Eliminating Software Failures - A Literature Survey
暂无分享,去创建一个
[1] Jehad Al Dallal,et al. Dynamic data flow analysis for Java programs , 2000, Inf. Softw. Technol..
[2] Nancy G. Leveson,et al. An empirical evaluation of the MC/DC coverage criterion on the HETE-2 satellite software , 2000, 19th DASC. 19th Digital Avionics Systems Conference. Proceedings (Cat. No.00CH37126).
[3] R. J. Rubey,et al. Quantitative aspects of software validation , 1975 .
[4] A. Avizienis. Dependable computing depends on structured fault tolerance , 1995, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95.
[5] Francesco Bergadano,et al. Testing by means of inductive program learning , 1996, TSEM.
[6] Ana Gabriela Maguitman,et al. Logical models of argument , 2000, CSUR.
[7] John C. Shepherdson,et al. Computability of Recursive Functions , 1963, JACM.
[8] Szu Hui Ng,et al. A model for correlated failures in N-version programming , 2004 .
[9] Paul Klint,et al. Term rewriting with traversal functions , 2003, TSEM.
[10] Sarfraz Khurshid,et al. An Evaluation of Exhaustive Testing for Data Structures , 2003 .
[11] A. Jefferson Offutt,et al. An Approach to Fault Modeling and Fault Seeding Using the Program Dependence Graph , 1997, J. Syst. Softw..
[12] Ken-ichi Matsumoto,et al. A Study on the Failure Intensity of Different Software Faults , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[13] Neelam Gupta,et al. Improving Fault Detection Capability by Selectively Retaining Test Cases during Test Suite Reduction , 2007, IEEE Transactions on Software Engineering.
[14] Leon J. Osterweil,et al. On Two Problems in the Generation of Program Test Paths , 1976, IEEE Transactions on Software Engineering.
[15] Patrick van Bommel,et al. Combining boolean logic and linguistic structure , 2001, Inf. Softw. Technol..
[16] Man F. Lau,et al. An extended fault class hierarchy for specification-based testing , 2005, TSEM.
[17] Janche Sang,et al. An empirical analysis of debugging performance - differences between iterative and recursive constructs , 2000, J. Syst. Softw..
[18] Samantha Jenkins,et al. Information theory-based software metrics and obfuscation , 2004, J. Syst. Softw..
[19] Insup Lee,et al. Data flow testing as model checking , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[20] J. B. Dugan,et al. Sensitivity analysis of modular dynamic fault trees , 2000, Proceedings IEEE International Computer Performance and Dependability Symposium. IPDS 2000.
[21] Arthur H. M. ter Hofstede,et al. How to formalize it?: Formalization principles for information system development methods , 1997, Inf. Softw. Technol..
[22] Leslie Hatton,et al. EC--a measurement based safer subset of ISO C suitable for embedded system development , 2005, Inf. Softw. Technol..
[23] Daniela Cruzes,et al. Simulating families of studies to build confidence in defect hypotheses , 2005, Inf. Softw. Technol..
[24] Doron A. Peled,et al. Combining Software and Hardware Verification Techniques , 2002, Formal Methods Syst. Des..
[25] Miroslaw Malek,et al. Survey of software tools for evaluating reliability, availability, and serviceability , 1988, CSUR.
[26] Ram Chillarege,et al. Defect type and its impact on the growth curve (software development) , 1991, [1991 Proceedings] 13th International Conference on Software Engineering.
[27] Mark Weiser,et al. Program Slicing , 1981, IEEE Transactions on Software Engineering.
[28] L. Alvisi,et al. A Survey of Rollback-Recovery Protocols , 2002 .
[29] Paul I. Barton,et al. Modeling, simulation and sensitivity analysis of hybrid systems , 2000, CACSD. Conference Proceedings. IEEE International Symposium on Computer-Aided Control System Design (Cat. No.00TH8537).
[30] J. Keith Townsend,et al. The theory of direct probability redistribution and its application to rare event simulation , 1999, TOMC.
[31] Dino Pedreschi,et al. On logic programs that always succeed , 2003, Sci. Comput. Program..
[32] Arie van Deursen,et al. Identifying Crosscutting Concerns Using Fan-In Analysis , 2006, TSEM.
[33] Amit M. Paradkar. Case studies on fault detection effectiveness of model based test generation techniques , 2005, ACM SIGSOFT Softw. Eng. Notes.
[34] Gustavo Ribeiro Alves,et al. A Framework for Fault Tolerant Real Time Systems Based on Reconfigurable FPGAs , 2006, 2006 IEEE Conference on Emerging Technologies and Factory Automation.
[35] István Forgács. Double iterative framework for flow-sensitive interprocedural data flow analysis , 1994, TSEM.
[36] BaesensBart,et al. Benchmarking Classification Models for Software Defect Prediction , 2008 .
[37] Mauro Ferrari,et al. On the complexity of the disjunction property in intuitionistic and modal logics , 2005, TOCL.
[38] Ana Regina Cavalcanti da Rocha,et al. Domain-oriented software development environment , 2004, J. Syst. Softw..
[39] Hong Xu,et al. Combining dynamic fault trees and event trees for probabilistic risk assessment , 2004, Annual Symposium Reliability and Maintainability, 2004 - RAMS.
[40] Paul A. Fishwick,et al. OOPM/RT: a multimodeling methodology for real-time simulation , 1999, TOMC.
[41] Barbara G. Ryder,et al. An efficient hybrid algorithm for incremental data flow analysis , 1989, POPL '90.
[42] Robyn R. Lutz,et al. Contributions of SFMEA to requirements analysis , 1996, Proceedings of the Second International Conference on Requirements Engineering.
[43] Norman F. Schneidewind,et al. Software quality control and prediction model for maintenance , 2000, Ann. Softw. Eng..
[44] Norman E. Fenton,et al. Quantitative Analysis of Faults and Failures in a Complex Software System , 2000, IEEE Trans. Software Eng..
[45] Vadim Okun,et al. Comparison of fault classes in specification-based testing , 2004, Inf. Softw. Technol..
[46] Joxan Jaffar,et al. A decision procedure for a class of set constraints , 1990, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science.
[47] Barry W. Boehm,et al. Bridging models across the software lifecycle , 2003, J. Syst. Softw..
[48] Ram Chillarege. Self-testing software probe system for failure detection and diagnosis , 1994, CASCON.
[49] G. Frege. On Sense and Reference , 1948 .
[50] Martin Fränzle,et al. Model-checking dense-time Duration Calculus , 2004, Formal Aspects of Computing.
[51] Tim Menzies,et al. Data Mining Static Code Attributes to Learn Defect Predictors , 2007 .
[52] Aloysius K. Mok,et al. Simulation-Verification: Biting at the State Explosion Problem , 2001, IEEE Trans. Software Eng..
[53] Michal Walicki,et al. Algebraic approaches to nondeterminism—an overview , 1997, CSUR.
[54] Mark Harman,et al. Analysis and visualization of predicate dependence on formal parameters and global variables , 2004, IEEE Transactions on Software Engineering.
[55] A. Prasad Sistla,et al. Employing symmetry reductions in model checking , 2004, Comput. Lang. Syst. Struct..
[56] David L. Dill,et al. State reduction using reversible rules , 1996, DAC '96.
[57] Claes Wohlin,et al. Towards integration of use case modelling and usage-based testing , 2000, J. Syst. Softw..
[58] Yuan-Shun Dai,et al. A model for availability analysis of distributed software/hardware systems , 2002, Inf. Softw. Technol..
[59] Witold Pedrycz,et al. Practical assessment of the models for identification of defect-prone classes in object-oriented commercial systems using design metrics , 2003, J. Syst. Softw..
[60] Claes Wohlin,et al. Software faults: spreading, detection and costs , 1990, Softw. Eng. J..
[61] Richard Han,et al. A decentralized fault diagnosis system for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[62] Linda Badri,et al. Supporting predictive change impact analysis: a control call graph based technique , 2005, 12th Asia-Pacific Software Engineering Conference (APSEC'05).
[63] Jeff Tian,et al. Better Reliability Assessment and Prediction through Data Clustering , 2002, IEEE Trans. Software Eng..
[64] Jun Han,et al. Using role-based coordination to achieve software adaptability , 2007, Sci. Comput. Program..
[65] Victor F. Nicola,et al. Comparative Analysis of Different Models of Checkpointing and Recovery , 1990, IEEE Trans. Software Eng..
[66] Robert L. Glass,et al. Persistent Software Errors , 1981, IEEE Transactions on Software Engineering.
[67] Jeffrey M. Voas,et al. Estimating the Probability of Failure When Testing Reveals No Failures , 1992, IEEE Trans. Software Eng..
[68] Ilkka Tervonen,et al. Towards deeper co-understanding of software quality , 1998, Inf. Softw. Technol..
[69] In-Jeong Chung,et al. Improved control strategy for parallel logic programming , 1989, [Proceedings 1989] IEEE International Workshop on Tools for Artificial Intelligence.
[70] Andreas Zeller,et al. Simplifying and Isolating Failure-Inducing Input , 2002, IEEE Trans. Software Eng..
[71] David F. McAllister,et al. An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability , 1991, IEEE Trans. Software Eng..
[72] Martin P. Robillard,et al. Topology analysis of software dependencies , 2008, TSEM.
[73] Hitoshi Kume,et al. A Case History Analysis of Software Error Cause-Effect Relationships , 1991, IEEE Trans. Software Eng..
[74] James A. Whittaker. Software's Invisible Users , 2001, IEEE Softw..
[75] Robert F. Stärk,et al. Information Algebras and Consequence Operators , 2007, Logica Universalis.
[76] R. J. Mulvihill. Design-safety enhancement through the use of hazard and risk analysis , 1988 .
[77] James M. Armstrong,et al. The Deconstruction of Safety Arguments Through Adversarial Counter-Argument , 2004, SAFECOMP.
[78] Akif Günes Koru,et al. An empirical comparison and characterization of high defect and high complexity modules , 2003, J. Syst. Softw..
[79] Paul C. Jorgensen,et al. Object-oriented integration testing , 1994, CACM.
[80] George S. Avrunin,et al. Data flow analysis for checking properties of concurrent Java programs , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[81] David Leon,et al. Tree-based methods for classifying software failures , 2004, 15th International Symposium on Software Reliability Engineering.
[82] Mark Sullivan,et al. Software defects and their impact on system availability-a study of field failures in operating systems , 1991, [1991] Digest of Papers. Fault-Tolerant Computing: The Twenty-First International Symposium.
[83] Eduardo B. Fernández,et al. Design and Modeling of Hybrid Fault-Tolerant Software With Cost Constraints , 1996, J. Syst. Softw..
[84] Joël Ouaknine,et al. Domain theory, testing and simulation for labelled Markov processes , 2005, Theor. Comput. Sci..
[85] Takeshi Chusho,et al. Test Data Selection and Quality Estimation Based on the Concept of Essential Branches for Path Testing , 1987, IEEE Transactions on Software Engineering.
[86] D. Richard Kuhn,et al. FAILURE MODES IN MEDICAL DEVICE SOFTWARE: AN ANALYSIS OF 15 YEARS OF RECALL DATA , 2001 .
[87] Z. Hocenski,et al. Influence of software on fault-tolerant microprocessor control system dependability , 1999, ISIE '99. Proceedings of the IEEE International Symposium on Industrial Electronics (Cat. No.99TH8465).
[88] Carlos Urias Munoz. An Approach to Software Product Testing , 1988, IEEE Trans. Software Eng..
[89] Soheil Khajenoori,et al. Knowledge centered assessment pattern: an effective tool for assessing safety concerns in software architecture , 2004, J. Syst. Softw..
[90] Francesca Rossi,et al. Semiring-based constraint satisfaction and optimization , 1997, JACM.
[91] Ali R. Hurson,et al. Transaction Processing in Mobile, Heterogeneous Database Systems , 2002, IEEE Trans. Knowl. Data Eng..
