Cargando…

Safety aspects of computer control /

Safety Aspects of Computer Control.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bennett, Phil
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford ; Boston : Butterworth-Heinemann, 1993.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; Safety Aspects of Computer Control; Copyright Page; Table of Contents; Preface; Contributors; Chapter 1. Software in safety-related systems: basic concepts and concerns; INTRODUCTION; THE CONCEPTS; RESEARCH DIRECTIONS; REFERENCES; Chapter 2. Regulatory issues; INTRODUCTION; METHODS OF ENSURING SAFETY; PURPOSE AND PRINCIPLES OF REGULATION; DIRECT REGULATION; REGULATION BY LAW; SOME ASPECTS OF REGULATION OF SOFTWARE SAFETY; REFERENCES; Chapter 3. Legal liability; INTRODUCTION; LIABILITY UNDER CONTRACT LAW; LIABILITY UNDER THE LAW OF NEGLIGENCE; PRODUCT LIABILITY; CONCLUSIONS
  • ACKNOWLEDGEMENTSREFERENCES; Chapter 4. Standardization efforts worldwide; WHY STANDARDS ARE NEEDED; HISTORY OF SOFTWARE STANDARDS; INTERNATIONAL STANDARDS ORGANIZATIONS; STANDARDIZATION WORK REALIZED THROUGH ISO OR IEC; OTHER STANDARDS PREPARED OUTSIDE ISO AND IEC; CONCLUSIONS; REFERENCES; Chapter 5. Real-time software requirements specification and animation using extended Petri nets: theory and application ; WHY WE NEED A REQUIREMENTS SPECIFICATION MODEL; PETRI NETS MODEL; EXTENDED PETRI NETS MODEL; THE SPECIFICATION LANGUAGE; EXTENDED PETRI NETS ENVIRONMENT
  • AN EXAMPLE OF MODELLING WITH EXTENDED PETRI NETSCONCLUSIONS; ACKNOWLEDGEMENTS; REFERENCES; Chapter 6. Independent software verification and validation in practice: methodological and managerial aspects; WHAT IS IT?; WHEN IT IS DONE?; HOW IT IS DONE?; WHAT DOES IT INCLUDE?; WHAT ARE THE BENEFITS?; HOW DO WE KNOW IT IS NEEDED?; HOW MUCH TIME AND MONEY DOES IT TAKE?; VERIFICATION AND VALIDATION PRINCIPLES; ORGANIZATIONAL PRINCIPLES; CONCLUSIONS; REFERENCES; Chapter 7. Formal methods: use and relevance for thedevelopment of safety-critical systems; INTRODUCTION
  • THE DEVELOPMENT OF SOFTWARE FOR SAFETY-CRITICAL SYSTEMSFORMAL METHODS IN THE SAFETY-CRITICAL SYSTEMS LIFE CYCLE; EXAMPLES OF FORMAL METHODS; STRENGTHS AND WEAKNESSES OF FORMAL METHODS; CONCLUSIONS; ACKNOWLEDGEMENTS; REFERENCES; Chapter 8. Use of Ada in safety-critical systems; NATURE OF A SAFETY SYSTEM; AVOIDANCE OF DANGER; ROLE OF ADA; RESIDUAL DEFECTS; CERTIFICATION OF ADA SOFTWARE IN A SAFETY-RELATED SYSTEM; APPENDIX: ADA-RELATED TOPICS IN HSE GUIDELINES; NOTE; ACKNOWLEDGEMENT; REFERENCES; Chapter 9. Fault-tolerant control for safety; INTRODUCTION; SAFETY; THE NEED FOR DETECTION AND REPAIR
  • RANDOM AND SYSTEMATIC FAILURESREPAIR AND FAILURE MODELLING; HARDWARE AND SOFTWARE; AVOIDANCE OF SOFTWARE FAULTS; TOLERANCE OF SOFTWARE FAULTS; HARDWARE AND SYSTEMATIC FAILURES; DIVERSITY; LIMITATIONS ON DIVERSITY; STANDARDS AND GUIDELINES; COMMERCIAL FAULT-TOLERANT SYSTEMS; FAULT TOLERANCE USING NON-FAULT-TOLERANT HARDWARE; DEGRADATION MODES; THE ROLE OF SOFTWARE IN THE PROVISION OF FAULT TOLERANCE; CONCLUSIONS; REFERENCES; Chapter 10. The problems of an industrial supplier
  • and how to achieve good quality; WHAT IS SOFTWARE?; WHAT ARE THE SUPPLIERS' PROBLEMS?; SAFETY ANALYSIS