-
1
-
-
0004617905
-
-
Oxford University Computing Lab, Technical Report, June
-
Bowen, J., M. Hinchey, "Seven More Myths of Formal Methods", Oxford University Computing Lab, Technical Report PRG-TR-7-94, June 1994.
-
(1994)
Seven More Myths of Formal Methods
-
-
Bowen, J.1
Hinchey, M.2
-
2
-
-
0024012763
-
A spiral model of software development
-
May
-
Boehm, B., "A Spiral Model of Software Development", IEEE Computer, May 1988, pp. 61-72.
-
(1988)
IEEE Computer
, pp. 61-72
-
-
Boehm, B.1
-
3
-
-
0029253405
-
Specification and validation of a security policy model
-
Feb.
-
Boswell, A., "Specification and Validation of a Security Policy Model", IEEE Transactions on Software Engineering, Vol. 21, No. 2, Feb. 1995, pp. 63-68.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.2
, pp. 63-68
-
-
Boswell, A.1
-
4
-
-
0029251401
-
Formal methods reality check: Industrial usage
-
Feb.
-
Craigen, D., S. Gerhart, and T. Ralston, "Formal Methods Reality Check: Industrial Usage", IEEE Transactions on Software Engineering, Vol. 21, No. 2, Feb. 1995, pp. 90-98.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.2
, pp. 90-98
-
-
Craigen, D.1
Gerhart, S.2
Ralston, T.3
-
6
-
-
0018466858
-
Social processes and proofs of theorems and programs
-
May
-
DeMillo, R., R. Lipton, and A. Perlis, Social Processes and Proofs of Theorems and Programs, Communications of the ACM, Vol. 22, No. 5, May 1979, pp. 271-280.
-
(1979)
Communications of the ACM
, vol.22
, Issue.5
, pp. 271-280
-
-
DeMillo, R.1
Lipton, R.2
Perlis, A.3
-
7
-
-
0024085326
-
Program verification: The very idea
-
Sept.
-
Fetzer, J., "Program Verification: The Very Idea", Communications of the ACM, Vol. 31, No. 9, Sept. 1988.
-
(1988)
Communications of the ACM
, vol.31
, Issue.9
-
-
Fetzer, J.1
-
8
-
-
0028516418
-
Strategies for incorporating formal specifications in software development
-
Oct.
-
Fraser, M., K. Kumar, and V. Vaishnavi, Strategies for Incorporating Formal Specifications in Software Development, Communications of the ACM, Vol. 37, No. 10, Oct. 1994, pp. 74-86.
-
(1994)
Communications of the ACM
, vol.37
, Issue.10
, pp. 74-86
-
-
Fraser, M.1
Kumar, K.2
Vaishnavi, V.3
-
10
-
-
0025489197
-
Seven myths of formal methods
-
Sept.
-
Hall, A., "Seven Myths of Formal Methods", IEEE Software, Vol. 7, No. 5, Sept. 1990.
-
(1990)
IEEE Software
, vol.7
, Issue.5
-
-
Hall, A.1
-
11
-
-
0022012274
-
Applying formal specification to software development in industry
-
Feb.
-
Hayes, I., "Applying Formal Specification to Software Development in Industry", IEEE Transactions on Software Engineering, Vol. SE-11, No. 2, Feb. 1985, pp. 169-178.
-
(1985)
IEEE Transactions on Software Engineering
, vol.SE-11
, Issue.2
, pp. 169-178
-
-
Hayes, I.1
-
12
-
-
0018918712
-
Specifying software requirements for complex systems: New techniques and their application
-
Jan.
-
Heninger, K, "Specifying Software Requirements for Complex Systems: New Techniques and their Application", IEEE Transactions on Software Engineering, Vol. SE-6, No. 1, Jan. 1980.
-
(1980)
IEEE Transactions on Software Engineering
, vol.SE-6
, Issue.1
-
-
Heninger, K.1
-
13
-
-
0042256760
-
-
Prentice-Hall, Inc., Englewood Cliffs, New Jersey
-
Henley, E. J. and H. Kumamoto, Designing for Reliability and Safety Control, Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 1985, pp. 407-458.
-
(1985)
Designing for Reliability and Safety Control
, pp. 407-458
-
-
Henley, E.J.1
Kumamoto, H.2
-
14
-
-
0025492027
-
Integrating formal methods into the development process
-
Sept.
-
Kemmerer, R. A., "Integrating Formal Methods into the Development Process", IEEE Software, Sept. 1990, pp. 37-50.
-
(1990)
IEEE Software
, pp. 37-50
-
-
Kemmerer, R.A.1
-
15
-
-
0003430070
-
-
Academic Press, San Diego, California
-
McCormick, N. J., Reliability and Risk Analysis, Academic Press, San Diego, California, 1981, pp. 154-228.
-
(1981)
Reliability and Risk Analysis
, pp. 154-228
-
-
McCormick, N.J.1
-
16
-
-
0022667615
-
A rational design process: How and why to fake it
-
Feb.
-
Pamas, D., P. Clements, "A Rational Design Process: How and Why to Fake It", IEEE Transactions on Software Engineering, Vol. SE-12, No. 2, Feb. 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.SE-12
, Issue.2
-
-
Pamas, D.1
Clements, P.2
-
17
-
-
0004282186
-
-
John Wiley and Sons, New York
-
Roland, H. E. and B. Moriarty, System Safety Engineering and Management, John Wiley and Sons, New York, 1983, pp. 215-271.
-
(1983)
System Safety Engineering and Management
, pp. 215-271
-
-
Roland, H.E.1
Moriarty, B.2
-
18
-
-
0003954843
-
Formal methods and their role in the certification of critical systems
-
January
-
Rushby, J., "Formal Methods and their Role in the Certification of Critical Systems", SRI-CSL-95-01, January 1995. http://www.csl.sri.com/csl-95-l.html
-
(1995)
SRI-CSL-95-01
-
-
Rushby, J.1
-
20
-
-
84956852410
-
A new model of security for distributed systems
-
Lake Arrowhead, California
-
Wulf, W. A., C. Wang, and D. M. Kienzle, "A New Model of Security for Distributed Systems", Proceedings of the New Paradigms in Security Workshop, Lake Arrowhead, California, 1996.
-
(1996)
Proceedings of the New Paradigms in Security Workshop
-
-
Wulf, W.A.1
Wang, C.2
Kienzle, D.M.3
|