[92] Victor R. Basili,et al. A Comparative Analysis of Functional Correctness , 1982, CSUR.
[93] Harvey P. Siy,et al. Predicting Fault Incidence Using Software Change History , 2000, IEEE Trans. Software Eng..
[94] V. Rajaraman,et al. An Algorithm to Decide Feasibility of Linear Integer Constraints Occurrng in Decision Tables , 1987, IEEE Transactions on Software Engineering.
[95] David S. Rosenblum. A Practical Approach to Programming With Assertions , 1995, IEEE Trans. Software Eng..
[96] Deepinder P. Sidhu,et al. Undetected faults in protocol testing , 1995, IEEE Trans. Commun..
[97] Pankaj Jalote,et al. Testing the Completeness of Specifications , 1989, IEEE Trans. Software Eng..
[98] John A. McDermid,et al. Software fault trees and weakest preconditions: a comparison and analysis , 1993, Softw. Eng. J..
[99] Leon J. Osterweil,et al. Interprocedural static analysis of sequencing constraints , 1992, TSEM.
[100] Robert E. Mullen,et al. The lognormal distribution of software failure rates: origin and evidence , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).
[101] Massimiliano Di Penta,et al. Assessing and improving state-based class testing: a series of experiments , 2004, IEEE Transactions on Software Engineering.
[102] Rajeev Alur,et al. Parametric temporal logic for “model measuring” , 2001, TOCL.
[103] Ferhat Khendek,et al. Test Selection Based on Finite State Models , 1991, IEEE Trans. Software Eng..
[104] Richard J. Lipton,et al. Reduction: a method of proving properties of parallel programs , 1975, CACM.
[105] Stefano Crespi-Reghizzi,et al. Software Prototyping by Relational Techniques: Experiences with Program Construction Systems , 1988, IEEE Trans. Software Eng..
[106] Alan R. Hevner,et al. The impacts of quality and productivity perceptions on the use of software process improvement innovations , 2005, Inf. Softw. Technol..
[107] Boumediene Belkhouche,et al. A formally specified prototyping system , 1996, J. Syst. Softw..
[108] Dolores R. Wallace,et al. Software Error Analysis , 1995 .
[109] Emil Sekerinski,et al. Exploring Tabular Verification and Refinement , 2003, Formal Aspects of Computing.
[110] Elaine J. Weyuker,et al. The evaluation of program-based software test data adequacy criteria , 1988, CACM.
[111] Elaine J. Weyuker,et al. Experience with Performance Testing of Software Systems: Issues, an Approach, and Case Study , 2000, IEEE Trans. Software Eng..
[112] Gerard J. Holzmann,et al. The Model Checker SPIN , 1997, IEEE Trans. Software Eng..
[113] David Gay,et al. Memory management with explicit regions , 1998, PLDI.
[114] H. Dieter Rombach. Proceedings of the 18th international conference on Software engineering , 1996, ICSE 1996.
[115] Robyn R. Lutz,et al. Operational anomalies as a cause of safety-critical requirements evolution , 2003, J. Syst. Softw..
[116] Hany H. Ammar,et al. Architectural-Level Risk Analysis Using UML , 2003, IEEE Trans. Software Eng..
[117] Charles B. Dunham. Test for (IN) equality, subtraction, proof of correctness , 1986, SGNM.
[118] Thomas Lukasiewicz,et al. Probabilistic logic programming with conditional constraints , 2001, TOCL.
[119] He Jifeng,et al. Towards a refinement calculus for object systems , 2002 .
[120] Paul Grünbacher,et al. System dynamics modelling and simulation of collaborative requirements engineering , 2001, J. Syst. Softw..
[121] James M. Bieman,et al. Measuring Design-Level Cohesion , 1998, IEEE Trans. Software Eng..
[122] Barton P. Miller,et al. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services , 1995 .
[123] Tony Moynihan. Coping with 'requirements-uncertainty': the theories-of-action of experienced IS/software project managers , 2000, J. Syst. Softw..
[124] Silvana Castano,et al. Using Patterns to Design Rules in Workflows , 2000, IEEE Trans. Software Eng..
[125] Tsong Yueh Chen,et al. A Choice Relation Framework for Supporting Category-Partition Test Case Generation , 2003, IEEE Trans. Software Eng..
[126] Jeffrey S. Lavell,et al. Report on the Loss of the Mars Polar Lander and Deep Space 2 Missions , 2000 .
[127] Chan-Gun Lee,et al. Specifying timing constraints and composite events: an application in the design of electronic brokerages , 2004, IEEE Transactions on Software Engineering.
[128] J. Martonchik. MISR Multi-Angle Imaging SpectroRadiometer , 2003 .
[129] Johnette Hassell,et al. A relational database model of program execution and software components , 2000, ACM-SE 38.
[130] Jeff Tian,et al. A comparison of measurement and defect characteristics of new and legacy software systems , 1998, J. Syst. Softw..
[131] David Harel,et al. Statecharts: A Visual Formalism for Complex Systems , 1987, Sci. Comput. Program..
[132] Matthew B. Dwyer,et al. Carving and Replaying Differential Unit Test Cases from System Test Cases , 2009, IEEE Transactions on Software Engineering.
[133] Benjamin Livshits,et al. Finding application errors and security flaws using PQL: a program query language , 2005, OOPSLA '05.
[134] Ramanath Subramanyam,et al. Empirical Analysis of CK Metrics for Object-Oriented Design Complexity: Implications for Software Defects , 2003, IEEE Trans. Software Eng..
[135] Marvin V. Zelkowitz,et al. Defect evolution in a product line environment , 2004, J. Syst. Softw..
[136] Elaine J. Weyuker,et al. The distribution of faults in a large industrial software system , 2002, ISSTA '02.
[137] Georg Gottlob,et al. Complexity and expressive power of logic programming , 2001, CSUR.
[138] Joseph A. Gallian. Error detection methods , 1996, CSUR.
[139] Jon Damon Reese,et al. Analyzing Software Specifications for Mode Confusion Potential , 1998 .
[140] Kishor S. Trivedi,et al. Fighting bugs: remove, retry, replicate, and rejuvenate , 2007, Computer.
[141] David Lorge Parnas,et al. Using information about functions in selecting test cases , 2005, ACM SIGSOFT Softw. Eng. Notes.
[142] Arthur Charlesworth,et al. The undecidability of associativity and commutativity analysis , 2002, TOPL.
[143] Martin Große-Rhode,et al. Compositional Comparison of Formal Software Specifications Using Transformation Systems , 2002, Formal Aspects of Computing.
[144] Antonia Bertolino,et al. Using Spanning Sets for Coverage Testing , 2003, IEEE Trans. Software Eng..
[145] Carol S. Smidts,et al. Software reliability models: an approach to early reliability prediction , 1996, Proceedings of ISSRE '96: 7th International Symposium on Software Reliability Engineering.
[146] Hoang Pham,et al. An analysis of factors affecting software reliability , 2000, J. Syst. Softw..
[147] Martin C. Rinard,et al. Goal-Directed Reasoning for Specification-Based Data Structure Repair , 2006, IEEE Transactions on Software Engineering.
[148] Takeshi Nakajo,et al. A Case History Development of a Foolproofing Interface Documentation System , 1993, IEEE Trans. Software Eng..
[149] Elaine J. Weyuker,et al. An Extended Domain-Bases Model of Software Reliability , 1988, IEEE Trans. Software Eng..
[150] I. S. Alkadi,et al. Algorithms that compute test drivers in object oriented testing , 2001, 2001 IEEE Aerospace Conference Proceedings (Cat. No.01TH8542).
[151] Richard J. Fateman,et al. Advances and trends in the design and construction of algebraic manipulation systems , 1990, ISSAC '90.
[152] Stuart H. Zweben,et al. Analysis and Refinement of Software Test Data Adequacy Properties , 1991, IEEE Trans. Software Eng..
[153] Elaine J. Weyuker,et al. An analytical comparison of the fault-detecting ability of data flow testing techniques , 1993, Proceedings of 1993 15th International Conference on Software Engineering.
[154] Brian Randell,et al. Software fault tolerance: t/(n-1)-variant programming , 1992 .
[155] Zhe Yang,et al. Software validation via scalable path-sensitive value flow analysis , 2004, ISSTA '04.
[156] Brian Marick,et al. Classic Testing Mistakes , 1997 .
[157] Alexander Pretschner,et al. Model based testing in incremental system development , 2004, J. Syst. Softw..
[158] Richard J. Lipton,et al. Theoretical and empirical studies on using program mutation to test the functional correctness of programs , 1980, POPL '80.
[159] Nancy G. Leveson. Intent Specifications: An Approach to Building Human-Centered Specifications , 2000, IEEE Trans. Software Eng..
[160] Lee J. White,et al. Complexity of testing iterated borders for structured programs , 1988, [1988] Proceedings. Second Workshop on Software Testing, Verification, and Analysis.
[161] Hermann Kopetz,et al. Software engineering for real-time: a roadmap , 2000, ICSE '00.
[162] Oliver Laitenberger,et al. Perspective-based reading of code documents at Robert Bosch GmbH , 1997, Inf. Softw. Technol..
[163] Philip Koopman,et al. Representing Embedded System Sequence Diagrams as a Formal Language , 2001, UML.
[164] T. B. Dinesh,et al. Centrum Voor Wiskunde En Informatica Reportrapport a Slicing-based Approach for Locating Type Errors a Slicing-based Approach for Locating Type Errors , 2022 .
[165] Shaoying Liu,et al. A Model-Oriented Approach to Safety Analysis Using Fault Trees and a Support System , 1996, J. Syst. Softw..
[166] Michael R. Lyu. Software Fault Tolerance , 1995 .
[167] Kevin Knight,et al. Unification: a multidisciplinary survey , 1989, CSUR.
[168] Carl H. Smith,et al. A Recursion Theoretic Approach to Program Testing , 1987, IEEE Transactions on Software Engineering.
[169] Bingchiang Jeng,et al. An automatic approach of domain test data generation , 1999, J. Syst. Softw..
[170] James Miller,et al. An empirical evaluation of defect detection techniques , 1997, Inf. Softw. Technol..
[171] H. D. Chu,et al. An evaluation scheme of software testing techniques , 1997 .
[172] Sarfraz Khurshid,et al. Software assurance by bounded exhaustive testing , 2004, IEEE Transactions on Software Engineering.
[173] Stuart Bennett,et al. A taxonomy for software voting algorithms used in safety-critical systems , 2004, IEEE Transactions on Reliability.
[174] Ron Weber,et al. An Ontological Model of an Information System , 1990, IEEE Trans. Software Eng..
[175] Zhibin Tan. Estimation of exponential component reliability from uncertain life data in series and parallel systems , 2007, Reliab. Eng. Syst. Saf..
[176] Joanne M. Atlee,et al. Feasibility of model checking software requirements: a case study , 1996, Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96.
[177] Alain Abran,et al. The Guide to the Software Engineering Body of Knowledge , 1999, IEEE Softw..
[178] Franck Xia,et al. Look before you leap: on some fundamental issues in software engineering research , 1999, Inf. Softw. Technol..
[179] Michael Pecht,et al. Reliability of a k-out-of-n warm-standby system , 1992 .
[180] Ryszard Janicki,et al. On a formal semantics of tabular expressions , 2001, Sci. Comput. Program..
[181] J. M. Voas,et al. Examining fault-tolerance using unlikely inputs: turning the test distribution up-side down , 1995, COMPASS '95 Proceedings of the Tenth Annual Conference on Computer Assurance Systems Integrity, Software Safety and Process Security'.
[182] Jehad Al Dallal,et al. Anomaly detection in concurrent Java programs using dynamic data flow analysis , 2001, Inf. Softw. Technol..
[183] J. V. Tucker,et al. Abstract computability and algebraic specification , 2002, TOCL.
