-
1
-
-
84976714714
-
Scheduling real-time transactions
-
Abbot R. Scheduling real-time transactions. ACM Sigmod Records 17 (1988) 71-81
-
(1988)
ACM Sigmod Records
, vol.17
, pp. 71-81
-
-
Abbot, R.1
-
2
-
-
0022723689
-
TMM: Software maintenance by transformation
-
Arango G., Baxter I., Freeman P., and Pidgeon C. TMM: Software maintenance by transformation. IEEE Software 3 3 (1986) 27-39
-
(1986)
IEEE Software
, vol.3
, Issue.3
, pp. 27-39
-
-
Arango, G.1
Baxter, I.2
Freeman, P.3
Pidgeon, C.4
-
3
-
-
0028447803
-
STRESS: A simulator for hard real-time systems
-
Audsley N.C., Burns A., Richardson M.F., and Wellings A.J. STRESS: A simulator for hard real-time systems. Software: Practice and Experience 24 6 (1994) 543-564
-
(1994)
Software: Practice and Experience
, vol.24
, Issue.6
, pp. 543-564
-
-
Audsley, N.C.1
Burns, A.2
Richardson, M.F.3
Wellings, A.J.4
-
4
-
-
0027227169
-
Risk and system integrity concepts for safety-related control systems
-
IEEE, Piscataway, NJ
-
Bell R., and Reinert D. Risk and system integrity concepts for safety-related control systems. Proc. COMPASS'93 Computer Assurance Conference (1993), IEEE, Piscataway, NJ 15-34
-
(1993)
Proc. COMPASS'93 Computer Assurance Conference
, pp. 15-34
-
-
Bell, R.1
Reinert, D.2
-
5
-
-
0342432782
-
Safety
-
McDermid J. (Ed), CRC Press, Boca Raton, FL.
-
Bennet P.A. Safety. In: McDermid J. (Ed). "Software Engineer's Reference Book" (1991), CRC Press, Boca Raton, FL. 60/3-60/18
-
(1991)
"Software Engineer's Reference Book"
-
-
Bennet, P.A.1
-
6
-
-
0342432782
-
Software maintenance
-
McDermid J. (Ed), CRC Press, Boca Raton, FL
-
Bennett K.H. Software maintenance. In: McDermid J. (Ed). "Software Engineer's Reference Book" (1991), CRC Press, Boca Raton, FL 20/3-20/18
-
(1991)
"Software Engineer's Reference Book"
-
-
Bennett, K.H.1
-
7
-
-
0026084565
-
The software maintenance of large software systems: management, methods and tools
-
Littlewood B., and Miller D. (Eds), Elsevier Applied Science, London
-
Bennett K.H., Cornelius B., Munro M., and Robson D. The software maintenance of large software systems: management, methods and tools. In: Littlewood B., and Miller D. (Eds). "Software Reliability and Safety" (1991), Elsevier Applied Science, London 135-154
-
(1991)
"Software Reliability and Safety"
, pp. 135-154
-
-
Bennett, K.H.1
Cornelius, B.2
Munro, M.3
Robson, D.4
-
9
-
-
0021559153
-
The economics of software maintenance
-
IEEE, Washington, DC.
-
Boehm B. The economics of software maintenance. Proc. Software Maintenance Workshop (1983), IEEE, Washington, DC. 9-37
-
(1983)
Proc. Software Maintenance Workshop
, pp. 9-37
-
-
Boehm, B.1
-
10
-
-
0040857035
-
The case for the specialized interfaces
-
Brooks R. The case for the specialized interfaces. IEEE Software 10 2 (1993) 86-88
-
(1993)
IEEE Software
, vol.10
, Issue.2
, pp. 86-88
-
-
Brooks, R.1
-
12
-
-
77957135634
-
Information security risk management
-
Hutt A.S., Bosworth S., and Hoyt D. (Eds), Macmillan Publishing, New York
-
Browne P. Information security risk management. In: Hutt A.S., Bosworth S., and Hoyt D. (Eds). "Computer Security Handbook" (1989), Macmillan Publishing, New York 22-32
-
(1989)
"Computer Security Handbook"
, pp. 22-32
-
-
Browne, P.1
-
14
-
-
0026152861
-
Scheduling hard real-time systems: A review
-
Burns A. Scheduling hard real-time systems: A review. Software Eng. J. 6 3 (1991) 116-128
-
(1991)
Software Eng. J.
, vol.6
, Issue.3
, pp. 116-128
-
-
Burns, A.1
-
15
-
-
0028539249
-
Real-time safety-critical systems: Analysis and synthesis
-
Burns A., and McDermid J.A. Real-time safety-critical systems: Analysis and synthesis. Software Eng. J. 9 6 (1994) 267-281
-
(1994)
Software Eng. J.
, vol.9
, Issue.6
, pp. 267-281
-
-
Burns, A.1
McDermid, J.A.2
-
16
-
-
0022675807
-
A functional model for describing and reasoning about time behavior of computing systems
-
Caspi P., and Halbwachs N. A functional model for describing and reasoning about time behavior of computing systems. Acta Infor. 22 6 (1986) 595-627
-
(1986)
Acta Infor.
, vol.22
, Issue.6
, pp. 595-627
-
-
Caspi, P.1
Halbwachs, N.2
-
17
-
-
0023863752
-
Safety verification in Murphy using fault tree analysis
-
IEEE, Los Alamitos, CA.
-
Cha S.S., Leveson N.G., and Shimeall T.J. Safety verification in Murphy using fault tree analysis. Proc. 10th International Conference on Software Engineering (1988), IEEE, Los Alamitos, CA. 394-403
-
(1988)
Proc. 10th International Conference on Software Engineering
, pp. 394-403
-
-
Cha, S.S.1
Leveson, N.G.2
Shimeall, T.J.3
-
19
-
-
0003901178
-
"Representing and using non-functional requirements: A process-oriented approach"
-
University of Toronto, Canada.
-
Chung K.L. "Representing and using non-functional requirements: A process-oriented approach". Ph.D. Thesis, Department of Computer Science (1993), University of Toronto, Canada.
-
(1993)
Ph.D. Thesis, Department of Computer Science
-
-
Chung, K.L.1
-
20
-
-
0029191009
-
Dealing with nonfunctional requirements: Three experimental studies of a process-oriented approach
-
IEEE, Los Alamitos, CA.
-
Chung L., and Nixon B. Dealing with nonfunctional requirements: Three experimental studies of a process-oriented approach. Proc. 2nd International Symposium on Requirements Engineering (1995), IEEE, Los Alamitos, CA.
-
(1995)
Proc. 2nd International Symposium on Requirements Engineering
-
-
Chung, L.1
Nixon, B.2
-
21
-
-
0029216801
-
Using nonfunctional requirements to systematically support change
-
IEEE, Los Alamitos, CA.
-
Chung L., Nixon B., and Yu E. Using nonfunctional requirements to systematically support change. Proc. 17th International Conference on Software Engineering (1995), IEEE, Los Alamitos, CA.
-
(1995)
Proc. 17th International Conference on Software Engineering
-
-
Chung, L.1
Nixon, B.2
Yu, E.3
-
22
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE, Washington, DC.
-
Clark D., and Wilson D. A comparison of commercial and military computer security policies. Proc. Symposium on Security and Privacy (1987), IEEE, Washington, DC. 184-194
-
(1987)
Proc. Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
23
-
-
77957109313
-
Security testing
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Clever J. Security testing. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1145-1153
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1145-1153
-
-
Clever, J.1
-
24
-
-
84938155458
-
Using metrics to evaluate software system maintainability
-
Coleman D., Ash D., Lowther B., and Oman P. Using metrics to evaluate software system maintainability. IEEE Computer 27 8 (1994) 44-49
-
(1994)
IEEE Computer
, vol.27
, Issue.8
, pp. 44-49
-
-
Coleman, D.1
Ash, D.2
Lowther, B.3
Oman, P.4
-
26
-
-
0020824577
-
Timing requirements for time-driven systems using augmented Petri nets
-
Coolahan J.E., and Roussopoulos N. Timing requirements for time-driven systems using augmented Petri nets. IEEE Trans. Software Eng. SE-9 5 (1983) 603-616
-
(1983)
IEEE Trans. Software Eng.
, vol.SE-9
, Issue.5
, pp. 603-616
-
-
Coolahan, J.E.1
Roussopoulos, N.2
-
27
-
-
0021785305
-
Timing-constraints of real-time systems: Constructs for expressing time, methods of validating them
-
Dasarathy D. Timing-constraints of real-time systems: Constructs for expressing time, methods of validating them. IEEE Trans. Software Eng. SE-11 1 (1985) 80-86
-
(1985)
IEEE Trans. Software Eng.
, vol.SE-11
, Issue.1
, pp. 80-86
-
-
Dasarathy, D.1
-
28
-
-
77956845914
-
Criptography based data security
-
Yovits M.C. (Ed), Academic Press, New York
-
Davida G.I., and Desmedt Y. Criptography based data security. In: Yovits M.C. (Ed). "Advances in Computers" 26 (1990), Academic Press, New York 171-222
-
(1990)
"Advances in Computers"
, vol.26
, pp. 171-222
-
-
Davida, G.I.1
Desmedt, Y.2
-
30
-
-
0041739557
-
Requirements engineering
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Davis A.M. Requirements engineering. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1043-1054
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1043-1054
-
-
Davis, A.M.1
-
31
-
-
77956779529
-
Human factors in human-computer system design
-
Yovits M.C. (Ed), Academic Press, New York
-
Day M.C., and Boyce S.J. Human factors in human-computer system design. In: Yovits M.C. (Ed). "Advances in Computers" 26 (1993), Academic Press, New York 333-430
-
(1993)
"Advances in Computers"
, vol.26
, pp. 333-430
-
-
Day, M.C.1
Boyce, S.J.2
-
32
-
-
77957168575
-
Data encryption
-
Hutt A.S., Bosworth S., and Hoyt D. (Eds), Macmillan Publishing, New York
-
Deavours C. Data encryption. In: Hutt A.S., Bosworth S., and Hoyt D. (Eds). "Computer Security Handbook" (1989), Macmillan Publishing, New York 228-241
-
(1989)
"Computer Security Handbook"
, pp. 228-241
-
-
Deavours, C.1
-
33
-
-
0024663629
-
A framework for expressing models of security policy
-
IEEE, Washington, DC.
-
Dobson J.E., and McDermid J.A. A framework for expressing models of security policy. Proc. Symposium on Security and Privacy (1989), IEEE, Washington, DC. 229-239
-
(1989)
Proc. Symposium on Security and Privacy
, pp. 229-239
-
-
Dobson, J.E.1
McDermid, J.A.2
-
34
-
-
35248850375
-
The importance of designing usable systems
-
Dray S. The importance of designing usable systems. Interactions 2 1 (1995) 17-20
-
(1995)
Interactions
, vol.2
, Issue.1
, pp. 17-20
-
-
Dray, S.1
-
36
-
-
0004310962
-
Stimulating change through usability testing
-
Dumas J.S. Stimulating change through usability testing. SIGCHI Bulletin 21 1 (1989) 37-44
-
(1989)
SIGCHI Bulletin
, vol.21
, Issue.1
, pp. 37-44
-
-
Dumas, J.S.1
-
37
-
-
77957131565
-
Fault-tolerant computing
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Eckman S. Fault-tolerant computing. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 1 (1994), John Wiley & Sons, New York 482-503
-
(1994)
"Encyclopedia of Software Engineering"
, vol.1
, pp. 482-503
-
-
Eckman, S.1
-
39
-
-
77957126119
-
A validated security policy modeling approach
-
IEEE, Washington, DC.
-
Freeman J.W., Neely R.B., and Heckard M.A. A validated security policy modeling approach. Proc. 10th Annual Computer Security Applications Conference (1994), IEEE, Washington, DC. 12
-
(1994)
Proc. 10th Annual Computer Security Applications Conference
, pp. 12
-
-
Freeman, J.W.1
Neely, R.B.2
Heckard, M.A.3
-
40
-
-
0001506016
-
On dynamically updating a computer system: From concept to prototype
-
Frieder O., and Segal M.E. On dynamically updating a computer system: From concept to prototype. J. Syst. Software 14 2 (1991) 111-128
-
(1991)
J. Syst. Software
, vol.14
, Issue.2
, pp. 111-128
-
-
Frieder, O.1
Segal, M.E.2
-
42
-
-
0023315571
-
Functionality and usability
-
Goodwin N. Functionality and usability. Comm. ACM 30 3 (1987) 229-233
-
(1987)
Comm. ACM
, vol.30
, Issue.3
, pp. 229-233
-
-
Goodwin, N.1
-
43
-
-
0002429852
-
How to design usable systems
-
Helander M. (Ed), Elsevier Science Publishers, New York
-
Gould J.D. How to design usable systems. In: Helander M. (Ed). "Handbook of Human-Computer Interaction" (1988), Elsevier Science Publishers, New York 757-789
-
(1988)
"Handbook of Human-Computer Interaction"
, pp. 757-789
-
-
Gould, J.D.1
-
44
-
-
0025724167
-
Making usable, useful, productivity-enhancing computer applications
-
Gould J.D., Boies S.J., and Lewis C. Making usable, useful, productivity-enhancing computer applications. Comm. ACM 34 1 (1991) 75-85
-
(1991)
Comm. ACM
, vol.34
, Issue.1
, pp. 75-85
-
-
Gould, J.D.1
Boies, S.J.2
Lewis, C.3
-
45
-
-
0024749433
-
The case against user interface consistency
-
Grudin J. The case against user interface consistency. Comm. ACM 32 10 (1989) 1164-1173
-
(1989)
Comm. ACM
, vol.32
, Issue.10
, pp. 1164-1173
-
-
Grudin, J.1
-
46
-
-
0003604349
-
-
Prentice Hall, Englewood Cliffs, NJ.
-
Guezzi C., Jazayeri M., and Mandrioli D. "Fundamentals of Software Engineering" (1991), Prentice Hall, Englewood Cliffs, NJ.
-
(1991)
"Fundamentals of Software Engineering"
-
-
Guezzi, C.1
Jazayeri, M.2
Mandrioli, D.3
-
47
-
-
0026850475
-
Real-time systems: Another perspective
-
Halang W.A. Real-time systems: Another perspective. J. Syst. Software 18 1 (1992) 101-108
-
(1992)
J. Syst. Software
, vol.18
, Issue.1
, pp. 101-108
-
-
Halang, W.A.1
-
50
-
-
0022583169
-
Software reliability in the system context
-
Hecht H., and Hecht M. Software reliability in the system context. IEEE Trans. Software Eng. 12 1 (1986) 51-58
-
(1986)
IEEE Trans. Software Eng.
, vol.12
, Issue.1
, pp. 51-58
-
-
Hecht, H.1
Hecht, M.2
-
51
-
-
0003689716
-
"A conceptual framework for system fault tolerance"
-
Software Engineering Institute, Carnegie Mellon University
-
Heimerdinger W.L., and Weinstock C.B. "A conceptual framework for system fault tolerance". Technical Report CMU/SEI-92-TR33 (1992), Software Engineering Institute, Carnegie Mellon University
-
(1992)
Technical Report CMU/SEI-92-TR33
-
-
Heimerdinger, W.L.1
Weinstock, C.B.2
-
52
-
-
0018918712
-
Specifying software requirements for complex systems: New techniques and their applications
-
Heninger K.L. Specifying software requirements for complex systems: New techniques and their applications. IEEE Trans. Software Eng. 6 1 (1980) 2-13
-
(1980)
IEEE Trans. Software Eng.
, vol.6
, Issue.1
, pp. 2-13
-
-
Heninger, K.L.1
-
53
-
-
0025488954
-
Generations of user interface management systems
-
Hix D. Generations of user interface management systems. IEEE Software 7 5 (1990) 77-87
-
(1990)
IEEE Software
, vol.7
, Issue.5
, pp. 77-87
-
-
Hix, D.1
-
54
-
-
84976789374
-
Cryptography policy
-
Hoffman L.J., Ali F.A., Heckler S.L., and Huybrechts A. Cryptography policy. Comm. ACM 37 9 (1994) 109-117
-
(1994)
Comm. ACM
, vol.37
, Issue.9
, pp. 109-117
-
-
Hoffman, L.J.1
Ali, F.A.2
Heckler, S.L.3
Huybrechts, A.4
-
55
-
-
77957169348
-
Management's role in computer security
-
Hutt A.S., Bosworth S., and Hoyt D. (Eds), Macmillan Publishing, New York
-
Hutt A. Management's role in computer security. In: Hutt A.S., Bosworth S., and Hoyt D. (Eds). "Computer Security Handbook" (1989), Macmillan Publishing, New York 3-21
-
(1989)
"Computer Security Handbook"
, pp. 3-21
-
-
Hutt, A.1
-
56
-
-
0010057281
-
Software reliability theory
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Iannino A. Software reliability theory. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1237-1253
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1237-1253
-
-
Iannino, A.1
-
57
-
-
77956717290
-
Software reliability
-
Yovits M.C. (Ed), Academic Press, New York
-
Iannino J., and Musa J.D. Software reliability. In: Yovits M.C. (Ed). "Advances in Computers" 26 (1990), Academic Press, New York 85-170
-
(1990)
"Advances in Computers"
, vol.26
, pp. 85-170
-
-
Iannino, J.1
Musa, J.D.2
-
58
-
-
0026121769
-
Software requirements analysis for real-time process-control systems
-
Jaffe M.S., Leveson N., Heimdahl M., and Melhart B.E. Software requirements analysis for real-time process-control systems. IEEE Trans. Software Eng. SE-17 3 (1991) 241-258
-
(1991)
IEEE Trans. Software Eng.
, vol.SE-17
, Issue.3
, pp. 241-258
-
-
Jaffe, M.S.1
Leveson, N.2
Heimdahl, M.3
Melhart, B.E.4
-
59
-
-
0023399846
-
A graph-theoretic approach for timing analysis and its implementation
-
Jahanian F., and Mok A.K. A graph-theoretic approach for timing analysis and its implementation. IEEE Trans. Computers 36 8 (1987) 961-975
-
(1987)
IEEE Trans. Computers
, vol.36
, Issue.8
, pp. 961-975
-
-
Jahanian, F.1
Mok, A.K.2
-
60
-
-
0023312154
-
The use of software complexity metrics in software maintenance
-
Kafura D., and Reddy G.R. The use of software complexity metrics in software maintenance. IEEE Trans. Software Eng. SE-13 3 (1987) 335-343
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.3
, pp. 335-343
-
-
Kafura, D.1
Reddy, G.R.2
-
61
-
-
0003698902
-
Specifying software quality requirements with metrics
-
Thayer R.D., and Dorfman M. (Eds), IEEE, Los Alamitos, CA.
-
Keller S.E., Kalian L.G., and Panara R.B. Specifying software quality requirements with metrics. In: Thayer R.D., and Dorfman M. (Eds). "System and Software Requirements Engineering" (1990), IEEE, Los Alamitos, CA. 145-163
-
(1990)
"System and Software Requirements Engineering"
, pp. 145-163
-
-
Keller, S.E.1
Kalian, L.G.2
Panara, R.B.3
-
62
-
-
0038118997
-
Security
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Kemmerer R.A. Security. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1153-1164
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1153-1164
-
-
Kemmerer, R.A.1
-
63
-
-
30244475666
-
Timing-constraints in the requirements specification of hard real-time systems
-
Verlag der Augustinus, Aachen, Germany
-
Kirner T.G., and Davis A.M. Timing-constraints in the requirements specification of hard real-time systems. Proc. REFSQ'94 Int. Requirements Engineering Workshop (1994), Verlag der Augustinus, Aachen, Germany 33-44
-
(1994)
Proc. REFSQ'94 Int. Requirements Engineering Workshop
, pp. 33-44
-
-
Kirner, T.G.1
Davis, A.M.2
-
64
-
-
30244541189
-
Real-time systems
-
McDermid J. (Ed), CRC Press, Boca Raton, FL.
-
Kopetz H. Real-time systems. In: McDermid J. (Ed). "Software Engineer's Reference Book" (1991), CRC Press, Boca Raton, FL. 56/3-56/9
-
(1991)
"Software Engineer's Reference Book"
-
-
Kopetz, H.1
-
65
-
-
0026158240
-
The design of real-time systems: From specification to implementation and verification
-
Kopetz H., Zainlinger G., Fohler G., Kantz H., Puschner P., and Schutz W. The design of real-time systems: From specification to implementation and verification. Software Eng. J. 6 3 (1991) 72-82
-
(1991)
Software Eng. J.
, vol.6
, Issue.3
, pp. 72-82
-
-
Kopetz, H.1
Zainlinger, G.2
Fohler, G.3
Kantz, H.4
Puschner, P.5
Schutz, W.6
-
66
-
-
85031901890
-
Paradigms for real-time systems
-
Springer-Verlag, Berlin, Germany
-
Koymans R., and Kuiper R. Paradigms for real-time systems. "Lecture Notes in Computer Science" 331 (1988), Springer-Verlag, Berlin, Germany 159-174
-
(1988)
"Lecture Notes in Computer Science"
, vol.331
, pp. 159-174
-
-
Koymans, R.1
Kuiper, R.2
-
67
-
-
0019608720
-
Formal models for computer security
-
Landwehr C.E. Formal models for computer security. Computing Surveys 13 3 (1981) 247-278
-
(1981)
Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
68
-
-
0025457846
-
Definition and analysis of hardware and software fault-tolerant architectures
-
Laprie J.C., Arlat J., Beounes C., and Kanoun K. Definition and analysis of hardware and software fault-tolerant architectures. IEEE Computer 23 7 (1990) 39-51
-
(1990)
IEEE Computer
, vol.23
, Issue.7
, pp. 39-51
-
-
Laprie, J.C.1
Arlat, J.2
Beounes, C.3
Kanoun, K.4
-
69
-
-
0006501693
-
Real-time resource management techniques
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Lehoczky J. Real-time resource management techniques. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1011-1020
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1011-1020
-
-
Lehoczky, J.1
-
70
-
-
0022730231
-
Software safety: What, why, and how
-
Leveson N.G. Software safety: What, why, and how. Computing Surveys 18 2 (1986) 125-164
-
(1986)
Computing Surveys
, vol.18
, Issue.2
, pp. 125-164
-
-
Leveson, N.G.1
-
71
-
-
77957150705
-
Safety as a software quality
-
Leveson N.G. Safety as a software quality. IEEE Software 6 3 (1989) 88-89
-
(1989)
IEEE Software
, vol.6
, Issue.3
, pp. 88-89
-
-
Leveson, N.G.1
-
72
-
-
0025510705
-
The challenge of building process-control software
-
Leveson N.G. The challenge of building process-control software. IEEE Software 7 2 (1990) 55-62
-
(1990)
IEEE Software
, vol.7
, Issue.2
, pp. 55-62
-
-
Leveson, N.G.1
-
73
-
-
0026104017
-
Software safety in embedded computer systems
-
Leveson N.G. Software safety in embedded computer systems. Comm. ACM 34 2 (1991) 34-47
-
(1991)
Comm. ACM
, vol.34
, Issue.2
, pp. 34-47
-
-
Leveson, N.G.1
-
74
-
-
77957122596
-
Safety
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Leveson N.G. Safety. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1108-1133
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1108-1133
-
-
Leveson, N.G.1
-
75
-
-
0026188075
-
Software verification of Acta programs using software fault trees
-
Leveson N.G., Cha S.S., and Shimeall T.J. Software verification of Acta programs using software fault trees. IEEE Software 8 4 (1991) 48-59
-
(1991)
IEEE Software
, vol.8
, Issue.4
, pp. 48-59
-
-
Leveson, N.G.1
Cha, S.S.2
Shimeall, T.J.3
-
80
-
-
77957157925
-
Rapid prototyping
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Yeh L.R. Rapid prototyping. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 978-984
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 978-984
-
-
Yeh, L.R.1
-
81
-
-
84956602782
-
Analyzing software requirements errors in safety-critical, embedded systems
-
IEEE, Los Alamitos, CA.
-
Lutz R. Analyzing software requirements errors in safety-critical, embedded systems. Proc. International Symposium on Requirements Specification (1992), IEEE, Los Alamitos, CA. 126-133
-
(1992)
Proc. International Symposium on Requirements Specification
, pp. 126-133
-
-
Lutz, R.1
-
83
-
-
0017291489
-
A complexity measure
-
McCabe T.J. A complexity measure. IEEE Trans. Software Eng. 2 12 (1976) 308-320
-
(1976)
IEEE Trans. Software Eng.
, vol.2
, Issue.12
, pp. 308-320
-
-
McCabe, T.J.1
-
84
-
-
0001395603
-
Quality factors
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
McCall J. Quality factors. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 958-969
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 958-969
-
-
McCall, J.1
-
85
-
-
0026070624
-
Issues in developing software for safety-critical systems
-
Littlewood B., and Miller D. (Eds), Elsevier Applied Science, London
-
McDermid J.A. Issues in developing software for safety-critical systems. In: Littlewood B., and Miller D. (Eds). "Software Reliability and Safety" (1991), Elsevier Applied Science, London 1-24
-
(1991)
"Software Reliability and Safety"
, pp. 1-24
-
-
McDermid, J.A.1
-
87
-
-
0023218630
-
Reasoning about security models
-
IEEE, Washington, DC.
-
McLean J. Reasoning about security models. Proc. Symposium on Security and Privacy (1987), IEEE, Washington, DC. 123-131
-
(1987)
Proc. Symposium on Security and Privacy
, pp. 123-131
-
-
McLean, J.1
-
88
-
-
0003307796
-
Security models
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
McLean J. Security models. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1136-1144
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1136-1144
-
-
McLean, J.1
-
89
-
-
0028208163
-
Retrofitting software safety in an implant-able medical device
-
Mojdehbakhsh R., Tsai W., and Elliot L. Retrofitting software safety in an implant-able medical device. IEEE Software 11 1 (1994) 41-50
-
(1994)
IEEE Software
, vol.11
, Issue.1
, pp. 41-50
-
-
Mojdehbakhsh, R.1
Tsai, W.2
Elliot, L.3
-
90
-
-
0025512961
-
Software reliability engineering: Technology for the 1990's
-
Musa J.D., and Everett W. Software reliability engineering: Technology for the 1990's. IEEE Software 7 6 (1990) 36-43
-
(1990)
IEEE Software
, vol.7
, Issue.6
, pp. 36-43
-
-
Musa, J.D.1
Everett, W.2
-
91
-
-
77957145689
-
Software reliability engineering
-
Marciniak J. (Ed), Joh Wiley & Sons, New York
-
Musa J.D., Everett W., Ackerman A.F., and Wilson G.A. Software reliability engineering. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), Joh Wiley & Sons, New York 1223-1236
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1223-1236
-
-
Musa, J.D.1
Everett, W.2
Ackerman, A.F.3
Wilson, G.A.4
-
93
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
Mylopoulos J.L., Chung S., and Nixon B. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Trans. Software Eng. 18 6 (1992) 483-497
-
(1992)
IEEE Trans. Software Eng.
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.L.1
Chung, S.2
Nixon, B.3
-
94
-
-
0026202569
-
A case history analysis of software error cause-effect relationship
-
Nakajo T., and Kume H. A case history analysis of software error cause-effect relationship. IEEE Trans. Software Eng. 17 8 (1991) 830-834
-
(1991)
IEEE Trans. Software Eng.
, vol.17
, Issue.8
, pp. 830-834
-
-
Nakajo, T.1
Kume, H.2
-
95
-
-
84942213063
-
Issues in building dynamic real-time requirements
-
Natarajan S., and Zhao W. Issues in building dynamic real-time requirements. IEEE Software 9 5 (1992) 16-21
-
(1992)
IEEE Software
, vol.9
, Issue.5
, pp. 16-21
-
-
Natarajan, S.1
Zhao, W.2
-
96
-
-
0025455576
-
Fault-tolerant computing: Fundamental concepts
-
Nelson V. Fault-tolerant computing: Fundamental concepts. IEEE Computer 23 7 (1990) 19-25
-
(1990)
IEEE Computer
, vol.23
, Issue.7
, pp. 19-25
-
-
Nelson, V.1
-
97
-
-
2142703299
-
On hierarchical design of computer systems for critical applications
-
Neuman P.G. On hierarchical design of computer systems for critical applications. IEEE Trans. Software Eng. 12 9 (1986) 905-920
-
(1986)
IEEE Trans. Software Eng.
, vol.12
, Issue.9
, pp. 905-920
-
-
Neuman, P.G.1
-
98
-
-
0027274482
-
Myths of dependable computing: Shooting the straw herrings in midstream
-
IEEE, Picata-way, NJ.
-
Neuman P.G. Myths of dependable computing: Shooting the straw herrings in midstream. Proc. COMPASS'93 Computer Assurance Conference (1993), IEEE, Picata-way, NJ. 1-4
-
(1993)
Proc. COMPASS'93 Computer Assurance Conference
, pp. 1-4
-
-
Neuman, P.G.1
-
99
-
-
0026839486
-
The usability engineering life cycle
-
Nielsen J. The usability engineering life cycle. IEEE Computer 25 3 (1992) 12-22
-
(1992)
IEEE Computer
, vol.25
, Issue.3
, pp. 12-22
-
-
Nielsen, J.1
-
100
-
-
0023588487
-
Building and sustaining software maintainability
-
IEEE, Washington, DC
-
Osborne W. Building and sustaining software maintainability. Proc. Conference of Software Maintenance (1987), IEEE, Washington, DC 14-24
-
(1987)
Proc. Conference of Software Maintenance
, pp. 14-24
-
-
Osborne, W.1
-
102
-
-
0025436318
-
Evaluation of safety-critical software
-
Parnas D.L., Schouwen J., and Kwan S.P. Evaluation of safety-critical software. Comm. ACM 33 6 (1990) 836-846
-
(1990)
Comm. ACM
, vol.33
, Issue.6
, pp. 836-846
-
-
Parnas, D.L.1
Schouwen, J.2
Kwan, S.P.3
-
104
-
-
0003635535
-
Maintenance
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Pigoski T.M. Maintenance. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 1 (1994), John Wiley & Sons, New York 619-636
-
(1994)
"Encyclopedia of Software Engineering"
, vol.1
, pp. 619-636
-
-
Pigoski, T.M.1
-
105
-
-
5244260963
-
Safety-critical software
-
Software Engineering Institute, Carnegie Mellon University
-
Place P., and Kang K. Safety-critical software. Technical Report CMU/SEI-93-TR5 (1993), Software Engineering Institute, Carnegie Mellon University
-
(1993)
Technical Report CMU/SEI-93-TR5
-
-
Place, P.1
Kang, K.2
-
107
-
-
33748152580
-
Issues in the development of large, distributed, and reliable software
-
Academic Press, New York
-
Ramamoorthy C.V., Prakash A., Garg V., Yamaura T., and Bhide A. Issues in the development of large, distributed, and reliable software. "Advances in Computers" 26 (1987), Academic Press, New York 396-443
-
(1987)
"Advances in Computers"
, vol.26
, pp. 396-443
-
-
Ramamoorthy, C.V.1
Prakash, A.2
Garg, V.3
Yamaura, T.4
Bhide, A.5
-
108
-
-
0027811839
-
On-line scheduling of hard deadline aperiodic tasks in fixed-priority systems
-
IEEE, Washington, DC.
-
Ramos S., and Lehoczky J.P. On-line scheduling of hard deadline aperiodic tasks in fixed-priority systems. Proc. Real-Time Systems Symposium (1993), IEEE, Washington, DC. 160-171
-
(1993)
Proc. Real-Time Systems Symposium
, pp. 160-171
-
-
Ramos, S.1
Lehoczky, J.P.2
-
112
-
-
0024122060
-
Dynamic program updating in a distributed computer system
-
IEEE, Washington, DC.
-
Segal M.K., and Frieder O. Dynamic program updating in a distributed computer system. Proc. Conference on Software Maintenance (1988), IEEE, Washington, DC. 198-203
-
(1988)
Proc. Conference on Software Maintenance
, pp. 198-203
-
-
Segal, M.K.1
Frieder, O.2
-
113
-
-
0024888458
-
Dynamically updating distributed software: Supporting change in uncertain and mistrustful environments
-
IEEE, Washington, DC.
-
Segal M.K., and Frieder O. Dynamically updating distributed software: Supporting change in uncertain and mistrustful environments. Proc. Conference on Software Maintenance (1989), IEEE, Washington, DC. 254-261
-
(1989)
Proc. Conference on Software Maintenance
, pp. 254-261
-
-
Segal, M.K.1
Frieder, O.2
-
114
-
-
84942213046
-
On-the-fly program modification: Systems for dynamic updating
-
Segal M.K., and Frieder O. On-the-fly program modification: Systems for dynamic updating. IEEE Software 10 2 (1993) 53-65
-
(1993)
IEEE Software
, vol.10
, Issue.2
, pp. 53-65
-
-
Segal, M.K.1
Frieder, O.2
-
116
-
-
77957174188
-
Computer security
-
McDermid J. (Ed), CRC Press, Boca Raton, FL.
-
Sennett C.T. Computer security. In: McDermid J. (Ed). "Software Engineer's Reference Book" (1991), CRC Press, Boca Raton, FL. 59/3-59/11
-
(1991)
"Software Engineer's Reference Book"
-
-
Sennett, C.T.1
-
117
-
-
0038849540
-
Real-time scheduling theory and Ada
-
Sha L., and Goodenough J.B. Real-time scheduling theory and Ada. IEEE Computer 23 4 (1990) 53-64
-
(1990)
IEEE Computer
, vol.23
, Issue.4
, pp. 53-64
-
-
Sha, L.1
Goodenough, J.B.2
-
118
-
-
77957164926
-
Rate monotonic analysis
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Sha L., and Rajkumar R. Rate monotonic analysis. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 984-991
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 984-991
-
-
Sha, L.1
Rajkumar, R.2
-
119
-
-
0003129774
-
The concept of usability
-
Bennett J., Case D., Sandelin J., and Smith M. (Eds), Prentice Hall, Englewood Cliffs, NJ.
-
Shackel B. The concept of usability. In: Bennett J., Case D., Sandelin J., and Smith M. (Eds). "Visual Display Terminals: Issues and Health Concerns" (1984), Prentice Hall, Englewood Cliffs, NJ. 45-87
-
(1984)
"Visual Display Terminals: Issues and Health Concerns"
, pp. 45-87
-
-
Shackel, B.1
-
120
-
-
0026187925
-
A pre-run-time scheduling algorithm for hard realtime systems
-
Shepard T., and Gaigné J.A. A pre-run-time scheduling algorithm for hard realtime systems. IEEE Trans. Software Eng. 17 7 (1991) 669-677
-
(1991)
IEEE Trans. Software Eng.
, vol.17
, Issue.7
, pp. 669-677
-
-
Shepard, T.1
Gaigné, J.A.2
-
121
-
-
33846569077
-
User interface management systems
-
Marciniak J. (Ed), John Wiley & Sons, New York
-
Sheppard S., and Rouff C. User interface management systems. In: Marciniak J. (Ed). "Encyclopedia of Software Engineering" 2 (1994), John Wiley & Sons, New York 1402-1408
-
(1994)
"Encyclopedia of Software Engineering"
, vol.2
, pp. 1402-1408
-
-
Sheppard, S.1
Rouff, C.2
-
122
-
-
0028495982
-
A critique of three metrics
-
Shepperd M., and Ince D.C. A critique of three metrics. J. Syst. Software 26 3 (1994) 197-210
-
(1994)
J. Syst. Software
, vol.26
, Issue.3
, pp. 197-210
-
-
Shepperd, M.1
Ince, D.C.2
-
123
-
-
77957140692
-
Fault-tolerant system structuring concepts
-
McDermid J. (Ed), CRC Press, Boca Raton, FL.
-
Shrivastava S.K. Fault-tolerant system structuring concepts. In: McDermid J. (Ed). "Software Engineer's Reference Book" (1991), CRC Press, Boca Raton, FL. 61/3-61/16
-
(1991)
"Software Engineer's Reference Book"
-
-
Shrivastava, S.K.1
-
125
-
-
0024088604
-
Misconception about real-time computing: A serious problem for next-generation systems
-
Stankovic J.A. Misconception about real-time computing: A serious problem for next-generation systems. IEEE Computer 21 10 (1988) 10-19
-
(1988)
IEEE Computer
, vol.21
, Issue.10
, pp. 10-19
-
-
Stankovic, J.A.1
-
126
-
-
34249962669
-
What is predictability for real-time systems?
-
Stankovic J.A., and Ramamritham K. What is predictability for real-time systems?. Real-Time Syst. 2 4 (1990) 247-254
-
(1990)
Real-Time Syst.
, vol.2
, Issue.4
, pp. 247-254
-
-
Stankovic, J.A.1
Ramamritham, K.2
-
127
-
-
0026152309
-
The spring kernel: A new paradigm for realtime systems
-
Stankovic J.A., and Ramamritham K. The spring kernel: A new paradigm for realtime systems. IEEE Software 8 3 (1991) 62-72
-
(1991)
IEEE Software
, vol.8
, Issue.3
, pp. 62-72
-
-
Stankovic, J.A.1
Ramamritham, K.2
-
128
-
-
84946967639
-
Extending pearl for industrial real-time applications
-
Stoyenco A.D., and Halang W.A. Extending pearl for industrial real-time applications. IEEE Software 10 4 (1993) 65-80
-
(1993)
IEEE Software
, vol.10
, Issue.4
, pp. 65-80
-
-
Stoyenco, A.D.1
Halang, W.A.2
-
129
-
-
0028445072
-
Real-time: Further misconceptions (or half truths
-
Suonio R. Real-time: Further misconceptions (or half truths. IEEE Computer 27 6 (1994) 71-76
-
(1994)
IEEE Computer
, vol.27
, Issue.6
, pp. 71-76
-
-
Suonio, R.1
-
131
-
-
0028700287
-
Modeling and parallel evaluation of non-functional requirements using FRORL requirements language
-
IEEE, Los Alamitos, CA.
-
Tsai J.P., Li B., and Liu A. Modeling and parallel evaluation of non-functional requirements using FRORL requirements language. Proc. COMPSAC'94 18th Annual Int. Computer Software & Applications Conference (1994), IEEE, Los Alamitos, CA.
-
(1994)
Proc. COMPSAC'94 18th Annual Int. Computer Software & Applications Conference
-
-
Tsai, J.P.1
Li, B.2
Liu, A.3
-
132
-
-
0023867959
-
Verifying and validating software for maintainability
-
IEEE, Washington, DC.
-
Wallace D., and Daughtrey T. Verifying and validating software for maintainability. Proc. Computer Standards Conference (1988), IEEE, Washington, DC. 41-46
-
(1988)
Proc. Computer Standards Conference
, pp. 41-46
-
-
Wallace, D.1
Daughtrey, T.2
-
133
-
-
77957132657
-
An analysis of selected software safety standards
-
IEEE, Piscataway, NJ.
-
Wallace D., Kuln R., and Ippolito L.M. An analysis of selected software safety standards. Proc. COMPASS'92 Computer Assurance Conference (1992), IEEE, Piscataway, NJ. 123-136
-
(1992)
Proc. COMPASS'92 Computer Assurance Conference
, pp. 123-136
-
-
Wallace, D.1
Kuln, R.2
Ippolito, L.M.3
-
135
-
-
0025403192
-
Scheduling processes with release-times, deadlines, precedence, and exclusion relations
-
Xu J., and Parnas D.L. Scheduling processes with release-times, deadlines, precedence, and exclusion relations. IEEE Trans. Software Eng. 16 3 (1990) 360-369
-
(1990)
IEEE Trans. Software Eng.
, vol.16
, Issue.3
, pp. 360-369
-
-
Xu, J.1
Parnas, D.L.2
-
136
-
-
0027259585
-
On satisfying timing-constraints in hard real-time systems
-
Xu J., and Parnas D.L. On satisfying timing-constraints in hard real-time systems. IEEE Trans. Software Eng. 19 1 (1993) 70-84
-
(1993)
IEEE Trans. Software Eng.
, vol.19
, Issue.1
, pp. 70-84
-
-
Xu, J.1
Parnas, D.L.2
|