Academic literature on the topic 'Computer safety'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer safety.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer safety"

1

MUKAIDONO, Masao. "Computer Safety and Functional Safety." IEICE ESS FUNDAMENTALS REVIEW 4, no. 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gorodetskii, V. I., I. V. Kotenko, and R. M. Yusupov. "Computer networks safety." Herald of the Russian Academy of Sciences 76, no. 4 (July 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nestler, Simon. "Safety-critical human computer interaction." it - Information Technology 61, no. 1 (February 25, 2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.

Full text
Abstract:
Abstract Dealing with usability issues of safety-critical interactive systems is essential for an efficient, effective and joyful use of these systems. This paper describes a prototypical safety-critical environment and discusses the HCI (human computer interaction) challenges of different interactive systems for safety-critical environments. We designed, developed and evaluated various interactive systems which solve different challenges in so-called mass casualty incidents (MCIs). In summary, we made contributions to three different areas of application: Mobile computing in safety-critical e
APA, Harvard, Vancouver, ISO, and other styles
4

Walczak, Andrzej, and Karol Antczak. "Patient Safety versus Computer Diagnosis." MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zalewski, Janusz. "Safety of Computer Control System." IFAC Proceedings Volumes 34, no. 22 (November 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zalewski, Janusz. "Safety aspects of computer control." Control Engineering Practice 3, no. 3 (March 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Yuan, Hongkang Lu, and Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing." Sensors 19, no. 4 (February 17, 2019): 818. http://dx.doi.org/10.3390/s19040818.

Full text
Abstract:
The safety computer in the train control system is designed to be the double two-vote-two architecture. If safety-critical multi-input data are inconsistent, this may cause non-strict multi-sensor data problems in the output. These kinds of problems may directly affect the decision making of the safety computer and even pose a serious threat to the safe operation of the train. In this paper, non-strict multi-sensor data problems that exist in traditional safety computers are analyzed. The input data are classified based on data features and safety computer features. Then, the input data that c
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Li-Shan, Yen-Ming Tseng, and Xiao-Na Lin. "Artificial intelligence in safety system." MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.

Full text
Abstract:
This research aims to study learning environment, and let the learning environment become smart. Swarm intelligence, cloud computing, and active Ultra-High Frequency RFID were used on it. We built friendly human-computer-interface software for users to use as pad phone. The Extensible Markup Language (XML) and C sharp language were used in this research. If the users begin to search, the kernel safety learning system automatically communicates with other RFID readers by agents, and the agents can search the closer camera for users. This study’s result has successfully implemented to Chin-Huo e
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Lalit Kumar, and Hitesh Rajput. "Ensuring safety in design of safety critical computer based systems." Annals of Nuclear Energy 92 (June 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma, and Yinghong Wen. "Safety Mechanism Design and Verification of Safety Computer Parallel Program." Chinese Journal of Electronics 27, no. 6 (November 1, 2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer safety"

1

Simpson, Andrew C. "Safety through security." Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.

Full text
Abstract:
In this thesis, we investigate the applicability of the process algebraic formal method Communicating Sequential Processes (CSP) [Hoa85] to the development and analysis of safetycritical systems. We also investigate how these tasks might be aided by mechanical verification, which is provided in the form of the proof tool Failures-Divergences Refinement (FDR) [Ros94]. Initially, we build upon the work of [RWW94, Ros95], in which CSP treatments of the security property of non-interference are described. We use one such formulation to define a property called protection, which unifies our views o
APA, Harvard, Vancouver, ISO, and other styles
2

Conmy, Philippa Mary. "Safety analysis of computer resource management software." Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

An, Hong. "Computer-aided applications in process plant safety." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.

Full text
Abstract:
Process plants that produce chemical products through pre-designed processes are fundamental in the Chemical Engineering industry. The safety of hazardous processing plants is of paramount importance as an accident could cause major damage to property and/or injury to people. HAZID is a computer system that helps designers and operators of process plants to identify potential design and operation problems given a process plant design. However, there are issues that need to be addressed before such a system will be accepted for common use. This research project considers how to improve the usab
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Yuan-Fang. "Computer Vision Analysis for Vehicular Safety Applications." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>In this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For a
APA, Harvard, Vancouver, ISO, and other styles
5

Reyad, Passant. "Application of computer vision techniques in safety diagnosis and evaluation of safety treatments." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59701.

