2003
DOI: 10.1016/s0951-8320(03)00093-0
|View full text |Cite
|
Sign up to set email alerts
|

Software criticality analysis of COTS/SOUP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2003
2003
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…G S = c c (g 1 + g 2 ) + c s (g 3 + g 4 + g 5 ) + c d (g 6 + g 7 ). (11) Similar to G R in (10), the values of g 1 , g 3 , g 4 , g 6 , and g 7 are always positive, and either g 2 or g 5 is (or both are) positive. Moreover, if either of g 2 or g 5 is negative, then the negative one has the lower value.…”
Section: Safety Gainmentioning
confidence: 77%
See 2 more Smart Citations
“…G S = c c (g 1 + g 2 ) + c s (g 3 + g 4 + g 5 ) + c d (g 6 + g 7 ). (11) Similar to G R in (10), the values of g 1 , g 3 , g 4 , g 6 , and g 7 are always positive, and either g 2 or g 5 is (or both are) positive. Moreover, if either of g 2 or g 5 is negative, then the negative one has the lower value.…”
Section: Safety Gainmentioning
confidence: 77%
“…For example, some failures may be masked by increasing (or decreasing) H, while some other failure maskings may depend on n (or both H and n at the same time). In EMV, 6 10 } for n = {3, 4, 5, · · · , 10} respectively. This shows that as n increases, H decreases towards 1 2 following a wave shape.…”
Section: Relationships Among H P and Nmentioning
confidence: 99%
See 1 more Smart Citation
“…Criticality analysis has been extensively studied in software [29], but is quite rare in error-resilient computing device research. Only recently, the general area of criticality analysis (CA), which provides relative measures of significance for the effects of individual components on the overall correctness of system operation, has been investigated in digital circuit design.…”
Section: Related Workmentioning
confidence: 99%
“…
This paper describes the integrity static analysis approach developed to support the justification of commercial off-the-shelf software (COTS) used in a safety-related system. The static analysis was part of an overall software qualification programme, which also included the work reported in our paper presented at Safecomp 2002 [1]. Integrity static analysis focuses on unsafe language constructs and "covert" flows, where one thread can affect the data or control flow of another thread.
…”
mentioning
confidence: 99%