Formal Techniques for Safety-Critical Systems: Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Communications in Computer and Information Science
476 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | Online-Ressource (X, 257 S.) Ill. |
ISBN: | 9783319175812 |
ISSN: | 1865-0929 |
DOI: | 10.1007/978-3-319-17581-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544565 | ||
003 | DE-604 | ||
005 | 20160713 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319175812 |c Online |9 978-3-319-17581-2 | ||
024 | 7 | |a 10.1007/978-3-319-17581-2 |2 doi | |
035 | |a (OCoLC)908701556 | ||
035 | |a (DE-599)BVBBV042544565 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.1015113 |2 23 | |
084 | |a ST 278 |0 (DE-625)143644: |2 rvk | ||
245 | 1 | 0 | |a Formal Techniques for Safety-Critical Systems |b Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers |c edited by Cyrille Artho, Peter Csaba Ölveczky |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a Online-Ressource (X, 257 S.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in Computer and Information Science |v 476 |x 1865-0929 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Logischer Entwurf |0 (DE-588)4168051-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Luxembourg |2 gnd-content | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 0 | 2 | |a Logischer Entwurf |0 (DE-588)4168051-0 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 4 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 5 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Artho, Cyrille |d 1976- |e Sonstige |0 (DE-588)130875279 |4 oth | |
700 | 1 | |a Ölveczky, Peter Csaba |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-17580-5 |
830 | 0 | |a Communications in Computer and Information Science |v 476 |w (DE-604)BV041227480 |9 476 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-17581-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978571 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17581-2 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804153310271242240 |
---|---|
adam_text | FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS
/ ARTHO, CYRILLE
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CASE STUDIES AND EXPERIENCE REPORTS ON THE USE OF FORMAL METHODS FOR
ANALYZING
SAFETY-CRITICAL SYSTEMS
METHODS, TECHNIQUES, AND TOOLS TO SUPPORT AUTOMATED ANALYSIS,
CERTIFCATION, AND DEBUGGING OF COMPLEX SAFETY/QOS-CRITICAL
SYSTEMS.-ANALYSIS METHODS THAT ADDRESS THE LIMITATIONS OF FORMAL
METHODS IN INDUSTRY.-FORMAL ANALYSIS SUPPORT FOR MODELING LANGUAGES
USED IN INDUSTRY
CODE GENERATION FROM VALIDATED MODELS.
METHODS, TECHNIQUES, AND TOOLS TO SUPPORT AUTOMATED ANALYSIS,
CERTIFCATION, AND DEBUGGING OF COMPLEX SAFETY/QOS-CRITICAL
SYSTEMS.-ANALYSIS METHODS THAT ADDRESS THE LIMITATIONS OF FORMAL
METHODS IN INDUSTRY.-FORMAL ANALYSIS SUPPORT FOR MODELING LANGUAGES
USED IN INDUSTRY
CODE GENERATION FROM VALIDATED MODELS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS
/ ARTHO, CYRILLE
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE THIRD
INTERNATIONAL WORKSHOP ON FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS,
FTSCS 2014, HELD IN LUXEMBOURG, IN NOVEMBER 2014. THE 14 REVISED FULL
PAPERS PRESENTED TOGETHER WITH TWO INVITED TALKS WERE CAREFULLY REVIEWED
AND SELECTED FROM 40 SUBMISSIONS. THE PAPERS ADDRESS VARIOUS TOPICS
RELATED TO THE APPLICATION OF FORMAL AND SEMI-FORMAL METHODS TO IMPROVE
THE QUALITY OF SAFETY-CRITICAL COMPUTER SYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)130875279 |
building | Verbundindex |
bvnumber | BV042544565 |
classification_rvk | ST 278 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)908701556 (DE-599)BVBBV042544565 |
dewey-full | 005.1015113 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1015113 |
dewey-search | 005.1015113 |
dewey-sort | 15.1015113 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-17581-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04396nmm a2200757zcb4500</leader><controlfield tag="001">BV042544565</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160713 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319175812</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-17581-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-17581-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544565</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1015113</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 278</subfield><subfield code="0">(DE-625)143644:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Formal Techniques for Safety-Critical Systems</subfield><subfield code="b">Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers</subfield><subfield code="c">edited by Cyrille Artho, Peter Csaba Ölveczky</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online-Ressource (X, 257 S.