2Baumann R.Soft Errors in Commercial Semiconductor Technology:Overview and Scaling Trends[C]//Proc.of IEEE Conf.on Reliability Fundamentals.Dallas.USA:IEEE Press,2002:1-14.
3Forin P.Vital Coded Microprocessor Principles and Application for Various Transit Systems[C]//Proc.of IFAC-GCCT Paris.France:Editis Press,1989:79-84.
4Wappler U,Fetzer C.Hardware Failure Virtualization via Software Encoded Processing[C]//Proc.of International Conference on Industrial Informatics.Paris.France:Hachette Livre Press,2007:977-982.
5Chapront P.Vital Coded Processor and Safety Related Software Design[C]//Proc.of Conf.on Safety of Computer Control Systems.Paris.France:Editis Press,1992:141-145.
8Yacoub S, Ammar H. Composing Patterns to Design Software Systems[M]. 北京: 中国电力出版社, 2004..
9Thomas H, Koen Y, Riccardo S. An Analysis of the Security Patterns Landscape[C] //Proc. of the 3rd International Workshop on Software Engineering for Secure Systems. Washington D. C., USA: IEEE Computer Society, 2007.
10Djedjiga M, Chamseddine T, Vitor L. Weaving Security Aspects into UML 2.0 Design Models[C] //Proc. of the 13th Workshop on Aspect-oriented Modeling. Charlottesville, USA: ACM Press, 2009.