-
1
-
-
0022252695
-
N-version approach to fault tolerant software
-
Dec
-
A. Avizienis. N-Version Approach to fault tolerant Software. IEEE Software eg, vol-SE11, No12, Dec 1985.
-
(1985)
IEEE Software eg
, vol.SE11
, Issue.12
-
-
Avizienis, A.1
-
2
-
-
84874257101
-
An overview of ELAN
-
C. Kirchner and H. Kirchner, eds., International Workshop on Rewriting Logic and Its Applications, France. Elsevier Science
-
P. Borovansky, C. Kirchner, H. Kirchner, P.-E. Moreau, and C. Ringeissen. An Overview of ELAN. In C. Kirchner and H. Kirchner, eds., International Workshop on Rewriting Logic and its Applications, volume 15 of Electronic Notes in Theoretical Computer Science, France, 1998. Elsevier Science.
-
(1998)
Electronic Notes in Theoretical Computer Science
, vol.15
-
-
Borovansky, P.1
Kirchner, C.2
Kirchner, H.3
Moreau, P.-E.4
Ringeissen, C.5
-
3
-
-
0029694846
-
Automated proofs of object code for a widely used microprocessor
-
January
-
Robert S. Boyer and Yuan Yu. Automated proofs of object code for a widely used microprocessor. Journal of the ACM, 43(1):166-192, January 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.1
, pp. 166-192
-
-
Boyer, R.S.1
Yu, Y.2
-
4
-
-
0003523184
-
Term rewriting with traversal functions
-
Centrum voor Wiskunde en Informatica
-
M. van den Brand, P. Klint, and J. Vinju. Term rewriting with traversal functions. Technical Report SEN-R0121, Centrum voor Wiskunde en Informatica, 2001.
-
(2001)
Technical Report
, vol.SEN-R0121
-
-
Van den Brand, M.1
Klint, P.2
Vinju, J.3
-
5
-
-
2942629663
-
Java proving itself worthy for defense apps
-
July
-
J. Child. Java Proving Itself Worthy for Defense Apps. COTS Journal, pp25-28, July 2003
-
(2003)
COTS Journal
, pp. 25-28
-
-
Child, J.1
-
6
-
-
0022232712
-
A theoretical basis for the analysis of multiversion software subject to coincident errors
-
D. E. Eckhardt and L. D. Lee. "A Theoretical Basis for the Analysis of Multiversion Software Subject to Coincident Errors," IEEE Trans, on Software Engineering, vol. SE-11, no. 12, pp. 1511-17, 1985.
-
(1985)
IEEE Trans, on Software Engineering
, vol.SE-11
, Issue.12
, pp. 1511-1517
-
-
Eckhardt, D.E.1
Lee, L.D.2
-
11
-
-
0344510616
-
A reply to the criticisms of the Knight & Leveson experiment
-
January
-
Knight and N. Leveson. A reply to the criticisms of the Knight & Leveson experiment. ACM SIGSOFT Software Engineering Notes, 15(1):25-35, January 1990.
-
(1990)
ACM SIGSOFT Software Engineering Notes
, vol.15
, Issue.1
, pp. 25-35
-
-
Knight1
Leveson, N.2
-
12
-
-
0036376004
-
Typed generic traversal with term rewriting strategies
-
R. Lämmel. Typed Generic Traversal With Term Rewriting Strategies. Journal of Logic and Algebraic Programming, Vol 54, pp 1-64, 2003.
-
(2003)
Journal of Logic and Algebraic Programming
, vol.54
, pp. 1-64
-
-
Lämmel, R.1
-
17
-
-
0346892959
-
Proving theorem about java-like byte code
-
E.-R. Olderog and B. Steffen, editor, correct system design-Recent Insight and Advances, Heidelberg
-
J S. Moore. Proving Theorem about Java-like byte code. In E.-R. Olderog and B. Steffen, editor, correct system design-Recent Insight and Advances, pages 139-162, Heidelberg, 1999. LNCS 1710
-
(1999)
LNCS
, vol.1710
, pp. 139-162
-
-
Moore, J.S.1
-
18
-
-
2942538662
-
Proving theorems about java and the JVM with ACL2
-
M. Broy and M. Pizka (eds), IOS Press, Amsterdam
-
J S. Moore. Proving Theorems about Java and the JVM with ACL2. Models, Algebras and Logic of Engineering Software, M. Broy and M. Pizka (eds), IOS Press, Amsterdam, pp 227-290, 2003.
-
(2003)
Models, Algebras and Logic of Engineering Software
, pp. 227-290
-
-
Moore, J.S.1
-
20
-
-
33747097418
-
Tom lynch, and matt kaufmann. A mechanically checked proof of the correctness of the kernel of the AMD5K86 floating-point division algorithm
-
Sep.
-
J S. Moore, Tom Lynch, and Matt Kaufmann. A Mechanically Checked Proof of the Correctness of the Kernel of the AMD5K86 Floating-Point Division Algorithm. IEEE Transactions on Computers, 47(9), pp. 913-926, Sep., 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.9
, pp. 913-926
-
-
Moore, J.S.1
-
21
-
-
0346892959
-
Proving theorems about Javalike byte code
-
E.-R. Olderog and B. Steffen, Eds., Correct System Design-Recent Insights and Advances, Springer-Verlag, Berlin
-
J S. Moore. Proving theorems about Javalike byte code. In E.-R. Olderog and B. Steffen, Eds., Correct System Design-Recent Insights and Advances, LNCS 1710, pp. 139-162. Springer-Verlag, Berlin 1999.
-
(1999)
LNCS
, vol.1710
, pp. 139-162
-
-
Moore, J.S.1
-
23
-
-
19144364637
-
Scoped dynamic rewrite rules
-
M. van den Brand and R. Verma, editors. Elsevier Science Publishers, Rule Based Programming (RULE'01), September
-
E. Visser. Scoped dynamic rewrite rules. In M. van den Brand and R. Verma, editors, Rule Based Programming (RULE'01), volume 59/4 of Electronic Notes in Theoretical Computer Science. Elsevier Science Publishers, September 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.59
, Issue.4
-
-
Visser, E.1
-
24
-
-
0042240385
-
Language independent traversals for program transformation
-
Johan Jeuring, editor, Ponte de Lima, Portugal, July
-
E. Visser. Language Independent Traversals for Program Transformation. In Johan Jeuring, editor, Workshop on Generic Programming (WGP'00), Ponte de Lima, Portugal, July 2000.
-
(2000)
Workshop on Generic Programming (WGP'00)
-
-
Visser, E.1
-
25
-
-
84957646737
-
Strategic pattern matching
-
Rewriting Techniques and Applications (RTA '99), Trento
-
E. Visser. Strategic Pattern Matching. In: Rewriting Techniques and Applications (RTA '99), Trento, Lecture Notes in Computer Science (1999).
-
(1999)
Lecture Notes in Computer Science
-
-
Visser, E.1
-
26
-
-
84862372039
-
-
HATS - http://faculty.ist.unomaha.edu/winter/hatsuno/HATSWEB/index.html
-
-
-
-
27
-
-
0041681812
-
Assuring passive safety in high consequence systems
-
April
-
V. L. Winter, J. M. Covan, and L. J. Dalton. Assuring Passive Safety in High Consequence Systems. IEEE Computer Vol 31, No. 4, April, 1998, pp 35-36.
-
(1998)
IEEE Computer
, vol.31
, Issue.4
, pp. 35-36
-
-
Winter, V.L.1
Covan, J.M.2
Dalton, L.J.3
-
28
-
-
77956749049
-
Transformation-oriented programming: A development methodology for high assurance software
-
to appear
-
V.L. Winter, S. Roach, G. Wickstrom. Transformation-Oriented Programming: A Development Methodology for High Assurance Software. Advances in Computers vol 58, to appear.
-
Advances in Computers
, vol.58
-
-
Winter, V.L.1
Roach, S.2
Wickstrom, G.3
|