[184] Stephen G. MacDonell,et al. A comparison of techniques for developing predictive models of software metrics , 1997, Inf. Softw. Technol..
[185] Taghi M. Khoshgoftaar,et al. Predicting fault-prone modules with case-based reasoning , 1997, Proceedings The Eighth International Symposium on Software Reliability Engineering.
[186] Ioannis Stamelos. Detecting associative shift faults in predicate testing , 2003, J. Syst. Softw..
[187] Nancy G. Leveson,et al. Analysis of Faults in an N-Version Software Experiment , 1990, IEEE Trans. Software Eng..
[188] G. Frege. Über Sinn und Bedeutung , 1892 .
[189] Lee J. White,et al. A Domain Strategy for Computer Program Testing , 1980, IEEE Transactions on Software Engineering.
[190] R. C. Jones,et al. On the uniformity of error propagation in software , 1997, Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance.
[191] Nancy J. Wahl. An overview of regression testing , 1999, SOEN.
[192] Torres Wilfredo,et al. Software Fault Tolerance: A Tutorial , 2000 .
[193] Lori A. Clarke,et al. A Formal Model of Program Dependences and Its Implications for Software Testing, Debugging, and Maintenance , 1990, IEEE Trans. Software Eng..
[194] Barry W. Boehm,et al. A spiral model of software development and enhancement , 1986, Computer.
[195] Cem Kaner. Teaching domain testing: a status report , 2004, 17th Conference on Software Engineering Education and Training, 2004. Proceedings..
[196] Sandro Morasca,et al. A hybrid approach to analyze empirical software engineering data and its application to predict module fault-proneness in maintenance , 2000, J. Syst. Softw..
[197] Peter G. Bishop,et al. An exploration of software faults and failure behaviour in a large population of programs , 2004, 15th International Symposium on Software Reliability Engineering.
[198] Axel van Lamsweerde,et al. Managing Conflicts in Goal-Driven Requirements Engineering , 1998, IEEE Trans. Software Eng..
[199] Nicos Malevris. A path generation method for testing LCSAJs that restrains infeasible paths , 1995, Inf. Softw. Technol..
[200] Gwangil Jeon,et al. A partitioning method for efficient system-level diagnosis , 2002, J. Syst. Softw..
[201] Neil A. M. Maiden,et al. The Domain Theory for Requirements Engineering , 1998, IEEE Trans. Software Eng..
[202] Gregor Snelting,et al. Efficient path conditions in dependence graphs for software safety analysis , 2006, TSEM.
[203] Paul Lander,et al. Optimizing signal averaging methods , 1989, Images of the Twenty-First Century. Proceedings of the Annual International Engineering in Medicine and Biology Society,.
[204] Daniel Jackson,et al. Alloy: a lightweight object modelling notation , 2002, TSEM.
[205] G. Becker,et al. Two-stage Bayesian models - application to ZEDB project , 2005, Reliab. Eng. Syst. Saf..
[206] J. A. Makowsky. Model theory and computer science: an appetizer , 1993, LICS 1993.
[207] Sara Jones,et al. Formal methods and requirements engineering: Challenges and synergies , 1998, J. Syst. Softw..
[208] Marc J. Balcer,et al. The category-partition method for specifying and generating fuctional tests , 1988, CACM.
[209] David A. Schmidt. Data flow analysis is model checking of abstract interpretations , 1998, POPL '98.
[210] Kishor S. Trivedi,et al. A workload-based analysis of software aging, and rejuvenation , 2005, IEEE Transactions on Reliability.
[211] Brian Mitchell,et al. A reliability model combining representative and directed testing , 1996, Proceedings of IEEE 18th International Conference on Software Engineering.
[212] Poong-Hyun Seong,et al. Quantitative evaluation of safety critical software testability based on fault tree analysis and entropy , 2004, J. Syst. Softw..
[213] William E. Howden,et al. Reliability of the Path Analysis Testing Strategy , 1976, IEEE Transactions on Software Engineering.
[214] Alfred V. Aho,et al. Data Structures and Algorithms , 1983 .
[215] Peter G. Bishop,et al. Rescaling reliability bounds for a new operational profile , 2002, ISSTA '02.
[216] Pierfrancesco Bellini,et al. Temporal logics for real-time system specification , 2000, CSUR.
[217] A. Jefferson Offutt,et al. An analysis tool for coupling-based integration testing , 2000, Proceedings Sixth IEEE International Conference on Engineering of Complex Computer Systems. ICECCS 2000.
[218] Farokh B. Bastani,et al. A Class of Inherently Fault Tolerant Distributed Programs , 1988, IEEE Trans. Software Eng..
[219] S. Munson. Assessment of accident investigation methods for wildland firefighting incidents by case study method , 2000 .
[220] Issa Traoré,et al. Enhancing structured review with model-based verification , 2004, IEEE Transactions on Software Engineering.
[221] Jeff Tian,et al. An Integrated Approach to Test Tracking and Analysis , 1996, J. Syst. Softw..
[222] Bernard M. E. Moret,et al. Decision Trees and Diagrams , 1982, CSUR.
[223] Sukhamay Kundu. Note on a Constrained-Path Problem in Program Testing , 1978, IEEE Transactions on Software Engineering.
[224] Phyllis G. Frankl,et al. The ASTOOT approach to testing object-oriented programs , 1994, TSEM.
[225] Purnendu Sinha,et al. A novel approach for component-based fault-tolerant software development , 2005, Inf. Softw. Technol..
[226] Taghi M. Khoshgoftaar,et al. The Detection of Fault-Prone Programs , 1992, IEEE Trans. Software Eng..
[227] Taghi M. Khoshgoftaar,et al. Early Quality Prediction: A Case Study in Telecommunications , 1996, IEEE Softw..
[228] Jon Doyle,et al. A Truth Maintenance System , 1979, Artif. Intell..
[229] James C. Corbett,et al. Identical tasks and counter variables in an integer programming-based approach to verification , 1993, Proceedings of 1993 IEEE 7th International Workshop on Software Specification and Design.
[230] Farokh B. Bastani,et al. Systematic reliability analysis of a class of application-specific embedded software framework , 2004, IEEE Transactions on Software Engineering.
[231] Lee J. White,et al. Sufficient test sets for path analysis testing strategies , 1981, ICSE '81.
[232] Janusz W. Laski,et al. A Data Flow Oriented Program Testing Strategy , 1983, IEEE Transactions on Software Engineering.
[233] Helmut Veith,et al. Counterexample-guided abstraction refinement for symbolic model checking , 2003, JACM.
[234] Steven J. Zeil,et al. Testing for Perturbations of Program Statements , 1983, IEEE Transactions on Software Engineering.
[235] Tharam S. Dillon,et al. Software Complexity and Its Impact on Software Reliability , 1988, IEEE Trans. Software Eng..
[236] Martin Glinz,et al. Improving the Quality of Requirements with Scenarios , 2000 .
[237] R. Burchfield. Oxford English dictionary , 1982 .
[238] Luqi,et al. Documentation driven development for complex real-time systems , 2004, IEEE Transactions on Software Engineering.
[239] Bev Littlewood,et al. Evaluating Testing Methods by Delivered Reliability , 1998, IEEE Trans. Software Eng..
[240] David A. McAllester,et al. On the complexity of set-based analysis , 1997, ICFP '97.
[241] James H. Andrews,et al. General Test Result Checking with Log File Analysis , 2003, IEEE Trans. Software Eng..
[242] J. Paul Myers,et al. The Path Prefix Software Testing Strategy , 1987, IEEE Transactions on Software Engineering.
[243] Donald Sannella,et al. Completeness of Proof Systems for Equational Specifications , 1985, IEEE Transactions on Software Engineering.
[244] Radha Jagadeesan,et al. Computing with Continuous Change , 1998, Sci. Comput. Program..
[245] Lionel C. Briand,et al. Exploring the relationships between design measures and software quality in object-oriented systems , 2000, J. Syst. Softw..
[246] Lorin Hochstein,et al. Combating architectural degeneration: a survey , 2005, Inf. Softw. Technol..
[247] B. A. Sheil,et al. The Psychological Study of Programming , 1981, CSUR.
[248] Onur Demirörs,et al. Functional size measurement revisited , 2008, TSEM.
[249] Bo Yang,et al. Modeling software for accurate data flow representation , 1993, Proceedings of 1993 15th International Conference on Software Engineering.
[250] Agostino Dovier,et al. Sets and constraint logic programming , 2000, TOPL.
[251] Hong Zhu,et al. Software unit test coverage and adequacy , 1997, ACM Comput. Surv..
[252] Timothy G. Trucano,et al. Verification and validation. , 2005 .
[253] Marvin D. Troutt,et al. Software quality assurance: An analytical survey and research prioritization , 1999, J. Syst. Softw..
[254] Bojan Cukic,et al. Robust prediction of fault-proneness by random forests , 2004, 15th International Symposium on Software Reliability Engineering.
[255] Steve Easterbrook,et al. Formal methods for verification and validation of partial specifications: A case study , 1998, J. Syst. Softw..
[256] Thomas Ragg,et al. Using machine learning for estimating the defect content after an inspection , 2004, IEEE Transactions on Software Engineering.
[257] W. Eric Wong,et al. Reducing the cost of mutation testing: An empirical study , 1995, J. Syst. Softw..
[258] Wen-Kui Chang,et al. Impartial evaluation in software reliability practice , 2005, J. Syst. Softw..
[259] Adam A. Porter,et al. Comparing Detection Methods for Software Requirements Inspections: A Replicated Experiment , 1995, IEEE Trans. Software Eng..
[260] Neil Walkinshaw,et al. Identifying State Transitions and their Functions in Source Code , 2006, Testing: Academic & Industrial Conference - Practice And Research Techniques (TAIC PART'06).
[261] David A. Schmidt. A calculus of logical relations for over- and underapproximating static analyses , 2007, Sci. Comput. Program..
[262] Robyn R. Lutz,et al. Analyzing software requirements errors in safety-critical, embedded systems , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.
[263] Ann Q. Gates,et al. A taxonomy and catalog of runtime software-fault monitoring tools , 2004, IEEE Transactions on Software Engineering.
[264] Les Hatton,et al. Safer language subsets: an overview and a case history, MISRA C , 2004, Inf. Softw. Technol..
[265] G. B. Finelli,et al. The Infeasibility of Quantifying the Reliability of Life-Critical Real-Time Software , 1993, IEEE Trans. Software Eng..
[266] Alistair G. Sutcliffe,et al. Scenario-based assessment of nonfunctional requirements , 2005, IEEE Transactions on Software Engineering.
[267] Robert S. Lubarsky. CZF and Second Order Arithmetic , 2006, Ann. Pure Appl. Log..
[268] Lorenzo Strigini,et al. Backward error recovery via conversations in Ada , 1995, Softw. Eng. J..
[269] Neil C. Rowe,et al. Absolute Bounds on Set Intersection and Union Sizes from Distribution Information , 1988, IEEE Trans. Software Eng..
[270] Shoichi Noguchi,et al. A User Friendly Software Environment for Protocol Synthesis , 1991, IEEE Trans. Computers.
[271] Mitsuari Hakuta,et al. A study of software portability evaluation , 1997, J. Syst. Softw..
[272] Yan Georget,et al. Encoding global constraints in semiring-based constraint solving , 1998, Proceedings Tenth IEEE International Conference on Tools with Artificial Intelligence (Cat. No.98CH36294).
[273] Qian Cui,et al. Data-Oriented Exception Handling , 1992, IEEE Trans. Software Eng..
[274] Andrea Masini,et al. An Analysis of (Linear) Exponentials Based on Extended Sequents , 1998, Log. J. IGPL.
[275] Marc Roper. Software testing - searching for the missing link , 1999, Inf. Softw. Technol..
[276] Jeffrey W. Vincoli. System Safety Program Requirements , 2005 .