Full text
Abstract:
Traditional road safety analysis is usually conducted using historical collision records. This reactive approach to road safety has been shown to have several shortcomings. Recently, there has been significant interest in using surrogate measures such as traffic conflicts to analyze safety. This interest has been strengthened by the availability of tools to automate the traffic conflict analysis from video data. Using automated computer vision techniques, road users can be tracked, classified, and their interactions determined accurately and reliably. This thesis demonstrates two applications
APA, Harvard, Vancouver, ISO, and other styles
6

Pumfrey, David John. "The principled design of computer system safety analyses." Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9797/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Akritidis, Periklis. "Practical memory safety for C." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Faulkner, Alastair. "Data integrity : an often-ignored aspect of safety systems : executive summary." Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.

Full text
Abstract:
Data is all-pervasive and is found in all aspects of modern computer systems, and yet many engineers seem reluctant to recognise the importance of data integrity. The conventional view of data, as simply an aspect of software, underestimates the role played by data errors in the behaviour of the system and their potential effect on the integrity of the overall system. In many cases hazard analysis is not applied to data in the same way that it is applied to other system components. Without data integrity requirements, data development and data provision may not attract the degree of rigour tha
APA, Harvard, Vancouver, ISO, and other styles
9

Dheedan, Amer Abdaladeem. "Distributed on-line safety monitor based on safety assessment model and multi-agent system." Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:6065.

Full text
Abstract:
On-line safety monitoring, i.e. the tasks of fault detection and diagnosis, alarm annunciation, and fault controlling, is essential in the operational phase of critical systems. Over the last 30 years, considerable work in this area has resulted in approaches that exploit models of the normal operational behaviour and failure of a system. Typically, these models incorporate on-line knowledge of the monitored system and enable qualitative and quantitative reasoning about the symptoms, causes and possible effects of faults. Recently, monitors that exploit knowledge derived from the application o
APA, Harvard, Vancouver, ISO, and other styles
10

Graydon, Iain R. "Comprehension of 500 safety words : a computer-based methodology." Thesis, Aston University, 1986. http://publications.aston.ac.uk/12307/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer safety"

1

Understanding computer safety. Chicago, Illinois: Capstone Heinemann Library, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Safety-critical computer systems. Harlow, England: Addison-Wesley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boulanger, Jean-Louis. Safety of computer architectures. London, UK: ISTE, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Safety of computer architectures. London, UK: ISTE, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Habli, Ibrahim, Mark Sujan, and Friedemann Bitsch, eds. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83903-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Trapp, Mario, Francesca Saglietti, Marc Spisländer, and Friedemann Bitsch, eds. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14835-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pasquini, Alberto. Computer Safety, Reliability and Security. Edited by Massimo Felici and Karama Kanoun. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48249-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schoitsch, Erwin, ed. Computer Safety, Reliability, and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15651-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Koornneef, Floor, and Meine van der Meulen, eds. Computer Safety, Reliability and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40891-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tonetta, Stefano, Erwin Schoitsch, and Friedemann Bitsch, eds. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66266-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer safety"

1

Cook, Byron, Andreas Podelski, and Andrey Rybalchenko. "Terminator: Beyond Safety." In Computer Aided Verification, 415–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11817963_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rusu, Vlad, Hervé Marchand, Valéry Tschaen, Thierry Jéron, and Bertrand Jeannet. "From Safety Verification to Safety Testing." In Lecture Notes in Computer Science, 160–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24704-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "safety message." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "safety ring." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weik, Martin H. "safety signal." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weik, Martin H. "safety traffic." In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jaffar, Joxan, Andrew E. Santosa, and Răzvan Voicu. "Relative Safety." In Lecture Notes in Computer Science, 282–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11609773_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lal, Ratan, Aaron McKinnis, Dustin Hauptman, Shawn Keshmiri, and Pavithra Prabhakar. "Formally Verified Switching Logic for Recoverability of Aircraft Controller." In Computer Aided Verification, 566–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_27.

Full text
Abstract:
AbstractIn this paper, we investigate the design of a safe hybrid controller for an aircraft that switches between a classical linear quadratic regulator (LQR) controller and a more intelligent artificial neural network (ANN) controller. Our objective is to switch safely between the controllers, such that the aircraft is always recoverable within a fixed amount of time while allowing the maximum time of operation for the ANN controller. There is a priori known safety zone for the LQR controller operation in which the aircraft never stalls, over accelerates, or exceeds maximum structural loading, and hence, by switching to the LQR controller just before exiting this zone, one can guarantee safety. However, this priori known safety zone is conservative, and therefore, limits the time of operation for the ANN controller. We apply reachability analysis to expand the known safety zone, such that the LQR controller will always be able to drive the aircraft back to the safe zone from the expanded zone (“recoverable zone") within a fixed duration. The “recoverable zone" extends the time of operation of the ANN controller. We perform simulations using the hybrid controller corresponding to the recoverable zone and observe that the design is indeed safe.
APA, Harvard, Vancouver, ISO, and other styles
9

Baro, Sylvain. "A High-Availability Safety Computer." In Security of Computer Architectures, 425–46. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Van de Velde, Rudi. "Computer Safety in Healthcare Systems." In Hospital Information Systems — The Next Generation, 82–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77617-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer safety"

1

Hill, Janice, and Rhoda Baggs. "Software safety risk in legacy safety-critical computer systems." In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tangming Yuan and Tianhua Xu. "Computer System Safety Argument Schemes." In 2010 Second World Congress on Software Engineering (WCSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/wcse.2010.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wisniewski, Pamela J., Heng Xu, Mary Beth Rosson, and John M. Carroll. "Adolescent online safety." In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ozarin, Nathaniel. "Developing Rules for Failure Modes and Effects Analysis of Computer Software." In Advances in Aviation Safety. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2003. http://dx.doi.org/10.4271/2003-01-2987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Dong, Dong Zhou, and Ping Li. "Research on Hardware Built-in Computer Safety." In 2006 International Conference on Communications, Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/icccas.2006.284976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

NEUMANN, PETER. "Safety of computer systems in aerospace applications." In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

White, D. B., M. Weishaupt, and D. J. Kent. "A Computer Monitoring System Improves Rig Safety." In SPE Health, Safety and Environment in Oil and Gas Exploration and Production Conference. Society of Petroleum Engineers, 1991. http://dx.doi.org/10.2118/23249-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramaiah, P. Seetha, M. Ben Swarup, and K. Raja Kumar. "Conceptual Modeling for Safety Critical Computer Systems." In 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE, 2008. http://dx.doi.org/10.1109/snpd.2008.96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schwamm, Friedrich. "FADEC Computer Systems for Safety Critical Application." In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-170.

Full text
Abstract:
One of the main requirements for modern FADEC systems is to implement great computing power with many interfaces and to keep the FADEC hardware effort to a minimum. On the other side the criticality potential of computer failures is considered as ‘hazardous’. The trend in FADEC development is to implement even more complex functions into the control software which consequently increases the authority and therefore the criticality potential of computer failures. In the mid 80’s a double computer system was used to performed a parallel execution of the control software with identical input param
APA, Harvard, Vancouver, ISO, and other styles
10

Leveson, Nancy G. "System Safety in Computer-Controlled Automotive Systems." In SAE 2000 World Congress. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2000. http://dx.doi.org/10.4271/2000-01-1048.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer safety"

1

Espinosa, D. L., W. F. Fields, D. E. Gittins, and M. L. Roberts. B190 computer controlled radiation monitoring and safety interlock system. Office of Scientific and Technical Information (OSTI), August 1998. http://dx.doi.org/10.2172/3643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.2 Users? Manual. Office of Scientific and Technical Information (OSTI), October 2010. http://dx.doi.org/10.2172/1004248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gorski, Janusz. The 12th International Conference on Computer Safety, Reliability and Security. Fort Belvoir, VA: Defense Technical Information Center, October 1993. http://dx.doi.org/10.21236/ada278165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users? Manual. Office of Scientific and Technical Information (OSTI), March 2009. http://dx.doi.org/10.2172/950986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gill, Janet A. Flight Control Computer Development Through Application of Software Safety Technology,. Fort Belvoir, VA: Defense Technical Information Center, October 1995. http://dx.doi.org/10.21236/ada305293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Caldwell, John A., Jones Jr., Carter Heber D., Caldwell David J., and J. L. The Relationship Between Computer Scoring and Safety-Pilot Grading of Flight Performance. Fort Belvoir, VA: Defense Technical Information Center, July 1992. http://dx.doi.org/10.21236/ada256245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Falkov, A. A., V. S. Kuul, and O. B. Samoilov. Experimental assessment of computer codes used for safety analysis of integral reactors. Office of Scientific and Technical Information (OSTI), September 1995. http://dx.doi.org/10.2172/115099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, O., J. Renier, F. Difilippo, N. Clapp, A. Sozer, R. Booth, W. Craddick, and D. Morris. PWR hybrid computer model for assessing the safety implications of control systems. Office of Scientific and Technical Information (OSTI), March 1986. http://dx.doi.org/10.2172/5832266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wenzel, D. R. The Radiological Safety Analysis Computer Program (RSAC-5) user`s manual. Revision 1. Office of Scientific and Technical Information (OSTI), February 1994. http://dx.doi.org/10.2172/10157789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pevnitsky, A. V., V. A. Tarasov, and V. P. Solovyev. Comparison between VNIIEF computer programs used to study NPP safety and similar western codes. Office of Scientific and Technical Information (OSTI), December 1995. http://dx.doi.org/10.2172/219462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!