423 papers:
- QoSA-2015-FeitosaAAN #embedded #open source #quality #trade-off
- Investigating Quality Trade-offs in Open Source Critical Embedded Systems (DF, AA, PA, EYN), pp. 113–122.
- DAC-2015-YangTJ #analysis
- Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
- DATE-2015-GorevUD #fault #parallel #simulation
- Fault simulation with parallel exact critical path tracing in multiple core environment (MG, RU, SD), pp. 1180–1185.
- DATE-2015-HuangKGT #scheduling
- Run and be safe: mixed-criticality scheduling with temporary processor speedup (PH, PK, GG, LT), pp. 1329–1334.
- DATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability #using
- MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
- DATE-2015-ZwergerG #detection #symmetry
- Detection of asymmetric aging-critical voltage conditions in analog power-down mode (MZ, HEG), pp. 1269–1272.
- FM-2015-BratBDGHK #safety #verification
- Verifying the Safety of a Flight-Critical System (GB, DHB, MD, DG, FH, TK), pp. 308–324.
- CHI-2015-PierceSHJGD #design #human-computer
- Expanding and Refining Design and Criticality in HCI (JP, PS, TH, TJ, WWG, CFD), pp. 2083–2092.
- CSCW-2015-HalbertN #design #interactive #tool support
- Designing for Discomfort: Supporting Critical Reflection through Interactive Tools (HH, LPN), pp. 349–360.
- CSCW-2015-KusunokiS #design
- Designing for Temporal Awareness: The Role of Temporality in Time-Critical Medical Teamwork (DSK, AS), pp. 1465–1476.
- AdaEurope-2015-KhanfarLM #safety #slicing
- Static Backward Program Slicing for Safety-Critical Systems (HK, BL, ANM), pp. 50–65.
- AdaEurope-2015-PerezGTT #clustering #concept #manycore #safety
- A Safety Concept for an IEC-61508 Compliant Fail-Safe Wind Power Mixed-Criticality System Based on Multicore and Partitioning (JP, DG, ST, TT), pp. 3–17.
- SEKE-2015-KalinowskiSCPF0 #problem #requirements #towards
- Towards Building Knowledge on Causes of Critical Requirements Engineering Problems (MK, ROS, TC, RP, DMF, SW), pp. 1–6.
- SAC-2015-GimenesGRG #analysis #graph #multimodal #repository
- Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
- ESEC-FSE-2015-KoskiM #architecture #lessons learnt #quality #requirements
- Requirements, architecture, and quality in a mission critical system: 12 lessons learned (AK, TM), pp. 1018–1021.
- ICSE-v2-2015-PecchiaCCC #assessment #development #industrial #process
- Industry Practices and Event Logging: Assessment of a Critical Software Development Process (AP, MC, GC, DC), pp. 169–178.
- PLEASE-2015-Gallina #product line #reuse #safety #towards
- Towards Enabling Reuse in the Context of Safety-Critical Product Lines (BG), pp. 15–18.
- ASPLOS-2015-HicksSKS #debugging #lightweight #named #runtime #specification
- SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs (MH, CS, STK, JMS), pp. 517–529.
- HPDC-2015-KaxirasKNRS #approach #distributed #execution #memory management #scalability
- Turning Centralized Coherence and Distributed Critical-Section Execution on their Head: A New Approach for Scalable Distributed Shared Memory (SK, DK, MN, AR, KFS), pp. 3–14.
- ECSA-2014-GurbuzTE #architecture #design #safety
- Safety Perspective for Supporting Architectural Design of Safety-Critical Systems (HGG, BT, NPE), pp. 365–373.
- WICSA-2014-UusitaloRKMM #architecture #automation #lessons learnt #safety
- Lessons Learned from Safety-Critical Software-Based Automation Architectures of Nuclear Power Plants (EJU, MR, MK, VM, TM), pp. 45–48.
- ASE-2014-WozniakNZMPG #component #design
- Assigning time budgets to component functions in the design of time-critical automotive systems (EW, MDN, HZ, CM, STP, SG), pp. 235–246.
- DAC-2014-ChenWLWSC #design #monitoring #scalability
- Critical Path Monitor Enabled Dynamic Voltage Scaling for Graceful Degradation in Sub-Threshold Designs (YGC, TW, KYL, WYW, YS, SCC), p. 6.
- DAC-2014-HernandezA #detection #fault #named #safety
- LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
- DAC-2014-HuangYT #fault tolerance #on the #scheduling
- On the Scheduling of Fault-Tolerant Mixed-Criticality Systems (PH, HY, LT), p. 6.
- DAC-2014-KangYKBHT #fault tolerance
- Static Mapping of Mixed-Critical Applications for Fault-Tolerant MPSoCs (SHK, HY, SK, IB, SH, LT), p. 6.
- DATE-2014-DinechinAPL #parallel
- Time-critical computing on a single-chip massively parallel processor (BDdD, DvA, MP, GL), pp. 1–6.
- DATE-2014-GiannopoulouSHT #architecture #manycore
- Mapping mixed-criticality applications on multi-core architectures (GG, NS, PH, LT), pp. 1–6.
- DATE-2014-GuGD0 #multi #scheduling
- Partitioned mixed-criticality scheduling on multiprocessor platforms (CG, NG, QD, WY), pp. 1–6.
- DATE-2014-IliasovASM #design #refinement #safety
- Design of safety critical systems by refinement (AI, AA, DS, AM), pp. 1–4.
- DATE-2014-KangYKBHT #manycore #optimisation
- Reliability-aware mapping optimization of multi-core systems with mixed-criticality (SHK, HY, SK, IB, SH, LT), pp. 1–4.
- DATE-2014-MullerM #scheduling
- The schedulability region of two-level mixed-criticality systems based on EDF-VD (DM, AM), pp. 1–6.
- DATE-2014-NowotschPHPS #analysis #monitoring #multi #off the shelf
- Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
- DATE-2014-NuzzoFIS #contract #cyber-physical #design #protocol #safety
- Contract-based design of control protocols for safety-critical cyber-physical systems (PN, JBF, AI, ALSV), pp. 1–4.
- DATE-2014-PandaB #concurrent #thread
- Introducing Thread Criticality awareness in Prefetcher Aggressiveness Control (BP, SB), pp. 1–6.
- DATE-2014-PandeyV #analysis #fault #safety
- Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
- DATE-2014-RamboTDAE #analysis #realtime
- Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
- DATE-2014-SanderSDBBBMKALHRHH #hardware #manycore
- Hardware virtualization support for shared resources in mixed-criticality multicore systems (OS, TS, VVD, SB, FB, JB, HUM, DK, DA, EL, JH, AR, CH, AH), pp. 1–6.
- TACAS-2014-ArmandoCC #model checking #named #satisfiability
- SATMC: A SAT-Based Model Checker for Security-Critical Systems (AA, RC, LC), pp. 31–45.
- PLDI-2014-HanxledenDMSMAMO #named #safety
- SCCharts: sequentially constructive statecharts for safety-critical applications: HW/SW-synthesis for a conservative extension of synchronous statecharts (RvH, BD, CM, SS, MM, JA, SM, OO), p. 39.
- STOC-2014-GoosP #bound #communication
- Communication lower bounds via critical block sensitivity (MG, TP), pp. 847–856.
- CHI-2014-BardzellBS #design
- Reading critical designs: supporting reasoned interpretations of critical design (JB, SB, ES), pp. 1951–1960.
- CHI-2014-FeinbergCB #database #design #interactive #using
- Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
- CHI-2014-RectorH #email #named
- MinEMail: SMS alert system for managing critical emails (KR, JMH), pp. 783–792.
- DHM-2014-Kull #using
- Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
- DUXU-ELAS-2014-PetkovB #design
- Hardwired Critical Action Panels for Emergency Preparedness: — Design Principles and CAP Design for Offshore Petroleum Platforms (BP, AOB), pp. 326–337.
- DUXU-TMT-2014-BergerHE #design #interactive #prototype #towards
- Towards a Vocabulary of Prototypes in Interaction Design — A Criticism of Current Practice (AB, MH, ME), pp. 25–32.
- HCI-AS-2014-StelzerSO #novel #safety #user interface
- Evaluating Novel User Interfaces in (Safety Critical) Railway Environments (AS, IS, AO), pp. 502–512.
- LCT-NLE-2014-MirandaIC #framework #information management
- From Information Systems to e-Learning 3.0 Systems’s Critical Success Factors: A Framework Proposal (PM, PTI, CJC), pp. 180–191.
- AdaEurope-2014-ZhouLL #approach #embedded #requirements #safety #validation
- A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems (JZ, YL, KL), pp. 43–57.
- ICML-c1-2014-Thomas #algorithm #bias
- Bias in Natural Actor-Critic Algorithms (PT), pp. 441–448.
