The SCEAS System
Navigation Menu

Conferences in DBLP

SAFECOMP (safecomp)
2008 (conf/safecomp/2008)


  1. Critical Information Infrastructures: Should Models Represent Structures or Functions? [Citation Graph (, )][DBLP]


  2. Security and Interoperability for MANETs and a Fixed Core. [Citation Graph (, )][DBLP]


  3. Technology, Society and Risk. [Citation Graph (, )][DBLP]


  4. Panel: Complexity and Resilience. [Citation Graph (, )][DBLP]


  5. The Effectiveness of T-Way Test Data Generation. [Citation Graph (, )][DBLP]


  6. Towards Agile Engineering of High-Integrity Systems. [Citation Graph (, )][DBLP]


  7. SafeSpection - A Systematic Customization Approach for Software Hazard Identification. [Citation Graph (, )][DBLP]


  8. Integrating Safety Analyses and Component-Based Design. [Citation Graph (, )][DBLP]


  9. Modelling Support for Design of Safety-Critical Automotive Embedded Systems. [Citation Graph (, )][DBLP]


  10. Resilience in the Aviation System. [Citation Graph (, )][DBLP]


  11. Resilience Markers for Safer Systems and Organisations. [Citation Graph (, )][DBLP]


  12. Modeling and Analyzing Disaster Recovery Plans as Business Processes. [Citation Graph (, )][DBLP]


  13. Analysis of Nested CRC with Additional Net Data in Communication. [Citation Graph (, )][DBLP]


  14. Symbolic Reliability Analysis of Self-healing Networked Embedded Systems. [Citation Graph (, )][DBLP]


  15. Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers. [Citation Graph (, )][DBLP]


  16. Secure Interaction Models for the HealthAgents System. [Citation Graph (, )][DBLP]


  17. Security Challenges in Adaptive e-Health Processes. [Citation Graph (, )][DBLP]


  18. An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. [Citation Graph (, )][DBLP]


  19. Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles. [Citation Graph (, )][DBLP]


  20. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. [Citation Graph (, )][DBLP]


  21. Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. [Citation Graph (, )][DBLP]


  22. Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information. [Citation Graph (, )][DBLP]


  23. Applying Safety Goals to a New Intensive Care Workstation System. [Citation Graph (, )][DBLP]


  24. Safety Assurance Strategies for Autonomous Vehicles. [Citation Graph (, )][DBLP]


  25. Expert Assessment of Arguments: A Method and Its Experimental Evaluation. [Citation Graph (, )][DBLP]


  26. Formal Verification by Reverse Synthesis. [Citation Graph (, )][DBLP]


  27. Deriving Safety Software Requirements from an AltaRica System Model. [Citation Graph (, )][DBLP]


  28. Model-Based Implementation of Real-Time Systems. [Citation Graph (, )][DBLP]


  29. Early Prototyping of Wireless Sensor Network Algorithms in PVS. [Citation Graph (, )][DBLP]


  30. Analyzing Fault Susceptibility of ABS Microcontroller. [Citation Graph (, )][DBLP]


  31. A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems. [Citation Graph (, )][DBLP]


  32. The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects. [Citation Graph (, )][DBLP]


  33. A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. [Citation Graph (, )][DBLP]


  34. Formal Security Analysis of Electronic Software Distribution Systems. [Citation Graph (, )][DBLP]


  35. The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling. [Citation Graph (, )][DBLP]


  36. Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002