-
2
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
Baratloo A., Singh N., and Tsai T. Transparent run-time defense against stack smashing attacks. Proceedings of 2000 USENIX Annual Technical Conference, San Diego, CA (2000) 18-23
-
(2000)
Proceedings of 2000 USENIX Annual Technical Conference, San Diego, CA
, pp. 18-23
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
4
-
-
0031152532
-
Software investment strategy
-
Bernstein L. Software investment strategy. Bell Labs Technical Journal 2 3 (1997) 233-243
-
(1997)
Bell Labs Technical Journal
, vol.2
, Issue.3
, pp. 233-243
-
-
Bernstein, L.1
-
6
-
-
0344146600
-
Making components contract aware
-
Beugnard A. Making components contract aware. Computer 12 7 (1999) 38-45
-
(1999)
Computer
, vol.12
, Issue.7
, pp. 38-45
-
-
Beugnard, A.1
-
7
-
-
77956731935
-
-
Boehm B, et al, Software estimation with COCOMO II, PTR
-
Boehm B., et al., Software estimation with COCOMO II, PTR
-
-
-
-
8
-
-
77956749697
-
Fault tolerance for Windows applications
-
Carreira J., et al. Fault tolerance for Windows applications. Byte Magazine (February 1997) 51-52
-
(1997)
Byte Magazine
, pp. 51-52
-
-
Carreira, J.1
-
9
-
-
77956741172
-
-
http://www.cigitallabs.com/resources/definitions/software_safety.html
-
-
-
-
12
-
-
77956778085
-
Object stamp of approval
-
Gaud S. Object stamp of approval. ComputerWorld 31 11 (1997) 1
-
(1997)
ComputerWorld
, vol.31
, Issue.11
, pp. 1
-
-
Gaud, S.1
-
13
-
-
0029276847
-
Reusable software requirements and architecture for families of systems
-
Goma H. Reusable software requirements and architecture for families of systems. Journal of Systems & Software 28 3 (1995) 189-202
-
(1995)
Journal of Systems & Software
, vol.28
, Issue.3
, pp. 189-202
-
-
Goma, H.1
-
15
-
-
0027796299
-
Software implemented fault tolerance: technologies and experience
-
Lyu M. (Ed), John Wiley & Sons
-
Huang Y., and Kintala C.M.R. Software implemented fault tolerance: technologies and experience. In: Lyu M. (Ed). Proceedings of 23rd Internat. Symposium on Fault-Tolerant Computing, Toulouse, France, June 1993, Software Fault Tolerance (1995), John Wiley & Sons 2-9
-
(1995)
Proceedings of 23rd Internat. Symposium on Fault-Tolerant Computing, Toulouse, France, June 1993, Software Fault Tolerance
, pp. 2-9
-
-
Huang, Y.1
Kintala, C.M.R.2
-
16
-
-
77956737676
-
-
Krishnamurthy B. (Ed), John Wiley & Sons, New York
-
In: Krishnamurthy B. (Ed). Practical Reusable UNIX Software (1995), John Wiley & Sons, New York 5-8
-
(1995)
Practical Reusable UNIX Software
, pp. 5-8
-
-
-
18
-
-
0028515913
-
Effects of reuse on quality, productivity and economics
-
Lim W.C. Effects of reuse on quality, productivity and economics. IEEE Software (1994) 23-29
-
(1994)
IEEE Software
, pp. 23-29
-
-
Lim, W.C.1
-
21
-
-
77956726135
-
Learning from Pathfinder's bumpy start
-
March S. Learning from Pathfinder's bumpy start. Software Testing & Quality Engineering 1 5 (1999) 10-12
-
(1999)
Software Testing & Quality Engineering
, vol.1
, Issue.5
, pp. 10-12
-
-
March, S.1
-
23
-
-
0003960126
-
-
McGraw-Hill Appendix E
-
Musa J., Iannino A., and Okumoto K. Software Reliability: Measurement, Prediction, Application (1987), McGraw-Hill Appendix E
-
(1987)
Software Reliability: Measurement, Prediction, Application
-
-
Musa, J.1
Iannino, A.2
Okumoto, K.3
-
24
-
-
0039093706
-
-
National Research Council, National Academy Press, Washington, DC pp. 18-29
-
National Research Council. Information Systems Trustworthiness Interim Report (1997), National Academy Press, Washington, DC pp. 18-29
-
(1997)
Information Systems Trustworthiness Interim Report
-
-
-
26
-
-
77956745020
-
Software manufacturing
-
Software manufacturing. UNIX Review 7 (1989) 38-45
-
(1989)
UNIX Review
, vol.7
, pp. 38-45
-
-
-
27
-
-
0039926424
-
Empirically analyzing software reuse in a production environment
-
Tracz W. (Ed), IEEE Computer Society Press
-
Selby R. Empirically analyzing software reuse in a production environment. In: Tracz W. (Ed). Software Reuse: Emerging Technology (1988), IEEE Computer Society Press 176-189
-
(1988)
Software Reuse: Emerging Technology
, pp. 176-189
-
-
Selby, R.1
-
28
-
-
0035394327
-
Using simplicity to control complexity
-
Sha L. Using simplicity to control complexity. IEEE Software 18 4 (2001) 27
-
(2001)
IEEE Software
, vol.18
, Issue.4
, pp. 27
-
-
Sha, L.1
-
30
-
-
0031197306
-
Fighting complexity in computer systems
-
Stoyen A.D. Fighting complexity in computer systems. Computer 30 8 (1997) 47-48. http://computer.org/pubs/computer/computer.htm
-
(1997)
Computer
, vol.30
, Issue.8
, pp. 47-48
-
-
Stoyen, A.D.1
-
31
-
-
0030688650
-
On-board preventive maintenance: Analysis of effectiveness and optimal duty period
-
Tai A.T., Chau S.N., Alkalaj L., and Hecht H. On-board preventive maintenance: Analysis of effectiveness and optimal duty period. Proceedings of the 3rd International Workshop on Object-Oriented Real-time Dependable Systems (WORDS'97), Newport Beach, CA (1997) 40-47
-
(1997)
Proceedings of the 3rd International Workshop on Object-Oriented Real-time Dependable Systems (WORDS'97), Newport Beach, CA
, pp. 40-47
-
-
Tai, A.T.1
Chau, S.N.2
Alkalaj, L.3
Hecht, H.4
-
32
-
-
37849050293
-
-
National Institute of Standards and Technology (NIST) Special Publication 500-223, U.S. Dept. of Commerce, Dec
-
Wallace D.R., Ippolito L.M., "A framework for the development and assurance of high integrity software", National Institute of Standards and Technology (NIST) Special Publication 500-223, U.S. Dept. of Commerce, Dec. 1994, p. ix
-
(1994)
A framework for the development and assurance of high integrity software
-
-
Wallace, D.R.1
Ippolito, L.M.2
-
33
-
-
77956746240
-
Who Needs a Diploma? Why the high-tech industry wants dropouts
-
Wallace M. Who Needs a Diploma? Why the high-tech industry wants dropouts. The New York Times Magazine 5 (2000) 76-78
-
(2000)
The New York Times Magazine
, vol.5
, pp. 76-78
-
-
Wallace, M.1
-
34
-
-
0004113252
-
Network management by delegation
-
Krishnan I., and Zimmer W. (Eds), Elsevier, New York
-
Yemini Y., Goldszmidt G., and Yemini S. Network management by delegation. In: Krishnan I., and Zimmer W. (Eds). Integrated Network Management, II (1991), Elsevier, New York 95-107
-
(1991)
Integrated Network Management, II
, pp. 95-107
-
-
Yemini, Y.1
Goldszmidt, G.2
Yemini, S.3
|