The SCEAS System
Navigation Menu

Conferences in DBLP

High-Assurance Systems (HASE) (hase)
2007 (conf/hase/2007)


  1. TRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing Base. [Citation Graph (, )][DBLP]


  2. Goal-Oriented Patterns for UML-Based Modeling of Embedded Systems Requirements. [Citation Graph (, )][DBLP]


  3. Integrating Product-Line Fault Tree Analysis into AADL Models. [Citation Graph (, )][DBLP]


  4. Arguing safety with Problem Oriented Software Engineering. [Citation Graph (, )][DBLP]


  5. CROWN-C: A High-Assurance Service-Oriented Grid Middleware System. [Citation Graph (, )][DBLP]


  6. Systems Architectures for Transactional Network Interface. [Citation Graph (, )][DBLP]


  7. An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms. [Citation Graph (, )][DBLP]


  8. A Typed Compositional Language for Real-Time Systems. [Citation Graph (, )][DBLP]


  9. One in a Baker's Dozen: Debugging Debugging. [Citation Graph (, )][DBLP]


  10. Delegation-Based Security Model for Web Services. [Citation Graph (, )][DBLP]


  11. Model Validation using Automatically Generated Requirements-Based Tests. [Citation Graph (, )][DBLP]


  12. A Coverage Relationship Model for Test Case Selection and Ranking for Multi-version Software. [Citation Graph (, )][DBLP]


  13. Enhanced Traverse of Web Pages. [Citation Graph (, )][DBLP]


  14. How can Previous Component Use Contribute to Assessing the Use of COTS? [Citation Graph (, )][DBLP]


  15. Placement in Dependable and Secure Peer-to-Peer Data Grids. [Citation Graph (, )][DBLP]


  16. Vulnerability Discovery in Multi-Version Software Systems. [Citation Graph (, )][DBLP]


  17. Testing Security Rules with Decomposable Activities. [Citation Graph (, )][DBLP]


  18. Flexible Authorization with Decentralized Access Control Model for Grid Computing. [Citation Graph (, )][DBLP]


  19. Sustaining Property Verification of Synchronous Dependable Protocols Over Implementation. [Citation Graph (, )][DBLP]


  20. Scalable, Adaptive, Time-Bounded Node Failure Detection. [Citation Graph (, )][DBLP]


  21. SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths. [Citation Graph (, )][DBLP]


  22. Behavioral Fault Modeling for Model-based Safety Analysis. [Citation Graph (, )][DBLP]


  23. Transformation-Based Library Adaptation for Embedded Systems. [Citation Graph (, )][DBLP]


  24. Multi-layered Data Consistency Technology, An Enhanced Autonomous Decentralized Data Consistency Technology for IC Card Ticket System. [Citation Graph (, )][DBLP]


  25. Model Transformation for High-Integrity Software Development in Derivative Vehicle Control System Design. [Citation Graph (, )][DBLP]


  26. Precise Documentation of Critical Software. [Citation Graph (, )][DBLP]


  27. Combining Software Quality Analysis with Dynamic Event/Fault Trees for High Assurance Systems Engineering. [Citation Graph (, )][DBLP]


  28. On the Verifiability of Programs Written in the Feature Language Extensions. [Citation Graph (, )][DBLP]


  29. Improving Reliability and Safety by Trading off Software Failure Criticalities. [Citation Graph (, )][DBLP]


  30. Pattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UML. [Citation Graph (, )][DBLP]


  31. A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. [Citation Graph (, )][DBLP]


  32. A New Architecture for Single-Event Detection & Reconfiguration of SRAM-based FPGAs. [Citation Graph (, )][DBLP]


  33. On Exceptions, Exception Handling, Requirements and Software Lifecycle. [Citation Graph (, )][DBLP]


  34. Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interdependencies. [Citation Graph (, )][DBLP]


  35. Empirical Study of Embedded Software Quality and Productivity. [Citation Graph (, )][DBLP]


  36. Availability Monitor for a Software Based System. [Citation Graph (, )][DBLP]


  37. Validation Support for Distributed Real-Time Embedded Systems in VDM++. [Citation Graph (, )][DBLP]


  38. Verification of Automatically Generated Pattern-Based LTL Specifications. [Citation Graph (, )][DBLP]


  39. Utilizing Test Case Generation to Inspect Formal Specifications for Completeness and Feasibility. [Citation Graph (, )][DBLP]


  40. Multiple Pre/Post Specifications for Heap-Manipulating Methods. [Citation Graph (, )][DBLP]


  41. A Fault Taxonomy for Service-Oriented Architecture. [Citation Graph (, )][DBLP]


  42. Advances in Quantum Computing Fault Tolerance and Testing. [Citation Graph (, )][DBLP]


  43. Preliminary Models of the Cost of Fault Tolerance. [Citation Graph (, )][DBLP]


  44. Adding Autonomic Capabilities to Network Fault Management System. [Citation Graph (, )][DBLP]


  45. Information Assurance Architecture with Storyboarding Models. [Citation Graph (, )][DBLP]


  46. Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. [Citation Graph (, )][DBLP]


  47. Towards a High Assurance Secure Computing Platform. [Citation Graph (, )][DBLP]


  48. High-Assurance Distributed, Adaptive Software for Dynamic Systems. [Citation Graph (, )][DBLP]


  49. Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures. [Citation Graph (, )][DBLP]


  50. A Mobile Agent-based Multi-Robot Design Method for High-Assurance. [Citation Graph (, )][DBLP]


  51. Building High Assurance Multidisciplinary Design Optimization Framework. [Citation Graph (, )][DBLP]


  52. Analytic Model for Web Anomalies Classification. [Citation Graph (, )][DBLP]


  53. Development of Custom Selling System Using Ad Hoc Networks. [Citation Graph (, )][DBLP]


  54. Research on Noise Problem of Reputation Estimation in Virtual Enterprise. [Citation Graph (, )][DBLP]


  55. Measuring Reliability as a Mean Failure Cost. [Citation Graph (, )][DBLP]


  56. An Early-Reply Based Framework: Reliable Concurrency that Is Verifiable. [Citation Graph (, )][DBLP]


  57. A Safety Analysis Framework for COTS Microprocessors in Safety-Critical Applications. [Citation Graph (, )][DBLP]


  58. Automated Test Data Generation and Reliability Assessment for Software in High Assurance Systems. [Citation Graph (, )][DBLP]


  59. Parsimonious Classifiers for Software Quality Assessment. [Citation Graph (, )][DBLP]


  60. Methodology for Evaluating Aeronautical Regulations using Formal Specifications. [Citation Graph (, )][DBLP]


  61. Model-Checker-Based Testing of LTL Specifications. [Citation Graph (, )][DBLP]


  62. A Formal Approach to Website Maintenance. [Citation Graph (, )][DBLP]


  63. A Secure and Scalable Update Protocol for P2P Data Grids. [Citation Graph (, )][DBLP]


  64. Design of a Fairness Guarantee Mechanism Based on Network Measurement. [Citation Graph (, )][DBLP]


  65. All-Optical Routing for High Assurance Computer Systems. [Citation Graph (, )][DBLP]


  66. Duplication Based Integrated Task and Message Scheduling on a Heterogeneous Network of Workstations (NOWs). [Citation Graph (, )][DBLP]


  67. Modelling and Exploration Environment for Application Specific Multiprocessor Systems. [Citation Graph (, )][DBLP]


  68. A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance. [Citation Graph (, )][DBLP]


  69. High Assurance GPS Integrity Monitoring System Using Particle Filtering Approach. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002