Biomedical Engineering Reference
In-Depth Information
7. Berry, G. (2007). Synchronous design and verification of critical embedded systems using
SCADE and Esterel. In
Formal methods for industrial critical systems
, FMICS (p. 2).
8. Bertolino, A., & Strigini, L. (1997). Acceptance criteria for critical software based on testa-
bility estimates and test results. In
Lecture notes in computer science
.
Proceedings of the
15th international conference on computer safety, reliability and security
, SAFECOMP'96
(pp. 83-94). Berlin: Springer.
9. Bjørner, D., & Jones, C. B. (Eds.) (1978).
The Vienna development method: The meta-
language
. London: Springer.
10. Boehm, B. W. (1976). Software engineering.
IEEE Transactions on Computers
,
25
, 1226-
1241.
11. Börger, E., & Stärk, R. (2003).
Abstract state machines: A method for high-level system design
and analysis
. Berlin: Springer.
12. Bowen, J., & Stavridou, V. (1993). Safety-critical systems, formal methods and standards.
Software Engineering Journal
,
8
(4), 189-209.
13. Butler, R. W. (1996).
An introduction to requirements capture using PVS: Specification of
a simple autopilot
(NASA Technical Memorandum 110255). Hampton: NASA Langley Re-
search Center.
14. Carloni, L. P., McMillan, K. L., Saldanha, A., & Sangiovanni-Vincentelli, A. L. (1999).
A methodology for correct-by-construction latency insensitive design. In
Proceedings of the
1999 IEEE/ACM international conference on computer-aided design
, ICCAD'99 (pp. 309-
315). Piscataway: IEEE Press.
15. CC. Common criteria.
http://www.commoncriteriaportal.org/
.
16. CDRH (2006). Safety of marketed medical devices. Center for Devices and Radiological
Health, US FDA.
17. Clarke, E. M., Grumberg, O., & Peled, D. (2001).
Model checking
. Cambridge: MIT Press.
18. Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Miné, A., Monniaux, D., et al. (2007). Com-
bination of abstractions in the Astrée static analyzer. In
Lecture notes in computer science
.
Proceedings of the 11th Asian computing science conference on advances in computer sci-
ence: Secure software and related issues
(pp. 272-300). Berlin: Springer.
19. Crow, J., Owre, S., Rushby, J., Shankar, N., & Srivas, A. (1995).
A tutorial introduction to
PVS
. Computer Science Laboratory, SRI International.
20. De Weese, P. R., Moore, J. W., & Rilling, D. (1997). U.S. software life cycle process standards.
Crosstalk: The DoD Journal of Software Engineering
.
21. Distaso, J. R. (1980). Software management—a survey of the practice in 1980.
Proceedings
of the IEEE
,
68
(9), 1103-1119.
22. Farn, K.-J., Lin, S.-K., & Fung, A. R.-W. (2004). A study on information security management
system evaluation—assets, threat and vulnerability.
Computer Standards & Interfaces
,
26
(6),
501-513.
23. FDA. Food and Drug Administration.
http://www.fda.gov/
.
24. Gomes, A., & Oliveira, M. (2009). Formal specification of a cardiac pacing system. In A. Cav-
alcanti & D. Dams (Eds.),
Lecture notes in computer science: Vol. 5850
.
FM 2009: Formal
methods
(pp. 692-707). Berlin: Springer.
25. Halbwachs, N., Caspi, P., Raymond, P., & Pilaud, D. (1991). The synchronous dataflow pro-
gramming language Lustre. In
Proceedings of the IEEE
(pp. 1305-1320).
26. Heitmeyer, C. L. (2009). On the role of formal methods in software certification: An experi-
ence report.
Electronic Notes in Theoretical Computer Science
,
238
(4), 3-9.
27. Heitmeyer, C. L., Archer, M., Leonard, E. I., & McLean, J. (2008). Applying formal methods
to a certifiably secure software system.
IEEE Transactions on Software Engineering
,
34
(1),
82-98.
28. High Confidence Software and Systems Coordinating Group (2009).
High-confidence medi-
cal devices: Cyber-physical systems for 21st century health care
(Technical report). NITRD.
Search WWH ::
Custom Search