- KDD-2014-Mullainathan #machine learning #question #social
- Bugbears or legitimate threats?: (social) scientists’ criticisms of machine learning? (SM), p. 4.
- KDD-2014-ZhengZLJXLSZLTLDLW #data mining #mining #optimisation #process
- Applying data mining techniques to address critical process optimization needs in advanced manufacturing (LZ, CZ, LL, YJ, WX, JL, CS, WZ, HL, LT, TL, BD, ML, PW), pp. 1739–1748.
- KDD-2014-ZongWSSCHY #mining #scalability #towards
- Towards scalable critical alert mining (BZ, YW, JS, AKS, HÇ, JH, XY), pp. 1057–1066.
- SEKE-2014-QueirozB #approach #embedded #modelling #product line
- A Critical Embedded System Product Line Model-based Approach (PGGQ, RTVB), pp. 71–75.
- SIGIR-2014-MishraWIH
- Time-critical search (NM, RWW, SI, EH), pp. 747–756.
- OOPSLA-2014-DavidTLM #profiling
- Continuously measuring critical section pressure with the free-lunch profiler (FD, GT, JL, GM), pp. 291–307.
- FSE-2014-ZhangSK #bibliography #code review #interactive #named
- Critics: an interactive code review tool for searching and inspecting systematic changes (TZ, MS, MK), pp. 755–758.
- ICSE-2014-Monperrus #automation #bibliography #evaluation #generative #problem
- A critical review of “automatic patch generation learned from human-written patches”: essay on the problem statement and the evaluation of automatic software repair (MM), pp. 234–242.
- ASPLOS-2014-KastureS #named #performance #strict
- Ubik: efficient cache sharing with strict qos for latency-critical workloads (HK, DS), pp. 729–742.
- OSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing
- Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
- RTA-TLCA-2014-LiuDJ #analysis #confluence
- Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
- DAC-2013-GirbalMGAQCY #convergence #on the
- On the convergence of mainstream and mission-critical markets (SG, MM, AG, JA, EQ, FJC, SY), p. 10.
- DAC-2013-YuLJC #classification #detection #feature model #using
- Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
- DATE-2013-AncajasCR #approach
- Proactive aging management in heterogeneous NoCs through a criticality-driven routing approach (DMA, KC, SR), pp. 1032–1037.
- DATE-2013-CarvajalF #framework #realtime
- An open platform for mixed-criticality real-time ethernet (GC, SF), pp. 153–156.
- DATE-2013-GoossensAG #memory management #policy
- Conservative open-page policy for mixed time-criticality memory controllers (SG, BA, KG), pp. 525–530.
- DATE-2013-SuZ #algorithm #scheduling
- An elastic mixed-criticality task model and its scheduling algorithm (HS, DZ), pp. 147–152.
- DATE-2013-YuZHWLT #approach #manycore #set #simulation
- A critical-section-level timing synchronization approach for deterministic multi-core instruction set simulations (FWY, BHZ, YHH, HIW, CRL, RST), pp. 643–648.
- DATE-2013-ZhaoGZ #named #scheduling
- PT-AMC: integrating preemption thresholds into mixed-criticality scheduling (QZ, ZG, HZ), pp. 141–146.
- ICDAR-2013-MauroEF #web
- Finding Critical Cells in Web Tables with SRL: Trying to Uncover the Devil’s Tease (NDM, FE, SF), pp. 882–886.
- SCAM-2013-OyetoyanCC #component #fault
- Criticality of defects in cyclic dependent components (TDO, RC, DSC), pp. 21–30.
- SEFM-2013-BorekMSR #approach #model checking #modelling
- Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
- CHI-2013-BardzellB #design #question #what
- What is “critical” about critical design? (JB, SB), pp. 3297–3306.
- CHI-2013-KhovanskayaBCVG #approach #design #quote #what
- “Everybody knows what you’re doing”: a critical design approach to personal informatics (VDK, EPSB, DC, SV, GG), pp. 3403–3412.
- CHI-2013-ParkerMGACJM #health #online #what
- I am what i eat: identity & critical thinking in an online health forum for kids (AGP, IM, CG, VA, WC, VJ, EDM), pp. 2437–2446.
- CHI-2013-Yetim #persuasion
- Critical perspective on persuasive technology reconsidered (FY), pp. 3327–3330.
- DHM-SET-2013-PuchWFP #evaluation #interactive #simulation #using
- Evaluation of Drivers Interaction with Assistant Systems Using Criticality Driven Guided Simulation (SP, BW, MF, TP), pp. 108–117.
- HCI-AMTE-2013-FearyBCHLSS #design #evaluation #interface #safety
- Linking Context to Evaluation in the Design of Safety Critical Interfaces (MF, DB, XC, AH, RLL, LS, SPS), pp. 193–202.
- HCI-AMTE-2013-GalindoMPWF #aspect-oriented #education #human-computer #interactive #student
- Tuning an HCI Curriculum for Master Students to Address Interactive Critical Systems Aspects (MG, CM, PAP, MW, PF), pp. 51–60.
- HCI-IMT-2013-WahabZ #implementation #multi
- The Implementation of Multi-touch Table to Support the Military Decision Making through Critical Success Factors (CSFs) (NW, HBZ), pp. 523–529.
- AdaEurope-2013-AsensioLCN #analysis #approach #execution #safety #worst-case
- Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
- AdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #safety #using
- Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
- AdaEurope-2013-KampenhoutH #deployment #manycore #modelling
- Model-Based Deployment of Mission-Critical Spacecraft Applications on Multicore Processors (JRvK, RH), pp. 35–50.
- HILT-2013-LarsonHFD #fault #modelling #safety #using
- Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
- ICEIS-J-2013-Heusinger13a #design #on the #research
- On the “Impossibility” of Critical and Emancipatory Design Science Research (JMH), pp. 331–348.
- ICEIS-v2-2013-Heusinger #challenge #design #research
- Challenges of Critical and Emancipatory Design Science Research — The Design of “Possible Worlds” as Response (JMH), pp. 339–345.
- ECIR-2013-GuoDY
- Updating Users about Time Critical Events (QG, FD, EYT), pp. 483–494.
- KDIR-KMIS-2013-LiLL #integration #towards
- Semiotic Interoperability — A Critical Step towards Systems Integration (WL, KL, SL), pp. 508–513.
- SAC-2013-BrunsKB #safety
- Virtualization for safety-critical, deeply-embedded devices (FB, DK, AB), pp. 1485–1492.
- SAC-2013-NotanderRH #design #development #flexibility #framework #modelling #safety
- A model-based framework for flexible safety-critical software development: a design study (JPN, PR, MH), pp. 1137–1144.
- ESEC-FSE-2013-BlincoeVD #coordination #dependence #identification
- Do all task dependencies require coordination? the role of task properties in identifying critical coordination needs in software projects (KB, GV, DD), pp. 213–223.
- CC-2013-KempfVP #identification #parallel
- Compiler-Guided Identification of Critical Sections in Parallel Code (SK, RV, MP), pp. 204–223.
- ICST-2013-Lelli #challenge #interactive #testing
- Challenges of Testing for Critical Interactive Systems (VL), pp. 509–510.
- WICSA-ECSA-2012-ChristensenH #ecosystem #named #towards
- Net4Care: Towards a Mission-Critical Software Ecosystem (HBC, KMH), pp. 224–228.
- DAC-2012-YuCSJC #design #detection #using
- Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
- DATE-2012-GoswamiLSC #implementation
- Time-triggered implementations of mixed-criticality automotive software (DG, ML, RS, SC), pp. 1227–1232.
- DATE-2012-LafayePBGF #embedded #modelling #resource management #simulation
- Model driven resource usage simulation for critical embedded systems (ML, LP, EB, MG, DF), pp. 312–315.
- DATE-2012-RudolfTWW #automation #configuration management #identification
- Automated critical device identification for configurable analogue transistors (RR, PT, RW, PRW), pp. 858–861.
- SIGMOD-2012-AlexeHHKKNRSSVW #social #social media
- Surfacing time-critical insights from social media (BA, MAH, KH, RK, GK, MN, HR, MSS, IRS, CV, RW), pp. 657–660.
- TACAS-2012-WimmerJABK #markov #modelling
- Minimal Critical Subsystems for Discrete-Time Markov Models (RW, NJ, EÁ, BB, JPK), pp. 299–314.
- ICPC-2012-RupakhetiH #api #design
- Evaluating forum discussions to inform the design of an API critic (CRR, DH), pp. 53–62.
- ICPC-2012-RupakhetiH12a #api #library #named
- CriticAL: A critic for APIs and libraries (CRR, DH), pp. 241–243.
- CHI-2012-VinotA #design #safety
- Legible, are you sure?: an experimentation-based typographical design in safety-critical context (JLV, SA), pp. 2287–2296.
