Biomedical Engineering Reference
In-Depth Information
7. Berry, G. (2007). Synchronous design and verification of critical embedded systems using
SCADE and Esterel. In Formal methods for industrial critical systems , FMICS (p. 2).
8. Bertolino, A., & Strigini, L. (1997). Acceptance criteria for critical software based on testa-
bility estimates and test results. In Lecture notes in computer science . Proceedings of the
15th international conference on computer safety, reliability and security , SAFECOMP'96
(pp. 83-94). Berlin: Springer.
9. Bjørner, D., & Jones, C. B. (Eds.) (1978). The Vienna development method: The meta-
language . London: Springer.
10. Boehm, B. W. (1976). Software engineering. IEEE Transactions on Computers , 25 , 1226-
1241.
11. Börger, E., & Stärk, R. (2003). Abstract state machines: A method for high-level system design
and analysis . Berlin: Springer.
12. Bowen, J., & Stavridou, V. (1993). Safety-critical systems, formal methods and standards.
Software Engineering Journal , 8 (4), 189-209.
13. Butler, R. W. (1996). An introduction to requirements capture using PVS: Specification of
a simple autopilot (NASA Technical Memorandum 110255). Hampton: NASA Langley Re-
search Center.
14. Carloni, L. P., McMillan, K. L., Saldanha, A., & Sangiovanni-Vincentelli, A. L. (1999).
A methodology for correct-by-construction latency insensitive design. In Proceedings of the
1999 IEEE/ACM international conference on computer-aided design , ICCAD'99 (pp. 309-
315). Piscataway: IEEE Press.
15. CC. Common criteria. http://www.commoncriteriaportal.org/ .
16. CDRH (2006). Safety of marketed medical devices. Center for Devices and Radiological
Health, US FDA.
17. Clarke, E. M., Grumberg, O., & Peled, D. (2001). Model checking . Cambridge: MIT Press.
18. Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Miné, A., Monniaux, D., et al. (2007). Com-
bination of abstractions in the Astrée static analyzer. In Lecture notes in computer science .
Proceedings of the 11th Asian computing science conference on advances in computer sci-
ence: Secure software and related issues (pp. 272-300). Berlin: Springer.
19. Crow, J., Owre, S., Rushby, J., Shankar, N., & Srivas, A. (1995). A tutorial introduction to
PVS . Computer Science Laboratory, SRI International.
20. De Weese, P. R., Moore, J. W., & Rilling, D. (1997). U.S. software life cycle process standards.
Crosstalk: The DoD Journal of Software Engineering .
21. Distaso, J. R. (1980). Software management—a survey of the practice in 1980. Proceedings
of the IEEE , 68 (9), 1103-1119.
22. Farn, K.-J., Lin, S.-K., & Fung, A. R.-W. (2004). A study on information security management
system evaluation—assets, threat and vulnerability. Computer Standards & Interfaces , 26 (6),
501-513.
23. FDA. Food and Drug Administration. http://www.fda.gov/ .
24. Gomes, A., & Oliveira, M. (2009). Formal specification of a cardiac pacing system. In A. Cav-
alcanti & D. Dams (Eds.), Lecture notes in computer science: Vol. 5850 . FM 2009: Formal
methods (pp. 692-707). Berlin: Springer.
25. Halbwachs, N., Caspi, P., Raymond, P., & Pilaud, D. (1991). The synchronous dataflow pro-
gramming language Lustre. In Proceedings of the IEEE (pp. 1305-1320).
26. Heitmeyer, C. L. (2009). On the role of formal methods in software certification: An experi-
ence report. Electronic Notes in Theoretical Computer Science , 238 (4), 3-9.
27. Heitmeyer, C. L., Archer, M., Leonard, E. I., & McLean, J. (2008). Applying formal methods
to a certifiably secure software system. IEEE Transactions on Software Engineering , 34 (1),
82-98.
28. High Confidence Software and Systems Coordinating Group (2009). High-confidence medi-
cal devices: Cyber-physical systems for 21st century health care (Technical report). NITRD.
http://www.nitrd.gov/About/MedDevice-FINAL1-web.pdf .
Search WWH ::




Custom Search