Computer safety, reliability and security: 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2008
|
Schriftenreihe: | Lecture notes in computer science
5219 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 456 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783540876977 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035093192 | ||
003 | DE-604 | ||
005 | 20111026 | ||
007 | t| | ||
008 | 081010s2008 xx ad|| |||| 10||| eng d | ||
015 | |a 08,A41,0051 |2 dnb | ||
016 | 7 | |a 990379698 |2 DE-101 | |
020 | |a 9783540876977 |c kart. : EUR 65.22 (freier Pr.), sfr 101.50 (freier Pr.) |9 978-3-540-87697-7 | ||
024 | 3 | |a 9783540876977 | |
028 | 5 | 2 | |a 12517558 |
035 | |a (OCoLC)259253717 | ||
035 | |a (DE-599)DNB990379698 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA75 | |
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 005.8 |2 22//ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 260f |2 stub | ||
084 | |a 620 |2 sdnb | ||
084 | |a DAT 343f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Computer safety, reliability and security |b 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings |c Michael D. Harrison ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2008 | |
300 | |a XIV, 456 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5219 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Computersicherheit - Datensicherung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> | |
650 | 4 | |a Eingebettetes System - Softwareentwicklung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> | |
650 | 4 | |a Mensch-Maschine-Kommunikation - Technische Sicherheit - Zuverlässigkeit - Systementwicklung - Kongress - Newcastle-upon-Tyne <2008> | |
650 | 4 | |a Sicherheitskritisches System - Zuverlässigkeit - Fehlertoleranz - Kongress - Newcastle-upon-Tyne <2008> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computer software |x Reliability |v Congresses | |
650 | 4 | |a Electronic digital computers |x Reliability |v Congresses | |
650 | 4 | |a Industrial safety |v Congresses | |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eingebettetes System |0 (DE-588)4396978-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systementwicklung |0 (DE-588)4126945-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Technische Sicherheit |0 (DE-588)4059233-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Fehlertoleranz |0 (DE-588)4123192-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |z Newcastle-upon-Tyne |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 0 | 3 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |D s |
689 | 1 | 1 | |a Technische Sicherheit |0 (DE-588)4059233-9 |D s |
689 | 1 | 2 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 1 | 3 | |a Systementwicklung |0 (DE-588)4126945-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 2 | 1 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 2 | 2 | |a Fehlertoleranz |0 (DE-588)4123192-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 3 | 1 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 3 | 2 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 3 | 3 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Harrison, Michael Douglas |e Sonstige |4 oth | |
711 | 2 | |a SAFECOMP |n 27 |d 2008 |c Newcastle-upon-Tyne |j Sonstige |0 (DE-588)10357099-8 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5219 |w (DE-604)BV000000607 |9 5219 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016761275&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016761275 |
Datensatz im Suchindex
_version_ | 1820875077238915072 |
---|---|
adam_text |
* * * * * * * * BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/990379698
DIGITALISIERT DURCH * * * * * * * * * * * * * * XIV TABLE OF CONTENTS
FORMAL SECURITY ANALYSIS OF ELECTRONIC SOFTWARE DISTRIBUTION SYSTEMS.
415 MONIKA MAIDL, DAVID VON OHEIMB, PETER HARTMANN, AND RICHARD ROBINSON
THE ADVANCED ELECTRIC POWER GRID: COMPLEXITY REDUCTION TECHNIQUES FOR
RELIABILITY MODELING 429 AYMAN Z. FAZA, SAHRA SEDIGH, AND BRUCE M.
MCMILLIN AUTOMATING THE PROCESSES OF SELECTING AN APPROPRIATE SCHEDULING
ALGORITHM AND CONFIGURING THE SCHEDULER IMPLEMENTATION FOR
TIME-TRIGGERED EMBEDDED SYSTEMS 440 AYMAN K. GENDY AND MICHAEL J. PONT
AUTHOR INDEX 455 |
adam_txt |
* * * * * * * * BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/990379698
DIGITALISIERT DURCH * * * * * * * * * * * * * * XIV TABLE OF CONTENTS
FORMAL SECURITY ANALYSIS OF ELECTRONIC SOFTWARE DISTRIBUTION SYSTEMS.
415 MONIKA MAIDL, DAVID VON OHEIMB, PETER HARTMANN, AND RICHARD ROBINSON
THE ADVANCED ELECTRIC POWER GRID: COMPLEXITY REDUCTION TECHNIQUES FOR
RELIABILITY MODELING 429 AYMAN Z. FAZA, SAHRA SEDIGH, AND BRUCE M.
MCMILLIN AUTOMATING THE PROCESSES OF SELECTING AN APPROPRIATE SCHEDULING
ALGORITHM AND CONFIGURING THE SCHEDULER IMPLEMENTATION FOR
TIME-TRIGGERED EMBEDDED SYSTEMS 440 AYMAN K. GENDY AND MICHAEL J. PONT
AUTHOR INDEX 455 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV035093192 |
callnumber-first | Q - Science |
callnumber-label | QA75 |
callnumber-raw | QA75 |
callnumber-search | QA75 |
callnumber-sort | QA 275 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 260f DAT 343f DAT 050f |
ctrlnum | (OCoLC)259253717 (DE-599)DNB990379698 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Maschinenbau / Maschinenwesen Informatik |
discipline_str_mv | Maschinenbau / Maschinenwesen Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035093192</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111026</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">081010s2008 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,A41,0051</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">990379698</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540876977</subfield><subfield code="c">kart. : EUR 65.22 (freier Pr.), sfr 101.50 (freier Pr.)</subfield><subfield code="9">978-3-540-87697-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540876977</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12517558</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)259253717</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB990379698</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA75</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 260f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">620</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 343f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer safety, reliability and security</subfield><subfield code="b">27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings</subfield><subfield code="c">Michael D. Harrison ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 456 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5219</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit - Datensicherung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Eingebettetes System - Softwareentwicklung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mensch-Maschine-Kommunikation - Technische Sicherheit - Zuverlässigkeit - Systementwicklung - Kongress - Newcastle-upon-Tyne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitskritisches System - Zuverlässigkeit - Fehlertoleranz - Kongress - Newcastle-upon-Tyne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Reliability</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic digital computers</subfield><subfield code="x">Reliability</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial safety</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systementwicklung</subfield><subfield code="0">(DE-588)4126945-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technische Sicherheit</subfield><subfield code="0">(DE-588)4059233-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Newcastle-upon-Tyne</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Technische Sicherheit</subfield><subfield code="0">(DE-588)4059233-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Systementwicklung</subfield><subfield code="0">(DE-588)4126945-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harrison, Michael Douglas</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">SAFECOMP</subfield><subfield code="n">27</subfield><subfield code="d">2008</subfield><subfield code="c">Newcastle-upon-Tyne</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10357099-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5219</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5219</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016761275&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016761275</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 Newcastle-upon-Tyne gnd-content |
genre_facet | Konferenzschrift 2008 Newcastle-upon-Tyne |
id | DE-604.BV035093192 |
illustrated | Illustrated |
index_date | 2024-07-02T22:11:19Z |
indexdate | 2025-01-10T15:09:53Z |
institution | BVB |
institution_GND | (DE-588)10357099-8 |
isbn | 9783540876977 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016761275 |
oclc_num | 259253717 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIV, 456 S. Ill., graph. Darst. 24 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings Michael D. Harrison ... (ed.) Berlin [u.a.] Springer 2008 XIV, 456 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5219 Literaturangaben Computersicherheit - Datensicherung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Eingebettetes System - Softwareentwicklung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Mensch-Maschine-Kommunikation - Technische Sicherheit - Zuverlässigkeit - Systementwicklung - Kongress - Newcastle-upon-Tyne <2008> Sicherheitskritisches System - Zuverlässigkeit - Fehlertoleranz - Kongress - Newcastle-upon-Tyne <2008> Computer security Congresses Computer software Reliability Congresses Electronic digital computers Reliability Congresses Industrial safety Congresses Formale Methode (DE-588)4333722-3 gnd rswk-swf Eingebettetes System (DE-588)4396978-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zuverlässigkeit (DE-588)4059245-5 gnd rswk-swf Systementwicklung (DE-588)4126945-7 gnd rswk-swf Technische Sicherheit (DE-588)4059233-9 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Fehlertoleranz (DE-588)4123192-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 Newcastle-upon-Tyne gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Zuverlässigkeit (DE-588)4059245-5 s Formale Methode (DE-588)4333722-3 s DE-604 Mensch-Maschine-Kommunikation (DE-588)4125909-9 s Technische Sicherheit (DE-588)4059233-9 s Systementwicklung (DE-588)4126945-7 s Sicherheitskritisches System (DE-588)4767762-4 s Fehlertoleranz (DE-588)4123192-2 s Eingebettetes System (DE-588)4396978-1 s Softwareentwicklung (DE-588)4116522-6 s Harrison, Michael Douglas Sonstige oth SAFECOMP 27 2008 Newcastle-upon-Tyne Sonstige (DE-588)10357099-8 oth Lecture notes in computer science 5219 (DE-604)BV000000607 5219 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016761275&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings Lecture notes in computer science Computersicherheit - Datensicherung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Eingebettetes System - Softwareentwicklung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Mensch-Maschine-Kommunikation - Technische Sicherheit - Zuverlässigkeit - Systementwicklung - Kongress - Newcastle-upon-Tyne <2008> Sicherheitskritisches System - Zuverlässigkeit - Fehlertoleranz - Kongress - Newcastle-upon-Tyne <2008> Computer security Congresses Computer software Reliability Congresses Electronic digital computers Reliability Congresses Industrial safety Congresses Formale Methode (DE-588)4333722-3 gnd Eingebettetes System (DE-588)4396978-1 gnd Computersicherheit (DE-588)4274324-2 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd Softwareentwicklung (DE-588)4116522-6 gnd Datensicherung (DE-588)4011144-1 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Systementwicklung (DE-588)4126945-7 gnd Technische Sicherheit (DE-588)4059233-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Fehlertoleranz (DE-588)4123192-2 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4396978-1 (DE-588)4274324-2 (DE-588)4125909-9 (DE-588)4116522-6 (DE-588)4011144-1 (DE-588)4059245-5 (DE-588)4126945-7 (DE-588)4059233-9 (DE-588)4767762-4 (DE-588)4123192-2 (DE-588)1071861417 |
title | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings |
title_auth | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings |
title_exact_search | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings |
title_exact_search_txtP | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings |
title_full | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings Michael D. Harrison ... (ed.) |
title_fullStr | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings Michael D. Harrison ... (ed.) |
title_full_unstemmed | Computer safety, reliability and security 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings Michael D. Harrison ... (ed.) |
title_short | Computer safety, reliability and security |
title_sort | computer safety reliability and security 27th international conference safecomp 2008 newcastle upon tyne uk september 22 25 2008 proceedings |
title_sub | 27th international conference, SAFECOMP 2008, Newcastle-upon Tyne, UK, September 22 - 25, 2008 ; proceedings |
topic | Computersicherheit - Datensicherung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Eingebettetes System - Softwareentwicklung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Mensch-Maschine-Kommunikation - Technische Sicherheit - Zuverlässigkeit - Systementwicklung - Kongress - Newcastle-upon-Tyne <2008> Sicherheitskritisches System - Zuverlässigkeit - Fehlertoleranz - Kongress - Newcastle-upon-Tyne <2008> Computer security Congresses Computer software Reliability Congresses Electronic digital computers Reliability Congresses Industrial safety Congresses Formale Methode (DE-588)4333722-3 gnd Eingebettetes System (DE-588)4396978-1 gnd Computersicherheit (DE-588)4274324-2 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd Softwareentwicklung (DE-588)4116522-6 gnd Datensicherung (DE-588)4011144-1 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Systementwicklung (DE-588)4126945-7 gnd Technische Sicherheit (DE-588)4059233-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Fehlertoleranz (DE-588)4123192-2 gnd |
topic_facet | Computersicherheit - Datensicherung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Eingebettetes System - Softwareentwicklung - Zuverlässigkeit - Formale Methode - Kongress - Newcastle-upon-Tyne <2008> Mensch-Maschine-Kommunikation - Technische Sicherheit - Zuverlässigkeit - Systementwicklung - Kongress - Newcastle-upon-Tyne <2008> Sicherheitskritisches System - Zuverlässigkeit - Fehlertoleranz - Kongress - Newcastle-upon-Tyne <2008> Computer security Congresses Computer software Reliability Congresses Electronic digital computers Reliability Congresses Industrial safety Congresses Formale Methode Eingebettetes System Computersicherheit Mensch-Maschine-Kommunikation Softwareentwicklung Datensicherung Zuverlässigkeit Systementwicklung Technische Sicherheit Sicherheitskritisches System Fehlertoleranz Konferenzschrift 2008 Newcastle-upon-Tyne |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016761275&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT harrisonmichaeldouglas computersafetyreliabilityandsecurity27thinternationalconferencesafecomp2008newcastleupontyneukseptember22252008proceedings AT safecompnewcastleupontyne computersafetyreliabilityandsecurity27thinternationalconferencesafecomp2008newcastleupontyneukseptember22252008proceedings |