- CSCW-2012-CheungCS #collaboration #communication #game studies
- Communication channels and awareness cues in collocated collaborative time-critical gaming (VC, YLBC, SDS), pp. 569–578.
- CSCW-2012-CollierB #empirical #gender #wiki
- Conflict, criticism, or confidence: an empirical examination of the gender gap in wikipedia contributions (BC, JB), pp. 383–392.
- CSCW-2012-SolomonW #community #wiki
- Bootstrapping wikis: developing critical mass in a fledgling community by seeding content (JS, RW), pp. 261–264.
- HILT-2012-Nilsen #bibliography #comprehension #java #memory management #safety #tutorial
- Tutorial overview: understanding dynamic memory management in safety critical java (KN), pp. 15–22.
- ICEIS-v2-2012-CapelM #approach #automation #composition #correctness #model checking #safety #verification
- A Formal Compositional Verification Approach for Safety-Critical Systems Correctness — Model-Checking based Methodological Approach to Automatically Verify Safety Critical Systems Software (MIC, LEMM), pp. 105–112.
- ICML-2012-DegrisWS #linear
- Linear Off-Policy Actor-Critic (TD, MW, RSS), p. 28.
- ICPR-2012-Nagy #learning #web
- Learning the characteristics of critical cells from web tables (GN), pp. 1554–1557.
- SEKE-2012-SubburajUS #safety #specification
- Specification of Safety Critical Systems with Intelligent Software Agent Method (VHS, JEU, MRS), pp. 578–581.
- ECMFA-2012-GeP #framework #realtime #safety #uml #verification
- Time Properties Verification Framework for UML-MARTE Safety Critical Real-Time Systems (NG, MP), pp. 352–367.
- MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
- ICSE-2012-Steele #development
- Certification-based development of critical systems (PS), pp. 1575–1578.
- PLEASE-2012-SaratxagaAHEM #product line #variability
- Product line tool-chain: variability in critical systems (CLS, CAM, ØH, CE, AM), pp. 57–60.
- ECSA-2011-NakagawaAB #architecture #difference #product line
- Reference Architecture and Product Line Architecture: A Subtle But Critical Difference (EYN, POA, MB), pp. 207–211.
- CASE-2011-LemattreDFPS #analysis #architecture #design #reachability
- Designing operational control architectures of critical systems by reachability analysis (TL, BD, JMF, JFP, PS), pp. 12–18.
- CASE-2011-SaddemTT #embedded
- Diagnosis of critical embedded systems: application to the control card of a railway vehicle braking systems (RS, AT, MT), pp. 163–168.
- DATE-2011-EbrahimiMA #fault #named #safety
- ScTMR: A scan chain-based error recovery technique for TMR systems in safety-critical applications (ME, SGM, HA), pp. 298–292.
- DATE-2011-KapoorJ #design #embedded #power management #tutorial #verification
- Embedded tutorial: Addressing critical power management verification issues in low power designs (BK, KMJ), p. 124.
- DATE-2011-MeyerGCLS #cost analysis #execution #safety #using
- Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
- DATE-2011-TsukiyamaF #algorithm #analysis #statistics
- An algorithm to improve accuracy of criticality in statistical static timing analysis (ST, MF), pp. 1529–1532.
- ESOP-2011-Mine #c #embedded #fault #parallel #runtime #source code #static analysis
- Static Analysis of Run-Time Errors in Embedded Critical Parallel C Programs (AM), pp. 398–418.
- FASE-2011-ErmelGLT #behaviour #consistency #control flow #functional #modelling
- Modeling with Plausibility Checking: Inspecting Favorable and Critical Signs for Consistency between Control Flow and Functional Behavior (CE, JG, LL, GT), pp. 156–170.
- FM-2011-CavalcantiWW #formal method #java #memory management #safety
- The Safety-Critical Java Memory Model: A Formal Account (AC, AJW, JW), pp. 246–261.
- CHI-2011-Bargas-AvilaH #analysis #challenge #empirical #experience #novel #user interface
- Old wine in new bottles or novel challenges: a critical analysis of empirical studies of user experience (JABA, KH), pp. 2689–2698.
- CSCW-2011-SarcevicPB #coordination
- Coordinating time-critical work with role-tagging (AS, LP, RSB), pp. 465–474.
- HCI-UA-2011-MitchellGLA #validation #video
- Validating Video Analytics in Mission Critical Applications (SJM, SG, SL, BA), pp. 394–402.
- AdaEurope-2011-BaruahB #ada #implementation
- Implementing Mixed Criticality Systems in Ada (SKB, AB), pp. 174–188.
- AdaEurope-2011-Daniels #object-oriented
- Position Paper: DO-178C/ED-12C and Object-Orientation for Critical Systems (DD), pp. 211–213.
- AdaEurope-2011-Rosen #object-oriented
- Object Orientation in Critical Systems: Yes, in Moderation (JPR), pp. 214–218.
- SIGAda-2011-Rogers #safety
- Language choice for safety critical applications (JSR), pp. 81–90.
- CAiSE-2011-MohanA #comprehension #what
- What Methodology Attributes Are Critical for Potential Users? Understanding the Effect of Human Needs (KM, FA), pp. 314–328.
- EDOC-2011-UotiJKOG #collaboration #configuration management #process
- Project Alignment: A Configurable Model and Tool for Managing Critical Shared Processes in Collaborative Projects (MU, KJ, IK, MO, SG), pp. 87–96.
- ICEIS-v2-2011-YangJ #implementation #research #risk management
- Research on Critical Chain Management and Risk Management in Project Implementation Management (ZY, JJ), pp. 351–356.
- ICEIS-v4-2011-NgosiHCW #architecture #design #development #enterprise #network #process
- Design Science and Actor Network Theory Nexus — A Perspective of Content Development of a Critical Process for Enterprise Architecture Management (TN, MH, MC, EW), pp. 449–456.
- ICEIS-v4-2011-OndoaDS #case study #evaluation #industrial #process
- A Cross Industry Evaluation of Critical Success Factors for Alignment of Strategy and Business Processes — A Case Study of SMEs in the Region of Jönköping in Sweden (MNEO, FAD, US), pp. 338–347.
- ICML-2011-GabillonLGS #classification #policy
- Classification-based Policy Iteration with a Critic (VG, AL, MG, BS), pp. 1049–1056.
- MoDELS-2011-LettnerTM #bibliography #embedded #identification #migration #problem
- A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice (ML, MT, RM), pp. 228–242.
- POPL-2011-Leroy #question #tool support
- Verified squared: does critical software deserve verified tools? (XL), pp. 1–2.
- ASPLOS-2011-LiuPMZ #clustering #named
- Flikker: saving DRAM refresh-power through critical data partitioning (SL, KP, TM, BGZ), pp. 213–224.
- HPCA-2011-RobatmiliGBK #distributed
- Exploiting criticality to reduce bottlenecks in distributed uniprocessors (BR, MSSG, DB, SWK), pp. 431–442.
- ASE-2010-AliHGH #specification #tool support #visual notation
- End-user oriented critic specification for domain-specific visual language tools (NMA, JGH, JCG, JH), pp. 297–300.
- DATE-2010-LiuZYX #power management #pseudo #testing
- Layout-aware pseudo-functional testing for critical paths considering power supply noise effects (XL, YZ, FY, QX), pp. 1432–1437.
- DATE-2010-UbarDRJ #parallel #simulation
- Parallel X-fault simulation with critical path tracing technique (RU, SD, JR, AJ), pp. 879–884.
- DATE-2010-VazquezCTST #programmable #safety
- Programmable aging sensor for automotive safety-critical applications (JCV, VHC, ICT, MBS, JPT), pp. 618–621.
- PLDI-2010-NakaikeM #java
- Lock elision for read-only critical sections in Java (TN, MMM), pp. 269–278.
- IFM-2010-MarronePV #analysis #dependence #inheritance #multi
- Multiformalism and Transformation Inheritance for Dependability Analysis of Critical Systems (SM, CP, VV), pp. 215–228.
- CHI-2010-BaumerST
- America is like Metamucil: fostering critical and creative thinking about metaphor in political blogs (EPSB, JS, BT), pp. 1437–1446.
- CHI-2010-HornofZH #multimodal
- Knowing where and when to look in a time-critical multimodal dual task (AJH, YZ, TH), pp. 2103–2112.
- CSCW-2010-RabanMJ #community #empirical #online
- An empirical study of critical mass and online community survival (DRR, MM, QJ), pp. 71–80.
- ICPR-2010-LiP10a #analysis #classification #monitoring #realtime
- Human State Classification and Predication for Critical Care Monitoring by Real-Time Bio-signal Analysis (XL, FP), pp. 2460–2463.