[277] Lorenzo Strigini,et al. On the Use of Testability Measures for Dependability Assessment , 1996, IEEE Trans. Software Eng..
[278] Kai-Yuan Cai,et al. An efficient defect estimation method for software defect curves , 2003, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003.
[279] Jim Gray,et al. Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.
[280] Richard Gerber,et al. Composite model-checking: verification with type-specific symbolic representations , 1999, TSEM.
[281] Michael Stonebraker,et al. The POSTGRES Rule Manager , 1988, IEEE Trans. Software Eng..
[282] Franck Xia,et al. On the concept of coupling, its modeling and measurement , 2000, J. Syst. Softw..
[283] Vadlamani Ravi,et al. Software reliability prediction by soft computing techniques , 2008, J. Syst. Softw..
[284] M. E. Staknis. A formal investigation of checking the input to critical systems , 1993 .
[285] Mats Per Erik Heimdahl,et al. On the analysis needs when verifying state-based software requirements: an experience report , 2000, Sci. Comput. Program..
[286] Ehud Shapiro,et al. Algorithmic Program Debugging , 1983 .
[287] Gaetano Borriello,et al. An Algorithm for Exact Bounds on the Time Separation of Events in Concurrent Systems , 1995, IEEE Trans. Computers.
[288] Kishor S. Trivedi,et al. Transient analysis of Markov regenerative stochastic Petri nets: a comparison of approaches , 1995, Proceedings 6th International Workshop on Petri Nets and Performance Models.
[289] Dov M. Gabbay,et al. Background : computational structures , 1992 .
[290] Susan L. Gerhart,et al. Application of axiomatic methods to a specification analyser , 1984, ICSE '84.
[291] Petrus H. Potgieter,et al. Zeno machines and hypercomputation , 2004, Theor. Comput. Sci..
[292] Gregg Rothermel,et al. An experimental determination of sufficient mutant operators , 1996, TSEM.
[293] GERNOT METZE,et al. On the Connection Assignment Problem of Diagnosable Systems , 1967, IEEE Trans. Electron. Comput..
[294] Jeremy E. Dawson. Formalising General Correctness , 2004, Electron. Notes Theor. Comput. Sci..
[295] Joseph A. Goguen,et al. Institutions: abstract model theory for specification and programming , 1992, JACM.
[296] T. Kikuno,et al. Fault analysis based on fault reporting in JSP software development , 1991, [1991] Proceedings The Fifteenth Annual International Computer Software & Applications Conference.
[297] D. Shepherd. Using HOL To Produce Custom Verification Tools , 1991, 1991., International Workshop on the HOL Theorem Proving System and Its Applications.
[298] George S. Avrunin,et al. Improving the precision of INCA by preventing spurious cycles , 2000, ISSTA '00.
[299] James Miller,et al. Towards a benchmark for the evaluation of software testing techniques , 1995, Inf. Softw. Technol..
[300] Tsong Yueh Chen,et al. On the maximin algorithms for test allocations in partition testing , 2001, Inf. Softw. Technol..
[301] Chih-Ping Chu,et al. Integrating in-process software defect prediction with association mining to discover defect pattern , 2009, Inf. Softw. Technol..
[302] Mogens Nielsen,et al. Models for Concurrency , 1992 .
[303] Pascal Van Hentenryck,et al. Newton - Constraint Programming over Nonlinear Constraints , 1998, Sci. Comput. Program..
[304] Anish Arora,et al. Designing Masking Fault-Tolerance via Nonmasking Fault-Tolerance , 1998, IEEE Trans. Software Eng..
[305] Margaret M. Burnett,et al. Sharing reasoning about faults in spreadsheets: An empirical study , 2006, Visual Languages and Human-Centric Computing (VL/HCC'06).
[306] Yong Rae Kwon,et al. Empirical evaluation of orthogonality of class mutation operators , 2004, 11th Asia-Pacific Software Engineering Conference.
[307] Roy A. Maxion,et al. Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study , 2000, IEEE Trans. Software Eng..
[308] C. V. Ramamoorthy,et al. Software Reliability—Status and Perspectives , 1982, IEEE Transactions on Software Engineering.
[309] Gary Klein,et al. System analysts' orientations and perceptions of system failure , 1999, Inf. Softw. Technol..
[310] Randal E. Bryant,et al. Symbolic Boolean manipulation with ordered binary-decision diagrams , 1992, CSUR.
[311] Alexander Bunkenburg,et al. A source of inconsistency in theories of nondeterministic functions , 2002, Sci. Comput. Program..
[312] Claes Wohlin,et al. Applying sampling to improve software inspections , 2004, J. Syst. Softw..
[313] R. Blute,et al. Category theory for linear logicians , 2004 .
[314] Attila Csenki. Reliability analysis of recovery blocks with nested clusters of failure points , 1993 .
[315] Atul Prakash,et al. Programming in the large , 1986, IEEE Transactions on Software Engineering.
[316] Jan Gerben Wijnstra. From problem to solution with quality attributes and design aspects , 2003, J. Syst. Softw..
[317] Alfonso F. Cardenas,et al. An Approach and Mechanism for Auditable and Testable Advanced Transaction Processing Systems , 1987, IEEE Transactions on Software Engineering.
[318] Anna H. Hać,et al. A new cell loss recovery method using forward error correction in ATM networks , 1998 .
[319] Key-Sun Choi,et al. Two-Dimensional Specification of Universal Quantification in a Graphical Database Query Language , 1992, IEEE Trans. Software Eng..
[320] Carol S. Smidts,et al. HOTTest: A model-based test design technique for enhanced testing of domain-specific applications , 2006, TSEM.
[321] Elaine J. Weyuker,et al. A Formal Analysis of the Fault-Detecting Ability of Testing Methods , 1993, IEEE Trans. Software Eng..
[322] Seiki Akama. Three-valued constructive logic and logic programs , 1995, Proceedings 25th International Symposium on Multiple-Valued Logic.
[323] Diane Kelly,et al. A case study in the use of defect classification in inspections , 2001, CASCON.
[324] Debra J. Richardson,et al. An Analysis of Test Data Selection Criteria Using the RELAY Model of Fault Detection , 1993, IEEE Trans. Software Eng..
[325] Aniello Cimitile,et al. An Extensible System for Source Code Analysis , 1998, IEEE Trans. Software Eng..
[326] Mana Taghdiri,et al. Inferring specifications to detect errors in code , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[327] George S. Avrunin,et al. Analyzing Partially-Implemented Real-Time Systems , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[328] Myra B. Cohen,et al. Covering Arrays for Efficient Fault Characterization in Complex Configuration Spaces , 2006, IEEE Trans. Software Eng..
[329] Douglas Stott Parker,et al. Partial order programming (extended abstract) , 1989, POPL '89.
[330] Stephen N. Freund,et al. Atomizer: A Dynamic Atomicity Checker for Multithreaded Programs (Summary) , 2004, IPDPS.
[331] Mark Harman,et al. ConSUS: a light-weight program conditioner , 2005, J. Syst. Softw..
[332] J. Christopher Westland,et al. The cost of errors in software development: evidence from industry , 2002, J. Syst. Softw..
[333] Farn Wang,et al. Symbolic parametric safety analysis of linear hybrid systems with BDD-like data-structures , 2004, IEEE Transactions on Software Engineering.
[334] Anders P. Ravn,et al. From Safety Analysis to Software Requirements , 1998, IEEE Trans. Software Eng..
[335] Robert M. Hierons. Avoiding coincidental correctness in boundary value analysis , 2006, TSEM.
[336] David Lorge Parnas,et al. Predicate Logic for Software Engineering , 1993, IEEE Trans. Software Eng..
[337] Toufik Taibi,et al. Formal Specification of Design Patterns and Their Instances , 2006, IEEE International Conference on Computer Systems and Applications, 2006..
[338] Leigh A. Davis,et al. Patterns of conflict among software components , 2006, J. Syst. Softw..
[339] Harvey P. Siy,et al. An Experiment ot Assess the Cost-Benefits of Code Inspections in Large Scale Software Development , 1997, IEEE Trans. Software Eng..
[340] Richard H. Carver,et al. Debugging Concurrent Ada Programs by Deterministic Execution , 1991, IEEE Trans. Software Eng..
[341] Michael I. Jordan,et al. Statistical debugging: simultaneous identification of multiple bugs , 2006, ICML.
[342] A. Jefferson Offutt,et al. Evaluation of three specification-based testing criteria , 2000, Proceedings Sixth IEEE International Conference on Engineering of Complex Computer Systems. ICECCS 2000.
[343] Richard G. Hamlet. Theoretical comparison of testing methods , 1989 .
[344] Siddhartha R. Dalal,et al. When to Stop Testing for Large Software Systems with Changing Code , 1994, IEEE Trans. Software Eng..
[345] Holger Hermanns,et al. QoS modelling and analysis with UML-statecharts: the StoCharts approach , 2005, PERV.
[346] Bharat K. Bhargava,et al. An open and safe nested transaction model: concurrency and recovery , 2000, J. Syst. Softw..
[347] Bedir Tekinerdogan,et al. Software Architecture Reliability Analysis Using Failure Scenarios , 2005, 5th Working IEEE/IFIP Conference on Software Architecture (WICSA'05).
[348] Witold Pedrycz,et al. Genetic granular classifiers in modeling software quality , 2005, J. Syst. Softw..
[349] Les Hatton. Repetitive failure, feedback and the lost art of diagnosis , 1999, J. Syst. Softw..
[350] Maurizio Pighin,et al. An empirical analysis of fault persistence through software releases , 2003, 2003 International Symposium on Empirical Software Engineering, 2003. ISESE 2003. Proceedings..
[351] Sudheendra Hangal,et al. Tracking down software bugs using automatic anomaly detection , 2002, ICSE '02.
[352] Michel Wermelinger,et al. Higher-order architectural connectors , 2003, TSEM.
[353] Sandro Morasca,et al. A proposal for using continuous attributes in classification trees , 2002, SEKE '02.
[354] Orna Kupferman,et al. Weak alternating automata are not that weak , 2001, TOCL.
[355] Serge Demeyer,et al. On The Detection of Test Smells: A Metrics-Based Approach for General Fixture and Eager Test , 2007, IEEE Trans. Software Eng..
[356] Johnette Hassell,et al. Designing a resourceful fault-tolerance system , 2002, J. Syst. Softw..
[357] Jens Palsberg. Equality-based flow analysis versus recursive types , 1998, TOPL.
[358] Giuliana Franceschinis,et al. Parametric Fault Tree for the Dependability Analysis of Redundant Systems and Its High-Level Petri Net Semantics , 2003, IEEE Trans. Software Eng..
[359] Joseph Sifakis,et al. Compiling Real-Time Specifications into Extended Automata , 1992, IEEE Trans. Software Eng..
[360] Lorenzo Strigini,et al. Fault Tolerance Against Design Faults , 2005 .
[361] Yashwant K. Malaiya,et al. On input profile selection for software testing , 1994, Proceedings of 1994 IEEE International Symposium on Software Reliability Engineering.
[362] Geppino Pucci,et al. A New Approach to the Modeling of Recovery Block Structures , 1992, IEEE Trans. Software Eng..
[363] Branson W. Murrill. An empirical, path-oriented approach to software analysis and testing , 2008, J. Syst. Softw..
[364] Larry J Morell,et al. A Theory of Fault-Based Testing , 1990, IEEE Trans. Software Eng..
[365] Tom McCusker,et al. TRW Inc. , 1993 .
[366] William H. Sanders,et al. Synergistic coordination between software and hardware fault tolerance techniques , 2001, 2001 International Conference on Dependable Systems and Networks.
[367] Steven J. Vickers,et al. Presheaves as Configured Specifications , 2001, Formal Aspects of Computing.
[368] Ana R. Cavalli,et al. Experimental evaluation of FSM-based testing methods , 2005, Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05).
[369] Michael R. Lyu,et al. An experimental evaluation on reliability features of N-version programming , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).
