


default search action
HASE 1996: Niagara, Canada
- 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings. IEEE Computer Society 1996, ISBN 0-8186-7629-9
Keynote Speech
- Norman E. Johnson:
High Assurance Life and Death. 2-
Specification and Testing of High-Assurance Systems
- David L. MacPherson:
Specification and Testing of High-Assurance Systems. 8-15 - Tolety Siva Perraju, Satyendra Pal Rana, Susanta P. Sarkar:
Specifying fault tolerance in mission critical systems. 24-31 - Jyhjong Lin, David Chenho Kung, Pei Hsia:
Top-down development of real-time software specification. 271-278 - Ramakrishna V. Vishnuvajjala, Wei-Tek Tsai, Ramin Mojdehbakhsh, Lynn Elliott:
Specifying timing constraints in real-time object-oriented systems. 32-39 - Ramkumar V. Pichai, Joseph E. Urban:
A technique for validating Booch object-oriented designs from extensions to the Descartes specification language. 40-49
Panel I
- I-Ling Yen:
Computer security: the good, the bad and the ugly. 52-53 - V. T. Thomas:
Ten practical techniques for high assurance systems engineering. 55-56 - Victor L. Winter:
Software on the edge. 57-59
Quality and High-Assurance
- Raymond A. Paul, M. Farrukh Khan, Shahab Baqai, Arif Ghafoor:
Ensuring quality in distributed multimedia systems. 60-67 - Victor L. Winter, James M. Boyle:
Proving refinement transformations for deriving high-assurance software. 68-77 - Jeffrey M. Voas, Frank Charron, Keith W. Miller:
Investigating rare-event failure tolerance: reductions in future uncertainty. 78-85 - Roymond S. C. Shanahan:
Applying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD). 86-92 - José M. Drake:
Writing a user functional description for an Army software metrics support tool. 93-103
Concurrency and High-Assurance
- Eric Y. T. Juan, Jeffrey J. P. Tsai, Tadao Murata:
A new compositional method for condensed state-space verification. 104-111 - Jian Chen, Richard H. Carver:
Selecting and mapping test sequences from formal specifications of concurrent programs. 112-119
Keynote Speech
- Virginia L. Castor:
The Department of Defense Science and Technology (S&T) Program. 130-
High-Assurance Execution Environments
- Nuno Neves, W. Kent Fuchs:
Adaptive recovery for mobile environments. 134-141 - Scott Dawson, Farnam Jahanian, Todd Mitton:
Fault injection experiments on real-time protocols using ORCHESTRA. 142-149 - David B. Stewart, Pradeep K. Khosla:
Policy-independent real-time operating system mechanisms for timing error detection, handling and monitoring. 150-157 - Jeffrey J. P. Tsai, Bing Li, Eric Y. T. Juan:
Transaction integration for reusable hard real-time components. 166-175 - Ramakrishna V. Vishnuvajjala, Satish Subramanian, Wei-Tek Tsai, Ramin Mojdehbakhsh, Lynn Elliott:
Flow analysis for concurrent, reactive, real-time systems. 176-183 - Sanghyun Ahn:
Real-time multicast connection establishment over ATM networks. 184-197
Speech
- Shi-Kuo Chang:
Active Multimedia Communication Systems. 194-
Security, Reliability and High-Assurance
- Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz:
A framework for MLS interoperability. 198-205 - Thomas F. Keefe, Wei-Tek Tsai:
A multiversion transaction scheduler for centralized multilevel secure database systems. 206-213 - Farokh B. Bastani, Bojan Cukic:
Impact of program transformation on software reliability assessment. 214-221 - Takamasa Nara, Masahiro Nakata, Akihiro Ooishi:
Software reliability growth analysis-application of NHPP models and its evaluation. 222-227 - Richard Yu:
Reliability prediction method for electronic systems: a comparative reliability assessment method. 237-243
High-Assurance Potpourri
- Taghi M. Khoshgoftaar, Edward B. Allen, Lofton A. Bullard, Robert Halstead, Gary P. Trio:
A tree-based classification model for analysis of a military software system. 244-251 - Heidrun Engel:
Data flow transformations to detect results which are corrupted by hardware faults. 279- - Mats Per Erik Heimdahl, Barbara J. Czerny:
Using PVS to analyze hierarchical state-based requirements for completeness and consistency. 252-262 - Qi Shi, Ning Zhang:
A general approach to secure components composition. 263-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.