Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    SECT-AIR: Software Engineering Costs and Timescales – Aerospace Initiative for Reduction

    Software is critical to the majority of functionality in avionics and aerospace systems. The amount of safety-related software in avionics is growing rapidly (doubling in size around every four years), and the...

    Richard F. Paige, Athanasios Zolotas in Software Technologies: Applications and Fo… (2018)

  2. No Access

    Chapter and Conference Paper

    The Risks of LSCITS: The Odds Are Stacked against Us

    Complex IT Systems are often used in applications which can pose a risk to their owners or to the public. Many of these are subject to extensive risk assessment before they are deployed and operated yet, despi...

    John A. McDermid in Large-Scale Complex IT Systems. Development, Operation and Management (2012)

  3. No Access

    Chapter and Conference Paper

    Failures of a Business Process in Enterprise Systems

    A business process model typically describes a desired flow of events in an ideal environment. However, the reality tends to be more complicated than what is designed in the model. During the execution of busi...

    **aocheng Ge, Richard F. Paige, John A. McDermid in ENTERprise Information Systems (2011)

  4. Chapter and Conference Paper

    Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing

    We study optimal strategies to decorrelating traffic in tactical wireless sensor networks where the goal is hiding sensible information (e.g., communication patterns, nodes location) about ongoing operations i...

    Juan E. Tapiador, Mudhakar Srivatsa, John A. Clark in NETWORKING 2011 Workshops (2011)

  5. No Access

    Chapter and Conference Paper

    Probabilistic Failure Propagation and Transformation Analysis

    A key concern in safety engineering is understanding the overall emergent failure behaviour of a system, i.e., behaviour exhibited by the system that is outside its specification of acceptable behaviour. A sys...

    **aocheng Ge, Richard F. Paige in Computer Safety, Reliability, and Security (2009)

  6. No Access

    Chapter and Conference Paper

    The Art and Science of Software Architecture

    The past 20 years has seen significant investments in the theory and practice of software architecture. However, architectural deficiencies are frequently cited as a key factor in the shortcomings and failures...

    Alan W. Brown, John A. McDermid in Software Architecture (2007)

  7. No Access

    Chapter and Conference Paper

    An Automated Approach to Specification-Based Program Inspection

    In this paper, we describe how formal specification is adopted to improve the commonly used verification and validation technique known as program inspection, in order to establish a more rigorous, repeatable, an...

    Shaoying Liu, Fumiko Nagoya, Yuting Chen in Formal Methods and Software Engineering (2005)

  8. No Access

    Chapter and Conference Paper

    A Behavioural Notion of Subty** for Object-Oriented Programming in SPARK95

    The dynamic aspects of the object-oriented paradigm have prevented the adoption of the latter for the implementation of high integrity systems using the SPARK approach. This paper presents a proposal that allo...

    Tse-Min Lin, John A. McDermid in Reliable Software Technologies — Ada-Europe 2003 (2003)

  9. No Access

    Chapter

    Investigating the Effectiveness of Object-Oriented Strategies with the Mutation Method

    The mutation method assesses test quality by examining the ability of a test set to distinguish syntactic deviations representing specific types of faults from the program under test. This paper describes an e...

    Sunwoo Kim, John A. Clark, John A. McDermid in Mutation Testing for the New Century (2001)

  10. No Access

    Chapter and Conference Paper

    Deriving Quantified Safety Requirements in Complex Systems

    A variety of hazard analysis techniques have been proposed for software-based systems but individually the techniques are limited in their ability to cope with system complexity, or to derive and prioritise co...

    Peter A. Lindsay, John A. McDermid in Computer Safety, Reliability and Security (2000)

  11. No Access

    Chapter and Conference Paper

    (True) Polymorphism in SPARK2000

    The SPARK programming language and associated tools are specifically intended for the implementation of high integrity systems. SPARK2000 is an extension to the SPARK95 language to support object-oriented prog...

    Tse-Min Lin, John A. McDermid in Reliable Software Technologies Ada-Europe 2000 (2000)

  12. No Access

    Chapter and Conference Paper

    Hierarchically Performed Hazard Origin and Propagation Studies

    This paper introduces a new method for safety analysis called Hi-PHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number of classical techniques such as Functiona...

    Yiannis Papadopoulos, John A. McDermid in Computer Safety, Reliability and Security (1999)

  13. No Access

    Article

    A harmonised model for safety assessment and certification of safety-critical systems in the transportation industries

    This paper describes a model for the assessment and certification of safety-critical programmable electronic systems in the transportation industries. The proposed model is founded on the significant commonali...

    Yiannis Papadopoulos, John A. McDermid in Requirements Engineering (1998)

  14. No Access

    Chapter and Conference Paper

    A systematic approach to software safety integrity levels

    International Standards for safety-critical software typically use notions of Safety Integrity Levels (SILs) which in our experience are difficult to apply and which lack credible assessment criteria. This pap...

    Peter A. Lindsay, John A. McDermid in Safe Comp 97 (1997)

  15. No Access

    Chapter and Conference Paper

    Software Hazard and Safety Analysis: Opportunities and Challenges

    It is now widely recognised that software plays a significant role in the safety of many systems. There is a growing trend, in a number of industries, for a safety case to be required before a system can be de...

    John A. McDermid in Safety-Critical Systems: The Convergence of High Tech and Human Factors (1996)

  16. No Access

    Chapter and Conference Paper

    What is the Right Specification/Design/Implementation Paradigm for Real-Time Applications?

    The aim of this short paper is to set out the author’s views on the issues which must be addressed by a real-time systems specification, design and implementation method. This is a very broad topic, so the mai...

    John A. McDermid in Real Time Computing (1994)

  17. No Access

    Chapter and Conference Paper

    Safety Engineering and Assurance for Real-Time Systems

    Many real-time systems are also safety-critical, that is they are used in applications where their inappropriate behaviour, or failure, could lead to loss of life, or severe environmental damage. Examples incl...

    John A. McDermid in Real Time Computing (1994)

  18. No Access

    Chapter

    Integrated Project Support Environments: General Principles and Issues in the Development of High Integrity Systems

    There have been many advances in software development technology and in software engineering methods and tools since the introduction of computers in the late 1940’s and early 1950’s. Perhaps the most signific...

    John A. McDermid in Software Engineering for Large Software Systems (1990)