default search action
Philip Koopman
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Philip Koopman, William H. Widen:
Safety Ethics for Design and Test of Automated Driving Features. IEEE Des. Test 41(1): 17-24 (2024) - [c63]Casidhe Hutchison, Milda Zizyte, David Guttendorf, Claire Le Goues, Philip Koopman:
Active Learning Omnivariate Decision Trees for Fault Diagnosis in Robotic Systems. DSN-S 2024: 118-124 - [c62]Philip Koopman:
Anatomy of a Robotaxi Crash: Lessons from the Cruise Pedestrian Dragging Mishap. SAFECOMP 2024: 119-133 - [c61]Philip Koopman, William H. Widen:
Redefining Safety for Autonomous Vehicles. SAFECOMP 2024: 300-314 - [i8]Philip Koopman:
Anatomy of a Robotaxi Crash: Lessons from the Cruise Pedestrian Dragging Mishap. CoRR abs/2402.06046 (2024) - [i7]Philip Koopman, William H. Widen:
Redefining Safety for Autonomous Vehicles. CoRR abs/2404.16768 (2024) - [i6]Philip Koopman:
Lessons from the Cruise Robotaxi Pedestrian Dragging Mishap. CoRR abs/2406.05281 (2024) - [i5]Elena Troubitsyna, Ignacio J. Alvarez, Philip Koopman, Mario Trapp:
Methods and Tools for the Engineering and Assurance of Safe Autonomous Systems (Dagstuhl Seminar 24151). Dagstuhl Reports 14(4): 23-41 (2024) - 2023
- [j19]Philip Koopman:
UL 4600: What to Include in an Autonomous Vehicle Safety Case. Computer 56(5): 101-104 (2023) - [c60]Philip Koopman, William H. Widen:
A Reasonable Driver Standard for Automated Vehicle Safety. SAFECOMP Workshops 2023: 355-361 - [i4]Philip Koopman:
Large-Block Modular Addition Checksum Algorithms. CoRR abs/2302.13432 (2023) - [i3]Philip Koopman:
An Improved Modular Addition Checksum Algorithm. CoRR abs/2304.13496 (2023) - 2022
- [c59]Philip Koopman:
Keynote 1: How Safe Is Safe Enough for Autonomous Vehicles? ISSRE Workshops 2022: xxviii - 2021
- [j18]Philip Koopman, Benjamin Kuipers, William H. Widen, Marilyn Wolf:
Ethics, Safety, and Autonomous Vehicles. Computer 54(12): 28-37 (2021) - [j17]Zachary Pezzementi, Trenton Tabor, Jonathan K. Chang, Carter Tiernan, Bill Drozd, Eric M. Sample, Chris Hazard, Michael Wagner, Philip Koopman:
Perception robustness testing at different levels of generality. Field Robotics 1(1): 253-286 (2021) - [c58]Milda Zizyte, Casidhe Hutchison, Raewyn Duvall, Claire Le Goues, Philip Koopman:
The Importance of Safety Invariants in Robustness Testing Autonomy Systems. DSN (Supplements) 2021: 41-44 - 2020
- [c57]Deborah S. Katz, Milda Zizyte, Casidhe Hutchison, David Guttendorf, Patrick E. Lanigan, Eric M. Sample, Philip Koopman, Michael Wagner, Claire Le Goues:
Robustness Inside Out Testing. DSN (Supplements) 2020: 1-4 - [c56]Philip Koopman, Michael Wagner:
Positive Trust Balance for Self-driving Car Deployment. SAFECOMP Workshops 2020: 351-357 - [i2]Philip Koopman, Michael Wagner:
Positive Trust Balance for Self-Driving Car Deployment. CoRR abs/2009.05801 (2020)
2010 – 2019
- 2019
- [c55]Philip Koopman, Frank Fratrik:
How Many Operational Design Domains, Objects, and Events? SafeAI@AAAI 2019 - [c54]Philip Koopman, Beth Osyk, Jack Weast:
Autonomous Vehicles Meet the Physical World: RSS, Variability, Uncertainty, and Proving Safety. SAFECOMP 2019: 245-253 - [c53]Philip Koopman, Uma Ferrell, Frank Fratrik, Michael Wagner:
A Safety Standard Approach for Fully Autonomous Vehicles. SAFECOMP Workshops 2019: 326-332 - [i1]Philip Koopman, Beth Osyk, Jack Weast:
Autonomous Vehicles Meet the Physical World: RSS, Variability, Uncertainty, and Proving Safety (Expanded Version). CoRR abs/1911.01207 (2019) - 2018
- [j16]Philip Koopman:
Righting Wrongs [Letter to the Editor]. IEEE Consumer Electron. Mag. 7(1): 6 (2018) - [c52]Casidhe Hutchison, Milda Zizyte, Patrick E. Lanigan, David Guttendorf, Michael Wagner, Claire Le Goues, Philip Koopman:
Robustness testing of autonomy software. ICSE (SEIP) 2018: 276-285 - [c51]Philip Koopman:
Practical Experience Report: Automotive Safety Practices vs. Accepted Principles. SAFECOMP 2018: 3-11 - [c50]Zachary Pezzementi, Trenton Tabor, Samuel Yim, Jonathan K. Chang, Bill Drozd, David Guttendorf, Michael Wagner, Philip Koopman:
Putting Image Manipulations in Context: Robustness Testing for Safe Perception. SSRR 2018: 1-8 - 2017
- [j15]Philip Koopman, Michael Wagner:
Autonomous Vehicle Safety: An Interdisciplinary Challenge. IEEE Intell. Transp. Syst. Mag. 9(1): 90-96 (2017) - [c49]Philip Koopman:
Challenges in Autonomous Vehicle Validation: Keynote Presentation Abstract. SCAV@CPSWeek 2017: 3 - 2015
- [c48]Paul Vernaza, David Guttendorf, Michael Wagner, Philip Koopman:
Learning product set models of fault triggers in high-dimensional software interfaces. IROS 2015: 3506-3511 - [c47]Aaron Kane, Omar Chowdhury, Anupam Datta, Philip Koopman:
A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System. RV 2015: 102-117 - 2014
- [c46]Aaron Kane, Thomas E. Fuhrman, Philip Koopman:
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience Report. DSN 2014: 148-155 - 2013
- [j14]Philip Koopman, Christopher Szilagyi:
Integrity in Embedded Control Networks. IEEE Secur. Priv. 11(3): 61-63 (2013) - [c45]Aaron Kane, Philip Koopman:
Ride-through for Autonomous Vehicles. CARS@SAFECOMP 2013 - 2012
- [e2]Robert S. Swarz, Philip Koopman, Michel Cukier:
IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1624-8 [contents] - 2010
- [b1]Philip Koopman:
Better Embedded System Software. Drumnadrochit Press 2010, ISBN 978-0-9844490-0-2, pp. I-XXVI, 1-368 - [j13]Ahmed Abdallah, Eric M. Feron, Graham R. Hellestrand, Philip J. Koopman Jr., Marilyn Wolf:
Hardware/Software Codesign of Aerospace and Automotive Systems. Proc. IEEE 98(4): 584-602 (2010) - [c44]Christopher Szilagyi, Philip Koopman:
Low cost multicast authentication via validity voting in time-triggered embedded control networks. WESS 2010: 10 - [c43]Philip Koopman:
Risk areas in embedded software industry projects. WESE 2010: 5 - [c42]Philip Koopman, Justin Ray:
Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways. MMB/DFT 2010: 1
2000 – 2009
- 2009
- [j12]Theresa C. Maxino, Philip J. Koopman Jr.:
The Effectiveness of Checksums for Embedded Control Networks. IEEE Trans. Dependable Secur. Comput. 6(1): 59-72 (2009) - [c41]Christopher Szilagyi, Philip Koopman:
Flexible multicast authentication for time-triggered embedded control network applications. DSN 2009: 165-174 - [c40]Justin Ray, Philip Koopman:
Data management mechanisms for embedded system gateways. DSN 2009: 175-184 - [c39]Jennifer Black, Philip Koopman:
System safety as an emergent property in composite systems. DSN 2009: 369-378 - 2008
- [c38]Philip Koopman, Henrique Madeira:
Message from the conference general chair and coordinator. DSN 2008 - [c37]Jennifer Black, Philip Koopman:
Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems. PRDC 2008: 184-191 - 2007
- [c36]Philip Koopman:
Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract). LADC 2007: 1-2 - 2006
- [c35]Justin Ray, Philip Koopman:
