City Research Online

Items where Schools and Departments is "Software Reliability" and Year is 2010

Up a level
Group by: Authors | Type | No Grouping
Jump to: B | J | L | M | P
Number of items: 11.

B

Bishop, P. G. & Cyra, L. (2010). Overcoming Non-determinism in Testing Smart Devices: A Case Study. Lecture Notes in Computer Science, 6351 LNCS, pp. 237-250. doi: 10.1007/978-3-642-15651-9_18

Bishop, P. G., Tourlas, K. & Chozos, N. (2010). An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems. In: Schoitsch, E. (Ed.), Computer safety, reliability, and security. Lecture Notes in Computer Science, 6351. (pp. 375-388). London, UK: Springer. doi: 10.1007/978-3-642-15651-9_28

Bloomfield, R. E., Buzna, L., Popov, P. T. (2010). Stochastic modelling of the effects of interdependencies between critical infrastructure. In: Lecture Notes in Computer Science. 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.

Bloomfield, R. E., Chozos, N., Popov, P. T. (2010). Preliminary Interdependency Analysis (PIA): Method and tool support (D/501/12102/2 v2.0). London: Adelard LLP and City University London.

J

Jones, K., Kim, J. & Horowitz, M. (2010). Fast, non-monte-carlo estimation of transient performance variation due to device mismatch. IEEE Transactions on Circuits and Systems, 57(7), pp. 1746-1755. doi: 10.1109/tcsi.2009.2035418

Jones, K., Konrad, V. & Nickovic, D. (2010). Analog Property Checkers: A Ddr2 Case Study. Formal Methods in System Design, 36(2), pp. 114-130. doi: 10.1007/s10703-009-0085-x

L

Littlewood, B. & Burns, A. (2010). Reasoning About the Reliability of Multi-version, Diverse Real-Time Systems. Paper presented at the 31st IEEE Real-Time Systems Symposium, 30 November - 03 December 2010, San Diego, USA. doi: 10.1109/RTSS.2010.43

M

Mantas, G., Lymberopoulos, D. & Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB, 3468, pp. 1-4. doi: 10.1109/itab.2010.5687758

Michalas, A., Komninos, N., Prasad, N. R. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp. 568-573. doi: 10.1109/icitis.2010.5689528

Mitrokotsa, A., Komninos, N. & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), pp. 93-106.

P

Popov, P. T. & Strigini, L. (2010). Assessing Asymmetric Fault-Tolerant Software. In: ISSRE. Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 1 - 4 Nov 2010, San Jose, California. doi: 10.1109/ISSRE.2010.10

This list was generated on Tue Jun 17 02:24:58 2025 UTC.