-
1
-
-
0002780749
-
Assigning meanings to programs
-
American Mathematical Society, Apr.
-
R. W. Floyd, “Assigning meanings to programs,” in Proc. Symp. Appl. Math., vol. XIX, American Mathematical Society, Apr. 1967, pp. 19-32.
-
(1967)
Proc. Symp. Appl. Math.
, vol.19
, pp. 19-32
-
-
Floyd, R.W.1
-
2
-
-
0016444678
-
Automatic program verification I: A logical basis and its implementation
-
S. Igarashi, R. L. London, and D. C. Luckham, “Automatic program verification I: A logical basis and its implementation,” Acta Informatica, vol. 4, pp. 145-182, 1975.
-
(1975)
Acta Informatica
, vol.4
, pp. 145-182
-
-
Igarashi, S.1
London, R.L.2
Luckham, D.C.3
-
3
-
-
0009664537
-
-
Tech. Rep. 79-731, Dep. of Computer Science, Stanford University, Mar. Program Analysis and Verification Group Rep. 11
-
D. C. Luckham, S. M. German, F. W. von Henke, R. A. Karp, P. W. Milne, D. C. Oppen, W. Polak, and W. L. Scherlis, “Stanford Pascal Verifier user manual,” Tech. Rep. 79-731, Dep. of Computer Science, Stanford University, Mar. 1979, Program Analysis and Verification Group Rep. 11.
-
(1979)
“Stanford Pascal Verifier user manual,”
-
-
Luckham, D.C.1
German, S.M.2
von Henke, F.W.3
Karp, R.A.4
Milne, P.W.5
Oppen, D.C.6
Polak, W.7
Scherlis, W.L.8
-
4
-
-
84945713135
-
Applying design by contract
-
Oct.
-
B. Meyer, “Applying design by contract,” IEEE Comput., vol. 25, pp. 40-51, Oct. 1992.
-
(1992)
IEEE Comput.
, vol.25
, pp. 40-51
-
-
Meyer, B.1
-
5
-
-
0016778317
-
New assertion concepts for self-metric software validation
-
ACM and IEEE Computer Society, Apr.
-
L. G. Stucki and G. L. Foshee, “New assertion concepts for self-metric software validation,” in Proc. Int. Conf. Reliable Software, ACM and IEEE Computer Society, Apr. 1975, pp. 59-71.
-
(1975)
Proc. Int. Conf. Reliable Software
, pp. 59-71
-
-
Stucki, L.G.1
Foshee, G.L.2
-
6
-
-
0016778318
-
Some experience with automated aids to the design of large-scale reliable software
-
ACM and IEEE Computer Society, Apr.
-
B. W. Boehm, R. K. McClean, and D.B. Urfrig, “Some experience with automated aids to the design of large-scale reliable software,” in Proc. Int. Conf. Reliable Software, ACM and IEEE Computer Society, Apr. 1975, pp. 105-113.
-
(1975)
Proc. Int. Conf. Reliable Software
, pp. 105-113
-
-
Boehm, B.W.1
McClean, R.K.2
Urfrig, D.B.3
-
7
-
-
0016779015
-
Design of self-checking software
-
ACM and IEEE Computer Society, Apr.
-
S. S. Yau and R. C. Cheung, “Design of self-checking software,” in Proc. Int. Conf. Reliable Software, ACM and IEEE Computer Society, Apr. 1975, pp. 450-457.
-
(1975)
Proc. Int. Conf. Reliable Software
, pp. 450-457
-
-
Yau, S.S.1
Cheung, R.C.2
-
10
-
-
84938169839
-
An assertion mechanism based on exceptions
-
USENIX Association, Aug.
-
P. Gautron, “An assertion mechanism based on exceptions,” in Proc. 4th C++ Tech. Conf., USENIX Association, Aug. 1992, pp. 245-262.
-
(1992)
Proc. 4th C++ Tech. Conf.
, pp. 245-262
-
-
Gautron, P.1
-
12
-
-
0024132808
-
The Turing programming language
-
Dec.
-
R. C. Holt and J. R. Cordy, “The Turing programming language,” Commun. ACM, vol. 31, no. 12, pp. 1410-1423, Dec. 1988.
-
(1988)
Commun. ACM
, vol.31
, Issue.12
, pp. 1410-1423
-
-
Holt, R.C.1
Cordy, J.R.2
-
14
-
-
0024663234
-
The Inscape environment
-
IEEE Computer Society, May
-
D. E. Perry, “The Inscape environment,” in Proc. 11th Int. Conf. Software Eng., IEEE Computer Society, May 1989, pp. 2-12.