Efficient High Hamming Distance CRCs for Embedded Networks. DSN 2006: 3-12 - 2005
- [j11]Jennifer Morris, Philip Koopman:
Representing design tradeoffs in safety-critical systems. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [j10]Philip Koopman, Howie Choset, Rajeev Gandhi, Bruce H. Krogh, Diana Marculescu, Priya Narasimhan, JoAnn M. Paul, Ragunathan Rajkumar, Daniel P. Siewiorek, Asim Smailagic, Peter Steenkiste, Donald E. Thomas, Chenxi Wang:
Undergraduate embedded system education at Carnegie Mellon. ACM Trans. Embed. Comput. Syst. 4(3): 500-528 (2005) - [c34]Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman:
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems. DSN 2005: 346-355 - [c33]Elizabeth Latronico, Philip Koopman:
Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms. DSN 2005: 486-495 - [c32]Jennifer Morris, Philip Koopman:
Representing design tradeoffs in safety-critical systems. WADS@ICSE 2005: 2:1-2:5 - 2004
- [j9]Philip Koopman:
Embedded System Security. Computer 37(7): 95-97 (2004) - [c31]Philip Koopman, Tridib Chakravarty:
Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks. DSN 2004: 145- - [c30]Elizabeth Latronico, Paul S. Miner, Philip Koopman:
Quantifying the Reliability of Proven SPIDER Group Membership Service Guarantees. DSN 2004: 275-284 - [c29]Charles P. Shelton, Philip Koopman:
Improving System Dependability with Functional Alternatives. DSN 2004: 295- - [c28]Jennifer Morris, Daniel Kroening, Philip Koopman:
Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded Systems. DSN 2004: 377- - [c27]Christopher Martin, Philip Koopman:
Representing User Workarounds as a Component of System Dependability. PRDC 2004: 353-362 - [c26]Orna Raz, Rebecca B. Buchheit, Mary Shaw, Philip Koopman, Christos Faloutsos:
Automated Assistance for Eliciting User Expectations. SEKE 2004: 80-85 - 2003
- [j8]Philip Koopman, Robert R. Hoffman:
Work-arounds, Make-work, and Kludges. IEEE Intell. Syst. 18(6): 70-75 (2003) - [c25]Charles P. Shelton, Philip Koopman, William Nace:
A Framework for Scalable Analysis and Design of System-wide Graceful Degradation in Distributed Embedded Systems. WORDS 2003: 156-163 - 2002
- [j7]Philip Koopman:
Guest Editor's Introduction: Critical Embedded Automotive Networks. IEEE Micro 22(4): 14-18 (2002) - [c24]John DeVale, Philip Koopman:
Robust Software - No More Excuses. DSN 2002: 145-154 - [c23]Ravishankar K. Iyer, Zbigniew Kalbarczyk, Philip Koopman, Henrique Madeira, Gunter Heiner, Karama Kanoun, Haim Levendel, Brendan Murphy, Lawrence G. Votta, Don Wilson:
Joint Panel - IPDS and Workshop on Dependability Benchmarking. DSN 2002 - [c22]Philip Koopman:
32-Bit Cyclic Redundancy Codes for Internet Applications. DSN 2002: 459-472 - [c21]Philip Koopman, Henrique Madeira:
Workshop on Dependability Benchmarking. DSN 2002: 790-791 - [c20]Charles P. Shelton, Philip Koopman:
Using Architectural Properties to Model and Measure Graceful Degradation. WADS 2002: 267-289 - [c19]Orna Raz, Philip Koopman, Mary Shaw:
Semantic anomaly detection in online data sources. ICSE 2002: 302-312 - [c18]Meredith Beveridge, Philip Koopman:
Jini Meets Embedded Control Networking: A Case Study in Portability Failure. WORDS 2002: 11-18 - [c17]Orna Raz, Philip Koopman, Mary Shaw:
Enabling automatic adaptation in systems with under-specified elements. WOSS 2002: 55-60 - 2001
- [c16]Jiantao Pan, Philip Koopman, Daniel P. Siewiorek, Yennun Huang, Robert Gruber, Mimi Ling Jiang:
