Safety-critical software

被引:0
|
作者
机构
来源
| 1600年 / IEEE Computer Society卷 / 30期
关键词
D O I
10.1109/MS.2013.55
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Agile methods for safety-critical software development
    Weyrauch, K
    Poppendieck, M
    Morsicato, R
    Van Schooenderwoert, N
    Pyritz, B
    EXTREME PROGRAMMING AND AGILE METHODS - XP/ AGILE UNIVERSE 2004, PROCEEDINGS, 2004, 3134 : 202 - 202
  • [42] A static analyzer for large safety-critical software
    Blanchet, B
    Cousot, P
    Cousot, R
    Feret, J
    Mauborgne, L
    Miné, A
    Monniaux, D
    Rival, X
    ACM SIGPLAN NOTICES, 2003, 38 (05) : 196 - 207
  • [43] Novel testing approach for safety-critical software
    Xu, Zhongwei
    Wu, Fangmei
    Proceedings of the Asian Test Symposium, 1999, : 251 - 255
  • [44] Reusing Certified, Safety-Critical Avionics Software
    King, Tim
    2012 IEEE/AIAA 31ST DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2012,
  • [45] Languages for safety-critical software: Issues and assessment
    Brosgol, Benjamin M.
    29th International Conference on Software Engineering: ICSE 2007 Companion Volume, Proceedings, 2007, : 180 - 181
  • [46] Harmonisation of defence standards for safety-critical software
    Marsh, W
    MICROPROCESSORS AND MICROSYSTEMS, 1997, 21 (01) : 41 - 47
  • [47] FAA (RSC) acceptance for safety-critical software
    不详
    AIRCRAFT ENGINEERING AND AEROSPACE TECHNOLOGY, 2006, 78 (04): : 358 - 359
  • [48] Software Qualification Approach for Safety-Critical Software of the Embedded System
    Kim, Jangyeol
    Kim, Soongohn
    COMPUTER APPLICATIONS FOR COMMUNICATION, NETWORKING, AND DIGITAL CONTENTS, 2012, 350 : 175 - +
  • [49] Certification of software tools used in safety-critical software development
    Schuster, Gyorgy
    2022 IEEE 5TH INTERNATIONAL CONFERENCE AND WORKSHOP OBUDA ON ELECTRICAL AND POWER ENGINEERING, CANDO-EPE, 2022, : 211 - 215
  • [50] A Methodology for Modeling Software Safety in Safety-Critical Computing Systems
    Kumar, S. Phani
    Ramaiah, P. Seetha
    Khanaa, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 185 - 193