BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
system (123)
safeti (105)
time (60)
softwar (59)
design (46)

Stem critic$ (all stems)

423 papers:

QoSAQoSA-2015-FeitosaAAN #embedded #open source #quality #trade-off
Investigating Quality Trade-offs in Open Source Critical Embedded Systems (DF, AA, PA, EYN), pp. 113–122.
DACDAC-2015-YangTJ #analysis
Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
DATEDATE-2015-GorevUD #fault #parallel #simulation
Fault simulation with parallel exact critical path tracing in multiple core environment (MG, RU, SD), pp. 1180–1185.
DATEDATE-2015-HuangKGT #scheduling
Run and be safe: mixed-criticality scheduling with temporary processor speedup (PH, PK, GG, LT), pp. 1329–1334.
DATEDATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability #using
MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
DATEDATE-2015-ZwergerG #detection #symmetry
Detection of asymmetric aging-critical voltage conditions in analog power-down mode (MZ, HEG), pp. 1269–1272.
FMFM-2015-BratBDGHK #safety #verification
Verifying the Safety of a Flight-Critical System (GB, DHB, MD, DG, FH, TK), pp. 308–324.
CHICHI-2015-PierceSHJGD #design #human-computer
Expanding and Refining Design and Criticality in HCI (JP, PS, TH, TJ, WWG, CFD), pp. 2083–2092.
CSCWCSCW-2015-HalbertN #design #interactive #tool support
Designing for Discomfort: Supporting Critical Reflection through Interactive Tools (HH, LPN), pp. 349–360.
CSCWCSCW-2015-KusunokiS #design
Designing for Temporal Awareness: The Role of Temporality in Time-Critical Medical Teamwork (DSK, AS), pp. 1465–1476.
AdaEuropeAdaEurope-2015-KhanfarLM #safety #slicing
Static Backward Program Slicing for Safety-Critical Systems (HK, BL, ANM), pp. 50–65.
AdaEuropeAdaEurope-2015-PerezGTT #clustering #concept #manycore #safety
A Safety Concept for an IEC-61508 Compliant Fail-Safe Wind Power Mixed-Criticality System Based on Multicore and Partitioning (JP, DG, ST, TT), pp. 3–17.
SEKESEKE-2015-KalinowskiSCPF0 #problem #requirements #towards
Towards Building Knowledge on Causes of Critical Requirements Engineering Problems (MK, ROS, TC, RP, DMF, SW), pp. 1–6.
SACSAC-2015-GimenesGRG #analysis #graph #multimodal #repository
Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
ESEC-FSEESEC-FSE-2015-KoskiM #architecture #lessons learnt #quality #requirements
Requirements, architecture, and quality in a mission critical system: 12 lessons learned (AK, TM), pp. 1018–1021.
ICSEICSE-v2-2015-PecchiaCCC #assessment #development #industrial #process
Industry Practices and Event Logging: Assessment of a Critical Software Development Process (AP, MC, GC, DC), pp. 169–178.
PLEASEPLEASE-2015-Gallina #product line #reuse #safety #towards
Towards Enabling Reuse in the Context of Safety-Critical Product Lines (BG), pp. 15–18.
ASPLOSASPLOS-2015-HicksSKS #debugging #lightweight #named #runtime #specification
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs (MH, CS, STK, JMS), pp. 517–529.
HPDCHPDC-2015-KaxirasKNRS #approach #distributed #execution #memory management #scalability
Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory (SK, DK, MN, AR, KFS), pp. 3–14.
ECSAECSA-2014-GurbuzTE #architecture #design #safety
Safety Perspective for Supporting Architectural Design of Safety-Critical Systems (HGG, BT, NPE), pp. 365–373.
WICSAWICSA-2014-UusitaloRKMM #architecture #automation #lessons learnt #safety
Lessons Learned from Safety-Critical Software-Based Automation Architectures of Nuclear Power Plants (EJU, MR, MK, VM, TM), pp. 45–48.
ASEASE-2014-WozniakNZMPG #component #design
Assigning time budgets to component functions in the design of time-critical automotive systems (EW, MDN, HZ, CM, STP, SG), pp. 235–246.
DACDAC-2014-ChenWLWSC #design #monitoring #scalability
Critical Path Monitor Enabled Dynamic Voltage Scaling for Graceful Degradation in Sub-Threshold Designs (YGC, TW, KYL, WYW, YS, SCC), p. 6.
DACDAC-2014-HernandezA #detection #fault #named #safety
LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
DACDAC-2014-HuangYT #fault tolerance #on the #scheduling
On the Scheduling of Fault-Tolerant Mixed-Criticality Systems (PH, HY, LT), p. 6.
DACDAC-2014-KangYKBHT #fault tolerance
Static Mapping of Mixed-Critical Applications for Fault-Tolerant MPSoCs (SHK, HY, SK, IB, SH, LT), p. 6.
DATEDATE-2014-DinechinAPL #parallel
Time-critical computing on a single-chip massively parallel processor (BDdD, DvA, MP, GL), pp. 1–6.
DATEDATE-2014-GiannopoulouSHT #architecture #manycore
Mapping mixed-criticality applications on multi-core architectures (GG, NS, PH, LT), pp. 1–6.
DATEDATE-2014-GuGD0 #multi #scheduling
Partitioned mixed-criticality scheduling on multiprocessor platforms (CG, NG, QD, WY), pp. 1–6.
DATEDATE-2014-IliasovASM #design #refinement #safety
Design of safety critical systems by refinement (AI, AA, DS, AM), pp. 1–4.
DATEDATE-2014-KangYKBHT #manycore #optimisation
Reliability-aware mapping optimization of multi-core systems with mixed-criticality (SHK, HY, SK, IB, SH, LT), pp. 1–4.
DATEDATE-2014-MullerM #scheduling
The schedulability region of two-level mixed-criticality systems based on EDF-VD (DM, AM), pp. 1–6.
DATEDATE-2014-NowotschPHPS #analysis #monitoring #multi #off the shelf
Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
DATEDATE-2014-NuzzoFIS #contract #cyber-physical #design #protocol #safety
Contract-based design of control protocols for safety-critical cyber-physical systems (PN, JBF, AI, ALSV), pp. 1–4.
DATEDATE-2014-PandaB #concurrent #thread
Introducing Thread Criticality awareness in Prefetcher Aggressiveness Control (BP, SB), pp. 1–6.
DATEDATE-2014-PandeyV #analysis #fault #safety
Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
DATEDATE-2014-RamboTDAE #analysis #realtime
Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
DATEDATE-2014-SanderSDBBBMKALHRHH #hardware #manycore
Hardware virtualization support for shared resources in mixed-criticality multicore systems (OS, TS, VVD, SB, FB, JB, HUM, DK, DA, EL, JH, AR, CH, AH), pp. 1–6.
TACASTACAS-2014-ArmandoCC #model checking #named #satisfiability
SATMC: A SAT-Based Model Checker for Security-Critical Systems (AA, RC, LC), pp. 31–45.
PLDIPLDI-2014-HanxledenDMSMAMO #named #safety
SCCharts: sequentially constructive statecharts for safety-critical applications: HW/SW-synthesis for a conservative extension of synchronous statecharts (RvH, BD, CM, SS, MM, JA, SM, OO), p. 39.
STOCSTOC-2014-GoosP #bound #communication
Communication lower bounds via critical block sensitivity (MG, TP), pp. 847–856.
CHICHI-2014-BardzellBS #design
Reading critical designs: supporting reasoned interpretations of critical design (JB, SB, ES), pp. 1951–1960.
CHICHI-2014-FeinbergCB #database #design #interactive #using
Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
CHICHI-2014-RectorH #email #named
MinEMail: SMS alert system for managing critical emails (KR, JMH), pp. 783–792.
HCIDHM-2014-Kull #using
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDUXU-ELAS-2014-PetkovB #design
Hardwired Critical Action Panels for Emergency Preparedness: — Design Principles and CAP Design for Offshore Petroleum Platforms (BP, AOB), pp. 326–337.
HCIDUXU-TMT-2014-BergerHE #design #interactive #prototype #towards
Towards a Vocabulary of Prototypes in Interaction Design — A Criticism of Current Practice (AB, MH, ME), pp. 25–32.
HCIHCI-AS-2014-StelzerSO #novel #safety #user interface
Evaluating Novel User Interfaces in (Safety Critical) Railway Environments (AS, IS, AO), pp. 502–512.
HCILCT-NLE-2014-MirandaIC #framework #information management
From Information Systems to e-Learning 3.0 Systems’s Critical Success Factors: A Framework Proposal (PM, PTI, CJC), pp. 180–191.
AdaEuropeAdaEurope-2014-ZhouLL #approach #embedded #requirements #safety #validation
A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
ICMLICML-c1-2014-Thomas #algorithm #bias
Bias in Natural Actor-Critic Algorithms (PT), pp. 441–448.
