How good is good enough?: an ethical analysis of software construction and use
暂无分享,去创建一个
Keith W. Miller | W. Robert Collins | Bethany J. Spielman | Phillip Wherry | W. R. Collins | W. Robert Collins | K. Miller | B. Spielman | Phillip Wherry | Phillip Wherry
[1] Peter G. Neumann,et al. Inside risks: certifying professionals , 1991, CACM.
[2] Nancy G. Leveson,et al. Software safety in embedded computer systems , 1991, CACM.
[3] Michael C. McFarland. Ethics and the Safety of Computer Systems , 1991, Computer.
[4] Nancy G. Leveson,et al. Guest Editor's Introduction Formal Methods in Software Engineering , 1990, IEEE Trans. Software Eng..
[5] Anthony Hall,et al. Seven myths of formal methods , 1990, IEEE Software.
[6] Peter G. Neumann,et al. Inside risks: some reflections on a telephone switching problem , 1990, CACM.
[7] David Lorge Parnas,et al. Evaluation of safety-critical software , 1990, CACM.
[8] John D. Musa,et al. Quantifying Software Validation: When to Stop Testing? , 1989, IEEE Softw..
[9] N. G. Leveson. Safety as a Software Quality , 1989 .
[10] Velma R. Huskey,et al. Lady Lovelace and Charles Babbage , 1980, Annals of the History of Computing.
[11] Richard J. Lipton,et al. Hints on Test Data Selection: Help for the Practicing Programmer , 1978, Computer.