- KDD-2010-ZhengSTLLCH #data mining #mining #network #using
- Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
- KDIR-2010-KaiserSB #approach #fuzzy #network #online #social
- Discovering Critical Situations in Online Social Networks — A Neuro Fuzzy Approach to Alert Marketing Managers (CK, SS, FB), pp. 56–64.
- SEKE-2010-AvilaSCY #comparison #constraints #ocl #runtime
- Runtime Constraint Checking Approaches for OCL, A Critical Comparison (CA, AS, YC, CY), pp. 393–398.
- RE-2010-HillT #legacy #requirements #safety #traceability
- Creating Safety Requirements Traceability for Assuring and Recertifying Legacy Safety-Critical Systems (JH, SRT), pp. 297–302.
- ICTSS-2010-Heitmeyer #approach #behaviour #modelling #testing
- A Model-Based Approach to Testing Software for Critical Behavior and Properties (CLH), p. 15.
- ISSTA-2010-CarbinR #automation #identification
- Automatically identifying critical input regions and code in applications (MC, MCR), pp. 37–48.
- RTA-2010-Mimram #2d #term rewriting
- Computing Critical Pairs in 2-Dimensional Rewriting Systems (SM), pp. 227–242.
- DATE-2009-BordeHP #architecture #component #configuration management
- Mode-based reconfiguration of critical software component architectures (EB, GH, LP), pp. 1160–1165.
- DATE-2009-LiWSDS #communication #latency
- Latency criticality aware on-chip communication (ZL, JW, LS, RPD, YS), pp. 1052–1057.
- ICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #safety #tool support #using
- Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
- CHI-2009-Bardzell #interactive
- Interaction criticism and aesthetics (JB), pp. 2357–2366.
- CHI-2009-BlytheC
- Critical methods and user generated content: the iPhone on YouTube (MB, PAC), pp. 1467–1476.
- DHM-2009-DzaackU #analysis #modelling #multi #performance #safety
- Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
- DHM-2009-PandithLD #evaluation #using
- The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
- HCD-2009-StaggersGBJ #design
- Clinical System Design Considerations for Critical Handoffs (NS, JWG, JWB, BMJ), pp. 1062–1069.
- HCI-VAD-2009-BuxtonTF #evaluation #heuristic #scalability #using
- Heuristic Evaluation of Mission-Critical Software Using a Large Team (TB, AT, ALF), pp. 673–682.
- OCSC-2009-IsaiasMP #framework #web
- Critical Success Factors for Web 2.0 — A Reference Framework (PTI, PM, SP), pp. 354–363.
- OCSC-2009-PhillipsGS #approach #behaviour #visualisation
- A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions (CLP, NDG, JTS), pp. 91–100.
- SIGAda-2009-Gardinier #ada #development #open source #safety
- Open source development of a safety critical dual redundant (Ada95/C++) signal control program environment (SCOPE) (MG), pp. 23–30.
- ICEIS-SAIC-2009-DronavajjalaNS #analysis #enterprise #identification #process #project management #relational
- Identification of Critical Success Factors to ERP Project Management — An Application of Grey Relational Analysis and Analytic Hierarchy Process (CSD, SN, RS), pp. 187–192.
- KMIS-2009-Kharabsheh
- Critical Success Factors of Technology Parks in Australia (RAK), pp. 103–111.
- SAC-2009-BreauxLOA #identification #requirements #using
- Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
- SAC-2009-KimmSHS #development #safety
- Failure management development for integrated automotive safety-critical software systems (HK, SYS, HsH, COS), pp. 517–521.
- ICSE-2009-DamasLRL #behaviour #modelling #process #synthesis
- Analyzing critical process models through behavior model synthesis (CD, BL, FR, AvL), pp. 441–451.
- ASPLOS-2009-SulemanMQP #architecture #execution #manycore #symmetry
- Accelerating critical section execution with asymmetric multi-core architectures (MAS, OM, MKQ, YNP), pp. 253–264.
- HPCA-2009-SubramaniamBWL #optimisation #performance
- Criticality-based optimizations for efficient load processing (SS, AB, HW, GHL), pp. 419–430.
- ICST-2009-Gotlieb #c #constraints #framework #named #source code #testing
- Euclide: A Constraint-Based Testing Framework for Critical C Programs (AG), pp. 151–160.
- ICST-2009-RogozF #multi #performance
- A Test Based Multidimensional Performance Model for a Mission Critical System Server (KR, KF), pp. 269–278.
- DAC-2008-WangLZTYTCN #scheduling
- Timing yield driven clock skew scheduling considering non-Gaussian distributions of critical path delays (YW, WSL, XZ, JT, CY, JT, WC, JN), pp. 223–226.
- DATE-2008-SterponeATG #design #fault tolerance #on the #safety
- On the design of tunable fault tolerant circuits on SRAM-based FPGAs for safety critical applications (LS, MAA, JNT, HGM), pp. 336–341.
- DATE-2008-XiongZV #incremental
- Incremental Criticality and Yield Gradients (JX, VZ, CV), pp. 1130–1135.
- SEFM-2008-TavaresSM #constraints #embedded #energy #scheduling
- An Environment for Measuring and Scheduling Time-Critical Embedded Systems with Energy Constraints (ET, BS, PRMM), pp. 291–300.
- GT-VMT-2006-LambersEO08 #detection #graph transformation #performance
- Efficient Conflict Detection in Graph Transformation Systems by Essential Critical Pairs (LL, HE, FO), pp. 17–26.
- CSCW-2008-Bietz #communication #feedback
- Effects of communication media on the interpretation of critical feedback (MJB), pp. 467–476.
- SIGAda-2008-Brosgol #assessment #named #safety
- MP1: languages for safety-critical software: issues and assessment (BMB), pp. 7–8.
- ICEIS-DISI-2008-TrienekensG #case study #enterprise
- Measuring Critical Success Factors in ERP Projects — Results from a Case Study in a SME (JJMT, PvG), pp. 203–209.
- ICEIS-HCI-2008-GuimaraesBM #modelling
- Communication-Based Modelling and Inspection in Critical Systems (MSG, MCCB, EM), pp. 215–220.
- ICEIS-ISAS1-2008-MoralesTPA #communication #composition #concept #model checking #verification
- A Conceptual Scheme for Compositional Model-Checking Verification of Critical Communicating Systems (LEMM, MICT, MAP, KBA), pp. 86–93.
- ICEIS-ISAS2-2008-MendezPMO #named
- ITO-Tracker — A Tool for Evaluating ITO Projects based on Critical Success Factors (EMM, MAP, LEM, MO), pp. 170–175.
- ICEIS-ISAS2-2008-MendezPMO08a #outsourcing
- Critical Success Factors to Evaluate Information Technology Outsourcing Projects (EMM, MAP, LEM, MO), pp. 176–181.
- ICEIS-ISAS2-2008-Nobre #design #social #why
- Why Heidegger? — Critical Insights for IS Design from Pragmatism and from Social Semiotics (ÂLN), pp. 435–441.
- ICEIS-J-2008-MoralesCPA #composition #model checking #verification
- Compositional Model-Checking Verification of Critical Systems (LEMM, MIC, MAP, KBA), pp. 213–225.
- CIKM-2008-BaiL #database
- A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems (KB, PL), pp. 1403–1404.
- ICPR-2008-ZhaoC #geometry
- Critical configurations of lines to geometry determination of three cameras (MZ, RCkC), pp. 1–5.
- SEKE-2008-AltahatET #analysis #detection #diagrams #graph transformation #interactive #uml
- Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
- SEKE-2008-ChangZIMT #agile #prototype
- Transformations for Rapid Prototyping of Time-critical Applications (SKC, ZZ, CJI, PM, VT), pp. 4–15.
- SEKE-2008-NakaoaTM #case study #independence #validation #verification
- Estimating the Effort of Independent Verification and Validation in the Context of Mission-critical Software Systems — A Case Study (HN, AT, JM), pp. 167–172.
- ICSE-2008-McCafferyPR #agile #assessment #hybrid #named #safety
- Ahaa — agile, hybrid assessment method for automotive, safety critical smes (FM, MP, IR), pp. 551–560.
- CGO-2008-SalverdakZ #predict #random
- Accurate critical path prediction via random trace construction (PS, CT, CBZ), pp. 64–73.
- RTA-2008-LafontR #case study #diagrams #matrix #orthogonal
- Diagram Rewriting for Orthogonal Matrices: A Study of Critical Peaks (YL, PR), pp. 232–245.
- DAC-2007-VenkataramaniBCG #analysis
- Global Critical Path: A Tool for System-Level Timing Analysis (GV, MB, TC, SCG), pp. 783–786.
- DAC-2007-WenMSKOS #effectiveness #reduction #testing
- Critical-Path-Aware X-Filling for Effective IR-Drop Reduction in At-Speed Scan Testing (XW, KM, TS, SK, YO, KKS), pp. 527–532.
- DATE-2007-0004XJ #analysis #novel #statistics
- A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
- DATE-2007-HairionECS #design #safety
- New safety critical radio altimeter for airbus and related design flow (DH, SE, EC, MS), pp. 684–688.
- DATE-2007-RosselloBBS #statistics #testing
- Dynamic critical resistance: a timing-based critical resistance model for statistical delay testing of nanometer ICs (JLR, CdB, SAB, JS), pp. 1271–1276.
- FASE-2007-ManneringHR #design #safety #towards
- Towards Normal Design for Safety-Critical Systems (DM, JGH, LR), pp. 398–411.
- STOC-2007-AndrewsJS #network #protocol #scheduling
- Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads (MA, KJ, ALS), pp. 145–154.
- HIMI-IIE-2007-Sanchez-PueblaAD #evaluation #interface #parametricity #predict #validation
- Validation of Critical Parameters for Predictive Evaluation of Notification System in Avionics Interfaces (MASP, IA, PD), pp. 1109–1118.
- AdaEurope-2007-BarbariaHP #component #design #distributed #performance
- Design and Performance of a Generic Consensus Component for Critical Distributed Applications (KB, JH, LP), pp. 208–220.
- SIGAda-2007-Brosgol #assessment #named #safety
- SA2: languages for safety-critical software: issues and assessment (BMB), p. 2.
- ICEIS-EIS-2007-FosterLHS #security
- A Change Strategy for Organisational Security: The Role of Critical Success Factors (SF, KL, PH, AS), pp. 375–380.
- ICEIS-HCI-2007-GuimaraesBM #challenge #interactive
- Interaction in Critical Systems: Conquests and Challenges (MSG, MCCB, EM), pp. 170–175.
- ICML-2007-GhavamzadehE #algorithm
- Bayesian actor-critic algorithms (MG, YE), pp. 297–304.
- MLDM-2007-SakaiIKH #clustering
- Critical Scale for Unsupervised Cluster Discovery (TS, AI, TK, SH), pp. 218–232.
- MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-ZoughbiBL #safety #uml
- A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software (GZ, LCB, YL), pp. 574–588.
- CGO-2007-DaiLH #execution #network #pipes and filters #using
- Pipelined Execution of Critical Sections Using Software-Controlled Caching in Network Processors (JD, LL, BH), pp. 312–324.
- PPoPP-2007-ZhangSZSG #concurrent
- Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections (YZ, VCS, WZ, VS, GRG), pp. 146–147.
- RTA-2007-HaemmerleF #confluence
- Abstract Critical Pairs and Confluence of Arbitrary Binary Relations (RH, FF), pp. 214–228.
- QoSA-2006-WuK #architecture #design #safety
- Managing Architectural Design Decisions for Safety-Critical Software Systems (WW, TK), pp. 59–77.
- DAC-2006-HsuRKPB #data flow #graph #performance #simulation
- Efficient simulation of critical synchronous dataflow graphs (CJH, SR, MYK, JLP, SSB), pp. 893–898.
- DAC-2006-HuLHL #network
- Steiner network construction for timing critical nets (SH, QL, JH, PL), pp. 379–384.
- DAC-2006-XiongZVV #statistics
- Criticality computation in parameterized statistical timing (JX, VZ, NV, CV), pp. 63–68.
- DATE-2006-IizukaIA #layout #optimisation
- Timing-driven cell layout de-compaction for yield optimization by critical area minimization (TI, MI, KA), pp. 884–889.
- ICSM-2006-StanekKNC #maintenance #online
- Online Software Maintenance for Mission-Critical Systems (JS, SK, TNN, CCN), pp. 93–103.
- WCRE-2006-CapiluppiMB #how #outsourcing #quality
- How Outsourcing Affects the Quality of Mission Critical Software (AC, JM, CB), pp. 285–287.
- SAS-2006-AllamigeonGH #c #embedded #source code #static analysis #string
- Static Analysis of String Manipulations in Critical Embedded C Programs (XA, WG, CH), pp. 35–51.
- DLT-2006-Krieger #fixpoint #morphism #on the
- On Critical Exponents in Fixed Points of Non-erasing Morphisms (DK), pp. 280–291.
- CHI-2006-Landgren
- Making action visible in time-critical work (JL), pp. 201–210.
- AdaEurope-2006-BrosgolW #ada #comparison #java #realtime #safety
- A Comparison of Ada and Real-Time JavaTM for Safety-Critical Applications (BMB, AJW), pp. 13–26.
- SIGAda-2006-SwardG #safety
- Developing safety critical software for an unmanned aerial vehicle situational awareness tool (RES, MG), pp. 45–50.
- ICSE-2006-NguyenBV #maintenance #outsourcing #trust
- Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
- DAC-2005-GuptaKKS #analysis
- Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions (PG, ABK, YK, DS), pp. 365–368.
- DAC-2005-YangCS #analysis
- Advanced timing analysis based on post-OPC extraction of critical dimensions (JY, LC, DS), pp. 359–364.
- DATE-2005-HeckmannF #abstract interpretation #embedded #safety
- erifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation (RH, CF), pp. 618–619.
- DATE-2005-Horsky #safety
- LC Oscillator Driver for Safety Critical Applications (PH), pp. 159–164.
- DATE-2005-JeffreyCPLRR #configuration management #integration #monitoring #online #safety #using
- The Integration of On-Line Monitoring and Reconfiguration Functions using IEEE1149.4 Into a Safety Critical Automotive Electronic Control Unit (CJ, RC, SP, ML, AR, SR), pp. 153–158.
- FM-2005-WassyngLH #safety
- Timing Tolerances in Safety-Critical Software (AW, ML, XH), pp. 157–172.
- AdaEurope-2005-AmeyCW #certification
- Smart Certification of Mixed Criticality Systems (PA, RC, NW), pp. 144–155.
- AdaEurope-2005-MasmanoRCR #ada
- Distributing Criticality Across Ada Partitions (MM, JR, AC, IR), pp. 196–207.
- AdaEurope-2005-Ruiz
- GNAT Pro for On-board Mission-Critical Space Applications (JFR), pp. 248–259.
- ICEIS-v1-2005-FaverioSB #enterprise #implementation #process #using
- Using Critical Success Factors for Assessing Critical Activities in ERP Implementation within SMEs (PF, DS, GB), pp. 285–292.
- ICEIS-v1-2005-NewellDLEC
- Critical Success Factors (SN, GCD, TAL, LFE, JGC), pp. 238–247.
- ICEIS-v1-2005-TrienekensKH #case study #enterprise #industrial
- Critical Success Factors in ERP Projects: Case Studies in Two Industrial Organizations in The Netherlands (JJMT, WK, RH), pp. 84–91.
- SEKE-2005-HsiungL #modelling #safety #verification
- Model-based Verification of Safety-Critical Systems (PAH, YHL), pp. 596–601.
- SAC-2005-JafariDBS #adaptation #fault tolerance #monitoring
- Adaptive and fault tolerant medical vest for life-critical medical monitoring (RJ, FD, PB, MS), pp. 272–279.
- ICSE-2005-BurmesterGHST #development #modelling #realtime #safety
- The fujaba real-time tool suite: model-driven development of safety-critical, real-time systems (SB, HG, MH, DS, MT), pp. 670–671.
- CBSE-2004-SandstromFA #component #embedded #realtime #safety
- Introducing a Component Technology for Safety Critical Embedded Real-Time Systems (KS, JF, MÅ), pp. 194–208.
- ICSM-2004-MantylaVL #smell
- Bad Smells — Humans as Code Critics (MM, JV, CL), pp. 399–408.
- STOC-2004-KortsarzN #algorithm #approximate #graph
- Approximation algorithm for k-node connected subgraphs via critical graphs (GK, ZN), pp. 138–145.
- AdaEurope-2004-GiriMJK #ada #approach #random #safety #testing
- A Randomised Test Approach to Testing Safety Critical Ada Code (SKG, AM, YVJ, KK), pp. 190–199.
- AdaEurope-2004-Heaney #named
- Shortcuts: A Critical Look (MH), pp. 309–320.
- SIGAda-2004-Davis #component #information management #lifecycle #security
- Information systems security engineering: a critical component of the systems engineering lifecycle (JFD), pp. 13–18.
- ICEIS-v1-2004-EstevesP #behaviour #enterprise #implementation
- Organizational and Technological Critical Success Factors Behavior Along the ERP Implementation Phases (JE, JAP), pp. 45–53.
- ICEIS-v3-2004-Nobre04a #what
- Computer Ethics: What are we Talking About? Possible Contributions from Philosophy of Action, Critical Realism and Modern Hermeneutics (ÂLN), pp. 683–687.
- ICEIS-v4-2004-CostaOS #identification
- E-Services in Mission-Critical Organizations: Identification Enforcement (CC, JLO, AS), pp. 389–396.
