Computer safety, reliability, and security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043831425 | ||
003 | DE-604 | ||
005 | 20170109 | ||
007 | cr|uuu---uuuuu | ||
008 | 161018s2016 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319454771 |c Online |9 978-3-319-45477-1 | ||
020 | |a 9783319454764 |c Print |9 978-3-319-45476-4 | ||
024 | 7 | |a 10.1007/978-3-319-45477-1 |2 doi | |
035 | |a (ZDB-2-SCS)9783319454771 | ||
035 | |a (ZDB-2-LNC)9783319454771 | ||
035 | |a (OCoLC)962078909 | ||
035 | |a (DE-599)BVBBV043831425 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.1015113 |2 23 | |
084 | |a DAT 286f |2 stub | ||
084 | |a TEC 770f |2 stub | ||
084 | |a DAT 260f |2 stub | ||
084 | |a DAT 343f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
111 | 2 | |a SAFECOMP |n 35. |d 2016 |c Trondheim |j Verfasser |0 (DE-588)1113669470 |4 aut | |
245 | 1 | 0 | |a Computer safety, reliability, and security |b 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings |c y Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.) |
264 | 1 | |a [Cham] |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource XV, 324 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 9922 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer organization | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Programming languages (Electronic computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer logic | |
650 | 4 | |a Application software | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Logics and Meanings of Programs | |
650 | 4 | |a Programming Languages, Compilers, Interpreters | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Applications | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2016 |z Trondheim |2 gnd-content | |
689 | 0 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | 1 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 0 | 2 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Skavhaug, Amund |d 1965- |0 (DE-588)1123041024 |4 edt | |
830 | 0 | |a Lecture Notes in Computer Science |v 9922 |w (DE-604)BV014880109 |9 9922 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-45477-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029242195 | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-573 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-523 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-19 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-45477-1 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2234965 |
---|---|
_version_ | 1821932628307083264 |
any_adam_object | |
author2 | Skavhaug, Amund 1965- |
author2_role | edt |
author2_variant | a s as |
author_GND | (DE-588)1123041024 |
author_corporate | SAFECOMP Trondheim |
author_corporate_role | aut |
author_facet | Skavhaug, Amund 1965- SAFECOMP Trondheim |
author_sort | SAFECOMP Trondheim |
building | Verbundindex |
bvnumber | BV043831425 |
classification_tum | DAT 286f TEC 770f DAT 260f DAT 343f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783319454771 (ZDB-2-LNC)9783319454771 (OCoLC)962078909 (DE-599)BVBBV043831425 |
dewey-full | 005.1015113 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1015113 |
dewey-search | 005.1015113 |
dewey-sort | 15.1015113 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Technik Informatik |
doi_str_mv | 10.1007/978-3-319-45477-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04805nam a2200973zcb4500</leader><controlfield tag="001">BV043831425</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170109 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161018s2016 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319454771</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-45477-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319454764</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-45476-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-45477-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319454771</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783319454771</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)962078909</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043831425</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1015113</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 286f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">TEC 770f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 260f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 343f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">SAFECOMP</subfield><subfield code="n">35.</subfield><subfield code="d">2016</subfield><subfield code="c">Trondheim</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1113669470</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer safety, reliability, and security</subfield><subfield code="b">35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings</subfield><subfield code="c">y Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XV, 324 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9922</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming languages (Electronic computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer logic</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logics and Meanings of Programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Languages, Compilers, Interpreters</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Trondheim</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skavhaug, Amund</subfield><subfield code="d">1965-</subfield><subfield code="0">(DE-588)1123041024</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9922</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9922</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029242195</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-45477-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2016 Trondheim gnd-content |
genre_facet | Konferenzschrift 2016 Trondheim |
id | DE-604.BV043831425 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:46:20Z |
institution | BVB |
institution_GND | (DE-588)1113669470 |
isbn | 9783319454771 9783319454764 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029242195 |
oclc_num | 962078909 |
open_access_boolean | |
owner | DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource XV, 324 Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2016 ZDB-2-LNC ZDB-2-LNC_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings Lecture Notes in Computer Science Computer science Computer organization Software engineering Programming languages (Electronic computers) Computer security Computer logic Application software Computer Science Logics and Meanings of Programs Programming Languages, Compilers, Interpreters Software Engineering Systems and Data Security Computer Applications Computer Systems Organization and Communication Networks Informatik Zuverlässigkeit (DE-588)4059245-5 gnd Formale Methode (DE-588)4333722-3 gnd Software (DE-588)4055382-6 gnd |
subject_GND | (DE-588)4059245-5 (DE-588)4333722-3 (DE-588)4055382-6 (DE-588)1071861417 |
title | Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings |
title_auth | Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings |
title_exact_search | Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings |
title_full | Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings y Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.) |
title_fullStr | Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings y Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.) |
title_full_unstemmed | Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings y Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.) |
title_short | Computer safety, reliability, and security |
title_sort | computer safety reliability and security 35th international conference safecomp 2016 trondheim norway september 21 23 2016 proceedings |
title_sub | 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016 : proceedings |
topic | Computer science Computer organization Software engineering Programming languages (Electronic computers) Computer security Computer logic Application software Computer Science Logics and Meanings of Programs Programming Languages, Compilers, Interpreters Software Engineering Systems and Data Security Computer Applications Computer Systems Organization and Communication Networks Informatik Zuverlässigkeit (DE-588)4059245-5 gnd Formale Methode (DE-588)4333722-3 gnd Software (DE-588)4055382-6 gnd |
topic_facet | Computer science Computer organization Software engineering Programming languages (Electronic computers) Computer security Computer logic Application software Computer Science Logics and Meanings of Programs Programming Languages, Compilers, Interpreters Software Engineering Systems and Data Security Computer Applications Computer Systems Organization and Communication Networks Informatik Zuverlässigkeit Formale Methode Software Konferenzschrift 2016 Trondheim |
url | https://doi.org/10.1007/978-3-319-45477-1 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT safecomptrondheim computersafetyreliabilityandsecurity35thinternationalconferencesafecomp2016trondheimnorwayseptember21232016proceedings AT skavhaugamund computersafetyreliabilityandsecurity35thinternationalconferencesafecomp2016trondheimnorwayseptember21232016proceedings |