|
Meeting Host
|
Tom Anderson, Newcastle University, UK |
Program-at-a-Glance and Contents
Workshop on Achieving and Assessing Safety with Computing Systems
Workshop
Coordinators |
Lorenzo Strigini, City University, London, UK Robin Bloomfield, City University, London, UK Zbigniew Kalbarczyk, Univ of Illinois at Urbana-Champaign, USA |
Lorenzo Strigini, City University, London, UK |
28 KB |
John Penny, Civil Aviation Authority, UK The Regulation of Air Navigation Services: Some Current Issues |
|
Natasha Neogi, Univ. of Illinois at Urbana-Champaign, USA Assuring Emergent Properties Under Composition: A Case Study of Aerospace Systems |
Nicholas Multari, Boeing, Washington, USA LANs in Aircraft, Including Safety and Security Issues |
Paul Caseley, Defence Science and Technology Laboratory, Malvern, UK Problems and Holy Grails in Dependability |
|
George Cleland, Adelard LLP, London, UK Safety Cases: Challenges of Complexity and Traceability |
Stefan Poledna, TTTech, Vienna, Austria Experience and Issues in Aerospace Certification |
|
Johan Karlsson, Chalmers University, Göteborg, Sweden Program-level Soft Error Derating in a Brake-by-Wire System |
Yuji Hirao, Nagoaka University of Technology, Japan Functional Safety Experience on Railway Signalling in Japan |
|
Jean-Claude Laprie, LAAS-CNRS, Toulouse, France Safety Demonstration and Software Development |
Tim Kelly, University of York, UK Evidence Based Certification |
|
Bev Littlewood, City University, London, UK Panel on "Evidence and Arguments" |
|
Lorenzo Strigini, City University, London, UK Observations: To Common Issues Underlying the Presentations Today |
16 KB |
Rick Schlichting, AT&T Labs, New Jersey, USA Overall Presentation and News |
1.5 MB |
Jacob Abraham, University of Texas at Austin, USA Manufacturing Test of RF Systems |
0.6 MB |
Mario Dal Cin, University of Erlangen - Nurenberg FAUmachine |
0.4 MB |
Hermann Kopetz, TU Wien, Austria Fault Isolation and Error Containment in the TT-SoC |
0.8 MB |
Haruo Yokota, Tokyo Institute of Technology, Japan An Efficient Commit Protocol Exploiting Primary-Backup Placement in a Parallel Storage System |
0.8 MB |
Roy Maxion, Carnegie-Mellon University, USA Timing Keystrokes for Authentication |
TBD |
Takashi Nanya, University of Tokyo and Japan Science and Technology Agency (JST), Japan JST Research Initiative toward Dependability and Security |
44 KB |
Vicraj Thomas, Honeywell Laboratories, Minnesota, USA Assessing the Dependability of Sensor Network Information |
0.3 MB |
Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, USA Application-Aware Security |
0.3 MB |
Saurabh Bagchi, Purdue University, USA Leaking Information through Covert Timing Channel |
0.2 MB |
Aad van Moorsel, Newcastle University, UK Trust and Pricing |
60 KB |
Eliane Martins, State University of Campinas, Brazil System Testing from UML Diagrams |
0.2 MB |
Dan Siewiorek, Carnegie-Mellon University, ISA Radar Overview: A Cognitive Assistant that Learns to Help a Human User Handle Information Overload |
0.5 MB |
Robin Bloomfield, City University, London, UK Dependability Analysis of Critical Infrastructures |
2.7 MB |
Lorenzo Strigini, City University, London, UK The INDEED Project: Inderdisciplinary Design and Evaluation of Dependability |
56 KB |
Names and Contact Information |