{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:31Z","timestamp":1750308571789,"version":"3.41.0"},"reference-count":25,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,2,22]],"date-time":"2016-02-22T00:00:00Z","timestamp":1456099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2016,2,22]]},"abstract":"<jats:p>The rapid increase in computer-related technologies puts greater demands on the software-controlled systems. These demands place the software in total control over safety-critical systems. A fault in such a Safety-Critical Computer Systems (SCCS) can result in catastrophic concerns such as loss of life, harm, or equipment damage. In order to detect and prevent such faults, some safety standards, safety analysis and fault-tolerant techniques have been developed. Still, it requires adequate methodologies and frameworks to complete verification of these SCCS. In this work, the software safety is considered into 3 parts: Safety Modeling, Safety Measurement and Safety Management, with assurance lying down to develop high quality software for SCCS. The proposed methodology is SM-Cube (Safety Modeling, Safety Measurement and Safety Management) which is the Safety-Critical Computer Systems concerned. SM-Cube provides a clarified differentiation for assessing and evaluating the safety embedded into the software. SM-Cube consists of required processes and operations for developing SCCS free of faults. This proposed SM-cube has been applied to safety-critical software based Railroad Crossing Control System (RCCS) which is a laboratory prototype. The outcomes of the prototype confirmed that all critical operations have been safe and risk free. The development of the software based on the proposed SM-cube for RCCS have shown a simplified and improved safety-critical operations of the overall system performance<\/jats:p>","DOI":"10.1145\/2853073.2853091","type":"journal-article","created":{"date-parts":[[2016,2,23]],"date-time":"2016-02-23T13:43:21Z","timestamp":1456235001000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Quantitative Safety Assessment and Evaluation for Safety-Critical Computer Systems"],"prefix":"10.1145","volume":"41","author":[{"given":"Jayasri","family":"kotti","sequence":"first","affiliation":[{"name":"GMR Institute of Technology, Rajam, Andhra Pradesh, India"}]},{"given":"Seetharamaiah","family":"Panchumarthy","sequence":"additional","affiliation":[{"name":"Andhra University, Visakhapatnam, Andhra Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2016,2,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581406"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1244533"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010301"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6156"},{"volume-title":"V1.2. Defence materiel","year":"2007","author":"SAFE.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","unstructured":"McCall J. Richards P. and Walters G . 1977. Factors in Software Quality. 3 Vols. NTIS AD-A049.  McCall J. Richards P. and Walters G . 1977. Factors in Software Quality. 3 Vols. NTIS AD-A049."},{"key":"e_1_2_1_7_1","unstructured":"Mil-std-882 1984. System safety program Requirement. Department of Defence  Mil-std-882 1984. System safety program Requirement. Department of Defence"},{"issue":"4","key":"e_1_2_1_8_1","first-page":"311","volume":"5","author":"Medikonda Benswarup","journal-title":"Science"},{"volume-title":"ESC-TR-2006- 08).","author":"Product Development Team CMMI","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Srinivas Acharyulu P.V. and Seetharamaiah P. 2012. A Methodological Framework for Software Safety in Safety Critical Computer Systems .Journal of Computer Science. 1564--1575 2012  Srinivas Acharyulu P.V. and Seetharamaiah P. 2012. A Methodological Framework for Software Safety in Safety Critical Computer Systems .Journal of Computer Science. 1564--1575 2012","DOI":"10.3844\/jcssp.2012.1564.1575"},{"volume-title":"NASA technical standard. Department of Defense. NASASTD-8719.13","year":"2004","author":"NASA","key":"e_1_2_1_11_1"},{"volume-title":"Smith D and Johnson B","year":"2005","author":"DeLong","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEW.2005.44"},{"volume-title":"US Department of Defense (DOD)","year":"2000","author":"System Safety D Standard Practice","key":"e_1_2_1_14_1"},{"volume-title":"International Electro technical commission","year":"1998","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","first-page":"0008","volume":"424","author":"Yu Yang","journal-title":"Design Faults. IEEE Trans. 1-"},{"volume-title":"Safety Recommendations for Safety-Critical Design Patterns. International Workshop on the Design of Dependable Critical Systems","year":"2009","author":"Armoush Ashraf","key":"e_1_2_1_17_1"},{"volume-title":"Software Metrics- A rigorous and practical approach","author":"Hari Lawrence Norman","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of the IEEE Long Island Systems, Applications and Technology Conference, May 2-2, IEEE Xplore Press, Farmingdale, pp: 1-6. DOI: 10","year":"2014","author":"W.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.35"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2015.03.017"},{"volume-title":"JUNE","year":"2010","author":"Michael James Bret","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2011.09.007"},{"volume-title":"Quality model","year":"2001","author":"IEC.","key":"e_1_2_1_24_1"},{"volume-title":"March 19, 2009, IN TECH BLOG.","key":"e_1_2_1_25_1"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2853073.2853091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2853073.2853091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:30Z","timestamp":1750273470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2853073.2853091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,22]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2,22]]}},"alternative-id":["10.1145\/2853073.2853091"],"URL":"https:\/\/doi.org\/10.1145\/2853073.2853091","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2016,2,22]]},"assertion":[{"value":"2016-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}