The SCEAS System
Navigation Menu

Conferences in DBLP

High-Assurance Systems (HASE) (hase)
2004 (conf/hase/2004)

  1. Dongfeng Wang, Hui Ma, Farokh B. Bastani, I-Ling Yen
    Decomposition of Fairness and Performance Aspects for High-Assurance Continuous Process-Control Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:3-11 [Conf]
  2. Josh Dehlinger, Robyn R. Lutz
    Software Fault Tree Analysis for Product Lines. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:12-21 [Conf]
  3. Iain Bate, Neil C. Audsley
    Flexible Design of Complex High-Integrity Systems Using Trade Offs. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:22-31 [Conf]
  4. Zonghua Gu, Shige Wang, Sharath Kodase, Kang G. Shin
    Multi-View Modeling and Analysis of Embedded Real-Time Software with Meta-Modeling and Model Transformation. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:32-41 [Conf]
  5. S. C. Kothari, Luke Bishop, Jeremias Sauceda, Gary Daugherty
    Knowledge-Centric and Language Independent Framework for Safety Analysis Tools. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:45-55 [Conf]
  6. Yi Liu, Taghi M. Khoshgoftaar
    Reducing Overfitting in Genetic Programming Models for Software Quality Classification. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:56-65 [Conf]
  7. Arshad Jhumka, Martin Hiller, Neeraj Suri
    An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:69-78 [Conf]
  8. Ivan Luque, Xiaodong Lu, Misato Tasaka, Kinji Mori, Yasushi Kuba
    Decentralized Workload Management for Assurance According to Heterogeneous Service Levels. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:79-88 [Conf]
  9. Stefan Gossens, Mario Dal Cin
    Structural Analysis of Explicit Fault-Tolerant Programs. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:89-96 [Conf]
  10. Mark Sh. Levin, Mark Last
    Multi-Function System Testing: Composition of Test Sets. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:99-108 [Conf]
  11. Praveen Ikkurthy, John Shahbazian, Miguel A. Labrador, Kenneth J. Christensen
    Testing Large Scale Streaming Internet Applications over Wireless LANs. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:109-115 [Conf]
  12. Rosina Weber, Duanqing Wu
    Knowledge Management for Computational Intelligence Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:116-125 [Conf]
  13. Tim Menzies, Justin S. Di Stefano
    How Good Is Your Blind Spot Sampling Policy? [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:129-138 [Conf]
  14. Norman F. Schneidewind
    Assessing Reliability Risk Using Fault Correction Profiles. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:139-148 [Conf]
  15. Shi Zhong, Taghi M. Khoshgoftaar, Naeem Seliya
    Unsupervised Learning for Expert-Based Software Quality Estimation. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:149-155 [Conf]
  16. Tetsuya Masuishi, Kinji Mori
    A Method for Solving Trade-Off among Cost for Owned/Borrowed Resource and Loss of Business Chances. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:156-164 [Conf]
  17. Gregory L. Wickstrom, Jared Davis, Steven E. Morrison, Steve Roach, Victor L. Winter
    The SSP: An Example of High-Assurance Systems Engineering. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:167-177 [Conf]
  18. Mats Per Erik Heimdahl, George Devaraj, Robert Weber
    Specification Test Coverage Adequacy Criteria = Specification Test Generation Inadequacy Criteria? [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:178-186 [Conf]
  19. Anneliese Amschler Andrews, Andrew O'Fallon, Tom Chen
    RUBASTEM: A Method for Testing VHDL Behavioral Models. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:187-196 [Conf]
  20. Chia-Chu Chiang
    A Formal Specification-Based Approach to Distributed Parallel Programming. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:197-205 [Conf]
  21. Katerina Goseva-Popstojanova, Sunil Kamavaram
    Software Reliability Estimation under Uncertainty: Generalization of the Method of Moments. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:209-218 [Conf]
  22. Hiroyuki Okamura, Atsushi Murayama, Tadashi Dohi
    EM Algorithm for Discrete Software Reliability Models: A Unified Parameter Estimation Method. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:219-228 [Conf]
  23. Jan Jürjens
    Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:231-240 [Conf]
  24. Qingkai Ma, Wei Hao, I-Ling Yen, Farokh B. Bastani
    Multiparty Computation with Full Computation Power and Reduced Overhead. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:241-248 [Conf]
  25. Taghi M. Khoshgoftaar, Mohamed E. Abushadi
    Resource-Sensitive Intrusion Detection Models for Network Traffic. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:249-258 [Conf]
  26. Donald J. Berndt, Alison Watkins
    Investigating the Performance of Genetic Algorithm-Based Software Test Case Generation. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:261-262 [Conf]
  27. Mark Last, Menahem Friedman
    Automated Detection of Injected Faults in a Differential Equation Solver. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:263-264 [Conf]
  28. Richard C. Linger, Alan R. Hevner, Gwendolyn H. Walton, Mark G. Pleszkoch
    Automated Detection of Injected Faults in a Differential Equation Solver Network Systems Development. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:265-266 [Conf]
  29. Richard C. Linger, Mark G. Pleszkoch
    Function Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:267-268 [Conf]
  30. Thomas Barr
    Architectural Overview of the Computational Intelligence Testing Tool: CI-Tool. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:269-270 [Conf]
  31. Andrew J. Kornecki, Kimberley Hall, Darryl Hearn, Herman Lau, Janusz Zalewski
    Evaluation of Software Development Tools for High Assurance Safety Critical Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:273-274 [Conf]
  32. Xiaodong Lu, Yi Zhou, Misato Tasaka, Ivan Luque, Kinji Mori, Ryuji Takanuki
    Autonomous Rating Oriented Agent Allocation to Achieve High Response in Demand-Oriented Information Service System. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:275-276 [Conf]
  33. Pramod Gupta, Johann Schumann
    A Tool for Verification and Validation of Neural Network Based Adaptive Controllers for High Assurance Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:277-278 [Conf]
  34. Dejan Desovski
    Combining Testing and Model Checking for Verification of High Assurance Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:279-280 [Conf]
  35. Laura Pullum, Marjorie Darrah, Spiro T. Skias, Kam S. Tso, Ann T. Tai
    Developing a Data Driven Prognostic System with Limited System Information. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:281-282 [Conf]
  36. Seo Ryong Koo, Poong-Hyun Seong, Sung Deok Cha
    Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC). [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:283-284 [Conf]
  37. Myung Jun Song, Seo Ryong Koo, Poong-Hyun Seong
    Development of a Verification Method for Timed Function Blocks Using ESDT and SMV. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:285-286 [Conf]
  38. Lazar Crawford, Jared Erwin, Steafano Grimaldi, Soma Mitra, Andrew J. Kornecki, David P. Gluch
    A Study of Automatic Code Generation for Safety-Critical Software: Preliminary Report. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:287-288 [Conf]
  39. Huiqun Yu, Xudong He, Yi Deng, Lian Mo
    A Formal Approach to Designing Secure Software Architectures. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:289-290 [Conf]
  40. Frederick T. Sheldon, Thomas E. Potok, Andy Loebl, Axel W. Krings, Paul W. Oman
    Managing Secure Survivable Critical Infrastructures to Avoid Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:293-296 [Conf]
  41. Ewen Denney, Bernd Fischer, Johann Schumann
    Adding Assurance to Automatically Generated Code. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:297-299 [Conf]
  42. Tom Keeley
    KEEL Technology Applied to Highly Distributed Loosely Coupled Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:300-301 [Conf]
  43. Jia Zhou, Kendra Cooper, I-Ling Yen
    A Rule-Based Component Customization Technique for QoS Properties. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:302-303 [Conf]
  44. Hideki Nomoto
    State Oriented Programming. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:304-305 [Conf]
  45. Jing Dong, Sheng Yang
    Towards Trusted Composition in Software Design. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:306-307 [Conf]
  46. Wei Yu
    Analyze the Worm-Based Attack in Large Scale P2P. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:308-309 [Conf]
  47. Yiannis Papadopoulos, David Parker, Christian Grante
    Automating the Failure Modes and Effects Analysis of Safety Critical Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:310-311 [Conf]
  48. Mansour H. Assaf, Sunil R. Das, Emil M. Petriu, Mehmet Sahinoglu
    Enhancing Testability in Architectural Design for the New Generation of Core-Based Embedded Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:312-313 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002