Sciweavers

113 search results - page 17 / 23
» Requirements-Related Risks in Critical Systems
Sort
View
SCS
2004
13 years 9 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
14 years 2 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
ICRA
2007
IEEE
127views Robotics» more  ICRA 2007»
14 years 1 months ago
A Comparative Dependability Analysis of Antagonistic Actuation Arrangements for Enhanced Robotic Safety
Abstract— In this paper we introduce an analysis of dependability of an elementary yet critical component of robotic systems designed to operate in environments shared with human...
Roberto Filippini, Soumen Sen, Giovanni Tonietti, ...
OOPSLA
2005
Springer
14 years 1 months ago
Exploring the acceptability envelope
An acceptability envelope is a region of imperfect but acceptable software systems surrounding a given perfect system. Explicitly targeting the acceptability envelope during devel...
Martin C. Rinard, Cristian Cadar, Huu Hai Nguyen
ESORICS
2011
Springer
12 years 7 months ago
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, howeve...
Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen...