-
1
-
-
0034826427
-
SafeTSA: A Type Safe and Referentially Secure Mobile-Code Representation Based on Static Single Assignment Form
-
W. Amme, N. Dalton, M. Franz, and J. Von Ronne, SafeTSA: A Type Safe and Referentially Secure Mobile-Code Representation Based on Static Single Assignment Form, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2001.
-
(2001)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Amme, W.1
Dalton, N.2
Franz, M.3
Von Ronne, J.4
-
3
-
-
0000703331
-
Applying New Scheduling Theory to Static Priority Pre-emptive Scheduling
-
N. Audsley, A. Burns, M. Richardson, K. Tindell, and A. Wellings, Applying New Scheduling Theory to Static Priority Pre-emptive Scheduling, Software Engineering Journal, 8(5), 284-92, 1993.
-
(1993)
Software Engineering Journal
, vol.8
, Issue.5
, pp. 284-292
-
-
Audsley, N.1
Burns, A.2
Richardson, M.3
Tindell, K.4
Wellings, A.5
-
9
-
-
33747127291
-
The Ravenscar Tasking Profile for High Integrity Real-Time Programs
-
L. Asplund, editor, Proceedings of Ada-Europe 98, Berlin Heidelberg, Germany, Springer-Verlag
-
A. Burns, B. Dobbing, and G. Romanski, The Ravenscar Tasking Profile for High Integrity Real-Time Programs, In L. Asplund, editor, Proceedings of Ada-Europe 98, LNCS, Vol. 1411, pages 263-275, Berlin Heidelberg, Germany, Springer-Verlag 1998.
-
(1998)
LNCS
, vol.1411
, pp. 263-275
-
-
Burns, A.1
Dobbing, B.2
Romanski, G.3
-
10
-
-
0033203859
-
Escape Analysis for Java
-
J. D. Choi, M. Gupta, M. J. Serrano, V. C. Sreedhar, and S. P. Midkiff, Escape Analysis for Java, Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 1999.
-
(1999)
Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA)
-
-
Choi, J.D.1
Gupta, M.2
Serrano, M.J.3
Sreedhar, V.C.4
Midkiff, S.P.5
-
11
-
-
84966969915
-
-
P. Dibble, Personal communications, October 2002
-
P. Dibble, Personal communications, October 2002.
-
-
-
-
12
-
-
0242527897
-
The Ravenscar Profile for High Integrity Java Programs?
-
March
-
B. Dobbing, The Ravenscar Profile for High Integrity Java Programs?, ACM Ada Letters, Vol. 21, Issue. 1, March 2001.
-
(2001)
ACM Ada Letters
, vol.21
, Issue.1
-
-
Dobbing, B.1
-
15
-
-
0242527896
-
-
NUREG/CR-6463, U.S. Nuclear Regulatory Commission, last accessed in January 2002
-
H. Hetcht, M. Hecht, S. Graff, et al, Review Guidelines for Software Languages for Use in Nuclear Power Plant Systems, NUREG/CR-6463, U.S. Nuclear Regulatory Commission, 1997, also available at http://fermi.sohar.com/J1030/index.htm, last accessed in January 2002.
-
(1997)
Review Guidelines for Software Languages for Use in Nuclear Power Plant Systems
-
-
Hetcht, H.1
Hecht, M.2
Graff, S.3
-
18
-
-
0242444383
-
-
Technical Report Version 2, York Software Engineering, University of York, July
-
A. Hutcheon, B. Jepson, D. Jordan, and I. Wand, A Study of High Integrity Ada: Language Review, Technical Report SLS31c/73-1-D, Version 2, York Software Engineering, University of York, July 1992.
-
(1992)
A Study of High Integrity Ada: Language Review
-
-
Hutcheon, A.1
Jepson, B.2
Jordan, D.3
Wand, I.4
-
21
-
-
0242443902
-
Ravenscar-Java: A High Integrity Profile for Real-Time Java
-
Seattle, Washington
-
J. Kwon, A. Wellings, S. King, Ravenscar-Java: A High Integrity Profile for Real-Time Java, Proceedings of the Joint ACM Java Grande - ISCOPE 2002 Conference, Seattle, Washington, 2002.
-
(2002)
Proceedings of the Joint ACM Java Grande - ISCOPE 2002 Conference
-
-
Kwon, J.1
Wellings, A.2
King, S.3
-
22
-
-
0141460203
-
-
Technical Report Department of Computer Science, University of York
-
J. Kwon, A. Wellings, and S. King, Assessment of the Java Programming Language for Use in High Integrity Systems, Technical Report YCS 341, Department of Computer Science, University of York, 2002, available at http://www.cs.york.ac.uk/ftpdir/reports/YCS-2002-341.pdf.
-
(2002)
Assessment of the Java Programming Language for Use in High Integrity Systems
-
-
Kwon, J.1
Wellings, A.2
King, S.3
-
23
-
-
0022730231
-
Software Safety: Why, What, and How
-
ACM, June
-
N. G. Leveson, Software Safety: Why, What, and How, Computing Surveys, Vol. 18, No. 2, ACM, June 1986.
-
(1986)
Computing Surveys
, vol.18
, Issue.2
-
-
Leveson, N.G.1
-
24
-
-
0026104017
-
Software Safety in Embedded Computer Systems
-
February
-
N. G. Leveson, Software Safety in Embedded Computer Systems, Communications of the ACM, Vol. 34, No. 2, February 1991.
-
(1991)
Communications of the ACM
, vol.34
, Issue.2
-
-
Leveson, N.G.1
-
25
-
-
84974687699
-
Scheduling Algorithms for Multiprogramming in a Hard Real-time Environment
-
C. Liu and J. Layland, Scheduling Algorithms for Multiprogramming in a Hard Real-time Environment, Journal of ACM, 20(1), 46-61, 1973.
-
(1973)
Journal of ACM
, vol.20
, Issue.1
, pp. 46-61
-
-
Liu, C.1
Layland, J.2
-
27
-
-
0025436318
-
Evaluation of Safety-Critical Software
-
June
-
D. L. Parnas, A. J. van Schouwen, and S. P. Kwan, Evaluation of Safety-Critical Software, Communications of the ACM, Vol. 33, No. 6, June 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.6
-
-
Parnas, D.L.1
Van Schouwen, A.J.2
Kwan, S.P.3
|