Siga este link para ver outros tipos de publicações sobre o tema: Computer safety.

Artigos de revistas sobre o tema "Computer safety"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Computer safety".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

MUKAIDONO, Masao. "Computer Safety and Functional Safety". IEICE ESS FUNDAMENTALS REVIEW 4, n.º 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Gorodetskii, V. I., I. V. Kotenko e R. M. Yusupov. "Computer networks safety". Herald of the Russian Academy of Sciences 76, n.º 4 (julho de 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Nestler, Simon. "Safety-critical human computer interaction". it - Information Technology 61, n.º 1 (25 de fevereiro de 2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.

Texto completo da fonte
Resumo:
Abstract Dealing with usability issues of safety-critical interactive systems is essential for an efficient, effective and joyful use of these systems. This paper describes a prototypical safety-critical environment and discusses the HCI (human computer interaction) challenges of different interactive systems for safety-critical environments. We designed, developed and evaluated various interactive systems which solve different challenges in so-called mass casualty incidents (MCIs). In summary, we made contributions to three different areas of application: Mobile computing in safety-critical environments, simulation of safety-critical environments and social media in safety-critical environments. Finally, this paper gives further insights how all these research results can to be brought together in the future in order to be able to build usable interactive systems for safety-critical environments.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Walczak, Andrzej, e Karol Antczak. "Patient Safety versus Computer Diagnosis". MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Zalewski, Janusz. "Safety of Computer Control System". IFAC Proceedings Volumes 34, n.º 22 (novembro de 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Zalewski, Janusz. "Safety aspects of computer control". Control Engineering Practice 3, n.º 3 (março de 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Cao, Yuan, Hongkang Lu e Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing". Sensors 19, n.º 4 (17 de fevereiro de 2019): 818. http://dx.doi.org/10.3390/s19040818.

Texto completo da fonte
Resumo:
The safety computer in the train control system is designed to be the double two-vote-two architecture. If safety-critical multi-input data are inconsistent, this may cause non-strict multi-sensor data problems in the output. These kinds of problems may directly affect the decision making of the safety computer and even pose a serious threat to the safe operation of the train. In this paper, non-strict multi-sensor data problems that exist in traditional safety computers are analyzed. The input data are classified based on data features and safety computer features. Then, the input data that cause non-strict multi-sensor data problems are modeled. Fuzzy theory is used in the safety computer to process multi-sensor data and to avoid the non-strict multi-sensor problems. The fuzzy processing model is added into the onboard double two-vote-two architecture safety computer platform. The fuzzy processing model can be divided into two parts: improved fuzzy decision tree and improved fuzzy weighted fusion. Finally, the model is verified based on two kinds of data. Verification results indicate that the fuzzy processing model can effectively reduce the non-strict identical problems and improve the system efficiency on the premise of ensuring the data reliability.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Chen, Li-Shan, Yen-Ming Tseng e Xiao-Na Lin. "Artificial intelligence in safety system". MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.

Texto completo da fonte
Resumo:
This research aims to study learning environment, and let the learning environment become smart. Swarm intelligence, cloud computing, and active Ultra-High Frequency RFID were used on it. We built friendly human-computer-interface software for users to use as pad phone. The Extensible Markup Language (XML) and C sharp language were used in this research. If the users begin to search, the kernel safety learning system automatically communicates with other RFID readers by agents, and the agents can search the closer camera for users. This study’s result has successfully implemented to Chin-Huo educational organization, and it would be helpful for the paterfamilias to hold all situations about their children at Chin-Huo educational organization. Paterfamilias can understand their children’s learning, going to Chin-Huo and leaving Chin-Huo through personal computers, or notebooks simultaneously or asynchronously by the computer-mediated communication. That will be great help in the grip of whole after-school remedial education, teaching and learning situation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Singh, Lalit Kumar, e Hitesh Rajput. "Ensuring safety in design of safety critical computer based systems". Annals of Nuclear Energy 92 (junho de 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Zhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma e Yinghong Wen. "Safety Mechanism Design and Verification of Safety Computer Parallel Program". Chinese Journal of Electronics 27, n.º 6 (1 de novembro de 2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

