based FPGAs for safety critical applications (LS, MAA, JNT, HGM), pp. 336–341.
- HPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #using
- Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
- OSDI-2008-WilliamsRWSS #validation
- Device Driver Safety Through a Reference Validation Mechanism (DW, PR, KW, EGS, FBS), pp. 241–254.
- ISSTA-2008-LoginovYCFRN #analysis #verification
- Verifying dereference safety via expanding-scope analysis (AL, EY, SC, SF, NR, MGN), pp. 213–224.
- PODS-2007-Machlin #array #equivalence #multi #query
- Index-based multidimensional array queries: safety and equivalence (RM), pp. 175–184.
- DHM-2007-RapalaN #reliability
- Clinical Patient Safety — Achieving High Reliability in a Complex System (KR, JCN), pp. 710–716.
- HCI-AS-2007-Komatsubara
- Ergonomic Study of Medicament Packages for the Improvement of Safety in Use (AK), pp. 484–488.
- HCI-AS-2007-TanevaL #communication #design
- Interfacing Safety and Communication Breakdowns: Situated Medical Technology Design (ST, EL), pp. 525–534.
- HCI-IDU-2007-DaimotoAMK #case study #research
- Application of Micro-Scenario Method (MSM) to User Research for the Motorcycle’s Informatization — A Case Study for the Information Support System for Safety (HD, SA, MM, MK), pp. 49–57.
- MoDELS-2007-ZoughbiBL #uml
- A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software (GZ, LCB, YL), pp. 574–588.
- MoDELS-2007-ZoughbiBL #uml
- A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software (GZ, LCB, YL), pp. 574–588.
- SAS-2007-CalcagnoPV #composition #concurrent #fine-grained
- Modular Safety Checking for Fine-Grained Concurrency (CC, MJP, VV), pp. 233–248.
- SIGAda-2007-Brosgol #assessment #named
- SA2: languages for safety-critical software: issues and assessment (BMB), p. 2.
- CASE-2007-FukuiNSMMF #automation
- Requirement of three-position enabling switches for installing in enabling devices to achieve operational safety of robotics and automation applications (TF, MN, YS, IM, AM, TF), pp. 111–116.
- DATE-2007-HairionECS #design
- New safety critical radio altimeter for airbus and related design flow (DH, SE, EC, MS), pp. 684–688.
- FASE-2007-ManneringHR #design #towards
- Towards Normal Design for Safety-Critical Systems (DM, JGH, LR), pp. 398–411.
- CAV-2007-CohenN #proving
- Local Proofs for Global Safety Properties (AC, KSN), pp. 55–67.
- QoSA-2006-Grunske #component #evaluation #integration #standard #towards
- Towards an Integration of Standard Component-Based Safety Evaluation Techniques with SaveCCM (LG), pp. 199–213.
- QoSA-2006-WuK #architecture #design
- Managing Architectural Design Decisions for Safety-Critical Software Systems (WW, TK), pp. 59–77.
- VLDB-2006-LiCTACH #data type #query
- Safety Guarantee of Continuous Join Queries over Punctuated Data Streams (HGL, SC, JT, DA, KSC, WPH), pp. 19–30.
- ICALP-v2-2006-BalabanPZ #distributed #protocol
- Invisible Safety of Distributed Protocols (IB, AP, LDZ), pp. 528–539.
- ICALP-v2-2006-Jurdzinski #complexity #on the #problem
- On Complexity of Grammars Related to the Safety Problem (TJ), pp. 432–443.
- FM-2006-LiHR #automation #exception #towards #verification
- Towards Automatic Exception Safety Verification (XL, HJH, PR), pp. 396–411.
- FM-2006-UmenoL #automaton #case study #protocol #proving #theorem proving #using
- Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
- ICEIS-SAIC-2006-BrzezinskiKK #mobile #protocol
- Safety of Checkpointing and Rollback-Recovery Protocol for Mobile Systems with RYW Session Guarantee (JB, AK, JK), pp. 118–123.
- AdaEurope-2006-BrosgolW #ada #comparison #java #realtime
- A Comparison of Ada and Real-Time JavaTM for Safety-Critical Applications (BMB, AJW), pp. 13–26.
- PLDI-2006-BergerZ #memory management #named #probability
- DieHard: probabilistic memory safety for unsafe languages (EDB, BGZ), pp. 158–168.
- SIGAda-2006-SwardG
- Developing safety critical software for an unmanned aerial vehicle situational awareness tool (RES, MG), pp. 45–50.
- ASE-2006-DenneyF #automation #certification
- Annotation Inference for Safety Certification of Automatically Generated Code (ED, BF), pp. 265–268.
- GPCE-2006-DenneyF #algorithm #automation #certification
- A generic annotation inference algorithm for the safety certification of automatically generated code (ED, BF), pp. 121–130.
- CASE-2006-HuangCC #mobile
- Mobile Diagnosis based on RFID for Food Safety (HPH, CSC, TYC), pp. 357–362.
- CASE-2006-LuL #evaluation #independence #reliability
- Reliability evaluation of standby safety systems due to independent and common cause failures (LL, GL), pp. 264–269.
- TACAS-2006-OuaknineW #decidability #logic #metric
- Safety Metric Temporal Logic Is Fully Decidable (JO, JW), pp. 411–425.
- A-MOST-J-2005-AugustonMS06 #assessment #automation #behaviour #modelling #testing
- Environment behavior models for automation of testing and assessment of system safety (MA, JBM, MtS), pp. 971–980.
- CAV-2006-CookPR #named
- Terminator: Beyond Safety (BC, AP, AR), pp. 415–418.
- FATES-RV-2006-BouquetDGJ #generative #testing
- Safety Property Driven Test Generation from (FB, FD, JG, JJ), pp. 225–239.
- FATES-RV-2006-LiD #algorithm #aspect-oriented #testing #verification
- Decompositional Algorithms for Safety Verification and Testing of Aspect-Oriented Systems (CL, ZD), pp. 100–114.
- VMCAI-2006-ChangCN #framework #program analysis
- A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety (BYEC, AC, GCN), pp. 174–189.
- VMCAI-2006-JaffarSV06a
- Relative Safety (JJ, AES, RV), pp. 282–297.
- CBSE-2005-GrunskeKP #component #evaluation #modelling
- Model-Driven Safety Evaluation with State-Event-Based Component Failure Annotations (LG, BK, YP), pp. 33–48.
- SIGITE-2005-Hill #network
- Equipment safety in the wireless networking laboratory environment (LWH), pp. 83–87.
- FM-2005-RusuMJ #automation #consistency #testing #validation #verification
- Automatic Verification and Conformance Testing for Validating Safety Properties of Reactive Systems (VR, HM, TJ), pp. 189–204.
- FM-2005-WassyngLH
- Timing Tolerances in Safety-Critical Software (AW, ML, XH), pp. 157–172.
- CHI-2005-AragonH #simulation #visualisation
- Improving aviation safety with information visualization: a flight simulation study (CRA, MAH), pp. 441–450.
- ICEIS-v3-2005-Boulanger #analysis #named
- BRAIL — Safety Requirement Analysis (JLB), pp. 108–111.
- KDD-2005-NorenOB #database #detection
- A hit-miss model for duplicate detection in the WHO drug safety database (GNN, RO, AB), pp. 459–468.
- SEKE-2005-HsiungL #modelling #verification
- Model-based Verification of Safety-Critical Systems (PAH, YHL), pp. 596–601.
- SAS-2005-HarrenN #assembly #dependent type #using
- Using Dependent Types to Certify the Safety of Assembly Code (MH, GCN), pp. 155–170.
- SAS-2005-TerauchiA #data flow #problem
- Secure Information Flow as a Safety Problem (TT, AA), pp. 352–367.
- ASE-2005-CouchotGK #approach #deduction #protocol
- A uniform deductive approach for parameterized protocol safety (JFC, AG, NK), pp. 364–367.
- ICSE-2005-BurmesterGHST #development #modelling #realtime
- The fujaba real-time tool suite: model-driven development of safety-critical, real-time systems (SB, HG, MH, DS, MT), pp. 670–671.
- ICSE-2005-ChinKQPN #alias #policy #verification
- Verifying safety policies with size properties and alias controls (WNC, SCK, SQ, CP, HHN), pp. 186–195.
- DAC-2005-GanaiGA #model checking #satisfiability
- Beyond safety: customized SAT-based model checking (MKG, AG, PA), pp. 738–743.
- DATE-2005-ChappellMPOFS #adaptation #generative #realtime
- Exploiting Real-Time FPGA Based Adaptive Systems Technology for Real-Time Sensor Fusion in Next Generation Automotive Safety Systems (SC, AM, DP, DO, BF, CS), pp. 180–185.
- DATE-2005-HeckmannF #abstract interpretation #embedded
- erifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation (RH, CF), pp. 618–619.
- DATE-2005-Horsky
- LC Oscillator Driver for Safety Critical Applications (PH), pp. 159–164.
- DATE-2005-JeffreyCPLRR #configuration management #integration #monitoring #online #using
- The Integration of On-Line Monitoring and Reconfiguration Functions using IEEE1149.4 Into a Safety Critical Automotive Electronic Control Unit (CJ, RC, SP, ML, AR, SR), pp. 153–158.
- ESOP-2005-WildmoserN #bytecode
- Asserting Bytecode Safety (MW, TN), pp. 326–341.
- FASE-2005-BeyerHJM #memory management
- Checking Memory Safety with Blast (DB, TAH, RJ, RM), pp. 2–18.
- FoSSaCS-2005-AehligMO #strict #string
- Safety Is not a Restriction at Level 2 for String Languages (KA, JGdM, CHLO), pp. 490–504.
- CAV-2005-ConwayNDE #algorithm #analysis #incremental #interprocedural
- Incremental Algorithms for Inter-procedural Analysis of Safety Properties (CLC, KSN, DD, SAE), pp. 449–461.
- VMCAI-2005-BurckhardtAM #composition #implementation #parametricity #refinement #verification
- Verifying Safety of a Token Coherence Implementation by Parametric Compositional Refinement (SB, RA, MMKM), pp. 130–145.
- CBSE-2004-SandstromFA #component #embedded #realtime
- Introducing a Component Technology for Safety Critical Embedded Real-Time Systems (KS, JF, MÅ), pp. 194–208.
- SEFM-2004-LeinoS #c# #exception
- Exception Safety for C# (KRML, WS), pp. 218–227.
- ICFP-2004-YuS #assembly #concurrent #verification
- Verification of safety properties for concurrent assembly code (DY, ZS), pp. 175–188.
- AdaEurope-2004-GiriMJK #ada #approach #random #testing
- A Randomised Test Approach to Testing Safety Critical Ada Code (SKG, AM, YVJ, KK), pp. 190–199.
- PLDI-2004-YahavR #abstraction #using #verification
- Verifying safety properties using separation and heterogeneous abstractions (EY, GR), pp. 25–34.
- SIGAda-2004-ChapmanH #analysis #data flow #modelling #security
- Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
- FSE-2004-DingelL #analysis #automation #concurrent #source code #txl #using
- Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
- FSE-2004-XuDS #c #memory management #performance #source code
- An efficient and backwards-compatible transformation to ensure memory safety of C programs (WX, DCD, RS), pp. 117–126.
- ICSE-2004-SenVAR #distributed #monitoring #performance
- Efficient Decentralized Monitoring of Safety in Distributed Systems (KS, AV, GA, GR), pp. 418–427.
- DATE-v1-2004-ManoliosS #automation #liveness #modelling #using #verification #web
- Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements (PM, SKS), pp. 168–175.
- TACAS-2004-SenRA #analysis #online #parallel #performance #predict #source code #thread
- Online Efficient Predictive Safety Analysis of Multithreaded Programs (KS, GR, GA), pp. 123–138.
- CAV-2004-Wang #analysis #hybrid #linear #parametricity
- Symbolic Parametric Safety Analysis of Linear Hybrid Systems with BDD-Like Data-Structures (FW), pp. 295–307.
- CSL-2004-Maier #liveness #ltl
- Intuitionistic LTL and a New Characterization of Safety and Liveness (PM), pp. 295–309.
- TestCom-2004-RusuMTJJ #testing #verification
- From Safety Verification to Safety Testing (VR, HM, VT, TJ, BJ), pp. 160–176.
- FME-2003-BozzanoCCVV #assessment #case study #industrial
- Improving Safety Assessment of Complex Systems: An Industrial Case Study (MB, AC, MC, LV, AV), pp. 208–222.
- FME-2003-DenneyF #correctness #policy
- Correctness of Source-Level Safety Policies (ED, BF), pp. 894–913.
- RTA-2003-ChenRV #analysis #rule-based
- Rule-Based Analysis of Dimensional Safety (FC, GR, RPV), pp. 197–207.
- KDD-2003-FramAD #data mining #empirical #mining
- Empirical Bayesian data mining for discovering patterns in post-marketing drug safety (DMF, JSA, WD), pp. 359–368.
- UML-2003-Jurjens #uml
- Developing Safety-Critical Systems with UML (JJ), pp. 360–372.
- AdaEurope-2003-JeppuKS #ada #realtime #testing #using
- Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
- PLDI-2003-BlanchetCCFMMMR #scalability
- A static analyzer for large safety-critical software (BB, PC, RC, JF, LM, AM, DM, XR), pp. 196–207.
- SAS-2003-ShahamYKS #memory management
- Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management (RS, EY, EKK, SS), pp. 483–503.
- RE-2003-Romanski #configuration management #requirements #traceability
- Requirements, Configuration Management and Traceability for Safety Critical Software (GR), p. 304.
- ASE-2003-RosuC #metric
- Certifying Measurement Unit Safety Polic (GR, FC), pp. 304–309.
- ESEC-FSE-2003-SenRA #analysis #parallel #runtime #source code #thread
- Runtime safety analysis of multithreaded programs (KS, GR, GA), pp. 337–346.
- ICSE-2003-LutzM #requirements #testing
- Requirements Discovery during the Testing of Safety-Critical Software (RRL, ICM), pp. 578–585.
- LCTES-2003-DhurjatiKAL #garbage collection #memory management #runtime
- Memory safety without runtime checks or garbage collection (DD, SK, VSA, CL), pp. 69–80.
- DLT-2002-IbarraDS #automaton #finite #verification
- Safety Verification for Two-Way Finite Automata with Monotonic Counters (OHI, ZD, ZWS), pp. 326–338.
- FME-2002-KristensenM
- A Generalised Sweep-Line Method for Safety Properties (LMK, TM), pp. 549–567.
- ICGT-2002-PadbergE #graph transformation #invariant
- Rule Invariants in Graph Transformation Systems for Analyzing Safety-Critical Systems (JP, BE), pp. 334–350.
- CSCW-2002-LuttersA #bound #case study
- Achieving safety: a field study of boundary objects in aircraft technical support (WGL, MSA), pp. 266–275.
- Ada-2002-BarrM #ada #embedded #named #open source #operating system
- Boss/Ada: An Open Source Ada 95 Safety Kit ( A dependable open source embedded operating system for GNAT) (VB, SM), pp. 53–66.
- Ada-2002-BlotzHLPSZ #ada #development #modelling #re-engineering
- Model-Based Software Engineering and Ada: Synergy for the Development of Safety-Critical Systems (AB, FH, HL, AP, OS, HPZ), pp. 37–52.
- SAS-2002-Hymans #abstract interpretation #behaviour
- Checking Safety Properties of Behavioral VHDL Descriptions by Abstract Interpretation (CH), pp. 444–460.
- ICSE-2002-Knight #challenge
- Safety critical systems: challenges and directions (JCK), pp. 547–550.
- DAC-2002-ShengTH #effectiveness #using
- Effective safety property checking using simulation-based sequential ATPG (SS, KT, MSH), pp. 813–818.
- TACAS-2002-HavelundR #monitoring
- Synthesizing Monitors for Safety Properties (KH, GR), pp. 342–356.
- VMCAI-2002-BaukusLS #liveness #protocol #verification
- Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness (KB, YL, KS), pp. 317–330.
- ICSM-2001-ZelkowitzR #independence #maintenance #validation #verification
- The Role of Independent Verification and Validation in Maintaining a Safety Critical Evolutionary Software in a Complex Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 118–126.
- PASTE-2001-MaessenSG #java #program analysis #virtual machine
- Program analysis for safety guarantees in a Java virtual machine written in Java (JWM, VS, DG), pp. 62–65.
- AdaEurope-2001-FoulgerK #fault #runtime #tool support #using
- Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software (DF, SK), pp. 229–240.
- POPL-2001-Calcagno #calculus #correctness #semantics
- Stratified operational semantics for safety and correctness of the region calculus (CC), pp. 155–165.
- POPL-2001-Yahav #concurrent #java #logic #source code #using #verification
- Verifying safety properties of concurrent Java programs using 3-valued logic (EY), pp. 27–40.
- RE-2001-AllenbyK #requirements #using
- Deriving Safety Requirements Using Scenarios (KA, TK), pp. 228–235.
- RE-2001-LutzM #evolution #requirements
- Evolution of Safety-Critical Requirements Post-Launch (RRL, ICM), pp. 222–227.
- ESEC-FSE-2001-Coen-PorisiniDGP #execution #symbolic computation #using #verification
- Using symbolic execution for verifying safety-critical systems (ACP, GD, CG, MP), pp. 142–151.
- ICSE-2001-ZelkowitzR #comprehension
- Understanding IV & V in a Safety Critical and Complex Evolutionary Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 349–357.
- DATE-2001-CheynetNVRRV #automation #evaluation #program transformation
- System safety through automatic high-level code transformations: an experimental evaluation (PC, BN, RV, MR, MSR, MV), pp. 297–301.
- FASE-J-1998-PadbergGE01 #refinement #rule-based
- Rule-based refinement of high-level nets preserving safety properties (JP, MG, CE), pp. 97–118.
- ESOP-2001-Thiemann #using
- Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
- CAV-2001-Maidl #approach #model checking
- A Unifying Model Checking Approach for Safety Properties of Parameterized Systems (MM), pp. 311–323.
- LICS-2001-ManoliosT #branch #liveness
- Safety and Liveness in Branching Time (PM, RJT), pp. 366–374.
- CIAA-2000-Ibarra #queue #reachability
- Reachability and Safety in Queue Systems (OHI), pp. 145–156.
- ICALP-2000-MannaS
- Alternating the Temporal Picture for Safety (ZM, HS), pp. 429–450.
- AdaEurope-2000-MauriS #analysis #embedded #reliability #using
- Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
- PLDI-2000-XuMR
- Safety checking of machine code (ZX, BPM, TWR), pp. 70–82.
- SAS-2000-ClarkHH #analysis #graph grammar #strict
- Safety of Strictness Analysis via Term Graph Rewriting (DC, CH, SH), pp. 95–114.
- ASE-2000-OHalloran #automation #generative
- Issues for the Automatic Generation of Safety Critical Software (CO), pp. 277–280.
- ASE-2000-ReveillereMCMM #approach #development #domain-specific language
- A DSL Approach to Improve Productivity and Safety in Device Drivers Development (LR, FM, CC, RM, GM), pp. 101–110.
- FoSE-2000-Lutz #re-engineering #roadmap
- Software engineering for safety: a roadmap (RRL), pp. 213–226.
- FASE-2000-PadbergHG #algebra
- Stepwise Introduction and Preservation of Safety Properties in Algebraic High-Level Net Systems (JP, KH, MG), pp. 249–265.
- FASE-2000-Suhl
- Applying RT-Z to Develop Safety-Critical Systems (CS), pp. 51–65.
- CSL-2000-Pauly #bisimulation #game studies #source code
- From Programs to Games: Invariance and Safety for Bisimulation (MP), pp. 485–496.
- CSEET-1999-FelleisenC #metric
- Safety as a Metric (MF, RC), pp. 129–131.
- PASTE-1999-WhitingH #analysis #monitoring
- Safety Analysis of Hawk in Flight Monitor (LW, MH), pp. 32–38.
- FM-v2-1999-SereT #analysis #specification
- Safety Analysis in Formal Specification (KS, ET), pp. 1564–1583.
- HCI-CCAD-1999-Tielsch #health #interface #network
- Call center — interface between companies’ practice and the competence network of safety and health at work in North-Rhine-Westfalia (RT), pp. 1332–1336.
- HCI-EI-1999-Boy
- About the Role of Intelligent Assistants in the Control of Safety-Critical Systems (GAB), pp. 321–325.
- HCI-EI-1999-Weber99b #approach #aspect-oriented #health
- A Pragmatic and Inclusive Approach to Assess Health and Safety Aspects at VDU Workplaces (HW), pp. 31–35.
- TOOLS-USA-1999-Romanski #development #verification
- The Development and Verification of Safety Critical Software (GR), p. 411.
- AdaEurope-1999-ChapmanD #using
- Re-engeneering a Safety-Critical Application Using SPARK 95 and GNORT (RC, RD), pp. 39–51.
- AdaEurope-1999-Frost #ada #certification #embedded
- An Ada95 Solution for Certification of Embedded Safety Critical Applications (JF), pp. 52–63.
- SAS-1999-Volpano
- Safety versus Secrecy (DMV), pp. 303–311.
- ASE-1999-WhalenH #approach #automation #code generation
- An Approach to Automatic Code Generation for Safety-Critical Systems (MWW, MPEH), pp. 315–318.
- SAC-1999-LauberSW #assurance #online #probability #quality
- Applied Probabilistic AI for Online Diagnosis of a Safety-Critical System Based on a Quality Assurance Program (JL, CS, RW), pp. 25–30.