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">476</subfield><subfield code="x">1865-0929</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Logischer Entwurf</subfield><subfield code="0">(DE-588)4168051-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Luxembourg</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Logischer Entwurf</subfield><subfield code="0">(DE-588)4168051-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Artho, Cyrille</subfield><subfield code="d">1976-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)130875279</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ölveczky, Peter Csaba</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-17580-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">476</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">476</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978571</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17581-2</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Luxembourg gnd-content |
genre_facet | Konferenzschrift 2014 Luxembourg |
id | DE-604.BV042544565 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:24:34Z |
institution | BVB |
isbn | 9783319175812 |
issn | 1865-0929 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978571 |
oclc_num | 908701556 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | Online-Ressource (X, 257 S.) Ill. |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Communications in Computer and Information Science |
series2 | Communications in Computer and Information Science |
spelling | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers edited by Cyrille Artho, Peter Csaba Ölveczky Cham Springer International Publishing 2015 Online-Ressource (X, 257 S.) Ill. txt rdacontent c rdamedia cr rdacarrier Communications in Computer and Information Science 476 1865-0929 Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Software Engineering (DE-588)4116521-4 gnd rswk-swf Logischer Entwurf (DE-588)4168051-0 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Luxembourg gnd-content Informatik (DE-588)4026894-9 s Software Engineering (DE-588)4116521-4 s Logischer Entwurf (DE-588)4168051-0 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Sicherheitskritisches System (DE-588)4767762-4 s DE-604 Artho, Cyrille 1976- Sonstige (DE-588)130875279 oth Ölveczky, Peter Csaba Sonstige oth Erscheint auch als Druckausgabe 978-3-319-17580-5 Communications in Computer and Information Science 476 (DE-604)BV041227480 476 https://doi.org/10.1007/978-3-319-17581-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers Communications in Computer and Information Science Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Informatik (DE-588)4026894-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Software Engineering (DE-588)4116521-4 gnd Logischer Entwurf (DE-588)4168051-0 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4026894-9 (DE-588)4767762-4 (DE-588)4116521-4 (DE-588)4168051-0 (DE-588)1071861417 |
title | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers |
title_auth | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers |
title_exact_search | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers |
title_full | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers edited by Cyrille Artho, Peter Csaba Ölveczky |
title_fullStr | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers edited by Cyrille Artho, Peter Csaba Ölveczky |
title_full_unstemmed | Formal Techniques for Safety-Critical Systems Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers edited by Cyrille Artho, Peter Csaba Ölveczky |
title_short | Formal Techniques for Safety-Critical Systems |
title_sort | formal techniques for safety critical systems third international workshop ftscs 2014 luxembourg november 6 7 2014 revised selected papers |
title_sub | Third International Workshop, FTSCS 2014, Luxembourg, November 6-7, 2014. Revised Selected Papers |
topic | Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Informatik (DE-588)4026894-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Software Engineering (DE-588)4116521-4 gnd Logischer Entwurf (DE-588)4168051-0 gnd |
topic_facet | Datensicherung Computersicherheit Informatik Sicherheitskritisches System Software Engineering Logischer Entwurf Konferenzschrift 2014 Luxembourg |
url | https://doi.org/10.1007/978-3-319-17581-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978571&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT arthocyrille formaltechniquesforsafetycriticalsystemsthirdinternationalworkshopftscs2014luxembourgnovember672014revisedselectedpapers AT olveczkypetercsaba formaltechniquesforsafetycriticalsystemsthirdinternationalworkshopftscs2014luxembourgnovember672014revisedselectedpapers |