The SCEAS System
Navigation Menu

Conferences in DBLP

High-Assurance Systems (HASE) (hase)
1998 (conf/hase/1998)

  1. Mario Dal Cin
    Checking Modification Tolerance. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:4-12 [Conf]
  2. David Coppit, Kevin J. Sullivan
    Formal Specification in Collaborative Design of Critical Software Tools. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:13-20 [Conf]
  3. Ragavan Manian, Joanne Bechta Dugan, David Coppit, Kevin J. Sullivan
    Combining Various Solution Techniques for Dynamic Fault Tree Analysis of Computer Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:21-28 [Conf]
  4. Duane E. Olawsky, Charles Payne, Thomas Sundquist, David Apostal, Todd Fine
    Using Composition to Design Secure, Fault-Tolerant Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:29-0 [Conf]
  5. Swapna S. Gokhale, Kishor S. Trivedi
    Log-Logistic Software Reliability Growth Model. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:34-41 [Conf]
  6. Ravishankar K. Iyer, Zbigniew Kalbarczyk, Keith Whisnant, Saurabh Bagchi
    A Flexible Software Architecture for High Availability Computing. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:42-49 [Conf]
  7. K. H. Kim
    ROAFTS: A Middleware Architecture for Real-Time Object-Oriented Adaptive Fault Tolerance Support. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:50-0 [Conf]
  8. Gary Johnson, John Calvert, Kelly J. Hayhurst, John Janeri, Herbert Hecht
    System Requirements and Analysis Issues for High Assurance Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:60-0 [Conf]
  9. Ying C. (Bob) Yeh
    Design Considerations in Boeing 777 Fly-By-Wire Computers. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:64-0 [Conf]
  10. Denise M. Woit, David V. Mason
    Software Component Independence. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:74-81 [Conf]
  11. Taghi M. Khoshgoftaar, Edward B. Allen, Archana Naik, Wendell D. Jones, John P. Hudepohl
    Using Classification Trees for Software Quality Models: Lessons Learned. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:82-89 [Conf]
  12. Donald F. Schenker, Taghi M. Khoshgoftaar
    The Application of Fuzzy Enhanced Case-Based Reasoning for Identifying Fault-Prone Modules. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:90-97 [Conf]
  13. Yashwant K. Malaiya, Jason Denton
    Estimating the Number of Residual Defects. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:98-0 [Conf]
  14. Calton Pu, Crispin Cowan
    System Survivability through Security Bug Tolerance. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:108-108 [Conf]
  15. Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsai
    Design for Constraint Violation Detection in Safety-Critical Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:109-116 [Conf]
  16. Robert N. Smith, Sourav Bhattacharya
    Fault and Leak Tolerance in Firewall Engineering. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:117-0 [Conf]
  17. Kamel Barkaoui, Jean-François Pradat-Peyre
    Verification in Concurrent Programming with Petri Nets Structural Techniques. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:124-133 [Conf]
  18. Farn Wang, Pao-Ann Hsiung
    Automatic Verification on the Large. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:134-141 [Conf]
  19. Susan Stepney
    Incremental Development of a High Integrity Compiler: Experience from an Industrial Development. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:142-149 [Conf]
  20. Stephen J. H. Yang, Sam Lin, Jonathan Lee, William C. Chu
    Specifying and Verifying Temporal Behavior of High Assurance Systems Using Reachability Tree Logic. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:150-0 [Conf]
  21. David Chenho Kung, Pei Hsia, Yasufumi Toyoshima, Cris Chen, Jerry Gao
    Object-Oriented Software Testing: Some Research and Development. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:158-165 [Conf]
  22. William E. Howden
    Good Enough versus High Assurance Software Testing and Evaluation Methods. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:166-0 [Conf]
  23. Dolores R. Wallace
    Enhancing Competitiveness via a Public Fault & Failure Data Repository . [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:178-0 [Conf]
  24. Carol L. Hoover, Pradeep K. Khosla
    Analytical Partition of Software Components for Evolvable and Reliable MEMS Design Tools. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:188-199 [Conf]
  25. John M. Covan, J. Arlin Cooper
    Predictable Safety in the Control of High Consequence Systems. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:200-204 [Conf]
  26. Jun Xu, Mukesh Singhal
    A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:205-208 [Conf]
  27. Diego Del Gobbo, Marcello R. Napolitano, John Callahan, Bojan Cukic
    Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:209-0 [Conf]
  28. M. Pizza, Lorenzo Strigini, Andrea Bondavalli, Felicita Di Giandomenico
    Optimal Discrimination between Transient and Permanent Faults. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:214-223 [Conf]
  29. Fabrizio Grandoni 0002, Andrea Bondavalli, Silvano Chiaradonna
    A New Heuristic to Discriminate between Transient and Intermittent Faults. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:224-231 [Conf]
  30. Ronjeet Lal, Gwan S. Choi
    Error and Failure Analysis of a UNIX Server. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:232-239 [Conf]
  31. Seung H. Hwang, Gwan S. Choi
    On-Chip Cache Memory Resilience. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:240-247 [Conf]
  32. Eltefaat Shokri, Herbert Hecht
    Matching Software Fault Tolerance with Application Needs. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:248-0 [Conf]
  33. Yu Lei, Kuo-Chung Tai
    In-Parameter-Order: A Test Generation Strategy for Pairwise Testing. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:254-261 [Conf]
  34. Anneliese von Mayrhauser, Andre Bai, Tom Chen, Charles Anderson, Amjad Hajjar
    Fast Antirandom (FAR) Test Generation. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:262-269 [Conf]
  35. Yi Deng, Jiacun Wang
    Integrated Architectural Modeling and Analysis for High-Assurance Command and Control System Design. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:270-278 [Conf]
  36. Tei-Wei Kuo, Yuan-Ting Kao, LihChyun Shu
    A Two-Version Approach for Real-Time Concurrency Control and Recovery. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:279-0 [Conf]
  37. Hideo Hanamura, Kinji Mori
    Assurance of Transactions in Allied Heterogeneous Systems by Autonomous Decentralized System Techniques. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:288-295 [Conf]
  38. Shashi Phoha, Eugene Eberbach, Eileen Peluso, Atilla P. Kiraly
    Coordination of Engineering Design Agents for High Assurance in Complex Dynamic System Design. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:296-303 [Conf]
  39. Manuel Aparicio IV, Peter Herman, Wendy Stephens, Anuj K. Jain, Munindar P. Singh
    Agent Information Contracts within Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:304-311 [Conf]
  40. Rajiv Khosla
    Human-Centered Virtual Machine of Problem Solving Agents, Software Agents, Intelligent Agents and Objects. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:312-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002