BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
safety
Google safety

Tag #safety

473 papers:

POPLPOPL-2020-FarzanV #proving #reduction
Reductions for safety proofs (AF, AV), p. 28.
POPLPOPL-2020-MathurMKMV #memory management #source code
Deciding memory safety for single-pass heap-manipulating programs (UM, AM, PK, PM, MV0), p. 29.
ICSAICSA-2019-DajsurenL #analysis
Safety Analysis Method for Cooperative Driving Systems (YD, GL), pp. 181–190.
IFM-2019-OortwijnH19a #industrial #verification
Formal Verification of an Industrial Safety-Critical Traffic Tunnel Control System (WO, MH), pp. 418–436.
CoGVS-Games-2019-ZahedWQ #education #game studies
Play It Safe: An Educational Cyber Safety Game for Children in Elementary School (BTZ, GW, JQ), pp. 1–4.
OOPSLAOOPSLA-2019-FernandoJM #approximate #canonical #parallel #source code #verification
Verifying safety and accuracy of approximate parallel programs via canonical sequentialization (VF, KJ, SM), p. 29.
PLATEAUPLATEAU-2019-KambhatlaCOSAM #case study #programming language #usability
A Pilot Study of the Safety and Usability of the Obsidian Blockchain Programming Language (GK, MJC, RO, JS, JA, BAM), p. 11.
SASSAS-2019-YanCSZZX #adaptation #analysis #verification
Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis (HY, SC0, YS, YZ, CZ, JX), pp. 48–72.
ASEASE-2019-Wu0C #case study #development #experience
Better Development of Safety Critical Systems: Chinese High Speed Railway System Development Experience Report (ZW, JL0, XC), pp. 1216–1217.
ESEC-FSEESEC-FSE-2019-BanerjeeCS #java #named #null #type system
NullAway: practical type-based null safety for Java (SB, LC, MS), pp. 740–750.
ESEC-FSEESEC-FSE-2019-Kwiatkowska #learning #robust
Safety and robustness for deep learning with provable guarantees (keynote) (MK), p. 2.
ICSE-2019-AgrawalKVRCL #reuse
Leveraging artifact trees to evolve and reuse safety cases (AA, SK, MV, MR, JCH, RRL), pp. 1222–1233.
ICSE-2019-HuangGLLQC0 #api #java #named
SafeCheck: safety enhancement of Java unsafe API (SH, JG, SL, XL, YQ, KC, JH0), pp. 889–899.
ASPLOSASPLOS-2019-ZhangLJ #memory management #named
BOGO: Buy Spatial Memory Safety, Get Temporal Memory Safety (Almost) Free (TZ, DL, CJ), pp. 631–644.
CASECASE-2019-SchlotzhauerKWB #2d #collaboration #metric #on the
On the trustability of the safety measures of collaborative robots: 2D Collision-force-map of a sensitive manipulator for safe HRC (AS, LK, JW, MB, MWH), pp. 1676–1683.
CASECASE-2019-ThonnessenSFCK #quickcheck #testing #using
Testing Safety PLCs Using QuickCheck (DT, NS, MF, KC, SK), pp. 1–6.
FASEFASE-2019-HuangK #constraints #security #verification
Formal Verification of Safety & Security Related Timing Constraints for a Cooperative Automotive System (LH, EYK0), pp. 210–227.
CAVCAV-2019-BansalV #automaton
Safety and Co-safety Comparator Automata for Discounted-Sum Inclusion (SB, MYV), pp. 60–78.
ICSTICST-2019-Wei #analysis
AADL-Based Safety Analysis Approaches for Safety-Critical Systems (XW), pp. 481–482.
FMFM-2018-KastnerMF #abstract interpretation #on the #security
On Software Safety, Security, and Abstract Interpretation (DK, LM, CF), pp. 662–665.
SEFMSEFM-2018-SchuppA #analysis #concurrent #hybrid #multi #thread
Spread the Work: Multi-threaded Safety Analysis for Hybrid Systems (SS, ), pp. 89–104.
ICFP-2018-Campora0W #performance #type system
Casts and costs: harmonizing safety and performance in gradual typing (JPCI, SC0, EW), p. 30.
CIKMCIKM-2018-Kakar0SMTZRHSD #interactive #named
DEVES: Interactive Signal Analytics for Drug Safety (TK, XQ0, AS, BM, HQT, BZ, EAR, LH, SKS, SD), pp. 1891–1894.
KDDKDD-2018-Janakiraman #learning #multi #using
Explaining Aviation Safety Incidents Using Deep Temporal Multiple Instance Learning (VMJ), pp. 406–415.
MoDELSMoDELS-2018-NordmannM #assessment #component #fault #lessons learnt #modelling
Lessons Learned from Model-Based Safety Assessment with SysML and Component Fault Trees (AN, PM), pp. 134–143.
AdaEuropeAdaEurope-2018-JaradatP #contract #design #runtime #using #verification
Using Safety Contracts to Verify Design Assumptions During Runtime (OJ, SP), pp. 3–18.
AdaEuropeAdaEurope-2018-SljivoGCHP #component #reuse #specification
Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation (IS, BG, JC, HH, SP), pp. 19–33.
POPLPOPL-2018-Kuncar0 #higher-order
Safety and conservativity of definitions in HOL and Isabelle/HOL (OK, AP0), p. 26.
POPLPOPL-2018-PadonHLPSS #first-order #liveness #logic
Reducing liveness to safety in first-order logic (OP, JH, GL, AP, MS, SS), p. 33.
PPDPPPDP-2018-ContrastinOR #automation #data flow #datalog #order
Automatic Reordering for Dataflow Safety of Datalog (MC, DAO, ACR), p. 17.
SASSAS-2018-PrabhuMV #behaviour #learning #proving
Efficiently Learning Safety Proofs from Appearance as well as Behaviours (SP, KM, RV), pp. 326–343.
CSLCSL-2018-AvronLL
Safety, Absoluteness, and Computability (AA, SL, NL), p. 17.
IFM-2017-BaxterC #algebra #bytecode #compilation #java
Algebraic Compilation of Safety-Critical Java Bytecode (JB, AC), pp. 161–176.
IFM-2017-Linker #higher-order #reasoning
Spatial Reasoning About Motorway Traffic Safety with Isabelle/HOL (SL), pp. 34–49.
SEFMSEFM-2017-MasciZJC #analysis #identification #requirements #user interface
A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices (PM, YZ0, PLJ, JCC), pp. 284–299.
CHI-PLAYCHI-PLAY-2017-HartIAOM #comprehension #game studies
Understanding Engagement within the Context of a Safety Critical Game (JH, II, AA, MO, MM), pp. 253–264.
CoGVS-Games-2017-JacobNCR #adaptation #game studies
Adaptivity and safety in location-based games (JTPNJ, RN, AC, RR0), pp. 173–174.
ECIRECIR-2017-CohanFGR #categorisation
A Neural Attention Model for Categorizing Patient Safety Events (AC, AF, NG, RMR), pp. 720–726.
KDDKDD-2017-WangCWX
No Longer Sleeping with a Bomb: A Duet System for Protecting Urban Safety from Dangerous Goods (JW, CC, JW, ZX), pp. 1673–1681.
MoDELSMoDELS-2017-DenneyPW #architecture #development #modelling
Model-Driven Development of Safety Architectures (ED, GP, IW), pp. 156–166.
AdaEuropeAdaEurope-2017-CasimiroGR
Enforcing Timeliness and Safety in Mission-Critical Systems (AC, IG, JR), pp. 53–69.
AdaEuropeAdaEurope-2017-RoyuelaMQP #ada #correctness
OpenMP Tasking Model for Ada: Safety and Correctness (SR, XM, EQ, LMP), pp. 184–200.
POPLPOPL-2017-KonnovLVW #algorithm #distributed #fault tolerance #liveness #verification
A short counterexample property for safety and liveness verification of fault-tolerant distributed algorithms (IVK0, ML, HV, JW), pp. 719–734.
POPLPOPL-2017-LangeNTY #liveness #programming
Fencing off go: liveness and safety for channel-based programming (JL, NN, BT, NY), pp. 748–761.
ASEASE-2017-RahimiXCL #problem
Diagnosing assumption problems in safety-critical products (MR, WX, JCH, RRL), pp. 473–484.
ICSE-2017-ChoudharyLP #concurrent #detection #generative #performance #testing #thread
Efficient detection of thread safety violations via coverage-guided generation of concurrent tests (AC, SL, MP), pp. 266–277.
CASECASE-2017-KhanFF #automation #framework #generative #logic
Virtual engineering framework for automatic generation of control logic including safety (AK, PF, MF), pp. 648–653.
CADECADE-2017-BrockschmidtJT0 #integer #proving #termination
Certifying Safety and Termination Proofs for Integer Transition Systems (MB, SJCJ, RT, AY0), pp. 454–471.
CAVCAV-2017-HuangKWW #network #verification
Safety Verification of Deep Neural Networks (XH0, MK, SW, MW), pp. 3–29.
ICSTICST-2017-DarkeCCV #abstraction #bound #model checking #performance #proving #using
Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
FMFM-2016-PeleskaH #modelling #testing
Industrial-Strength Model-Based Testing of Safety-Critical Systems (JP0, WlH), pp. 3–22.
IFM-2016-DarvasMV #verification
Formal Verification of Safety PLC Based Control Software (DD, IM, EBV), pp. 508–522.
IFM-2016-LuckcuckCW #formal method #java #paradigm
A Formal Model of the Safety-Critical Java Level 2 Paradigm (ML, AC, AJW), pp. 226–241.
IFM-2016-MullerMRSP #approach #component #hybrid #verification
A Component-Based Approach to Hybrid Systems Safety Verification (AM0, SM, WR, WS, AP), pp. 441–456.
SEFMSEFM-2016-BendikBBC #analysis #bound #order #requirements #set
Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (JB, NB, JB, IC), pp. 121–136.
CoGVS-Games-2016-JiangCDJYZ #comprehension #game studies #process #prototype
Game Prototype for Understanding Safety Issues of Life Boat Launching Process (MJ0, JC, MD, JJ, HjY, JJZ0), pp. 1–8.
MoDELSMoDELS-2016-Blache #bound #c #development #embedded #modelling #using
Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
PLDIPLDI-2016-PadonMPSS #interactive #named #verification
Ivy: safety verification by interactive generalization (OP, KLM, AP, MS, SS), pp. 614–630.
FSEFSE-2016-GhassabaniGW #generative #induction #performance
Efficient generation of inductive validity cores for safety properties (EG, AG, MWW), pp. 314–325.
CAVCAV-2016-PernsteinerLTTW #modelling #using
Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers (SP, CL, ET, ZT, XW0, MDE, JJ), pp. 23–41.
ICSTICST-2016-EnoiuCSP #embedded #empirical #testing
A Controlled Experiment in Testing of Safety-Critical Embedded Software (EPE, AC, DS, PP), pp. 1–11.
QoSAQoSA-2015-Bozhinoski #adaptation #mobile #multi
Managing Safety and Adaptability in Mobile Multi-Robot Systems (DB), pp. 135–140.
FMFM-2015-BratBDGHK #verification
Verifying the Safety of a Flight-Critical System (GB, DHB, MD, DG, FH, TK), pp. 308–324.
FMFM-2015-DeboisHS #composition #information management #liveness #process #refinement #runtime
Safety, Liveness and Run-Time Refinement for Modular Process-Aware Information Systems with Dynamic Sub Processes (SD, TTH, TS), pp. 143–160.
FMFM-2015-KroeningLW #automaton #bound #model checking #proving
Proving Safety with Trace Automata and Bounded Model Checking (DK, ML, GW), pp. 325–341.
HCIHCI-UC-2015-NakanishiTUYS
Fukushima No. 1 Nuclear Power Plant: The Moment of “Safety Myth” Collapses (AN, TT, HU, MY, DS), pp. 350–357.
HCIHIMI-IKC-2015-LiangG #approach #information management #ontology #semantics #web
Improving Knowledge Management in Patient Safety Reporting: A Semantic Web Ontology Approach (CL, YG), pp. 118–128.
SEKESEKE-2015-QinMDJ #case study #modelling
Study on the Accident-causing Model Based on Safety Region and Applications in China Railway Transportation System (YQ, HM, MD, LJ), pp. 528–535.
PLEASEPLEASE-2015-Gallina #product line #reuse #towards
Towards Enabling Reuse in the Context of Safety-Critical Product Lines (BG), pp. 15–18.
SPLCSPLC-2015-DomisAB #analysis #modelling #tool support #uml #using #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-KassmeyerSS #impact analysis #process #variability
A process to support a systematic change impact analysis of variability and safety in automotive functions (MK, MS, MS), pp. 235–244.
AdaEuropeAdaEurope-2015-JaradatBP #analysis #maintenance #using
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
AdaEuropeAdaEurope-2015-KhanfarLM #slicing
Static Backward Program Slicing for Safety-Critical Systems (HK, BL, ANM), pp. 50–65.
AdaEuropeAdaEurope-2015-PerezGTT #clustering #concept #manycore
A Safety Concept for an IEC-61508 Compliant Fail-Safe Wind Power Mixed-Criticality System Based on Multicore and Partitioning (JP, DG, ST, TT), pp. 3–17.
PPDPPPDP-2015-ChenLJZL #automation #declarative #network #source code #verification
Automated verification of safety properties of declarative networking programs (CC, LKL, LJ, WZ, BTL), pp. 79–90.
SASSAS-2015-Brain0KS #invariant #verification
Safety Verification and Refutation by k-Invariants and k-Induction (MB, SJ, DK, PS), pp. 145–161.
ICSEICSE-v2-2015-DenneyPH #assurance
Dynamic Safety Cases for Through-Life Safety Assurance (ED, GJP, IH), pp. 587–590.
SACSAC-2015-BurtonS #composition #mixin
The safety of dynamic mixin composition (EB, ES), pp. 1992–1999.
SACSAC-2015-ByunC #automation #constraints #operating system #testing #using
Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
CASECASE-2015-ForstnerM #optimisation #using
Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
DACDAC-2015-ChaariENTK #approach #modelling
A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems (MC, WE, CN, BAT, TK), p. 6.
DACDAC-2015-ShererRO #functional
Ensuring functional safety compliance for ISO 26262 (ADS, JR, RO), p. 3.
DATEDATE-2015-HernandezA #low cost
Low-cost checkpointing in automotive safety-relevant systems (CH, JA), pp. 91–96.
ESOPESOP-2015-DavidKL15a #reasoning #source code #termination
Propositional Reasoning about Safety and Termination of Heap-Manipulating Programs (CD, DK, ML), pp. 661–684.
TACASTACAS-2015-NutzDMP #contest #memory management
ULTIMATE KOJAK with Memory Safety Checks — (Competition Contribution) (AN, DD, MMM, AP), pp. 458–460.
TACASTACAS-2015-StroderAFHG #c #contest #memory management #named #source code #termination
AProVE: Termination and Memory Safety of C Programs — (Competition Contribution) (TS, CA, FF, JH, JG), pp. 417–419.
CAVCAV-2015-BozzanoCGM #analysis #modelling #performance
Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
CAVCAV-2015-BozzanoCPJKPRT #analysis #design
Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
CAVCAV-2015-ZouFZM #automation #difference #equation #verification
Automatic Verification of Stability and Safety for Delay Differential Equations (LZ, MF, NZ, PNM), pp. 338–355.
VMCAIVMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #testing #using
Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
ECSAECSA-2014-GurbuzTE #architecture #design
Safety Perspective for Supporting Architectural Design of Safety-Critical Systems (HGG, BT, NPE), pp. 365–373.
WICSAWICSA-2014-UusitaloRKMM #architecture #automation #lessons learnt
Lessons Learned from Safety-Critical Software-Based Automation Architectures of Nuclear Power Plants (EJU, MR, MK, VM, TM), pp. 45–48.
SCAMSCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #thread
C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
CHICHI-2014-DunwellFPHALS #approach #game studies #learning
A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
CSCWCSCW-2014-WisniewskiXRC #online
Adolescent online safety: the “moral” of the story (PJW, HX, MBR, JMC), pp. 1258–1271.
HCIDHM-2014-ButlewskiMC #development
Non-financial Factors of Job Satisfaction in the Development of a Safety Culture Based on Examples from Poland and Romania (MB, AM, RC), pp. 577–587.
HCIDUXU-ELAS-2014-YangWW #multi
Impact of Multi-sensory On-Bicycle Rider Assistance Devices on Rider Concentration and Safety (CYY, YTW, CTW), pp. 378–388.
HCIDUXU-TMT-2014-CorreiaSCBS #design #risk management
Design as a Tool for Managing Risks and Vulnerabilities Regarding Artifacts of Public Safety (WC, SXdS, FC, MLNB, MMS), pp. 437–444.
HCIHCI-AS-2014-StelzerSO #novel #user interface
Evaluating Novel User Interfaces in (Safety Critical) Railway Environments (AS, IS, AO), pp. 502–512.
HCIHIMI-AS-2014-AbujaradSDP #online
Management of On-Line Registries Information for Patient Safety in Long-Term Care (FA, SJS, TAD, LAP), pp. 307–316.
KDDKDD-2014-KateCPK #mining #named
FoodSIS: a text mining system to improve the state of food safety in singapore (KK, SC, AP, JK), pp. 1709–1718.
SPLCSPLC-2014-LanduytbHMJMJBA #design #towards #variability
Towards managing variability in the safety design of an automotive hall effect sensor (DVL, SOdb, AH, SM, WJ, SM, GdJ, OB, MA), pp. 304–309.
AdaEuropeAdaEurope-2014-ZhouLL #approach #embedded #requirements #validation
A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
PLDIPLDI-2014-HanxledenDMSMAMO #named
SCCharts: sequentially constructive statecharts for safety-critical applications: HW/SW-synthesis for a conservative extension of synchronous statecharts (RvH, BD, CM, SS, MM, JA, SM, OO), p. 39.
PPDPPPDP-2014-Ramsay #abstraction #recursion
Exact Intersection Type Abstractions for Safety Checking of Recursion Schemes (SJR), pp. 175–186.
SASSAS-2014-BrotherstonG #abduction #termination
Cyclic Abduction of Inductively Defined Safety and Termination Preconditions (JB, NG), pp. 68–84.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
REFSQREFSQ-2014-NairVMTdB #analysis #problem #traceability
Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
FSEFSE-2014-Kan #model checking #traceability #verification
Traceability and model checking to support safety requirement verification (SK), pp. 783–786.
SACSAC-2014-Gutierrez-GarciaG #multi #simulation
Multi-agent simulation of perception of safety from crime (JOGG, AGdSG), pp. 573–578.
CASECASE-2014-KaiS #development
Development of a velocity and contact force-based mechanical safety device for service robots (YK, SS), pp. 1188–1193.
CASECASE-2014-RahmanCBM #approach #assessment
Ex-ante assessment of struck-by safety hazards in construction projects: A motion-planning approach (MMR, TC, LB, AM), pp. 277–282.
DACDAC-2014-HernandezA #detection #fault #named
LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
DACDAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #state of the art #using
Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
DACDAC-2014-Rodriguez-NavasSHNLL #approach #automation #functional #specification #verification
Automated Specification and Verification of Functional Safety in Heavy-Vehicles: the VeriSpec Approach (GRN, CCS, HH, MN, OL, HL), p. 4.
DATEDATE-2014-IliasovASM #design #refinement
Design of safety critical systems by refinement (AI, AA, DS, AM), pp. 1–4.