Robustness Testing and Hardening of CORBA ORB Implementations. DSN 2001: 141-150 - [c15]John DeVale, Philip Koopman:
Performance Evaluation of Exception Handling in I/O Libraries. DSN 2001: 519 - [c14]Elizabeth Latronico, Philip Koopman:
Representing Embedded System Sequence Diagrams as a Formal Language. UML 2001: 302-316 - 2000
- [j6]Phil Koopman, John DeVale:
The Exception Handling Effectiveness of POSIX Operating Systems. IEEE Trans. Software Eng. 26(9): 837-848 (2000) - [c13]Sharad Malik, D. K. Arvind, Edward A. Lee, Phil Koopman, Alberto L. Sangiovanni-Vincentelli, Wayne H. Wolf:
Embedded systems education (panel abstract). DAC 2000: 519 - [c12]Charles P. Shelton, Philip Koopman, Kobey Devale:
Robustness Testing of the Microsoft Win32 API. DSN 2000: 261-270 - [c11]William Nace, Phil Koopman:
A Product Family Approach to Graceful Degradation. DIPES 2000: 131-140
1990 – 1999
- 1999
- [c10]Philip Koopman, John DeVale:
Comparing the Robustness of POSIX Operating Systems. FTCS 1999: 30-37 - [c9]Carol L. Hoover, Jeffery P. Hansen, Philip Koopman, Sandeep Tamboli:
The Amaranth Framework: Probabilistic, Utility-Based Quality of Service Management for High-Assurance Computing. HASE 1999: 207-216 - [c8]Kimberly Fernsler, Philip Koopman:
Robustness testing of a distributed simulation backplane. ISSRE 1999: 189-198 - [c7]Arjun Cholkar, Philip Koopman:
A widely deployable Web-based network simulation framework using CORBA IDL-based APIs. WSC 1999: 1587-1594 - 1998
- [j5]Philip Koopman:
Using CAD Tools for Embedded System Design: Obstacles Encountered in an Automotive Case Study. Integr. Comput. Aided Eng. 5(1): 85-94 (1998) - [j4]Philip Koopman, Michelle Bayouth:
Orthogonal Capability Building Blocks for Flexible AHS Deployment. J. Intell. Transp. Syst. 4(1-2): 1-19 (1998) - [c6]Nathan P. Kropp, Philip J. Koopman Jr., Daniel P. Siewiorek:
Automated Robustness Testing of Off-the-Shelf Software Components. FTCS 1998: 230-239 - 1997
- [c5]Philip J. Koopman Jr., John Sung, Christopher P. Dingman, Daniel P. Siewiorek, Ted Marz:
Comparing Operating Systems Using Robustness Benchmarks. SRDS 1997: 72-79 - 1996
- [c4]Philip Koopman:
Embedded System Design Issues (The Rest of the Story). ICCD 1996: 310-317 - 1992
- [j3]William F. Keown Jr., Philip J. Koopman Jr., Aaron Collins:
Performance of the HARRIS RTX 2000 Stack Architecture versus the Sun 4 SPARC and the Sun 3 M68020 Architectures. SIGARCH Comput. Archit. News 20(3): 45-52 (1992) - [j2]William F. Keown Jr., Philip J. Koopman Jr., Aaron Collins:
Real-Time Performance of the HARRIS RTX 2000 Stack Architecture Versus the Sun 4 SPARC and the Sun 3 M68020 Architectures With a Proposed Real-Time Performance BenchMark. SIGMETRICS Perform. Evaluation Rev. 19(4): 40-48 (1992) - [j1]Philip J. Koopman Jr., Peter Lee, Daniel P. Siewiorek:
Cache Behavior of Combinator Graph Reduction. ACM Trans. Program. Lang. Syst. 14(2): 265-297 (1992) - 1991
- [c3]Philip J. Koopman Jr.:
Embedded control as a path to Forth acceptance. FORTH 1991: 23-26 - [e1]Philip J. Koopman Jr., Howard Harkness, Paul Snow:
Proceedings of the Second and Third annual Workshops on Forth, FORTH 1990 and 1991, San Antonio, Texas, USA. ACM 1991, ISBN 978-0-89791-462-8 [contents] - 1990
- [c2]Philip J. Koopman Jr., Peter Lee, Daniel P. Siewiorek:
Cache Performance of Combinator Graph Reduction. ICCL 1990: 39-48
1980 – 1989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint