Biomedical Engineering Reference
In-Depth Information
5. Archinoff, G. H., Hohendorf, R. J., Wassyng, A., Quigley, B., & Borsch, M. R. (1990).
Verification of the shutdown system software at the Darlington nuclear generating station .
Presented at the international conference on control instrumentation and nuclear installations,
Glasgow.
6. Artigou, J. Y., & Monsuez, J. J. (2007). Cardiologie et maladies vasculaires . Paris: Elsevier
Masson.
7. Bayes, B. V. N., de Luna, A., & Malik, M. (2006). The morphology of the electrocardiogram.
In The ESC textbook of cardiovascular medicine (pp. 1-36). Oxford: Blackwell.
8. Bell, R., & Reinert, D. (1993). Risk and system integrity concepts for safety-related control
systems. Microprocessors and Microsystems , 17 , 3-15.
9. Berry, G., Bouali, A., Fornari, X., Ledinot, E., Nassor, E., & de Simone, R. (2000). ES-
TEREL: A formal method applied to avionic software development. Science of Computer
Programming , 36 (1), 5-25.
10. Bjørner, D., & Jones, C. B. (Eds.) (1978). The Vienna development method: The meta-
language . London: Springer.
11. Blanc, L., & Dissoubray, S. (2000). Esterel methodology for complex system design. Micro-
electronic Engineering , 54 (1-2), 163-170.
12. Blanchard, B. S., & Fabrycky, W. J. (2006). Prentice Hall international series in industrial
and systems engineering . Systems engineering and analysis . Upper Saddle River: Pearson
Prentice Hall.
13. Bowen, J., & Stavridou, V. (1993). Safety-critical systems, formal methods and standards.
Software Engineering Journal , 8 (4), 189-209.
14. Bozzano, M., & Villafiorita, A. (2010). Design and safety assessment of critical systems (1st
ed.). Boston: Auerbach.
15. Britt, J. J. (1994). Case study: Applying formal methods to the traffic alert and collision
avoidance system (TCAS) II. In Ninth annual conference on computer assurance ,COM-
PASS'94 (pp. 39-51).
16. Butler, M., & Yadav, D. (2007). An incremental development of the Mondex system in Event-
B. Formal Aspects of Computing , 20 (1), 61-77.
17. Cai, K.-Y. (1996). Introduction to fuzzy reliability . Norwell: Kluwer Academic.
18. CC. Common criteria. http://www.commoncriteriaportal.org/ .
19. CC (2009). Common criteria for information technology security evaluation, part 1: Intro-
duction and general model. http://www.iec.ch/ .
20. CC (2009). Common criteria for information technology security evaluation, part 2: Security
functional requirements. http://www.iec.ch/ .
21. CC (2009). Common criteria for information technology security evaluation, part 3: Security
assurance components. http://www.iec.ch/ .
22. CDRH (2006). Safety of marketed medical devices. Center for Devices and Radiological
Health, US FDA.
23. Clarke, E. M., & Wing, J. M. (1996). Formal methods: State of the art and future directions.
ACM Computing Surveys , 28 , 626-643.
24. Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Miné, A., Monniaux, D., et al. (2007). Com-
bination of abstractions in the Astrée static analyzer. In Lecture notes in computer science .
Proceedings of the 11th Asian computing science conference on advances in computer sci-
ence: Secure software and related issues (pp. 272-300). Berlin: Springer.
25. Craigen, D., Gerhart, S., & Ralston, T. (1993). An international survey of industrial applica-
tions of formal methods. In J. P. Bowen & J. E. Nicholls (Eds.), Workshops in computing .
Z user workshop , London, 1992 (pp. 1-5). London: Springer. ISBN 978-3-540-19818-5.
26. Crow, J., Owre, S., Rushby, J., Shankar, N., & Srivas, A. (1995). A tutorial introduction to
PVS . Computer Science Laboratory, SRI International.
27. Cullyer, W. J. (1989). Implementing high integrity systems: The viper microprocessor. IEEE
Aerospace and Electronic Systems Magazine , 4 (6), 5-13.
28. Cullyer, W. J., Goodenough, S. J., & Wichmann, B. A. (1991). The choice of computer
languages for use in safety critical systems. Software Engineering Journal , 6 , 51-58.
Search WWH ::




Custom Search