Reliability and Integrity of Large Computer Programs
暂无分享,去创建一个
[1] Harold Sackman,et al. Man-computer problem solving , 1970 .
[2] Karl N. Levitt,et al. Greatest Common Divisor of n Integers and Multipliers (Certification of Algorithm 386) , 1973, Commun. ACM.
[3] Barbara Liskov,et al. The Proof of Correctness Approach to Reliable Systems. , 1971 .
[4] C. V. Ramamoorthy. Fault-Tolerant Computing: An Introduction and an Overview , 1971, IEEE Transactions on Computers.
[5] B. Randell,et al. Software Engineering Techniques: Report of a conference sponsored by the NATO Science Committee, Rome, Italy, 27-31 Oct. 1969, Brussels, Scientific Affairs Division, NATO , 1970 .
[6] John McCarthy,et al. Correctness of a compiler for arithmetic expressions , 1966 .
[7] Rein Turn,et al. Privacy and Security in Databank Systems , 1974 .
[8] F. T. Baker,et al. Chief Programmer Team Management of Production Programming , 1972, IBM Syst. J..
[9] Barbara Liskov. The design of the Venus operating system , 1972, CACM.
[10] D. L. Parnas,et al. On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.
[11] Barry R. Borgerson,et al. PRIME: a modular architecture for terminal-oriented systems , 1972, AFIPS '72 (Spring).
[12] Robert S. Fabry. Dynamic verification of operating system decisions , 1973, CACM.
[13] Robert A. Kelley. APLGOL, an Experimental Structured Programming Language , 1973, IBM J. Res. Dev..
[14] John McCarthy,et al. A BASIS FOR A MATHEMATICAL THEORY OF COMPUTATION 1) , 2018 .
[15] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[16] Barbara Liskov,et al. A design methodology for reliable software systems , 1972, AFIPS '72 (Fall, part I).
[17] Corrado Böhm,et al. Flow diagrams, turing machines and languages with only two formation rules , 1966, CACM.
[18] Robert W. Floyd,et al. Notes on Avoiding "go to" Statements , 1971, Information Processing Letters.
[19] Rein Turn,et al. Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions , 1972, AFIPS '72 (Fall, part I).
[20] Stuart E. Madnick,et al. A modular approach to file system design , 1969, AFIPS '69 (Spring).
[21] F. T. Baker,et al. System quality through structured programming , 1899, AFIPS '72 (Fall, part I).
[22] Theodore A. Linden,et al. A summary of progress toward proving program correctness , 1899, AFIPS '72 (Fall, part I).
[23] Edsger W. Dijkstra,et al. Structured programming , 1972, A.P.I.C. Studies in data processing.
[24] Donald E. Knuth,et al. An empirical study of FORTRAN programs , 1971, Softw. Pract. Exp..
[25] Zohar Manna,et al. The Translation of 'Go To' Programs to 'While' Programs , 1971, IFIP Congress.
[26] C. V. Ramamoorthy,et al. Computer Diagnosis Using the Blocking Gate Approach , 1971, IEEE Transactions on Computers.
[27] C. V. Ramamoorthy,et al. A structural theory of machine diagnosis , 1899, AFIPS '67 (Spring).
[28] David Lorge Parnas,et al. A technique for software module specification with examples , 1972, CACM.
[29] William A. Wulf,et al. BLISS: a language for systems programming , 1971, CACM.
[30] CHITOOR V. RAMAMOORTHY,et al. System Segmentation for the Parallel Diagnosis of Computers , 1971, IEEE Transactions on Computers.
[31] John R. Brown,et al. Evaluating the effectiveness of software verification: pratical experience with an automated tool , 1972, AFIPS '72 (Fall, part I).
[32] Zohar Manna,et al. Properties of Programs and the First-Order Predicate Calculus , 1969, JACM.
[33] Peter Naur. Proof of Algorithms by General Snapshots , 1966 .
[34] Edsger W. Dijkstra,et al. Letters to the editor: go to statement considered harmful , 1968, CACM.
[35] H. E. Petersen,et al. System implications of information privacy , 1899, AFIPS '67 (Spring).
[36] John McCarthy,et al. Towards a Mathematical Science of Computation , 1962, IFIP Congress.
[37] Donald Irvin Good,et al. Toward a man-machine system for proving program correctness , 1970 .
[38] Gerald M. Weinberg,et al. Psychology of computer programming , 1971 .
[39] Norman,et al. Structural Models: An Introduction to the Theory of Directed Graphs. , 1966 .
[40] C. V. Ramamoorthy,et al. A Study in Software Reliability and Evaluation. , 1973 .
[41] Karl N. Levitt,et al. Software Reliability , 1971, Computer.
[42] C. V. Ramamoorthy,et al. Privacy and Security in Data Banks , 1970 .
[43] Dennie Van Tassel,et al. Computer security management , 1972 .
[44] C. V. Ramamoorthy,et al. Analysis of Graphs by Connectivity Considerations , 1966, J. ACM.
[45] Barry W. Boehm. SOME INFORMATION PROCESSING IMPLICATIONS OF AIR FORCE SPACE MISSIONS: 1970-1980 , 1970 .
[46] ZOHAR MANNA,et al. The Correctness of Programs , 1969, J. Comput. Syst. Sci..
[47] James C. King,et al. A Program Verifier , 1971, IFIP Congress.
[48] Zohar Manna,et al. Toward automatic program synthesis , 1971, Symposium on Semantics of Algorithmic Languages.