[1]
|
A. N. Srivastava and J. Schumann, “Software Health Management: A Necessity for Safety Critical Systems,” Innovations in Systems and Software Engineering, 2013, pp. 1-15, In Press.
|
[2]
|
S. Wang, A. Ayoub, R. Ivanov, O. Sokolsky and I. Lee, “Contract-Based Blame Assignment by Trace Analysis,” Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, Philadelphia, April 2013, pp. 117-126. doi:10.1145/2461446.2461463
|
[3]
|
R. H. Birkhahn, E. Haines, W. Wen, L. Reddy, W. M. Briggs and P. A. Datillo, “Estimating the Clinical Impact of Bringing a Multimarker Cardiac Panel to the Bedside in the ED,” The American Journal of Emergency Medicine, Vol. 29, No. 3, 2011, pp. 304-308.
doi:10.1016/j.ajem.2009.12.007
|
[4]
|
L. V. Dommelen, F. H. V. Tiel, S. Ouburg, et al., “Alarmingly Poor Performance in Chlamydia Trachomatis Point of Care Testing,” Sexually Transmitted Infections, Vol. 86, No. 5, 2010, pp. 355-359.
doi:10. 1136/sti. 2010.042598
|
[5]
|
J. M. S. Alonso and D. M. M. Pereira, “Medical Software Requirements at the New Cuban Regulations for Evaluation and State Control of Medical Devices,” IFMBE Proceedings on Biomedical Engineering CLAIB, Habana, 16-21 May 2011, pp. 433-435.
|
[6]
|
R. F. Goldsmith, “Discovering Real Business Requirements for Software Project Success,” 2004
http://www.ebookmall.com/author/robin-f-goldsmith
|
[7]
|
Y. Yan, S. Liu, Q. Zhang and H. Wu, “Analysis of Medical Device Recall Reports in FDA Database in 2005-2006,” IFMBE Proceedings, 2013, pp. 766-769.
|
[8]
|
S. Kierkegaard and P. Kierkegaard, “Danger to Public Health: Medical Devices, Toxicity, Virus and Fraud,” Computer Law and Security Review, Vol. 29, No. 1, 2013, pp. 13-27. doi:10. 1016/j.clsr.2012.11.006
|
[9]
|
National Health Service Infrastructure UK.
http://n3.nhs.uk/technicalinformation/n3netwo rkoverview.cfm
|
[10]
|
Canada Health Infoway, 2012.
https://www.infoway-inforoute.ca/index.php/about-infoway
|
[11]
|
A Notation to Describe Behavior of Complex and Dynamic Systems, University Of Ottawa.
http://www. usecasemaps.org/aboutucms.shtml
|
[12]
|
G. Holl, D. Thaller, P. Grünbacher and C. Elsner, “Managing Emerging Configuration Dependencies in Multi Product Lines,” Proceedings of the 6th International Workshop on Variability Modeling of Software-Intensive Systems, Leipzig, 25-27 January 2012, pp. 3-10.
|
[13]
|
B. Ostermaier, M. Kovatsch and S. Santini, “Connecting Things to the Web Using Programmable Low-Power WiFi Modules,” Proceedings of the 2nd International Workshop on Web of Things, San Francisco, 16 June 2011.
|
[14]
|
C. Ruz, F. Baude and B. Sauvan, “Component-Based Generic Approach for Reconfigurable Management of Component-Based SOA Applications,” Proceedings of the 3rd International Workshop on Monitoring, Adaptation and Beyond, 2010, pp. 25-32.
|
[15]
|
S. Bono, A. Rubin, A. Stubblefield and M. Green, “Security through Legality,” Communications of the ACM, Vol. 49, No. 6, 2006, pp. 41-43.
doi:10.1145/1132469.1132499
|
[16]
|
M. McKay, “Best Practices in Automation Security,” IEEE Cement Industry Technical Conference, San Antonio, 14-17 May 2012, pp. 1-15.
|
[17]
|
US Food and Drug Administration Certification Authority. http://www. fda. gov/MedicalDevices/ DeviceRegulationandGuiance/UniqueDeviceIdentification/ucm054169.htm
|
[18]
|
M. F. Johansen, o. Haugen and F. Fleurey, “Bow Tie Testing—A Testing Pattern for Product Lines,” Proceedings of the 16th European Conference on Pattern Languages of Programs, Irsee, 13-17 July 2011.
|
[19]
|
V. A. de Santiago Júnior and N. L. Vijaykumar, “Generating Model-based Test Cases from Natural Language Requirements for Space Application Software,” Software Quality Journal, Vol. 20, No. 1, 2012, pp. 77-143.
doi:10.1007/s11219-011-9155-6
|
[20]
|
J. Natarajan, J. Wells, A. Chatterjee and A. Singh, “Distributed Comparison Test Driven Multiprocessor Speedtuning: Targeting Performance Gains under Extreme Process Variations,” Proceedings of the Asian Test Symposium, 20-23 November 2011, New Delhi, pp. 154-160.
|
[21]
|
C. Nie and H. Leung, “The Minimal Failure-Causing Schema of Combinatorial Testing,” ACM Transactions on Software Engineering and Methodology, Vol. 20, No. 4, 2011, Article No. 2. doi:10.1145/2000799.2000801
|
[22]
|
I. Segall, R. Tzoref-Brill and E. Farchi, “Using Binary Decision Diagrams for Combinatorial Test Design,” Proceedings of the 2011 International Symposium on Software Testing and Analysis, Toronto, 17-21 July 2011, pp. 254-264. doi:10.1145/2001420.2001451
|
[23]
|
R. N. Kacker, D. R. Kuhn, Y. Lei and J. F. Lawrence, “Combinatorial Testing for Software: An Adaptation of Design of Experiments,” Measurement, 2013, In Press.
doi:10.1016/j.measurement. 2013.02.021
|
[24]
|
M. I. Capel and L. E. M. Morales, “A Formal Compositional Verification Approach for Safety-Critical Systems Correctness: Model-Checking Based Methodological Approach to Automatically Verify Safety Critical Systems Software,” Proceedings of the 14th International Conference on Enterprise Information Systems, Wroclaw, 28 June 2012, pp. 105-112.
|
[25]
|
Test Design Tool, HEXAWISE.
https://app.hexawise.com/
|
[26]
|
Agile Project Management Process Alliance, 2013.
http://www.agilealliance.org/the-alliance/the-agile-manifesto/
|
[27]
|
Agile Project Management Process, 12 Principles, 2013. http://www.agilealliance.org/the-alliance/the-agile-manifesto/the-twelve-principles-of-agile-software/
|
[28]
|
K. Gary, A. Enquobahrie, L. Ibanez, P. Cheng, Z. Yaniv, K. Cleary and J. Heidenreich, “Agile Methods for Open Source Safety-Critical Software,” Software: Practice and Experience, Vol. 41, No. 9, 2011, pp. 945-962.
doi:10.1002/spe.1075
|
[29]
|
M. Taromirad and R. F. Paige, “Agile Requirements Traceability Using Domain-Specific Modelling Languages,” Proceedings of the 2012 Extreme Modeling Workshop, Innsbruck, 1 October 2012, pp. 45-50.
|