The 17th NCSC abstract: Belief in Correctness

[1]  Nancy G. Leveson,et al.  High-pressure steam engines and computer software , 1992, Computer.

[2]  Mark C. Paulk,et al.  Capability Maturity Model for Software, Version 1.1 , 1993 .

[3]  C. Hoare,et al.  Mathematics of Programming , 1993 .

[4]  G. B. Finelli,et al.  The Infeasibility of Quantifying the Reliability of Life-Critical Real-Time Software , 1993, IEEE Trans. Software Eng..

[5]  John C. Knight,et al.  Preliminary Experience Using Z to Specify a Safety-Critical System , 1992, Z User Workshop.

[6]  Victor R. Basili,et al.  A reference architecture for the component factory , 1992, TSEM.

[7]  Elaine J. Weyuker,et al.  Comparison of program testing strategies , 1991, TAV4.

[8]  Marvin V. Zelkowitz,et al.  A functional correctness model of program verification , 1990, Computer.

[9]  David Lorge Parnas,et al.  Evaluation of safety-critical software , 1990, CACM.

[10]  Bill Brykczynski,et al.  SDS (strategic defense system) software testing and evaluation: A review of the state-of-the-art in software testing and evaluation with recommended R D (research and development) tasks. Final report , 1989 .

[11]  James H. Fetzer Program verification: the very idea , 1988, CACM.

[12]  Barry W. Boehm,et al.  A spiral model of software development and enhancement , 1986, Computer.

[13]  Frederick P. Brooks,et al.  No Silver Bullet: Essence and Accidents of Software Engineering , 1987 .

[14]  Elaine J. Weyuker,et al.  Axiomatizing software test data adequacy , 1986, IEEE Transactions on Software Engineering.

[15]  Henry Petroski,et al.  To Engineer Is Human: The Role of Failure in Successful Design , 1986 .

[16]  David Lorge Parnas,et al.  Software aspects of strategic defense systems , 1985, CACM.

[17]  C. A. R. Hoare,et al.  An axiomatic basis for computer programming , 1969, CACM.

[18]  M. Abrams,et al.  Special Feature: A Taxonomy for Valid Test Workload Generation , 1979, Computer.

[19]  Richard J. Lipton,et al.  Social processes and proofs of theorems and programs , 1977, POPL.

[20]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[21]  S. L. Gerhart,et al.  Toward a theory of test data selection , 1975, IEEE Transactions on Software Engineering.

[22]  R. Hamming,et al.  Numerical Methods for Scientists and Engineers , 1962 .