[370] Victor F. Nicola,et al. Modeling of Correlated Failures and Community Error Recovery in Multiversion Software , 1990, IEEE Trans. Software Eng..
[371] Stefano Crespi-Reghizzi,et al. A scalable formal method for design and automatic checking of user interfaces , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[372] Yves Le Traon,et al. From diagnosis to diagnosability: axiomatization, measurement and application , 2003, J. Syst. Softw..
[373] J. Voas,et al. Software Testability: The New Verification , 1995, IEEE Softw..
[374] S. C. De Sarkar,et al. A Set of Inference Rules for Quantified Formula Handling and Array Handling in Verification of Programs Over Integers , 1989, IEEE Trans. Software Eng..
[375] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[376] Luis Olsina,et al. Towards an ontology for software metrics and indicators as the foundation for a cataloging Web system , 2003, Proceedings of the IEEE/LEOS 3rd International Conference on Numerical Simulation of Semiconductor Optoelectronic Devices (IEEE Cat. No.03EX726).
[377] Joseph R. Schoenfield. Recursion theory , 1993 .
[378] Anish Arora,et al. Component Based Design of Multitolerant Systems , 1998, IEEE Trans. Software Eng..
[379] Farokh B. Bastani,et al. On the Uncertainty in the Correctness of Computer Programs , 1985, IEEE Transactions on Software Engineering.
[380] Gursaran,et al. An experimental evaluation of weak-branch criterion for class testing , 2004, J. Syst. Softw..
[381] Avinash C. Kak,et al. API-Based and Information-Theoretic Metrics for Measuring the Quality of Software Modularization , 2007 .
[382] Kentaro Go,et al. A Decomposition of a Formal Specification: An Improved Constraint Oriented Method , 1999, IEEE Trans. Software Eng..
[383] Jorge Santos,et al. A least upper bound on the fault tolerance of real-time systems , 2005, J. Syst. Softw..
[384] Martin S. Feather. Constructing Specifications by Combining Parallel Elaborations , 1989, IEEE Trans. Software Eng..
[385] Claes Wohlin,et al. Capture-recapture in software inspections after 10 years research--theory, evaluation and application , 2004, J. Syst. Softw..
[386] Lee J. White,et al. Detection of linear errors via domain testing , 1992, TSEM.
[387] Rajeev Alur,et al. Analysis of recursive state machines , 2001, TOPL.
[388] William E. Howden,et al. A functional approach to program testing and analysis , 1986, IEEE Transactions on Software Engineering.
[389] Daniel M. Yellin,et al. Extending Typestate Checking Using Conditional Liveness Analysis , 1993, IEEE Trans. Software Eng..
[390] Johann Schumann,et al. Automated Theorem Proving in High-Quality Software Design , 2013, Intellectics and Computational Logic.
[391] David N. Card,et al. Learning from Our Mistakes with Defect Causal Analysis , 1999, IEEE Softw..
[392] Donald E. Neumann. An Enhanced Neural Network Technique for Software Risk Analysis , 2002, IEEE Trans. Software Eng..
[393] Barbara G. Ryder,et al. A Critical Analysis of Incremental Iterative Data Flow Analysis Algorithms , 1990, IEEE Trans. Software Eng..
[394] Wei-Tek Tsai,et al. A framework for designing safe software systems , 1995, Proceedings Nineteenth Annual International Computer Software and Applications Conference (COMPSAC'95).
[395] Keith L. Clark,et al. Consequence Verification of Flowcharts , 1981, IEEE Transactions on Software Engineering.
[396] Sarfraz Khurshid,et al. TestEra: a novel framework for automated testing of Java programs , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[397] Victor R. Basili,et al. Developing Interpretable Models with Optimized Set Reduction for Identifying High-Risk Software Components , 1993, IEEE Trans. Software Eng..
[398] Derek Coleman,et al. Formal Specification and Design Time Testing , 1990, IEEE Trans. Software Eng..
[399] Rob J. Kusters,et al. Exploring defect causes in products developed by virtual teams , 2005, Inf. Softw. Technol..
[400] Peter Oehlert,et al. Violating Assumptions with Fuzzing , 2005, IEEE Secur. Priv..
[401] Taghi M. Khoshgoftaar,et al. Resource-oriented software quality classification models , 2005, J. Syst. Softw..
[402] Naohiro Ishii,et al. Analysis of software bug causes and its prevention , 1999, Inf. Softw. Technol..
[403] Xin Huang,et al. Producing reliable software: an experiment , 2002, J. Syst. Softw..
[404] Michael R. Lowry,et al. Formal Analysis of a Space-Craft Controller Using SPIN , 2001, IEEE Trans. Software Eng..
[405] Alessandro Orso,et al. Classifying data dependences in the presence of pointers for program comprehension, testing, and debugging , 2004, TSEM.
[406] Zakaria Bouziane,et al. A primitive recursive algorithm for the general Petri net reachability problem , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[407] Colin Atkinson,et al. An experimental comparison of reading techniques for defect detection in UML design documents , 2000, J. Syst. Softw..
[408] Shing-Chi Cheung,et al. Checking subsystem safety properties in compositional reachability analysis , 1996, Proceedings of IEEE 18th International Conference on Software Engineering.
[409] Peter J. Denning,et al. Fault Tolerant Operating Systems , 1976, CSUR.
[410] Bingchiang Jeng. Toward an integration of data flow and domain testing , 1999, J. Syst. Softw..
[411] Imtiaz Ahmad,et al. Recovery From Concurrent Failures in Communication Protocols , 1996, J. Syst. Softw..
[412] Zachary F. Lansdowne,et al. Reliability Estimation for a Software System with Sequential Independent Reviews , 2001, IEEE Trans. Software Eng..
[413] Hongxia Jin,et al. Approximate correctness-checking of computational results , 1999 .
[414] Francesc D. Muñoz-Escoí,et al. Recovery Protocols for Replicated Databases--A Survey , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[415] Norman E. Fenton,et al. A Critique of Software Defect Prediction Models , 1999, IEEE Trans. Software Eng..
[416] K. Suzanne Barber,et al. Evaluating dynamic correctness properties of domain reference architectures , 2003, J. Syst. Softw..
[417] Manuel Blum,et al. Software reliability via run-time result-checking , 1997, JACM.
[418] Andreas Blass,et al. Inadequacy of computable loop invariants , 2001, TOCL.
[419] Alberto Suárez,et al. Globally Optimal Fuzzy Decision Trees for Classification and Regression , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[420] Shari Lawrence Pfleeger. Risky business: what we have yet to learn about risk management , 2000, J. Syst. Softw..
[421] Keith E. Williamson,et al. Industrial applications of software synthesis via category theory , 1999, 14th IEEE International Conference on Automated Software Engineering.
[422] William E. Howden,et al. Functional Program Testing , 1978, IEEE Transactions on Software Engineering.
[423] Oleg Parshin,et al. Towards an Integration of Low-Level Timing Analysis and Model-Based Code Generation , 2006, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006).
[424] Shing-Chi Cheung,et al. An integrated method for effective behaviour analysis of distributed systems , 1994, Proceedings of 16th International Conference on Software Engineering.
[425] Kai-Hsiung Chang,et al. Testing object-oriented programs: from formal specification to test scenario generation , 1998, J. Syst. Softw..
[426] Elaine J. Weyuker,et al. A simplified domain-testing strategy , 1994, TSEM.
[427] James Miller,et al. Applying meta-analytical procedures to software engineering experiments , 2000, J. Syst. Softw..
[428] Alan R. Hevner,et al. Reviewing software diagrams: a cognitive study , 2004, IEEE Transactions on Software Engineering.
[429] Bojan Cukic. Combining testing and correctness verification in software reliability assessment , 1997, Proceedings 1997 High-Assurance Engineering Workshop.
[430] Simeon C. Ntafos,et al. A Comparison of Some Structural Testing Strategies , 1988, IEEE Trans. Software Eng..
[431] Elaine J. Weyuker,et al. Software performance testing based on workload characterization , 2002, WOSP '02.
[432] Andrew W. Appel,et al. Foundational proof-carrying code , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.
[433] Elisabeth A. Strunk,et al. A Survey of Tools for Model Checking and Model-Based Development , 2006 .
[434] Michael E. Fagan. Advances in software inspections , 1986, IEEE Transactions on Software Engineering.
[435] Paul Ammann,et al. Data Diversity: An Approach to Software Fault Tolerance , 1988, IEEE Trans. Computers.
[436] Ravishankar K. Iyer,et al. Faults, symptoms, and software fault tolerance in the Tandem GUARDIAN90 operating system , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[437] Zha Ming,et al. A formal software development approach based on COOZ and refinement calculus , 1999 .
[438] Michael Jackson,et al. Where Do Operations Come From: A Multiparadigm Specification Technique , 1996, IEEE Trans. Software Eng..
[439] W. M. McKeeman,et al. On preventing programming languages from interfering with programming , 1975, IEEE Transactions on Software Engineering.
[440] Kang G. Shin,et al. Measurement and Analysis of Workload Effects on Fault Latency in Real-Time Systems , 1990, IEEE Trans. Software Eng..
[441] Roger B. Dannenberg,et al. Formal Program Verification Using Symbolic Execution , 1982, IEEE Transactions on Software Engineering.
[442] Elaine J. Weyuker,et al. Theories of Program Testing and the Application of Revealing Subdomains , 1980, IEEE Transactions on Software Engineering.
[443] Shmuel Katz,et al. Architectural views of aspects , 2003, AOSD '03.
[444] Éric Rutten,et al. Modeling statecharts and activitycharts as signal equations , 2001, TSEM.
[445] Jules Desharnais,et al. Static Detection of Malicious Code in Executable Programs , 2000 .
[446] Suku Nair,et al. Statistical analysis of nonstationary software metrics , 1997, Inf. Softw. Technol..
[447] Joanne M. Atlee,et al. State-Based Model Checking of Event-Driven System Requirements , 1993, IEEE Trans. Software Eng..
[448] Jingde Cheng,et al. A Quantitative Analysis of Implicational Paradoxes in Classical Mathematical Logic , 2007, Electron. Notes Theor. Comput. Sci..
[449] Lori A. Clarke,et al. A Close Look at Domain Testing , 1982, IEEE Transactions on Software Engineering.
[450] Kang G. Shin,et al. Task construction for model-based design of embedded control software , 2006, IEEE Transactions on Software Engineering.
[451] Beatrice Gralton,et al. Washington DC - USA , 2008 .
[452] Junfeng Yang,et al. Using model checking to find serious file system errors , 2004, TOCS.
[453] Lionel C. Briand,et al. Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects , 2002, IEEE Trans. Software Eng..
[454] J. Collofello,et al. An environment for training computer science students on software testing , 2005, Proceedings Frontiers in Education 35th Annual Conference.
[455] Robyn R. Lutz,et al. Empirical analysis of safety-critical anomalies during operations , 2004, IEEE Transactions on Software Engineering.
[456] Dawson R. Engler,et al. Using Redundancies to Find Errors , 2003, IEEE Trans. Software Eng..
[457] David Wright,et al. Some Conservative Stopping Rules for the Operational Testing of Safety-Critical Software , 1997, IEEE Trans. Software Eng..
[458] P. Pop. The generalized minimum spanning tree problem , 2000 .
[459] Patrick Cousot,et al. Systematic design of program analysis frameworks , 1979, POPL.
[460] William D. Young. Comparing Verification Systems: Interactive Consistency in ACL2 , 1997, IEEE Trans. Software Eng..
[461] Shaoying Liu,et al. The practice of formal methods in safety-critical systems , 1995, J. Syst. Softw..
[462] Jonathan Jacky,et al. Specifying a Safety-Critical Control System in Z , 1993, IEEE Trans. Software Eng..
[463] Andrea Bondavalli,et al. Temporal analysis of data flow control systems , 1998, Autom..
