EWICS (European Workshop on Industrial Computer Systems) TC7 Software Sub-group
{"title":"安全相关软件的验证和确认技术","authors":"EWICS (European Workshop on Industrial Computer Systems) TC7 Software Sub-group","doi":"10.1016/0167-8051(85)90023-3","DOIUrl":null,"url":null,"abstract":"<div><p>Several techniques for verification and validation of safety related software are described in the form of structured texts. The techniques include static logic analysis, testing, reliability assessment by probabilistic methods and some specialities about the test of data bases. The most relevant techniques have been selected. Their description in their various subforms includes their aims, the necessary prerequisites, their major advantages and their drawbacks. Statements are added about recommendability, the results provided, relationships to other methods and whether or not assisting tools are available.</p></div>","PeriodicalId":100323,"journal":{"name":"Computers and Standards","volume":"4 2","pages":"Pages 101-112"},"PeriodicalIF":0.0000,"publicationDate":"1985-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0167-8051(85)90023-3","citationCount":"12","resultStr":"{\"title\":\"Techniques for verification and validation of safety-related software\",\"authors\":\"EWICS (European Workshop on Industrial Computer Systems) TC7 Software Sub-group\",\"doi\":\"10.1016/0167-8051(85)90023-3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Several techniques for verification and validation of safety related software are described in the form of structured texts. The techniques include static logic analysis, testing, reliability assessment by probabilistic methods and some specialities about the test of data bases. The most relevant techniques have been selected. Their description in their various subforms includes their aims, the necessary prerequisites, their major advantages and their drawbacks. Statements are added about recommendability, the results provided, relationships to other methods and whether or not assisting tools are available.</p></div>\",\"PeriodicalId\":100323,\"journal\":{\"name\":\"Computers and Standards\",\"volume\":\"4 2\",\"pages\":\"Pages 101-112\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1985-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/0167-8051(85)90023-3\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers and Standards\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/0167805185900233\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers and Standards","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/0167805185900233","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Techniques for verification and validation of safety-related software
Several techniques for verification and validation of safety related software are described in the form of structured texts. The techniques include static logic analysis, testing, reliability assessment by probabilistic methods and some specialities about the test of data bases. The most relevant techniques have been selected. Their description in their various subforms includes their aims, the necessary prerequisites, their major advantages and their drawbacks. Statements are added about recommendability, the results provided, relationships to other methods and whether or not assisting tools are available.