Assurance in high-integrity software
暂无分享,去创建一个
[1] James W. Freeman,et al. Structuring Systems for Formal Verification , 1985, 1985 IEEE Symposium on Security and Privacy.
[2] Donald I. Good,et al. Mechanical proofs about computer programs , 1984, Philosophical Transactions of the Royal Society of London. Series A, Mathematical and Physical Sciences.
[3] Bev Littlewood,et al. Evaluation of competing software reliability predictions , 1986, IEEE Transactions on Software Engineering.
[4] Brian David Bramson. Malvern's program analysers , 1985 .
[5] Aloysius K. Mok,et al. Safety analysis of timing properties in real-time systems , 1986, IEEE Transactions on Software Engineering.
[6] Cliff B. Jones,et al. Systematic software development using VDM , 1986, Prentice Hall International Series in Computer Science.
[7] Andrew F. Monk,et al. Mode Errors: A User-Centered Analysis and Some Preventative Measures Using Keying-Contingent Sound , 1986, Int. J. Man Mach. Stud..
[8] Peter G. Bishop,et al. PODS — A project on diverse software , 1986, IEEE Transactions on Software Engineering.
[9] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[10] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.
[11] William B. Rouse,et al. Human-Computer Interaction in the Control of Dynamic Systems , 1981, CSUR.
[12] Peter Checkland,et al. Systems Thinking, Systems Practice , 1981 .
[13] Donald A. Norman,et al. Four stages of user activities , 1984 .
[14] Harold W. Thimbleby,et al. Interaction Models and the Principled Design of Interactive Systems , 1987, ESEC.
[15] Nancy G. Leveson,et al. Analyzing Software Safety , 1983, IEEE Transactions on Software Engineering.
[16] B. A. Sheil,et al. The Psychological Study of Programming , 1981, CSUR.
[17] John McDermid,et al. Life cycle support in the Ada environment , 1983, ALET.
[18] Claude E. Walston,et al. A Method of Programming Measurement and Estimation , 1977, IBM Syst. J..
[19] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[20] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[21] Brian Randell,et al. A Distributed Secure System , 1983, 1983 IEEE Symposium on Security and Privacy.
[22] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[23] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[24] Martin R. Woodward,et al. Experience with Path Analysis and Testing of Programs , 1980, IEEE Transactions on Software Engineering.