메뉴 건너뛰기




Volumn 37, Issue , 2004, Pages 4837-4846

What makes a code review trustworthy?

Author keywords

[No Author keywords available]

Indexed keywords

AEROSPACE INDUSTRY; COMPUTER SOFTWARE; DECISION MAKING; ENGINEERS; SECURITY OF DATA; STANDARDS;

EID: 12344253671     PISSN: 10603425     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/hicss.2004.1265711     Document Type: Conference Paper
Times cited : (14)

References (28)
  • 7
    • 0017292244 scopus 로고
    • Design and code inspections to reduce errors in program development
    • M. Fagan. Design and code inspections to reduce errors in program development. IBM Systems Journal, 15:182-211, 1976.
    • (1976) IBM Systems Journal , vol.15 , pp. 182-211
    • Fagan, M.1
  • 15
    • 84888253055 scopus 로고    scopus 로고
    • Certifying domain-specific policies
    • M. S. Feather and M. Goedicke, editors, IEEE Comp. Soc. Press
    • M. Lowry, T. Pressburger, and G. Rosu. Certifying domain-specific policies. In M. S. Feather and M. Goedicke, editors, Proc. 16th Intl. Conf. Automated Software Engineering, pages 118-125, IEEE Comp. Soc. Press, 2001.
    • (2001) Proc. 16th Intl. Conf. Automated Software Engineering , pp. 118-125
    • Lowry, M.1    Pressburger, T.2    Rosu, G.3
  • 20
    • 84888912617 scopus 로고    scopus 로고
    • Polyspace technologies. http://www.polyspace.com.
  • 22
    • 84888915290 scopus 로고    scopus 로고
    • Empirical evaluation of techniques and methods used for achieving and assessing software high dependability
    • I. Rus, V. Basili, and B. Boehm. Empirical evaluation of techniques and methods used for achieving and assessing software high dependability. In Proc. DSN Workshop on Dependability Benchmarking, 2002.
    • (2002) Proc. DSN Workshop on Dependability Benchmarking
    • Rus, I.1    Basili, V.2    Boehm, B.3
  • 23
    • 0003970441 scopus 로고    scopus 로고
    • Enforceable security policies
    • Cornell University, Computer Science Department, September
    • F. B. Schneider. Enforceable security policies. Computer Science Technical Report TR98-1644, Cornell University, Computer Science Department, September 1998.
    • (1998) Computer Science Technical Report , vol.TR98-1644
    • Schneider, F.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.