메뉴 건너뛰기




Volumn 28, Issue 4, 1996, Pages 727-737

Strategic directions in software engineering and programming languages

Author keywords

[No Author keywords available]

Indexed keywords


EID: 4243123361     PISSN: 03600300     EISSN: None     Source Type: Journal    
DOI: 10.1145/242223.242283     Document Type: Article
Times cited : (10)

References (20)
  • 4
    • 0000579037 scopus 로고
    • Analysis of interprocedural side effects in a parallel programming environment
    • Oct
    • CALLAHAN, D. AND KENNEDY, K. 1988. Analysis of interprocedural side effects in a parallel programming environment. J. Parallel Distrib. Comput. 5, 5 (Oct.), 517-550.
    • (1988) J. Parallel Distrib. Comput. , vol.5 , Issue.5 , pp. 517-550
    • Callahan, D.1    Kennedy, K.2
  • 6
    • 0025245266 scopus 로고
    • Reverse engineering and design recovery: A taxonomy
    • CHIKOFSKY, E. AND CROSS, J. 1990. Reverse engineering and design recovery: A taxonomy. IEEE Softw.
    • (1990) IEEE Softw.
    • Chikofsky, E.1    Cross, J.2
  • 7
    • 0020780386 scopus 로고
    • On effective axiomatizations of Hoare logics
    • CLARKE, E. M., GERMAN, S. M., AND HALPERN, J. Y. 1983. On effective axiomatizations of Hoare logics. J. ACM 30, 612-636.
    • (1983) J. ACM , vol.30 , pp. 612-636
    • Clarke, E.M.1    German, S.M.2    Halpern, J.Y.3
  • 11
    • 0002257571 scopus 로고
    • Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults
    • Champaign, IL, Sept. IFIP WG 10.4, preliminary proceedings
    • GONG, L., LINCOLN, P., AND RUSHBY, J. 1995. Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. In Dependable Computing for Critical Applications-5 (Champaign, IL, Sept.), 79-90. IFIP WG 10.4, preliminary proceedings.
    • (1995) Dependable Computing for Critical Applications-5 , pp. 79-90
    • Gong, L.1    Lincoln, P.2    Rushby, J.3
  • 12
    • 4243140829 scopus 로고
    • Waiting for 01-01-00
    • HAYES, B. 1995. Waiting for 01-01-00. Am. Sci. 83, 1.
    • (1995) Am. Sci. , vol.83 , pp. 1
    • Hayes, B.1
  • 14
    • 0019058442 scopus 로고
    • Programs, life cycles, and laws of software evolution
    • LEHMAN, M. M. 1980. Programs, life cycles, and laws of software evolution. Proc. IEEE 68, 9, 1060-1076.
    • (1980) Proc. IEEE 68 , vol.9 , pp. 1060-1076
    • Lehman, M.M.1
  • 18
    • 0028551896 scopus 로고
    • Boundary and path manipulations on abstract data types
    • Sept.
    • SCHERLIS, W. 1994. Boundary and path manipulations on abstract data types. In IFIP Trans. A (Comput. Sci. Technol.) (Sept.), 615-620.
    • (1994) IFIP Trans. A (Comput. Sci. Technol.) , pp. 615-620
    • Scherlis, W.1
  • 20
    • 0025480317 scopus 로고
    • A specifier's introduction to formal methods
    • WING, J. 1990. A specifier's introduction to formal methods. Computer 8-22.
    • (1990) Computer , pp. 8-22
    • Wing, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.