- ICEIS-v5-2004-ChenLK #assessment #perspective
- Assessment of E-Learning Satisfaction from Critical Incidents Perspective (NSC, KML, K), pp. 27–34.
- ICPR-v3-2004-ShiNGY #classification #learning
- Critical Vector Learning to Construct RBF Classifiers (DS, GSN, JG, DSY), pp. 359–362.
- TOOLS-USA-2003-Jurjens04 #component
- Componentware for Critical Systems (JJ), pp. 47–50.
- HPCA-2004-EhrhartP #predict #scheduling #using
- Reducing the Scheduling Critical Cycle Using Wakeup Prediction (TEE, SJP), pp. 222–231.
- ICSM-2003-SneedB #case study #maintenance
- Critical Success Factors in Software Maintenance — A Case Study (HMS, PB), pp. 190–198.
- PLDI-2003-BlanchetCCFMMMR #safety #scalability
- A static analyzer for large safety-critical software (BB, PC, RC, JF, LM, AM, DM, XR), pp. 196–207.
- FME-2003-Glesner
- Program Checking with Certificates: Separating Correctness-Critical Code (SG), pp. 758–777.
- AdaEurope-2003-JeppuKS #ada #realtime #safety #testing #using
- Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
- ICEIS-v1-2003-AmraniGRMB #enterprise #implementation
- ERP Implementation, Cross-Functionality and Critical Change Factors (REA, BGM, FR, RM, MB), pp. 600–619.
- KDD-2003-SahooORGMMVS #clustering #predict #scalability
- Critical event prediction for proactive management in large-scale computer clusters (RKS, AJO, IR, MG, JEM, SM, RV, AS), pp. 426–435.
- UML-2003-Jurjens #safety #uml
- Developing Safety-Critical Systems with UML (JJ), pp. 360–372.
- RE-2003-Romanski #configuration management #requirements #safety #traceability
- Requirements, Configuration Management and Traceability for Safety Critical Software (GR), p. 304.
- RE-2003-TuunanenR #elicitation #requirements
- Market Driven Requirements Elicitation via Critical Success Chains (TT, MR), pp. 367–368.
- SAC-2003-LeeLTY #identification
- Identify Amino Acid Candidates Critical for Function of Rat Imidase by Cross-reference Voting in Imidase SuperFamily (CL, YtL, CYT, YSY), pp. 127–134.
- ICSE-2003-LutzM #requirements #safety #testing
- Requirements Discovery during the Testing of Safety-Critical Software (RRL, ICM), pp. 578–585.
- TestCom-2003-ArnedoCN #performance #testing
- Fast Testing of Critical Properties through Passive Testing (JAA, ARC, MN), pp. 295–310.
- DAC-2002-SmithNMCFKMB #embedded #question #tool support
- Unified tools for SoC embedded systems: mission critical, mission impossible or mission irrelevant? (GS, DN, SM, RC, JF, KK, GM, BB), p. 479.
- DATE-2002-LuchettaMP #comparison #fault
- Critical Comparison among Some Analog Fault Diagnosis Procedures Based on Symbolic Techniques (AL, SM, MCP), p. 1105.
- DATE-2002-SauerEKJ #design #network
- The Fraunhofer Knowledge Network (FKN) for Training in Critical Design Disciplines (AS, GE, LK, WJ), p. 1129.
- ICSM-2002-Jungmayr #dependence #identification
- Identifying Test-Critical Dependencies (SJ), pp. 404–413.
- ICGT-2002-PadbergE #graph transformation #invariant #safety
- Rule Invariants in Graph Transformation Systems for Analyzing Safety-Critical Systems (JP, BE), pp. 334–350.
- Ada-2002-BlotzHLPSZ #ada #development #modelling #re-engineering #safety
- Model-Based Software Engineering and Ada: Synergy for the Development of Safety-Critical Systems (AB, FH, HL, AP, OS, HPZ), pp. 37–52.
- ICEIS-2002-EstevesP #enterprise #framework #implementation
- A Framework to Analyse Most Critical Work Packages in ERP Implementation Projects (JE, JAP), pp. 89–98.
- ICPR-v1-2002-WollnyTK #analysis #segmentation
- Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation (GW, MT, FK), pp. 524–527.
- SIGIR-2002-ManmathaFA #cost analysis
- A critical examination of TDT’s cost function (RM, AF, JA), pp. 403–404.
- RE-2002-AlvarezOP #quality #requirements #reuse
- Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection (JATÁ, AO, MP), pp. 95–103.
- SAC-2002-SujanRP #evolution
- Contradictions and critical issues during system evolution (MAS, AR, AP), pp. 711–715.
- ICSE-2002-Knight #challenge #safety
- Safety critical systems: challenges and directions (JCK), pp. 547–550.
- SPLC-2002-Wijnstra #approach #product line
- Critical Factors for a Successful Platform-Based Product Family Approach (JGW), pp. 68–89.
- DAC-2001-LiuCBK #constraints #embedded #power management #scheduling
- Power-Aware Scheduling under Timing Constraints for Mission-Critical Embedded Systems (JL, PHC, NB, FJK), pp. 840–845.
- DAC-2001-XiaoM #analysis #correlation #functional #identification
- Functional Correlation Analysis in Crosstalk Induced Critical Paths Identification (TX, MMS), pp. 653–656.
- ICSM-2001-ZelkowitzR #independence #maintenance #safety #validation #verification
- The Role of Independent Verification and Validation in Maintaining a Safety Critical Evolutionary Software in a Complex Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 118–126.
- AdaEurope-2001-Amey #logic
- Logic versus Magic in Critical Systems (PA), pp. 49–67.
- AdaEurope-2001-FoulgerK #fault #runtime #safety #tool support #using
- Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software (DF, SK), pp. 229–240.
- ICEIS-v1-2001-EstevesP #enterprise #implementation #process
- Establishing the Importance of ERP Implementation — Critical Success Factors along ASAP Methodology Processes (JE, JAP), pp. 182–187.
- RE-2001-LutzM #evolution #requirements #safety
- Evolution of Safety-Critical Requirements Post-Launch (RRL, ICM), pp. 222–227.
- RE-2001-Traore #development
- An Integrated V&V Environment for Critical Systems Development (IT), p. 287.
- ESEC-FSE-2001-Coen-PorisiniDGP #execution #safety #symbolic computation #using #verification
- Using symbolic execution for verifying safety-critical systems (ACP, GD, CG, MP), pp. 142–151.
- ICSE-2001-Abrahamsson #concept #development #process
- Commitment Development in Software Process Improvement: Critical Misconceptions (PA), pp. 71–80.
- ICSE-2001-ZelkowitzR #comprehension #safety
- Understanding IV & V in a Safety Critical and Complex Evolutionary Environment: The NASA Space Shuttle Program (MVZ, IR), pp. 349–357.
- HPCA-2001-TuneLTC #predict
- Dynamic Prediction of Critical Path Instructions (ET, DL, DMT, BC), pp. 185–195.
- SAT-2001-Roll #parallel
- Criticality and Parallelism in GSAT (AR), pp. 150–161.
- ASE-2000-HillL #analysis
- Non-Interference Analysis for Mixed Criticality Code in Avionics Systems (MGH, TWL), pp. 257–260.
- ASE-2000-OHalloran #automation #generative #safety
- Issues for the Automatic Generation of Safety Critical Software (CO), pp. 277–280.
- ASE-2000-SouzaFGW #analysis #design #object-oriented
- A Group Critic System for Object-Oriented Analysis and Design (CRBdS, JSFJ, KMG, JW), pp. 313–316.
- DAC-2000-Hassoun #analysis #bound #using
- Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
- DAC-2000-MeguerdichianP
- Watermarking while preserving the critical path (SM, MP), pp. 108–111.
- DATE-2000-BouraiS #layout #optimisation
- Layout Compaction for Yield Optimization via Critical Area Minimization (YB, CJRS), pp. 122–125.
- FASE-2000-Suhl #safety
- Applying RT-Z to Develop Safety-Critical Systems (CS), pp. 51–65.
- TACAS-2000-GnesiLLAAM #fault #specification #validation
- A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors (SG, DL, GL, CA, AMA, PM), pp. 535–549.
- TOOLS-USA-2000-Dedene00a #cobol #object-oriented #standard
- Critical Issues in the Proposed ISO Object-Oriented COBOL 2002 Standard (GD), pp. 491–500.
- TOOLS-USA-2000-LewisCV #embedded #evolution
- Developing Evolvable, Embedded, Time-Critical Systems with MetaH (BAL, EC, SV), pp. 447–456.
- ICRE-2000-Neumann #risk management
- Requirements-Related Risks in Critical Systems (PGN), p. 3–?.
- CADE-2000-JacksonL #interactive #proving
- System Description: Interactive Proof Critics in XBarnacle (MJ, HL), pp. 502–506.
