Letteratura scientifica selezionata sul tema "Computer safety"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Computer safety".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Computer safety"
MUKAIDONO, Masao. "Computer Safety and Functional Safety". IEICE ESS FUNDAMENTALS REVIEW 4, n. 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.
Testo completoGorodetskii, V. I., I. V. Kotenko e R. M. Yusupov. "Computer networks safety". Herald of the Russian Academy of Sciences 76, n. 4 (luglio 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.
Testo completoNestler, Simon. "Safety-critical human computer interaction". it - Information Technology 61, n. 1 (25 febbraio 2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.
Testo completoWalczak, Andrzej, e Karol Antczak. "Patient Safety versus Computer Diagnosis". MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.
Testo completoZalewski, Janusz. "Safety of Computer Control System". IFAC Proceedings Volumes 34, n. 22 (novembre 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.
Testo completoZalewski, Janusz. "Safety aspects of computer control". Control Engineering Practice 3, n. 3 (marzo 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.
Testo completoCao, Yuan, Hongkang Lu e Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing". Sensors 19, n. 4 (17 febbraio 2019): 818. http://dx.doi.org/10.3390/s19040818.
Testo completoChen, Li-Shan, Yen-Ming Tseng e Xiao-Na Lin. "Artificial intelligence in safety system". MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.
Testo completoSingh, Lalit Kumar, e Hitesh Rajput. "Ensuring safety in design of safety critical computer based systems". Annals of Nuclear Energy 92 (giugno 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.
Testo completoZhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma e Yinghong Wen. "Safety Mechanism Design and Verification of Safety Computer Parallel Program". Chinese Journal of Electronics 27, n. 6 (1 novembre 2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.
Testo completoTesi sul tema "Computer safety"
Simpson, Andrew C. "Safety through security". Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Testo completoConmy, Philippa Mary. "Safety analysis of computer resource management software". Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428494.
Testo completoAn, Hong. "Computer-aided applications in process plant safety". Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.
Testo completoWang, Yuan-Fang. "Computer Vision Analysis for Vehicular Safety Applications". International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.
Testo completoIn this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For autonomous vehicles, we are investigating a visual analysis scheme for collision avoidance during back up and an algorithm for automated 3D map building. These algorithms are relevant to the telemetering domain as they involve determining the relative pose between a vehicle and other vehicles on the road, or between a vehicle and its 3D driving environment, or between a vehicle and obstacles surrounding the vehicle.
Reyad, Passant. "Application of computer vision techniques in safety diagnosis and evaluation of safety treatments". Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59701.
Testo completoApplied Science, Faculty of
Graduate
Pumfrey, David John. "The principled design of computer system safety analyses". Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9797/.
Testo completoAkritidis, Periklis. "Practical memory safety for C". Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609600.
Testo completoFaulkner, Alastair. "Data integrity : an often-ignored aspect of safety systems : executive summary". Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.
Testo completoDheedan, Amer Abdaladeem. "Distributed on-line safety monitor based on safety assessment model and multi-agent system". Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:6065.
Testo completoGraydon, Iain R. "Comprehension of 500 safety words : a computer-based methodology". Thesis, Aston University, 1986. http://publications.aston.ac.uk/12307/.
Testo completoLibri sul tema "Computer safety"
Understanding computer safety. Chicago, Illinois: Capstone Heinemann Library, 2015.
Cerca il testo completoSafety-critical computer systems. Harlow, England: Addison-Wesley, 1996.
Cerca il testo completoBoulanger, Jean-Louis. Safety of computer architectures. London, UK: ISTE, 2010.
Cerca il testo completoSafety of computer architectures. London, UK: ISTE, 2010.
Cerca il testo completoHabli, Ibrahim, Mark Sujan e Friedemann Bitsch, a cura di. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83903-1.
Testo completoTrapp, Mario, Francesca Saglietti, Marc Spisländer e Friedemann Bitsch, a cura di. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14835-4.
Testo completoPasquini, Alberto. Computer Safety, Reliability and Security. A cura di Massimo Felici e Karama Kanoun. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48249-0.
Testo completoSchoitsch, Erwin, a cura di. Computer Safety, Reliability, and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15651-9.
Testo completoKoornneef, Floor, e Meine van der Meulen, a cura di. Computer Safety, Reliability and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40891-6.
Testo completoTonetta, Stefano, Erwin Schoitsch e Friedemann Bitsch, a cura di. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66266-4.
Testo completoCapitoli di libri sul tema "Computer safety"
Cook, Byron, Andreas Podelski e Andrey Rybalchenko. "Terminator: Beyond Safety". In Computer Aided Verification, 415–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11817963_37.
Testo completoRusu, Vlad, Hervé Marchand, Valéry Tschaen, Thierry Jéron e Bertrand Jeannet. "From Safety Verification to Safety Testing". In Lecture Notes in Computer Science, 160–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24704-3_11.
Testo completoWeik, Martin H. "safety message". In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16561.
Testo completoWeik, Martin H. "safety ring". In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16563.
Testo completoWeik, Martin H. "safety signal". In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16564.
Testo completoWeik, Martin H. "safety traffic". In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16565.
Testo completoJaffar, Joxan, Andrew E. Santosa e Răzvan Voicu. "Relative Safety". In Lecture Notes in Computer Science, 282–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11609773_19.
Testo completoLal, Ratan, Aaron McKinnis, Dustin Hauptman, Shawn Keshmiri e Pavithra Prabhakar. "Formally Verified Switching Logic for Recoverability of Aircraft Controller". In Computer Aided Verification, 566–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_27.
Testo completoBaro, Sylvain. "A High-Availability Safety Computer". In Security of Computer Architectures, 425–46. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch11.
Testo completoVan de Velde, Rudi. "Computer Safety in Healthcare Systems". In Hospital Information Systems — The Next Generation, 82–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77617-5_9.
Testo completoAtti di convegni sul tema "Computer safety"
Hill, Janice, e Rhoda Baggs. "Software safety risk in legacy safety-critical computer systems". In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342891.
Testo completoTangming Yuan e Tianhua Xu. "Computer System Safety Argument Schemes". In 2010 Second World Congress on Software Engineering (WCSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/wcse.2010.37.
Testo completoWisniewski, Pamela J., Heng Xu, Mary Beth Rosson e John M. Carroll. "Adolescent online safety". In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531696.
Testo completoOzarin, Nathaniel. "Developing Rules for Failure Modes and Effects Analysis of Computer Software". In Advances in Aviation Safety. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2003. http://dx.doi.org/10.4271/2003-01-2987.
Testo completoHu, Dong, Dong Zhou e Ping Li. "Research on Hardware Built-in Computer Safety". In 2006 International Conference on Communications, Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/icccas.2006.284976.
Testo completoNEUMANN, PETER. "Safety of computer systems in aerospace applications". In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3121.
Testo completoWhite, D. B., M. Weishaupt e D. J. Kent. "A Computer Monitoring System Improves Rig Safety". In SPE Health, Safety and Environment in Oil and Gas Exploration and Production Conference. Society of Petroleum Engineers, 1991. http://dx.doi.org/10.2118/23249-ms.
Testo completoRamaiah, P. Seetha, M. Ben Swarup e K. Raja Kumar. "Conceptual Modeling for Safety Critical Computer Systems". In 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE, 2008. http://dx.doi.org/10.1109/snpd.2008.96.
Testo completoSchwamm, Friedrich. "FADEC Computer Systems for Safety Critical Application". In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-170.
Testo completoLeveson, Nancy G. "System Safety in Computer-Controlled Automotive Systems". In SAE 2000 World Congress. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2000. http://dx.doi.org/10.4271/2000-01-1048.
Testo completoRapporti di organizzazioni sul tema "Computer safety"
Espinosa, D. L., W. F. Fields, D. E. Gittins e M. L. Roberts. B190 computer controlled radiation monitoring and safety interlock system. Office of Scientific and Technical Information (OSTI), agosto 1998. http://dx.doi.org/10.2172/3643.
Testo completoDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.2 Users? Manual. Office of Scientific and Technical Information (OSTI), ottobre 2010. http://dx.doi.org/10.2172/1004248.
Testo completoGorski, Janusz. The 12th International Conference on Computer Safety, Reliability and Security. Fort Belvoir, VA: Defense Technical Information Center, ottobre 1993. http://dx.doi.org/10.21236/ada278165.
Testo completoDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users? Manual. Office of Scientific and Technical Information (OSTI), marzo 2009. http://dx.doi.org/10.2172/950986.
Testo completoGill, Janet A. Flight Control Computer Development Through Application of Software Safety Technology,. Fort Belvoir, VA: Defense Technical Information Center, ottobre 1995. http://dx.doi.org/10.21236/ada305293.
Testo completoCaldwell, John A., Jones Jr., Carter Heber D., Caldwell David J. e J. L. The Relationship Between Computer Scoring and Safety-Pilot Grading of Flight Performance. Fort Belvoir, VA: Defense Technical Information Center, luglio 1992. http://dx.doi.org/10.21236/ada256245.
Testo completoFalkov, A. A., V. S. Kuul e O. B. Samoilov. Experimental assessment of computer codes used for safety analysis of integral reactors. Office of Scientific and Technical Information (OSTI), settembre 1995. http://dx.doi.org/10.2172/115099.
Testo completoSmith, O., J. Renier, F. Difilippo, N. Clapp, A. Sozer, R. Booth, W. Craddick e D. Morris. PWR hybrid computer model for assessing the safety implications of control systems. Office of Scientific and Technical Information (OSTI), marzo 1986. http://dx.doi.org/10.2172/5832266.
Testo completoWenzel, D. R. The Radiological Safety Analysis Computer Program (RSAC-5) user`s manual. Revision 1. Office of Scientific and Technical Information (OSTI), febbraio 1994. http://dx.doi.org/10.2172/10157789.
Testo completoPevnitsky, A. V., V. A. Tarasov e V. P. Solovyev. Comparison between VNIIEF computer programs used to study NPP safety and similar western codes. Office of Scientific and Technical Information (OSTI), dicembre 1995. http://dx.doi.org/10.2172/219462.
Testo completo