S, Sathesh. "Computer Vision based Real Time Tracking System to Identify Overtaking Vehicles for Safety Precaution Using Single Board Computer". Journal of Advanced Research in Dynamical and Control Systems 12, SP7 (25 de julho de 2020): 1551–61. http://dx.doi.org/10.5373/jardcs/v12sp7/20202258.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Leveson, Nancy G. "Software safety in embedded computer systems". Communications of the ACM 34, n.º 2 (fevereiro de 1991): 34–46. http://dx.doi.org/10.1145/102792.102799.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Weaver, E. Strode. "Do Computer Systems Increase Medication Safety?" Oncology Issues 20, n.º 6 (novembro de 2005): 7. http://dx.doi.org/10.1080/10463356.2005.11883266.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Cram, Nick. "Computer Safety Testing: Myth & Fact". Journal of Clinical Engineering 25, n.º 3 (maio de 2000): 139–40. http://dx.doi.org/10.1097/00004669-200025030-00006.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Udartseva, O., e O. Nikolsky. "Computer Science in Environmental Safety Research". IOP Conference Series: Earth and Environmental Science 459 (15 de abril de 2020): 042043. http://dx.doi.org/10.1088/1755-1315/459/4/042043.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Yang, S. H., e P. W. H. Chung. "Safety considerations of computer-controlled plants". IFAC Proceedings Volumes 32, n.º 2 (julho de 1999): 8769–74. http://dx.doi.org/10.1016/s1474-6670(17)57496-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Hauptmanns, U. "Computer-Aided Valuation of Safety Management". Process Safety and Environmental Protection 76, n.º 4 (novembro de 1998): 286–90. http://dx.doi.org/10.1205/095758298529641.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Nicholson, Mark. "Computer Safety For Modern Bridge Systems". Journal of Navigation 66, n.º 5 (29 de maio de 2013): 789–97. http://dx.doi.org/10.1017/s0373463313000180.

Texto completo da fonte
Resumo:
Computer Based Systems (CBS) and Integrated Bridge Systems (IBS) are being introduced. They provide enhanced navigation capabilities and promote ship safety. However, they are highly complex and are becoming the primary source of data/information used to navigate ships. CBS issues have arisen that challenge current safety assurance and certification practices. This paper explores the potential contribution of System Safety Engineering including technical, operational management and crew capability contributions to CBS/IBS safety. A six step roadmap for the production of best practice guidance for the safe development and operation of such systems is presented.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Bloomfield, R. E. "Standards for safety related computer systems". Reliability Engineering & System Safety 43, n.º 2 (janeiro de 1994): 135–42. http://dx.doi.org/10.1016/0951-8320(94)90059-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Badea, Daniel Onuț, Doru Costin Darabont, Dominic Bucerzan, Alina Trifu, Eduard Smîdu, Eugenia Bulboacă e Vergilică Haralambie. "Occupational safety issues related to computer equipment installation, maintenance and use". MATEC Web of Conferences 354 (2022): 00001. http://dx.doi.org/10.1051/matecconf/202235400001.

Texto completo da fonte
Resumo:
This paper presents the findings of an ongoing INCDPM project developed in collaborations with BB Computers that addresses the occupational safety issues related to computer equipment installation, maintenance and use, with emphasis on risk identification. The method used was The Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA). Using the chart flow and the list of items of this method, a literature search was conducted in Science Direct Freedom Collection, Elsevier database, Web of Science - Core Collection, Springer Link Journals. Keywords such as occupational risks, computer equipment installation, computer maintenance were used to retrieve relevant studies which explicitly reported on occupational risks related to computer equipment installation, maintenance and use. The literature search yielded 900 references, of which 20 articles were selected for full-text screening as specified by the inclusion criteria, and ultimately 10 were included in this review. It was developed an extensive and comprehensive list of occupational risks related to computer equipment installation, maintenance and use. After a classification of the equipment in calculation and processing equipment, electronic displays, printer, special printers network equipment the main risks identified in all categories mentioned above are as follows: electric shock, stress, high workload, slips and trips.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Wang, Pin. "Safety Testing Method Analysis of Computer Software". Applied Mechanics and Materials 299 (fevereiro de 2013): 135–38. http://dx.doi.org/10.4028/www.scientific.net/amm.299.135.

Texto completo da fonte
Resumo:
Along with the computer network application becomes more popular, along with our country Internet market becoming stronger, more and more individuals or enterprises to commercial activities into the electronic commerce platform, so the computer software security has become increasingly important. Therefore, to strengthen the security of computer software protection research is very necessary, and guarantee the software safety is one of the effective means of software security hidden trouble detection. This paper will discuss the computer software system in safety detection method. Computer software security testing technology is existing computer software safety based, effective recognition computer software security problems in.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

M. "A Methodological Framework for Software Safety in Safety Critical Computer Systems". Journal of Computer Science 8, n.º 9 (1 de setembro de 2012): 1564–75. http://dx.doi.org/10.3844/jcssp.2012.1564.1575.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Goring, C. J. "Safety first—applying computer-based safety systems in the offshore environment". Computing & Control Engineering Journal 4, n.º 6 (1993): 245. http://dx.doi.org/10.1049/cce:19930057.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

kotti, Jayasri, e Seetharamaiah Panchumarthy. "The Quantitative Safety Assessment and Evaluation for Safety-Critical Computer Systems". ACM SIGSOFT Software Engineering Notes 41, n.º 1 (22 de fevereiro de 2016): 1–8. http://dx.doi.org/10.1145/2853073.2853091.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Kuldashov, O. H., A. O. Komilov e D. A. Abdusamatov. "COMPUTER MODEL OF IONIZER". International Journal of Advance Scientific Research 02, n.º 12 (1 de dezembro de 2022): 133–39. http://dx.doi.org/10.37547/ijasr-02-12-19.

Texto completo da fonte
Resumo:
Depending on the field of application and nature of high voltage generation technologies used in various economic sectors, several requirements are imposed, in particular, requirements such as service life, environmental safety, work efficiency and energy efficiency. In this work, a computer model for generating high voltages that are safe for humans using transistors designed to amplify semiconductor electrical signals is described.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Yamano, Hidemasa, Yoshiharu Tobita, Satoshi Fujita, Tohru Suzuki, Kenji Kamiyama, Koji Morita, Werner Maschek e Sylvain Pigny. "ICONE15-10462 SIMMER-III : A COUPLED NEUTRONICS-THERMOHYDRAULICS COMPUTER CODE FOR SAFETY ANALYSIS". Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_246.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Yuan, Tangming, e Tim Kelly. "Argument Schemes in Computer System Safety Engineering". Informal Logic 31, n.º 2 (14 de julho de 2011): 89. http://dx.doi.org/10.22329/il.v31i2.2965.

Texto completo da fonte
Resumo:
Safe Safety arguments are key components in a safety case. Too often, safety arguments are constructed without proper reasoning. To address this, we argue that informal logic argument schemes have important roles to play in safety argument construction and reviewing process. Ten commonly used reasoning schemes in computer system safety domain are proposed. The role of informal logic dialogue games in computer system safety arguments reviewing is also discussed and the intended work in this area is proposed. It is anticipated that this work will contribute toward the development of computer system safety arguments, and help to move forward the interplay between research in informal logic and research in computer system safety engineering.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Yoshida, Ruriko, Lillian Paul e Peter Nesbitt. "Stochastic Safety Radius on UPGMA". Algorithms 15, n.º 12 (18 de dezembro de 2022): 483. http://dx.doi.org/10.3390/a15120483.

Texto completo da fonte
Resumo:
Unweighted Pair Group Method with Arithmetic Mean (UPGMA) is one of the most popular distance-based methods to reconstruct an equidistant phylogenetic tree from a distance matrix computed from an alignment of sequences. Since we use equidistant trees as gene trees for phylogenomic analyses under the multi-species coalescent model and since an input distance matrix computed from an alignment of each gene in a genome is estimated via the maximum likelihood estimators, it is important to conduct a robust analysis on UPGMA. Stochastic safety radius, introduced by Steel and Gascuel, provides a lower bound for the probability that a phylogenetic tree reconstruction method returns the true tree topology from a given distance matrix. In this article, we compute the stochastic safety radius of UPGMA for a phylogenetic tree with n leaves. Computational experiments show an improved gap between empirical probabilities estimated from random samples and the true tree topology from UPGMA, increasing confidence in phylogenic results.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Maslov, O. N., e D. Ju Panferov. "Electromagnetic radiation safety of portable computer devices". Infokommunikacionnye tehnologii 13, n.º 4 (dezembro de 2015): 458–64. http://dx.doi.org/10.18469/ikt.2015.13.4.16.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

&NA;. "GP computer network data confirms loratadine's safety". Reactions Weekly &NA;, n.º 424 (outubro de 1992): 4. http://dx.doi.org/10.2165/00128415-199204240-00009.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Danilczuk, Wojciech. "Computer aided quantitative methods in machine safety". AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, n.º 1-2 (28 de fevereiro de 2018): 53–57. http://dx.doi.org/10.24136/atest.2018.007.

Texto completo da fonte
Resumo:
The paper present aspect of machine safety in addition to current legal regulations and international standards and computer aided method of risk analysis. Based on literate and international standards paper author presents most common factors and method of safety estimation. Next, based on author industry experience, computer aided risk analysis has been present. To proceed conformity assessment author used SISTEMA software developed by German institute IFA [10]. The example shown shows simplify calculation method of risk analysis and decrees level of mistake during to designee of machine safety component. Another advantages of computer aided method is simplify to scale it to the more complex system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Sayed, Tarek, Karim Ismail, Mohamed H. Zaki e Jarvis Autey. "Feasibility of Computer Vision-Based Safety Evaluations". Transportation Research Record: Journal of the Transportation Research Board 2280, n.º 1 (janeiro de 2012): 18–27. http://dx.doi.org/10.3141/2280-03.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Stanislaw, Harold. "Computer-Intensive Methods in Traffic Safety Research". International Journal of Occupational Safety and Ergonomics 8, n.º 3 (janeiro de 2002): 353–63. http://dx.doi.org/10.1080/10803548.2002.11076535.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Sowjanya, P. "Computer aided software integrated automated safety system". International Journal of Computer Aided Engineering and Technology 11, n.º 4/5 (2019): 561. http://dx.doi.org/10.1504/ijcaet.2019.10020299.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Sowjanya, P. "Computer aided software integrated automated safety system". International Journal of Computer Aided Engineering and Technology 11, n.º 4/5 (2019): 561. http://dx.doi.org/10.1504/ijcaet.2019.100456.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Yang, S. H., O. Stursberg, P. W. H. Chung e S. Kowalewski. "Automatic safety analysis of computer-controlled plants". Computers & Chemical Engineering 25, n.º 4-6 (maio de 2001): 913–22. http://dx.doi.org/10.1016/s0098-1354(01)00656-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Smith, I. C. "The Maintenance of Computer Based Safety Systems". IFAC Proceedings Volumes 21, n.º 18 (novembro de 1988): 27–33. http://dx.doi.org/10.1016/s1474-6670(17)54527-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Abrahamsen, Cathie. "Optimal patient safety a computer chip away?" Nursing Management (Springhouse) 35, n.º 3 (março de 2004): 47–48. http://dx.doi.org/10.1097/00006247-200403000-00015.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Dunn, W. R. "Cover feature - Designing safety-critical computer systems". Computer 36, n.º 11 (novembro de 2003): 40–46. http://dx.doi.org/10.1109/mc.2003.1244533.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Graber, Mark. "The Safety of Computer-Based Medication Systems". Archives of Internal Medicine 164, n.º 3 (9 de fevereiro de 2004): 339. http://dx.doi.org/10.1001/archinte.164.3.339-b.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Leathley, Bridget A. "Human–computer interaction in safety critical systems". Quality and Reliability Engineering International 11, n.º 6 (1995): 429–33. http://dx.doi.org/10.1002/qre.4680110606.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Fang, Weili, Lieyun Ding, Peter E. D. Love, Hanbin Luo, Heng Li, Feniosky Peña-Mora, Botao Zhong e Cheng Zhou. "Computer vision applications in construction safety assurance". Automation in Construction 110 (fevereiro de 2020): 103013. http://dx.doi.org/10.1016/j.autcon.2019.103013.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Ould, M. "Achieving safety and reliability with computer systems". Information and Software Technology 32, n.º 6 (julho de 1990): 444. http://dx.doi.org/10.1016/0950-5849(90)90134-d.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Hwang, E., A. J. Park, G. Han e E. Song. "Human-Computer interaction in analyzing neighborhood safety". Gerontechnology 21, s (23 de outubro de 2022): 1. http://dx.doi.org/10.4017/gt.2022.21.s.689.opp1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Kotti, Jayasri, e Venkataramana Attada. "The Research Framework for Quantitative Safety Assessment for Safety-Critical Computer Systems". Indian Journal of Science and Technology 10, n.º 9 (1 de fevereiro de 2017): 1–8. http://dx.doi.org/10.17485/ijst/2017/v10i9/101298.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Braun, Matt. "Safety vs. Safety". Biomedical Instrumentation & Technology 47, n.º 5 (1 de setembro de 2013): 440. http://dx.doi.org/10.2345/0899-8205-47.5.440.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Naik, Nikhil, Ramesh Raskar e César A. Hidalgo. "Cities Are Physical Too: Using Computer Vision to Measure the Quality and Impact of Urban Appearance". American Economic Review 106, n.º 5 (1 de maio de 2016): 128–32. http://dx.doi.org/10.1257/aer.p20161030.

