Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Système critique")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1046

  • Page / 42
Export

Selection :

  • and

Deeper complementarism: a brief response to ulrich. Author's replyULRICH, W.The Journal of the Operational Research Society. 2003, Vol 54, Num 11, pp 1225-1229, issn 0160-5682, 5 p.Article

Towards Next Generation InfrastructuresHERDER, P. M; LUKSZO, Z.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, issn 1475-3219, 207 p.Serial Issue

Building secure critical infrastructuresPALMATIER, Thomas E.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 2, pp 85-86, issn 1874-5482, 2 p.Article

Security of critical control systems sparks concernGEER, David.Computer (Long Beach, CA). 2006, Vol 39, Num 1, pp 20-23, issn 0018-9162, 4 p.Article

Why are we so unconsciously insecure?LUIIJF, Eric.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 3-4, pp 179-181, issn 1874-5482, 3 p.Article

Entwicklung von Mission critical Systemen für industrielle Anwendungen (Engineeringmethoden & Technologien)VDI-Berichte. 2003, issn 0083-5560, isbn 3-18-091809-8, 194 p., isbn 3-18-091809-8Conference Proceedings

Projektmanagement bei der Entwicklung kritischer Software: Ergebnisse einer Umfrage in der Industrie = Project management in the development of critical software: poll results from the industryHILLEBRAND, N; BATZ, Th; WATSON, K et al.VDI-Berichte. 2003, pp 89-94, issn 0083-5560, isbn 3-18-091809-8, 6 p.Conference Paper

The (un)economic internet?CLAFFY, K. C; MEINRATH, Sascha D; BRADNER, Scott O et al.IEEE internet computing. 2007, Vol 11, Num 3, pp 53-58, issn 1089-7801, 6 p.Article

Project experience with IEC 61508 and its consequencesFALLER, Rainer.Lecture notes in computer science. 2001, pp 200-214, issn 0302-9743, isbn 3-540-42607-8Conference Paper

Software Tools-for Safety-Critical Systems According to DO-254KORNECKI, Andrew; BUTKA, Brian; ZALEWSKI, Janusz et al.Computer (Long Beach, CA). 2008, Vol 41, Num 12, pp 112-115, issn 0018-9162, 4 p.Article

Clock synchronization algorithms and scheduling issuesBASU, Dhruba; PUNNEKKAT, Sasikumar.Lecture notes in computer science. 2003, pp 45-55, issn 0302-9743, isbn 3-540-20745-7, 11 p.Conference Paper

Strategic Traceability for Safety-Critical Projects : SAFETY-CRITICAL SOFTWAREMÄDER, Patrick; JONES, Paul L; YI ZHANG et al.IEEE software. 2013, Vol 30, Num 3, pp 58-66, issn 0740-7459, 9 p.Article

Innovative Testmethoden für sicherheitskritische Software-Anwendungen = Innovative test methods for safety critical software applicationsDAMM, W.VDI-Berichte. 2003, pp 21-35, issn 0083-5560, isbn 3-18-091809-8, 15 p.Conference Paper

Zertifizierung von Sicherheitssystemen und -prozessen nach IEC 61508: Schwerpunkt Hardware = Certification of safety systems and process according to IEC 61508: HardwareRAU, M; SCHMIDT, M.VDI-Berichte. 2003, pp 95-111, issn 0083-5560, isbn 3-18-091809-8, 17 p.Conference Paper

Energy-efficient communication protocolsCHIASSERINI, Carla F; NUGGEHALLI, Pavan; SRINIVASAN, Vikram et al.Design automation conference. 2002, pp 824-829, isbn 1-58113-461-4, 6 p.Conference Paper

Failure mode analysis of CORBA service implementationsMARSDEN, Eric; FABRE, Jean-Charles.Lecture notes in computer science. 2001, pp 216-231, issn 0302-9743, isbn 3-540-42800-3Conference Paper

Modeling vs. checking with UMLTAÏANI, Francois; PALUDETTO, Mario.Modélisation et vérification des processus parallèles. Ecole d'été. 2000, pp 228-233Conference Paper

Further results on irregular, critical perfect systems of difference sets I : split systemsHAMILTON, G. M; ROGERS, D. G.Discrete mathematics. 1992, Vol 102, Num 1, pp 25-45, issn 0012-365XArticle

Resolved: The Internet Is No Place for Critical InfrastructureGEER, Dan.Communications of the ACM. 2013, Vol 56, Num 6, pp 48-53, issn 0001-0782, 6 p.Article

Critical information infrastructures security (First international workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006)Lopez, Javier.Lecture notes in computer science. 2006, issn 0302-9743, isbn 978-3-540-69083-2, 1Vol, X-284 p, isbn 978-3-540-69083-2Conference Proceedings

TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANSKARRI, Ramesh; RAJENDRAN, Jeyavijayan; ROSENFELD, Kurt et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 39-46, issn 0018-9162, 8 p.Article

New dilemmas in regulating critical infrastructuresTEN HEUVELHOF, E. F.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, pp 160-170, issn 1475-3219, 11 p.Article

Software testing for safety-critical applicationsLINGFENG WANG; KAY CHEN TAN.IEEE instrumentation & measurement magazine. 2005, Vol 8, Num 2, pp 38-47, issn 1094-6969, 10 p.Article

Improved bounds for perfect systems of difference setsROGERS, D. G.Journal of combinatorial theory. Series A. 1993, Vol 62, Num 1, pp 15-29, issn 0097-3165Article

Switching Markov chains for a holistic modeling of SIS unavailabilityMECHRI, Walid; SIMON, Christophe; BENOTHMAN, Kamel et al.Reliability engineering & systems safety. 2015, Vol 133, pp 212-222, issn 0951-8320, 11 p.Article

  • Page / 42