To see the other types of publications on this topic, follow the link: Computer safety.

Dissertations / Theses on the topic 'Computer safety'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer safety.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Simpson, Andrew C. "Safety through security." Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.

Full text
Abstract:
In this thesis, we investigate the applicability of the process algebraic formal method Communicating Sequential Processes (CSP) [Hoa85] to the development and analysis of safetycritical systems. We also investigate how these tasks might be aided by mechanical verification, which is provided in the form of the proof tool Failures-Divergences Refinement (FDR) [Ros94]. Initially, we build upon the work of [RWW94, Ros95], in which CSP treatments of the security property of non-interference are described. We use one such formulation to define a property called protection, which unifies our views o
APA, Harvard, Vancouver, ISO, and other styles
2

Conmy, Philippa Mary. "Safety analysis of computer resource management software." Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

An, Hong. "Computer-aided applications in process plant safety." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.

Full text
Abstract:
Process plants that produce chemical products through pre-designed processes are fundamental in the Chemical Engineering industry. The safety of hazardous processing plants is of paramount importance as an accident could cause major damage to property and/or injury to people. HAZID is a computer system that helps designers and operators of process plants to identify potential design and operation problems given a process plant design. However, there are issues that need to be addressed before such a system will be accepted for common use. This research project considers how to improve the usab
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Yuan-Fang. "Computer Vision Analysis for Vehicular Safety Applications." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>In this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For a
APA, Harvard, Vancouver, ISO, and other styles
5

Reyad, Passant. "Application of computer vision techniques in safety diagnosis and evaluation of safety treatments." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59701.

Full text
Abstract:
Traditional road safety analysis is usually conducted using historical collision records. This reactive approach to road safety has been shown to have several shortcomings. Recently, there has been significant interest in using surrogate measures such as traffic conflicts to analyze safety. This interest has been strengthened by the availability of tools to automate the traffic conflict analysis from video data. Using automated computer vision techniques, road users can be tracked, classified, and their interactions determined accurately and reliably. This thesis demonstrates two applications
APA, Harvard, Vancouver, ISO, and other styles
6

Pumfrey, David John. "The principled design of computer system safety analyses." Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9797/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Akritidis, Periklis. "Practical memory safety for C." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Faulkner, Alastair. "Data integrity : an often-ignored aspect of safety systems : executive summary." Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.

Full text
Abstract:
Data is all-pervasive and is found in all aspects of modern computer systems, and yet many engineers seem reluctant to recognise the importance of data integrity. The conventional view of data, as simply an aspect of software, underestimates the role played by data errors in the behaviour of the system and their potential effect on the integrity of the overall system. In many cases hazard analysis is not applied to data in the same way that it is applied to other system components. Without data integrity requirements, data development and data provision may not attract the degree of rigour tha
APA, Harvard, Vancouver, ISO, and other styles
9

Dheedan, Amer Abdaladeem. "Distributed on-line safety monitor based on safety assessment model and multi-agent system." Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:6065.

Full text
Abstract:
On-line safety monitoring, i.e. the tasks of fault detection and diagnosis, alarm annunciation, and fault controlling, is essential in the operational phase of critical systems. Over the last 30 years, considerable work in this area has resulted in approaches that exploit models of the normal operational behaviour and failure of a system. Typically, these models incorporate on-line knowledge of the monitored system and enable qualitative and quantitative reasoning about the symptoms, causes and possible effects of faults. Recently, monitors that exploit knowledge derived from the application o
APA, Harvard, Vancouver, ISO, and other styles
10

Graydon, Iain R. "Comprehension of 500 safety words : a computer-based methodology." Thesis, Aston University, 1986. http://publications.aston.ac.uk/12307/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Roycroft, Steven Michael. "Computer aided method for system safety and reliability assessments." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FRoycroft.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2008.<br>Thesis Advisor(s): Rhoades, Mark M. "September 2008." Description based on title screen as viewed on November 4, 2008.. Includes bibliographical references (p. 75). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
12

Al-Qora'n, Lamis Farah. "SAFE-FLOW : a systematic approach for safety analysis of clinical workflows." Thesis, University of Hull, 2015. http://hydra.hull.ac.uk/resources/hull:13064.

Full text
Abstract:
The increasing use of technology in delivering clinical services brings substantial benefits to the healthcare industry. At the same time, it introduces potential new complications to clinical workflows that generate new risks and hazards with the potential to affect patients’ safety. These workflows are safety critical and can have a damaging impact on all the involved parties if they fail. Due to the large number of processes included in the delivery of a clinical service, it can be difficult to determine the individuals or the processes that are responsible for adverse events. Using methodo
APA, Harvard, Vancouver, ISO, and other styles
13

Evans, David Elliot 1971. "Policy-directed code safety." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Roethke, Ed. "Integrating computer-based safety training in a risk control center." Online version, 1998. http://www.uwstout.edu/lib/thesis/1998/1998roethkee.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Alexander Ning-Yuan. "Air safety--the last decade." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42727.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (leaf 42).<br>by Alexander Ning-Yuan Wang.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
16

Twyman, Andrew R. (Andrew Robert) 1977. "Flexible code safety for Win32." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80132.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.<br>Includes bibliographical references (p. 90-93).<br>by Andrew R. Twyman.<br>S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
17

Higgins, Mary Katherine. "Airline safety : a comparative analysis." Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/14941.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1987.<br>MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.<br>Bibliography: leaves 59-60.<br>by Mary Katherine Higgins.<br>M.S.
APA, Harvard, Vancouver, ISO, and other styles
18

Gaissmaier, Miriam. "Better Safe than Sorry : Boosting Workplace Safety with Interactive Textiles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-257492.

Full text
Abstract:
Despite various safety regulations and procedures, work accidents remain a significant problem in the global process industry as well as the Swedish steel industry. In order to address personal safety and safety culture, wearable alert systems based on Internet of Things (IoT) technology were prototyped and tested with steel workers in iterative workshops following the Constructive Design Research approach. Results show that interactive textile patches worn on the protection gear are a simple way of transmitting personal alerts with light. Another crucial design factor is to enable the communi
APA, Harvard, Vancouver, ISO, and other styles
19

Autey, Jarvis. "Before and after traffic safety evaluations using computer vision techniques." Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/43598.

Full text
Abstract:
Traditionally, road safety analysis has been undertaken using historical collision records. This approach to road safety analysis is reactive in that the analyst has to wait for collisions to take place before an action can be taken. An alternative approach is to study traffic conflicts or near misses which occur more frequently, can be clearly observed and are related to collisions. However, there are issues of subjectivity, reliability, and cost associated with the use of human observers. The use of computer vision techniques to automate the process of collecting traffic conflicts data can h
APA, Harvard, Vancouver, ISO, and other styles
20

Cho, Gyuchoon. "Real Time Driver Safety System." TopSCHOLAR®, 2009. http://digitalcommons.wku.edu/theses/63.

Full text
Abstract:
The technology for driver safety has been developed in many fields such as airbag system, Anti-lock Braking System or ABS, ultrasonic warning system, and others. Recently, some of the automobile companies have introduced a new feature of driver safety systems. This new system is to make the car slower if it finds a driver’s drowsy eyes. For instance, Toyota Motor Corporation announced that it has given its pre-crash safety system the ability to determine whether a driver’s eyes are properly open with an eye monitor. This paper is focusing on finding a driver’s drowsy eyes by using face detecti
APA, Harvard, Vancouver, ISO, and other styles
21

Dolginova, Ekaterina 1977. "Safety verification for automated vehicle maneuvers." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47573.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (p. 83-85).<br>by Ekanterina Dolginova.<br>S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
22

Osvald, Leo. "Lightweight Programming Abstractions for Increased Safety and Performance." Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10808010.

Full text
Abstract:
<p> In high-level programming languages, programmers do not need to worry about certain implementation details that compilers or interpreters do behind the scenes. However, this oftentimes results in some loss; in the former case, it is the inability to precisely communicate programmer&rsquo;s intentions to a compiler that compromises safety, and in the latter case, it is the loss of performance because an interpreter needs to do extra work at runtime. Modern languages tend to address this problem differently, albeit rarely without serious limitations. In this dissertation, we develop lightwei
APA, Harvard, Vancouver, ISO, and other styles
23

Ranjbaran, Abdolrasoul. "A computer program for the stress analysis of reinforced concrete structures." Thesis, University of Manchester, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.240977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Busse, Daniela Karin. "Cognitive error analysis in accident and incident investigation in safety-critical domains." Thesis, University of Glasgow, 2002. http://theses.gla.ac.uk/3954/.

Full text
Abstract:
A database of 10 years' worth of medical incident data gathered in an Edinburgh Intensive Care Unit was analyzed using the proposed cognitive error analysis approach. In the second live case study, the error analysis approach was evaluated in the field by applying it to incident reporting data that was collected with a newly implemented incident reporting scheme in a Glasgow Neonatal Intensive Care Unit. The insights gained by analyzing the Edinburgh incident scheme were used to inform the design and implementation of the Glasgow incident scheme as part of the unit's existing safety management
APA, Harvard, Vancouver, ISO, and other styles
25

Parmar, Jayesh C. "A method for computer-aided hazard identification of process plants." Thesis, Loughborough University, 1986. https://dspace.lboro.ac.uk/2134/7279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Parker, David James. "Multi-objective optimisation of safety-critical hierarchical systems." Thesis, University of Hull, 2010. http://hydra.hull.ac.uk/resources/hull:3465.

Full text
Abstract:
Achieving high reliability, particularly in safety critical systems, is an important and often mandatory requirement. At the same time costs should be kept as low as possible. Finding an optimum balance between maximising a system's reliability and minimising its cost is a hard combinatorial problem. As the size and complexity of a system increases, so does the scale of the problem faced by the designers. To address these difficulties, meta-heuristics such as Genetic Algorithms and Tabu Search algorithms have been applied in the past for automatically determining the optimal allocation of redu
APA, Harvard, Vancouver, ISO, and other styles
27

Sharvia, Septavera. "Integrated application of compositional and behavioural safety analysis." Thesis, University of Hull, 2011. http://hydra.hull.ac.uk/resources/hull:4473.

Full text
Abstract:
To address challenges arising in the safety assessment of critical engineering systems, research has recently focused on automating the synthesis of predictive models of system failure from design representations. In one approach, known as compositional safety analysis, system failure models such as fault trees and Failure Modes and Effects Analyses (FMEAs) are constructed from component failure models using a process of composition. Another approach has looked into automating system safety analysis via application of formal verification techniques such as model checking on behavioural models
APA, Harvard, Vancouver, ISO, and other styles
28

Isafiade, Omowunmi Elizabeth. "Ubiquitous intelligence for smart cities: a public safety approach." Doctoral thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/25319.

Full text
Abstract:
Citizen-centered safety enhancement is an integral component of public safety and a top priority for decision makers in a smart city development. However, public safety agencies are constantly faced with the challenge of deterring crime. While most smart city initiatives have placed emphasis on the use of modern technology for fighting crime, this may not be sufficient to achieve a sustainable safe and smart city in a resource constrained environment, such as in Africa. In particular, crime series which is a set of crimes considered to have been committed by the same offender is currently less
APA, Harvard, Vancouver, ISO, and other styles
29

Marriott, Derek Garron. "Analysis of safety-critical parallel software systems." Thesis, University of Sheffield, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.388710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Liebenwein, Lucas. "Contract-based safety verification for autonomous driving." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/120366.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 77-83).<br>The safe, successful deployment of autonomous systems under real-world conditions, in part, hinges upon providing rigorous performance and safety guarantees. This thesis considers the problem of establishing and veri
APA, Harvard, Vancouver, ISO, and other styles
31

Gil, Ronald M. Eng Massachusetts Institute of Technology. "The undefined quest for full memory safety." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119551.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 59-64).<br>In this thesis, we explore full memory safety and the various intricacies involved. We analyze existing memory safety techniques in both hardware and software and their many different goals. This task involves det
APA, Harvard, Vancouver, ISO, and other styles
32

Livadas, Carolos. "Formal verification of safety-critical hybrid systems." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42817.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (p. 181-185).<br>This thesis investigates how the formal modeling and verification techniques of computer science can be used for the analysis of hybrid systems [7,14,22,37] - systems involving both discrete and continuous behavior. The motivation behind such research lies in the inherent similarity of the hierarchical and decentralized control strategies of hybrid systems and the communication and operation protocols used for distributed sy
APA, Harvard, Vancouver, ISO, and other styles
33

Azevedo, Luís Pedro da Silva. "Scalable allocation of safety integrity levels in automotive systems." Thesis, University of Hull, 2015. http://hydra.hull.ac.uk/resources/hull:13618.

Full text
Abstract:
The allocation of safety integrity requirements is an important problem in modern safety engineering. It is necessary to find an allocation that meets system level safety integrity targets and that is simultaneously cost-effective. As safety-critical systems grow in size and complexity, the problem becomes too difficult to be solved in the context of a manual process. Although this thesis addresses the generic problem of safety integrity requirements allocation, the automotive industry is taken as an application example. Recently, the problem has been partially addressed with the use of model-
APA, Harvard, Vancouver, ISO, and other styles
34

Pampin-Garcia, R. "Fusion power : safety and environmental analysis using integrated, three-dimensional computer modelling." Thesis, University of Birmingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542395.

Full text
Abstract:
Fusion power studies provide insight into physics and technology issues that need addressing to develop fusion as an optimal electricity generation alternative in the near future. As part of them, calculations are performed of different parameters important for the safety and environmental assessments of power plant concepts based on magnetically confined burning plasmas. These assessments help optimise such concepts, and involve many different physics disciplines and the use of large computational codes and nuclear databases. The work presented in this thesis has been developed within the Fus
APA, Harvard, Vancouver, ISO, and other styles
35

Creely, Karen Sarah. "Communication of hazard and risk information using computer multimedia safety data sheets." Thesis, University of Aberdeen, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.440055.

Full text
Abstract:
Two mmSDSs were developed, the first for two, similar, formaldehyde-based embalming fluids, the second for a solvent-based paint.  Workplace and laboratory intervention studies were undertaken to evaluate the effectiveness of the mmSDSs in increasing knowledge of the products hazards and risks; inducing attitudinal and risk perception changes; appropriate protective behaviour and decreasing inhalation exposure.  Subjects received either the mmSDS or the conventional SDS package, with subjects being assessed both pre- and several times post-intervention. Fourteen embalmers participated in the w
APA, Harvard, Vancouver, ISO, and other styles
36

Moore, Albert W. "A computer-based training course for assessing material safety data sheet comprehension." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-06232009-063332/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Fernandes, Dias Claudio. "Driver’s Safety Analyzer: Sobriety, Drowsiness, Tiredness, and Focus." Youngstown State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1587477829716502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ozdemir, Kadir. "Verifying the safety properties of concurrent systems via simultaneous reachability." Thesis, University of Ottawa (Canada), 1995. http://hdl.handle.net/10393/10294.

Full text
Abstract:
This thesis proposes two techniques, simultaneous reachability analysis and simultaneous product method, to reduce the number of global states to be analyzed for verifying the safety properties of concurrent systems. Both techniques utilize the idea of simultaneous execution of transitions. Simultaneous reachability analysis is proposed for verifying a specific set of safety properties asserting absence of logical errors of communication protocols specified as a network of n ($n\ge 2$) processes communicating over error-free, bounded, FIFO queues, without placing any restrictions on the topolo
APA, Harvard, Vancouver, ISO, and other styles
39

Basir, Nurlida. "Safety cases for the formal verification of automatically generated code." Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/160073/.

Full text
Abstract:
Model-based development and automated code generation are increasingly used for actual production code, in particular in mathematical and engineering domains. However, since code generators are typically not qualified, there is no guarantee that their out- put is correct or even safe. Formal methods which are based on mathematically-based techniques have been proposed as a means to improve software quality by providing formal safety proofs as explicit evidence for the assurance claims. However, the proofs are often complex and may also be based on assumptions and reasoning principles that are
APA, Harvard, Vancouver, ISO, and other styles
40

Davis, Eli Bristol. "Fast, compatible, complete memory safety For C programs." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/112860.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 95-97).<br>The lack of memory safety in C/C++ programs is one of, if not the, most persistent and costly sources of program exploits. Attacks based on memory corruption can range from the reading of private data to a complete hostile takeover of a process. While many solutions to this problem have been proposed, it is as of yet unsolved-as old memory corruption attacks are rendered obsolet
APA, Harvard, Vancouver, ISO, and other styles
41

Janiuk, Ludvig, and Johan Sjölén. "Probabilistic Least-violating Control Strategy Synthesis with Safety Rules." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229867.