-
(1989)
Proc. 11th Int. Conf. Software Eng.
, pp. 2-12
-
-
Perry, D.E.1
-
15
-
-
0022025285
-
An overview of Anna, a specification language for Ada
-
Mar.
-
D. C. Luckham and F. W. von Henke, “An overview of Anna, a specification language for Ada,” IEEE Software, vol. 2, pp. 9-23, Mar. 1985.
-
(1985)
IEEE Software
, vol.2
, pp. 9-23
-
-
Luckham, D.C.1
von Henke, F.W.2
-
16
-
-
85050852261
-
An implementation of Anna
-
May Cambridge Univ. Press
-
S. Sankar, D. S. Rosenblum, and R. B. Neff, “An implementation of Anna,” in Ada in Use: Proc. Ada Int. Conf., May 1985, pp. 285-296, Cambridge Univ. Press.
-
(1985)
Ada in Use: Proc. Ada Int. Conf.
, pp. 285-296
-
-
Sankar, S.1
Rosenblum, D.S.2
Neff, R.B.3
-
17
-
-
84938164809
-
-
Tech. Rep. 86-301, Computer Systems Laboratory, Stanford Univ., June Program Analysis and Verification Group Report 30
-
S. Sankar and D. S. Rosenblum, “The complete transformation methodology for sequential runtime checking of an Anna subset,” Tech. Rep. 86-301, Computer Systems Laboratory, Stanford Univ., June 1986, Program Analysis and Verification Group Report 30.
-
(1986)
“The complete transformation methodology for sequential runtime checking of an Anna subset,”
-
-
Sankar, S.1
Rosenblum, D.S.2
-
18
-
-
84942210074
-
-
Ph.D. thesis, Dep. of Computer Science, Stanford Univ., Aug. Tech. Rep. 89-1282
-
S. Sankar, “Automatic Runtime Consistency Checking and Debugging of Formally Specified Programs,” Ph.D. thesis, Dep. of Computer Science, Stanford Univ., Aug. 1989 Tech. Rep. 89-1282.
-
(1989)
“Automatic Runtime Consistency Checking and Debugging of Formally Specified Programs,”
-
-
Sankar, S.1
-
20
-
-
84938166142
-
Concurrent runtime checking of Annotated Ada programs
-
New York: Springer-Verlag (Lecture Notes in Computer Science No. 241), Dec.
-
D. S. Rosenblum, S. Sankar, and D. C. Luckham, “Concurrent runtime checking of Annotated Ada programs,” in Proc. 6th Conf. Foundations of Software Tech. and Theoretical Comput. Sci. New York: Springer-Verlag (Lecture Notes in Computer Science No. 241), Dec. 1986, pp. 10-35
-
(1986)
Proc. 6th Conf. Foundations of Software Tech. and Theoretical Comput. Sci.
, pp. 10-35
-
-
Rosenblum, D.S.1
Sankar, S.2
Luckham, D.C.3
-
21
-
-
0027560850
-
Concurrent runtime monitoring of formally specified programs
-
Mar.
-
S. Sankar and M. Mandal, “Concurrent runtime monitoring of formally specified programs,” IEEE Comput., vol. 26, pp. 32-41, Mar. 1993.
-
(1993)
IEEE Comput.
, vol.26
, pp. 32-41
-
-
Sankar, S.1
Mandal, M.2
-
23
-
-
0025414676
-
The use of self checks and voting in software error detection: An empirical study
-
Apr.
-
N. G. Leveson, S. S. Cha, J. C. Knight, and T. J. Shimeall, “The use of self checks and voting in software error detection: An empirical study,” IEEE Trans. Software Eng., vol. SE-16, pp. 432-443, Apr. 1990.
-
(1990)
IEEE Trans. Software Eng.
, vol.SE-16
, pp. 432-443
-
-
Leveson, N.G.1
Cha, S.S.2
Knight, J.C.3
Shimeall, T.J.4
-
24
-
-
0022221323
-
An empirical study of software interface faults
-
IEEE Computer Society, Aug.
-
D. E. Perry and W. M. Evangelist, “An empirical study of software interface faults,” in Proc. Int. Symp. New Directions in Comput., IEEE Computer Society, Aug. 1985, pp. 32-38.
-
(1985)
Proc. Int. Symp. New Directions in Comput.
, pp. 32-38
-
-
Perry, D.E.1
Evangelist, W.M.2
-
29
-
-
0025782108
-
Two-dimensional pinpointing: Debugging with formal methods
-
Jan.
-
D. C. Luckham, S. Sankar, and S. Takahashi, “Two-dimensional pinpointing: Debugging with formal methods,” IEEE Software, vol. 8, pp. 74-84, Jan. 1991.
-
(1991)
IEEE Software
, vol.8
, pp. 74-84
-
-
Luckham, D.C.1
Sankar, S.2
Takahashi, S.3
-
30
-
-
0018456754
-
Make—A program for maintaining computer programs
-
Mar.
-
S. I. Feldman, “Make—A program for maintaining computer programs,” Software—Practice and Experience, vol. 9, no. 3, pp. 255-265, Mar. 1979.
-
(1979)
Software—Practice and Experience
, vol.9
, Issue.3
, pp. 255-265
-
-
Feldman, S.I.1
-
31
-
-
0025447247
-
A case for make
-
June
-
G. S. Fowler, “A case for make,” Software—Practice and Experience, vol. 20, no. Sl, pp. 35-46, June 1990.
-
(1990)
Software—Practice and Experience
, vol.20
, Issue.Sl
, pp. 35-46
-
-
Fowler, G.S.1
-
32
-
-
0027610052
-
Extensions to the C programming language for enhanced fault detection
-
June
-
D. W. Flater, Y. Yesha, and E. K. Park, “Extensions to the C programming language for enhanced fault detection,” Software—Practice and Experience, vol. 23, no. 6, pp. 617-628, June 1993.
-
(1993)
Software—Practice and Experience
, vol.23
, Issue.6
, pp. 617-628
-
-
Flater, D.W.1
Yesha, Y.2
Park, E.K.3
-
33
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
ACM SIGPLAN, June appears in SIGPLAN Notices 29(6), June 1994
-
T. M. Austin, S. E. Breach, and G. S. Sohi, “Efficient detection of all pointer and array access errors,” in Proc. ACM SIGPLAN'94 Conf. Programm. Language Design and Implementation (PLDI), ACM SIGPLAN, June 1994, pp. 290-301, appears in SIGPLAN Notices 29(6), June 1994.
-
(1994)
Proc. ACM SIGPLAN'94 Conf. Programm. Language Design and Implementation (PLDI)
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
34
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
USENIX Association, Jan.
-
R. Hastings and B. Joyce, “Purify: Fast detection of memory leaks and access errors,” in Proc. Winter 1992 USENIX Conf., USENIX Association, Jan. 1992, pp. 125-136.
-
(1992)
Proc. Winter 1992 USENIX Conf.
, pp. 125-136
-
-
Hastings, R.1
Joyce, B.2
-
35
-
-
57949101860
-
An event-based model of software configuration management
-
P. H. Feiler, Ed., ACM SIGSOFT, June
-
D. S. Rosenblum and B. Krishnamurthy, “An event-based model of software configuration management,” in Proc. 3rd Int. Workshop on Software Config. Management, P. H. Feiler, Ed., ACM SIGSOFT, June 1991, pp. 94-97.
-
(1991)
Proc. 3rd Int. Workshop on Software Config. Management
, pp. 94-97
-
-
Rosenblum, D.S.1
Krishnamurthy, B.2
-
36
-
-
0020209216
-
Collecting and categorizing software error data in an industrial environment
-
T. J. Ostrand and E. J. Weyuker, “Collecting and categorizing software error data in an industrial environment,” J. Syst. Software, vol. 4, pp. 289-300, 1984.
-
(1984)
J. Syst. Software
, vol.4
, pp. 289-300
-
-
Ostrand, T.J.1
Weyuker, E.J.2
-
37
-
-
0016520329
-
An analysis of errors and their causes in system programs
-
June
-
A. Endres, “An analysis of errors and their causes in system programs,” IEEE Trans. Software Eng., vol. SE-1, pp. 140-149, June 1975.
-
(1975)
IEEE Trans. Software Eng.
, vol.SE-1
, pp. 140-149
-
-
Endres, A.1
|