//]]>

Computer Safety, Reliability, and Security (Record no. 14431)

000 -LEADER
fixed length control field 06165nam a22005295i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310144111.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120910s2012 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642336751
978-3-642-33675-1
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2012.
912 ## -
-- ZDB-2-SCS
-- ZDB-2-LNC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ortmeier, Frank.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Computer Safety, Reliability, and Security
Medium [electronic resource] :
Remainder of title SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings /
Statement of responsibility, etc edited by Frank Ortmeier, Peter Daniel.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 530 p. 198 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 7613
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to Sassur 2012 -- AdvoCATE: An Assurance Case Automation Toolset -- Towards a Case-Based Reasoning Approach for Safety Assurance Reuse -- Modeling for Safety in a Synthesis-Centric Systems Engineering Framework --  A Model Based Approach for Safety Analysis -- Towards a Model-Based Evolutionary Chain of Evidence for Compliance with Safety Standards -- A New Approach to Assessment of Confidence in Assurance Cases -- An Unified Meta-model for Trustworthy Systems Engineering -- A Preliminary Fault Injection Framework for Evaluating Multicore Systems -- Meeting Real-Time Requirements with Multi-core Processors --  Assessing Software Interference Management When Modifying Safety-Related Software -- Introduction to ASCoMS 2012 -- Towards Dependable and Stable Perception in Smart Environments with Timing and Value Faults --  An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles to Safer Cars: Selected Challenges for the Software Engineering -- Modelling of Safety-Related Timing Constraints for Automotive Embedded Systems -- Introduction to DESEC4LCCI 2012 -- Quantitative Security Evaluation of a Multi-biometric Authentication System -- Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology -- On Securing Communications among Federated Health Information Systems -- How Secure Is ERTMS -- International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead -- A Federated Simulation Framework with ATN Fault Injection Module for Reliability Analysis of UAVs in Non-controlled Airspace -- HSIENA: A Hybrid Publish/Subscribe System --  WSDM-Enabled Autonomic Augmentation of Classical Multi-version Software Fault-Tolerance Mechanisms -- Formal Verification of a Safety Argumentation and Application to a Complex UAV System --  Electronic Reliability Estimation: How Reliable Are the Results -- Model-Based Assessment of Multi-region Electric Power Systems Showing Heterogeneous Characteristics.-Introduction to the ERCIM/EWICS Cyberphysical Systems Workshop 2012 -- The Cyber-Physical Attacker -- Dependable and Secure Embedded Node Demonstrator --  Towards Secure Time-Triggered Systems -- Towards a Framework for Simulation Based Design, Validation and Performance Analysis of Electronic Control Systems -- Compiling for Time Predictability -- Towards the Automated Qualification of Tool Chain Design -- A Systematic Elaboration of Safety Requirements in the Avionic Domain -- Parallel NuSMV: A NuSMV Extension for the Verification of Complex Embedded Systems --  Supporting Assurance by Evidence-Based Argument Services -- Towards Composable Robotics: The R3-COP Knowledge-Base Driven Technology Platform -- Addressing the Needs of an Aging Population: An Experiment for Monitoring Behaviour in a Domestic Environment --  Introduction to IWDE 2012 -- Modeling the Effects of Software on Safety and Reliability in Complex Embedded Systems -- Towards Artificial Perception -- A Case Study of Radio-Based Monitoring System for Enhanced Safety of Logistics Processes -- Visual Approach Facilitating the Importance Analysis of Component Fault Trees -- Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation -- From Discrete Event Simulation to Virtual Reality Environments -- Program Comprehension in Preprocessor-Based Software.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed proceedings of 5 workshops colocated with SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability, and Security, held in Magdeburg, Germany, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. According to the workshops covered, the papers are organized in topical sections on: next generation of system assurance approaches for safety-critical systems (Sassur), architecting safety in collaborative mobile systems (ASCoMS), dependable and secure computing for large-scale complex critical infrastructures (DESEC4LCCI), ERCIM/EWICS/cyberphysical systems (ERCIM/EWICS), and on digital engineering (IWDE).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Software engineering.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Logic design.
Topical term or geographic name as entry element Artificial intelligence.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Logics and Meanings of Programs.
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
Topical term or geographic name as entry element Software Engineering.
Topical term or geographic name as entry element Computers and Society.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Daniel, Peter.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642336744
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-33675-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-03-31AUM Main Library2014-03-31 2014-03-31 E-Book   AUM Main Library005.8

Languages: 
English |
العربية