Academic literature on the topic 'Computer safety'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer safety.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer safety"
MUKAIDONO, Masao. "Computer Safety and Functional Safety." IEICE ESS FUNDAMENTALS REVIEW 4, no. 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.
Full textGorodetskii, V. I., I. V. Kotenko, and R. M. Yusupov. "Computer networks safety." Herald of the Russian Academy of Sciences 76, no. 4 (July 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.
Full textNestler, Simon. "Safety-critical human computer interaction." it - Information Technology 61, no. 1 (February 25, 2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.
Full textWalczak, Andrzej, and Karol Antczak. "Patient Safety versus Computer Diagnosis." MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.
Full textZalewski, Janusz. "Safety of Computer Control System." IFAC Proceedings Volumes 34, no. 22 (November 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.
Full textZalewski, Janusz. "Safety aspects of computer control." Control Engineering Practice 3, no. 3 (March 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.
Full textCao, Yuan, Hongkang Lu, and Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing." Sensors 19, no. 4 (February 17, 2019): 818. http://dx.doi.org/10.3390/s19040818.
Full textChen, Li-Shan, Yen-Ming Tseng, and Xiao-Na Lin. "Artificial intelligence in safety system." MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.
Full textSingh, Lalit Kumar, and Hitesh Rajput. "Ensuring safety in design of safety critical computer based systems." Annals of Nuclear Energy 92 (June 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.
Full textZhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma, and Yinghong Wen. "Safety Mechanism Design and Verification of Safety Computer Parallel Program." Chinese Journal of Electronics 27, no. 6 (November 1, 2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.
Full textDissertations / Theses on the topic "Computer safety"
Simpson, Andrew C. "Safety through security." Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Full textConmy, Philippa Mary. "Safety analysis of computer resource management software." Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428494.
Full textAn, Hong. "Computer-aided applications in process plant safety." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.
Full textWang, Yuan-Fang. "Computer Vision Analysis for Vehicular Safety Applications." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.
Full textIn this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For autonomous vehicles, we are investigating a visual analysis scheme for collision avoidance during back up and an algorithm for automated 3D map building. These algorithms are relevant to the telemetering domain as they involve determining the relative pose between a vehicle and other vehicles on the road, or between a vehicle and its 3D driving environment, or between a vehicle and obstacles surrounding the vehicle.
Reyad, Passant. "Application of computer vision techniques in safety diagnosis and evaluation of safety treatments." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59701.
Full textApplied Science, Faculty of
Graduate
Pumfrey, David John. "The principled design of computer system safety analyses." Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9797/.
Full textAkritidis, Periklis. "Practical memory safety for C." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609600.
Full textFaulkner, Alastair. "Data integrity : an often-ignored aspect of safety systems : executive summary." Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.
Full textDheedan, Amer Abdaladeem. "Distributed on-line safety monitor based on safety assessment model and multi-agent system." Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:6065.
Full textGraydon, Iain R. "Comprehension of 500 safety words : a computer-based methodology." Thesis, Aston University, 1986. http://publications.aston.ac.uk/12307/.
Full textBooks on the topic "Computer safety"
Understanding computer safety. Chicago, Illinois: Capstone Heinemann Library, 2015.
Find full textSafety-critical computer systems. Harlow, England: Addison-Wesley, 1996.
Find full textBoulanger, Jean-Louis. Safety of computer architectures. London, UK: ISTE, 2010.
Find full textSafety of computer architectures. London, UK: ISTE, 2010.
Find full textHabli, Ibrahim, Mark Sujan, and Friedemann Bitsch, eds. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83903-1.
Full textTrapp, Mario, Francesca Saglietti, Marc Spisländer, and Friedemann Bitsch, eds. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14835-4.
Full textPasquini, Alberto. Computer Safety, Reliability and Security. Edited by Massimo Felici and Karama Kanoun. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48249-0.
Full textSchoitsch, Erwin, ed. Computer Safety, Reliability, and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15651-9.
Full textKoornneef, Floor, and Meine van der Meulen, eds. Computer Safety, Reliability and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40891-6.
Full textTonetta, Stefano, Erwin Schoitsch, and Friedemann Bitsch, eds. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66266-4.
Full textBook chapters on the topic "Computer safety"
Cook, Byron, Andreas Podelski, and Andrey Rybalchenko. "Terminator: Beyond Safety." In Computer Aided Verification, 415–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11817963_37.
Full textRusu, Vlad, Hervé Marchand, Valéry Tschaen, Thierry Jéron, and Bertrand Jeannet. "From Safety Verification to Safety Testing." In Lecture Notes in Computer Science, 160–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24704-3_11.
Full textWeik, Martin H. "safety message." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16561.
Full textWeik, Martin H. "safety ring." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16563.
Full textWeik, Martin H. "safety signal." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16564.
Full textWeik, Martin H. "safety traffic." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16565.
