SOFTWARE TECHNOLOGIES CALLED CRITICAL TO DEFENSE

被引:0
作者
GRUMAN, G
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:111 / 111
页数:1
相关论文
共 50 条
  • [11] Defense-in-depth and diverse qualification of safety-critical software
    Miedl, Horst
    Lee, Jang-Soo
    Lindner, Arndt
    Hoffman, Ernst
    Martz, Josef
    Lee, Young-Jun
    Choi, Jong-Gyun
    Kim, Jang-Yeol
    Chal, Kyoung-Ho
    Cheon, Se-Woo
    Lee, Cheol-Kwon
    Park, Gee-Yong
    Kwon, Kee-Choon
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2007, 4680 : 258 - +
  • [12] SAFETY-CRITICAL SOFTWARE FOR DEFENSE SYSTEMS - REQUIREMENTS OF INTERIM DEFENSE STANDARD-00-55
    REES, C
    ODDY, G
    GEC JOURNAL OF RESEARCH, 1995, 12 (01): : 43 - 49
  • [13] DEFENSE OF SO-CALLED FRILLS
    MURK, V
    EDUCATION, 1968, 88 (03): : 232 - 233
  • [14] DEFENSE LAWYER IS CALLED UPON TO DEFEND
    STROGOVI.MS
    SOVIET LAW AND GOVERNMENT, 1971, 9 (04): : 320 - 326
  • [15] Technologies for distributed defense
    Seiders, B
    Rybka, A
    TECHNOLOGIES, SYSTEMS, AND ARCHITECTURES FOR TRANSNATIONAL DEFENSE, 2002, 4745 : 13 - 21
  • [16] The Defense of disruptive technologies
    Meyer, D
    Buchta, C
    Mild, A
    Taudes, A
    Agent-Based Simulation: From Modeling Methodologies to Real-World Applications, 2005, 1 : 123 - 134
  • [17] TECHNOLOGIES FOR SOFTWARE
    ROCKSTROM, A
    TELE-ENGLISH EDITION, 1989, 43 (02): : 40 - 42
  • [18] Strategy called crucial to missile defense plans
    Mann, P
    AVIATION WEEK & SPACE TECHNOLOGY, 2001, 155 (05): : 56 - 58
  • [19] IN DEFENSE OF UNB SOFTWARE
    MOORE, KB
    CANADIAN LIBRARY JOURNAL, 1989, 46 (02): : 80 - 81
  • [20] Replacing lock is called critical
    ENR (Engineering News-Record), 1996, 236 (19):