Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Computer safety“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer safety" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Computer safety"
MUKAIDONO, Masao. „Computer Safety and Functional Safety“. IEICE ESS FUNDAMENTALS REVIEW 4, Nr. 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.
Der volle Inhalt der QuelleGorodetskii, V. I., I. V. Kotenko und R. M. Yusupov. „Computer networks safety“. Herald of the Russian Academy of Sciences 76, Nr. 4 (Juli 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.
Der volle Inhalt der QuelleNestler, Simon. „Safety-critical human computer interaction“. it - Information Technology 61, Nr. 1 (25.02.2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.
Der volle Inhalt der QuelleWalczak, Andrzej, und Karol Antczak. „Patient Safety versus Computer Diagnosis“. MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.
Der volle Inhalt der QuelleZalewski, Janusz. „Safety of Computer Control System“. IFAC Proceedings Volumes 34, Nr. 22 (November 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.
Der volle Inhalt der QuelleZalewski, Janusz. „Safety aspects of computer control“. Control Engineering Practice 3, Nr. 3 (März 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.
Der volle Inhalt der QuelleCao, Yuan, Hongkang Lu und Tao Wen. „A Safety Computer System Based on Multi-Sensor Data Processing“. Sensors 19, Nr. 4 (17.02.2019): 818. http://dx.doi.org/10.3390/s19040818.
Der volle Inhalt der QuelleChen, Li-Shan, Yen-Ming Tseng und Xiao-Na Lin. „Artificial intelligence in safety system“. MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.
Der volle Inhalt der QuelleSingh, Lalit Kumar, und Hitesh Rajput. „Ensuring safety in design of safety critical computer based systems“. Annals of Nuclear Energy 92 (Juni 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.
Der volle Inhalt der QuelleZhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma und Yinghong Wen. „Safety Mechanism Design and Verification of Safety Computer Parallel Program“. Chinese Journal of Electronics 27, Nr. 6 (01.11.2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.
Der volle Inhalt der QuelleDissertationen zum Thema "Computer safety"
Simpson, Andrew C. „Safety through security“. Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Der volle Inhalt der QuelleConmy, Philippa Mary. „Safety analysis of computer resource management software“. Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428494.
Der volle Inhalt der QuelleAn, Hong. „Computer-aided applications in process plant safety“. Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.
Der volle Inhalt der QuelleWang, Yuan-Fang. „Computer Vision Analysis for Vehicular Safety Applications“. International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.
Der volle Inhalt der QuelleIn this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For autonomous vehicles, we are investigating a visual analysis scheme for collision avoidance during back up and an algorithm for automated 3D map building. These algorithms are relevant to the telemetering domain as they involve determining the relative pose between a vehicle and other vehicles on the road, or between a vehicle and its 3D driving environment, or between a vehicle and obstacles surrounding the vehicle.
Reyad, Passant. „Application of computer vision techniques in safety diagnosis and evaluation of safety treatments“. Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59701.
Der volle Inhalt der QuelleApplied Science, Faculty of
Graduate
Pumfrey, David John. „The principled design of computer system safety analyses“. Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9797/.
Der volle Inhalt der QuelleAkritidis, Periklis. „Practical memory safety for C“. Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609600.
Der volle Inhalt der QuelleFaulkner, Alastair. „Data integrity : an often-ignored aspect of safety systems : executive summary“. Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.
Der volle Inhalt der QuelleDheedan, Amer Abdaladeem. „Distributed on-line safety monitor based on safety assessment model and multi-agent system“. Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:6065.
Der volle Inhalt der QuelleGraydon, Iain R. „Comprehension of 500 safety words : a computer-based methodology“. Thesis, Aston University, 1986. http://publications.aston.ac.uk/12307/.
Der volle Inhalt der QuelleBücher zum Thema "Computer safety"
Understanding computer safety. Chicago, Illinois: Capstone Heinemann Library, 2015.
Den vollen Inhalt der Quelle findenSafety-critical computer systems. Harlow, England: Addison-Wesley, 1996.
Den vollen Inhalt der Quelle findenBoulanger, Jean-Louis. Safety of computer architectures. London, UK: ISTE, 2010.
Den vollen Inhalt der Quelle findenSafety of computer architectures. London, UK: ISTE, 2010.
Den vollen Inhalt der Quelle findenHabli, Ibrahim, Mark Sujan und Friedemann Bitsch, Hrsg. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83903-1.
Der volle Inhalt der QuelleTrapp, Mario, Francesca Saglietti, Marc Spisländer und Friedemann Bitsch, Hrsg. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14835-4.
Der volle Inhalt der QuellePasquini, Alberto. Computer Safety, Reliability and Security. Herausgegeben von Massimo Felici und Karama Kanoun. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48249-0.
Der volle Inhalt der QuelleSchoitsch, Erwin, Hrsg. Computer Safety, Reliability, and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15651-9.
Der volle Inhalt der QuelleKoornneef, Floor, und Meine van der Meulen, Hrsg. Computer Safety, Reliability and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40891-6.
Der volle Inhalt der QuelleTonetta, Stefano, Erwin Schoitsch und Friedemann Bitsch, Hrsg. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66266-4.
Der volle Inhalt der QuelleBuchteile zum Thema "Computer safety"
Cook, Byron, Andreas Podelski und Andrey Rybalchenko. „Terminator: Beyond Safety“. In Computer Aided Verification, 415–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11817963_37.
Der volle Inhalt der QuelleRusu, Vlad, Hervé Marchand, Valéry Tschaen, Thierry Jéron und Bertrand Jeannet. „From Safety Verification to Safety Testing“. In Lecture Notes in Computer Science, 160–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24704-3_11.
Der volle Inhalt der QuelleWeik, Martin H. „safety message“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16561.
Der volle Inhalt der QuelleWeik, Martin H. „safety ring“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16563.
Der volle Inhalt der QuelleWeik, Martin H. „safety signal“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16564.
Der volle Inhalt der QuelleWeik, Martin H. „safety traffic“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16565.
Der volle Inhalt der QuelleJaffar, Joxan, Andrew E. Santosa und Răzvan Voicu. „Relative Safety“. In Lecture Notes in Computer Science, 282–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11609773_19.
Der volle Inhalt der QuelleLal, Ratan, Aaron McKinnis, Dustin Hauptman, Shawn Keshmiri und Pavithra Prabhakar. „Formally Verified Switching Logic for Recoverability of Aircraft Controller“. In Computer Aided Verification, 566–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_27.
Der volle Inhalt der QuelleBaro, Sylvain. „A High-Availability Safety Computer“. In Security of Computer Architectures, 425–46. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch11.
Der volle Inhalt der QuelleVan de Velde, Rudi. „Computer Safety in Healthcare Systems“. In Hospital Information Systems — The Next Generation, 82–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77617-5_9.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Computer safety"
Hill, Janice, und Rhoda Baggs. „Software safety risk in legacy safety-critical computer systems“. In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342891.
Der volle Inhalt der QuelleTangming Yuan und Tianhua Xu. „Computer System Safety Argument Schemes“. In 2010 Second World Congress on Software Engineering (WCSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/wcse.2010.37.
Der volle Inhalt der QuelleWisniewski, Pamela J., Heng Xu, Mary Beth Rosson und John M. Carroll. „Adolescent online safety“. In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531696.
Der volle Inhalt der QuelleOzarin, Nathaniel. „Developing Rules for Failure Modes and Effects Analysis of Computer Software“. In Advances in Aviation Safety. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2003. http://dx.doi.org/10.4271/2003-01-2987.
Der volle Inhalt der QuelleHu, Dong, Dong Zhou und Ping Li. „Research on Hardware Built-in Computer Safety“. In 2006 International Conference on Communications, Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/icccas.2006.284976.
Der volle Inhalt der QuelleNEUMANN, PETER. „Safety of computer systems in aerospace applications“. In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3121.
Der volle Inhalt der QuelleWhite, D. B., M. Weishaupt und D. J. Kent. „A Computer Monitoring System Improves Rig Safety“. In SPE Health, Safety and Environment in Oil and Gas Exploration and Production Conference. Society of Petroleum Engineers, 1991. http://dx.doi.org/10.2118/23249-ms.
Der volle Inhalt der QuelleRamaiah, P. Seetha, M. Ben Swarup und K. Raja Kumar. „Conceptual Modeling for Safety Critical Computer Systems“. In 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE, 2008. http://dx.doi.org/10.1109/snpd.2008.96.
Der volle Inhalt der QuelleSchwamm, Friedrich. „FADEC Computer Systems for Safety Critical Application“. In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-170.
Der volle Inhalt der QuelleLeveson, Nancy G. „System Safety in Computer-Controlled Automotive Systems“. In SAE 2000 World Congress. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2000. http://dx.doi.org/10.4271/2000-01-1048.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Computer safety"
Espinosa, D. L., W. F. Fields, D. E. Gittins und M. L. Roberts. B190 computer controlled radiation monitoring and safety interlock system. Office of Scientific and Technical Information (OSTI), August 1998. http://dx.doi.org/10.2172/3643.
Der volle Inhalt der QuelleDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.2 Users? Manual. Office of Scientific and Technical Information (OSTI), Oktober 2010. http://dx.doi.org/10.2172/1004248.
Der volle Inhalt der QuelleGorski, Janusz. The 12th International Conference on Computer Safety, Reliability and Security. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1993. http://dx.doi.org/10.21236/ada278165.
Der volle Inhalt der QuelleDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users? Manual. Office of Scientific and Technical Information (OSTI), März 2009. http://dx.doi.org/10.2172/950986.
Der volle Inhalt der QuelleGill, Janet A. Flight Control Computer Development Through Application of Software Safety Technology,. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1995. http://dx.doi.org/10.21236/ada305293.
Der volle Inhalt der QuelleCaldwell, John A., Jones Jr., Carter Heber D., Caldwell David J. und J. L. The Relationship Between Computer Scoring and Safety-Pilot Grading of Flight Performance. Fort Belvoir, VA: Defense Technical Information Center, Juli 1992. http://dx.doi.org/10.21236/ada256245.
Der volle Inhalt der QuelleFalkov, A. A., V. S. Kuul und O. B. Samoilov. Experimental assessment of computer codes used for safety analysis of integral reactors. Office of Scientific and Technical Information (OSTI), September 1995. http://dx.doi.org/10.2172/115099.
Der volle Inhalt der QuelleSmith, O., J. Renier, F. Difilippo, N. Clapp, A. Sozer, R. Booth, W. Craddick und D. Morris. PWR hybrid computer model for assessing the safety implications of control systems. Office of Scientific and Technical Information (OSTI), März 1986. http://dx.doi.org/10.2172/5832266.
Der volle Inhalt der QuelleWenzel, D. R. The Radiological Safety Analysis Computer Program (RSAC-5) user`s manual. Revision 1. Office of Scientific and Technical Information (OSTI), Februar 1994. http://dx.doi.org/10.2172/10157789.
Der volle Inhalt der QuellePevnitsky, A. V., V. A. Tarasov und V. P. Solovyev. Comparison between VNIIEF computer programs used to study NPP safety and similar western codes. Office of Scientific and Technical Information (OSTI), Dezember 1995. http://dx.doi.org/10.2172/219462.
Der volle Inhalt der Quelle