Abstraction Techniques in Modern Programming Languages

Modern Programming languages depend on abstraction: they manage complexity by emphazing what is significant to the user and suppressing what is not.

[1]  Tony Hoare,et al.  Hierarchical Program Structures , 1972 .

[2]  Kathryn L. Heninger Specifying Software Requirements for Complex Systems: New Techniques and Their Application , 2001, IEEE Transactions on Software Engineering.

[3]  W. Wulf,et al.  Fundamental Structures of Computer Science , 1980 .

[4]  Professor Dr. Niklaus Wirth,et al.  Programming in Modula-2 , 1982, Springer Berlin Heidelberg.

[5]  Niklaus Wirth,et al.  Program development by stepwise refinement , 1971, CACM.

[6]  James J. Horning,et al.  Formal specification as a design tool , 1980, POPL '80.

[7]  W. F. Burger,et al.  Gypsy: A language for specification and implementation of verifiable programs , 1977, Language Design for Reliable Software.

[8]  Butler W. Lampson,et al.  Proof rules for the programming language Euclid , 1978, Acta Informatica.

[9]  Craig Schaffert,et al.  Abstraction mechanisms in CLU , 1977, Commun. ACM.

[10]  Donald I. Good Constructing verified and reliable communications processing systems , 1977, SOEN.

[11]  Mary Shaw,et al.  An introduction to the construction and verification of Alphard programs , 1976, ICSE '76.

[12]  Stephen A. Schuman,et al.  Proceedings of the international symposium on Extensible languages , 1971 .

[13]  Mary Shaw,et al.  Toward relaxing assumptions in languages and their implementations , 1980, SIGP.

[14]  J.B. Goodenough,et al.  Software quality assurance: Testing and validation , 1980, Proceedings of the IEEE.

[15]  P. Zave,et al.  Specifying software requirements , 1980, Proceedings of the IEEE.

[16]  Jonathan K. Millen,et al.  Security Kernel validation in practice , 1976, CACM.

[17]  James H. Morris,et al.  Types are not sets , 1973, POPL.

[18]  Stephen N. Zilles,et al.  Specification techniques for data abstractions , 1975 .

[19]  Mary Shaw,et al.  Global variable considered harmful , 1973, SIGP.

[20]  James H. Morris,et al.  Early experience with Mesa , 1977 .

[21]  Ellis Horowitz,et al.  Abstract data types and software validation , 1978, CACM.

[22]  Lyle Harold Ramshaw,et al.  Formalizing the analysis of algorithms , 1979 .

[23]  Per Brinch Hansen,et al.  The programming language Concurrent Pascal , 1975, IEEE Transactions on Software Engineering.

[24]  Alan J. Demers,et al.  Data types, parameters and type checking , 1980, POPL '80.

[25]  J. N. Buxton,et al.  Software engineering techniques , 1970 .

[26]  Kenneth L. Bowles Microcomputer Problem Solving Using Pascal , 1977 .

[27]  Brad J. Cox Message/Object Programming: An Evolutionary Change in Programming Technology , 1984, IEEE Software.

[28]  Edsger W. Dijkstra,et al.  Go To Statement Considered Harmful , 2022, Software Pioneers.

[29]  Ralph L. London,et al.  A view of program verification , 1975, Reliable Software.

[30]  Mary Shaw Alphard: Form and Content , 1981, Springer New York.

[31]  Lawrence Yelowitz,et al.  Observations of Fallibility in Applications of Modern Programming Methodologies , 1976, IEEE Transactions on Software Engineering.

[32]  Barbara Liskov,et al.  An Access Control Facility for Programming Languages , 1976 .

[33]  C. A. R. Hoare,et al.  An Axiomatic Definition of the Programming Language PASCAL , 1973, Acta Informatica.

[34]  Mary Shaw,et al.  A formal system for specifying and verifying program performance , 1979 .

[35]  D. L. Parnas,et al.  On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.

[36]  J. J. Horning,et al.  Report on the programming language Euclid , 1977, SIGP.

[37]  Mary Shaw,et al.  An Alphard Specification of a Correct and Efficient Transformation on Data Structures , 1980, IEEE Transactions on Software Engineering.

[38]  David Lorge Parnas,et al.  A technique for software module specification with examples , 1972, CACM.

[39]  Edsger W. Dijkstra,et al.  Letters to the editor: go to statement considered harmful , 1968, CACM.

[40]  Brian Randell,et al.  Report on a conference sponsored by the NATO Science Committee , 1968 .

[41]  Warren Teitelman A Tour Through Cedar , 1984, IEEE Softw..

[42]  Richard A. Kemmerer,et al.  Specification and verification of the UCLA Unix security kernel , 1979, CACM.

[43]  J. Goldberg,et al.  SIFT: Design and analysis of a fault-tolerant computer for aircraft control , 1978, Proceedings of the IEEE.

[44]  James H. Morris Protection in programming languages , 1973, CACM.

[45]  Henry Ledgard,et al.  Reference Manual for the ADA® Programming Language , 1983, Springer New York.

[46]  James J. Horning,et al.  An Introduction to the Larch Shared Language , 1983, IFIP Congress.

[47]  John V. Guttag,et al.  Notes on Type Abstraction (Version 2) , 1980, IEEE Transactions on Software Engineering.