[464] Doron A. Peled,et al. Model checking, testing and verification working together , 2005, Formal Aspects of Computing.
[465] Ravishankar K. Iyer,et al. Characterization of linux kernel behavior under errors , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[466] Thomas G. Moher,et al. PROVIDE: A Process Visualization and Debugging Environment , 1988, IEEE Trans. Software Eng..
[467] Ståle Amland. Risk-based testing: : Risk analysis fundamentals and metrics for software testing including a financial application case study , 2000, J. Syst. Softw..
[468] Joel A. Tropp,et al. ALGORITHMS FOR SIMULTANEOUS SPARSE APPROXIMATION , 2006 .
[469] Galit Shmueli,et al. Computing consecutive-type reliabilities nonrecursively , 2003, IEEE Trans. Reliab..
[470] A. Pasquini,et al. An input-domain based method to estimate software reliability , 1996, IEEE Trans. Reliab..
[471] Jeffrey M. Voas,et al. PIE: A Dynamic Failure-Based Technique , 1992, IEEE Trans. Software Eng..
[472] Patrice Lacroix. RTL-CHECK: A PRACTICAL STATIC ANALYSIS FRAMEWORK TO VERIFY MEMORY SAFETY AND MORE , 2006 .
[473] Alan F. Babich. Proving Total Correctness of Parallel Programs , 1979, IEEE Transactions on Software Engineering.
[474] Bev Littlewood,et al. Validation of ultrahigh dependability for software-based systems , 1993, CACM.
[475] Erik Berglund. Communicating bugs: global bug knowledge distribution , 2005, Inf. Softw. Technol..
[476] David Rine. Sharing objects as structural defects in object-oriented programming without safe typing , 1996, Inf. Softw. Technol..
[477] Ann Q. Gates,et al. FasTLInC: a constraint-based tracing approach , 2002, J. Syst. Softw..
[478] Arie Shoshani,et al. On the correctness of representing extended entity-relationship structures in the relational model , 1989, SIGMOD '89.
[479] M. R. Woodward,et al. From weak to strong, dead or alive? an analysis of some mutation testing issues , 1988, [1988] Proceedings. Second Workshop on Software Testing, Verification, and Analysis.
[480] Kuo-Chung Tai. Predicate-based test generation for computer programs , 1993, Proceedings of 1993 15th International Conference on Software Engineering.
[481] James M. Rehg,et al. Active learning for automatic classification of software behavior , 2004, ISSTA '04.
[482] Dale Miller,et al. A multiple-conclusion meta-logic , 1994, Proceedings Ninth Annual IEEE Symposium on Logic in Computer Science.
[483] Brigitte Biebow,et al. Exception Handling: Formal Specification and Systematic Program Construction , 1984, IEEE Transactions on Software Engineering.
[484] Peter Fritzson,et al. Usability criteria for automated debugging systems , 1995, J. Syst. Softw..
[485] Yevgeniy Makarov. Practical Program Extraction from Classical Proofs , 2005, MFPS.
[486] Lionel C. Briand,et al. A comprehensive and systematic methodology for client-server class integration testing , 2003, 14th International Symposium on Software Reliability Engineering, 2003. ISSRE 2003..
[487] Bev Littlewood,et al. Conceptual Modeling of Coincident Failures in Multiversion Software , 1989, IEEE Trans. Software Eng..
[488] Anders P. Ravn,et al. Specifying and Verifying Requirements of Real-Time Systems , 1993, IEEE Trans. Software Eng..
[489] Mariagiovanna Sami,et al. Some Properties Derived from Structural Analysis of Program Graph Models , 1983, IEEE Transactions on Software Engineering.
[490] Dov Dori,et al. The Model Multiplicity Problem: Experimenting with Real-Time Specification Methods , 2000, IEEE Trans. Software Eng..
[491] Mark Harman,et al. Conditioned slicing supports partition testing , 2002, Softw. Test. Verification Reliab..
[492] David Notkin,et al. Software Reflexion Models: Bridging the Gap between Design and Implementation , 2001, IEEE Trans. Software Eng..
[493] B. Ramesh,et al. Issues in the development of a requirements traceability model , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.
[494] W. D. Itzfeldt. Quality metrics for software management and engineering , 1990 .
[495] David N. Card,et al. Empirical Study of Software Design Practices , 2004 .
[496] Russ Abbott,et al. Resourceful systems for fault tolerance, reliability, and safety , 1990, CSUR.
[497] N. Iwata,et al. Porting classes and coding rules for C programs on CTRON , 1993, Proceedings the Tenth Project International Symposium, 1993.
[498] Natarajan Shankar,et al. Formal Verification for Fault-Tolerant Architectures: Prolegomena to the Design of PVS , 1995, IEEE Trans. Software Eng..
[499] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[500] Albert Endres. An analysis of errors and their causes in system programs , 1975 .
[501] Samuel T. Redwine. An Engineering Approach to Software Test Data Design , 1983, IEEE Transactions on Software Engineering.
[502] Vincenzo De Florio,et al. A survey of linguistic structures for application-level fault tolerance , 2008, CSUR.
[503] Ali Mili,et al. Towards a Theory of Forward Error Recovery , 1985, IEEE Transactions on Software Engineering.
[504] Ravishankar K. Iyer,et al. Fault/failure analysis of the Tandem NonStop-UX operating system , 1996, 15th DASC. AIAA/IEEE Digital Avionics Systems Conference.
[505] Ranga Vemuri,et al. Finite state machine verification on MIMD machines , 1992, Proceedings EURO-DAC '92: European Design Automation Conference.
[506] Alexandre Petrenko,et al. Confirming configurations in EFSM testing , 2004, IEEE Transactions on Software Engineering.
[507] Barbara G. Ryder,et al. An incremental flow- and context-sensitive pointer aliasing analysis , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[508] Scott A. DeLoach,et al. A Theory-Based Representation for Object-Oriented Domain Models , 2000, IEEE Trans. Software Eng..
[509] Hui Liu,et al. Covering code behavior on input validation in functional testing , 2009, Inf. Softw. Technol..
[510] Dolores R. Wallace,et al. Structured Testing: A Testing Methodology Using the Cyclomatic Complexity Metric , 1996 .
[511] Barbara G. Ryder,et al. Incremental Analysis of Side Effects for C Software Systems , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[512] Roy S. Freedman,et al. Testability of Software Components , 1991, IEEE Trans. Software Eng..
[513] Ian Sommerville,et al. An empirical study of industrial requirements engineering process assessment and improvement , 2005, TSEM.
[514] Farokh B. Bastani,et al. Reliability of fully and partially replicated systems , 1992 .
[515] E. K. Park,et al. Algebraic software testing in vector spaces of functions , 1996, Proceedings of 20th International Computer Software and Applications Conference: COMPSAC '96.
[516] Bertrand Meyer. A Framework for Proving Contract-Equipped Classes , 2003, Abstract State Machines.
[517] Cecília M. F. Rubira,et al. A comparative study of exception handling mechanisms for building dependable object-oriented software , 2001, J. Syst. Softw..
[518] James R. Lyle,et al. A Two-Person Inspection Method to Improve Prog ramming Productivity , 1989, IEEE Transactions on Software Engineering.
[519] Nancy G. Leveson,et al. Safeware: System Safety and Computers , 1995 .
[520] John Mylopoulos,et al. RULE-BASED DETECTION OF INCONSISTENCY IN UML MODELS , 2002 .
[521] Michael W. Godfrey,et al. Using origin analysis to detect merging and splitting of source code entities , 2005, IEEE Transactions on Software Engineering.
[522] Gilberto Filé,et al. A unifying view of abstract domain design , 1996, CSUR.
[523] Kuldeep Kumar,et al. Informal and Formal Requirements Specification Languages: Bridging the Gap , 1991, IEEE Trans. Software Eng..
[524] Raymond T. Boute,et al. Supertotal Function Definition in Mathematics and Software Engineering , 2000, IEEE Trans. Software Eng..
[525] Julie A. McCann,et al. A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.
[526] Ravishankar K. Iyer,et al. Diagnosing Rediscovered Software Problems Using Symptoms , 2000, IEEE Trans. Software Eng..
[527] Chen Fu,et al. Robustness testing of Java server applications , 2005, IEEE Transactions on Software Engineering.
[528] Jan Willem Klop,et al. Term Rewriting Systems: From Church-Rosser to Knuth-Bendix and Beyond , 1990, ICALP.
[529] Gianna Reggio,et al. Consistency Problems in UML-Based Software Development , 2004, UML Satellite Activities.
[530] Kwangkeun Yi,et al. An Abstract Interpretation for Estimating Uncaught Exceptions in Standard ML Programs , 1998, Sci. Comput. Program..
[531] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[532] Enrico Vicario,et al. Timed state space analysis of real-time preemptive systems , 2004, IEEE Transactions on Software Engineering.
[533] Markus Stumptner,et al. A Survey of Intelligent Debugging , 1998, AI Commun..
[534] Ravishankar K. Iyer,et al. Software Dependability in the Tandem GUARDIAN System , 1995, IEEE Trans. Software Eng..
[535] Pierre N. Robillard,et al. Engineering-based processes and agile methodologies for software development: a comparative case study , 2005, J. Syst. Softw..
[536] James M. Bieman,et al. Design patterns and change proneness: an examination of five evolving systems , 2003, Proceedings. 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (IEEE Cat. No.03EX717).
[537] Albert Y. Zomaya,et al. Dependable computing systems : paradigms, performance issues, and applications , 2005 .
[538] Qian Feng,et al. Bi-directional safety analysis of product lines , 2005, J. Syst. Softw..
[539] Francesca Saglietti. Software diversity metrics quantifying dissimilarity in the input partition , 1990, Softw. Eng. J..
[540] Siddhartha R. Dalal,et al. The Automatic Efficient Test Generator (AETG) system , 1994, Proceedings of 1994 IEEE International Symposium on Software Reliability Engineering.
[541] Pau-Lo Hsu,et al. General-structured unknown input observers , 1994, Proceedings of 1994 American Control Conference - ACC '94.
[542] Robert L. Probert,et al. Optimal Insertion of Software Probes in Well-Delimited Programs , 1982, IEEE Transactions on Software Engineering.
[543] Michael Goldstein,et al. Bayesian Graphical Models for Software Testing , 2002, IEEE Trans. Software Eng..
[544] Mario Bravetti. An Integrated Approach for the Specification and Analysis of Stochastic Real-Time Systems , 2002, PAPM-PROBMIV.
[545] Victor R. Basili,et al. An analysis of errors in a reuse-oriented development environment , 1995, J. Syst. Softw..
[546] Martin P. Robillard,et al. How effective developers investigate source code: an exploratory study , 2004, IEEE Transactions on Software Engineering.
[547] Elaine J. Weyuker,et al. Analyzing Partition Testing Strategies , 1991, IEEE Trans. Software Eng..
[548] Oliver Laitenberger,et al. An encompassing life cycle centric survey of software inspection , 2000, J. Syst. Softw..
[549] Victor R. Basili,et al. Analyzing Error-Prone System Structure , 1991, IEEE Trans. Software Eng..
[550] Lawrence Yelowitz,et al. Observations of Fallibility in Applications of Modern Programming Methodologies , 1976, IEEE Transactions on Software Engineering.
[551] Tsong Yueh Chen,et al. An Overview of Integration Testing Techniques for Object-Oriented Programs , 2002 .
[552] Daniel A. Menascé,et al. Assessing the robustness of self-managing computer systems under highly variable workloads , 2004 .
[553] Kuo-Chung Tai,et al. Theory of Fault-Based Predicate Testing for Computer Programs , 1996, IEEE Trans. Software Eng..
[554] James D. Kiper. Structural testing of rule-based expert systems , 1992, TSEM.
[555] Hélène Waeselynck,et al. STATEMATE applied to statistical software testing , 1993, ISSTA '93.
