2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2018
DOI: 10.1109/icacci.2018.8554566
|View full text |Cite
|
Sign up to set email alerts
|

Safety Critical Embedded Software: Significance and Approach to Reliability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…According to [11], safety is determined by the possibility of failures leading to a hazardous situation. Hazard analysis is commonly used to identify the proper sources of potential failures, risks, and impacts (due to failure/malfunction) in the early stage of the design process [12,13]. It is an iterative method that also establishes the necessary measures to deal with associated risks.…”
Section: Safety-critical Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…According to [11], safety is determined by the possibility of failures leading to a hazardous situation. Hazard analysis is commonly used to identify the proper sources of potential failures, risks, and impacts (due to failure/malfunction) in the early stage of the design process [12,13]. It is an iterative method that also establishes the necessary measures to deal with associated risks.…”
Section: Safety-critical Systemsmentioning
confidence: 99%
“…Only a couple of the aforementioned failures are software-related. However, most failures, in general, can be attributed to the underevaluation of safety procedures during the design and development phase of the system [11][12][13]. Hence, the functional and non-functional requirements of safety-critical RTOS must be certified by recognized safety standards to be allowed for use [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…human injury, property damage). Therefore, the development process typically requires the software to be sufficiently verified before releasing the products [8]. The verification cost is expensive and grows fast as the assurance level and software size increase [9].…”
Section: Introductionmentioning
confidence: 99%