dc.creator |
Leveson, Nancy |
|
dc.date |
2003-06 |
|
dc.date.accessioned |
2022-05-04T06:07:15Z |
|
dc.date.available |
2022-05-04T06:07:15Z |
|
dc.identifier |
16.358J-Spring2003 |
|
dc.identifier |
local: 16.358J |
|
dc.identifier |
local: ESD.358J |
|
dc.identifier |
local: IMSCP-MD5-e732da803b526b9868fee5dd125df926 |
|
dc.identifier |
http://hdl.handle.net/1721.1/35848 |
|
dc.identifier.uri |
http://localhost:8080/xmlui/handle/CUHPOERS/1254 |
|
dc.description |
Covers important concepts and techniques in designing and operating safety-critical systems. Topics include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. Includes a class project involving the high-level system design and analysis of a safety-critical system. |
|
dc.format |
14788 bytes |
|
dc.format |
13762 bytes |
|
dc.format |
39200 bytes |
|
dc.format |
26457 bytes |
|
dc.format |
24535 bytes |
|
dc.format |
20345 bytes |
|
dc.format |
14620 bytes |
|
dc.format |
11 bytes |
|
dc.format |
4586 bytes |
|
dc.format |
21366 bytes |
|
dc.format |
11602 bytes |
|
dc.format |
38351 bytes |
|
dc.format |
4755 bytes |
|
dc.format |
27322 bytes |
|
dc.format |
25313 bytes |
|
dc.format |
4039 bytes |
|
dc.format |
301 bytes |
|
dc.format |
354 bytes |
|
dc.format |
339 bytes |
|
dc.format |
180 bytes |
|
dc.format |
285 bytes |
|
dc.format |
67 bytes |
|
dc.format |
17685 bytes |
|
dc.format |
49 bytes |
|
dc.format |
143 bytes |
|
dc.format |
247 bytes |
|
dc.format |
19283 bytes |
|
dc.format |
262 bytes |
|
dc.format |
31444 bytes |
|
dc.format |
285613 bytes |
|
dc.format |
1011778 bytes |
|
dc.format |
207080 bytes |
|
dc.format |
227556 bytes |
|
dc.format |
423419 bytes |
|
dc.format |
1890007 bytes |
|
dc.format |
317530 bytes |
|
dc.format |
154602 bytes |
|
dc.format |
153081 bytes |
|
dc.format |
231334 bytes |
|
dc.format |
237657 bytes |
|
dc.format |
112567 bytes |
|
dc.format |
179445 bytes |
|
dc.format |
504643 bytes |
|
dc.format |
207842 bytes |
|
dc.format |
1067446 bytes |
|
dc.format |
216649 bytes |
|
dc.format |
1261224 bytes |
|
dc.format |
93342 bytes |
|
dc.format |
9119398 bytes |
|
dc.format |
2812011 bytes |
|
dc.format |
69915 bytes |
|
dc.format |
765511 bytes |
|
dc.format |
19283 bytes |
|
dc.format |
3486 bytes |
|
dc.format |
811 bytes |
|
dc.format |
813 bytes |
|
dc.format |
830 bytes |
|
dc.format |
519 bytes |
|
dc.format |
2097 bytes |
|
dc.format |
36161 bytes |
|
dc.format |
8473 bytes |
|
dc.format |
8457 bytes |
|
dc.format |
7827 bytes |
|
dc.format |
7905 bytes |
|
dc.format |
8464 bytes |
|
dc.format |
8478 bytes |
|
dc.format |
7876 bytes |
|
dc.format |
8437 bytes |
|
dc.format |
8476 bytes |
|
dc.format |
8496 bytes |
|
dc.format |
8408 bytes |
|
dc.format |
8798 bytes |
|
dc.format |
8848 bytes |
|
dc.format |
8496 bytes |
|
dc.format |
7803 bytes |
|
dc.format |
7753 bytes |
|
dc.format |
8421 bytes |
|
dc.format |
8395 bytes |
|
dc.format |
9587 bytes |
|
dc.format |
8687 bytes |
|
dc.format |
8422 bytes |
|
dc.format |
8434 bytes |
|
dc.format |
8384 bytes |
|
dc.format |
8454 bytes |
|
dc.format |
7920 bytes |
|
dc.format |
8388 bytes |
|
dc.format |
8380 bytes |
|
dc.format |
8441 bytes |
|
dc.format |
8397 bytes |
|
dc.format |
8473 bytes |
|
dc.format |
7879 bytes |
|
dc.format |
text/html |
|
dc.language |
en-US |
|
dc.rights |
Usage Restrictions: This site (c) Massachusetts Institute of Technology 2003. Content within individual courses is (c) by the individual authors unless otherwise noted. The Massachusetts Institute of Technology is providing this Work (as defined below) under the terms of this Creative Commons public license ("CCPL" or "license"). The Work is protected by copyright and/or other applicable law. Any use of the work other than as authorized under this license is prohibited. By exercising any of the rights to the Work provided here, You (as defined below) accept and agree to be bound by the terms of this license. The Licensor, the Massachusetts Institute of Technology, grants You the rights contained here in consideration of Your acceptance of such terms and conditions. |
|
dc.subject |
system safety |
|
dc.subject |
software safety |
|
dc.subject |
system reliability |
|
dc.subject |
safety-critical systems |
|
dc.subject |
accident models |
|
dc.subject |
human error models |
|
dc.subject |
system safety engineering |
|
dc.subject |
software hazard analysis |
|
dc.subject |
fault tolerance |
|
dc.subject |
safety culture |
|
dc.subject |
16.358J |
|
dc.subject |
ESD.358J |
|
dc.subject |
16.358 |
|
dc.subject |
ESD.358 |
|
dc.subject |
System safety |
|
dc.title |
16.358J / ESD.358J System Safety, Spring 2003 |
|
dc.title |
System Safety |
|
dc.coverage |
Spring 2003 |
|