Author:
Paul Raymond,Dong Jing,Yen I-Ling,Bastani Farokh
Reference19 articles.
1. Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle, “Privacy in e-commerce: examining user scenarios and privacy preferences,” Proceedings of the 1st ACM conference on Electronic commerce, Denver, Colorado, 1999, pp. 1-8.
2. T. Anderson, Resilient Computing Systems, John-Wiley, New York, 1985.
3. A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Trans. on Dependable and Secure Computing, Vol. 1, No. 1, Jan.-Mar. 2004, pp. 11-33.
4. F. B. Bastani and A. Pasquini, “Assessment of a sampling method for measuring safety-critical software reliability,” Proceedings of 5th International Symposium on Software Reliability Engineering, November 1994, pp. 93-102.
5. A.M.K. Cheng, Real-Time Systems: Scheduling, Analysis, and Verification, Wiley Interscience, 2002.