Texto completo da fonte
Resumo:
For social scientists, developing an empirical connection between the physical appearance of a city and the behavior and health of its inhabitants has proved challenging due to a lack of data on urban appearance. Can we use computers to quantify urban appearance from street-level imagery? We describe Streetscore: a computer vision algorithm that measures the perceived safety of streetscapes. Using Streetscore to evaluate 19 American cities, we find that the average perceived safety has a strong positive correlation with population density and household income; and the variation in perceived safety has a strong positive correlation with income inequality.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

An, Gang, Yu Li e Xin Li. "Architecture Design of Aviation Fault-tolerant Computer Based on ARINC659 Bus Technology". MATEC Web of Conferences 179 (2018): 03025. http://dx.doi.org/10.1051/matecconf/201817903025.

Texto completo da fonte
Resumo:
The ARINC659 backplane bus is suitable for high safety and high reliability requirements of aircraft on-board computer communication systems. This paper analyzes the structure of ARINC 659 serial backplane bus and the bus fault tolerance mechanism. On the basis of backplane bus, a 4 degree of aviation fault-tolerant computer is designed. Moreover, the computer architecture and computer system of the instruction branch and monitoring branch are designed in the computer channel. The fault-tolerant management of the computer is realized by bus fault tolerance, redundancy voting between computers and the monitoring of the instruction and monitoring branches.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Hughes, Katie E., Scott M. Lewis, Laurence Katz e Jonathan Jones. "Safety of Computer Interpretation of Normal Triage Electrocardiograms". Academic Emergency Medicine 24, n.º 1 (janeiro de 2017): 120–24. http://dx.doi.org/10.1111/acem.13067.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Yuan, Tangming, Tim Kelly e Tianhua Xu. "Computer-assisted safety argument review – a dialectics approach". Argument & Computation 6, n.º 2 (24 de junho de 2014): 130–48. http://dx.doi.org/10.1080/19462166.2014.927921.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia