Gotowa bibliografia na temat „Computer safety”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Computer safety”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Computer safety"
MUKAIDONO, Masao. "Computer Safety and Functional Safety". IEICE ESS FUNDAMENTALS REVIEW 4, nr 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.
Pełny tekst źródłaGorodetskii, V. I., I. V. Kotenko i R. M. Yusupov. "Computer networks safety". Herald of the Russian Academy of Sciences 76, nr 4 (lipiec 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.
Pełny tekst źródłaNestler, Simon. "Safety-critical human computer interaction". it - Information Technology 61, nr 1 (25.02.2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.
Pełny tekst źródłaWalczak, Andrzej, i Karol Antczak. "Patient Safety versus Computer Diagnosis". MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.
Pełny tekst źródłaZalewski, Janusz. "Safety of Computer Control System". IFAC Proceedings Volumes 34, nr 22 (listopad 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.
Pełny tekst źródłaZalewski, Janusz. "Safety aspects of computer control". Control Engineering Practice 3, nr 3 (marzec 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.
Pełny tekst źródłaCao, Yuan, Hongkang Lu i Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing". Sensors 19, nr 4 (17.02.2019): 818. http://dx.doi.org/10.3390/s19040818.
Pełny tekst źródłaChen, Li-Shan, Yen-Ming Tseng i Xiao-Na Lin. "Artificial intelligence in safety system". MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.
Pełny tekst źródłaSingh, Lalit Kumar, i Hitesh Rajput. "Ensuring safety in design of safety critical computer based systems". Annals of Nuclear Energy 92 (czerwiec 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.
Pełny tekst źródłaZhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma i Yinghong Wen. "Safety Mechanism Design and Verification of Safety Computer Parallel Program". Chinese Journal of Electronics 27, nr 6 (1.11.2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.
Pełny tekst źródłaRozprawy doktorskie na temat "Computer safety"
Simpson, Andrew C. "Safety through security". Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Pełny tekst źródłaConmy, Philippa Mary. "Safety analysis of computer resource management software". Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428494.
Pełny tekst źródłaAn, Hong. "Computer-aided applications in process plant safety". Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.
Pełny tekst źródłaWang, Yuan-Fang. "Computer Vision Analysis for Vehicular Safety Applications". International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.
Pełny tekst źródłaIn this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For autonomous vehicles, we are investigating a visual analysis scheme for collision avoidance during back up and an algorithm for automated 3D map building. These algorithms are relevant to the telemetering domain as they involve determining the relative pose between a vehicle and other vehicles on the road, or between a vehicle and its 3D driving environment, or between a vehicle and obstacles surrounding the vehicle.
Reyad, Passant. "Application of computer vision techniques in safety diagnosis and evaluation of safety treatments". Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59701.
Pełny tekst źródłaApplied Science, Faculty of
Graduate
Pumfrey, David John. "The principled design of computer system safety analyses". Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9797/.
Pełny tekst źródłaAkritidis, Periklis. "Practical memory safety for C". Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609600.
Pełny tekst źródłaFaulkner, Alastair. "Data integrity : an often-ignored aspect of safety systems : executive summary". Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.
Pełny tekst źródłaDheedan, Amer Abdaladeem. "Distributed on-line safety monitor based on safety assessment model and multi-agent system". Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:6065.
Pełny tekst źródłaGraydon, Iain R. "Comprehension of 500 safety words : a computer-based methodology". Thesis, Aston University, 1986. http://publications.aston.ac.uk/12307/.
Pełny tekst źródłaKsiążki na temat "Computer safety"
Paul, Mason. Understanding computer safety. Chicago, Illinois: Capstone Heinemann Library, 2015.
Znajdź pełny tekst źródłaSafety-critical computer systems. Harlow, England: Addison-Wesley, 1996.
Znajdź pełny tekst źródłaBoulanger, Jean-Louis. Safety of computer architectures. London, UK: ISTE, 2010.
Znajdź pełny tekst źródłaBoulanger, Jean-Louis. Safety of computer architectures. London, UK: ISTE, 2010.
Znajdź pełny tekst źródłaHabli, Ibrahim, Mark Sujan i Friedemann Bitsch, red. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83903-1.
Pełny tekst źródłaTrapp, Mario, Francesca Saglietti, Marc Spisländer i Friedemann Bitsch, red. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14835-4.
Pełny tekst źródłaPasquini, Alberto. Computer Safety, Reliability and Security. Redaktorzy Massimo Felici i Karama Kanoun. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48249-0.
Pełny tekst źródłaSchoitsch, Erwin, red. Computer Safety, Reliability, and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15651-9.
Pełny tekst źródłaKoornneef, Floor, i Meine van der Meulen, red. Computer Safety, Reliability and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40891-6.
Pełny tekst źródłaTonetta, Stefano, Erwin Schoitsch i Friedemann Bitsch, red. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66266-4.
Pełny tekst źródłaCzęści książek na temat "Computer safety"
Cook, Byron, Andreas Podelski i Andrey Rybalchenko. "Terminator: Beyond Safety". W Computer Aided Verification, 415–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11817963_37.
Pełny tekst źródłaRusu, Vlad, Hervé Marchand, Valéry Tschaen, Thierry Jéron i Bertrand Jeannet. "From Safety Verification to Safety Testing". W Lecture Notes in Computer Science, 160–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24704-3_11.
Pełny tekst źródłaWeik, Martin H. "safety message". W Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16561.
Pełny tekst źródłaWeik, Martin H. "safety ring". W Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16563.
Pełny tekst źródłaWeik, Martin H. "safety signal". W Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16564.
