Topic: IEEE references

topic root > Group: all references

all references
help with quotations
ACM references a-e
ACM references f-l
ACM references m-z
John Wiley references


About 570 references are published by the Institute of Electrical and Electronics Engineers (IEEE).
Quotes: up

QuoteRef: abadDJ2_2012 ;;Abadi, D.J., Consistency tradeoffs in modern distributed database system design
QuoteRef: abadM1_1996 ;;Abadi, M., Needham, R., Prudent engineering practice for cryptographic protocols
QuoteRef: abdaM12_1998 ;;Abdallah, M. et al., One-phase commit: Does it make sense
QuoteRef: abdeKA1_1994 ;;Abdel-Ghaffar, K.A.S., El Abbadi, A., An optimal strategy for comparing file copies
QuoteRef: ackeMS6_1996 ;;Ackerman, M.S., Starr, B., Social activity indicators for groupware
QuoteRef: adamKA7_1983 ;;Adams, K.A., Halasz, I.M., 25 ways to improve software user manuals
QuoteRef: adveSV5_1990 ;;Adve, S.V., Hill, M.D., Weak ordering -- a new definition [NewQuotes]
QuoteRef: adveSV12_1996 ;;Adve, S.V., Gharachorloo, K., Shared memory models: a tutorial
QuoteRef: ahmeR12_1991 ;;Ahmed, R. et al., The Pegasus heterogeneous multidatabase system
QuoteRef: ahnY7_2014 ;;Ahn, Y. et al., Monitoring translation lookahead buffers to detect code injection attacks
QuoteRef: aikeH11_1937 ;;Aiken, H., Proposed automatic calculating machine [NewQuotes]
QuoteRef: albrAJ11_1983 ;;Albrecht, A.J., Gaffney, J.E., Jr., Software function, source lines of code, and development effort prediction: A software science validation
QuoteRef: alexC9_1999 ;;Alexander, C., The origins of pattern theory
QuoteRef: alexRT1_2000 ;;Alexander, R.T. et al., Coping with Java programming stress
QuoteRef: alluY7_2017 ;;Allu, Y. et al., Backup to the future: how workload and hardware changes continually redefine data domain file systems
QuoteRef: alurR12_1993 ;;Alur, R., Taubenfeld, G., How to share an object: a fast timing-based solution
QuoteRef: amblSW5_2007 ;;Ambler, S.W., Test-driven development of relational databases
QuoteRef: amzaC2_1996 ;;Amza, C. et al., TreadMarks: shared memory computing on networks of workstations
QuoteRef: andaBC5_2009 ;;Anda, B.C.D. et al., Variability and reproducibility in software engineering: A study of four companies that developed the same system
QuoteRef: andeRJ5_1996 ;;Anderson, R.J., Bezuidenhoudt, S.J., On the reliability of electronic payment systems
QuoteRef: atkiDL7_2002 ;;Atkins, D.L. et al., Using version control data to evaluate the impact of software tools: A case study of the version editor
QuoteRef: atleJM1_1993 ;;Atlee, J.M., Gannon, J., State-based model checking of event-driven system requirements
QuoteRef: auguJ10_2015 ;;Augustine, J. et al., Enabling robust and efficient distributed computation in dynamic peer-to-peer networks
QuoteRef: austRD10_1999 ;;Austin, R.D., The phantom menace
QuoteRef: babeRL6_1985 ;;Baber, R.L., I/O statements in higher programming languages: unnecessary and undesirable
QuoteRef: bachFH7_2013 ;;Bachmann, F.H. et al., Integrate end to end early and often
QuoteRef: badgL5_1995 ;;Badger, L. et al., Practical domain and type enforcement for UNIX
QuoteRef: baerJL5_1989 ;;Baer, J.-L., Lin, Y.-B., Improving quicksort performance with a codeword data structure
QuoteRef: baezR9_1998 ;;Baeza-Yates, R., Navarro, G., Fast approximate string matching in a dictionary
QuoteRef: bahnH6_2002 ;;Bahn, H. et al., Efficient replacement of nonuniform objects in web caches
QuoteRef: baksA3_2016 ;;Baksa, A. et al., Software on a comet: the Philae Lander's central onboard computer [NewQuotes]
QuoteRef: balaA7_2018 ;;Balazs, A., A comet revisited: lessons learned from Philae's landing [NewQuotes]
QuoteRef: balkB10_2000 ;;Balkenhol, B., Kurtz, S., Universal data compression based on the Burrows-Wheeler transformation: theory and practice
QuoteRef: ballT12_1996 ;;Ball, T., Larus, J.R., Efficient path profiling
QuoteRef: ballT7_2000 ;;Ball, T., Larus, J.R., Using paths to measure, explain, and enhance program behavior
QuoteRef: ballT5_2011 ;;Ball, T. et al., Predictable and progressive testing of multithreaded code
QuoteRef: balzRM3_1978 ;;Balzer, R.M. et al., Informality in program specifications
QuoteRef: barbLA8_2022 ;;Barba, L.A., Defining the role of open source software in research reproducibility [NewQuotes]
QuoteRef: barbME7_1983 ;;Barber, M.E., PARSLEY: A new compiler-compiler
QuoteRef: baroAJ3_1982 ;;Baroody, A.J. Jr., DeWitt, D.J., The impact of run-time schema interpretation in a network data model DBMS
QuoteRef: barrLA3_2003 ;;Barroso, L.A. et al., Web search for a planet: the Google cluster architecture
QuoteRef: basiA5_2016 ;;Basiri, A. et al., Chaos Engineering [NewQuotes]
QuoteRef: basiVR5_1982 ;;Basili, V.R., Mills, H.D., Understanding and documenting programs
QuoteRef: basiVR12_1987 ;;Basili, V.R., Selby, R.W., Comparing the effectiveness of software testing strategies
QuoteRef: bassPG7_1987 ;;Bassett, P.G., Frame-based software engineering
QuoteRef: baueFL_1976 ;;Bauer, F.L., Programming as an evolutionary process
QuoteRef: beenK9_2006 ;;Been, K. et al., Dynamic map labeling
QuoteRef: beet5_1989 ;;Beetem, A.F., Beetem, J.F., Introduction to the Galaxy language
QuoteRef: beizB3_1997 ;;Beizer, B., Cleanroom process model: a critical examination
QuoteRef: bellF6_1991 ;;Bell, F., Grosspietsch, K.-E., Specification of fault-tolerant system issues by predicate/transition nets and regular expressions--approach and case study
QuoteRef: bensJP_1973 ;;Benson, J.P., Structured programming techniques
QuoteRef: bentJ3_1999 ;;Bentley, J., McIlroy, D., Data compression using long common strings
QuoteRef: benvA9_1991 ;;Benveniste, A., Berry, G., The synchronous approach to reactive and real-time systems
QuoteRef: benvA1_2003 ;;Benveniste, A. et al., The synchronous languages 12 years later
QuoteRef: bereG9_1982 ;;Beretta, G. et al., XS-1: An integrated interactive system and its kernel
QuoteRef: bergD12_1985 ;;Bergmark, D., GIBBSGEN: Code generation for GIBBS
QuoteRef: bergGD10_1981 ;;Bergland, G.D., A guided tour of program design methodologies
QuoteRef: bernG12_2001 ;;Bernat, G., Gayssials, R., Guaranteed on-line weakly-hard real-time systems
QuoteRef: bernPA5_1978 ;;Bernstein, P.A. et al., The concurrency control mechanism of SDD-1: A system for distributed databases (the fully redundant case)
QuoteRef: bertF10_2019 ;;Bertini, F. et al., Can information hiding in social media posts represent a thread? [NewQuotes]
QuoteRef: beylK2_2009 ;;Beyls, K., D'Hollander, K.H., Refactoring for data locality
QuoteRef: bhatS4_1997 ;;Bhattacharjee, S. et al., Application-layer anycasting
QuoteRef: bhatWA9_2018 ;;Bhat, W.A., Is a data-capacity gap inevitable in big data storage?
QuoteRef: bianMH_1976 ;;Bianchi, M.H., Wood, J.L., A user's viewpoint of the programmer's workbench
QuoteRef: biasR9_1991 ;;Bias, R., Walkthroughs: Efficient collaborative testing
QuoteRef: bigeJ3_1988 ;;Bigelow, J., Hypertext and CASE
QuoteRef: birdR2_1995 ;;Bird, R. et al., The KryptoKnight family of light-weight protocols for authentication and key distribution
QuoteRef: birrAD9_1980 ;;Birrell, A.D., Needham, R.M., A universal file server
QuoteRef: blahM2_2004 ;;Blaha, M., A copper bullet for software quality improvement
QuoteRef: blazM5_1996 ;;Blaze, M. et al., Decentralized trust management
QuoteRef: blumBI8_1985 ;;Blum, B.I., On how we get invalid systems
QuoteRef: boehBW_1976 ;;Boehm, B.W. et al., Quantitative evaluation of software quality
QuoteRef: boehBW12_1976 ;;Boehm, B.W., Software engineering
QuoteRef: boehBW_1979 ;;Boehm, B.W., Software engineering--as it is
QuoteRef: boehBW5_1984 ;;Boehm, B.W. et al., Prototyping versus specifying: A multiproject experiment
QuoteRef: borgA1_1985 ;;Borgida, A., Features of languages for the development of information systems at the conceptual level
QuoteRef: bornAH11_1986 ;;Borning, A.H., Classes versus prototypes in object-oriented languages
QuoteRef: bounE5_2015 ;;Bounimova, E. et al., Billions and billions of constraints: Whitebox fuzz testing in production
QuoteRef: boweJP4_1995 ;;Bowen, J.P., Hinchey, M.G., Ten commandments of formal methods
QuoteRef: boydRE3_1984 ;;Boydston, R.E., Programming cost estimate: Is it reasonable?
QuoteRef: boylJM5_1999 ;;Boyle, J.M. et al., Do you trust your compiler?
QuoteRef: bracRJ10_1983 ;;Brachman, R.J., What IS-A is and isn't: an analysis of taxonomic links in semantic networks
QuoteRef: bradJT5_1986 ;;Brady, J.T., A theory of productivity in the creative process
QuoteRef: brinP9_1978 ;;Brinch-Hansen, P., Staunstrup, J., Specification and implementation of mutual exclusion
QuoteRef: brooR3_1993 ;;Brooks, R., The case for the specialized interface
QuoteRef: brooR9_1993 ;;Brooks, R., reply to Goran Pop-Jordanov's letter, Prototyping for interface-development
QuoteRef: browAW5_1993 ;;Brown, A.W., An examination of the current state of IPSE technology
QuoteRef: browGM6_1989 ;;Brown, G.M. et al., Token systems that self-stabilize
QuoteRef: browMH1_1985 ;;Brown, M.H., Sedgewick, R., Techniques for algorithm animation
QuoteRef: browMH5_1988 ;;Brown, M.H., Exploring algorithms using Balsa-II
QuoteRef: browMH12_1992 ;;Brown, M.H., Hershberger, J., Color and sound in algorithm animation
QuoteRef: bryaGE_1994 ;;Bryan, G.E., Not all programmers are created equal
QuoteRef: bubeR2_1992 ;;Bubenik, R., Zwaenepoel, W., Optimistic Make
QuoteRef: buhrPA9_2000 ;;Buhr, P.A., Moke, W.Y.R., Advanced exception handling mechanisms
QuoteRef: butlR12_2000 ;;Butler, R. et al., A national-scale authentication infrastructure
QuoteRef: butlRW1_1993 ;;Butler, R.W., Finelli, G.B., The infeasibility of quantifying the reliability of life-critical real-time software
QuoteRef: callaO1_2013 ;;Callau, O., Tanter, E., Programming with ghosts
QuoteRef: cameJR2_1986 ;;Cameron, J.R., An overview of JSD
QuoteRef: campM8_2020 ;;Campbell, M., Putting the passe into passwords: How passwordless technologies are reshaping digital identity [NewQuotes]
QuoteRef: carrJM4_1982 ;;Carroll, J.M., Thomas, J.C., Metaphor and the cognitive representation of computing systems
QuoteRef: carrJM11_1982 ;;Carroll, J.M., The adventure of getting to know a computer
QuoteRef: cartL5_1978 ;;Carter, L. et al., Exact and approximate membership testers
QuoteRef: cellW11_2008 ;;Cellary, W., Content communities on the Internet
QuoteRef: cercN11_1985 ;;Cercone, N. et al., An interactive system for finding perfect hash functions
QuoteRef: chaiGJ_1970 ;;Chaitin, G.J., On the difficulty of computations
QuoteRef: chakS8_1998 ;;Chakrabarti, S. et al., Mining the web's link structure
QuoteRef: chamC4_1995 ;;Chambers, C. et al., A framework for selective recompilation in the presence of complex intermodule dependencies
QuoteRef: chanYI11_1999 ;;Chang, Y.-I. et al., Linear spiral hashing for expansible files
QuoteRef: charJ5_1997 ;;Charles, J., Snapshots from industry
QuoteRef: cheaTE_1979 ;;Cheatham, T.E., Jr. et al., A system for program refinement
QuoteRef: chenH5_2007 ;;Chen, H. et al., POLUS: A powerful live updating system
QuoteRef: chenSK8_2001 ;;Chen, S.-K. et al., Reversible debugging using program instrumentation
QuoteRef: cherDR4_1984 ;;Cheriton, D.R., The V kernel: A software base for distributed systems
QuoteRef: cherDR5_1986 ;;Cheriton, D.R., Problem-oriented shared memory: A decentralized approach to distributed system design
QuoteRef: chilTM12_2000 ;;Chilimbi, T.M. et al., Making pointer-based data structures cache conscious
QuoteRef: chiuTC3_1999 ;;Chiueh, T.-C. et al., Intra-address space protection using segmentation hardware
QuoteRef: cleaJG4_1984 ;;Cleary, J.G., Witten, I.H., Data compression using adaptive coding and partial string matching
QuoteRef: cobbRH11_1990 ;;Cobb, R.H., Mills, H.D., Engineering software under statistical quality control
QuoteRef: cockA3_2008 ;;Cockburn, A., [Counterpoint] Subjective quality counts in software development
QuoteRef: cokeZ5_2013 ;;Coker, Z., Hafiz, M., Program transformations to fix C integers
QuoteRef: colwRP_2006 ;;Colwell, R.P., The Pentium Chronicles
QuoteRef: conkJ9_1987 ;;Conklin, J., Hypertext: an introduction and survey
QuoteRef: cookDE9_2009 ;;Cooke, D.E., Rushton, J.N., Taking Parnas's principles to the next level: declarative language design
QuoteRef: coplJ11_1998 ;;Coplien, J. et al., Commonality and variability in software engineering
QuoteRef: corbJC3_1996 ;;Corbett, J.C., Evaluating deadlock detection methods for concurrent software
QuoteRef: cordD6_1991 ;;Cordes, D., Brown, M., The literate-programming paradigm
QuoteRef: cormG1_2012 ;;Cormode, G., Muthukrishnan, S., Approximating data with the count-min sketch
QuoteRef: creeC11_1997 ;;Creel, C. et al., The opportunity of a millennium
QuoteRef: crocSD10_2019 ;;Crocker, S.D., The Arpanet and its impact on the state of networking [NewQuotes]
QuoteRef: currG11_1986 ;;Curry, G., An approach to type safety in a traits system
QuoteRef: cusuMA10_1999 ;;Cusumano, M.A., Yoffie, D.B., Software development on internet time
QuoteRef: daviA7_2006 ;;Davis, A., First virus? [Letter to the editor]
QuoteRef: dawsR11_1997 ;;Dawson, R., Newsham, R., Introducing software engineering to the real world
QuoteRef: deanD5_1996 ;;Dean, D. et al., Java security: from HotJava to Netscape and beyond
QuoteRef: defrJF6_2022 ;;DeFranco, J.F., Voes, J., Revisting software metrology [NewQuotes]
QuoteRef: demaT3_1984 ;;DeMarco, T., Soceneantu, A., SYNCRO: A dataflow command shell for the Lilith/Modula computer
QuoteRef: demeA4_1995 ;;Demers, A. et al., The Bayou architecture: support for data sharing among mobile users
QuoteRef: dennDE2_1983 ;;Denning, D.E., Protecting public keys and signature keys
QuoteRef: dennPJ1_1980 ;;Denning, P.J., Working sets past and present
QuoteRef: dennPJ9_1980 ;;Denning, P.J., On learning how to predict
QuoteRef: desbN2_2012 ;;Desnoyers, M. et al., User-level implementations of read-copy update
QuoteRef: dhirS2_2020 ;;Dhir, S., Devi, S.K.A., The use of biometric fingerprints for on-the-fly digital signing of documents [NewQuotes]
QuoteRef: dickTE7_1981 ;;Dickey, T.E., Programmer variability
QuoteRef: digD5_2007 ;;Dig, D. et al., Refactoring-aware configuration management for object-oriented programs
QuoteRef: dijkEW_1979 ;;Dijkstra, E.W., My hopes of computer science
QuoteRef: dillDL4_1996 ;;Dill, D.L., Rushby, J., Acceptance of formal methods: lessons from hardware design
QuoteRef: diniJ_2010 ;;Dinis, J., Mamede, M., Sweeping the sphere
QuoteRef: doloTA_1976 ;;Dolotta, T.A. et al., The LEAP load and test driver
QuoteRef: douW3_2017 ;;Dou, W. et al., CACheck: detecting and repairing cell arrays in spreadsheets [NewQuotes]
QuoteRef: drosI4_1971 ;;Drost-Fromm, I., Tompkins, R., Open source community governance the Apache way [NewQuotes]
QuoteRef: duMW8_1994 ;;Du, M.-W., Chang, S.C., An approach to designing very fast approximate string matching algorithms
QuoteRef: duttG9_1993 ;;Dutton, G., Usability testing emerges as new benchmark
QuoteRef: duvaVJ9_1997 ;;Duvanenko, V.J., Two writes make a read
QuoteRef: dzidW7_1978 ;;Dzida, W. et al., User-perceived quality of interactive systems
QuoteRef: eastCM1_1988 ;;Eastman, C.M., Paired comments on parallel querying [letter to the editor in support of Stone, H.S., "Parallel Querying of large databases"]
QuoteRef: eckhDE7_1991 ;;Eckhardt, D.E. et al., An experimental evaluation of software redundancy as a strategy for improving reliability
QuoteRef: edmuMG7_2011 ;;Edmunds, M.G., Freeth, T., Using computation to decode the first known computer
QuoteRef: edwaSH2_1997 ;;Edwards, S.H., Representation inheritance: a safe form of "white box" code inheritance
QuoteRef: eickSG1_2001 ;;Eick, S.G. et al., Does code decay? Assessing the evidence from change management data
QuoteRef: eickSG4_2002 ;;Eick, S.G. et al., Visualizing software changes
QuoteRef: elshJL1_1991 ;;Elshoff, J.L., Marcotty, M., MicroTool: an environment for programming microprocessors
QuoteRef: emamKE7_2001 ;;Emam, K.E. et al., The confounding effect of class size on the validity of object-oriented metrics
QuoteRef: englP7_2003 ;;England, P. et al., A trusted open platform
QuoteRef: englWK3_1967 ;;English, W.K. et al., Display selection techniques for text manipulation
QuoteRef: ephrA1_1982 ;;Ephremides, A., Mowafi, O.A., Analysis of a hybrid access scheme for buffered users-probabilistic time division
QuoteRef: eugsPT5_2004 ;;Eugster, P.T. et al., Epidemic information dissemination in distributed systems
QuoteRef: evanD1_2002 ;;Evans, D., Larochelle, D., Improving security using extensible lightweight static analysis
QuoteRef: fairRE7_1979 ;;Fairley, R.E., ALLADDIN: Assembly language assertion driven debugging interpreter
QuoteRef: feldDC8_1989 ;;Feldmeier, D.C., Karn, P.R., UNIX password security--Ten years later
QuoteRef: fishG7_1987 ;;Fischer, G., Cognitive view of reuse and redesign
QuoteRef: flynMJ9_1987 ;;Flynn, M.J. et al., An now a case for more complex instruction sets
QuoteRef: formIR9_1982 ;;Forman, I.R., Global Data flow analysis by decomposition into primes
QuoteRef: fowlM3_2001 ;;Fowler, M., Separating user interface code
QuoteRef: fowlM11_2001 ;;Fowler, M., To be explicit
QuoteRef: franG4_2019 ;;de Francesco, G., The general data protection regulation's practical impact on software architecture
QuoteRef: franM3_1997 ;;Franz, M., Dynamic linking of software components
QuoteRef: franM11_1998 ;;Franz, M., The Java virtual machine: a passing fad?
QuoteRef: franR5_1996 ;;Franceschini, R., Mukherjee, A., Data compression using encrypted text
QuoteRef: franRJ4_1978 ;;Frank, R.J., The patentability of software inventions
QuoteRef: franVN6_2012 ;;Franqueira, V.N.L., Wieringa, R.J., Role-based access control in retrospect
QuoteRef: freeAL2_1984 ;;Freedman, A.L., comment under General discussion
QuoteRef: freeP_1976 ;;Freeman, P., Software reliability and design: a survey
QuoteRef: fridM5_1985 ;;Fridrich, M., Older, W., Helix: The architecture of the XMS distributed file system
QuoteRef: futaY3_1981 ;;Futamura, Y. et al., Development of computer programs by problem analysis diagram (PAD)
QuoteRef: gantV8_1999 ;;Ganit, V. et al., Mining very large databases
QuoteRef: gebiJ4_2007 ;;Gebis, J., Peterson, D., Embracing and extending 20th-century instruction set architectures
QuoteRef: gelbR1_2010 ;;Gelbard, R. et al., Object-oriented analysis -- is it just theory?
QuoteRef: gescCC1_1983 ;;Geschke, C.C., A system for programming and controlling sensor-based robot manipulators
QuoteRef: getoV8_2021 ;;Getov, V., Insights into the origins of the IEEE Computer Society and the invention of electronic digital computing [NewQuotes]
QuoteRef: giffDK5_1985 ;;Gifford, D.K. et al., The application of digital broadcast communication to large scale information systems
QuoteRef: gilbA6_2010 ;;Gilbert, A., Indyk, P., Sparse recovery using sparse matrices
QuoteRef: glasRL3_1981 ;;Glass, R.L., Persistent software errors
QuoteRef: glasRL7_2008 ;;Glass, R.L., Two mistakes and error-free software: a confession
QuoteRef: gligVD11_1979 ;;Gligor, V.D., Lindsay, B.G., Object migration and authentication
QuoteRef: gomaH11_1982 ;;Gomaa, H., Martello, S.J., A partially automated method for testing interactive systems
QuoteRef: gopaRD7_2001 ;;Gopal, R.D. et al., Criss-cross hash joins: design and analysis
QuoteRef: gordRD3_1979 ;;Gordon, R.D., Measuring improvements in program clarity
QuoteRef: goslJ6_1997 ;;Gosling, J., The feel of Java
QuoteRef: goudMG5_1998 ;;Gouda, M.G., Accelerated heartbeat protocols
QuoteRef: goviS5_2003 ;;Govindavajhala, S., Appel, A.W., Using memory errors to attack a virtual machine
QuoteRef: gramAY8_1993 ;;Grama, A.Y. et al., Isoefficiency: measuring the scalability of parallel algorithms and architectures
QuoteRef: grayJN6_1986 ;;Gray, J.N., An approach to decentralized computer systems
QuoteRef: gudeE9_1980 ;;Gudes, E., The design of a cryptography based secure file system
QuoteRef: guptNK1_1997 ;;Gupta, N.K. et al., Auditdraw: generating audits the FAST way
QuoteRef: gutmP8_2002 ;;Gutmann, P., PKI: It's not dead, just resting
QuoteRef: gutmP2_2004 ;;Gutmann, P., Simplifying public key management
QuoteRef: guttJV9_1985 ;;Guttag, J.V. et al., The Larch family of specification languages
QuoteRef: haliU7_1991 ;;Halici, U., Dogac, A., An optimistic locking technique for concurrency control in distributed databases
QuoteRef: hallA9_1990 ;;Hall, A., Seven myths of formal methods
QuoteRef: hallS11_2018 ;;Halle, S. et al., Streamlining the inclusion of computer experiments in a research paper
QuoteRef: hallW1_1994 ;;Hall, W., Ending the tyranny of the button
QuoteRef: hallWE5_1986 ;;Hall, W.E. III, Zweben, S.H., The Cloze procedure and software comprehensibility measurement
QuoteRef: hamePG9_1982 ;;Hamer, P.G., Frewin, G.D., M.H. Halstead's software science -- A critical examination
QuoteRef: hamiM3_1976 ;;Hamilton, M., Zeldin, S., Higher order software--A methodology for defining software
QuoteRef: hamiM12_2008 ;;Hamilton, M., Hackler, W.R., Universal systems language: lessons learned from Apollo
QuoteRef: hamiMH6_1990 ;;Hamilton, M.H., Hackler, W.R., 001: A rapid development approach for rapid prototyping based on a system that supports its own life cycle
QuoteRef: hamlD12_1990 ;;Hamlet, D., Partition testing does not inspire confidence
QuoteRef: hammL9_1997 ;;Hammond, L. et al., A single-chip multiprocessor
QuoteRef: hanS6_2012 ;;Han, S. et al., Performance debugging in the large via mining millions of stack traces
QuoteRef: hareD1_1992 ;;Harel, D., Biting the silver bullet. Toward a brighter future for system development
QuoteRef: hareD10_2021 ;;Harel, D. et al., Scenario-based algorithmics: coding algorithms by automatic composition of separate concerns [NewQuotes]
QuoteRef: harmDE5_1991 ;;Harms, D.E., Weide, B.W., Copying and swapping: Influences on the design of reusable software components
QuoteRef: hattL10_1994 ;;Hatton, L., Roberts, A., How accurate is scientific software?
QuoteRef: hattL3_1997 ;;Hatton, L., Reexamining the fault density--component size connection
QuoteRef: hattL4_1997 ;;Hatton, L., The T experiments: Errors in scientific software
QuoteRef: hattL11_1997 ;;Hatton, L., N-version design versus one good version
QuoteRef: hattL5_1998 ;;Hatton, L., Does OO sync with how we think?
QuoteRef: hausHL3_1981 ;;Hausen, H.-L., Mullerburg, M., Conspectus of software engineering environments
QuoteRef: haveK8_2001 ;;Havelaund, K. et al., Formal analysis of a space-craft controller using SPIN
QuoteRef: hawtPB1_1982 ;;Hawthorn, P.B., DeWitt, D.J., Performance analysis of alternative database machine architectures
QuoteRef: heniKL1_1980 ;;Heninger, K.L., Specifying software requirements for complex systems: New techniques and the application
QuoteRef: hennMA7_1980 ;;Hennell, M.A., Prudom, J.A., A static analysis of the NAG library.
QuoteRef: hennMA3_1984 ;;Hennell, M.A. et al., Assessing a class of software tools
QuoteRef: henrG1_2020 ;;Henry, A., Justin Richer on OAuth [NewQuotes]
QuoteRef: heppM9_2007 ;;Hepp, M. et al., Harvesting wiki consensus. Using Wikipedia entries as vocabulary for knowledge management
QuoteRef: hillMD8_1998 ;;Hill, M.D., Multiprocessors should support simple memory-consistency models
QuoteRef: hinsK7_2017 ;;Hinsen, K., The power to create chaos
QuoteRef: hoarCA9_1987 ;;Hoare, C.A.R., An overview of some formal methods for program design
QuoteRef: hodgS4_2020 ;;Hodges, S. et al., Physical computing: a key element of modern computer science education [NewQuotes]
QuoteRef: hoffCM3_1989 ;;Hoffmann, C.M., The problems of accuracy and robustness in geometric computation
QuoteRef: hoffD7_2000 ;;Hoffman, D., Strooper, P., Prose + Test Cases = Specification
QuoteRef: holtAW11_1981 ;;Holt, A.W., Cashman, P.M., Designing systems to support cooperative activity: An example from software maintenance management
QuoteRef: holzGJ5_1997 ;;Holzmann, G.J., The model checker SPIN
QuoteRef: holzGJ6_2006 ;;Holzmann, G.J., The power of 10: Rules for developing safety-critical code
QuoteRef: holzGJ12_2007 ;;Holzmann, G.J., Conquering complexity
QuoteRef: holzGJ3_2013 ;;Holzmann, G.J., Landing a spacecraft on Mars
QuoteRef: holzGJ11_2015 ;;Holzmann, G.J., Out of bounds
QuoteRef: holzGJ1_2017 ;;Holzmann, G.J., The value of doubt [NewQuotes]
QuoteRef: holzGJ1_2021 ;;Holzmann, G.J., Right code [NewQuotes]
QuoteRef: howdWE1_1990 ;;Howden, W.E., Comments analysis and programming errors
QuoteRef: hsiaP11_1993 ;;Hsia, P. et al., Status report: Requirements engineering
QuoteRef: hullJJ3_2001 ;;Hull, J.J., Hart, P.E., Toward zero-effort personal document managements
QuoteRef: huntA1_2003 ;;Hunt, A., Thomas, D., The art of enbugging
QuoteRef: hurlG2_2018 ;;Hurlburt, G., How much to trust artificial intelligence?
QuoteRef: induB3_1986 ;;Indurkhya, B. et al., Optimal partitioning of randomly generated distributed programs
QuoteRef: isreJW6_2012 ;;Israel, J.W., Why the FBI can't build a case management system
QuoteRef: jackMA_1977 ;;Jackson, M.A., The Jackson design methodology
QuoteRef: jackMA2_1984 ;;Jackson, M.A., Software composition
QuoteRef: jakoM5_2019 ;;Jakobsson, M., The rising thread of launchpad attacks [NewQuotes]
QuoteRef: jansP4_1997 ;;Janson, P. et al., Scalability and flexibility in authentication services: the KryptoKnight approach
QuoteRef: jazeJM7_2001 ;;Jezequel, J.-M. et al., Reliable objects: lightweight testing for OO languages
QuoteRef: jeffDR5_1993 ;;Jeffery, D.R. et al., A comparison of function point counting techniques
QuoteRef: jimT5_2000 ;;Jim, T., SD3: a trust management system with certified evaluation
QuoteRef: jiroM5_2006 ;;Jirotka, M., Luff, P., Supporting requirements with video-based analysis
QuoteRef: joacT8_2007 ;;Joachims, T., Radlinski, F., Search engines that learn from implicit feedback
QuoteRef: johnJ9_1989 ;;Johnson, J. et al., The Xerox Star: A retrospective
QuoteRef: joneTC1_1977 ;;Jones, T.C., Program quality and programmer productivity
QuoteRef: jorgM5_2008 ;;Jorgensen, M., Grimstad, S., Avoiding irrelevant and misleading information when estimating development effort
QuoteRef: kaneU7_20 ;;Kanewala, U., Chen, T.Y., Metamorphic testing: a simple yet effective approach for testing scientific software [NewQuotes]
QuoteRef: kareR3_1994 ;;Karedla, R. et al., Caching strategies to improve disk system performance
QuoteRef: kargPA12_2002 ;;Karger, P.A., Schell, R.R., Thirty years later: Lessons from the Multics security evaluation
QuoteRef: karyG8_1999 ;;Karypis, G. et al., Chameleon: hierarchical clustering using dynamic modeling
QuoteRef: katzJ5_1979 ;;Katzenelson, J., Clusters and dialogues for set implementations
QuoteRef: kayA3_1977 ;;Kay, A., Goldberg, A., Personal dynamic media
QuoteRef: kellT12_2009 ;;Kelly, T. et al., Eliminating concurrency bugs with control engineering
QuoteRef: kentW2_1989 ;;Kent, W., The many forms of a single fact
QuoteRef: kernBW_1973 ;;Kernighan, B.W., Plauger, P.J., Programming style for programmers and language designers
QuoteRef: kernBW_1975 ;;Kernighan, B.W., Plauger, P.J., Software tools
QuoteRef: kimW12_1991 ;;Kim, W., Seo, J., Classifying schematic and data heterogeneity in multidatabase systems
QuoteRef: kleiMH1_1994 ;;Klein, M.H. et al., Rate-monotonic analysis for real-time industrial computing
QuoteRef: knigJC1_1986 ;;Knight, J.C., Leveson, N.G., An experimental evaluation of the assumption of independence in multiversion programming
QuoteRef: knobK9_1981 ;;Knobe, K., Early Experience with MONSTRtm: A software maintenance management tool
QuoteRef: knudDB_1976 ;;Knudsen, D.B. et al., A modification request control system
QuoteRef: koAJ12_2006 ;;Ko, A.J. et al., An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks
QuoteRef: konoK4_2000 ;;Kono, K., Masuda, T., Efficient RMI: dynamic specialization of object serialization
QuoteRef: kopeH1_1994 ;;Kopetz, H., Grunsteidl, G., TTP-A protocol for fault-tolerant real-time systems
QuoteRef: koreY8_2009 ;;Koren, Y. et al., Matrix factorization techniques for recommender systems
QuoteRef: ksheAD1_1994 ;;Kshemkalyani, A.D., Singhal, M., Efficient detection and resolution of generalized distributed deadlocks
QuoteRef: ksheN9_2020 ;;Kshetri, N., DeFranco, J.F., The economics of cyberattacks on Brazil [NewQuotes]
QuoteRef: kuhnDR4_1997 ;;Kuhn, D.R., Sources of failure in the public switched telephone network
QuoteRef: lampBW6_2004 ;;Lampson, B.W., Computer security in the real world
QuoteRef: laplP9_2020 ;;Laplante, P., A brief history of software professionalism and the way forward [NewQuotes]
QuoteRef: larsPA10_1980 ;;Larson, P.-A., Linear hashing with partial expansions
QuoteRef: laruJR5_2004 ;;Larus, J.R. et al., Righting software
QuoteRef: lattC3_2004 ;;Lattner, C., Adve, V., LLVM: A compilation framework for lifelong program analysis & transformation
QuoteRef: laueHC_1979 ;;Lauer, H.C., Satterthwait, E.H., The impact of Mesa on system design
QuoteRef: laueS7_2001 ;;Lauesen, S., Harning, M.B., Virtual windows: linking user tasks, data models, and interface design
QuoteRef: lautL6_1989 ;;Lauterbach, L., Randall, W., Experimental evaluation of six test techniques
QuoteRef: leblDB11_1987 ;;Leblang, D.B., Chase, R.P., Jr., Parallel software configuration management in a network environment
QuoteRef: ledgHF11_1980 ;;Ledgard, H.F. et al., An experiment on human engineering of interactive software
QuoteRef: leeBH1_1987 ;;Lee, B.H., Lee, C.S.G., Collision-free motion planning of two robots
QuoteRef: leeCS_1986 ;;Lee, C.S.G. et al., Tutorial on Robotics, 2nd edition
QuoteRef: leeD9_1997 ;;Lee, D. et al., Implementation and performance evaluation of the LRFU replacement policy
QuoteRef: leeEA9_2000 ;;Lee, E.A., What's ahead for embedded software?
QuoteRef: leeEA5_2006 ;;Lee, E.A., The problem with threads
QuoteRef: leeI6_1993 ;;Lee, I., Iyer, R.K., Faults, symptoms, and software fault tolerance in the Tandem GUARDIAN90 operating system
QuoteRef: leeI6_1996 ;;Lee, I. et al., Efficient service of rediscovered software problems
QuoteRef: lefuC1_2000 ;;Lefurgy, C. et al., Reducing code size with run-time decompression
QuoteRef: lehmMM9_1980 ;;Lehman, M.M., Programs, life cycles, and laws of software evolution
QuoteRef: leveNG4_1990 ;;Leveson, N.G. et al., The use of self checks and voting in software error detection: An empirical study
QuoteRef: leveNG7_1993 ;;Leveson, N.G., Turner, C.S., An investigation of the Therac-25 accidents
QuoteRef: liZ3_2006 ;;Li, Z. et al., CP-Miner: finding copy-past and related bugs in large-scale software code
QuoteRef: liebKJ9_1989 ;;Lieberherr, K.J., Holland, I.M., Assuring good style for object-oriented programs
QuoteRef: linCH1_1995 ;;Lin, C.H. et al., A new public-key cipher system based upon the Diophantine equations
QuoteRef: linWC3_1979 ;;Lin, W.C. et al., Common properties of some multiattribute file systems
QuoteRef: lingRC10_1988 ;;Linger, R.C., Mills, H.D., A case study in Cleanroom software engineering: The IBM COBOL structuring facility
QuoteRef: lingRC5_1993 ;;Linger, R.C., Cleanroom software engineering for zero-defect software
QuoteRef: liskB9_1989 ;;Liskov, B. et al., Efficient at-most-once messages based on synchronized clocks
QuoteRef: liskBH11_1979 ;;Liskov, B., Snyder, A., Exception handling in CLU
QuoteRef: litwW10_1980 ;;Litwin, W., Linear hashing : a new tool for file and table addressing
QuoteRef: litwWA7_1991 ;;Litwin, W.A. et al., Trie hashing with controlled load
QuoteRef: lomaM1_1995 ;;Lomas, M., Christianson, B., Remote booting in a hostile world. To whom am I speaking?
QuoteRef: lomeDB1_1985 ;;Lomet, D.B., Making pointers safe in system programming languages
QuoteRef: lotsJ8_2002 ;;Lotspiech, J. et al., Broadcast encryption's bright future
QuoteRef: lowGC1_1990 ;;Low, G.C., Jeffery, D.R., Function points in the estimation and evaluation of the software process
QuoteRef: lowrMC12_2002 ;;Lowry, M.C., Munro, D.S., Safe and complete distributed garbage collection with the train algorithm
QuoteRef: lozaT7_1983 ;;Lozano-Perez, T., Robot programming
QuoteRef: luhJY2_1983 ;;Luh, J.Y.S., An anatomy of industrial robots and their controls
QuoteRef: malpG9_2000 ;;Malpohl, G. et al., Renaming detection
QuoteRef: manbU10_1990 ;;Manber, U., Chain reactions in networks
QuoteRef: mannZ5_1978 ;;Manna, Z., Waldinger, R., The logic of computer programming
QuoteRef: mannZ7_1979 ;;Manna, Z., Waldinger, R., Synthesis: dreams => programs
QuoteRef: maoTW10_1979 ;;Mao, T.W., Yeh, R.T., Communication port: a language concept for concurrent programming
QuoteRef: maoTW3_1980 ;;Mao, T.W., Yeh, R.T., Communication port: a language concept for concurrent programming
QuoteRef: marcG1_1988 ;;Marchionini, A., Shneiderman, B., Finding facts vs. browsing knowledge in hypertext systems
QuoteRef: mariB5_1996 ;;Maring, B., Object-oriented development of large applications
QuoteRef: martRC7_2005 ;;Martin, R.C., The test bus imperative: architectures that support automated acceptance testing
QuoteRef: martRC5_2007 ;;Martin, R.C., Professionalism and test-driven development
QuoteRef: mashJR_1976 ;;Mashey, J.R., Using a command language as a high-level programming language
QuoteRef: mashJR_1976a ;;Mashey, J.R., Smith, D.W., Documentation tools and techniques
QuoteRef: masmM7_2004 ;;Masmano, M. et al., TLSF: a new dynamic memory allocator for real-time systems [NewQuotes]
QuoteRef: matyV2_2008 ;;Matyas, V. et al., Authorizing card payments with PINs
QuoteRef: matzD9_1997 ;;Matzke, D., Will physical scalability sabotage performance gains?
QuoteRef: maurPM3_2004 ;;Maurer, P.M., Metamorphic programming: unconventional high performance
QuoteRef: maviA8_2009 ;;Mavin, A. et al., EARS (Easy Approach to Requirements Syntax)
QuoteRef: maviA9_2010 ;;Mavin, A., Wilkinson, P., Big EARS (The return of "Easy Approach to Requirements Syntax")
QuoteRef: mcarG10_2002 ;;McArthur, G. et al., An extensible tool for source code representation using XML
QuoteRef: mcauAJ2_1994 ;;McAuley, A.J., Weighted sum codes for error detection and their comparison with existing codes
QuoteRef: mccoS7_1996 ;;McConnell, S., Daily build and smoke test
QuoteRef: mccoS7_1998 ;;McConnell, S., Why you should use routines ... routinely
QuoteRef: mcgoMJ7_1983 ;;McGowan, M.J., Anderson, W.L., Software must move! A description of the software assembly line
QuoteRef: mcgrJR1_1979 ;;McGraw, J.R., Andrews, G.R., Access control in parallel programs
QuoteRef: mcilMD1_1982 ;;McIlroy, M.D., Development of a spelling list
QuoteRef: mcleJ1_1990 ;;McLean, J., The specification and modeling of computer security
QuoteRef: mcleSG5_1998 ;;McLellan, S.G. et al., Building more usable APIs
QuoteRef: megiN4_2004 ;;Megiddo, N., Modha, D.S., Outperforming LRU with an adaptive replacement cache algorithm
QuoteRef: mehtR8_1997 ;;Mehta, R. et al., Techniques for low energy software
QuoteRef: menzT1_2007 ;;Menzies, T. et al., The strangest thing about software
QuoteRef: meyeB1_1985 ;;Meyer, B., On formalism in specifications
QuoteRef: meyeB10_1992 ;;Meyer, B., Applying "Design by contract"
QuoteRef: meyeB8_2008 ;;Meyer, B., Seven principles of software testing
QuoteRef: meyeB9_2009 ;;Meyer, B. et al., Programs that test themselves
QuoteRef: meyeJ10_2014 ;;Meyerson, J., The Go programming language [podcast with A. Gerrand]
QuoteRef: michJR9_2000 ;;Michener, J.R., Acar, T., Security domains: key management in large-scale systems
QuoteRef: millHD2_1986 ;;Mills, H.D., Linger, R.C., Data structured programming: Program design without arrays and pointers
QuoteRef: millHD9_1987 ;;Mills, H.D. et al., Cleanroom software engineering
QuoteRef: millKW3_2001 ;;Miller, K.W., A modest proposal for software testing
QuoteRef: minoT5_1982 ;;Minoura, T., Wiederhold, G., Resilient extended true-copy token scheme for a distributed database system
QuoteRef: mitcN1_2010 ;;Mitchell, N. et al., Four trends leading to Java runtime bloat
QuoteRef: mockA5_2003 ;;Mockus, A. et al., Understanding and predicting effort in software projects
QuoteRef: moffA3_1994 ;;Moffat, A. et al., Static compression for dynamic texts
QuoteRef: montP6_2008 ;;Montesinos, P. et al., DoLorean: Recording and deterministically replaying shared-memory multiprocessor execution efficiently
QuoteRef: morsD1_1986 ;;Morshedian, D., How to fight password pirates and win, letter to The Open Channel
QuoteRef: mostJ11_1985 ;;Mostow, J., Foreword What is AI? And what does it have to do with software engineering
QuoteRef: mullAP_1964 ;;Mullery, A.P., A procedure-oriented machine language
QuoteRef: murpE5_2009 ;;Murphy-Hill, E. et al., How we refactor, and how we know it
QuoteRef: musaJD3_1993 ;;Musa, J.D., Operational profiles in software-reliability engineering
QuoteRef: myerBA8_1992 ;;Myers, B.A., Demonstrational interfaces: A step beyond direct manipulation
QuoteRef: myerW2_1978 ;;Myers, W., The need for software engineering
QuoteRef: navaG3_2001a ;;Navarro, G. et al., Faster approximate string matching over compressed text
QuoteRef: neviCG3_1999 ;;Nevill-Manning, C.G., Witten, I.H., Protein is incompressible
QuoteRef: ngWT4_2001 ;;Ng, W.T., Chen, P.M., The design and verification of the Rio file cache
QuoteRef: nicoJR6_1993 ;;Nicol, J.R. et al., Object orientation in heterogeneous distributed computing systems
QuoteRef: nielJ5_1989 ;;Nielsen, J., Richards, J.T., The experience of learning and using Smalltalk
QuoteRef: nielJ5_1990 ;;Nielsen, J., Big paybacks from 'discount' usability engineering
QuoteRef: nielJ11_1993 ;;Nielsen, J., Is usability engineering really worth it?
QuoteRef: nistA5_2013 ;;Nistor, A. et al., Toddler: detecting performance problems via similar memory-access patterns
QuoteRef: novaGS8_1995 ;;Novak, G.S. Jr., Conversion of units of measurement
QuoteRef: ogasT10_1995 ;;Ogassawara, T., An algorithm with constant execution time for dynamic storage allocation [NewQuotes]
QuoteRef: olseKA7_2011 ;;Olsen, K.A., Programmed politeness
QuoteRef: olseNC9_1993 ;;Olsen, N.C., The software rush hour
QuoteRef: opplR3_2008 ;;Oppliger, R. et al., SSL/TLS session-aware user authentication
QuoteRef: orjiCU9_1994 ;;Orji, C.U., Solworth, J.A., Write twice disk buffering
QuoteRef: osteE7_2021 ;;Osterweil, E., A cybersecurity terminarch: Use it before we lose it [NewQuotes]
QuoteRef: osteLJ11_1983 ;;Osterweil, L.J., Toolpack--an experimental software development environment research project
QuoteRef: oustJK3_1998 ;;Ousterhout, J.K., Scripting: higher-level programming for the 21st century
QuoteRef: paghR10_2013 ;;Pagh, R. et al., How to approximate a set without knowing its size in advance [NewQuotes]
QuoteRef: paneJF9_2002 ;;Pane, J.F. et al., Using HCI techniques to design a more usable programming system
QuoteRef: pankV11_2009 ;;Pankratius, V. et al., Parallelizing bzip2: a case study in multicore software engineering
QuoteRef: papaS2_2018 ;;Papadimitriou, S., Moussiades, L., Mac OS versus FreeBSD: a comparative evaluation [NewQuotes]
QuoteRef: parkDS5_1983 ;;Parker, D.S. Jr. et al., Detection of mutual inconsistency in distributed systems
QuoteRef: parnDL10_1976b ;;Parnas, D.L., Wurges, H., Response to undesired events in software systems
QuoteRef: parnDL5_1978 ;;Parnas, D.L., Designing software for ease of extension and contraction
QuoteRef: parnDL3_1985 ;;Parnas, D.L. et al., The modular structure of complex systems
QuoteRef: parnDL8_1985 ;;Parnas, D.L., Weiss, D.M., Active design reviews: Principles and practices
QuoteRef: parnDL2_1986 ;;Parnas, D.L., Clements, P.C., A rational design process: How and why to fake it
QuoteRef: parnDL12_1994 ;;Parnas, D.L. et al., Precise documentation of well-structured programs
QuoteRef: parnDL4_1996 ;;Parnas, D.L., Mathematical methods: what we need and don't need
QuoteRef: parnDL1_2010 ;;Parnas, D.L., Really rethinking 'Formal Methods'
QuoteRef: parnDL5_2021 ;;Parnas, D.L., Software engineering: a profession in waiting [NewQuotes]
QuoteRef: paseD3_2010 ;;Pasetto, D. et al., Tools for very fast regular expression matching
QuoteRef: paulLD5_2008 ;;Paulson, L.D., New technique puts the deep freeze on computer security
QuoteRef: pembS1_1987 ;;Pemberton, S., An alternative simple language and environment for PCs
QuoteRef: perlAJ8_1985 ;;Perlis, A.J., Another view of software
QuoteRef: perrDE7_1994 ;;Perry, D.E. et al., People, organizations, and process improvement
QuoteRef: perrDE4_1998 ;;Perry, D.E. et al., Parallel changes in large scale software development: An observational case study
QuoteRef: perrDE7_2002 ;;Perry, D.E. et al., Reducing inspection interval in large-scale software development
QuoteRef: peteT11_2014 ;;Peterka, T. et al., High-performance computation of distributed-memory parallel 3D Voronoi and Delaunay tessellation
QuoteRef: petrL9_1982 ;;Petrone, L. et al., Dual: An interactive tool for developing documented programs by step-wise refinements
QuoteRef: portA11_1997 ;;Porter, A., Votta, L., What makes inspections work?
QuoteRef: portAA3_1997 ;;Porter, A.A., Johnson, P.M., Assessing software review meetings: results of a comparative analysis of two experimental studies
QuoteRef: portAA6_1997 ;;Porter, A.A. et al., An experiment to assess the cost-benefits of code inspections in large scale software development
QuoteRef: postRM5_1987 ;;Poston, R.M., Bruen, M.W., Counting down to zero software failures
QuoteRef: pottC9_1993 ;;Potts, C., Software-engineering research revisited
QuoteRef: pratT3_1978 ;;Pratt, T., Control computations and the design of loop control structures
QuoteRef: precL4_1998 ;;Prechelt, L., Tichy, W.F., A controlled experiment to assess the benefits of procedure argument type checking
QuoteRef: precL5_2000 ;;Prechelt, L., Unger, B., An experiment measuring the effects of Personal Software Process (PSP) training
QuoteRef: precL10_2000 ;;Prechelt, L., An empirical comparison of seven programming languages
QuoteRef: preuTB2_2022 ;;Preuber, T.B. et al., Everything you always wanted to know about embedded trace [NewQuotes]
QuoteRef: puruR6_2005 ;;Purushothaman, R., Perry, D.E., Toward understanding the rhetoric of small source code changes
QuoteRef: quisJJ11_1991 ;;Quisquater, J.-J., Desmedt, Y.G., Chinese lotto as an exhaustive code-breaking machine
QuoteRef: ralsP8_2016 ;;Ralston, P. et al., Defeating counterfeiters with microscopic dielets embedded in electronic components
QuoteRef: ramaCV9_1980 ;;Ramamoorthy, C.V., Ho, G.S., Performance evaluation of asynchronous concurrent systems using Petri nets
QuoteRef: ramaR8_2007 ;;Ramakrishnan, R., Tomkins, A., Toward a PeopleWeb
QuoteRef: randB6_1975 ;;Randell, B., System structure for software fault-tolerance
QuoteRef: rashRF11_1986 ;;Rashid, R.F., From RIG to Accent to Mach: The evolution of a network operating system
QuoteRef: raynM2_1996 ;;Raynal, M., Singhai, M., Logical time: Capturing causality in distributed systems
QuoteRef: rellN3_1981 ;;Relles, N., Price, L.A., A user interface for online assistance
QuoteRef: repsT11_1987 ;;Reps, T., Teitelbaum, T., Language processing in program editors
QuoteRef: richC8_1988 ;;Rich, C., Waters, R.C., Automatic programming: Myths and prospects
QuoteRef: ricoF6_1994 ;;Rico, F., Sanvicente, E., A very fast method for verifying digital signatures
QuoteRef: riehRD1_2021 ;;Riehle, R.D., Michael, J.B., Improving the trustworthiness of software through rigorous data type design [NewQuotes]
QuoteRef: rigbPC11_2012 ;;Rigby, P.C. et al., Contemporary peer review in action: Lessons from open source development
QuoteRef: riplGD3_1978 ;;Ripley, G.D. et al., Performance of storage management in an implementation of SNOBOL4
QuoteRef: roacJW10_1987 ;;Roach, J.W., Boaz, M.N., Coordinating the motions of robot arms in a common workspace
QuoteRef: rohmJ_1979 ;;Rohmer, J., APL2M A general computer aided software engineering environment for mini and microcomputers
QuoteRef: rojaR3_1998 ;;Rojas, R., How to make Zuse's Z3 a universal computer
QuoteRef: rossDT5_1975 ;;Ross, D.T. et al., Software engineering: process, principles and goals
QuoteRef: rossDT1_1977 ;;Ross, D.T., Structured analysis (SA): a language for communicating ideas
QuoteRef: rossDT1_1977a ;;Ross, D.T., Schoman, K.E. Jr., Structured analysis for requirements definition
QuoteRef: rousN12_1986 ;;Roussopoulos, N., Kang, H., Principles and techniques in the design of ADMS+-
QuoteRef: roycWW8_1970 ;;Royce, W.W., Managing the development of large software systems
QuoteRef: rushJ7_1983 ;;Rushby, J., Randell, B., A distributed secure system
QuoteRef: russDL3_1980 ;;Russell, D.L., State restoration in systems of communicating processes
QuoteRef: russGW1_1991 ;;Russell, G.W., Experience with inspection in ultralarge-scale developments
QuoteRef: rutaN11_2004 ;;Rutar, N. et al., A comparison of bug finding tools for Java
QuoteRef: saltJH9_1975 ;;Saltzer, J.H., Schroeder, M.D., The protection of information in computer systems
QuoteRef: sandRS2_1996 ;;Sandu, R.S. et al., Role-based access control models [NewQuotes]
QuoteRef: sariS10_1985 ;;Sarin, S., Greif, I., Computer-based real-time conferencing systems
QuoteRef: satyM4_1990 ;;Satyanarayanan, M. et al., Coda: A highly available file system for a distributed workstation environment
QuoteRef: satyM1_1992 ;;Satyanarayanan, M., The influence of scale on distributed file system design
QuoteRef: savoT5_2016 ;;Savor, T. et al., Continuous deployment at Facebook and OANDA [NewQuotes]
QuoteRef: scanDA9_1989 ;;Scanlan, D.A., Structured flowcharts outperform pseudocode: An experimental comparison
QuoteRef: schaBR11_1987 ;;Schatz, B.R., Telesophy: A system for manipulating the knowledge of a community
QuoteRef: schuJR9_1979 ;;Schultz, J.R., Davis, L., The technology of PROMIS
QuoteRef: schwB10_2002 ;;Schwarz, B. et al., Disassembly of executable code revisited
QuoteRef: schwK8_1992 ;;Schwan, K., Zhou, H., Dynamic scheduling of hard real-time tasks and real-time threads
QuoteRef: schwRL3_1981 ;;Schwartz, R.L., Melliar-Smith, P.M., The finalization operation for abstract types
QuoteRef: scowRS_1979 ;;Scowen, R.S., A new techniques for improving the quality of computer programs
QuoteRef: searA7_1993 ;;Sears, A., Layout appropriateness: A metric for evaluating user interface widget layout
QuoteRef: segaME3_1993 ;;Segal, M.E., Frieder, O., On-the-fly program modification: systems for dynamic updating
QuoteRef: selbRW9_1987 ;;Selby, R.W. et al., Cleanroom software development: An empirical evaluation
QuoteRef: shaL9_1990 ;;Sha, L. et al., Priority inheritance protocols: An approach to real-time synchronization
QuoteRef: shaL6_1991 ;;Sha, L. et al., Real-time computing with IEEE Futurebus+
QuoteRef: shaL9_1993 ;;Sha, L., Sathaye, S.S., A systematic approach to designing distributed real-time systems
QuoteRef: shanH8_1996 ;;Shang, H., Merrettal, T.H., Tries for approximate string matching
QuoteRef: shapJS1_2002 ;;Shapiro, J.S., Hardy, N., EROS: a principle-driven operating system from the ground up
QuoteRef: shawC7_1987 ;;Shaw, C., Build a model of the application world before you begin designing your database-application system
QuoteRef: shelBJ3_1998 ;;Shelburne, B.J., Burton, C.P., Early programs on the Manchester Mark I prototype
QuoteRef: shepM11_1997 ;;Sheppard, M., Schofield, C., Estimating software project effort using analogies
QuoteRef: shimBE3_1984 ;;Shimano, B.E. et al., VAL-II: A new robot control system for automatic manufacturing
QuoteRef: shneB8_1983 ;;Shneiderman, B., Direct manipulation: A step beyond programming languages
QuoteRef: shocJF9_1978 ;;Shoch, J.F., Inter-Network naming, addressing, and routing
QuoteRef: shorJ9_2004 ;;Shore, J., Fail fast
QuoteRef: shreB5_2020 ;;Shrestha, B., Lin, H., Data-centric edge computing to defend power grids against IoT-based attacks [NewQuotes]
QuoteRef: shriS7_1982 ;;Shrivastava, S., Panzieri, F., The design of a reliable remote procedure call mechanism
QuoteRef: siyH12_2001 ;;Siy, H., Votta, L., Does the modern code inspection have value?
QuoteRef: slyeJH10_1998 ;;Slye, J.H., Elnozahy, E.N., Support for software interrupts in log-based rollback-recovery
QuoteRef: smitD9_2016 ;;Smite, D., van Solingen, R., What's the true hourly cost of offshoring? [NewQuotes]
QuoteRef: smitDR11_1985 ;;Smith, D.R. et al., Research on knowledge-based software environments at Kestrel Institute
QuoteRef: smitMH8_2001 ;;Smith, M.H. et al., Events and constraints: A graphical editor for capturing logic requirements of programs
QuoteRef: snelJL7_1997 ;;Snell, J.L., Ahead-of-time debugging, or programming not in the dark
QuoteRef: snodR9_1986 ;;Snodgrass, R., Ahn, I., Temporal databases
QuoteRef: sobeAE3_2002 ;;Sobel, A.E.K., Clarkson, M.R., Formal methods application: an empirical tale of software development
QuoteRef: soukJ8_2007 ;;Soukup, J., Soukup, M., The inevitable cycle: graphical tools and programming paradigms
QuoteRef: speaA12_2012 ;;Spear, A. et al., Using tracing to solve the multicore system debug problem
QuoteRef: spinD3_2009 ;;Spinellis, D., Start with the most difficult part
QuoteRef: spinD11_2010 ;;Spinellis, D., Farewell to disks
QuoteRef: srbaI7_2016 ;;Srba, I., Bielikova, M., Why is Stack Overflow failing? [NewQuotes]
QuoteRef: stabL4_2011 ;;Stabile, L., Computing professionals [Letter to the Editor]
QuoteRef: stacZ2_2020 ;;Stachniak, Z., Learning from prototypes [NewQuotes]
QuoteRef: stavA3_2017 ;;Stavrou, A., Voas, J., Verified time
QuoteRef: stemDW11_1986 ;;Stemple, D.W. et al., Functional addressing in Gutenberg: Interprocess communication without process identifiers
QuoteRef: stoyAD7_1993 ;;Stoyenko, A.D., Halang, W.A., Extending Pearl for industrial real-time applications
QuoteRef: stroB5_1989 ;;Stroustrup, B., What is object-oriented programming?
QuoteRef: stroB1_2012 ;;Stroustrup, B., Software development for infrastructure
QuoteRef: stroRE1_1986 ;;Strom, R.E., Yemini, S., Typestate: A programming language concept for enhancing software reliability
QuoteRef: sturC8_2020 ;;Sturton, C. et al., FinalFilter: asserting security properties of a processor at runtime [NewQuotes]
QuoteRef: sundR7_2003 ;;Sundareswara, R., Schrater, P., Extensible point location algorithm
QuoteRef: tackBD5_1999 ;;Tackett, B.D., van Doren, B., Process control for error-free software: a software success story
QuoteRef: takaH1_1980 ;;Takahashi, H., An automatic-controller description language
QuoteRef: taneAS8_1992 ;;Tanenbaum, A.S. et al., Parallel programming using shared objects and broadcasting
QuoteRef: taneAS5_2006 ;;Tanenbaum, A.S. et al., Can we make operating systems reliable and secure?
QuoteRef: tarrP4_1998 ;;Tarr, P., Clarke, L.A., Consistency management for complex applications
QuoteRef: taylDJ11_1980 ;;Taylor, D.J. et al., Redundancy in data structures: improving software fault tolerance
QuoteRef: teicD1_1977 ;;Teichroew, D, Hershey, E.A., PSL/PSA: a computer aided technique for structured documentation and analysis of information processing systems
QuoteRef: teitW3_1985 ;;Teitelman, W., A tour through Cedar
QuoteRef: tennT9_1988 ;;Tenny, T., Program readability: Procedures versus comments
QuoteRef: tereAA11_2000 ;;Terekov, A.A., Verhoof, C., The realities of language conversions
QuoteRef: thelT8_2003 ;;Thelin, T. et al., An experimental comparison of usage-based and checklist-based reading
QuoteRef: thorRC_1969 ;;Thornton, R.C., A scientific, algorithmic, interactive language
QuoteRef: tichWF9_1979 ;;Tichy, W.F., Software development control based on module interconnection
QuoteRef: tichWF11_1987 ;;Tichy, W.F., What can software engineers learn from artificial intelligence?
QuoteRef: tillN7_2006 ;;Tillmann, N., Shulte, W., Unit tests reloaded: parameterized unit testing with symbolic execution
QuoteRef: tockS11_1997 ;;Tockey, S., A missing link in software engineering
QuoteRef: toroN7_2014 ;;Toronto, N., McCarthy, J., Practically accurate floating-point math [NewQuotes]
QuoteRef: toupD1_2011 ;;Toubin, D., Using tracing to diagnose or monitor systems
QuoteRef: towsE7_1979 ;;Towster, E., A convention for explicit declaration of environments and top-down refinement of data
QuoteRef: tratL9_2007 ;;Tratt, L., Wuyts, R., Dynamically typed languages
QuoteRef: ungaD10_1992 ;;Ungar, D. et al., Object, message, and performance: How they coexist in Self
QuoteRef: ungaD9_2007 ;;Ungar, D., Dynamic languages (in reactive environments) unleash creativity
QuoteRef: vargG12_1997 ;;Varghese, G., Lauck, A., Hashed and hierarchical timing wheels: efficient data structures for implementing a timer facility
QuoteRef: vessI7_1984 ;;Vessey, I., Weber, R., Research on structured programming: An empiricist's evaluation
QuoteRef: voasF7_1997 ;;Voas, J. et al., Predicting how badly "good" software can behave
QuoteRef: wagnF5_1992 ;;Wagner, F., VFSM executable specification
QuoteRef: walpJ6_1988 ;;Walpole, J. et al., Maintaining consistency in distributed software engineering environments
QuoteRef: waltPL11_1979 ;;Walton, P.L. et al., Medical guidance and PROMIS
QuoteRef: wangZ11_2018 ;;Wang, Z. et al., Using local clocks to reproduce concurrency bugs [NewQuotes]
QuoteRef: wateRC1_1982 ;;Waters, R.C., The programmer's apprentice: knowledge based program editing
QuoteRef: wegnLM7_1989 ;;Wegner, L.M., Teuhola, J.I., The external heapsort
QuoteRef: wegnP12_1976 ;;Wegner, P., Programming languages--the first 25 years
QuoteRef: wegnP7_1984 ;;Wegner, P., Capital-intensive software technology
QuoteRef: weinGM9_1982 ;;Weinberg, G.M., Weinberg, Overstructured management of software engineering
QuoteRef: weisDM2_1985 ;;Weiss, D.M., Basili, V.R., Evaluating software development by analysis of changes: Some data from the Software Engineering Laboratory
QuoteRef: weisM11_1987 ;;Weiser, M., Source code
QuoteRef: welcTA6_1984 ;;Welch, T.A., A technique for high-performance data compression
QuoteRef: wellEF9_1993 ;;Weller, E.F., Lessons from three years of inspection data
QuoteRef: wellMB4_1964 ;;Wells, M.B., Aspects of language design for combinatorial computing
QuoteRef: weyuEJ12_1986 ;;Weyuker, E.J., Axiomatizing software test data adequacy
QuoteRef: whitDE4_1986 ;;Whitney, D.E., Real robots don't need jigs
QuoteRef: whitI11_1988 ;;White, I., The limits and capabilities of machines--A review
QuoteRef: whitJA11_2012 ;;Whittaker, J.A., The 10-minute test plan
QuoteRef: wiesM10_2000 ;;Wiesmann, M. et al., Database replication techniques: a three parameter classification
QuoteRef: willL7_2000 ;;Williams, L. et al., Strengthening the case for pair programming
QuoteRef: wirfR7_2006 ;;Wirfs-Brock, R., Designing for recovery
QuoteRef: wolfHB11_2017 ;;Wolfe, H.B., The mobile phone as surveillance device: progress, perils, and protective measures [NewQuotes]
QuoteRef: wolfW9_1989 ;;Wolf, W., A practical comparison of two object-oriented languages
QuoteRef: xuJ1_1993 ;;Xu, J., Parnas, D.L., On satisfying timing constraints in hard-real-time systems
QuoteRef: yahaR5_1993 ;;Yahalom, R. et al., Trust relations in secure systems--A distributed authentication perspective
QuoteRef: yamaT11_1998 ;;Yamaura, T., How to design practical test cases
QuoteRef: yangK5_2016 ;;Yang, K. et al., A2: analog malicious hardware [NewQuotes]
QuoteRef: yangX7_2016 ;;Yang, X. et al., A fast boot, fast shutdown technique for Android OS devices
QuoteRef: yankN10_1985 ;;Yankelovich, N. et al., Reading and writing the electronic book
QuoteRef: yankN1_1988 ;;Yankelovich, N. et al., Intermedia: The concept and the construction of a seamless information environment
QuoteRef: yoonY5_2015 ;;Yoon, Y., Myers, B.A., Supporting selective undo in a code editor [NewQuotes]
QuoteRef: yuanD6_2012 ;;Yuan, D. et al., Characterizing logging practices in open-source software
QuoteRef: zdonSB11_1986 ;;Zdonik, S.B., Why properties are objects or some refinements of "is-a"
QuoteRef: zellA11_2001 ;;Zeller, A., Automated debugging: Are we close?
QuoteRef: zellA2_2002 ;;Zeller, A., Hildebrandt, R., Simplifying and isolating failure-inducing input
QuoteRef: zivJ5_1977 ;;Ziv, J., Lempel, A., A universal algorithm for sequential data compression
QuoteRef: zivJ9_1978 ;;Ziv, J., Lempel, A., Compression of individual sequences via variable-rate coding
QuoteRef: zubeKM10_2001 ;;Zuberi, K.M., EMERALDS: a small-memory real-time microkernel

Related up

ThesaHelp: help with quotations
ThesaHelp: ACM references a-e
ThesaHelp: ACM references f-l
ThesaHelp: ACM references m-z
ThesaHelp: John Wiley references

Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber