References

  1. P. Abdulla, J. Deneux, G. Stålmarck, H. Ågren & O. Åkerlund (2006): Designing Safe, Reliable Systems Using SCADE. In: Leveraging Applications of Formal Methods, LNCS 4313. Springer, pp. 115–129, doi:10.1007/11925040_8.
  2. O. Akerlund, S. Nadjm-Tehrani & G. Stålmarck (1999): Integration of Formal Methods into System Safety and Reliability Analysis. In: Proceedings of 17th International Systems Safety Conference, pp. 326–336.
  3. P. Bieber, C. Castel & C. Seguin (2002): Combination of Fault Tree Analysis and Model Checking for Safety Assessment of Complex System. In: Dependable Computing EDCC-4. Springer, pp. 19–31, doi:10.1007/3-540-36080-8_3.
  4. M. Bozzano & A. Villafiorita (2007): The FSAP/NuSMV-SA Safety Analysis Platform. International Journal on Software Tools for Technology Transfer 9(1), pp. 5–24, doi:10.1007/s10009-006-0001-2.
  5. R.E. Bryant (1986): Graph-Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers C-35(8), pp. 677–691, doi:10.1109/TC.1986.1676819.
  6. A. Cerone, S. Connelly & P. A. Lindsay (2008): Formal analysis of human operator behavioural patterns in interactive surveillance systems. Software and Systems Modeling 7(3), pp. 273–286, doi:10.1007/s10270-007-0072-x.
  7. S. Cha, H. Son, J. Yoo, E. Jee & P.H. Seong (2003): Systematic Evaluation of Fault Trees using Real-time Model Checker UPPAAL. Reliability Engineering & System Safety 82(1), pp. 11 – 20, doi:10.1016/S0951-8320(03)00059-0.
  8. E.M. Clarke, Jr., O. Grumberg & D.A. Peled (1999): Model Checking. MIT Press.
  9. C. Courcoubetis, M.Y. Vardi, P. Wolper & M. Yannakakis (1992): Memory-Efficient Algorithms for the Verification of Temporal Properties. Formal Methods in System Design 1(2/3), pp. 275–288, doi:10.1007/BF00121128.
  10. R.G. Dromey (2003): From Requirements to Design: Formalizing the Key Steps. In: 1st International Conference on Software Engineering and Formal Methods. IEEE Computer Society, pp. 2–11, doi:10.1109/SEFM.2003.1236202.
  11. International Electrotechnical Commission (2010): Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems. Part 1: General requirements. International Standard IEC 61508-1.
  12. D. Kozen (1983): Results on the Propositional mu-Calculus. Theoretical Computer Science 27, pp. 333–354, doi:10.1016/0304-3975(82)90125-6.
  13. S. Kromodimoeljo (2014): Controlling the Generation of Multiple Counterexamples in LTL Model Checking. phdthesis, doi:10.14264/uql.2015.16.
  14. N. Leveson (1995): Safeware - System Safety and Computers: A Guide to Preventing Accidents and Losses caused by Technology. Addison-Wesley.
  15. L.Grunske, K. Winter, N. Yatapanage, S. Zafar,Saad & P.A. Lindsay (2011): Experience with Fault Injection Experiments for FMEA. Software: Practice and Experience 41(11), pp. 1233–1258, doi:10.1002/spe.1039.
  16. P.A. Lindsay, K. Winter & S. Kromodimoeljo (2012): Model-based Safety Risk Assessment using Behavior Trees. In: Proceedings of the 6th Asia Pacific Conference on System Engineering. Systems Engineering Society of Australia. Available at http://staff.itee.uq.edu.au/pal/papers/SETE2012.pdf.
  17. P.A. Lindsay, N. Yatapanage & K. Winter (2012): Cut Set Analysis using Behavior Trees and Model Checking. Formal Aspects of Computing 24(2), pp. 249–266, doi:10.1007/s00165-011-0181-8.
  18. S. Minato (1993): Fast Generation of Prime-Irredundant Covers from Binary Decision Diagrams. IEICE Transactions on Fundamentals of E76-A(6), pp. 967–973.
  19. E. Morreale (1970): Recursive Operators for Prime Implicant and Irredundant Normal Form Determination. IEEE Transactions on Computers 19(6), pp. 504–509, doi:10.1109/T-C.1970.222967.
  20. L. de Moura, S. Owre, H. Rue\IeCß, J. Rushby, N. Shankar, M. Sorea & A. Tiwari (2004): SAL 2. In: 16th International Conference on Computer Aided Verification, LNCS 3114. Springer, pp. 496–500, doi:10.1007/978-3-540-27813-9_45.
  21. F. Ortmeier, W. Reif & G. Schellhorn (2006): Deductive Cause-Consequence Analysis (DCCA). Proceedings of IFAC World Congress.
  22. F. Ortmeier & G. Schellhorn (2007): Formal Fault Tree Analysis - Practical Experiences. Electronic Notes in Theoretical Computer Science 185, pp. 139 – 151, doi:10.1016/j.entcs.2007.05.034.
  23. Y. Papadopoulos & M. Maruhn (2001): Model-Based Synthesis of Fault Trees from Matlab-Simulink Models. In: Proc. Int. Conf. on Dependable Systems and Networks (DSN 2001). IEEE Computer Society, pp. 77–82, doi:10.1109/DSN.2001.941393.
  24. D. Peled, T. Wilke & P. Wolper (1996): An Algorithmic Approach for Checking Closure Properties of ω-Regular Languages. In: 7th International Conference on Concurrency Theory, LNCS 1119. Springer, pp. 596–610, doi:10.1016/S0304-3975(97)00219-3.
  25. A. Pnueli (1977): The Temporal Logic of Programs. In: 18th Annual Symposium on Foundations of Computer Science. IEEE Computer Society, pp. 46–57, doi:10.1109/SFCS.1977.32.
  26. A. Rae & P. Lindsay (2004): A Behaviour-based Method for Fault Tree Generation. In: Proceedings of 22nd Internatonal System Safety Conference. System Safety Society, pp. 289–298.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org