Reliability and Integrity of Large Computer Programs

Abstract : The report discusses the reliability and correctness of computer programs. Methods for decreasing costs, increasing efficiency, improving security, and testing of large computer programs are presented.

[1]  Harold Sackman,et al.  Man-computer problem solving , 1970 .

[2]  Karl N. Levitt,et al.  Greatest Common Divisor of n Integers and Multipliers (Certification of Algorithm 386) , 1973, Commun. ACM.

[3]  Barbara Liskov,et al.  The Proof of Correctness Approach to Reliable Systems. , 1971 .

[4]  C. V. Ramamoorthy Fault-Tolerant Computing: An Introduction and an Overview , 1971, IEEE Transactions on Computers.

[5]  B. Randell,et al.  Software Engineering Techniques: Report of a conference sponsored by the NATO Science Committee, Rome, Italy, 27-31 Oct. 1969, Brussels, Scientific Affairs Division, NATO , 1970 .

[6]  John McCarthy,et al.  Correctness of a compiler for arithmetic expressions , 1966 .

[7]  Rein Turn,et al.  Privacy and Security in Databank Systems , 1974 .

[8]  F. T. Baker,et al.  Chief Programmer Team Management of Production Programming , 1972, IBM Syst. J..

[9]  Barbara Liskov The design of the Venus operating system , 1972, CACM.

[10]  D. L. Parnas,et al.  On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.

[11]  Barry R. Borgerson,et al.  PRIME: a modular architecture for terminal-oriented systems , 1972, AFIPS '72 (Spring).

[12]  Robert S. Fabry Dynamic verification of operating system decisions , 1973, CACM.

[13]  Robert A. Kelley APLGOL, an Experimental Structured Programming Language , 1973, IBM J. Res. Dev..

[14]  John McCarthy,et al.  A BASIS FOR A MATHEMATICAL THEORY OF COMPUTATION 1) , 2018 .

[15]  Clark Weissman,et al.  Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).

[16]  Barbara Liskov,et al.  A design methodology for reliable software systems , 1972, AFIPS '72 (Fall, part I).

[17]  Corrado Böhm,et al.  Flow diagrams, turing machines and languages with only two formation rules , 1966, CACM.

[18]  Robert W. Floyd,et al.  Notes on Avoiding "go to" Statements , 1971, Information Processing Letters.

[19]  Rein Turn,et al.  Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions , 1972, AFIPS '72 (Fall, part I).

[20]  Stuart E. Madnick,et al.  A modular approach to file system design , 1969, AFIPS '69 (Spring).

[21]  F. T. Baker,et al.  System quality through structured programming , 1899, AFIPS '72 (Fall, part I).

[22]  Theodore A. Linden,et al.  A summary of progress toward proving program correctness , 1899, AFIPS '72 (Fall, part I).

[23]  Edsger W. Dijkstra,et al.  Structured programming , 1972, A.P.I.C. Studies in data processing.

[24]  Donald E. Knuth,et al.  An empirical study of FORTRAN programs , 1971, Softw. Pract. Exp..

[25]  Zohar Manna,et al.  The Translation of 'Go To' Programs to 'While' Programs , 1971, IFIP Congress.

[26]  C. V. Ramamoorthy,et al.  Computer Diagnosis Using the Blocking Gate Approach , 1971, IEEE Transactions on Computers.

[27]  C. V. Ramamoorthy,et al.  A structural theory of machine diagnosis , 1899, AFIPS '67 (Spring).

[28]  David Lorge Parnas,et al.  A technique for software module specification with examples , 1972, CACM.

[29]  William A. Wulf,et al.  BLISS: a language for systems programming , 1971, CACM.

[30]  CHITOOR V. RAMAMOORTHY,et al.  System Segmentation for the Parallel Diagnosis of Computers , 1971, IEEE Transactions on Computers.

[31]  John R. Brown,et al.  Evaluating the effectiveness of software verification: pratical experience with an automated tool , 1972, AFIPS '72 (Fall, part I).

[32]  Zohar Manna,et al.  Properties of Programs and the First-Order Predicate Calculus , 1969, JACM.

[33]  Peter Naur Proof of Algorithms by General Snapshots , 1966 .

[34]  Edsger W. Dijkstra,et al.  Letters to the editor: go to statement considered harmful , 1968, CACM.

[35]  H. E. Petersen,et al.  System implications of information privacy , 1899, AFIPS '67 (Spring).

[36]  John McCarthy,et al.  Towards a Mathematical Science of Computation , 1962, IFIP Congress.

[37]  Donald Irvin Good,et al.  Toward a man-machine system for proving program correctness , 1970 .

[38]  Gerald M. Weinberg,et al.  Psychology of computer programming , 1971 .

[39]  Norman,et al.  Structural Models: An Introduction to the Theory of Directed Graphs. , 1966 .

[40]  C. V. Ramamoorthy,et al.  A Study in Software Reliability and Evaluation. , 1973 .

[41]  Karl N. Levitt,et al.  Software Reliability , 1971, Computer.

[42]  C. V. Ramamoorthy,et al.  Privacy and Security in Data Banks , 1970 .

[43]  Dennie Van Tassel,et al.  Computer security management , 1972 .

[44]  C. V. Ramamoorthy,et al.  Analysis of Graphs by Connectivity Considerations , 1966, J. ACM.

[45]  Barry W. Boehm SOME INFORMATION PROCESSING IMPLICATIONS OF AIR FORCE SPACE MISSIONS: 1970-1980 , 1970 .

[46]  ZOHAR MANNA,et al.  The Correctness of Programs , 1969, J. Comput. Syst. Sci..

[47]  James C. King,et al.  A Program Verifier , 1971, IFIP Congress.

[48]  Zohar Manna,et al.  Toward automatic program synthesis , 1971, Symposium on Semantics of Algorithmic Languages.