- TACAS-1999-RusuS #abstraction #on the #proving #static analysis #theorem proving
- On Proving Safety Properties by Integrating Static Analysis, Theorem Proving and Abstraction (VR, ES), pp. 178–192.
- CAV-1999-BiereCRZ #model checking #using
- Verifiying Safety Properties of a Power PC Microprocessor Using Symbolic Model Checking without BDDs (AB, EMC, RR, YZ), pp. 60–71.
- CAV-1999-KupfermanV #model checking
- Model Checking of Safety Properties (OK, MYV), pp. 172–183.
- TAGT-1998-PadbergGH #development #incremental #petri net
- Incremental Development of Safety Properties in Petri Net Transformations (JP, MG, KH), pp. 410–425.
- CHI-1998-Boy #analysis #automation
- Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
- AdaEurope-1998-Chapront #ada #development
- Ada+B The Formula for Safety Critical Software Development (PC), pp. 13–18.
- AdaEurope-1998-Wong
- Looking at Code With Your Safety Goggles On (KW), pp. 251–262.
- SIGAda-1998-MichellSW #security
- Looking into Safety with the Safety and Security Rapporteur Group (SM, MS, BAW), pp. 7–11.
- ICRE-1998-LutzHMST #analysis #product line #requirements
- Safety Analysis of Requirements for a Product Family (RRL, GGH, MMM, DES, SRT), p. 24–?.
- FASE-1998-BussowGK #case study #embedded #specification
- Specifying Safety-Critical Embedded Systems with Statecharts and Z: A Case Study (RB, RG, MK), pp. 71–87.
- FASE-1998-NielsonAN #analysis #behaviour #case study
- Behaviour Analysis and Safety Conditions: A Case Study in CML (HRN, TA, FN), pp. 255–269.
- FASE-1998-PadbergGE #refinement #rule-based
- Rule-Based Refinement of High-Level Nets Preserving Safety Properties (JP, MG, CE), pp. 221–238.
- FASE-1998-SandholmS #distributed #web #web service
- Distributed Safety Controllers for Web Services (AS, MIS), pp. 270–284.
- CAV-1998-ComonJ #analysis #automaton #multi
- Multiple Counters Automata, Safety Analysis and Presburger Arithmetic (HC, YJ), pp. 268–279.
- HCI-CC-1997-LewandowskiK #assessment
- Method of Assessment of Occupational Safety (JL, CK), pp. 703–706.
- HCI-CC-1997-Peters #human-computer
- Safety and Liability in HCI (GAP), pp. 851–854.
- HCI-SEC-1997-Duffy97a
- Safety Management: Some Issues and Limitations (VGD), pp. 343–346.
- TOOLS-USA-1997-Riehle97a
- Object Technology for Safety-Critical Applications (RR), p. 376.
- RE-1997-HeimdahlR #requirements #specification
- Software Requirements Specification and System Safety (MPEH, JDR), p. 264.
- RE-1997-ModugnoLRPS #analysis #requirements #specification
- Integrated Safety Analysis of Requirements Specifications (FM, NGL, JDR, KP, SDS), pp. 148–159.
- CAV-1997-CimattiGPPPRTY #certification #embedded #verification
- A Provably Correct Embedded Verifier for the Certification of Safety Critical Software (AC, FG, PP, BP, JP, DR, PT, BY), pp. 202–213.
- WPC-1996-Bull #comprehension #domain-specific language #using
- Comprehension of Safety-Critical Systems Using Domain-Specific Languages (TB), pp. 108–122.
- FME-1996-Peleska #automation #industrial #testing
- Test Automation for Safety-Critical Systems: Industrial Application and Future Developments (JP), pp. 39–59.
- FME-1996-Sivertsen #case study #development
- A Case Study on the Formal Development of a Reactor Safety System (TS), pp. 18–38.
- FME-1996-ValmariS #liveness #verification #visual notation
- Visual Verification of Safety and Liveness (AV, MS), pp. 228–247.
- FME-1996-Weber #design
- Combining Statecharts and Z for the Design of Safety-Critical Control Systems (MW), pp. 307–326.
- AdaEurope-1996-Rosskopf #ada #assessment #static analysis #using
- Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
- AdaEurope-1996-Schneidewind #modelling #reliability
- Reliability Modeling for Safety Critical Software (NFS), pp. 17–37.
- TRI-Ada-1996-MeyerR #design #embedded
- Design and Test Strategies for a Safety-Critical Embedded Executive (CAM, MGR), pp. 29–37.