Pełny tekst źródłaWeik, Martin H. "safety traffic". W Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16565.
Pełny tekst źródłaJaffar, Joxan, Andrew E. Santosa i Răzvan Voicu. "Relative Safety". W Lecture Notes in Computer Science, 282–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11609773_19.
Pełny tekst źródłaLal, Ratan, Aaron McKinnis, Dustin Hauptman, Shawn Keshmiri i Pavithra Prabhakar. "Formally Verified Switching Logic for Recoverability of Aircraft Controller". W Computer Aided Verification, 566–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_27.
Pełny tekst źródłaBaro, Sylvain. "A High-Availability Safety Computer". W Security of Computer Architectures, 425–46. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch11.
Pełny tekst źródłaVan de Velde, Rudi. "Computer Safety in Healthcare Systems". W Hospital Information Systems — The Next Generation, 82–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77617-5_9.
Pełny tekst źródłaStreszczenia konferencji na temat "Computer safety"
Hill, Janice, i Rhoda Baggs. "Software safety risk in legacy safety-critical computer systems". W Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342891.
Pełny tekst źródłaTangming Yuan i Tianhua Xu. "Computer System Safety Argument Schemes". W 2010 Second World Congress on Software Engineering (WCSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/wcse.2010.37.
Pełny tekst źródłaWisniewski, Pamela J., Heng Xu, Mary Beth Rosson i John M. Carroll. "Adolescent online safety". W CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531696.
Pełny tekst źródłaOzarin, Nathaniel. "Developing Rules for Failure Modes and Effects Analysis of Computer Software". W Advances in Aviation Safety. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2003. http://dx.doi.org/10.4271/2003-01-2987.
Pełny tekst źródłaHu, Dong, Dong Zhou i Ping Li. "Research on Hardware Built-in Computer Safety". W 2006 International Conference on Communications, Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/icccas.2006.284976.
Pełny tekst źródłaNEUMANN, PETER. "Safety of computer systems in aerospace applications". W 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3121.
Pełny tekst źródłaWhite, D. B., M. Weishaupt i D. J. Kent. "A Computer Monitoring System Improves Rig Safety". W SPE Health, Safety and Environment in Oil and Gas Exploration and Production Conference. Society of Petroleum Engineers, 1991. http://dx.doi.org/10.2118/23249-ms.
Pełny tekst źródłaRamaiah, P. Seetha, M. Ben Swarup i K. Raja Kumar. "Conceptual Modeling for Safety Critical Computer Systems". W 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE, 2008. http://dx.doi.org/10.1109/snpd.2008.96.
Pełny tekst źródłaSchwamm, Friedrich. "FADEC Computer Systems for Safety Critical Application". W ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-170.
Pełny tekst źródłaLeveson, Nancy G. "System Safety in Computer-Controlled Automotive Systems". W SAE 2000 World Congress. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2000. http://dx.doi.org/10.4271/2000-01-1048.
Pełny tekst źródłaRaporty organizacyjne na temat "Computer safety"
Espinosa, D. L., W. F. Fields, D. E. Gittins i M. L. Roberts. B190 computer controlled radiation monitoring and safety interlock system. Office of Scientific and Technical Information (OSTI), sierpień 1998. http://dx.doi.org/10.2172/3643.
Pełny tekst źródłaDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.2 Users? Manual. Office of Scientific and Technical Information (OSTI), październik 2010. http://dx.doi.org/10.2172/1004248.
Pełny tekst źródłaGorski, Janusz. The 12th International Conference on Computer Safety, Reliability and Security. Fort Belvoir, VA: Defense Technical Information Center, październik 1993. http://dx.doi.org/10.21236/ada278165.
Pełny tekst źródłaDr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users? Manual. Office of Scientific and Technical Information (OSTI), marzec 2009. http://dx.doi.org/10.2172/950986.
Pełny tekst źródłaGill, Janet A. Flight Control Computer Development Through Application of Software Safety Technology,. Fort Belvoir, VA: Defense Technical Information Center, październik 1995. http://dx.doi.org/10.21236/ada305293.
Pełny tekst źródłaCaldwell, John A., Jones Jr., Carter Heber D., Caldwell David J. i J. L. The Relationship Between Computer Scoring and Safety-Pilot Grading of Flight Performance. Fort Belvoir, VA: Defense Technical Information Center, lipiec 1992. http://dx.doi.org/10.21236/ada256245.
Pełny tekst źródłaFalkov, A. A., V. S. Kuul i O. B. Samoilov. Experimental assessment of computer codes used for safety analysis of integral reactors. Office of Scientific and Technical Information (OSTI), wrzesień 1995. http://dx.doi.org/10.2172/115099.
Pełny tekst źródłaSmith, O., J. Renier, F. Difilippo, N. Clapp, A. Sozer, R. Booth, W. Craddick i D. Morris. PWR hybrid computer model for assessing the safety implications of control systems. Office of Scientific and Technical Information (OSTI), marzec 1986. http://dx.doi.org/10.2172/5832266.
Pełny tekst źródłaWenzel, D. R. The Radiological Safety Analysis Computer Program (RSAC-5) user`s manual. Revision 1. Office of Scientific and Technical Information (OSTI), luty 1994. http://dx.doi.org/10.2172/10157789.
Pełny tekst źródłaPevnitsky, A. V., V. A. Tarasov i V. P. Solovyev. Comparison between VNIIEF computer programs used to study NPP safety and similar western codes. Office of Scientific and Technical Information (OSTI), grudzień 1995. http://dx.doi.org/10.2172/219462.
Pełny tekst źródła