DATEDATE-2014-NuzzoFIS #contract #cyber-physical #design #protocol
Contract-based design of control protocols for safety-critical cyber-physical systems (PN, JBF, AI, ALSV), pp. 1–4.
DATEDATE-2014-PandeyV #analysis #fault
Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
TACASTACAS-2014-ChenCFNO #proving
Proving Nontermination via Safety (HYC, BC, CF, KN, PWO), pp. 156–171.
TACASTACAS-2014-Kupferman
Variations on Safety (OK), pp. 1–14.
CAVCAV-2014-DilligDC #memory management #synthesis
Optimal Guard Synthesis for Memory Safety (TD, ID, SC), pp. 491–507.
IJCARIJCAR-2014-StroderGBFFHS #memory management #pointer #proving #source code #termination
Proving Termination and Memory Safety for Programs with Pointer Arithmetic (TS, JG, MB, FF, CF, JH, PSK), pp. 208–223.
VMCAIVMCAI-2014-BloemKS #satisfiability #specification #synthesis
SAT-Based Synthesis Methods for Safety Specs (RB, RK, MS), pp. 1–20.
VMCAIVMCAI-2014-BozgaIK #integer #problem #source code
Safety Problems Are NP-complete for Flat Integer Programs with Octagonal Loops (MB, RI, FK), pp. 242–261.
VMCAIVMCAI-2014-KiniV #automaton #ltl #probability #specification
Probabilistic Automata for Safety LTL Specifications (DK, MV), pp. 118–136.
CoGVS-Games-2013-HerpersSVSFHSH #automation #evaluation #tool support
Vr-Based Safety Evaluation of Automatically Controlled Machine Tools (RH, DS, MV, TS, SF, TH, MS, MH), pp. 1–4.
HCIDHM-HB-2013-HartwigW #health #persuasion
Safety and Health at Work through Persuasive Assistance Systems (MH, AW), pp. 40–49.
HCIDHM-SET-2013-Bretschneider-Hagemes #aspect-oriented #health
AmI-Technology at Work — A Sociological Perspective Covering Aspects of Occupational Safety and Health (OSH) (MBH), pp. 289–296.
HCIDHM-SET-2013-LuL #design #modelling
Constructing Ergonomic Safety Modelling for Evaluating New Designs of Child Car Seats (CYL, HHL), pp. 338–347.
HCIDHM-SET-2013-SunNHMDJMQ #adaptation #design #interactive #physics
Adaptive User-Centered Design for Safety and Comfort of Physical Human Nursing — Care Robot Interaction (MS, HN, SH, KM, MD, CaJ, TM, GQ), pp. 365–372.
HCIDHM-SET-2013-YangYF #using
Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
HCIDUXU-NTE-2013-AbujaradSDP #monitoring
Rap Backs: Continuous Workforce Monitoring to Improve Patient Safety in Long-Term Care (FA, SJS, TAD, LAP), pp. 3–9.
HCIDUXU-NTE-2013-IbrahimABSBL
Safety of Natural Disasters (LFI, RA, SB, RS, MB, TAAL), pp. 85–94.
HCIHCI-AMTE-2013-FearyBCHLSS #design #evaluation #interface
Linking Context to Evaluation in the Design of Safety Critical Interfaces (MF, DB, XC, AH, RLL, LS, SPS), pp. 193–202.
HCIHCI-AS-2013-HuaG #comprehension #difference #evaluation #predict #protocol #usability
Usability Evaluation of a Voluntary Patient Safety Reporting System: Understanding the Difference between Predicted and Observed Time Values by Retrospective Think-Aloud Protocols (LH, YG), pp. 94–100.
HCIHIMI-HSM-2013-ArimaUA
Supporting Residents Evacuation and Safety Inquiry in Case of Disaster (MA, TU, MA), pp. 443–452.
HCIHIMI-HSM-2013-Campbell #simulation #using
Safety Culture: An Examination of the Relationship between a Safety Management System and Pilot Judgment Using Simulation in Aeronautics (SAC), pp. 453–459.
HCIHIMI-HSM-2013-KarashimaN #behaviour
Influence of the Safety Margin on Behavior that Violates Rules (MK, HN), pp. 497–506.
HCIHIMI-HSM-2013-SavoyM #flexibility #interactive
A Precursory Look at Potential Interaction Objectives Affecting Flexible Robotic Cell Safety (AS, AM), pp. 198–206.
KDIRKDIR-KMIS-2013-BachmannNMBAC #information management #process
Preservation and Redeployment of Sensor Acquisition Processes from a Dam Safety Information System (AB, MAN, HM, JB, GA, AC), pp. 490–495.
KEODKEOD-2013-TimonenPT #fuzzy #modelling #ontology #using
Using Associations and Fuzzy Ontologies for Modeling Chemical Safety Information (MT, AP, TT), pp. 26–37.
MODELSMoDELS-2013-VaraP #metamodelling #named #standard
SafetyMet: A Metamodel for Safety Standards (JLdlV, RKPW), pp. 69–86.
SPLCSPLC-2013-SchulzeMB #functional #question #variability
Functional safety and variability: can it be brought together? (MS, JM, DB), pp. 236–243.
AdaEuropeAdaEurope-2013-AsensioLCN #analysis #approach #execution #worst-case
Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
AdaEuropeAdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #using
Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
AdaEuropeAdaEurope-2013-SalazarAMP #ada #framework #modelling #realtime
A Model-Based Framework for Developing Real-Time Safety Ada Systems (ES, AA, MAdM, JAdlP), pp. 127–142.
HILTHILT-2013-LarsonHFD #fault #modelling #using
Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
HILTHILT-2013-Taft #concurrent #named #parallel #proving #source code #thread #tutorial
Tutorial: proving safety of parallel / multi-threaded programs (STT), pp. 1–2.
RERE-2013-GuillermDS
A safety requirement engineering method and tool (RG, HD, NS), pp. 328–329.
RERE-2013-Nair #assurance #certification
Evidence management for evolutionary safety assurance and certification (SN), pp. 385–388.
SACSAC-PL-J-2010-PopeeaC13 #analysis #debugging #proving
Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
SACSAC-2013-BrunsKB
Virtualization for safety-critical, deeply-embedded devices (FB, DK, AB), pp. 1485–1492.
SACSAC-2013-NotanderRH #design #development #flexibility #framework #modelling
A model-based framework for flexible safety-critical software development: a design study (JPN, PR, MH), pp. 1137–1144.
DATEDATE-2013-AbdullaDRSZ #hybrid #liveness #memory management #transaction #verification
Verifying safety and liveness for the FlexTM hybrid transactional memory (PAA, SD, AR, AS, YZ), pp. 785–790.
CAVCAV-2013-KongHSHG #generative #hybrid #verification
Exponential-Condition-Based Barrier Certificate Generation for Safety Verification of Hybrid Systems (HK, FH, XS, WNNH, MG), pp. 242–257.
ICSTICST-2013-GraslandBGP #approach #functional #hybrid #testing
A Functional Testing Approach for Hybrid Safety Properties with Incomplete Information (YG, LdB, RG, IP), pp. 104–113.
ICSTICST-2013-NairVSB #assessment #classification #overview #perspective
Classification, Structuring, and Assessment of Evidence for Safety — A Systematic Literature Review (SN, JLdlV, MS, LCB), pp. 94–103.
ISSTAISSTA-2013-Bonacchi #case study #proving
Formal safety proof: a real case study in a railway interlocking system (AB0), pp. 378–381.
ITiCSEITiCSE-2012-BaghdadiAR #case study #distance #learning #tool support
Applying advanced technology tools in distance learning: case study: traffic data and road safety (MB, KA, JR), p. 389.
IFMIFM-2012-IsobeMNR #approach #capacity #csp
Safety and Line Capacity in Railways — An Approach in Timed CSP (YI, FM, HNN, MR), pp. 54–68.
RTARTA-2012-Lisitsa #automaton #finite #modelling #verification
Finite Models vs Tree Automata in Safety Verification (AL), pp. 225–239.
CoGVS-Games-2012-TeseiBK #game studies #overview #security
Survey on Serious Games Applied to Security, Safety and Crisis Management (AT, AB, RTK), pp. 320–321.
CHICHI-2012-VinotA #design
Legible, are you sure?: an experimentation-based typographical design in safety-critical context (JLV, SA), pp. 2287–2296.
ICEISICEIS-v2-2012-CapelM #approach #automation #composition #correctness #model checking #verification
A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
SEKESEKE-2012-SubburajUS #specification
Specification of Safety Critical Systems with Intelligent Software Agent Method (VHS, JEU, MRS), pp. 578–581.
SIGIRSIGIR-2012-MacdonaldTO12a #effectiveness #learning #rank
Effect of dynamic pruning safety on learning to rank effectiveness (CM, NT, IO), pp. 1051–1052.
ECMFAECMFA-2012-GeP #framework #realtime #uml #verification
Time Properties Verification Framework for UML-MARTE Safety Critical Real-Time Systems (NG, MP), pp. 352–367.
MODELSMoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #testing
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
PLEASEPLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #towards #using
Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
HILTHILT-2012-LevesonFT #embedded
Safety of embedded software (NGL, CHF, JT), pp. 7–8.
HILTHILT-2012-Nilsen #comprehension #java #memory management #overview #tutorial
Tutorial overview: understanding dynamic memory management in safety critical java (KN), pp. 15–22.
PLDIPLDI-2012-PradelG #automation #concurrent #detection #precise #thread
Fully automatic and precise detection of thread safety violations (MP, TRG), pp. 521–530.
QAPLQAPL-2012-YasuokaT #data flow #liveness
Quantitative Information Flow as Safety and Liveness Hyperproperties (HY, TT), pp. 77–91.
REFSQREFSQ-2012-Cleland-HuangHHLM #assurance #query #requirements
Trace Queries for Safety Requirements in High Assurance Systems (JCH, MPEH, JHH, RRL, PM), pp. 179–193.
ICSEICSE-2012-EsteveKNPY #analysis #correctness #dependence #performance
Formal correctness, safety, dependability, and performance analysis of a satellite (MAE, JPK, VYN, BP, YY), pp. 1022–1031.
SACSAC-2012-MaggiorePBA #3d #compilation #performance
A compilation technique to increase X3D performance and safety (GM, FP, MB, MA), pp. 969–974.
SACSAC-2012-MonakovaBS #process #security
Security and safety of assets in business processes (GM, ADB, AS), pp. 1667–1673.
CASECASE-2012-IdenP #algorithm #aspect-oriented #detection #functional
Functional safety aspects of pattern detection algorithms (JI, CIP), pp. 747–752.
DATEDATE-2012-EllenEO #automation #development #embedded #process
Automatic transition between structural system views in a safety relevant embedded systems development process (CE, CE, MO), pp. 820–823.
CAVCAV-2012-ChuJ #reduction #symmetry #verification
A Complete Method for Symmetry Reduction in Safety Verification (DHC, JJ), pp. 616–633.
CAVCAV-2012-HarrisJR #automaton #game studies #programming
Secure Programming via Visibly Pushdown Safety Games (WRH, SJ, TWR), pp. 581–598.
LICSLICS-2012-CarayolS #automaton #effectiveness #equivalence #recursion
Collapsible Pushdown Automata and Labeled Recursion Schemes: Equivalence, Safety and Effective Selection (AC, OS), pp. 165–174.
QoSAQoSA-ISARCS-2011-HillenbrandHMA #architecture #workflow
A metric-based safety workflow for electric/electronic architectures of vehicles (MH, MH, KDMG, NA), pp. 105–114.
FMFM-2011-CavalcantiWW #formal method #java #memory management
The Safety-Critical Java Memory Model: A Formal Account (AC, AJW, JW), pp. 246–261.
SEFMSEFM-2011-SoleimanifardGH #composition #named #verification
ProMoVer: Modular Verification of Temporal Safety Properties (SS, DG, MH), pp. 366–381.
CHICHI-2011-AzenkotPBFLW #independence
Enhancing independence and safety for blind and deaf-blind public transit riders (SA, SP, AB, EF, REL, JOW), pp. 3247–3256.
CHICHI-2011-WoelferIHFG #mobile #people
Improving the safety of homeless young people with mobile phones: values, form and function (JPW, AI, DGH, BF, BTG), pp. 1707–1716.
HCIDUXU-v1-2011-KarschS #precise #usability
Terminological Precision — A Key Factor in Product Usability and Safety (BIK, GS), pp. 138–147.
HCIDUXU-v2-2011-ArdavanC #3d #exclamation #towards
Listen! Somebody Is Walking towards Your Car (Introducing the Awareness-3D Sound System into the Driver to Increase the Pedestrian’s Safety) (MA, FC), pp. 89–98.
HCIHCD-2011-ChaudronGMC #process
Building Human Profile by Aggregation of Activities — Application to Aeronautics Safety (LC, DG, NM, JC), pp. 389–396.
ICEISICEIS-J-2011-GuLZWLSLW #enterprise #evaluation #generative #information management #process
Intelligent Information Acquisition and Utilization in Safety Evaluation Decision Making Process of Power Generation Enterprises (DxG, CyL, JZ, JW, WL, JS, WL, YW), pp. 162–177.
ICEISICEIS-v2-2011-GuLZBWC #assessment #enterprise #information management
A Case-based Enterprise Information System for Thermal Power Plants’ Safety Assessment (DxG, CyL, CrZ, IB, JW, WeC), pp. 32–39.
QAPLQAPL-2011-LeitnerFischerL #analysis #modelling #named #quantum #uml
QuantUM: Quantitative Safety Analysis of UML Models (FLF, SL), pp. 16–30.
AdaSIGAda-2011-Brosgol #named #standard
Do-178c: the next avionics safety standard (BMB), pp. 5–6.
AdaSIGAda-2011-Rogers
Language choice for safety critical applications (JSR), pp. 81–90.
ESEC-FSEESEC-FSE-2011-FalessiNSBM #design #named #slicing
SafeSlice: a model slicing and design safety inspection tool for SysML (DF, SN, MS, LCB, AM), pp. 460–463.
ICSEICSE-2011-LaymanBZF #case study #process
A case study of measuring process risk for early insights into software safety (LL, VRB, MVZ, KLF), pp. 623–632.
CASECASE-2011-SharviaP #approach #assessment #named #towards
IACoB-SA: An approach towards integrated safety assessment (SS, YP), pp. 220–225.
CASECASE-2011-Soressi #industrial
Introduction of safety rule IEC EN62061 in Metal Industry (ES), pp. 195–200.
CASECASE-2011-ThramboulidisSF #automation #industrial #process #towards #verification
Towards an automated verification process for industrial safety applications (KT, DS, GF), pp. 482–487.
DATEDATE-2011-EbrahimiMA #fault #named
ScTMR: A scan chain-based error recovery technique for TMR systems in safety-critical applications (ME, SGM, HA), pp. 298–292.
DATEDATE-2011-MeyerGCLS #cost analysis #execution #using
Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
PPoPPPPoPP-2011-BotincanDDP #automation #memory management #proving
Automatic safety proofs for asynchronous memory operations (MB, MD, AFD, MJP), pp. 313–314.
CAVCAV-2011-BerdineCI #memory management #named
SLAyer: Memory Safety for Systems-Level Code (JB, BC, SI), pp. 178–183.
CSEETCSEET-2010-WongD #research
An Undergraduate Summer Research Program in Software Safety (WEW, VD), pp. 157–164.
ICPCICPC-2010-AreiasCP #contract #reuse #slicing
Contract-Based Slicing Helps on Safety Reuse (SA, DCdC, JSP), pp. 62–63.
SCAMSCAM-2010-SimpsonB #c #memory management #named #runtime
MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime (MSS, RB), pp. 199–208.
SEFMSEFM-2010-LindsayWY #assessment #behaviour #model checking #using
Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
CHICHI-2010-BlomVSGAA #mobile #security
Fear and the city: role of mobile services in harnessing safety and security in urban use contexts (JB, DV, MS, JG, KA, RA), pp. 1841–1850.
CAiSECAiSE-2010-StalhaneSB #analysis #case study #diagrams #sequence chart
Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases (TS, GS, LdB), pp. 165–179.
ICMLICML-2010-ChakrabortyS #convergence #learning #multi
Convergence, Targeted Optimality, and Safety in Multiagent Learning (DC, PS), pp. 191–198.
KDDKDD-2010-DasMSO #algorithm #case study #detection #kernel #learning #multi
Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study (SD, BLM, ANS, NCO), pp. 47–56.
QAPLQAPL-2010-GuedemannO #analysis #modelling #probability
Probabilistic Model-Based Safety Analysis (MG, FO), pp. 114–128.
RERE-2010-HillT #legacy #requirements #traceability
Creating Safety Requirements Traceability for Assuring and Recertifying Legacy Safety-Critical Systems (JH, SRT), pp. 297–302.
ICSEICSE-2010-ChenM #approach #evolution #monitoring #requirements #towards
Towards better support for the evolution of safety requirements via the model monitoring approach (ZC, GM), pp. 219–222.
SACSAC-2010-PopeeaC #analysis #debugging #proving
Dual analysis for proving safety and finding bugs (CP, WNC), pp. 2137–2143.
CASECASE-2010-Hsu #bound #markov
Control of continuous-time Markov chains with safety upper bounds (SPH), pp. 990–993.
DATEDATE-2010-VazquezCTST #programmable
Programmable aging sensor for automotive safety-critical applications (JCV, VHC, ICT, MBS, JPT), pp. 618–621.
ISMMISMM-2010-NagarakatteZMZ #c #compilation #named
CETS: compiler enforced temporal safety for C (SN, JZ, MMKM, SZ), pp. 31–40.
LCTESLCTES-2010-BiehlCT #analysis #development #embedded #modelling
Integrating safety analysis into the model-based development toolchain of automotive embedded systems (MB, DJC, MT), pp. 125–132.
CAVCAV-2010-KawaguchiRJ #named #verification
Dsolve: Safety Verification via Liquid Types (MK, PMR, RJ), pp. 123–126.
CAVCAV-2010-ZhangSRHH #hybrid #probability #verification
Safety Verification for Probabilistic Hybrid Systems (LZ, ZS, SR, HH, EMH), pp. 196–211.
ICSTICST-2010-Panesar-WalawegeSBC #concept #modelling #standard
Characterizing the Chain of Evidence for Software Safety Cases: A Conceptual Model Based on the IEC 61508 Standard (RKPW, MS, LCB, TC), pp. 335–344.
IJCARIJCAR-2010-ChaudhuriDLM #proving #verification
Verifying Safety Properties with the TLA+ Proof System (KC, DD, LL, SM), pp. 142–148.
ISSTAISSTA-2010-GodefroidK #float #memory management #program analysis #proving
Proving memory safety of floating-point computations by combining static and dynamic program analysis (PG, JK), pp. 1–12.
ICALPICALP-v2-2009-AcciaiB #behaviour #infinity #π-calculus
Deciding Safety Properties in Infinite-State π-Calculus via Behavioural Types (LA, MB), pp. 31–42.
ICFPICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #tool support #using
Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
CoGVS-Games-2009-ChittaroR #game studies
Serious Games for Training Occupants of a Building in Personal Fire Safety Skills (LC, RR), pp. 76–83.
HCIDHM-2009-DzaackU #analysis #modelling #multi #performance
Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
HCIHIMI-II-2009-FujitaS #case study #process
The Importance of Information in the Process of Acquisition and Usage of a Medicine for Patient Safety: A Study of the Brazilian Context (PLF, CGS), pp. 489–496.