- ASE-1999-WhalenH #approach #automation #code generation #safety
- An Approach to Automatic Code Generation for Safety-Critical Systems (MWW, MPEH), pp. 315–318.
- SIGMOD-1999-BaulierBGGHJKKMMNNRSSSWW #database #in memory #memory management #performance
- DataBlitz Storage Manager: Main Memory Database Performance for Critical Applications (JB, PB, SG, CG, SH, SJ, AK, HFK, PM, JM, PPSN, MN, RR, SS, AS, SS, MW, CW), pp. 519–520.
- CHI-1999-JackoDRSP #component #visual notation
- Visual Profiles: A Critical Component of Universal Access (JAJ, MAD, RHRJ, IUS, CJP), pp. 330–337.
- HCI-CCAD-1999-Maurer #web
- A critical look at web based training efforts (HAM), pp. 718–724.
- HCI-EI-1999-Boy #safety
- About the Role of Intelligent Assistants in the Control of Safety-Critical Systems (GAB), pp. 321–325.
- AdaEurope-1999-ChapmanD #safety #using
- Re-engeneering a Safety-Critical Application Using SPARK 95 and GNORT (RC, RD), pp. 39–51.
- AdaEurope-1999-Frost #ada #certification #embedded #safety
- An Ada95 Solution for Certification of Embedded Safety Critical Applications (JF), pp. 52–63.
- SIGAda-1999-Carpenter #requirements #verification
- Verification of requirements for saftey-critical software (PBC), pp. 23–29.
- SIGAda-1999-Colket #analysis #realtime #using
- Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
- ICEIS-1999-Gide
- Critical Success Factors for Manufacturing Management Through Team Building (EG), p. 786.
- ICEIS-1999-Whymark #requirements #using
- Using Criticality as a Basis for Determining Information Requirements for an EIS (GKW), pp. 542–549.
- TOOLS-EUROPE-1999-MayerH #analysis #metric #object-oriented
- Measuring OO Systems: A Critical Analysis of the MOOD Metrics (TM, TH), pp. 108–117.
- TOOLS-USA-1999-Parnas99a
- Systematic Techniques for Inspecting Critical Software (DLP), p. 410.
- TOOLS-USA-1999-Romanski #development #safety #verification
- The Development and Verification of Safety Critical Software (GR), p. 411.
- SAC-1999-LauberSW #assurance #online #probability #quality #safety
- Applied Probabilistic AI for Online Diagnosis of a Safety-Critical System Based on a Quality Assurance Program (JL, CS, RW), pp. 25–30.
- ICSE-1999-Easterbrook #requirements #validation #verification
- Verification and Validation of Requirements for Mission Critical Systems (SME), pp. 673–674.
- FASE-1998-BerregebBR #proving
- Observational Proofs with Critical Contexts (NB, AB, MR), pp. 38–53.
- FASE-1998-BussowGK #case study #embedded #safety #specification
- Specifying Safety-Critical Embedded Systems with Statecharts and Z: A Case Study (RB, RG, MK), pp. 71–87.
- CSMR-1998-ZedanY #approach #re-engineering
- A Sound and Practical Approach To The Re-Engineering Of Time-Critical Systems (HZ, HY), pp. 220–223.
- FM-1998-GoldsmithZ #csp #validation #verification
- Critical Systems Validation and Verification with CSP and FDR (MG, IZ), pp. 243–250.
- CHI-1998-Boy #analysis #automation #safety
- Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
- AdaEurope-1998-Chapront #ada #development #safety
- Ada+B The Formula for Safety Critical Software Development (PC), pp. 13–18.
- ICML-1998-KimuraK #algorithm #analysis #learning #using
- An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
- RTA-1998-Okui
- Simultaneous Critical Pairs and Church-Rosser Property (SO), pp. 2–16.
- VLDB-1997-MalonM #database #energy #physics
- Critical Database Technologies for High Energy Physics (DMM, ENM), pp. 580–584.
- STOC-1997-PhillipsSTW #scheduling
- Optimal Time-Critical Scheduling via Resource Augmentation (Extended Abstract) (CAP, CS, ET, JW), pp. 140–149.
- FME-1997-DevauchelleLV #named #specification
- PICGAL: Practical Use of Formal Specification to Develop a Complex Critical System (LD, PGL, HV), pp. 221–236.
- HCI-CC-1997-BiksonECM #knowledge-based #process
- Knowledge-Based Teams: Technology, Reinvention and Critical Process Redesign (TKB, JDE, SC, DM), pp. 205–208.
- HCI-CC-1997-CarstensenN #towards
- Towards Computer Support for Cooperation in Time-Critical Work Settings (PHC, MN), pp. 101–104.
- ACIR-1997-StewartD #bibliography #perspective #profiling
- User Profiling Techniques: A Critical Review (SS, JD).
- UML-1997-BergnerRS #uml
- A Critical Look upon UML 1.0 (KB, AR, MS), pp. 79–92.
- TOOLS-USA-1997-Riehle97a #safety
- Object Technology for Safety-Critical Applications (RR), p. 376.
- ESEC-FSE-1997-AlborghettiGM #analysis #automation #deduction
- Providing Automated Support to Deductive Analysis of Time Critical Systems (AA, AG, AM), pp. 211–226.
- ESEC-FSE-1997-Ebert #case study #development #experience #predict
- Experiences with Criticality Predictions in Software Development (CE), pp. 278–293.
- ICSE-1997-PodorizhnyO #case study #comparison #design #experience #modelling
- The Criticality of Modeling Formalisms in Software Design Method Comparison: Experience Report (RMP, LJO), pp. 303–313.
- CADE-1997-DennisBG #bisimulation #induction #proving #using
- Using A Generalisation Critic to Find Bisimulations for Coinductive Proofs (LAD, AB, IG), pp. 276–290.
- CAV-1997-CimattiGPPPRTY #certification #embedded #safety #verification
- A Provably Correct Embedded Verifier for the Certification of Safety Critical Software (AC, FG, PP, BP, JP, DR, PT, BY), pp. 202–213.
- DAC-1996-DesaiY #cpu #design #simulation #using #verification
- A Systematic Technique for Verifying Critical Path Delays in a 300MHz Alpha CPU Design Using Circuit Simulation (MPD, YTY), pp. 125–130.
- WPC-1996-Bull #comprehension #domain-specific language #safety #using
- Comprehension of Safety-Critical Systems Using Domain-Specific Languages (TB), pp. 108–122.
- FME-1996-Peleska #automation #industrial #safety #testing
- Test Automation for Safety-Critical Systems: Industrial Application and Future Developments (JP), pp. 39–59.
- FME-1996-Weber #design #safety
- Combining Statecharts and Z for the Design of Safety-Critical Control Systems (MW), pp. 307–326.
- AdaEurope-1996-CraigenSM #ada #approach
- Ada 95 and Critical Systems: An Analytical Approach (DC, MS, SM), pp. 171–182.
- AdaEurope-1996-Rosskopf #ada #assessment #safety #static analysis
- Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
- AdaEurope-1996-Schneidewind #modelling #reliability #safety
- Reliability Modeling for Safety Critical Software (NFS), pp. 17–37.
- TRI-Ada-1996-MeyerR #design #embedded #safety
- Design and Test Strategies for a Safety-Critical Embedded Executive (CAM, MGR), pp. 29–37.
- CADE-1996-IrelandB #induction #proving
- Extensions to a Generalization Critic for Inductive Proof (AI, AB), pp. 47–61.
- ISSTA-1996-DeMilloPS #fault #locality #slicing
- Critical Slicing for Software Fault Localization (RAD, HP, EHS), pp. 121–134.
- ISSTA-1996-MorascaMP #functional #generative #in the large #specification #testing
- Generating Functional Test Cases in-the-large for Time-critical Systems from Logic-based Specifications (SM, AM, PSP), pp. 39–52.
- ICSM-1995-BullYBL #named #reverse engineering #safety
- Bylands: reverse engineering safety-critical systems (TMB, EJY, KHB, ZL), pp. 358–366.
- CHI-1995-MalinowskiN #collaboration #design #user interface #using
- Using Computational Critics to Facilitate Long-Term Collaboration in User Interface Design (UM, KN), pp. 385–392.
- AdaEurope-1995-Richard-Foy #ada #safety
- Safe Ada Executive: An Executive for Ada Safety Critical Applications (MRF), pp. 11–20.
- IWMM-1995-WilsonJNB #bibliography #perspective
- Dynamic Storage Allocation: A Survey and Critical Review (PRW, MSJ, MN, DB), pp. 1–116.
- CAV-1995-EirikssonM #analysis #case study #design #using #verification
- Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
- EDAC-1994-BrasenS #clustering
- FPGA Partitioning for Critical Paths (DRB, GS), pp. 99–103.
