default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2004
- Alessandro Aldini, Marco Bernardo:
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth. SAFECOMP 2004: 283-296 - James M. Armstrong, Stephen Paynter:
The Deconstruction of Safety Arguments Through Adversarial Counter-Argument. SAFECOMP 2004: 3-16 - Richard Banach, R. Cross:
Safety Requirements and Fault Trees Using Retrenchment. SAFECOMP 2004: 210-223 - J. G. W. Bentley, Peter G. Bishop, Meine van der Meulen:
An Empirical Exploration of the Difficulty Function. SAFECOMP 2004: 60-71 - Bettina Buth:
Analysing Mode Confusion: An Approach Using FDR2. SAFECOMP 2004: 101-114 - Michael Cebulla:
Modeling Concepts for Safety-Related Requirements in Sociotechnical Systems. SAFECOMP 2004: 87-100 - Ester Ciancamerla, Michele Minichino:
Performability Measures of the Public Mobile Network of a Tele Control System. SAFECOMP 2004: 142-154 - E. Dillon, Christophe Meudec:
Automatic Test Data Generation from Embedded C Code. SAFECOMP 2004: 180-194 - João Durães, Marco Vieira, Henrique Madeira:
Dependability Benchmarking of Web-Servers. SAFECOMP 2004: 297-310 - Lars-Henrik Eriksson:
Using Formal Methods in a Retrospective Safety Case. SAFECOMP 2004: 31-44 - D. Essame:
Handling Safety Critical Requirements in System Engineering Using the B Formal Method . SAFECOMP 2004: 115 - Holger Giese, Matthias Tichy, Daniela Schilling:
Compositional Hazard Analysis of UML Component and Deployment Models. SAFECOMP 2004: 166-179 - Bjørn Axel Gran, Rune Fredriksen, Atoosa P.-J. Thunem:
An Approach for Model-Based Risk Assessment. SAFECOMP 2004: 311-324 - Ralf Guido Herrtwich:
Automotive Telematics - Road Safety Versus IT Security? SAFECOMP 2004: 239 - Per Johannessen, Fredrik Törner, Jan Torin:
Actuator Based Hazard Analysis for Safety Critical Systems. SAFECOMP 2004: 130-141 - Bernhard Kaiser, Catharina Gramlich:
State-Event-Fault-Trees - A Safety Analysis Model for Software Controlled Systems. SAFECOMP 2004: 195-209 - Zeshan Kurd, Tim Kelly:
Using Fuzzy Self-Organising Maps for Safety Critical Systems. SAFECOMP 2004: 17-30 - Linas Laibinis, Elena Troubitsyna:
Refinement of Fault Tolerant Control Systems in B. SAFECOMP 2004: 254-268 - Giuseppe De Nicola, Pasquale di Tommaso, Rosaria Esposito, Francesco Flammini, Antonio Orazzo:
A Hybrid Testing Methodology for Railway Control Systems. SAFECOMP 2004: 116-129 - Holger Pfeifer, Friedrich W. von Henke:
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture. SAFECOMP 2004: 240-253 - Andreas Pfitzmann:
Why Safety and Security Should and Will Merge. SAFECOMP 2004: 1-2 - D. Rehage, Udo B. Carl, M. Merkel, A. Vahl:
The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics. SAFECOMP 2004: 224-238 - Titos Saridakis:
Towards the Integration of Fault, Resource, and Power Management. SAFECOMP 2004: 72-86 - Shamus P. Smith, Michael D. Harrison, Bastiaan A. Schupp:
How Explicit Are the Barriers to Failure in Safety Arguments? SAFECOMP 2004: 325-338 - Michael Vollmer:
Numerical Integration of PDEs for Safety Critical Applications Implemented by I&C Systems. SAFECOMP 2004: 269-282 - Junbeom Yoo, Sung Deok Cha, Han Seong Son, Chang Hwoi Kim, Jang-Soo Lee:
PLC-Based Safety Critical Software Development for Nuclear Power Plants. SAFECOMP 2004: 155-165 - Hamid R. Zarandi, Seyed Ghassem Miremadi:
A Highly Fault Detectable Cache Architecture for Dependable Computing. SAFECOMP 2004: 45-59 - Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann:
Computer Safety, Reliability, and Security, 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24, 2004, Proceedings. Lecture Notes in Computer Science 3219, Springer 2004, ISBN 3-540-23176-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 03:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint