共 25 条
[11]
IBM Research Report No. RJR 4130, (1983)
[12]
Chehey M.H., Gasser M., Huff G., Miller J.K., Verifying security, Computing Surveys, 13, 3, pp. 279-339, (1981)
[13]
David R., Signature analysis for multiple output circuits, IEEE Trans. Computer, Sept., C-35, 9, pp. 830-837, (1986)
[14]
Boehm B., Guidelines for verifying and validating software requirements and design specifications, Proc. EURO IFIP'79, pp. 711-719, (1979)
[15]
Levendel Y., Fault simulation, Fault-Tolerant Computing, Theory and Techniques, pp. 184-264, (1986)
[16]
Castillo X., Siewiorek D.P., Workload, performance, and reliability of digital computing system, Proc. 11th IEEE Int. Symp. Fault Tolerant Computing (FTCS-11), pp. 84-89, (1981)
[17]
Fura D.A., Somani A.K., Trustability: A Dependability Measure for Systems with Localized Error Detection and Reporting, (1990)
[18]
Craigen D., Strengths and weaknesses of program verification systems, Proc. 1st European Software Engineering Conf., pp. 421-429, (1987)
[19]
McCluskey E.J., Design for testability, Fault-Tolerant Computing, Theory and Techniques, pp. 95-183, (1986)
[20]
Meyer J.F., On evaluating the performability of degradable computing systems, Proc. 8th IEEE Int. Symp. Fault Tolerant Computing (FTCS-8), pp. 44-49, (1978)