- ICSE-1996-CheungK #analysis #composition #reachability
- Checking Subsystem Safety Properties in Compositional Reachability Analysis (SCC, JK), pp. 144–154.
- CAV-1996-Gonthier #concurrent #garbage collection #verification
- Verifying the Safety of a Practical Concurrent Garbage Collector (GG), pp. 462–465.
- CAV-1996-Greenstreet #difference #equation #verification
- Verifying Safety Properties of Differential Equations (MRG), pp. 277–287.
- ICSM-1995-BullYBL #named #reverse engineering
- Bylands: reverse engineering safety-critical systems (TMB, EJY, KHB, ZL), pp. 358–366.
- AdaEurope-1995-Brown #ada
- The Practical Application of Safety Techniques on an Ada Based Project (RB), pp. 51–57.
- AdaEurope-1995-Richard-Foy #ada
- Safe Ada Executive: An Executive for Ada Safety Critical Applications (MRF), pp. 11–20.
- RE-1995-AtleeM #analysis #requirements
- Integrating requirements analysis and safety analysis (JMA, JAM), pp. 158–159.
- ESEC-1995-TuyaSC #model checking #modelling #using #verification
- Using a Symbolic Model Checker for Verify Safety Properties in SA/RT Models (JT, LS, JAC), pp. 59–75.
- SOSP-1995-BershadSPSFBCE #operating system #performance
- Extensibility, Safety and Performance in the SPIN Operating System (BNB, SS, PP, EGS, MEF, DB, CC, SJE), pp. 267–284.
- CAV-1995-JagadeesanPO #source code #verification
- Safety Property Verification of ESTEREL Programs and Applications to Telecommunications Software (LJJ, CP, JVO), pp. 127–140.
- CAV-1995-JonssonK #algorithm #distributed #infinity #verification
- Verifying Safety Properties of a Class of Infinite-State Distributed Algorithms (BJ, LK), pp. 42–53.
- FME-1994-Gortz #specification
- Specifying Safety and Progress Properties with RSL (JG), pp. 567–581.
- SEKE-1994-WillisP #reuse #specification
- Specification reuse for safety-critical software (CPW, DJP), pp. 516–523.
- AdaEurope-1994-Birnie #aspect-oriented
- Safety Aspects of the Ariane 5 On-Board Software (SAB), pp. 302–321.
- ISSTA-1994-KnightCFW #testing
- Testing a Safety-Critical Application (JCK, AGC, AMF, KGW), p. 199.
- PODS-1993-Escobar-MolanoHJ #calculus #query
- Safety and Translation of Calculus Queries with Scalar Functions (MEM, RH, DJ), pp. 253–264.
- FME-1993-BowenS #formal method #industrial #perspective
- The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective (JPB, VS), pp. 183–195.
- FME-1993-Jacky #specification
- Specifying a Safety-Critical Control System in Z (JJ), pp. 388–402.
- HCI-ACS-1993-DoosB #development #human-computer #interactive
- Disturbances in Production — A Safety Risk or a Chance for Development in the Human-Computer Interaction Context (MD, TB), pp. 809–814.
- HCI-SHI-1993-Warren #approach #development #modelling #realtime #tool support
- The TOM Approach to System Development: Methods and Tools for Task Oriented Modelling of Real-Time Safety Critical Systems (CW), pp. 285–290.
- SEKE-1993-Berztiss
- Catastrophe Prevention in Safety-Critical Systems (ATB), pp. 102–108.
- AdaEurope-1993-BrygierR #ada #certification #realtime
- Certification of Ada Real-Time Executives for Safety Critical Applications (JB, MRF), pp. 264–279.
- PEPM-1993-Thiemann #analysis #functional #source code
- A Safety Analysis for Functional Programs (PT), pp. 133–144.
- RE-1993-Lutz #embedded #fault #requirements
- Analyzing software requirements errors in safety-critical, embedded systems (RRL), pp. 126–133.
- ICSE-1993-CourtoisP #documentation
- Documentation for Safety Critical Software (PJC, DLP), pp. 315–323.
- ICSE-1993-DalalHK #communication #quality #reliability
- Reliable Software and Communication: Software Quality, Reliability, and Safety (SRD, JRH, JRK), pp. 425–435.
- ICLP-1993-CorsiniR #analysis #fault
- Safety Analysis by Means of Fault Trees: An Application for Open Boolean Solvers (MMC, AR), p. 834.
- TRI-Ada-C-1992-HummerB #ada #design #hardware
- When Hardware Becomes Software: Designing a Safety-Critical System with Ada (JH, LB), pp. 538–544.
- TRI-Ada-C-1992-McHugh #ada
- Ada 9X and Safety Critical/Secure Systems (JM), pp. 55–59.
- ESOP-1992-BernsteinRS #proving
- Proving Safety of Speculative Load Instructions at Compile Time (DB, MR, SS), pp. 56–72.
- CAV-1992-Bruns #case study #design
- A Case Study in Safety-Critical Design (GB), pp. 220–233.
- CAV-1992-Corbett #integer #liveness #programming #verification
- Verifying General Safety and Liveness Propterties with Integer Programming (JCC), pp. 357–369.
- ICALP-1991-BouajjaniFGRS #branch #semantics
- Safety for Branching Time Semantics (AB, JCF, SG, CR, JS), pp. 76–92.
- AdaEurope-1991-Welz #ada
- Ada in Safety Critical Applications (AW), pp. 193–198.
- CAV-1991-GodefroidW #concurrent #partial order #performance #using #verification
- Using Partial Orders for the Efficient Verification of Deadlock Freedom and Safety Properties (PG, PW), pp. 332–342.
- CAV-1991-Goldschlag #liveness #verification
- Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits (DMG), pp. 354–364.
- ICLP-1991-CodishDY #algorithm #alias #analysis #unification
- Derivation and Safety of an Abstract Unification Algorithm for Groundness and Aliasing Analysis (MC, DD, EY), pp. 79–93.
- ICSE-1990-Laprie #assessment #on the
- On the Assessment of Safety-Critical Software Systems (JCL), p. 222.
- ICSE-1990-Leveson #evaluation
- Evaluation of Software Safety (NGL), pp. 223–224.
- ICSE-1990-Thomas
- Assessing Failure Probabilities in Safety-Critical Systems Containing Software (MT), p. 227.
- CAV-1990-Burch #liveness #verification
- Verifying Liveness Properties by Verifying Safety Properties (JRB), pp. 224–232.
- PODS-1989-SagivV #database #datalog #infinity #query
- Safety of Datalog Queries over Infinite Databases (YS, MYV), pp. 160–171.
- ICSE-1989-JaffeL #realtime #requirements #robust #specification
- Completeness, Robustness, and Safety in Real-Time Software Requirements Specification (MSJ, NGL), pp. 302–311.
- PODS-1988-KiferRS #approach #axiom #database #deduction #query
- An Axiomatic Approach to Deciding Query Safety in Deductive Databases (MK, RR, AS), pp. 52–60.
- SIGMOD-1988-KrishnamurthyRS #datalog #effectiveness #framework #testing
- A Framework for Testing Safety and Effective Computability of Extended Datalog (RK, RR, OS), pp. 154–163.
- PLDI-1988-Chase #optimisation
- Safety Considerations for Storage Allocation Optimizations (DRC), pp. 1–10.
- ICSE-1988-ChaLS #analysis #fault #using #verification
- Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
- PODS-1987-GelderT #calculus #relational
- Safety and Correct Translation of Relational Calculus Formulas (AVG, RWT), pp. 313–327.
- PODS-1987-RamakrishnanBS #horn clause #infinity #recursion
- Safety of Recursive Horn Clauses With Infinite Relations (RR, FB, AS), pp. 328–339.
- ESEC-1987-Knabe #exception #fault #industrial #re-engineering
- The Impact of Exception Handling on Labour Division, Safety, and Error Diagnostics in an Industrial Software Engineering Environment (CK), pp. 369–376.
- PODS-1986-Su
- Safety of Non-Well-Locked Trasnaction Systems (JS), pp. 47–52.
- PODS-1985-WolfsonY #database #distributed #transaction
- Deadlock-Freedom (and Safety) of Transactions in a Distributed Database (OW, MY), pp. 105–112.
- CSE-1985-LevesonS #fault tolerance #petri net #using
- Analyzing Safety and Fault Tolerance Using Time Petri Nets (NGL, JLS), pp. 339–355.
- PODS-1982-Soisalon-SoininenW #algorithm #detection #testing #transaction
- An Optimal Algorithm for Testing for Safety and Detecting Deadlocks in Locked Transaction Systems (ESS, DW), pp. 108–116.
- ICALP-1977-Sajaniemi
- The Safety of a Coroutine System (JS), pp. 440–452.