HCIHIMI-II-2009-LeeD
Impact of Healthcare Information Technology Systems on Patient Safety (BCL, VGD), pp. 559–565.
HCIHIMI-II-2009-LevaKCLKSM #performance
Unique Reporting Form: Flight Crew Auditing of Everyday Performance in an Airline Safety Management System (MCL, AMK, JC, GL, SK, DS, NM), pp. 806–815.
HCIHIMI-II-2009-SpinilloPL #analysis
Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
ICEISICEIS-J-2009-CarrascoHRSE #embedded #interface #monitoring #using
Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems (AC, MDH, MCR, FS, JIE), pp. 737–744.
AdaEuropeAdaEurope-2009-DelangePF #architecture #requirements #security #validation
Validating Safety and Security Requirements for Partitioned Architectures (JD, LP, PHF), pp. 30–43.
PLDIPLDI-2009-NagarakatteZMZ #bound #c #memory management #named
SoftBound: highly compatible and complete spatial memory safety for c (SN, JZ, MMKM, SZ), pp. 245–258.
AdaSIGAda-2009-Gardinier #ada #development #open source
Open source development of a safety critical dual redundant (Ada95/C++) signal control program environment (SCOPE) (MG), pp. 23–30.
SACSAC-2009-KimmSHS #development
Failure management development for integrated automotive safety-critical software systems (HK, SYS, HsH, COS), pp. 517–521.
CASECASE-2009-TanDZKA #collaboration #design #development
Safety design and development of human-robot collaboration in cellular manufacturing (JTCT, FD, YZ, RK, TA), pp. 537–542.
TACASTACAS-2009-KuijperP #game studies
Computing Weakest Strategies for Safety Games of Imperfect Information (WK, JvdP), pp. 92–106.
TACASTACAS-2009-PlakuKV #hybrid #ltl
Falsification of LTL Safety Properties in Hybrid Systems (EP, LEK, MYV), pp. 368–382.
ICEISICEIS-AIDSS-2008-SharpanskykhSB #analysis #modelling
Organizational Modeling and Analysis of Safety Occurrence Reporting in Air Traffic (AS, SHS, HAPB), pp. 225–230.
MODELSMoDELS-2008-StalhaneS #case study #comparison #diagrams #identification
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
MODELSMoDELS-2008-StalhaneS #case study #comparison #diagrams #identification
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
AdaSIGAda-2008-Brosgol #assessment #named
MP1: languages for safety-critical software: issues and assessment (BMB), pp. 7–8.
ICSEICSE-2008-McCafferyPR #agile #assessment #hybrid #named
Ahaa — agile, hybrid assessment method for automotive, safety critical smes (FM, MP, IR), pp. 551–560.
ATEMATEM-J-2006-MiguelBSA #analysis #development #integration #modelling
Integration of safety analysis in model-driven software development (MAdM, JFB, JPS, AA), pp. 260–280.
ASPLOSASPLOS-2008-DeviettiBMZ #architecture #bound #c #named #programming language
Hardbound: architectural support for spatial safety of the C programming language (JD, CB, MMKM, SZ), pp. 103–114.
CASECASE-2008-LiuYGB #certification #functional
Functional safety certification: Practice and issues (JL, CY, FG, SB), pp. 412–417.
CCCC-2008-ProkopskiV #virtual machine
Compiler-Guaranteed Safety in Code-Copying Virtual Machines (GBP, CV), pp. 163–177.
DATEDATE-2008-Fuss
Tailored Solutions for Safety-Installations in the Loetschberg Tunnel — A Project with Importance for the Trans-European Rail Traffic (WF), pp. 21–25.
DATEDATE-2008-PenazziCDSSM #multi
Cooperative Safety: a Combination of Multiple Technologies (RP, PC, MD, AS, MS, EM), pp. 959–961.
DATEDATE-2008-SterponeATG #design #fault tolerance #on the
On the design of tunable fault tolerant circuits on SRAM-based FPGAs for safety critical applications (LS, MAA, JNT, HGM), pp. 336–341.
HPDCHPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #using
Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
OSDIOSDI-2008-WilliamsRWSS #validation
Device Driver Safety Through a Reference Validation Mechanism (DW, PR, KW, EGS, FBS), pp. 241–254.
ISSTAISSTA-2008-LoginovYCFRN #analysis #verification
Verifying dereference safety via expanding-scope analysis (AL, EY, SC, SF, NR, MGN), pp. 213–224.
PODSPODS-2007-Machlin #array #equivalence #multi #query
Index-based multidimensional array queries: safety and equivalence (RM), pp. 175–184.
HCIDHM-2007-RapalaN #reliability
Clinical Patient Safety — Achieving High Reliability in a Complex System (KR, JCN), pp. 710–716.
HCIHCI-AS-2007-Komatsubara
Ergonomic Study of Medicament Packages for the Improvement of Safety in Use (AK), pp. 484–488.
HCIHCI-AS-2007-TanevaL #communication #design
Interfacing Safety and Communication Breakdowns: Situated Medical Technology Design (ST, EL), pp. 525–534.
HCIHCI-IDU-2007-DaimotoAMK #case study #research
Application of Micro-Scenario Method (MSM) to User Research for the Motorcycle’s Informatization — A Case Study for the Information Support System for Safety (HD, SA, MM, MK), pp. 49–57.
MODELSMoDELS-2007-ZoughbiBL #uml
A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software (GZ, LCB, YL), pp. 574–588.
MODELSMoDELS-2007-ZoughbiBL #uml
A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software (GZ, LCB, YL), pp. 574–588.
SASSAS-2007-CalcagnoPV #composition #concurrent #fine-grained
Modular Safety Checking for Fine-Grained Concurrency (CC, MJP, VV), pp. 233–248.
AdaSIGAda-2007-Brosgol #assessment #named
SA2: languages for safety-critical software: issues and assessment (BMB), p. 2.
CASECASE-2007-FukuiNSMMF #automation
Requirement of three-position enabling switches for installing in enabling devices to achieve operational safety of robotics and automation applications (TF, MN, YS, IM, AM, TF), pp. 111–116.
DATEDATE-2007-HairionECS #design
New safety critical radio altimeter for airbus and related design flow (DH, SE, EC, MS), pp. 684–688.
FASEFASE-2007-ManneringHR #design #towards
Towards Normal Design for Safety-Critical Systems (DM, JGH, LR), pp. 398–411.
CAVCAV-2007-CohenN #proving
Local Proofs for Global Safety Properties (AC, KSN), pp. 55–67.
QoSAQoSA-2006-Grunske #component #evaluation #integration #standard #towards
Towards an Integration of Standard Component-Based Safety Evaluation Techniques with SaveCCM (LG), pp. 199–213.
QoSAQoSA-2006-WuK #architecture #design
Managing Architectural Design Decisions for Safety-Critical Software Systems (WW, TK), pp. 59–77.
VLDBVLDB-2006-LiCTACH #data type #query
Safety Guarantee of Continuous Join Queries over Punctuated Data Streams (HGL, SC, JT, DA, KSC, WPH), pp. 19–30.
ICALPICALP-v2-2006-BalabanPZ #distributed #protocol
Invisible Safety of Distributed Protocols (IB, AP, LDZ), pp. 528–539.
ICALPICALP-v2-2006-Jurdzinski #complexity #on the #problem
On Complexity of Grammars Related to the Safety Problem (TJ), pp. 432–443.
FMFM-2006-LiHR #automation #exception #towards #verification
Towards Automatic Exception Safety Verification (XL, HJH, PR), pp. 396–411.
FMFM-2006-UmenoL #automaton #case study #protocol #proving #theorem proving #using
Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
ICEISICEIS-SAIC-2006-BrzezinskiKK #mobile #protocol
Safety of Checkpointing and Rollback-Recovery Protocol for Mobile Systems with RYW Session Guarantee (JB, AK, JK), pp. 118–123.
AdaEuropeAdaEurope-2006-BrosgolW #ada #comparison #java #realtime
A Comparison of Ada and Real-Time JavaTM for Safety-Critical Applications (BMB, AJW), pp. 13–26.
PLDIPLDI-2006-BergerZ #memory management #named #probability
DieHard: probabilistic memory safety for unsafe languages (EDB, BGZ), pp. 158–168.
AdaSIGAda-2006-SwardG
Developing safety critical software for an unmanned aerial vehicle situational awareness tool (RES, MG), pp. 45–50.
ASEASE-2006-DenneyF #automation #certification
Annotation Inference for Safety Certification of Automatically Generated Code (ED, BF), pp. 265–268.
GPCEGPCE-2006-DenneyF #algorithm #automation #certification
A generic annotation inference algorithm for the safety certification of automatically generated code (ED, BF), pp. 121–130.
CASECASE-2006-HuangCC #mobile
Mobile Diagnosis based on RFID for Food Safety (HPH, CSC, TYC), pp. 357–362.
CASECASE-2006-LuL #evaluation #independence #reliability
Reliability evaluation of standby safety systems due to independent and common cause failures (LL, GL), pp. 264–269.
TACASTACAS-2006-OuaknineW #decidability #logic #metric
Safety Metric Temporal Logic Is Fully Decidable (JO, JW), pp. 411–425.
AMOSTA-MOST-J-2005-AugustonMS06 #assessment #automation #behaviour #modelling #testing
Environment behavior models for automation of testing and assessment of system safety (MA, JBM, MtS), pp. 971–980.
CAVCAV-2006-CookPR #named
Terminator: Beyond Safety (BC, AP, AR), pp. 415–418.
FATESFATES-RV-2006-BouquetDGJ #generative #testing
Safety Property Driven Test Generation from (FB, FD, JG, JJ), pp. 225–239.
FATESFATES-RV-2006-LiD #algorithm #aspect-oriented #testing #verification
Decompositional Algorithms for Safety Verification and Testing of Aspect-Oriented Systems (CL, ZD), pp. 100–114.
VMCAIVMCAI-2006-ChangCN #framework #program analysis
A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety (BYEC, AC, GCN), pp. 174–189.
VMCAIVMCAI-2006-JaffarSV06a
Relative Safety (JJ, AES, RV), pp. 282–297.
CBSECBSE-2005-GrunskeKP #component #evaluation #modelling
Model-Driven Safety Evaluation with State-Event-Based Component Failure Annotations (LG, BK, YP), pp. 33–48.
SIGITESIGITE-2005-Hill #network
Equipment safety in the wireless networking laboratory environment (LWH), pp. 83–87.
FMFM-2005-RusuMJ #automation #consistency #testing #validation #verification
Automatic Verification and Conformance Testing for Validating Safety Properties of Reactive Systems (VR, HM, TJ), pp. 189–204.
FMFM-2005-WassyngLH
Timing Tolerances in Safety-Critical Software (AW, ML, XH), pp. 157–172.
CHICHI-2005-AragonH #simulation #visualisation
Improving aviation safety with information visualization: a flight simulation study (CRA, MAH), pp. 441–450.
ICEISICEIS-v3-2005-Boulanger #analysis #named
BRAIL — Safety Requirement Analysis (JLB), pp. 108–111.
KDDKDD-2005-NorenOB #database #detection
A hit-miss model for duplicate detection in the WHO drug safety database (GNN, RO, AB), pp. 459–468.
SEKESEKE-2005-HsiungL #modelling #verification
Model-based Verification of Safety-Critical Systems (PAH, YHL), pp. 596–601.
SASSAS-2005-HarrenN #assembly #dependent type #using
Using Dependent Types to Certify the Safety of Assembly Code (MH, GCN), pp. 155–170.
SASSAS-2005-TerauchiA #data flow #problem
Secure Information Flow as a Safety Problem (TT, AA), pp. 352–367.
ASEASE-2005-CouchotGK #approach #deduction #protocol
A uniform deductive approach for parameterized protocol safety (JFC, AG, NK), pp. 364–367.
ICSEICSE-2005-BurmesterGHST #development #modelling #realtime
The fujaba real-time tool suite: model-driven development of safety-critical, real-time systems (SB, HG, MH, DS, MT), pp. 670–671.
ICSEICSE-2005-ChinKQPN #alias #policy #verification
Verifying safety policies with size properties and alias controls (WNC, SCK, SQ, CP, HHN), pp. 186–195.
DACDAC-2005-GanaiGA #model checking #satisfiability
Beyond safety: customized SAT-based model checking (MKG, AG, PA), pp. 738–743.
DATEDATE-2005-ChappellMPOFS #adaptation #generative #realtime
Exploiting Real-Time FPGA Based Adaptive Systems Technology for Real-Time Sensor Fusion in Next Generation Automotive Safety Systems (SC, AM, DP, DO, BF, CS), pp. 180–185.
DATEDATE-2005-HeckmannF #abstract interpretation #embedded
erifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation (RH, CF), pp. 618–619.
DATEDATE-2005-Horsky
LC Oscillator Driver for Safety Critical Applications (PH), pp. 159–164.
DATEDATE-2005-JeffreyCPLRR #configuration management #integration #monitoring #online #using
The Integration of On-Line Monitoring and Reconfiguration Functions using IEEE1149.4 Into a Safety Critical Automotive Electronic Control Unit (CJ, RC, SP, ML, AR, SR), pp. 153–158.
ESOPESOP-2005-WildmoserN #bytecode
Asserting Bytecode Safety (MW, TN), pp. 326–341.
FASEFASE-2005-BeyerHJM #memory management
Checking Memory Safety with Blast (DB, TAH, RJ, RM), pp. 2–18.
FoSSaCSFoSSaCS-2005-AehligMO #strict #string
Safety Is not a Restriction at Level 2 for String Languages (KA, JGdM, CHLO), pp. 490–504.
CAVCAV-2005-ConwayNDE #algorithm #analysis #incremental #interprocedural
Incremental Algorithms for Inter-procedural Analysis of Safety Properties (CLC, KSN, DD, SAE), pp. 449–461.
VMCAIVMCAI-2005-BurckhardtAM #composition #implementation #parametricity #refinement #verification
Verifying Safety of a Token Coherence Implementation by Parametric Compositional Refinement (SB, RA, MMKM), pp. 130–145.
CBSECBSE-2004-SandstromFA #component #embedded #realtime
Introducing a Component Technology for Safety Critical Embedded Real-Time Systems (KS, JF, ), pp. 194–208.
SEFMSEFM-2004-LeinoS #c# #exception
Exception Safety for C# (KRML, WS), pp. 218–227.
ICFPICFP-2004-YuS #assembly #concurrent #verification
Verification of safety properties for concurrent assembly code (DY, ZS), pp. 175–188.
AdaEuropeAdaEurope-2004-GiriMJK #ada #approach #random #testing
A Randomised Test Approach to Testing Safety Critical Ada Code (SKG, AM, YVJ, KK), pp. 190–199.
PLDIPLDI-2004-YahavR #abstraction #using #verification
Verifying safety properties using separation and heterogeneous abstractions (EY, GR), pp. 25–34.
AdaSIGAda-2004-ChapmanH #analysis #data flow #modelling #security
Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
FSEFSE-2004-DingelL #analysis #automation #concurrent #source code #txl #using
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
FSEFSE-2004-XuDS #c #memory management #performance #source code
An efficient and backwards-compatible transformation to ensure memory safety of C programs (WX, DCD, RS), pp. 117–126.
ICSEICSE-2004-SenVAR #distributed #monitoring #performance
Efficient Decentralized Monitoring of Safety in Distributed Systems (KS, AV, GA, GR), pp. 418–427.
DATEDATE-v1-2004-ManoliosS #automation #liveness #modelling #using #verification #web
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements (PM, SKS), pp. 168–175.
TACASTACAS-2004-SenRA #analysis #online #parallel #performance #predict #source code #thread
Online Efficient Predictive Safety Analysis of Multithreaded Programs (KS, GR, GA), pp. 123–138.
CAVCAV-2004-Wang #analysis #hybrid #linear #parametricity
Symbolic Parametric Safety Analysis of Linear Hybrid Systems with BDD-Like Data-Structures (FW), pp. 295–307.
CSLCSL-2004-Maier #liveness #ltl
Intuitionistic LTL and a New Characterization of Safety and Liveness (PM), pp. 295–309.
ICTSSTestCom-2004-RusuMTJJ #testing #verification
From Safety Verification to Safety Testing (VR, HM, VT, TJ, BJ), pp. 160–176.
FMFME-2003-BozzanoCCVV #assessment #case study #industrial
Improving Safety Assessment of Complex Systems: An Industrial Case Study (MB, AC, MC, LV, AV), pp. 208–222.
FMFME-2003-DenneyF #correctness #policy
Correctness of Source-Level Safety Policies (ED, BF), pp. 894–913.
RTARTA-2003-ChenRV #analysis #rule-based
Rule-Based Analysis of Dimensional Safety (FC, GR, RPV), pp. 197–207.
KDDKDD-2003-FramAD #data mining #empirical #mining
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety (DMF, JSA, WD), pp. 359–368.
UMLUML-2003-Jurjens #uml
Developing Safety-Critical Systems with UML (JJ), pp. 360–372.
AdaEuropeAdaEurope-2003-JeppuKS #ada #realtime #testing #using
Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
PLDIPLDI-2003-BlanchetCCFMMMR #scalability
A static analyzer for large safety-critical software (BB, PC, RC, JF, LM, AM, DM, XR), pp. 196–207.
SASSAS-2003-ShahamYKS #memory management
Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management (RS, EY, EKK, SS), pp. 483–503.
RERE-2003-Romanski #configuration management #requirements #traceability
Requirements, Configuration Management and Traceability for Safety Critical Software (GR), p. 304.
ASEASE-2003-RosuC #metric
Certifying Measurement Unit Safety Polic (GR, FC), pp. 304–309.
ESEC-FSEESEC-FSE-2003-SenRA #analysis #parallel #runtime #source code #thread
Runtime safety analysis of multithreaded programs (KS, GR, GA), pp. 337–346.
ICSEICSE-2003-LutzM #requirements #testing
Requirements Discovery during the Testing of Safety-Critical Software (RRL, ICM), pp. 578–585.
LCTESLCTES-2003-DhurjatiKAL #garbage collection #memory management #runtime
Memory safety without runtime checks or garbage collection (DD, SK, VSA, CL), pp. 69–80.
DLTDLT-2002-IbarraDS #automaton #finite #verification
Safety Verification for Two-Way Finite Automata with Monotonic Counters (OHI, ZD, ZWS), pp. 326–338.
FMFME-2002-KristensenM
A Generalised Sweep-Line Method for Safety Properties (LMK, TM), pp. 549–567.
ICGTICGT-2002-PadbergE #graph transformation #invariant
Rule Invariants in Graph Transformation Systems for Analyzing Safety-Critical Systems (JP, BE), pp. 334–350.
CSCWCSCW-2002-LuttersA #bound #case study
Achieving safety: a field study of boundary objects in aircraft technical support (WGL, MSA), pp. 266–275.
AdaEuropeAda-2002-BarrM #ada #embedded #named #open source #operating system
Boss/Ada: An Open Source Ada 95 Safety Kit ( A dependable open source embedded operating system for GNAT) (VB, SM), pp. 53–66.
AdaEuropeAda-2002-BlotzHLPSZ #ada #development #modelling #re-engineering
Model-Based Software Engineering and Ada: Synergy for the Development of Safety-Critical Systems (AB, FH, HL, AP, OS, HPZ), pp. 37–52.
SASSAS-2002-Hymans #abstract interpretation #behaviour
Checking Safety Properties of Behavioral VHDL Descriptions by Abstract Interpretation (CH), pp. 444–460.
ICSEICSE-2002-Knight #challenge
Safety critical systems: challenges and directions (JCK), pp. 547–550.
DACDAC-2002-ShengTH #effectiveness #using
Effective safety property checking using simulation-based sequential ATPG (SS, KT, MSH), pp. 813–818.
TACASTACAS-2002-HavelundR #monitoring
Synthesizing Monitors for Safety Properties (KH, GR), pp. 342–356.
VMCAIVMCAI-2002-BaukusLS #liveness #protocol #verification
Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness (KB, YL, KS), pp. 317–330.
ICSMEICSM-2001-ZelkowitzR #independence #maintenance #validation #verification
The Role of Independent Verification and Validation in Maintaining a Safety Critical Evolutionary Software in a Complex Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 118–126.
PASTEPASTE-2001-MaessenSG #java #program analysis #virtual machine
Program analysis for safety guarantees in a Java virtual machine written in Java (JWM, VS, DG), pp. 62–65.
AdaEuropeAdaEurope-2001-FoulgerK #fault #runtime #tool support #using
Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software (DF, SK), pp. 229–240.
POPLPOPL-2001-Calcagno #calculus #correctness #semantics
Stratified operational semantics for safety and correctness of the region calculus (CC), pp. 155–165.
POPLPOPL-2001-Yahav #concurrent #java #logic #source code #using #verification
Verifying safety properties of concurrent Java programs using 3-valued logic (EY), pp. 27–40.
RERE-2001-AllenbyK #requirements #using
Deriving Safety Requirements Using Scenarios (KA, TK), pp. 228–235.
RERE-2001-LutzM #evolution #requirements
Evolution of Safety-Critical Requirements Post-Launch (RRL, ICM), pp. 222–227.
FSEESEC-FSE-2001-Coen-PorisiniDGP #execution #symbolic computation #using #verification
Using symbolic execution for verifying safety-critical systems (ACP, GD, CG, MP), pp. 142–151.
ICSEICSE-2001-ZelkowitzR #comprehension
Understanding IV & V in a Safety Critical and Complex Evolutionary Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 349–357.
DATEDATE-2001-CheynetNVRRV #automation #evaluation #program transformation
System safety through automatic high-level code transformations: an experimental evaluation (PC, BN, RV, MR, MSR, MV), pp. 297–301.
FASEFASE-J-1998-PadbergGE01 #refinement #rule-based
Rule-based refinement of high-level nets preserving safety properties (JP, MG, CE), pp. 97–118.
ESOPESOP-2001-Thiemann #using
Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
CAVCAV-2001-Maidl #approach #model checking
A Unifying Model Checking Approach for Safety Properties of Parameterized Systems (MM), pp. 311–323.
LICSLICS-2001-ManoliosT #branch #liveness
Safety and Liveness in Branching Time (PM, RJT), pp. 366–374.
CIAACIAA-2000-Ibarra #queue #reachability
Reachability and Safety in Queue Systems (OHI), pp. 145–156.
ICALPICALP-2000-MannaS
Alternating the Temporal Picture for Safety (ZM, HS), pp. 429–450.
AdaEuropeAdaEurope-2000-MauriS #analysis #embedded #reliability #using
Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
PLDIPLDI-2000-XuMR
Safety checking of machine code (ZX, BPM, TWR), pp. 70–82.
SASSAS-2000-ClarkHH #analysis #graph grammar #strict
Safety of Strictness Analysis via Term Graph Rewriting (DC, CH, SH), pp. 95–114.
ASEASE-2000-OHalloran #automation #generative
Issues for the Automatic Generation of Safety Critical Software (CO), pp. 277–280.
ASEASE-2000-ReveillereMCMM #approach #development #domain-specific language
A DSL Approach to Improve Productivity and Safety in Device Drivers Development (LR, FM, CC, RM, GM), pp. 101–110.
ICSEFoSE-2000-Lutz #re-engineering #roadmap
Software engineering for safety: a roadmap (RRL), pp. 213–226.
FASEFASE-2000-PadbergHG #algebra
Stepwise Introduction and Preservation of Safety Properties in Algebraic High-Level Net Systems (JP, KH, MG), pp. 249–265.
FASEFASE-2000-Suhl
Applying RT-Z to Develop Safety-Critical Systems (CS), pp. 51–65.
CSLCSL-2000-Pauly #bisimulation #game studies #source code
From Programs to Games: Invariance and Safety for Bisimulation (MP), pp. 485–496.
CSEETCSEET-1999-FelleisenC #metric
Safety as a Metric (MF, RC), pp. 129–131.
PASTEPASTE-1999-WhitingH #analysis #monitoring
Safety Analysis of Hawk in Flight Monitor (LW, MH), pp. 32–38.
FMFM-v2-1999-SereT #analysis #specification
Safety Analysis in Formal Specification (KS, ET), pp. 1564–1583.
HCIHCI-CCAD-1999-Tielsch #health #interface #network
Call center — interface between companies’ practice and the competence network of safety and health at work in North-Rhine-Westfalia (RT), pp. 1332–1336.
HCIHCI-EI-1999-Boy
About the Role of Intelligent Assistants in the Control of Safety-Critical Systems (GAB), pp. 321–325.
HCIHCI-EI-1999-Weber99b #approach #aspect-oriented #health
A Pragmatic and Inclusive Approach to Assess Health and Safety Aspects at VDU Workplaces (HW), pp. 31–35.
TOOLSTOOLS-USA-1999-Romanski #development #verification
The Development and Verification of Safety Critical Software (GR), p. 411.
AdaEuropeAdaEurope-1999-ChapmanD #using
Re-engeneering a Safety-Critical Application Using SPARK 95 and GNORT (RC, RD), pp. 39–51.
AdaEuropeAdaEurope-1999-Frost #ada #certification #embedded
An Ada95 Solution for Certification of Embedded Safety Critical Applications (JF), pp. 52–63.
SASSAS-1999-Volpano
Safety versus Secrecy (DMV), pp. 303–311.
ASEASE-1999-WhalenH #approach #automation #code generation
An Approach to Automatic Code Generation for Safety-Critical Systems (MWW, MPEH), pp. 315–318.
SACSAC-1999-LauberSW #assurance #online #probability #quality
Applied Probabilistic AI for Online Diagnosis of a Safety-Critical System Based on a Quality Assurance Program (JL, CS, RW), pp. 25–30.
TACASTACAS-1999-RusuS #abstraction #on the #proving #static analysis #theorem proving
On Proving Safety Properties by Integrating Static Analysis, Theorem Proving and Abstraction (VR, ES), pp. 178–192.
CAVCAV-1999-BiereCRZ #model checking #using
Verifiying Safety Properties of a Power PC Microprocessor Using Symbolic Model Checking without BDDs (AB, EMC, RR, YZ), pp. 60–71.
CAVCAV-1999-KupfermanV #model checking
Model Checking of Safety Properties (OK, MYV), pp. 172–183.
ICGTTAGT-1998-PadbergGH #development #incremental #petri net
Incremental Development of Safety Properties in Petri Net Transformations (JP, MG, KH), pp. 410–425.
CHICHI-1998-Boy #analysis #automation
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
AdaEuropeAdaEurope-1998-Chapront #ada #development
Ada+B The Formula for Safety Critical Software Development (PC), pp. 13–18.
AdaEuropeAdaEurope-1998-Wong
Looking at Code With Your Safety Goggles On (KW), pp. 251–262.
AdaSIGAda-1998-MichellSW #security
Looking into Safety with the Safety and Security Rapporteur Group (SM, MS, BAW), pp. 7–11.
REICRE-1998-LutzHMST #analysis #product line #requirements
Safety Analysis of Requirements for a Product Family (RRL, GGH, MMM, DES, SRT), p. 24–?.
FASEFASE-1998-BussowGK #case study #embedded #specification
Specifying Safety-Critical Embedded Systems with Statecharts and Z: A Case Study (RB, RG, MK), pp. 71–87.
FASEFASE-1998-NielsonAN #analysis #behaviour #case study
Behaviour Analysis and Safety Conditions: A Case Study in CML (HRN, TA, FN), pp. 255–269.
FASEFASE-1998-PadbergGE #refinement #rule-based
Rule-Based Refinement of High-Level Nets Preserving Safety Properties (JP, MG, CE), pp. 221–238.
FASEFASE-1998-SandholmS #distributed #web #web service
Distributed Safety Controllers for Web Services (AS, MIS), pp. 270–284.
CAVCAV-1998-ComonJ #analysis #automaton #multi
Multiple Counters Automata, Safety Analysis and Presburger Arithmetic (HC, YJ), pp. 268–279.
HCIHCI-CC-1997-LewandowskiK #assessment
Method of Assessment of Occupational Safety (JL, CK), pp. 703–706.
HCIHCI-CC-1997-Peters #human-computer
Safety and Liability in HCI (GAP), pp. 851–854.
HCIHCI-SEC-1997-Duffy97a
Safety Management: Some Issues and Limitations (VGD), pp. 343–346.
TOOLSTOOLS-USA-1997-Riehle97a
Object Technology for Safety-Critical Applications (RR), p. 376.
RERE-1997-HeimdahlR #requirements #specification
Software Requirements Specification and System Safety (MPEH, JDR), p. 264.
RERE-1997-ModugnoLRPS #analysis #requirements #specification
Integrated Safety Analysis of Requirements Specifications (FM, NGL, JDR, KP, SDS), pp. 148–159.
CAVCAV-1997-CimattiGPPPRTY #certification #embedded #verification
A Provably Correct Embedded Verifier for the Certification of Safety Critical Software (AC, FG, PP, BP, JP, DR, PT, BY), pp. 202–213.
WPCWPC-1996-Bull #comprehension #domain-specific language #using
Comprehension of Safety-Critical Systems Using Domain-Specific Languages (TB), pp. 108–122.
FMFME-1996-Peleska #automation #industrial #testing
Test Automation for Safety-Critical Systems: Industrial Application and Future Developments (JP), pp. 39–59.
FMFME-1996-Sivertsen #case study #development
A Case Study on the Formal Development of a Reactor Safety System (TS), pp. 18–38.
FMFME-1996-ValmariS #liveness #verification #visual notation
Visual Verification of Safety and Liveness (AV, MS), pp. 228–247.
FMFME-1996-Weber #design
Combining Statecharts and Z for the Design of Safety-Critical Control Systems (MW), pp. 307–326.
AdaEuropeAdaEurope-1996-Rosskopf #ada #assessment #static analysis #using
Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
AdaEuropeAdaEurope-1996-Schneidewind #modelling #reliability
Reliability Modeling for Safety Critical Software (NFS), pp. 17–37.
AdaTRI-Ada-1996-MeyerR #design #embedded
Design and Test Strategies for a Safety-Critical Embedded Executive (CAM, MGR), pp. 29–37.
ICSEICSE-1996-CheungK #analysis #composition #reachability
Checking Subsystem Safety Properties in Compositional Reachability Analysis (SCC, JK), pp. 144–154.
CAVCAV-1996-Gonthier #concurrent #garbage collection #verification
Verifying the Safety of a Practical Concurrent Garbage Collector (GG), pp. 462–465.
CAVCAV-1996-Greenstreet #difference #equation #verification
Verifying Safety Properties of Differential Equations (MRG), pp. 277–287.
ICSMEICSM-1995-BullYBL #named #reverse engineering
Bylands: reverse engineering safety-critical systems (TMB, EJY, KHB, ZL), pp. 358–366.
AdaEuropeAdaEurope-1995-Brown #ada
The Practical Application of Safety Techniques on an Ada Based Project (RB), pp. 51–57.
AdaEuropeAdaEurope-1995-Richard-Foy #ada
Safe Ada Executive: An Executive for Ada Safety Critical Applications (MRF), pp. 11–20.
RERE-1995-AtleeM #analysis #requirements
Integrating requirements analysis and safety analysis (JMA, JAM), pp. 158–159.
ESECESEC-1995-TuyaSC #model checking #modelling #using #verification
Using a Symbolic Model Checker for Verify Safety Properties in SA/RT Models (JT, LS, JAC), pp. 59–75.
SOSPSOSP-1995-BershadSPSFBCE #operating system #performance
Extensibility, Safety and Performance in the SPIN Operating System (BNB, SS, PP, EGS, MEF, DB, CC, SJE), pp. 267–284.
CAVCAV-1995-JagadeesanPO #source code #verification
Safety Property Verification of ESTEREL Programs and Applications to Telecommunications Software (LJJ, CP, JVO), pp. 127–140.
CAVCAV-1995-JonssonK #algorithm #distributed #infinity #verification
Verifying Safety Properties of a Class of Infinite-State Distributed Algorithms (BJ, LK), pp. 42–53.
FMFME-1994-Gortz #specification
Specifying Safety and Progress Properties with RSL (JG), pp. 567–581.
SEKESEKE-1994-WillisP #reuse #specification
Specification reuse for safety-critical software (CPW, DJP), pp. 516–523.
AdaEuropeAdaEurope-1994-Birnie #aspect-oriented
Safety Aspects of the Ariane 5 On-Board Software (SAB), pp. 302–321.
ISSTAISSTA-1994-KnightCFW #testing
Testing a Safety-Critical Application (JCK, AGC, AMF, KGW), p. 199.
PODSPODS-1993-Escobar-MolanoHJ #calculus #query
Safety and Translation of Calculus Queries with Scalar Functions (MEM, RH, DJ), pp. 253–264.
FMFME-1993-BowenS #formal method #industrial #perspective
The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective (JPB, VS), pp. 183–195.
FMFME-1993-Jacky #specification
Specifying a Safety-Critical Control System in Z (JJ), pp. 388–402.
HCIHCI-ACS-1993-DoosB #development #human-computer #interactive
Disturbances in Production — A Safety Risk or a Chance for Development in the Human-Computer Interaction Context (MD, TB), pp. 809–814.
HCIHCI-SHI-1993-Warren #approach #development #modelling #realtime #tool support
The TOM Approach to System Development: Methods and Tools for Task Oriented Modelling of Real-Time Safety Critical Systems (CW), pp. 285–290.
SEKESEKE-1993-Berztiss
Catastrophe Prevention in Safety-Critical Systems (ATB), pp. 102–108.
AdaEuropeAdaEurope-1993-BrygierR #ada #certification #realtime
Certification of Ada Real-Time Executives for Safety Critical Applications (JB, MRF), pp. 264–279.
PEPMPEPM-1993-Thiemann #analysis #functional #source code
A Safety Analysis for Functional Programs (PT), pp. 133–144.
RERE-1993-Lutz #embedded #fault #requirements
Analyzing software requirements errors in safety-critical, embedded systems (RRL), pp. 126–133.
ICSEICSE-1993-CourtoisP #documentation
Documentation for Safety Critical Software (PJC, DLP), pp. 315–323.
ICSEICSE-1993-DalalHK #communication #quality #reliability
Reliable Software and Communication: Software Quality, Reliability, and Safety (SRD, JRH, JRK), pp. 425–435.
ICLPICLP-1993-CorsiniR #analysis #fault
Safety Analysis by Means of Fault Trees: An Application for Open Boolean Solvers (MMC, AR), p. 834.
AdaTRI-Ada-C-1992-HummerB #ada #design #hardware
When Hardware Becomes Software: Designing a Safety-Critical System with Ada (JH, LB), pp. 538–544.
AdaTRI-Ada-C-1992-McHugh #ada
Ada 9X and Safety Critical/Secure Systems (JM), pp. 55–59.
ESOPESOP-1992-BernsteinRS #proving
Proving Safety of Speculative Load Instructions at Compile Time (DB, MR, SS), pp. 56–72.
CAVCAV-1992-Bruns #case study #design
A Case Study in Safety-Critical Design (GB), pp. 220–233.
CAVCAV-1992-Corbett #integer #liveness #programming #verification
Verifying General Safety and Liveness Propterties with Integer Programming (JCC), pp. 357–369.
ICALPICALP-1991-BouajjaniFGRS #branch #semantics
Safety for Branching Time Semantics (AB, JCF, SG, CR, JS), pp. 76–92.
AdaEuropeAdaEurope-1991-Welz #ada
Ada in Safety Critical Applications (AW), pp. 193–198.
CAVCAV-1991-GodefroidW #concurrent #partial order #performance #using #verification
Using Partial Orders for the Efficient Verification of Deadlock Freedom and Safety Properties (PG, PW), pp. 332–342.
CAVCAV-1991-Goldschlag #liveness #verification
Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits (DMG), pp. 354–364.
ICLPICLP-1991-CodishDY #algorithm #alias #analysis #unification
Derivation and Safety of an Abstract Unification Algorithm for Groundness and Aliasing Analysis (MC, DD, EY), pp. 79–93.
ICSEICSE-1990-Laprie #assessment #on the
On the Assessment of Safety-Critical Software Systems (JCL), p. 222.
ICSEICSE-1990-Leveson #evaluation
Evaluation of Software Safety (NGL), pp. 223–224.
ICSEICSE-1990-Thomas
Assessing Failure Probabilities in Safety-Critical Systems Containing Software (MT), p. 227.
CAVCAV-1990-Burch #liveness #verification
Verifying Liveness Properties by Verifying Safety Properties (JRB), pp. 224–232.
PODSPODS-1989-SagivV #database #datalog #infinity #query
Safety of Datalog Queries over Infinite Databases (YS, MYV), pp. 160–171.
ICSEICSE-1989-JaffeL #realtime #requirements #robust #specification
Completeness, Robustness, and Safety in Real-Time Software Requirements Specification (MSJ, NGL), pp. 302–311.
PODSPODS-1988-KiferRS #approach #axiom #database #deduction #query
An Axiomatic Approach to Deciding Query Safety in Deductive Databases (MK, RR, AS), pp. 52–60.
SIGMODSIGMOD-1988-KrishnamurthyRS #datalog #effectiveness #framework #testing
A Framework for Testing Safety and Effective Computability of Extended Datalog (RK, RR, OS), pp. 154–163.
PLDIPLDI-1988-Chase #optimisation
Safety Considerations for Storage Allocation Optimizations (DRC), pp. 1–10.
ICSEICSE-1988-ChaLS #analysis #fault #using #verification
Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
PODSPODS-1987-GelderT #calculus #relational
Safety and Correct Translation of Relational Calculus Formulas (AVG, RWT), pp. 313–327.
PODSPODS-1987-RamakrishnanBS #horn clause #infinity #recursion
Safety of Recursive Horn Clauses With Infinite Relations (RR, FB, AS), pp. 328–339.
ESECESEC-1987-Knabe #exception #fault #industrial #re-engineering
The Impact of Exception Handling on Labour Division, Safety, and Error Diagnostics in an Industrial Software Engineering Environment (CK), pp. 369–376.
PODSPODS-1986-Su
Safety of Non-Well-Locked Trasnaction Systems (JS), pp. 47–52.
PODSPODS-1985-WolfsonY #database #distributed #transaction
Deadlock-Freedom (and Safety) of Transactions in a Distributed Database (OW, MY), pp. 105–112.
TAPSOFTCSE-1985-LevesonS #fault tolerance #petri net #using
Analyzing Safety and Fault Tolerance Using Time Petri Nets (NGL, JLS), pp. 339–355.
PODSPODS-1982-Soisalon-SoininenW #algorithm #detection #testing #transaction
An Optimal Algorithm for Testing for Safety and Detecting Deadlocks in Locked Transaction Systems (ESS, DW), pp. 108–116.
ICALPICALP-1977-Sajaniemi
The Safety of a Coroutine System (JS), pp. 440–452.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.