Illustrative risks to the public in the use of computer systems and related technology
ACM SIGSOFT Software Engineering Notes
Safeware: system safety and computers
Safeware: system safety and computers
Mining distance-based outliers in near linear time with randomization and a simple pruning rule
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Computer
Taming HAL: Designing Interfaces Beyond 2001
Taming HAL: Designing Interfaces Beyond 2001
Aspect-oriented software development
Aspect-oriented software development
Impartial Anticipation in Runtime-Verification
ATVA '08 Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis
Modeling and Reasoning with Bayesian Networks
Modeling and Reasoning with Bayesian Networks
Software for Dependable Systems: Sufficient Evidence?
Software for Dependable Systems: Sufficient Evidence?
Detection and prognostics on low-dimensional systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A Real-Time Component Framework: Experience with CCM and ARINC-653
ISORC '10 Proceedings of the 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing
A Safety-Assured Development Approach for Real-Time Software
RTCSA '10 Proceedings of the 2010 IEEE 16th International Conference on Embedded and Real-Time Computing Systems and Applications
Proceedings of the First international conference on Runtime verification
RV'10 Proceedings of the First international conference on Runtime verification
Proceedings of the First international conference on Runtime verification
RV'10 Proceedings of the First international conference on Runtime verification
NORT: runtime anomaly-based monitoring of malicious behavior for windows
RV'11 Proceedings of the Second international conference on Runtime verification
Runtime monitoring of stochastic cyber-physical systems with hybrid state
RV'11 Proceedings of the Second international conference on Runtime verification
Combining time and frequency domain specifications for periodic signals
RV'11 Proceedings of the Second international conference on Runtime verification
Runtime verification for ultra-critical systems
RV'11 Proceedings of the Second international conference on Runtime verification
Hi-index | 0.00 |
As software and software intensive systems are becoming increasingly ubiquitous, the impact of failures can be tremendous. In some industries such as aerospace, medical devices, or automotive, such failures can cost lives or endanger mission success. Software faults can arise due to the interaction between the software, the hardware, and the operating environment. Unanticipated environmental changes lead to software anomalies that may have significant impact on the overall success of the mission. Latent coding errors can at any time during system operation trigger faults despite the fact that usually a significant effort has been expended in verification and validation (V&V) of the software system. Nevertheless, it is becoming increasingly more apparent that pre-deployment V&V is not enough to guarantee that a complex software system meets all safety, security, and reliability requirements. Software Health Management (SWHM) is a new field that is concerned with the development of tools and technologies to enable automated detection, diagnosis, prediction, and mitigation of adverse events due to software anomalies, while the system is in operation. The prognostic capability of the SWHM to detect and diagnose failures before they happen will yield safer and more dependable systems for the future. This paper addresses the motivation, needs, and requirements of software health management as a new discipline and motivates the need for SWHM in safety critical applications.