Abstraction Techniques in Modern Programming Languages
暂无分享,去创建一个
[1] Tony Hoare,et al. Hierarchical Program Structures , 1972 .
[2] Kathryn L. Heninger. Specifying Software Requirements for Complex Systems: New Techniques and Their Application , 2001, IEEE Transactions on Software Engineering.
[3] W. Wulf,et al. Fundamental Structures of Computer Science , 1980 .
[4] Professor Dr. Niklaus Wirth,et al. Programming in Modula-2 , 1982, Springer Berlin Heidelberg.
[5] Niklaus Wirth,et al. Program development by stepwise refinement , 1971, CACM.
[6] James J. Horning,et al. Formal specification as a design tool , 1980, POPL '80.
[7] W. F. Burger,et al. Gypsy: A language for specification and implementation of verifiable programs , 1977, Language Design for Reliable Software.
[8] Butler W. Lampson,et al. Proof rules for the programming language Euclid , 1978, Acta Informatica.
[9] Craig Schaffert,et al. Abstraction mechanisms in CLU , 1977, Commun. ACM.
[10] Donald I. Good. Constructing verified and reliable communications processing systems , 1977, SOEN.
[11] Mary Shaw,et al. An introduction to the construction and verification of Alphard programs , 1976, ICSE '76.
[12] Stephen A. Schuman,et al. Proceedings of the international symposium on Extensible languages , 1971 .
[13] Mary Shaw,et al. Toward relaxing assumptions in languages and their implementations , 1980, SIGP.
[14] J.B. Goodenough,et al. Software quality assurance: Testing and validation , 1980, Proceedings of the IEEE.
[15] P. Zave,et al. Specifying software requirements , 1980, Proceedings of the IEEE.
[16] Jonathan K. Millen,et al. Security Kernel validation in practice , 1976, CACM.
[17] James H. Morris,et al. Types are not sets , 1973, POPL.
[18] Stephen N. Zilles,et al. Specification techniques for data abstractions , 1975 .
[19] Mary Shaw,et al. Global variable considered harmful , 1973, SIGP.
[20] James H. Morris,et al. Early experience with Mesa , 1977 .
[21] Ellis Horowitz,et al. Abstract data types and software validation , 1978, CACM.
[22] Lyle Harold Ramshaw,et al. Formalizing the analysis of algorithms , 1979 .
[23] Per Brinch Hansen,et al. The programming language Concurrent Pascal , 1975, IEEE Transactions on Software Engineering.
[24] Alan J. Demers,et al. Data types, parameters and type checking , 1980, POPL '80.
[25] J. N. Buxton,et al. Software engineering techniques , 1970 .
[26] Kenneth L. Bowles. Microcomputer Problem Solving Using Pascal , 1977 .
[27] Brad J. Cox. Message/Object Programming: An Evolutionary Change in Programming Technology , 1984, IEEE Software.
[28] Edsger W. Dijkstra,et al. Go To Statement Considered Harmful , 2022, Software Pioneers.
[29] Ralph L. London,et al. A view of program verification , 1975, Reliable Software.
[30] Mary Shaw. Alphard: Form and Content , 1981, Springer New York.
[31] Lawrence Yelowitz,et al. Observations of Fallibility in Applications of Modern Programming Methodologies , 1976, IEEE Transactions on Software Engineering.
[32] Barbara Liskov,et al. An Access Control Facility for Programming Languages , 1976 .
[33] C. A. R. Hoare,et al. An Axiomatic Definition of the Programming Language PASCAL , 1973, Acta Informatica.
[34] Mary Shaw,et al. A formal system for specifying and verifying program performance , 1979 .
[35] D. L. Parnas,et al. On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.
[36] J. J. Horning,et al. Report on the programming language Euclid , 1977, SIGP.
[37] Mary Shaw,et al. An Alphard Specification of a Correct and Efficient Transformation on Data Structures , 1980, IEEE Transactions on Software Engineering.
[38] David Lorge Parnas,et al. A technique for software module specification with examples , 1972, CACM.
[39] Edsger W. Dijkstra,et al. Letters to the editor: go to statement considered harmful , 1968, CACM.
[40] Brian Randell,et al. Report on a conference sponsored by the NATO Science Committee , 1968 .
[41] Warren Teitelman. A Tour Through Cedar , 1984, IEEE Softw..
[42] Richard A. Kemmerer,et al. Specification and verification of the UCLA Unix security kernel , 1979, CACM.
[43] J. Goldberg,et al. SIFT: Design and analysis of a fault-tolerant computer for aircraft control , 1978, Proceedings of the IEEE.
[44] James H. Morris. Protection in programming languages , 1973, CACM.
[45] Henry Ledgard,et al. Reference Manual for the ADA® Programming Language , 1983, Springer New York.
[46] James J. Horning,et al. An Introduction to the Larch Shared Language , 1983, IFIP Congress.
[47] John V. Guttag,et al. Notes on Type Abstraction (Version 2) , 1980, IEEE Transactions on Software Engineering.