Search Results - "Górski, Janusz"
-
1
AgileSafe – a method of introducing agile practices into safety-critical software development processes
Published in Annals of Computer Science and Information Systems (03-11-2016)Get full text
Journal Article -
2
-
3
Support for argument structures review and assessment
Published in Reliability engineering & system safety (2011)“…Argument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow…”
Get full text
Journal Article -
4
Towards automation of IT systems repairs
Published in Software quality journal (01-03-2018)“…Monitoring and repair are two sides of the on-the-fly maintenance of IT systems. Monitoring is well supported by automatic tools. In contrast, repairs involve…”
Get full text
Journal Article -
5
ASSESSMENT OF RISKS INTRODUCED TO SAFETY CRITICAL SOFTWARE BY AGILE PRACTICES — A SOFTWARE ENGINEER’S PERSPECTIVE
Published in Computer science : annual of University of Mining and Metallurgy (2012)“…In this article we investigate the problem of applying agile practices into safetycriticalprojects. The goal of our research is to investigate potential…”
Get full text
Journal Article -
6
Validation of Services Supporting Healthcare Standards Conformance
Published in Metrology and Measurement systems (01-01-2012)“…Validation of Services Supporting Healthcare Standards Conformance The paper presents the results of experimental validation of a set of innovative software…”
Get full text
Journal Article -
7
Safety of computer control systems: challenges and results in software development
Published in Annual Reviews in Control (2003)“…This paper reviews some results in improving software safety in computer control systems. The discussion covers various aspects of the software development…”
Get full text
Book Review Journal Article -
8
SCF — A framework supporting achieving and assessing conformity with standards
Published in Computer standards and interfaces (2011)“…Standards Conformity Framework (SCF) presented in this paper encompasses methods and tools which provide support for application of standards and other…”
Get full text
Journal Article -
9
Support for argument structures review and assessment : Safecomp 2008
Published in Reliability engineering & system safety (2011)Get full text
Journal Article -
10
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application
Published in 2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX (01-06-2008)“…Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies…”
Get full text
Conference Proceeding -
11
An Approach to Evaluation of Arguments in Trust Cases
Published in 2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX (01-06-2008)“…Trustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and…”
Get full text
Conference Proceeding -
12
Circadian rhythm of melatonin in patients with hypertension
Published in Polski merkuriusz lekarski (01-07-2004)“…Few reports, especially experimental ones indicate cause-effect connection between melatonin (Mel) and blood pressure. The aim of the study was to assess…”
Get more information
Journal Article -
13
Hazard Prevention by Forced Time Constraints
Published in 2006 International Conference on Dependability of Computer Systems (01-05-2006)“…Minimal cut sets resulting from fault tree analysis (FTA) indicate basic events which, if occur together, can contribute to a hazard. For some applications we…”
Get full text
Conference Proceeding -
14
An Approach for Evaluating Trust in IT Infrastructure
Published in 2006 International Conference on Dependability of Computer Systems (01-05-2006)“…Trustworthiness of an IT infrastructure can be justified using the concept of trust case which denotes a complete and explicit structure encompassing all the…”
Get full text
Conference Proceeding -
15
AgileSafe - a method of introducing agile practices into safety-critical software development processes
Published in 2016 Federated Conference on Computer Science and Information Systems (FedCSIS) (01-09-2016)“…This article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the…”
Get full text
Conference Proceeding -
16
Supporting Compliance with Security Standards by Trust Case Templates
Published in 2nd International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX '07) (01-06-2007)“…Trust cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of…”
Get full text
Conference Proceeding -
17
Formal specification and verification of a real-time kernel
Published in Proceedings Sixth Euromicro Workshop on Real-Time Systems (1994)“…The paper presents a case study of application of the VDM formal method to specification and verification of a simple real-time kernel. Specifications of…”
Get full text
Conference Proceeding -
18
Formal approach to development of critical computer applications
Published in [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume II: Software Track (1989)“…A formal approach to development of safety-related systems is presented. Three levels of system representation are treated within the common framework of…”
Get full text
Conference Proceeding