Biomedical Engineering Reference
In-Depth Information
5. Archinoff, G. H., Hohendorf, R. J., Wassyng, A., Quigley, B., & Borsch, M. R. (1990).
Verification of the shutdown system software at the Darlington nuclear generating station
.
Presented at the international conference on control instrumentation and nuclear installations,
Glasgow.
6. Artigou, J. Y., & Monsuez, J. J. (2007).
Cardiologie et maladies vasculaires
. Paris: Elsevier
Masson.
7. Bayes, B. V. N., de Luna, A., & Malik, M. (2006). The morphology of the electrocardiogram.
In
The ESC textbook of cardiovascular medicine
(pp. 1-36). Oxford: Blackwell.
8. Bell, R., & Reinert, D. (1993). Risk and system integrity concepts for safety-related control
systems.
Microprocessors and Microsystems
,
17
, 3-15.
9. Berry, G., Bouali, A., Fornari, X., Ledinot, E., Nassor, E., & de Simone, R. (2000). ES-
TEREL: A formal method applied to avionic software development.
Science of Computer
Programming
,
36
(1), 5-25.
10. Bjørner, D., & Jones, C. B. (Eds.) (1978).
The Vienna development method: The meta-
language
. London: Springer.
11. Blanc, L., & Dissoubray, S. (2000). Esterel methodology for complex system design.
Micro-
electronic Engineering
,
54
(1-2), 163-170.
12. Blanchard, B. S., & Fabrycky, W. J. (2006).
Prentice Hall international series in industrial
and systems engineering
.
Systems engineering and analysis
. Upper Saddle River: Pearson
Prentice Hall.
13. Bowen, J., & Stavridou, V. (1993). Safety-critical systems, formal methods and standards.
Software Engineering Journal
,
8
(4), 189-209.
14. Bozzano, M., & Villafiorita, A. (2010).
Design and safety assessment of critical systems
(1st
ed.). Boston: Auerbach.
15. Britt, J. J. (1994). Case study: Applying formal methods to the traffic alert and collision
avoidance system (TCAS) II. In
Ninth annual conference on computer assurance
,COM-
PASS'94 (pp. 39-51).
16. Butler, M., & Yadav, D. (2007). An incremental development of the Mondex system in Event-
B.
Formal Aspects of Computing
,
20
(1), 61-77.
17. Cai, K.-Y. (1996).
Introduction to fuzzy reliability
. Norwell: Kluwer Academic.
18. CC. Common criteria.
http://www.commoncriteriaportal.org/
.
19. CC (2009). Common criteria for information technology security evaluation, part 1: Intro-
duction and general model.
http://www.iec.ch/
.
20. CC (2009). Common criteria for information technology security evaluation, part 2: Security
functional requirements.
http://www.iec.ch/
.
21. CC (2009). Common criteria for information technology security evaluation, part 3: Security
assurance components.
http://www.iec.ch/
.
22. CDRH (2006). Safety of marketed medical devices. Center for Devices and Radiological
Health, US FDA.
23. Clarke, E. M., & Wing, J. M. (1996). Formal methods: State of the art and future directions.
ACM Computing Surveys
,
28
, 626-643.
24. Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Miné, A., Monniaux, D., et al. (2007). Com-
bination of abstractions in the Astrée static analyzer. In
Lecture notes in computer science
.
Proceedings of the 11th Asian computing science conference on advances in computer sci-
ence: Secure software and related issues
(pp. 272-300). Berlin: Springer.
25. Craigen, D., Gerhart, S., & Ralston, T. (1993). An international survey of industrial applica-
tions of formal methods. In J. P. Bowen & J. E. Nicholls (Eds.),
Workshops in computing
.
Z user workshop
, London, 1992 (pp. 1-5). London: Springer. ISBN 978-3-540-19818-5.
26. Crow, J., Owre, S., Rushby, J., Shankar, N., & Srivas, A. (1995).
A tutorial introduction to
PVS
. Computer Science Laboratory, SRI International.
27. Cullyer, W. J. (1989). Implementing high integrity systems: The viper microprocessor.
IEEE
Aerospace and Electronic Systems Magazine
,
4
(6), 5-13.
28. Cullyer, W. J., Goodenough, S. J., & Wichmann, B. A. (1991). The choice of computer
languages for use in safety critical systems.
Software Engineering Journal
,
6
, 51-58.
Search WWH ::
Custom Search