Full textJaffar, Joxan, Andrew E. Santosa, and Răzvan Voicu. "Relative Safety." In Lecture Notes in Computer Science, 282–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11609773_19.
Full textLal, Ratan, Aaron McKinnis, Dustin Hauptman, Shawn Keshmiri, and Pavithra Prabhakar. "Formally Verified Switching Logic for Recoverability of Aircraft Controller." In Computer Aided Verification, 566–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_27.
Full textBaro, Sylvain. "A High-Availability Safety Computer." In Security of Computer Architectures, 425–46. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch11.
Full textVan de Velde, Rudi. "Computer Safety in Healthcare Systems." In Hospital Information Systems — The Next Generation, 82–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77617-5_9.
Full textConference papers on the topic "Computer safety"
Hill, Janice, and Rhoda Baggs. "Software safety risk in legacy safety-critical computer systems." In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342891.
Full textTangming Yuan and Tianhua Xu. "Computer System Safety Argument Schemes." In 2010 Second World Congress on Software Engineering (WCSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/wcse.2010.37.
Full textWisniewski, Pamela J., Heng Xu, Mary Beth Rosson, and John M. Carroll. "Adolescent online safety." In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531696.
Full textOzarin, Nathaniel. "Developing Rules for Failure Modes and Effects Analysis of Computer Software." In Advances in Aviation Safety. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2003. http://dx.doi.org/10.4271/2003-01-2987.
Full textHu, Dong, Dong Zhou, and Ping Li. "Research on Hardware Built-in Computer Safety." In 2006 International Conference on Communications, Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/icccas.2006.284976.
Full textNEUMANN, PETER. "Safety of computer systems in aerospace applications." In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3121.
Full textWhite, D. B., M. Weishaupt, and D. J. Kent. "A Computer Monitoring System Improves Rig Safety." In SPE Health, Safety and Environment in Oil and Gas Exploration and Production Conference. Society of Petroleum Engineers, 1991. http://dx.doi.org/10.2118/23249-ms.
Full textRamaiah, P. Seetha, M. Ben Swarup, and K. Raja Kumar. "Conceptual Modeling for Safety Critical Computer Systems." In 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE, 2008. http://dx.doi.org/10.1109/snpd.2008.96.
Full textSchwamm, Friedrich. "FADEC Computer Systems for Safety Critical Application." In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-170.
Full textLeveson, Nancy G. "System Safety in Computer-Controlled Automotive Systems." In SAE 2000 World Congress. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2000. http://dx.doi.org/10.4271/2000-01-1048.
Full textReports on the topic "Computer safety"
Espinosa, D. L., W. F. Fields, D. E. Gittins, and M. L. Roberts. B190 computer controlled radiation monitoring and safety interlock system. Office of Scientific and Technical Information (OSTI), August 1998. http://dx.doi.org/10.2172/3643.
Full textDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.2 Users? Manual. Office of Scientific and Technical Information (OSTI), October 2010. http://dx.doi.org/10.2172/1004248.
Full textGorski, Janusz. The 12th International Conference on Computer Safety, Reliability and Security. Fort Belvoir, VA: Defense Technical Information Center, October 1993. http://dx.doi.org/10.21236/ada278165.
Full textDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users? Manual. Office of Scientific and Technical Information (OSTI), March 2009. http://dx.doi.org/10.2172/950986.
Full textGill, Janet A. Flight Control Computer Development Through Application of Software Safety Technology,. Fort Belvoir, VA: Defense Technical Information Center, October 1995. http://dx.doi.org/10.21236/ada305293.
Full textCaldwell, John A., Jones Jr., Carter Heber D., Caldwell David J., and J. L. The Relationship Between Computer Scoring and Safety-Pilot Grading of Flight Performance. Fort Belvoir, VA: Defense Technical Information Center, July 1992. http://dx.doi.org/10.21236/ada256245.
Full textFalkov, A. A., V. S. Kuul, and O. B. Samoilov. Experimental assessment of computer codes used for safety analysis of integral reactors. Office of Scientific and Technical Information (OSTI), September 1995. http://dx.doi.org/10.2172/115099.
Full textSmith, O., J. Renier, F. Difilippo, N. Clapp, A. Sozer, R. Booth, W. Craddick, and D. Morris. PWR hybrid computer model for assessing the safety implications of control systems. Office of Scientific and Technical Information (OSTI), March 1986. http://dx.doi.org/10.2172/5832266.
Full textWenzel, D. R. The Radiological Safety Analysis Computer Program (RSAC-5) user`s manual. Revision 1. Office of Scientific and Technical Information (OSTI), February 1994. http://dx.doi.org/10.2172/10157789.
Full textPevnitsky, A. V., V. A. Tarasov, and V. P. Solovyev. Comparison between VNIIEF computer programs used to study NPP safety and similar western codes. Office of Scientific and Technical Information (OSTI), December 1995. http://dx.doi.org/10.2172/219462.
Full text