KDDKDD-2014-Mullainathan #machine learning #question #social
Bugbears or legitimate threats?: (social) scientists’ criticisms of machine learning? (SM), p. 4.
KDDKDD-2014-ZhengZLJXLSZLTLDLW #data mining #mining #optimisation #process
Applying data mining techniques to address critical process optimization needs in advanced manufacturing (LZ, CZ, LL, YJ, WX, JL, CS, WZ, HL, LT, TL, BD, ML, PW), pp. 1739–1748.
KDDKDD-2014-ZongWSSCHY #mining #scalability #towards
Towards scalable critical alert mining (BZ, YW, JS, AKS, , JH, XY), pp. 1057–1066.
SEKESEKE-2014-QueirozB #approach #embedded #modelling #product line
A Critical Embedded System Product Line Model-based Approach (PGGQ, RTVB), pp. 71–75.
SIGIRSIGIR-2014-MishraWIH
Time-critical search (NM, RWW, SI, EH), pp. 747–756.
OOPSLAOOPSLA-2014-DavidTLM #profiling
Continuously measuring critical section pressure with the free-lunch profiler (FD, GT, JL, GM), pp. 291–307.
FSEFSE-2014-ZhangSK #bibliography #code review #interactive #named
Critics: an interactive code review tool for searching and inspecting systematic changes (TZ, MS, MK), pp. 755–758.
ICSEICSE-2014-Monperrus #automation #bibliography #evaluation #generative #problem
A critical review of “automatic patch generation learned from human-written patches”: essay on the problem statement and the evaluation of automatic software repair (MM), pp. 234–242.
ASPLOSASPLOS-2014-KastureS #named #performance #strict
Ubik: efficient cache sharing with strict qos for latency-critical workloads (HK, DS), pp. 729–742.
OSDIOSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
RTARTA-TLCA-2014-LiuDJ #analysis #confluence
Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
DACDAC-2013-GirbalMGAQCY #convergence #on the
On the convergence of mainstream and mission-critical markets (SG, MM, AG, JA, EQ, FJC, SY), p. 10.
DACDAC-2013-YuLJC #classification #detection #feature model #using
Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATEDATE-2013-AncajasCR #approach
Proactive aging management in heterogeneous NoCs through a criticality-driven routing approach (DMA, KC, SR), pp. 1032–1037.
DATEDATE-2013-CarvajalF #framework #realtime
An open platform for mixed-criticality real-time ethernet (GC, SF), pp. 153–156.
DATEDATE-2013-GoossensAG #memory management #policy
Conservative open-page policy for mixed time-criticality memory controllers (SG, BA, KG), pp. 525–530.
DATEDATE-2013-SuZ #algorithm #scheduling
An elastic mixed-criticality task model and its scheduling algorithm (HS, DZ), pp. 147–152.
DATEDATE-2013-YuZHWLT #approach #manycore #set #simulation
A critical-section-level timing synchronization approach for deterministic multi-core instruction set simulations (FWY, BHZ, YHH, HIW, CRL, RST), pp. 643–648.
DATEDATE-2013-ZhaoGZ #named #scheduling
PT-AMC: integrating preemption thresholds into mixed-criticality scheduling (QZ, ZG, HZ), pp. 141–146.
ICDARICDAR-2013-MauroEF #web
Finding Critical Cells in Web Tables with SRL: Trying to Uncover the Devil’s Tease (NDM, FE, SF), pp. 882–886.
SCAMSCAM-2013-OyetoyanCC #component #fault
Criticality of defects in cyclic dependent components (TDO, RC, DSC), pp. 21–30.
SEFMSEFM-2013-BorekMSR #approach #model checking #modelling
Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
CHICHI-2013-BardzellB #design #question #what
What is “critical” about critical design? (JB, SB), pp. 3297–3306.
CHICHI-2013-KhovanskayaBCVG #approach #design #quote #what
“Everybody knows what you’re doing”: a critical design approach to personal informatics (VDK, EPSB, DC, SV, GG), pp. 3403–3412.
CHICHI-2013-ParkerMGACJM #health #online #what
I am what i eat: identity & critical thinking in an online health forum for kids (AGP, IM, CG, VA, WC, VJ, EDM), pp. 2437–2446.
CHICHI-2013-Yetim #persuasion
Critical perspective on persuasive technology reconsidered (FY), pp. 3327–3330.
HCIDHM-SET-2013-PuchWFP #evaluation #interactive #simulation #using
Evaluation of Drivers Interaction with Assistant Systems Using Criticality Driven Guided Simulation (SP, BW, MF, TP), pp. 108–117.
HCIHCI-AMTE-2013-FearyBCHLSS #design #evaluation #interface #safety
Linking Context to Evaluation in the Design of Safety Critical Interfaces (MF, DB, XC, AH, RLL, LS, SPS), pp. 193–202.
HCIHCI-AMTE-2013-GalindoMPWF #aspect-oriented #education #human-computer #interactive #student
Tuning an HCI Curriculum for Master Students to Address Interactive Critical Systems Aspects (MG, CM, PAP, MW, PF), pp. 51–60.
HCIHCI-IMT-2013-WahabZ #implementation #multi
The Implementation of Multi-touch Table to Support the Military Decision Making through Critical Success Factors (CSFs) (NW, HBZ), pp. 523–529.
AdaEuropeAdaEurope-2013-AsensioLCN #analysis #approach #execution #safety #worst-case
Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
AdaEuropeAdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #safety #using
Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
AdaEuropeAdaEurope-2013-KampenhoutH #deployment #manycore #modelling
Model-Based Deployment of Mission-Critical Spacecraft Applications on Multicore Processors (JRvK, RH), pp. 35–50.
HILTHILT-2013-LarsonHFD #fault #modelling #safety #using
Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
ICEISICEIS-J-2013-Heusinger13a #design #on the #research
On the “Impossibility” of Critical and Emancipatory Design Science Research (JMH), pp. 331–348.
ICEISICEIS-v2-2013-Heusinger #challenge #design #research
Challenges of Critical and Emancipatory Design Science Research — The Design of “Possible Worlds” as Response (JMH), pp. 339–345.
ECIRECIR-2013-GuoDY
Updating Users about Time Critical Events (QG, FD, EYT), pp. 483–494.
KDIRKDIR-KMIS-2013-LiLL #integration #towards
Semiotic Interoperability — A Critical Step towards Systems Integration (WL, KL, SL), pp. 508–513.
SACSAC-2013-BrunsKB #safety
Virtualization for safety-critical, deeply-embedded devices (FB, DK, AB), pp. 1485–1492.
SACSAC-2013-NotanderRH #design #development #flexibility #framework #modelling #safety
A model-based framework for flexible safety-critical software development: a design study (JPN, PR, MH), pp. 1137–1144.
ESEC-FSEESEC-FSE-2013-BlincoeVD #coordination #dependence #identification
Do all task dependencies require coordination? the role of task properties in identifying critical coordination needs in software projects (KB, GV, DD), pp. 213–223.
CCCC-2013-KempfVP #identification #parallel
Compiler-Guided Identification of Critical Sections in Parallel Code (SK, RV, MP), pp. 204–223.
ICSTICST-2013-Lelli #challenge #interactive #testing
Challenges of Testing for Critical Interactive Systems (VL), pp. 509–510.
WICSA-ECSAWICSA-ECSA-2012-ChristensenH #ecosystem #named #towards
Net4Care: Towards a Mission-Critical Software Ecosystem (HBC, KMH), pp. 224–228.
DACDAC-2012-YuCSJC #design #detection #using
Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
DATEDATE-2012-GoswamiLSC #implementation
Time-triggered implementations of mixed-criticality automotive software (DG, ML, RS, SC), pp. 1227–1232.
DATEDATE-2012-LafayePBGF #embedded #modelling #resource management #simulation
Model driven resource usage simulation for critical embedded systems (ML, LP, EB, MG, DF), pp. 312–315.
DATEDATE-2012-RudolfTWW #automation #configuration management #identification
Automated critical device identification for configurable analogue transistors (RR, PT, RW, PRW), pp. 858–861.
SIGMODSIGMOD-2012-AlexeHHKKNRSSVW #social #social media
Surfacing time-critical insights from social media (BA, MAH, KH, RK, GK, MN, HR, MSS, IRS, CV, RW), pp. 657–660.
TACASTACAS-2012-WimmerJABK #markov #modelling
Minimal Critical Subsystems for Discrete-Time Markov Models (RW, NJ, , BB, JPK), pp. 299–314.
ICPCICPC-2012-RupakhetiH #api #design
Evaluating forum discussions to inform the design of an API critic (CRR, DH), pp. 53–62.
ICPCICPC-2012-RupakhetiH12a #api #library #named
CriticAL: A critic for APIs and libraries (CRR, DH), pp. 241–243.
CHICHI-2012-VinotA #design #safety
Legible, are you sure?: an experimentation-based typographical design in safety-critical context (JLV, SA), pp. 2287–2296.
CSCWCSCW-2012-CheungCS #collaboration #communication #game studies
Communication channels and awareness cues in collocated collaborative time-critical gaming (VC, YLBC, SDS), pp. 569–578.
CSCWCSCW-2012-CollierB #empirical #gender #wiki
Conflict, criticism, or confidence: an empirical examination of the gender gap in wikipedia contributions (BC, JB), pp. 383–392.
CSCWCSCW-2012-SolomonW #community #wiki
Bootstrapping wikis: developing critical mass in a fledgling community by seeding content (JS, RW), pp. 261–264.
HILTHILT-2012-Nilsen #bibliography #comprehension #java #memory management #safety #tutorial
Tutorial overview: understanding dynamic memory management in safety critical java (KN), pp. 15–22.
ICEISICEIS-v2-2012-CapelM #approach #automation #composition #correctness #model checking #safety #verification
A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
ICMLICML-2012-DegrisWS #linear
Linear Off-Policy Actor-Critic (TD, MW, RSS), p. 28.
ICPRICPR-2012-Nagy #learning #web
Learning the characteristics of critical cells from web tables (GN), pp. 1554–1557.
SEKESEKE-2012-SubburajUS #safety #specification
Specification of Safety Critical Systems with Intelligent Software Agent Method (VHS, JEU, MRS), pp. 578–581.
ECMFAECMFA-2012-GeP #framework #realtime #safety #uml #verification
Time Properties Verification Framework for UML-MARTE Safety Critical Real-Time Systems (NG, MP), pp. 352–367.
MODELSMoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
ICSEICSE-2012-Steele #development
Certification-based development of critical systems (PS), pp. 1575–1578.
PLEASEPLEASE-2012-SaratxagaAHEM #product line #variability
Product line tool-chain: variability in critical systems (CLS, CAM, ØH, CE, AM), pp. 57–60.
ECSAECSA-2011-NakagawaAB #architecture #difference #product line
Reference Architecture and Product Line Architecture: A Subtle But Critical Difference (EYN, POA, MB), pp. 207–211.
CASECASE-2011-LemattreDFPS #analysis #architecture #design #reachability
Designing operational control architectures of critical systems by reachability analysis (TL, BD, JMF, JFP, PS), pp. 12–18.
CASECASE-2011-SaddemTT #embedded
Diagnosis of critical embedded systems: application to the control card of a railway vehicle braking systems (RS, AT, MT), pp. 163–168.
DATEDATE-2011-EbrahimiMA #fault #named #safety
ScTMR: A scan chain-based error recovery technique for TMR systems in safety-critical applications (ME, SGM, HA), pp. 298–292.
DATEDATE-2011-KapoorJ #design #embedded #power management #tutorial #verification
Embedded tutorial: Addressing critical power management verification issues in low power designs (BK, KMJ), p. 124.
DATEDATE-2011-MeyerGCLS #cost analysis #execution #safety #using
Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
DATEDATE-2011-TsukiyamaF #algorithm #analysis #statistics
An algorithm to improve accuracy of criticality in statistical static timing analysis (ST, MF), pp. 1529–1532.
ESOPESOP-2011-Mine #c #embedded #fault #parallel #runtime #source code #static analysis
Static Analysis of Run-Time Errors in Embedded Critical Parallel C Programs (AM), pp. 398–418.
FASEFASE-2011-ErmelGLT #behaviour #consistency #control flow #functional #modelling
Modeling with Plausibility Checking: Inspecting Favorable and Critical Signs for Consistency between Control Flow and Functional Behavior (CE, JG, LL, GT), pp. 156–170.
FMFM-2011-CavalcantiWW #formal method #java #memory management #safety
The Safety-Critical Java Memory Model: A Formal Account (AC, AJW, JW), pp. 246–261.
CHICHI-2011-Bargas-AvilaH #analysis #challenge #empirical #experience #novel #user interface
Old wine in new bottles or novel challenges: a critical analysis of empirical studies of user experience (JABA, KH), pp. 2689–2698.
CSCWCSCW-2011-SarcevicPB #coordination
Coordinating time-critical work with role-tagging (AS, LP, RSB), pp. 465–474.
HCIHCI-UA-2011-MitchellGLA #validation #video
Validating Video Analytics in Mission Critical Applications (SJM, SG, SL, BA), pp. 394–402.
AdaEuropeAdaEurope-2011-BaruahB #ada #implementation
Implementing Mixed Criticality Systems in Ada (SKB, AB), pp. 174–188.
AdaEuropeAdaEurope-2011-Daniels #object-oriented
Position Paper: DO-178C/ED-12C and Object-Orientation for Critical Systems (DD), pp. 211–213.
AdaEuropeAdaEurope-2011-Rosen #object-oriented
Object Orientation in Critical Systems: Yes, in Moderation (JPR), pp. 214–218.
AdaSIGAda-2011-Rogers #safety
Language choice for safety critical applications (JSR), pp. 81–90.
CAiSECAiSE-2011-MohanA #comprehension #what
What Methodology Attributes Are Critical for Potential Users? Understanding the Effect of Human Needs (KM, FA), pp. 314–328.
EDOCEDOC-2011-UotiJKOG #collaboration #configuration management #process
Project Alignment: A Configurable Model and Tool for Managing Critical Shared Processes in Collaborative Projects (MU, KJ, IK, MO, SG), pp. 87–96.
ICEISICEIS-v2-2011-YangJ #implementation #research #risk management
Research on Critical Chain Management and Risk Management in Project Implementation Management (ZY, JJ), pp. 351–356.
ICEISICEIS-v4-2011-NgosiHCW #architecture #design #development #enterprise #network #process
Design Science and Actor Network Theory Nexus — A Perspective of Content Development of a Critical Process for Enterprise Architecture Management (TN, MH, MC, EW), pp. 449–456.
ICEISICEIS-v4-2011-OndoaDS #case study #evaluation #industrial #process
A Cross Industry Evaluation of Critical Success Factors for Alignment of Strategy and Business Processes — A Case Study of SMEs in the Region of Jönköping in Sweden (MNEO, FAD, US), pp. 338–347.
ICMLICML-2011-GabillonLGS #classification #policy
Classification-based Policy Iteration with a Critic (VG, AL, MG, BS), pp. 1049–1056.
MODELSMoDELS-2011-LettnerTM #bibliography #embedded #identification #migration #problem
A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice (ML, MT, RM), pp. 228–242.
POPLPOPL-2011-Leroy #question #tool support
Verified squared: does critical software deserve verified tools? (XL), pp. 1–2.
ASPLOSASPLOS-2011-LiuPMZ #clustering #named
Flikker: saving DRAM refresh-power through critical data partitioning (SL, KP, TM, BGZ), pp. 213–224.
HPCAHPCA-2011-RobatmiliGBK #distributed
Exploiting criticality to reduce bottlenecks in distributed uniprocessors (BR, MSSG, DB, SWK), pp. 431–442.
ASEASE-2010-AliHGH #specification #tool support #visual notation
End-user oriented critic specification for domain-specific visual language tools (NMA, JGH, JCG, JH), pp. 297–300.
DATEDATE-2010-LiuZYX #power management #pseudo #testing
Layout-aware pseudo-functional testing for critical paths considering power supply noise effects (XL, YZ, FY, QX), pp. 1432–1437.
DATEDATE-2010-UbarDRJ #parallel #simulation
Parallel X-fault simulation with critical path tracing technique (RU, SD, JR, AJ), pp. 879–884.
DATEDATE-2010-VazquezCTST #programmable #safety
Programmable aging sensor for automotive safety-critical applications (JCV, VHC, ICT, MBS, JPT), pp. 618–621.
PLDIPLDI-2010-NakaikeM #java
Lock elision for read-only critical sections in Java (TN, MMM), pp. 269–278.
IFMIFM-2010-MarronePV #analysis #dependence #inheritance #multi
Multiformalism and Transformation Inheritance for Dependability Analysis of Critical Systems (SM, CP, VV), pp. 215–228.
CHICHI-2010-BaumerST
America is like Metamucil: fostering critical and creative thinking about metaphor in political blogs (EPSB, JS, BT), pp. 1437–1446.
CHICHI-2010-HornofZH #multimodal
Knowing where and when to look in a time-critical multimodal dual task (AJH, YZ, TH), pp. 2103–2112.
CSCWCSCW-2010-RabanMJ #community #empirical #online
An empirical study of critical mass and online community survival (DRR, MM, QJ), pp. 71–80.
ICPRICPR-2010-LiP10a #analysis #classification #monitoring #realtime
Human State Classification and Predication for Critical Care Monitoring by Real-Time Bio-signal Analysis (XL, FP), pp. 2460–2463.
KDDKDD-2010-ZhengSTLLCH #data mining #mining #network #using
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
KDIRKDIR-2010-KaiserSB #approach #fuzzy #network #online #social
Discovering Critical Situations in Online Social Networks — A Neuro Fuzzy Approach to Alert Marketing Managers (CK, SS, FB), pp. 56–64.
SEKESEKE-2010-AvilaSCY #comparison #constraints #ocl #runtime
Runtime Constraint Checking Approaches for OCL, A Critical Comparison (CA, AS, YC, CY), pp. 393–398.
RERE-2010-HillT #legacy #requirements #safety #traceability
Creating Safety Requirements Traceability for Assuring and Recertifying Legacy Safety-Critical Systems (JH, SRT), pp. 297–302.
ICTSSICTSS-2010-Heitmeyer #approach #behaviour #modelling #testing
A Model-Based Approach to Testing Software for Critical Behavior and Properties (CLH), p. 15.
ISSTAISSTA-2010-CarbinR #automation #identification
Automatically identifying critical input regions and code in applications (MC, MCR), pp. 37–48.
RTARTA-2010-Mimram #2d #term rewriting
Computing Critical Pairs in 2-Dimensional Rewriting Systems (SM), pp. 227–242.
DATEDATE-2009-BordeHP #architecture #component #configuration management
Mode-based reconfiguration of critical software component architectures (EB, GH, LP), pp. 1160–1165.
DATEDATE-2009-LiWSDS #communication #latency
Latency criticality aware on-chip communication (ZL, JW, LS, RPD, YS), pp. 1052–1057.
ICFPICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #safety #tool support #using
Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
CHICHI-2009-Bardzell #interactive
Interaction criticism and aesthetics (JB), pp. 2357–2366.
CHICHI-2009-BlytheC
Critical methods and user generated content: the iPhone on YouTube (MB, PAC), pp. 1467–1476.
HCIDHM-2009-DzaackU #analysis #modelling #multi #performance #safety
Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
HCIDHM-2009-PandithLD #evaluation #using
The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
HCIHCD-2009-StaggersGBJ #design
Clinical System Design Considerations for Critical Handoffs (NS, JWG, JWB, BMJ), pp. 1062–1069.
HCIHCI-VAD-2009-BuxtonTF #evaluation #heuristic #scalability #using
Heuristic Evaluation of Mission-Critical Software Using a Large Team (TB, AT, ALF), pp. 673–682.
HCIOCSC-2009-IsaiasMP #framework #web
Critical Success Factors for Web 2.0 — A Reference Framework (PTI, PM, SP), pp. 354–363.
HCIOCSC-2009-PhillipsGS #approach #behaviour #visualisation
A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions (CLP, NDG, JTS), pp. 91–100.
AdaSIGAda-2009-Gardinier #ada #development #open source #safety
Open source development of a safety critical dual redundant (Ada95/C++) signal control program environment (SCOPE) (MG), pp. 23–30.
ICEISICEIS-SAIC-2009-DronavajjalaNS #analysis #enterprise #identification #process #project management #relational
Identification of Critical Success Factors to ERP Project Management — An Application of Grey Relational Analysis and Analytic Hierarchy Process (CSD, SN, RS), pp. 187–192.
KMISKMIS-2009-Kharabsheh
Critical Success Factors of Technology Parks in Australia (RAK), pp. 103–111.
SACSAC-2009-BreauxLOA #identification #requirements #using
Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
SACSAC-2009-KimmSHS #development #safety
Failure management development for integrated automotive safety-critical software systems (HK, SYS, HsH, COS), pp. 517–521.
ICSEICSE-2009-DamasLRL #behaviour #modelling #process #synthesis
Analyzing critical process models through behavior model synthesis (CD, BL, FR, AvL), pp. 441–451.
ASPLOSASPLOS-2009-SulemanMQP #architecture #execution #manycore #symmetry
Accelerating critical section execution with asymmetric multi-core architectures (MAS, OM, MKQ, YNP), pp. 253–264.
HPCAHPCA-2009-SubramaniamBWL #optimisation #performance
Criticality-based optimizations for efficient load processing (SS, AB, HW, GHL), pp. 419–430.
ICSTICST-2009-Gotlieb #c #constraints #framework #named #source code #testing
Euclide: A Constraint-Based Testing Framework for Critical C Programs (AG), pp. 151–160.
ICSTICST-2009-RogozF #multi #performance
A Test Based Multidimensional Performance Model for a Mission Critical System Server (KR, KF), pp. 269–278.
DACDAC-2008-WangLZTYTCN #scheduling
Timing yield driven clock skew scheduling considering non-Gaussian distributions of critical path delays (YW, WSL, XZ, JT, CY, JT, WC, JN), pp. 223–226.
DATEDATE-2008-SterponeATG #design #fault tolerance #on the #safety
On the design of tunable fault tolerant circuits on SRAM-based FPGAs for safety critical applications (LS, MAA, JNT, HGM), pp. 336–341.
DATEDATE-2008-XiongZV #incremental
Incremental Criticality and Yield Gradients (JX, VZ, CV), pp. 1130–1135.
SEFMSEFM-2008-TavaresSM #constraints #embedded #energy #scheduling
An Environment for Measuring and Scheduling Time-Critical Embedded Systems with Energy Constraints (ET, BS, PRMM), pp. 291–300.
GT-VMTGT-VMT-2006-LambersEO08 #detection #graph transformation #performance
Efficient Conflict Detection in Graph Transformation Systems by Essential Critical Pairs (LL, HE, FO), pp. 17–26.
CSCWCSCW-2008-Bietz #communication #feedback
Effects of communication media on the interpretation of critical feedback (MJB), pp. 467–476.
AdaSIGAda-2008-Brosgol #assessment #named #safety
MP1: languages for safety-critical software: issues and assessment (BMB), pp. 7–8.
ICEISICEIS-DISI-2008-TrienekensG #case study #enterprise
Measuring Critical Success Factors in ERP Projects — Results from a Case Study in a SME (JJMT, PvG), pp. 203–209.
ICEISICEIS-HCI-2008-GuimaraesBM #modelling
Communication-Based Modelling and Inspection in Critical Systems (MSG, MCCB, EM), pp. 215–220.
ICEISICEIS-ISAS1-2008-MoralesTPA #communication #composition #concept #model checking #verification
A Conceptual Scheme for Compositional Model-Checking Verification of Critical Communicating Systems (LEMM, MICT, MAP, KBA), pp. 86–93.
ICEISICEIS-ISAS2-2008-MendezPMO #named
ITO-Tracker — A Tool for Evaluating ITO Projects based on Critical Success Factors (EMM, MAP, LEM, MO), pp. 170–175.
ICEISICEIS-ISAS2-2008-MendezPMO08a #outsourcing
Critical Success Factors to Evaluate Information Technology Outsourcing Projects (EMM, MAP, LEM, MO), pp. 176–181.
ICEISICEIS-ISAS2-2008-Nobre #design #social #why
Why Heidegger? — Critical Insights for IS Design from Pragmatism and from Social Semiotics (ÂLN), pp. 435–441.
ICEISICEIS-J-2008-MoralesCPA #composition #model checking #verification
Compositional Model-Checking Verification of Critical Systems (LEMM, MIC, MAP, KBA), pp. 213–225.
CIKMCIKM-2008-BaiL #database
A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems (KB, PL), pp. 1403–1404.
ICPRICPR-2008-ZhaoC #geometry
Critical configurations of lines to geometry determination of three cameras (MZ, RCkC), pp. 1–5.
SEKESEKE-2008-AltahatET #analysis #detection #diagrams #graph transformation #interactive #uml
Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
SEKESEKE-2008-ChangZIMT #agile #prototype
Transformations for Rapid Prototyping of Time-critical Applications (SKC, ZZ, CJI, PM, VT), pp. 4–15.
SEKESEKE-2008-NakaoaTM #case study #independence #validation #verification
Estimating the Effort of Independent Verification and Validation in the Context of Mission-critical Software Systems — A Case Study (HN, AT, JM), pp. 167–172.
ICSEICSE-2008-McCafferyPR #agile #assessment #hybrid #named #safety
Ahaa — agile, hybrid assessment method for automotive, safety critical smes (FM, MP, IR), pp. 551–560.
CGOCGO-2008-SalverdakZ #predict #random
Accurate critical path prediction via random trace construction (PS, CT, CBZ), pp. 64–73.
RTARTA-2008-LafontR #case study #diagrams #matrix #orthogonal
Diagram Rewriting for Orthogonal Matrices: A Study of Critical Peaks (YL, PR), pp. 232–245.
DACDAC-2007-VenkataramaniBCG #analysis
Global Critical Path: A Tool for System-Level Timing Analysis (GV, MB, TC, SCG), pp. 783–786.
DACDAC-2007-WenMSKOS #effectiveness #reduction #testing
Critical-Path-Aware X-Filling for Effective IR-Drop Reduction in At-Speed Scan Testing (XW, KM, TS, SK, YO, KKS), pp. 527–532.
DATEDATE-2007-0004XJ #analysis #novel #statistics
A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
DATEDATE-2007-HairionECS #design #safety
New safety critical radio altimeter for airbus and related design flow (DH, SE, EC, MS), pp. 684–688.
DATEDATE-2007-RosselloBBS #statistics #testing
Dynamic critical resistance: a timing-based critical resistance model for statistical delay testing of nanometer ICs (JLR, CdB, SAB, JS), pp. 1271–1276.
FASEFASE-2007-ManneringHR #design #safety #towards
Towards Normal Design for Safety-Critical Systems (DM, JGH, LR), pp. 398–411.
STOCSTOC-2007-AndrewsJS #network #protocol #scheduling
Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads (MA, KJ, ALS), pp. 145–154.
HCIHIMI-IIE-2007-Sanchez-PueblaAD #evaluation #interface #parametricity #predict #validation
Validation of Critical Parameters for Predictive Evaluation of Notification System in Avionics Interfaces (MASP, IA, PD), pp. 1109–1118.
AdaEuropeAdaEurope-2007-BarbariaHP #component #design #distributed #performance
Design and Performance of a Generic Consensus Component for Critical Distributed Applications (KB, JH, LP), pp. 208–220.
AdaSIGAda-2007-Brosgol #assessment #named #safety
SA2: languages for safety-critical software: issues and assessment (BMB), p. 2.
ICEISICEIS-EIS-2007-FosterLHS #security
A Change Strategy for Organisational Security: The Role of Critical Success Factors (SF, KL, PH, AS), pp. 375–380.
ICEISICEIS-HCI-2007-GuimaraesBM #challenge #interactive
Interaction in Critical Systems: Conquests and Challenges (MSG, MCCB, EM), pp. 170–175.
ICMLICML-2007-GhavamzadehE #algorithm
Bayesian actor-critic algorithms (MG, YE), pp. 297–304.
MLDMMLDM-2007-SakaiIKH #clustering
Critical Scale for Unsupervised Cluster Discovery (TS, AI, TK, SH), pp. 218–232.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-ZoughbiBL #safety #uml
A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software (GZ, LCB, YL), pp. 574–588.
CGOCGO-2007-DaiLH #execution #network #pipes and filters #using
Pipelined Execution of Critical Sections Using Software-Controlled Caching in Network Processors (JD, LL, BH), pp. 312–324.
PPoPPPPoPP-2007-ZhangSZSG #concurrent
Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections (YZ, VCS, WZ, VS, GRG), pp. 146–147.
RTARTA-2007-HaemmerleF #confluence
Abstract Critical Pairs and Confluence of Arbitrary Binary Relations (RH, FF), pp. 214–228.
QoSAQoSA-2006-WuK #architecture #design #safety
Managing Architectural Design Decisions for Safety-Critical Software Systems (WW, TK), pp. 59–77.
DACDAC-2006-HsuRKPB #data flow #graph #performance #simulation
Efficient simulation of critical synchronous dataflow graphs (CJH, SR, MYK, JLP, SSB), pp. 893–898.
DACDAC-2006-HuLHL #network
Steiner network construction for timing critical nets (SH, QL, JH, PL), pp. 379–384.
DACDAC-2006-XiongZVV #statistics
Criticality computation in parameterized statistical timing (JX, VZ, NV, CV), pp. 63–68.
DATEDATE-2006-IizukaIA #layout #optimisation
Timing-driven cell layout de-compaction for yield optimization by critical area minimization (TI, MI, KA), pp. 884–889.
ICSMEICSM-2006-StanekKNC #maintenance #online
Online Software Maintenance for Mission-Critical Systems (JS, SK, TNN, CCN), pp. 93–103.
WCREWCRE-2006-CapiluppiMB #how #outsourcing #quality
How Outsourcing Affects the Quality of Mission Critical Software (AC, JM, CB), pp. 285–287.
SASSAS-2006-AllamigeonGH #c #embedded #source code #static analysis #string
Static Analysis of String Manipulations in Critical Embedded C Programs (XA, WG, CH), pp. 35–51.
DLTDLT-2006-Krieger #fixpoint #morphism #on the
On Critical Exponents in Fixed Points of Non-erasing Morphisms (DK), pp. 280–291.
CHICHI-2006-Landgren
Making action visible in time-critical work (JL), pp. 201–210.
AdaEuropeAdaEurope-2006-BrosgolW #ada #comparison #java #realtime #safety
A Comparison of Ada and Real-Time JavaTM for Safety-Critical Applications (BMB, AJW), pp. 13–26.
AdaSIGAda-2006-SwardG #safety
Developing safety critical software for an unmanned aerial vehicle situational awareness tool (RES, MG), pp. 45–50.
ICSEICSE-2006-NguyenBV #maintenance #outsourcing #trust
Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
DACDAC-2005-GuptaKKS #analysis
Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions (PG, ABK, YK, DS), pp. 365–368.
DACDAC-2005-YangCS #analysis
Advanced timing analysis based on post-OPC extraction of critical dimensions (JY, LC, DS), pp. 359–364.
DATEDATE-2005-HeckmannF #abstract interpretation #embedded #safety
erifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation (RH, CF), pp. 618–619.
DATEDATE-2005-Horsky #safety
LC Oscillator Driver for Safety Critical Applications (PH), pp. 159–164.
DATEDATE-2005-JeffreyCPLRR #configuration management #integration #monitoring #online #safety #using
The Integration of On-Line Monitoring and Reconfiguration Functions using IEEE1149.4 Into a Safety Critical Automotive Electronic Control Unit (CJ, RC, SP, ML, AR, SR), pp. 153–158.
FMFM-2005-WassyngLH #safety
Timing Tolerances in Safety-Critical Software (AW, ML, XH), pp. 157–172.
AdaEuropeAdaEurope-2005-AmeyCW #certification
Smart Certification of Mixed Criticality Systems (PA, RC, NW), pp. 144–155.
AdaEuropeAdaEurope-2005-MasmanoRCR #ada
Distributing Criticality Across Ada Partitions (MM, JR, AC, IR), pp. 196–207.
AdaEuropeAdaEurope-2005-Ruiz
GNAT Pro for On-board Mission-Critical Space Applications (JFR), pp. 248–259.
ICEISICEIS-v1-2005-FaverioSB #enterprise #implementation #process #using
Using Critical Success Factors for Assessing Critical Activities in ERP Implementation within SMEs (PF, DS, GB), pp. 285–292.
ICEISICEIS-v1-2005-NewellDLEC
Critical Success Factors (SN, GCD, TAL, LFE, JGC), pp. 238–247.
ICEISICEIS-v1-2005-TrienekensKH #case study #enterprise #industrial
Critical Success Factors in ERP Projects: Case Studies in Two Industrial Organizations in The Netherlands (JJMT, WK, RH), pp. 84–91.
SEKESEKE-2005-HsiungL #modelling #safety #verification
Model-based Verification of Safety-Critical Systems (PAH, YHL), pp. 596–601.
SACSAC-2005-JafariDBS #adaptation #fault tolerance #monitoring
Adaptive and fault tolerant medical vest for life-critical medical monitoring (RJ, FD, PB, MS), pp. 272–279.
ICSEICSE-2005-BurmesterGHST #development #modelling #realtime #safety
The fujaba real-time tool suite: model-driven development of safety-critical, real-time systems (SB, HG, MH, DS, MT), pp. 670–671.
CBSECBSE-2004-SandstromFA #component #embedded #realtime #safety
Introducing a Component Technology for Safety Critical Embedded Real-Time Systems (KS, JF, ), pp. 194–208.
ICSMEICSM-2004-MantylaVL #smell
Bad Smells — Humans as Code Critics (MM, JV, CL), pp. 399–408.
STOCSTOC-2004-KortsarzN #algorithm #approximate #graph
Approximation algorithm for k-node connected subgraphs via critical graphs (GK, ZN), pp. 138–145.
AdaEuropeAdaEurope-2004-GiriMJK #ada #approach #random #safety #testing
A Randomised Test Approach to Testing Safety Critical Ada Code (SKG, AM, YVJ, KK), pp. 190–199.
AdaEuropeAdaEurope-2004-Heaney #named
Shortcuts: A Critical Look (MH), pp. 309–320.
AdaSIGAda-2004-Davis #component #information management #lifecycle #security
Information systems security engineering: a critical component of the systems engineering lifecycle (JFD), pp. 13–18.
ICEISICEIS-v1-2004-EstevesP #behaviour #enterprise #implementation
Organizational and Technological Critical Success Factors Behavior Along the ERP Implementation Phases (JE, JAP), pp. 45–53.
ICEISICEIS-v3-2004-Nobre04a #what
Computer Ethics: What are we Talking About? Possible Contributions from Philosophy of Action, Critical Realism and Modern Hermeneutics (ÂLN), pp. 683–687.
ICEISICEIS-v4-2004-CostaOS #identification
E-Services in Mission-Critical Organizations: Identification Enforcement (CC, JLO, AS), pp. 389–396.
ICEISICEIS-v5-2004-ChenLK #assessment #perspective
Assessment of E-Learning Satisfaction from Critical Incidents Perspective (NSC, KML, K), pp. 27–34.
ICPRICPR-v3-2004-ShiNGY #classification #learning
Critical Vector Learning to Construct RBF Classifiers (DS, GSN, JG, DSY), pp. 359–362.
TOOLSTOOLS-USA-2003-Jurjens04 #component
Componentware for Critical Systems (JJ), pp. 47–50.
HPCAHPCA-2004-EhrhartP #predict #scheduling #using
Reducing the Scheduling Critical Cycle Using Wakeup Prediction (TEE, SJP), pp. 222–231.
ICSMEICSM-2003-SneedB #case study #maintenance
Critical Success Factors in Software Maintenance — A Case Study (HMS, PB), pp. 190–198.
PLDIPLDI-2003-BlanchetCCFMMMR #safety #scalability
A static analyzer for large safety-critical software (BB, PC, RC, JF, LM, AM, DM, XR), pp. 196–207.
FMFME-2003-Glesner
Program Checking with Certificates: Separating Correctness-Critical Code (SG), pp. 758–777.
AdaEuropeAdaEurope-2003-JeppuKS #ada #realtime #safety #testing #using
Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
ICEISICEIS-v1-2003-AmraniGRMB #enterprise #implementation
ERP Implementation, Cross-Functionality and Critical Change Factors (REA, BGM, FR, RM, MB), pp. 600–619.
KDDKDD-2003-SahooORGMMVS #clustering #predict #scalability
Critical event prediction for proactive management in large-scale computer clusters (RKS, AJO, IR, MG, JEM, SM, RV, AS), pp. 426–435.
UMLUML-2003-Jurjens #safety #uml
Developing Safety-Critical Systems with UML (JJ), pp. 360–372.
RERE-2003-Romanski #configuration management #requirements #safety #traceability
Requirements, Configuration Management and Traceability for Safety Critical Software (GR), p. 304.
RERE-2003-TuunanenR #elicitation #requirements
Market Driven Requirements Elicitation via Critical Success Chains (TT, MR), pp. 367–368.
SACSAC-2003-LeeLTY #identification
Identify Amino Acid Candidates Critical for Function of Rat Imidase by Cross-reference Voting in Imidase SuperFamily (CL, YtL, CYT, YSY), pp. 127–134.
ICSEICSE-2003-LutzM #requirements #safety #testing
Requirements Discovery during the Testing of Safety-Critical Software (RRL, ICM), pp. 578–585.
ICTSSTestCom-2003-ArnedoCN #performance #testing
Fast Testing of Critical Properties through Passive Testing (JAA, ARC, MN), pp. 295–310.
DACDAC-2002-SmithNMCFKMB #embedded #question #tool support
Unified tools for SoC embedded systems: mission critical, mission impossible or mission irrelevant? (GS, DN, SM, RC, JF, KK, GM, BB), p. 479.
DATEDATE-2002-LuchettaMP #comparison #fault
Critical Comparison among Some Analog Fault Diagnosis Procedures Based on Symbolic Techniques (AL, SM, MCP), p. 1105.
DATEDATE-2002-SauerEKJ #design #network
The Fraunhofer Knowledge Network (FKN) for Training in Critical Design Disciplines (AS, GE, LK, WJ), p. 1129.
ICSMEICSM-2002-Jungmayr #dependence #identification
Identifying Test-Critical Dependencies (SJ), pp. 404–413.
ICGTICGT-2002-PadbergE #graph transformation #invariant #safety
Rule Invariants in Graph Transformation Systems for Analyzing Safety-Critical Systems (JP, BE), pp. 334–350.
AdaEuropeAda-2002-BlotzHLPSZ #ada #development #modelling #re-engineering #safety
Model-Based Software Engineering and Ada: Synergy for the Development of Safety-Critical Systems (AB, FH, HL, AP, OS, HPZ), pp. 37–52.
ICEISICEIS-2002-EstevesP #enterprise #framework #implementation
A Framework to Analyse Most Critical Work Packages in ERP Implementation Projects (JE, JAP), pp. 89–98.
ICPRICPR-v1-2002-WollnyTK #analysis #segmentation
Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation (GW, MT, FK), pp. 524–527.
SIGIRSIGIR-2002-ManmathaFA #cost analysis
A critical examination of TDT’s cost function (RM, AF, JA), pp. 403–404.
RERE-2002-AlvarezOP #quality #requirements #reuse
Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection (JATÁ, AO, MP), pp. 95–103.
SACSAC-2002-SujanRP #evolution
Contradictions and critical issues during system evolution (MAS, AR, AP), pp. 711–715.
ICSEICSE-2002-Knight #challenge #safety
Safety critical systems: challenges and directions (JCK), pp. 547–550.
SPLCSPLC-2002-Wijnstra #approach #product line
Critical Factors for a Successful Platform-Based Product Family Approach (JGW), pp. 68–89.
DACDAC-2001-LiuCBK #constraints #embedded #power management #scheduling
Power-Aware Scheduling under Timing Constraints for Mission-Critical Embedded Systems (JL, PHC, NB, FJK), pp. 840–845.
DACDAC-2001-XiaoM #analysis #correlation #functional #identification
Functional Correlation Analysis in Crosstalk Induced Critical Paths Identification (TX, MMS), pp. 653–656.
ICSMEICSM-2001-ZelkowitzR #independence #maintenance #safety #validation #verification
The Role of Independent Verification and Validation in Maintaining a Safety Critical Evolutionary Software in a Complex Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 118–126.
AdaEuropeAdaEurope-2001-Amey #logic
Logic versus Magic in Critical Systems (PA), pp. 49–67.
AdaEuropeAdaEurope-2001-FoulgerK #fault #runtime #safety #tool support #using
Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software (DF, SK), pp. 229–240.
ICEISICEIS-v1-2001-EstevesP #enterprise #implementation #process
Establishing the Importance of ERP Implementation — Critical Success Factors along ASAP Methodology Processes (JE, JAP), pp. 182–187.
RERE-2001-LutzM #evolution #requirements #safety
Evolution of Safety-Critical Requirements Post-Launch (RRL, ICM), pp. 222–227.
RERE-2001-Traore #development
An Integrated V&V Environment for Critical Systems Development (IT), p. 287.
FSEESEC-FSE-2001-Coen-PorisiniDGP #execution #safety #symbolic computation #using #verification
Using symbolic execution for verifying safety-critical systems (ACP, GD, CG, MP), pp. 142–151.
ICSEICSE-2001-Abrahamsson #concept #development #process
Commitment Development in Software Process Improvement: Critical Misconceptions (PA), pp. 71–80.
ICSEICSE-2001-ZelkowitzR #comprehension #safety
Understanding IV & V in a Safety Critical and Complex Evolutionary Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 349–357.
HPCAHPCA-2001-TuneLTC #predict
Dynamic Prediction of Critical Path Instructions (ET, DL, DMT, BC), pp. 185–195.
ICSTSAT-2001-Roll #parallel
Criticality and Parallelism in GSAT (AR), pp. 150–161.
ASEASE-2000-HillL #analysis
Non-Interference Analysis for Mixed Criticality Code in Avionics Systems (MGH, TWL), pp. 257–260.
ASEASE-2000-OHalloran #automation #generative #safety
Issues for the Automatic Generation of Safety Critical Software (CO), pp. 277–280.
ASEASE-2000-SouzaFGW #analysis #design #object-oriented
A Group Critic System for Object-Oriented Analysis and Design (CRBdS, JSFJ, KMG, JW), pp. 313–316.
DACDAC-2000-Hassoun #analysis #bound #using
Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
DACDAC-2000-MeguerdichianP
Watermarking while preserving the critical path (SM, MP), pp. 108–111.
DATEDATE-2000-BouraiS #layout #optimisation
Layout Compaction for Yield Optimization via Critical Area Minimization (YB, CJRS), pp. 122–125.
FASEFASE-2000-Suhl #safety
Applying RT-Z to Develop Safety-Critical Systems (CS), pp. 51–65.
TACASTACAS-2000-GnesiLLAAM #fault #specification #validation
A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors (SG, DL, GL, CA, AMA, PM), pp. 535–549.
TOOLSTOOLS-USA-2000-Dedene00a #cobol #object-oriented #standard
Critical Issues in the Proposed ISO Object-Oriented COBOL 2002 Standard (GD), pp. 491–500.
TOOLSTOOLS-USA-2000-LewisCV #embedded #evolution
Developing Evolvable, Embedded, Time-Critical Systems with MetaH (BAL, EC, SV), pp. 447–456.
REICRE-2000-Neumann #risk management
Requirements-Related Risks in Critical Systems (PGN), p. 3–?.
CADECADE-2000-JacksonL #interactive #proving
System Description: Interactive Proof Critics in XBarnacle (MJ, HL), pp. 502–506.
ASEASE-1999-WhalenH #approach #automation #code generation #safety
An Approach to Automatic Code Generation for Safety-Critical Systems (MWW, MPEH), pp. 315–318.
SIGMODSIGMOD-1999-BaulierBGGHJKKMMNNRSSSWW #database #in memory #memory management #performance
DataBlitz Storage Manager: Main Memory Database Performance for Critical Applications (JB, PB, SG, CG, SH, SJ, AK, HFK, PM, JM, PPSN, MN, RR, SS, AS, SS, MW, CW), pp. 519–520.
CHICHI-1999-JackoDRSP #component #visual notation
Visual Profiles: A Critical Component of Universal Access (JAJ, MAD, RHRJ, IUS, CJP), pp. 330–337.
HCIHCI-CCAD-1999-Maurer #web
A critical look at web based training efforts (HAM), pp. 718–724.
HCIHCI-EI-1999-Boy #safety
About the Role of Intelligent Assistants in the Control of Safety-Critical Systems (GAB), pp. 321–325.
AdaEuropeAdaEurope-1999-ChapmanD #safety #using
Re-engeneering a Safety-Critical Application Using SPARK 95 and GNORT (RC, RD), pp. 39–51.
AdaEuropeAdaEurope-1999-Frost #ada #certification #embedded #safety
An Ada95 Solution for Certification of Embedded Safety Critical Applications (JF), pp. 52–63.
AdaSIGAda-1999-Carpenter #requirements #verification
Verification of requirements for saftey-critical software (PBC), pp. 23–29.
AdaSIGAda-1999-Colket #analysis #realtime #using
Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
ICEISICEIS-1999-Gide
Critical Success Factors for Manufacturing Management Through Team Building (EG), p. 786.
ICEISICEIS-1999-Whymark #requirements #using
Using Criticality as a Basis for Determining Information Requirements for an EIS (GKW), pp. 542–549.
TOOLSTOOLS-EUROPE-1999-MayerH #analysis #metric #object-oriented
Measuring OO Systems: A Critical Analysis of the MOOD Metrics (TM, TH), pp. 108–117.
TOOLSTOOLS-USA-1999-Parnas99a
Systematic Techniques for Inspecting Critical Software (DLP), p. 410.
TOOLSTOOLS-USA-1999-Romanski #development #safety #verification
The Development and Verification of Safety Critical Software (GR), p. 411.
SACSAC-1999-LauberSW #assurance #online #probability #quality #safety
Applied Probabilistic AI for Online Diagnosis of a Safety-Critical System Based on a Quality Assurance Program (JL, CS, RW), pp. 25–30.
ICSEICSE-1999-Easterbrook #requirements #validation #verification
Verification and Validation of Requirements for Mission Critical Systems (SME), pp. 673–674.
FASEFASE-1998-BerregebBR #proving
Observational Proofs with Critical Contexts (NB, AB, MR), pp. 38–53.
FASEFASE-1998-BussowGK #case study #embedded #safety #specification
Specifying Safety-Critical Embedded Systems with Statecharts and Z: A Case Study (RB, RG, MK), pp. 71–87.
CSMRCSMR-1998-ZedanY #approach #re-engineering
A Sound and Practical Approach To The Re-Engineering Of Time-Critical Systems (HZ, HY), pp. 220–223.
FMFM-1998-GoldsmithZ #csp #validation #verification
Critical Systems Validation and Verification with CSP and FDR (MG, IZ), pp. 243–250.
CHICHI-1998-Boy #analysis #automation #safety
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
AdaEuropeAdaEurope-1998-Chapront #ada #development #safety
Ada+B The Formula for Safety Critical Software Development (PC), pp. 13–18.
ICMLICML-1998-KimuraK #algorithm #analysis #learning #using
An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
RTARTA-1998-Okui
Simultaneous Critical Pairs and Church-Rosser Property (SO), pp. 2–16.
VLDBVLDB-1997-MalonM #database #energy #physics
Critical Database Technologies for High Energy Physics (DMM, ENM), pp. 580–584.
STOCSTOC-1997-PhillipsSTW #scheduling
Optimal Time-Critical Scheduling via Resource Augmentation (Extended Abstract) (CAP, CS, ET, JW), pp. 140–149.
FMFME-1997-DevauchelleLV #named #specification
PICGAL: Practical Use of Formal Specification to Develop a Complex Critical System (LD, PGL, HV), pp. 221–236.
HCIHCI-CC-1997-BiksonECM #knowledge-based #process
Knowledge-Based Teams: Technology, Reinvention and Critical Process Redesign (TKB, JDE, SC, DM), pp. 205–208.
HCIHCI-CC-1997-CarstensenN #towards
Towards Computer Support for Cooperation in Time-Critical Work Settings (PHC, MN), pp. 101–104.
ECIRACIR-1997-StewartD #bibliography #perspective #profiling
User Profiling Techniques: A Critical Review (SS, JD).
UMLUML-1997-BergnerRS #uml
A Critical Look upon UML 1.0 (KB, AR, MS), pp. 79–92.
TOOLSTOOLS-USA-1997-Riehle97a #safety
Object Technology for Safety-Critical Applications (RR), p. 376.
ESECESEC-FSE-1997-AlborghettiGM #analysis #automation #deduction
Providing Automated Support to Deductive Analysis of Time Critical Systems (AA, AG, AM), pp. 211–226.
ESECESEC-FSE-1997-Ebert #case study #development #experience #predict
Experiences with Criticality Predictions in Software Development (CE), pp. 278–293.
ICSEICSE-1997-PodorizhnyO #case study #comparison #design #experience #modelling
The Criticality of Modeling Formalisms in Software Design Method Comparison: Experience Report (RMP, LJO), pp. 303–313.
CADECADE-1997-DennisBG #bisimulation #induction #proving #using
Using A Generalisation Critic to Find Bisimulations for Coinductive Proofs (LAD, AB, IG), pp. 276–290.
CAVCAV-1997-CimattiGPPPRTY #certification #embedded #safety #verification
A Provably Correct Embedded Verifier for the Certification of Safety Critical Software (AC, FG, PP, BP, JP, DR, PT, BY), pp. 202–213.
DACDAC-1996-DesaiY #cpu #design #simulation #using #verification
A Systematic Technique for Verifying Critical Path Delays in a 300MHz Alpha CPU Design Using Circuit Simulation (MPD, YTY), pp. 125–130.
WPCWPC-1996-Bull #comprehension #domain-specific language #safety #using
Comprehension of Safety-Critical Systems Using Domain-Specific Languages (TB), pp. 108–122.
FMFME-1996-Peleska #automation #industrial #safety #testing
Test Automation for Safety-Critical Systems: Industrial Application and Future Developments (JP), pp. 39–59.
FMFME-1996-Weber #design #safety
Combining Statecharts and Z for the Design of Safety-Critical Control Systems (MW), pp. 307–326.
AdaEuropeAdaEurope-1996-CraigenSM #ada #approach
Ada 95 and Critical Systems: An Analytical Approach (DC, MS, SM), pp. 171–182.
AdaEuropeAdaEurope-1996-Rosskopf #ada #assessment #safety #static analysis
Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
AdaEuropeAdaEurope-1996-Schneidewind #modelling #reliability #safety
Reliability Modeling for Safety Critical Software (NFS), pp. 17–37.
AdaTRI-Ada-1996-MeyerR #design #embedded #safety
Design and Test Strategies for a Safety-Critical Embedded Executive (CAM, MGR), pp. 29–37.
CADECADE-1996-IrelandB #induction #proving
Extensions to a Generalization Critic for Inductive Proof (AI, AB), pp. 47–61.
ISSTAISSTA-1996-DeMilloPS #fault #locality #slicing
Critical Slicing for Software Fault Localization (RAD, HP, EHS), pp. 121–134.
ISSTAISSTA-1996-MorascaMP #functional #generative #in the large #specification #testing
Generating Functional Test Cases in-the-large for Time-critical Systems from Logic-based Specifications (SM, AM, PSP), pp. 39–52.
ICSMEICSM-1995-BullYBL #named #reverse engineering #safety
Bylands: reverse engineering safety-critical systems (TMB, EJY, KHB, ZL), pp. 358–366.
CHICHI-1995-MalinowskiN #collaboration #design #user interface #using
Using Computational Critics to Facilitate Long-Term Collaboration in User Interface Design (UM, KN), pp. 385–392.
AdaEuropeAdaEurope-1995-Richard-Foy #ada #safety
Safe Ada Executive: An Executive for Ada Safety Critical Applications (MRF), pp. 11–20.
ISMMIWMM-1995-WilsonJNB #bibliography #perspective
Dynamic Storage Allocation: A Survey and Critical Review (PRW, MSJ, MN, DB), pp. 1–116.
CAVCAV-1995-EirikssonM #analysis #case study #design #using #verification
Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
DATEEDAC-1994-BrasenS #clustering
FPGA Partitioning for Critical Paths (DRB, GS), pp. 99–103.
ASEKBSE-1994-BoehmB #knowledge-based #re-engineering
Critical Success Factors for Knowledge-Based Software Engineering Applications (BWB, PKB), pp. 166–171.
FMFME-1994-Collinson #functional #specification
A Critical Look at Functional Specifications (RC), pp. 381–400.
CHICHI-1994-Koenemann-BelliveauCRS94a #comparative #evaluation #thread #usability
Comparative usability evaluation: critical incidents and critical threads (JKB, JMC, MBR, MKS), pp. 245–251.
SEKESEKE-1994-WillisP #reuse #safety #specification
Specification reuse for safety-critical software (CPW, DJP), pp. 516–523.
TOOLSTOOLS-EUROPE-1994-Wiener94a #c++ #comparison #eiffel
A Critical Comparison of C++ and Eiffel — A Clash of Cultures (RW), p. 541.
ICSEICSE-1994-Boehm #architecture
Software Architectures: Critical Success Factors and Cost Drivers (BWB), p. 365.
CADECADE-1994-Bundgen #how #on the
On Pot, Pans and Pudding or How to Discover Generalised Critical Pairs (RB), pp. 693–707.
CADECADE-1994-Walsh
A Divergence Critic (TW), pp. 14–28.
ISSTAISSTA-1994-KnightCFW #safety #testing
Testing a Safety-Critical Application (JCK, AGC, AMF, KGW), p. 199.
DACDAC-1993-BoeseKR
High-Performance Routing Trees With Identified Critical Sinks (KDB, ABK, GR), pp. 182–187.
DACDAC-1993-ChuML #finite #performance #state machine
An Efficient Critical Race-Free State Assignment Technique for Asynchronous Finite State Machines (TAC, NM, CKCL), pp. 2–6.
DACDAC-1993-IqbalPDP #algebra #using
Critical Path Minimization Using Retiming and Algebraic Speed-Up (ZI, MP, SD, ACP), pp. 573–577.
DACDAC-1993-JoneF #identification #optimisation
Timing Optimization By Gate Resizing And Critical Path Identification (WBJ, CLF), pp. 135–140.
FMFME-1993-BowenS #formal method #industrial #perspective #safety
The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective (JPB, VS), pp. 183–195.
FMFME-1993-Jacky #safety #specification
Specifying a Safety-Critical Control System in Z (JJ), pp. 388–402.
HCIHCI-SHI-1993-Warren #approach #development #modelling #realtime #safety #tool support
The TOM Approach to System Development: Methods and Tools for Task Oriented Modelling of Real-Time Safety Critical Systems (CW), pp. 285–290.
CHIINTERCHI-1993-Byrne #documentation #using
Using icons to find documents: simplicity is critical (MDB), pp. 446–453.
CHIINTERCHI-1993-FischerNOSS #design
Embedding computer-based critics in the contexts of design (GF, KN, JLO, GS, TS), pp. 157–164.
AdaEuropeAdaEurope-1993-BrygierR #ada #certification #realtime #safety
Certification of Ada Real-Time Executives for Safety Critical Applications (JB, MRF), pp. 264–279.
SEKESEKE-1993-Berztiss #safety
Catastrophe Prevention in Safety-Critical Systems (ATB), pp. 102–108.
TOOLSTOOLS-USA-1993-Wiener #eiffel #object-oriented #smalltalk
Comparing OOP Languages — A Critical Look at C++, Smalltalk, and Eiffel (RW), p. 526.
RERE-1993-Lutz #embedded #fault #requirements #safety
Analyzing software requirements errors in safety-critical, embedded systems (RRL), pp. 126–133.
ICSEICSE-1993-CourtoisP #documentation #safety
Documentation for Safety Critical Software (PJC, DLP), pp. 315–323.
CAVCAV-1993-ProbstL #automaton #behaviour #verification
Verifying Timed Behavior Automata with Input/Output Critical Races (DKP, HFL), pp. 424–437.
AdaTRI-Ada-C-1992-HummerB #ada #design #hardware #safety
When Hardware Becomes Software: Designing a Safety-Critical System with Ada (JH, LB), pp. 538–544.
AdaTRI-Ada-C-1992-McHugh #ada #safety
Ada 9X and Safety Critical/Secure Systems (JM), pp. 55–59.
CAVCAV-1992-Bruns #case study #design #safety
A Case Study in Safety-Critical Design (GB), pp. 220–233.
DACDAC-1991-ChenDL #optimisation #performance
Critical Path Selection for Performance Optimization (HCC, DHCD, LRL), pp. 547–550.
DACDAC-1991-JuS #identification #incremental
Incremental Techniques for the Identification of Statically Sensitizable Critical Paths (YCJ, RAS), pp. 541–546.
DACDAC-1991-LiuDC #algorithm #parallel #performance
An Efficient Parallel Critical Path Algorithm (LRL, DHCD, HCC), pp. 535–540.
DACDAC-1991-SutanthavibulS #predict
Dynamic Prediction of Critical Paths and Nets for Constructive Timing-Driven Placement (SS, ES), pp. 632–635.
AdaEuropeAdaEurope-1991-Welz #ada #safety
Ada in Safety Critical Applications (AW), pp. 193–198.
LICSLICS-1991-Nipkow #higher-order
Higher-Order Critical Pairs (TN), pp. 342–349.
DACDAC-1990-RamakrishnanK #algorithm
Extension of the Critical Path Tracing Algorithm (TR, LK), pp. 720–723.
CHICHI-1990-FischerLMM #using
Using critics to empower users (GF, ACL, TWM, AIM), pp. 337–347.
POPLPOPL-1990-PalemS #scheduling
Scheduling Time-Critical Instructions on RISC Machines (KVP, BBS), pp. 270–280.
ICSEICSE-1990-Laprie #assessment #on the #safety
On the Assessment of Safety-Critical Software Systems (JCL), p. 222.
ICSEICSE-1990-Pilaud #case study #development #experience
Some Experiences of Critical Software Development (EP), pp. 225–226.
ICSEICSE-1990-Thomas #safety
Assessing Failure Probabilities in Safety-Critical Systems Containing Software (MT), p. 227.
DACDAC-1989-YenDG #algorithm #analysis #performance
Efficient Algorithms for Extracting the K most Critical Paths in Timing Analysis (SHY, DHCD, SG), pp. 649–654.
KRKR-1989-EtheringtonFGIL #reasoning
Critical Issues in Nonmonotonic Reasoning (DWE, KDF, MLG, DJI, VL), pp. 500–504.
OOPSLAOOPSLA-1989-Paepcke #bibliography #named #perspective
PCLOS: A Critical Review (AP), pp. 221–237.
ICSEICSE-1989-VernerTJH #analysis #bibliography #case study #dependence #perspective
Technology Dependence in Function Point Analysis: A Case Study and Critical Review (JMV, GT, BJ, RGH), pp. 375–382.
ICALPICALP-1987-CaiM #complexity #graph #on the
On the Complexity of Graph Critical Uncolorability (JyC, GEM), pp. 394–403.
ESECESEC-1987-Laprie #approach #dependence
The Dependability Approach to Critical Computing Systems (JCL), pp. 233–243.
RTARTA-1985-Buchberger #development
Basic Features and Development of the Critical-Pair/Completion Procedure (BB), pp. 1–45.
DACDAC-1984-DunlopADJKW #layout #optimisation #using
Chip layout optimization using critical path weighting (AED, VDA, DND, MFJ, PK, MW), pp. 133–136.
DACDAC-1983-AbramoviciMM #fault #simulation
Critical path tracing — an alternative to fault simulation (MA, PRM, DTM), pp. 214–220.
ICSEICSE-1982-HamerF
M. H. Halstead’s Software Science — A Critical Examination (PGH, GDF), pp. 197–207.
DACDAC-1981-KamikawaiYCFT
A critical path delay check system (RK, MY, TC, KF, YT), pp. 118–123.
STOCSTOC-1980-Lloyd #constraints #scheduling
Critical Path Scheduling of Task Systems with Resource and Processor Constraints (Extended Abstract) (ELL), pp. 436–446.
ICSEICSE-1979-RamamoorthyBFMNS #approach #development #on the #validation
On A Systematic Approach to the Development and Validation of Critical Software for Nuclear Power Plants (CVR, FBB, JMF, YKRM, CWN, KS), pp. 231–240.
STOCSTOC-1978-Katseff #problem
A New Solution to the Critical Section Problem (HPK), pp. 86–88.
STOCSTOC-1977-PetersonF #distributed #problem
Economical Solutions for the Critical Section Problem in a Distributed System (Extended Abstract) (GLP, MJF), pp. 91–97.
ICSEICSE-1976-Browne #bibliography #evaluation #performance
A Critical Overview of Computer Performance Evaluation (JCB), pp. 138–145.
DACDAC-1974-RosenbergB #design #named
CRITIC — an integrated circuit design rule checking program (LMR, CB), pp. 14–18.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.