- KBSE-1994-BoehmB #knowledge-based #re-engineering
- Critical Success Factors for Knowledge-Based Software Engineering Applications (BWB, PKB), pp. 166–171.
- FME-1994-Collinson #functional #specification
- A Critical Look at Functional Specifications (RC), pp. 381–400.
- CHI-1994-Koenemann-BelliveauCRS94a #comparative #evaluation #thread #usability
- Comparative usability evaluation: critical incidents and critical threads (JKB, JMC, MBR, MKS), pp. 245–251.
- SEKE-1994-WillisP #reuse #safety #specification
- Specification reuse for safety-critical software (CPW, DJP), pp. 516–523.
- TOOLS-EUROPE-1994-Wiener94a #c++ #comparison #eiffel
- A Critical Comparison of C++ and Eiffel — A Clash of Cultures (RW), p. 541.
- ICSE-1994-Boehm #architecture
- Software Architectures: Critical Success Factors and Cost Drivers (BWB), p. 365.
- CADE-1994-Bundgen #how #on the
- On Pot, Pans and Pudding or How to Discover Generalised Critical Pairs (RB), pp. 693–707.
- CADE-1994-Walsh
- A Divergence Critic (TW), pp. 14–28.
- ISSTA-1994-KnightCFW #safety #testing
- Testing a Safety-Critical Application (JCK, AGC, AMF, KGW), p. 199.
- DAC-1993-BoeseKR
- High-Performance Routing Trees With Identified Critical Sinks (KDB, ABK, GR), pp. 182–187.
- DAC-1993-ChuML #finite #performance #state machine
- An Efficient Critical Race-Free State Assignment Technique for Asynchronous Finite State Machines (TAC, NM, CKCL), pp. 2–6.
- DAC-1993-IqbalPDP #algebra #using
- Critical Path Minimization Using Retiming and Algebraic Speed-Up (ZI, MP, SD, ACP), pp. 573–577.
- DAC-1993-JoneF #identification #optimisation
- Timing Optimization By Gate Resizing And Critical Path Identification (WBJ, CLF), pp. 135–140.
- FME-1993-BowenS #formal method #industrial #perspective #safety
- The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective (JPB, VS), pp. 183–195.
- FME-1993-Jacky #safety #specification
- Specifying a Safety-Critical Control System in Z (JJ), pp. 388–402.
- HCI-SHI-1993-Warren #approach #development #modelling #realtime #safety #tool support
- The TOM Approach to System Development: Methods and Tools for Task Oriented Modelling of Real-Time Safety Critical Systems (CW), pp. 285–290.
- INTERCHI-1993-Byrne #documentation #using
- Using icons to find documents: simplicity is critical (MDB), pp. 446–453.
- INTERCHI-1993-FischerNOSS #design
- Embedding computer-based critics in the contexts of design (GF, KN, JLO, GS, TS), pp. 157–164.
- AdaEurope-1993-BrygierR #ada #certification #realtime #safety
- Certification of Ada Real-Time Executives for Safety Critical Applications (JB, MRF), pp. 264–279.
- SEKE-1993-Berztiss #safety
- Catastrophe Prevention in Safety-Critical Systems (ATB), pp. 102–108.
- TOOLS-USA-1993-Wiener #eiffel #object-oriented #smalltalk
- Comparing OOP Languages — A Critical Look at C++, Smalltalk, and Eiffel (RW), p. 526.
- RE-1993-Lutz #embedded #fault #requirements #safety
- Analyzing software requirements errors in safety-critical, embedded systems (RRL), pp. 126–133.
- ICSE-1993-CourtoisP #documentation #safety
- Documentation for Safety Critical Software (PJC, DLP), pp. 315–323.
- CAV-1993-ProbstL #automaton #behaviour #verification
- Verifying Timed Behavior Automata with Input/Output Critical Races (DKP, HFL), pp. 424–437.
- TRI-Ada-C-1992-HummerB #ada #design #hardware #safety
- When Hardware Becomes Software: Designing a Safety-Critical System with Ada (JH, LB), pp. 538–544.
- TRI-Ada-C-1992-McHugh #ada #safety
- Ada 9X and Safety Critical/Secure Systems (JM), pp. 55–59.
- CAV-1992-Bruns #case study #design #safety
- A Case Study in Safety-Critical Design (GB), pp. 220–233.
- DAC-1991-ChenDL #optimisation #performance
- Critical Path Selection for Performance Optimization (HCC, DHCD, LRL), pp. 547–550.
- DAC-1991-JuS #identification #incremental
- Incremental Techniques for the Identification of Statically Sensitizable Critical Paths (YCJ, RAS), pp. 541–546.
- DAC-1991-LiuDC #algorithm #parallel #performance
- An Efficient Parallel Critical Path Algorithm (LRL, DHCD, HCC), pp. 535–540.
- DAC-1991-SutanthavibulS #predict
- Dynamic Prediction of Critical Paths and Nets for Constructive Timing-Driven Placement (SS, ES), pp. 632–635.
- AdaEurope-1991-Welz #ada #safety
- Ada in Safety Critical Applications (AW), pp. 193–198.
- LICS-1991-Nipkow #higher-order
- Higher-Order Critical Pairs (TN), pp. 342–349.
- DAC-1990-RamakrishnanK #algorithm
- Extension of the Critical Path Tracing Algorithm (TR, LK), pp. 720–723.
- CHI-1990-FischerLMM #using
- Using critics to empower users (GF, ACL, TWM, AIM), pp. 337–347.
- POPL-1990-PalemS #scheduling
- Scheduling Time-Critical Instructions on RISC Machines (KVP, BBS), pp. 270–280.
- ICSE-1990-Laprie #assessment #on the #safety
- On the Assessment of Safety-Critical Software Systems (JCL), p. 222.
- ICSE-1990-Pilaud #case study #development #experience
- Some Experiences of Critical Software Development (EP), pp. 225–226.
- ICSE-1990-Thomas #safety
- Assessing Failure Probabilities in Safety-Critical Systems Containing Software (MT), p. 227.
- DAC-1989-YenDG #algorithm #analysis #performance
- Efficient Algorithms for Extracting the K most Critical Paths in Timing Analysis (SHY, DHCD, SG), pp. 649–654.
- KR-1989-EtheringtonFGIL #reasoning
- Critical Issues in Nonmonotonic Reasoning (DWE, KDF, MLG, DJI, VL), pp. 500–504.
- OOPSLA-1989-Paepcke #bibliography #named #perspective
- PCLOS: A Critical Review (AP), pp. 221–237.
- ICSE-1989-VernerTJH #analysis #bibliography #case study #dependence #perspective
- Technology Dependence in Function Point Analysis: A Case Study and Critical Review (JMV, GT, BJ, RGH), pp. 375–382.
- ICALP-1987-CaiM #complexity #graph #on the
- On the Complexity of Graph Critical Uncolorability (JyC, GEM), pp. 394–403.
- ESEC-1987-Laprie #approach #dependence
- The Dependability Approach to Critical Computing Systems (JCL), pp. 233–243.
- RTA-1985-Buchberger #development
- Basic Features and Development of the Critical-Pair/Completion Procedure (BB), pp. 1–45.
- DAC-1984-DunlopADJKW #layout #optimisation #using
- Chip layout optimization using critical path weighting (AED, VDA, DND, MFJ, PK, MW), pp. 133–136.
- DAC-1983-AbramoviciMM #fault #simulation
- Critical path tracing — an alternative to fault simulation (MA, PRM, DTM), pp. 214–220.
- ICSE-1982-HamerF
- M. H. Halstead’s Software Science — A Critical Examination (PGH, GDF), pp. 197–207.
- DAC-1981-KamikawaiYCFT
- A critical path delay check system (RK, MY, TC, KF, YT), pp. 118–123.
- STOC-1980-Lloyd #constraints #scheduling
- Critical Path Scheduling of Task Systems with Resource and Processor Constraints (Extended Abstract) (ELL), pp. 436–446.
- ICSE-1979-RamamoorthyBFMNS #approach #development #on the #validation
- On A Systematic Approach to the Development and Validation of Critical Software for Nuclear Power Plants (CVR, FBB, JMF, YKRM, CWN, KS), pp. 231–240.
- STOC-1978-Katseff #problem
- A New Solution to the Critical Section Problem (HPK), pp. 86–88.
- STOC-1977-PetersonF #distributed #problem
- Economical Solutions for the Critical Section Problem in a Distributed System (Extended Abstract) (GLP, MJF), pp. 91–97.
- ICSE-1976-Browne #bibliography #evaluation #performance
- A Critical Overview of Computer Performance Evaluation (JCB), pp. 138–145.
- DAC-1974-RosenbergB #design #named
- CRITIC — an integrated circuit design rule checking program (LMR, CB), pp. 14–18.