共 47 条
[12]
Cheswick WilliamR., 1994, FIREWALLS INTERNET S
[13]
*CHOR SYST, 1996, CSTR961198
[14]
Daran M., 1996, Proceedings of the 1996 International Symposium on Software Testing and Analysis (ISSTA), P158, DOI 10.1145/226295.226313
[15]
Formal analysis of the priority ceiling protocol
[J].
21ST IEEE REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS,
2000,
:151-160
[16]
Fabre J.-C., 1999, Dependable Computing for Critical Applications 7, P25, DOI 10.1109/DCFTS.1999.814288
[17]
Building dependable COTS microkernel-based systems using MAFALDA
[J].
2000 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS,
2000,
:85-92
[18]
Fuchs E., 1998, Dependable Computing and Fault-Tolerant Systems. Vol.11. Dependable Computing for Critical Applications 6, P225
[19]
Executable assertions for detecting data errors in embedded control systems
[J].
DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2000,
:24-33