000 | 03174nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-40793-2 | ||
003 | DE-He213 | ||
005 | 20200421111850.0 | ||
007 | cr nn 008mamaa | ||
008 | 130827s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642407932 _9978-3-642-40793-2 |
||
024 | 7 |
_a10.1007/978-3-642-40793-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aComputer Safety, Reliability, and Security _h[electronic resource] : _b32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings / _cedited by Friedemann Bitsch, J�er�emie Guiochet, Mohamed Ka�aniche. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXVI, 304 p. 109 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8153 |
|
505 | 0 | _aSafety Requirements and Assurance -- Testing and Verification -- Security -- Software Reliability Assessment -- Practical Experience Reports and Tools -- Safety Assurance in Automotive -- Error Control Codes -- Dependable User Interfaces.- Hazard and Failure Mode Analysis. | |
520 | _aThis book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held in Toulouse, France, in September 2013. The 20 revised full papers presented together with 5 practical experience reports were carefully reviewed and selected from more than 88 submissions. The papers are organized in topical sections on safety requirements and assurance, testing and verification, security, software reliability assessment, practical experience reports and tools, safety assurance in automotive, error control codes, dependable user interfaces, and hazard and failure mode analysis. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aSpecial purpose computers. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
700 | 1 |
_aBitsch, Friedemann. _eeditor. |
|
700 | 1 |
_aGuiochet, J�er�emie. _eeditor. |
|
700 | 1 |
_aKa�aniche, Mohamed. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642407925 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8153 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-40793-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c56041 _d56041 |