[556] Jim Cunningham,et al. Invariants for Specifications , 1979, ICSE.
[557] Daniel Hoffman,et al. Trace Specifications: Methodology and Models , 1988, IEEE Trans. Software Eng..
[558] Pieter H. Hartel,et al. Formalizing the safety of Java, the Java virtual machine, and Java card , 2001, CSUR.
[559] Leon Moonen,et al. A generic architecture for data flow analysis to support reverse engineering , 1997 .
[560] Monica Nilsson,et al. Software Engineering Research Laboratory , 2002 .
[561] Wanchai Rivepiboon,et al. Automated-generating test case using UML statechart diagrams , 2003 .
[562] Borislav Nikolik. Convergence debugging , 2005, AADEBUG'05.
[563] Mark Harman,et al. Amorphous program slicing , 1997, Proceedings Fifth International Workshop on Program Comprehension. IWPC'97.
[564] Harlan D. Mills,et al. Theory of Modules , 1987, IEEE Transactions on Software Engineering.
[565] Mark Sullivan,et al. A comparison of software defects in database management systems and operating systems , 1992, [1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing.
[566] A. Jefferson Offutt,et al. Combination testing strategies: a survey , 2005, Softw. Test. Verification Reliab..
[567] William G. Griswold,et al. Dynamically discovering likely program invariants to support program evolution , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[568] Jules Desharnais,et al. Describing data flow analysis techniques with Kleene algebra , 2007, Sci. Comput. Program..
[569] John Cocke,et al. A program data flow analysis procedure , 1976, CACM.
[570] Charles Yang,et al. Estimation of software reliability by stratified sampling , 1999, TSEM.
[571] Hong Zhu. A note on test oracles and semantics of algebraic specifications , 2003, Third International Conference on Quality Software, 2003. Proceedings..
[572] Dewayne E. Perry,et al. Classification and evaluation of defects in a project retrospective , 2002, J. Syst. Softw..
[573] Simeon C. Ntafos,et al. An Evaluation of Random Testing , 1984, IEEE Transactions on Software Engineering.
[574] Michael Kifer,et al. A logic for reasoning with inconsistency , 1992, Journal of Automated Reasoning.
[575] Dinakar Dhurjati,et al. Memory safety without garbage collection for embedded applications , 2005, TECS.
[576] Christopher Landauer,et al. Designing testable, heterogeneous software environments , 1995, J. Syst. Softw..
[577] Toby Walsh,et al. Handbook of Constraint Programming , 2006, Handbook of Constraint Programming.
[578] Forouzan Golshani,et al. Automatic program generation using sequent calculus , 1992, CSC '92.
[579] Mark Weiser,et al. Comparison of Structural Test Coverage Metrics , 1985, IEEE Software.
[580] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[581] Mahadev Satyanarayanan,et al. Disconnected Operation in the Coda File System , 1999, Mobidata.
[582] J. C. Huang. State Constraints and Pathwise Decomposition of Programs , 1990, IEEE Trans. Software Eng..
[583] Richard Gerber,et al. Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results , 1999, TOPL.
[584] William M. Goble,et al. Using Markov models for safety analysis of programmable electronic systems , 1995 .
[585] Audris Mockus,et al. Does Code Decay? Assessing the Evidence from Change Management Data , 2001, IEEE Trans. Software Eng..
[586] John C. Grundy,et al. Inconsistency Management for Multiple-View Software Development Environments , 1998, IEEE Trans. Software Eng..
[587] Inderpal S. Bhandari,et al. Orthogonal Defect Classification - A Concept for In-Process Measurements , 1992, IEEE Trans. Software Eng..
[588] A. K. Halder. Karnaugh map extended to six or more variables , 1982 .
[589] Masao Mukaidono,et al. A necessary and sufficient condition for Lukasiewicz logic functions , 1996, Proceedings of 26th IEEE International Symposium on Multiple-Valued Logic (ISMVL'96).
[590] Bernhard Thalheim,et al. Towards a theory of consistency enforcement , 1999, Acta Informatica.
[591] Jonathan S. Ostroff,et al. Formal methods for the specification and design of real-time safety critical systems , 1992, J. Syst. Softw..
[592] E. P. Schan,et al. Recommended C Style and Coding Standards , 1997 .
[593] Kishor S. Trivedi,et al. Modeling Correlation in Software Recovery Blocks , 1993, IEEE Trans. Software Eng..
[594] Bruno Tuffin,et al. Rare events, splitting, and quasi-Monte Carlo , 2007, TOMC.
[595] Bob Fields,et al. Comparing design options for allocating communication media in cooperative safety-critical contexts: a method and a case study , 1999, TCHI.
[596] Richard H. Thayer,et al. System and Software Requirements Engineering , 1994 .
[597] S. Louis Hakimi,et al. On Path Cover Problems in Digraphs and Applications to Program Testing , 1979, IEEE Transactions on Software Engineering.
[598] Rob J. Kusters,et al. Identification of factors that influence defect injection and detection in development of software intensive products , 2007, Inf. Softw. Technol..
[599] Paul J. Kühn,et al. The Feature and Service Interaction Problem in Telecommunications Systems. A Survey , 1998, IEEE Trans. Software Eng..
[600] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[601] James H. Morris,et al. Subgoal induction , 1977, CACM.
[602] Matthias Felleisen,et al. Program verification through soft typing , 1996, CSUR.
[603] Swapna S. Gokhale,et al. Effect of repair policies on software reliability , 1997, Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance.
[604] M. J. Reilly,et al. An investigation of the applicability of design of experiments to software testing , 2002, 27th Annual NASA Goddard/IEEE Software Engineering Workshop, 2002. Proceedings..
[605] Jiang Guo. Software reuse through re-engineering the legacy systems , 2003, Inf. Softw. Technol..
[606] Poong-Hyun Seong,et al. Experimental analysis of specification language diversity impact on NPP software diversity , 2002, J. Syst. Softw..
[607] Victor R. Basili,et al. A Pattern Recognition Approach for Software Engineering Data Analysis , 1992, IEEE Trans. Software Eng..
[608] Elaine J. Weyuker,et al. Predicting the location and number of faults in large software systems , 2005, IEEE Transactions on Software Engineering.
[609] Kishor S. Trivedi. SREPT: a tool for Software Reliability Estimation and Prediction , 2002, Proceedings International Conference on Dependable Systems and Networks.
[610] Mayuram S. Krishnan,et al. Measuring Process Consistency: Implications for Reducing Software Defects , 1999, IEEE Trans. Software Eng..
[611] David Gries,et al. The Science of Programming , 1981, Text and Monographs in Computer Science.
[612] Bev Littlewood,et al. Modeling software design diversity: a review , 2001, CSUR.
[613] Axel van Lamsweerde,et al. Handling Obstacles in Goal-Oriented Requirements Engineering , 2000, IEEE Trans. Software Eng..
[614] Chung-Horng Lung,et al. Applications of clustering techniques to software partitioning, recovery and restructuring , 2004, J. Syst. Softw..
[615] Martin P. Robillard,et al. Representing concerns in source code , 2007, TSEM.
[616] Jim Alves-Foss,et al. Hidden Implementation Dependencies in High Assurance and Critical Computing Systems , 2006, IEEE Transactions on Software Engineering.
[617] M. D. Hansen. Survey of available software-safety analysis techniques , 1989, Proceedings., Annual Reliability and Maintainability Symposium.
[618] Jules Desharnais,et al. Kleene under a Demonic Star , 2000, AMAST.
[619] Nancy G. Leveson,et al. Integrated safety analysis of requirements specifications , 2008, Requirements Engineering.
[620] Richard H. Carver,et al. Testing abstract distributed programs and their implementations: A constraint-based approach , 1996, J. Syst. Softw..
[621] Marcelo d'Amorim,et al. Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs , 2007, IEEE Transactions on Software Engineering.
[622] Yi Deng,et al. Formally analyzing software architectural specifications using SAM , 2004, J. Syst. Softw..
[623] Alexander L. Wolf,et al. Acm Sigsoft Software Engineering Notes Vol 17 No 4 Foundations for the Study of Software Architecture , 2022 .
[624] Chao Liu,et al. Test criteria for context-free grammars , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..
[625] W. Kent Fuchs,et al. Progressive retry for software error recovery in distributed systems , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[626] D. Prasad,et al. Dependability evaluation using a multi-criteria decision analysis procedure , 1999, Dependable Computing for Critical Applications 7.
[627] Sy-Yen Kuo,et al. Applying various learning curves to hyper-geometric distribution software reliability growth model , 1994, Proceedings of 1994 IEEE International Symposium on Software Reliability Engineering.
[628] John Parker,et al. Formal specification languages , 1986 .
[629] Z. Koono,et al. Structural Way of Thinking as Applied to Quality Assurance Management , 1990, IEEE J. Sel. Areas Commun..
[630] Jeffrey M. Voas,et al. Investigating rare-event failure tolerance: reductions in future uncertainty , 1996, Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No.96TB100076).
[631] Chyan-Goei Chung,et al. An enhanced zero-one optimal path set selection method , 1997, J. Syst. Softw..
[632] A. Jefferson Offutt,et al. Experimental results from an automatic test case generator , 1993, TSEM.
[633] Stephen Norman,et al. Software Testing Tools , 1993 .
[634] Paolo Tonella,et al. Using a Concept Lattice of Decomposition Slices for Program Understanding and Impact Analysis , 2003, IEEE Trans. Software Eng..
[635] Timothy Lindquist,et al. Synthesizing and integrating legacy components as services using adapters , 2006 .
[636] Gerald M. Weinberg,et al. Reviews, Walkthroughs, and Inspections , 1984, IEEE Transactions on Software Engineering.
[637] A. Finkelstein,et al. A comedy of errors: the London Ambulance Service case study , 1996, Proceedings of the 8th International Workshop on Software Specification and Design.
[638] Aditya P. Mathur,et al. Foundations of Software Testing , 2007 .
[639] Michael L. Fredman,et al. The AETG System: An Approach to Testing Based on Combinatiorial Design , 1997, IEEE Trans. Software Eng..
[640] Hong Zhu,et al. Software requirements validation via task analysis , 2002, J. Syst. Softw..
[641] William E. Howden,et al. Weak Mutation Testing and Completeness of Test Sets , 1982, IEEE Transactions on Software Engineering.
[642] Liba Svobodova. Performance monitoring in computer systems: a structured approach , 1981, OPSR.
[643] Robert M. Hierons. Comparing test sets and criteria in the presence of test hypotheses and fault domains , 2002, TSEM.
[644] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.
[645] Oded Berman,et al. Reliability analysis of communicating recovery blocks , 1998 .
[646] Sunghun Kim,et al. Memories of bug fixes , 2006, SIGSOFT '06/FSE-14.
[647] G. B. Finelli,et al. Real-time software failure characterization , 1990, Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security..
[648] Ravishankar K. Iyer,et al. Analysis of large system black-box test data , 1992, [1992] Proceedings Third International Symposium on Software Reliability Engineering.
[649] Dirk Beyer,et al. Efficient relational calculation for software analysis , 2005, IEEE Transactions on Software Engineering.
[650] Peter Wegner,et al. Computation beyond turing machines , 2003, CACM.
[651] Thomas W. Reps,et al. Undecidability of context-sensitive data-dependence analysis , 2000, TOPL.
[652] Henry Muccini,et al. Using software architecture for code testing , 2004, IEEE Transactions on Software Engineering.
[653] David Powell. Failure mode assumptions and assumption coverage , 1992 .
[654] Gregg Rothermel,et al. On test suite composition and cost-effective regression testing , 2004, TSEM.
[655] Jim Alves-Foss,et al. A multi-layered approach to security in high assurance systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[656] Henny B. Sipma,et al. Non-linear loop invariant generation using Gröbner bases , 2004, POPL.
[657] James M. Purtilo,et al. A pattern-based object-linking mechanism for component-based software development environments , 1996, J. Syst. Softw..
