Search Results - "Górski, Janusz"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2
  3. 3

    Support for argument structures review and assessment by Cyra, Lukasz, Górski, Janusz

    “…Argument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow…”
    Get full text
    Journal Article
  4. 4

    Towards automation of IT systems repairs by Górski, Janusz, Kamiński, Marek

    Published in Software quality journal (01-03-2018)
    “…Monitoring and repair are two sides of the on-the-fly maintenance of IT systems. Monitoring is well supported by automatic tools. In contrast, repairs involve…”
    Get full text
    Journal Article
  5. 5

    ASSESSMENT OF RISKS INTRODUCED TO SAFETY CRITICAL SOFTWARE BY AGILE PRACTICES — A SOFTWARE ENGINEER’S PERSPECTIVE by Janusz, Górski, Katarzyna, Łukasiewicz

    “…In this article we investigate the problem of applying agile practices into safetycriticalprojects. The goal of our research is to investigate potential…”
    Get full text
    Journal Article
  6. 6

    Validation of Services Supporting Healthcare Standards Conformance by Górski, Janusz, Jarzebowicz, Aleksander, Miler, Jakub

    Published in Metrology and Measurement systems (01-01-2012)
    “…Validation of Services Supporting Healthcare Standards Conformance The paper presents the results of experimental validation of a set of innovative software…”
    Get full text
    Journal Article
  7. 7

    Safety of computer control systems: challenges and results in software development by Zalewski, Janusz, Ehrenberger, Wolfgang, Saglietti, Francesca, Górski, Janusz, Kornecki, Andrew

    Published in Annual Reviews in Control (2003)
    “…This paper reviews some results in improving software safety in computer control systems. The discussion covers various aspects of the software development…”
    Get full text
    Book Review Journal Article
  8. 8

    SCF — A framework supporting achieving and assessing conformity with standards by Cyra, Lukasz, Gorski, Janusz

    Published in Computer standards and interfaces (2011)
    “…Standards Conformity Framework (SCF) presented in this paper encompasses methods and tools which provide support for application of standards and other…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application by Cyra, L., Gorski, J.

    “…Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies…”
    Get full text
    Conference Proceeding
  11. 11

    An Approach to Evaluation of Arguments in Trust Cases by Cyra, L., Gorski, J.

    “…Trustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and…”
    Get full text
    Conference Proceeding
  12. 12

    Circadian rhythm of melatonin in patients with hypertension by Ostrowska, Zofia, Kos-Kudła, Beata, Marek, Bogdan, Kajdaniuk, Dariusz, Wołkowska, Kinga, Swietochowska, Elzbieta, Górski, Janusz, Szapska, Bozena

    Published in Polski merkuriusz lekarski (01-07-2004)
    “…Few reports, especially experimental ones indicate cause-effect connection between melatonin (Mel) and blood pressure. The aim of the study was to assess…”
    Get more information
    Journal Article
  13. 13

    Hazard Prevention by Forced Time Constraints by Golaszewski, G., Gorski, J.

    “…Minimal cut sets resulting from fault tree analysis (FTA) indicate basic events which, if occur together, can contribute to a hazard. For some applications we…”
    Get full text
    Conference Proceeding
  14. 14

    An Approach for Evaluating Trust in IT Infrastructure by Zagorski, M., Gorski, J.

    “…Trustworthiness of an IT infrastructure can be justified using the concept of trust case which denotes a complete and explicit structure encompassing all the…”
    Get full text
    Conference Proceeding
  15. 15

    AgileSafe - a method of introducing agile practices into safety-critical software development processes by Lukasiewicz, Katarzyna, Gorski, Janusz

    “…This article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the…”
    Get full text
    Conference Proceeding
  16. 16

    Supporting Compliance with Security Standards by Trust Case Templates by Cyra, L., Gorski, J.

    “…Trust cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of…”
    Get full text
    Conference Proceeding
  17. 17

    Formal specification and verification of a real-time kernel by Gorski, J., Wardzinski, A.

    “…The paper presents a case study of application of the VDM formal method to specification and verification of a simple real-time kernel. Specifications of…”
    Get full text
    Conference Proceeding
  18. 18

    Formal approach to development of critical computer applications by Gorski, J.

    “…A formal approach to development of safety-related systems is presented. Three levels of system representation are treated within the common framework of…”
    Get full text
    Conference Proceeding