Full text
Abstract:
We consider the problem of automatic control strategy synthesis for discrete models of robotic systems, where the goal is to travel from some region to another while obeying a given set of safety rules in an environment with uncertain properties. This is a probabilistic extension of the work by Jana Tumová et al.  that is able to handle uncertainty by modifying the least-violating strategy synthesis algorithm. The first novel contribution is a way of modelling uncertain events in a map as a Markov decision process with a specific structure, using what we call "Ghost States". We then introduce
APA, Harvard, Vancouver, ISO, and other styles
42

Wu, James 1975. "A comparison of programming languages for real-time, safety-critical programming /." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30772.

Full text
Abstract:
As the number of applications of computers controlling safety-critical operations increases, the need to ensure the safety and reliability of the software that controls those computers increases proportionally. Ultimately, such software properties are the result of appropriate design and implementation. However, certain characteristics of the language in which the software is written can have an impact on how that language facilitates both design and implementation, and how it encourages safety and reliability in the resulting software.<br>This paper explores the language characteristics that
APA, Harvard, Vancouver, ISO, and other styles
43

Georgakopoulos, Vassilis. "Food safety training : a model HACCP instructional technique." Thesis, Manchester Metropolitan University, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Gill, Janet A. "Safety analysis of heterogeneous-multiprocessor control system software." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA231859.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 1990.<br>Thesis Advisor(s): Shimeall, Timothy J. Second Reader: Hefner, Kim A. S. "December 1990." Description based on title screen as viewed on March 31, 2010. DTIC Identifier(s): Computer Program Reliability, System Safety. Author(s) subject terms: Software Safety, Petri Net, Fault Tree, Software Engineering, Integrated System Analysis. Includes bibliographical references (p. 47-51). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
45

Seotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Sajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.

Full text
Abstract:
Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, there are tools to assess the level of influence a possible attacker can have on such a system, which then
APA, Harvard, Vancouver, ISO, and other styles
47

Pajjuri, Srinivas Reddy. "Computer model to simulate truck accidents on exit ramps." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-08182009-040509/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Pratt, Norman Derek. "Pragmatic application of formal methods to safety critical systems." Thesis, University of Surrey, 1996. http://epubs.surrey.ac.uk/843228/.

Full text
Abstract:
Formal Methods started primarily as a software development method, but now embrace a wide spectrum of purposes and techniques. This report considers one possible application of Formal Methods to Safety Critical Systems, namely its use in validation of a mechanism for a safety critical system. The technique involves construction of a Formal Model covering the mechanism, the real world aspects of interest, and the safety requirement. The technique supports exploring the behaviour of mechanisms in a mathematical way, and in particular establishing whether the behaviour complies with a safety prop
APA, Harvard, Vancouver, ISO, and other styles
49

Kamolpornwijit, Witchakorn. "P-TAXI : enforcing memory safety with programmable tagged architecture." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/105996.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 104-112).<br>Buffer overflow is a well-known problem that remains a threat to software security. With the advancement of code-reuse attacks and return-oriented programming (ROP), it becomes problematic to protect a program f
APA, Harvard, Vancouver, ISO, and other styles
50

Trafford, Paul Joseph. "The use of formal methods for safety-critical systems." Thesis, Kingston University, 1997. http://eprints.kingston.ac.uk/20609/.

Full text
Abstract:
An investigation is presented into the use of formal methods for the production of safety-critical systems with embedded software. New theory and procedures are tested on an industrial case study, the formal specification and refinement of a communications protocol for medical devices (the Universal Flexport protocol [copyright]). On reviewing the current literature, a strong case emerges for grounding any work within an overall perspective that integrates the experience of safety engineering and the correctness of formal methods. Such a basis, it is argued, is necessary for an effective contr
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!