[658] Michal Young,et al. Towards scalable compositional analysis by refactoring design models , 2003, ESEC/FSE-11.
[659] Narasimhaiah Gorla,et al. Evaluation of process tools in systems analysis , 1995, Inf. Softw. Technol..
[660] D. Richard Kuhn,et al. Software fault interactions and implications for software testing , 2004, IEEE Transactions on Software Engineering.
[661] Patrick Cousot,et al. A static analyzer for large safety-critical software , 2003, PLDI.
[662] David Lee,et al. Principles and methods of testing finite state machines-a survey , 1996, Proc. IEEE.
[663] Sorin Lerner,et al. Automated soundness proofs for dataflow analyses and transformations via local rules , 2005, POPL '05.
[664] Elaine J. Weyuker,et al. Provable Improvements on Branch Testing , 1993, IEEE Trans. Software Eng..
[665] Nancy G. Leveson,et al. Safety Analysis Using Petri Nets , 1987, IEEE Transactions on Software Engineering.
[666] Nicholas C. K. Phillips. Safe Data Type Specifications , 1984, IEEE Transactions on Software Engineering.
[667] Kwangkeun Yi,et al. An uncaught exception analysis for Java , 2004, J. Syst. Softw..
[668] Martin von Mohrenschildt. Algebraic Composition of Function Tables , 2000, Formal Aspects of Computing.
[669] Austen Rainer,et al. A quantitative and qualitative analysis of factors affecting software processes , 2003, J. Syst. Softw..
[670] Zhi-Hua Zhou,et al. Using neural networks for fault diagnosis , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[671] L. Camarinopoulos,et al. Two formulas for computing the reliability of incomplete k-out-of-n:G systems , 1997 .
[672] Egon Börger,et al. Abstract State Machines , 2003 .
[673] Yuanyuan Zhou,et al. Rx: treating bugs as allergies---a safe method to survive software failures , 2005, SOSP '05.
[674] Bharat K. Bhargava,et al. Experimental evaluation of concurrent checkpointing and rollback-recovery algorithms , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.
[675] Jeff Tian,et al. Tool support for software measurement, analysis and improvement , 1997, J. Syst. Softw..
[676] Alexander Birman,et al. A Problem-Reduction Approach to Proving Simulation Between Programs , 1976, IEEE Transactions on Software Engineering.
[677] J. C. Huang. A New Verification Rule and Its Applications , 1980, IEEE Transactions on Software Engineering.
[678] Joseph Kee-Yin Ng,et al. Generating test cases from class vectors , 2003, J. Syst. Softw..
[679] Jane Cleland-Huang,et al. Goal-Centric Traceability: Using Virtual Plumblines to Maintain Critical Systemic Qualities , 2008, IEEE Transactions on Software Engineering.
[680] Thomas E. Royce,et al. A parallel algorithm for DNA alignment , 2003, CROS.
[681] R. W. Selby,et al. Empirically based analysis of failures in software systems , 1990 .
[682] Ingunn Myrtveit,et al. Reliability and validity in comparative studies of software prediction models , 2005, IEEE Transactions on Software Engineering.
[683] Edward N. Bachelder,et al. Describing and Probing Complex System Behavior: A Graphical Approach , 2001 .
[684] Angelo Gargantini,et al. Automated deductive requirements analysis of critical systems , 2001, TSEM.
[685] Panayiotis E. Pintelas,et al. Comparative study and categorization of high-level petri nets , 1998, J. Syst. Softw..
[686] Junfeng Yang,et al. An empirical study of operating systems errors , 2001, SOSP.
[687] Danny De Schreye,et al. Constraint-based termination analysis of logic programs , 1999, TOPL.
[688] Saurabh Sinha,et al. Analysis and Testing of Programs with Exception Handling Constructs , 2000, IEEE Trans. Software Eng..
[689] Ron Patton,et al. Software Testing , 2000 .
[690] Marek Vokác. Defect frequency and design patterns: an empirical study of industrial code , 2004, IEEE Transactions on Software Engineering.
[691] Barbara A. Kitchenham,et al. Critical review of quantitative assessment , 1994, Softw. Eng. J..
[692] Brian Henderson-Sellers,et al. A conceptual model of cognitive complexity of elements of the programming process , 1995, Inf. Softw. Technol..
[693] Laurie A. Williams,et al. On the value of static analysis for fault detection in software , 2006, IEEE Transactions on Software Engineering.
[694] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[695] Patrice Godefroid,et al. Dynamic partial-order reduction for model checking software , 2005, POPL '05.
[696] S.P. Levitt. C++: an evolving language , 2004, 2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590).
[697] Praerit Garg,et al. Investigating coverage-reliability relationship and sensitivity of reliability to errors in the operational profile , 1994, Proceedings of 1994 1st International Conference on Software Testing, Reliability and Quality Assurance (STRQA'94).
[698] Rajeev Alur,et al. Deciding Global Partial-Order Properties , 1998, Formal Methods Syst. Des..
[699] Alberto Pettorossi,et al. A theory of totally correct logic program transformations , 2004, PEPM '04.
[700] Kenneth A. Foster. Error Sensitive Test Cases Analysis (ESTCA) , 1980, IEEE Transactions on Software Engineering.
[701] Antonella Santone,et al. Heuristic Search + Local Model Checking in Selective mu-Calculus , 2003, IEEE Trans. Software Eng..
[702] Jiong Yang,et al. Discovering Neglected Conditions in Software by Mining Dependence Graphs , 2008, IEEE Transactions on Software Engineering.
[703] Alexander Egyed,et al. A Scenario-Driven Approach to Trace Dependency Analysis , 2003, IEEE Trans. Software Eng..
[704] A.M. Stavely. Verifying Definite Iteration Over Data Structures , 1995, IEEE Trans. Software Eng..
[705] Elaine J. Weyuker,et al. An Applicable Family of Data Flow Testing Criteria , 1988, IEEE Trans. Software Eng..
[706] Jeff Tian. Measurement and continuous improvement of software reliability throughout software life-cycle , 1999, J. Syst. Softw..
[707] Ajoy Kumar Datta,et al. Self-Stabilizing Algorithms in DAG Structured Networks , 1999, Parallel Process. Lett..
[708] Nancy G. Leveson,et al. The Consistent Comparison Problem in N-Version Software , 1989, IEEE Trans. Software Eng..
[709] Peter G. Neumann,et al. On hierarchical design of computer systems for critical applications , 1986, IEEE Transactions on Software Engineering.
[710] Kishor S. Trivedi,et al. Non-Markovian Petri nets , 1995, SIGMETRICS '95/PERFORMANCE '95.
[711] Salwa K. Abd-El-Hafiz,et al. A method for documenting code components , 1996, J. Syst. Softw..
[712] Nancy G. Leveson,et al. An Empirical Comparison of Software Fault Tolerance and Fault Elimination , 1991, IEEE Trans. Software Eng..
[713] Willard L. Miranker,et al. Computer arithmetic in theory and practice , 1981, Computer science and applied mathematics.
[714] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[715] Yinong Chen. Modelling software operational reliability via input domain-based reliability growth model , 1998, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224).
[716] Michael R. Lyu,et al. Applying reliability models more effectively (software) , 1992, IEEE Software.
[717] Ivan A. Sag,et al. Syntactic Theory: A Formal Introduction , 1999, Computational Linguistics.
[718] Chao Liu,et al. A Systematic Study of Failure Proximity , 2008, IEEE Transactions on Software Engineering.
[719] Pavel Naumov,et al. Logic of subtyping , 2006, Theor. Comput. Sci..
[720] Danny De Schreye,et al. Termination proofs for logic programs with tabling , 2001, TOCL.
[721] Khaled El Emam,et al. The repeatability of code defect classifications , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).
[722] Rutger M. Dijkstra. Computation calculus bridging a formalization gap , 2000, Sci. Comput. Program..
[723] Art Lew. On the emulation of flowcharts by decision tables , 1982, CACM.
[724] Lanfranco Lopriore,et al. Abstraction Mechanisms for Event Control in Program Debugging , 1989, IEEE Trans. Software Eng..
[725] Richard G. Hamlet,et al. Partition Testing Does Not Inspire Confidence , 1990, IEEE Trans. Software Eng..
[726] Cormac Flanagan,et al. Predicate abstraction for software verification , 2002, POPL '02.
[727] Shanker Sanyal,et al. Defect tracking and reliability modeling for a new product release , 1992, CASCON.
[728] John C. Cherniavsky,et al. Validation, Verification, and Testing of Computer Software , 1982, CSUR.
[729] Elaine J. Weyuker,et al. Testing software to detect and reduce risk , 2000, J. Syst. Softw..
[730] Chadd C. Williams,et al. Automatic mining of source code repositories to improve bug finding techniques , 2005, IEEE Transactions on Software Engineering.
[731] Qinbao Song,et al. Software defect association mining and defect correction effort prediction , 2006 .
[732] Audris Mockus,et al. Understanding the sources of variation in software inspections , 1998, TSEM.
[733] Madeline Diep,et al. Profiling deployed software: assessing strategies and testing opportunities , 2005, IEEE Transactions on Software Engineering.
[734] Ming Zhao,et al. A comparison between software design and code metrics for the prediction of software fault content , 1998, Inf. Softw. Technol..
[735] F. A. van der Duyn Schouten,et al. Modelling the influence of preventive maintenance on protection system reliability performance , 1998 .
[736] Jeffrey D. Ullman,et al. Analysis of a simple algorithm for global data flow problems , 1973, POPL.
[737] Patrick Cousot,et al. Types as abstract interpretations , 1997, POPL '97.
[738] H. Lewis Chau,et al. Algorithms for Constructing Minimal Deduction Graphs , 1989, IEEE Trans. Software Eng..
[739] Nancy G. Leveson,et al. Software Deviation Analysis , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[740] P. Boland,et al. Component redundancy vs system redundancy in the hazard rate ordering , 1995 .
[741] Lee J. White,et al. Experiments determining best paths for testing computer program predicates , 1985, ICSE '85.
[742] Yves Deville,et al. Automatic test data generation for programs with integer and float variables , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[743] Rami G. Melhem,et al. A Nonpreemptive Real-Time Scheduler with Recovery from Transient Faults and Its Implementation , 2003, IEEE Trans. Software Eng..
[744] Yanping Chen,et al. Effective test metrics for test strategy evolution , 2004, CASCON.
[745] Peter G. Neumann. Illustrative risks to the public in the use of computer systems and related technology , 1992, SOEN.
[746] Robyn R. Lutz. Targeting safety-related errors during software requirements analysis , 1993, SIGSOFT '93.
[747] Shmuel Katz,et al. A superimposition control construct for distributed systems , 1993, TOPL.
[748] Mladen A. Vouk,et al. Some issues in multi-phase software reliability modeling , 1993, CASCON.
[749] Hareton K. N. Leung. Selective regression testing - assumptions and fault detecting ability , 1995, Inf. Softw. Technol..
[750] Norman F. Schneidewind,et al. An Experiment in Software Error Data Collection and Analysis , 1979, IEEE Transactions on Software Engineering.
[751] Yuanyuan Zhou,et al. CP-Miner: finding copy-paste and related bugs in large-scale software code , 2006, IEEE Transactions on Software Engineering.
[752] Marc Eisenstadt,et al. My hairiest bug war stories , 1997, CACM.
[753] Ian G. Harris,et al. A domain coverage metric for the validation of behavioral VHDL descriptions , 2000, Proceedings International Test Conference 2000 (IEEE Cat. No.00CH37159).
[754] Tsong Yueh Chen,et al. Test case selection with and without replacement , 2000, Inf. Sci..
[755] Neeraj Suri,et al. PROPANE: an environment for examining the propagation of errors in software , 2002, ISSTA '02.
[756] A. Jefferson Offutt,et al. Investigations of the software testing coupling effect , 1992, TSEM.