skip to main content
Skip header Section
Structured Programming; Theory and Practice the Systems Programming SeriesJanuary 1979
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-201-14461-1
Published:01 January 1979
Pages:
402
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Siegmund J, Peitek N, Parnin C, Apel S, Hofmeister J, Kästner C, Begel A, Bethmann A and Brechmann A Measuring neural efficiency of program comprehension Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (140-150)
  2. ACM
    Gómez O, Vegas S and Juristo N Impact of CS programs on the quality of test cases generation Proceedings of the 38th International Conference on Software Engineering Companion, (374-383)
  3. ACM
    Pleszkoch M and Linger R Controlling Combinatorial Complexity in Software and Malware Behavior Computation Proceedings of the 10th Annual Cyber and Information Security Research Conference, (1-4)
  4. ACM
    Mohammed A, Abdelnabi Z, Maatuk A and Abdalla A An Experimental Study on Detecting Semantic Defects in Object-Oriented Programs using Software Reading Techniques Proceedings of the The International Conference on Engineering & MIS 2015, (1-6)
  5. Lin L, Poore J, Eschbach R, Hierons R and Robinson-Mallett C Augmenting sequence enumeration with string-rewriting for requirements analysis and behavioral specification Proceedings of the 16th international conference on Fundamental Approaches to Software Engineering, (179-193)
  6. ACM
    Linger R, Pleszkoch M, Prowell S, Sayre K and Ankrum T Computing legacy software behavior to understand functionality and security properties Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, (1-4)
  7. ACM
    Linger R, Pleszkoch M, Prowell S and Sayre K Behavior computation for smart grid software analysis Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, (1-1)
  8. Lin L, Prowell S and Poore J (2010). An axiom system for sequence-based specification, Theoretical Computer Science, 411:2, (360-376), Online publication date: 1-Jan-2010.
  9. Shynkarenko V, Ilman V and Skalozub V (2009). Structural models of algorithms in problems of applied programming. I. Formal algorithmic structures, Cybernetics and Systems Analysis, 45:3, (329-339), Online publication date: 1-May-2009.
  10. Nepomniaschy V Symbolic verification method for definite iterations over tuples of altered data structures and its application to pointer programs Pillars of computer science, (537-554)
  11. ACM
    Rombach D, Ciolkowski M, Jeffery R, Laitenberger O, McGarry F and Shull F (2008). Impact of research on practice in the field of inspections, reviews and walkthroughs, ACM SIGSOFT Software Engineering Notes, 33:6, (26-35), Online publication date: 31-Oct-2008.
  12. ACM
    Pleszkoch M, Linger R and Hevner A (2008). Introducing function extraction into software testing, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 39:3, (41-50), Online publication date: 31-Jul-2008.
  13. Gibbons J Fission for program comprehension Proceedings of the 8th international conference on Mathematics of Program Construction, (162-179)
  14. ACM
    Clarke L and Rosenblum D (2006). A historical perspective on runtime assertion checking in software development, ACM SIGSOFT Software Engineering Notes, 31:3, (25-37), Online publication date: 1-May-2006.
  15. Kondoh H and Futatsugi K (2006). To use or not to use the goto statement, Science of Computer Programming, 60:1, (82-116), Online publication date: 1-Mar-2006.
  16. Dunsmore A, Roper M and Wood M (2003). The Development and Evaluation of Three Diverse Techniques for Object-Oriented Code Inspection, IEEE Transactions on Software Engineering, 29:8, (677-686), Online publication date: 1-Aug-2003.
  17. Dunsmore A, Roper M and Wood M (2003). Practical Code Inspection Techniques for Object-Oriented Systems, IEEE Software, 20:4, (21-29), Online publication date: 1-Jul-2003.
  18. Wagner E (2002). Algebraic specifications, Nordic Journal of Computing, 9:4, (373-404), Online publication date: 1-Dec-2002.
  19. ACM
    Ciolkowski M, Laitenberger O, Rombach D, Shull F and Perry D Software inspections, reviews & walkthroughs Proceedings of the 24th International Conference on Software Engineering, (641-642)
  20. Shalyto A and Tukkel' N (2002). Translating Iterative Algorithms into Automaton Ones, Programming and Computing Software, 28:5, (250-260), Online publication date: 1-Sep-2002.
  21. Dunsmore A, Roper M and Wood M Systematic object-oriented inspection — an empirical study Proceedings of the 23rd International Conference on Software Engineering, (135-144)
  22. Laitenberger O, El Emam K and Harbich T (2001). An Internally Replicated Quasi-Experimental Comparison of Checklist and Perspective-Based Reading of Code Documents, IEEE Transactions on Software Engineering, 27:5, (387-421), Online publication date: 1-May-2001.
  23. ACM
    Komondoor R and Horwitz S Semantics-preserving procedure extraction Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (155-169)
  24. ACM
    Wood M, Roper M, Brooks A and Miller J (1997). Comparing and combining software defect detection techniques, ACM SIGSOFT Software Engineering Notes, 22:6, (262-277), Online publication date: 1-Nov-1997.
  25. Wood M, Roper M, Brooks A and Miller J Comparing and combining software defect detection techniques Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering, (262-277)
  26. ACM
    Oshana R and Coyle F Implementing cleanroom software engineering into a mature CMM-based software organization Proceedings of the 19th international conference on Software engineering, (572-573)
  27. Roper M, Wood M and Miller J (1997). An empirical evaluation of defect detection techniques, Information and Software Technology, 39:11, (763-775), Online publication date: 1-Jun-1997.
  28. Tan H and Ling T Slicing Functional Components from Data-Intensive Business Programs Proceedings of the 20th Conference on Computer Software and Applications
  29. ACM
    Khrabrov A (1995). An Ada-like separate compilation style in C, ACM SIGAda Ada Letters, XV:2, (23-30), Online publication date: 1-Mar-1995.
  30. ACM
    Hoffman D and Strooper P (1995). State abstraction and modular software development, ACM SIGSOFT Software Engineering Notes, 20:4, (53-61), Online publication date: 1-Oct-1995.
  31. ACM
    Hoffman D and Strooper P State abstraction and modular software development Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering, (53-61)
  32. Stavely A (1995). Verifying Definite Iteration Over Data Structures, IEEE Transactions on Software Engineering, 21:6, (506-514), Online publication date: 1-Jun-1995.
  33. Linger R (1994). Cleanroom Process Model, IEEE Software, 11:2, (50-58), Online publication date: 1-Mar-1994.
  34. Basili V and Green S (1994). Software Process Evolution at the SEL, IEEE Software, 11:4, (58-66), Online publication date: 1-Jul-1994.
  35. Lee A and Pennington N (1994). The effects of paradigm on cognitive activities in design, International Journal of Human-Computer Studies, 40:4, (577-601), Online publication date: 1-Apr-1994.
  36. Poore J, Mills H and Mutchler D (1993). Planning and Certifying Software System Reliability, IEEE Software, 10:1, (88-99), Online publication date: 1-Jan-1993.
  37. Linger R Cleanroom software engineering for zero-defect software Proceedings of the 15th international conference on Software Engineering, (2-13)
  38. ACM
    Knight J and Myers E (1993). An improved inspection technique, Communications of the ACM, 36:11, (51-61), Online publication date: 1-Nov-1993.
  39. ACM
    Terwilliger R (1993). Toward tools to support the Gries/Dijkstra design process, ACM SIGSOFT Software Engineering Notes, 18:2, (50-59), Online publication date: 1-Apr-1993.
  40. Chaar J, Halliday M, Bhandari I and Chillarege R (1993). In-Process Evaluation for Software Inspection and Test, IEEE Transactions on Software Engineering, 19:11, (1055-1070), Online publication date: 1-Nov-1993.
  41. Hevner A, Becker S and Pedowitz L (1992). Integrated CASE for Cleanroom Development, IEEE Software, 9:2, (69-76), Online publication date: 1-Mar-1992.
  42. Feldbusch F and Kumar R Verification of synthesized circuits at register transfer level with flow graphs Proceedings of the conference on European design automation, (22-26)
  43. Hartman J Understanding natural programs using proper decomposition Proceedings of the 13th international conference on Software engineering, (62-73)
  44. ACM
    Knight J and Myers E (1991). Phased inspections and their implementation, ACM SIGSOFT Software Engineering Notes, 16:3, (29-35), Online publication date: 1-Jul-1991.
  45. Shimeall T and Leveson N (1991). An Empirical Comparison of Software Fault Tolerance and Fault Elimination, IEEE Transactions on Software Engineering, 17:2, (173-182), Online publication date: 1-Feb-1991.
  46. Cobb R and Mills H (1990). Engineering Software Under Statistical Quality Control, IEEE Software, 7:6, (44-54), Online publication date: 1-Nov-1990.
  47. ACM
    Ashenhurst R (1990). ACM forum, Communications of the ACM, 33:8, (14-ff.), Online publication date: 1-Aug-1990.
  48. ACM
    Parnas D, van Schouwen A and Kwan S (1990). Evaluation of safety-critical software, Communications of the ACM, 33:6, (636-648), Online publication date: 1-Jun-1990.
  49. Wand Y and Weber R (1990). An Ontological Model of an Information System, IEEE Transactions on Software Engineering, 16:11, (1282-1292), Online publication date: 1-Nov-1990.
  50. Morell L (1990). A Theory of Fault-Based Testing, IEEE Transactions on Software Engineering, 16:8, (844-857), Online publication date: 1-Aug-1990.
  51. ACM
    Flaherty T (1988). A simple technique to motivate structured programming, ACM SIGCSE Bulletin, 20:1, (153-155), Online publication date: 1-Feb-1988.
  52. ACM
    Flaherty T A simple technique to motivate structured programming Proceedings of the nineteenth SIGCSE technical symposium on Computer science education, (153-155)
  53. Mills H (1988). Stepwise Refinement and Verification in Box-Structured Systems, Computer, 21:6, (23-36), Online publication date: 1-Jun-1988.
  54. ACM
    Mills H, Basili V, Gannon J and Hamlet R Teaching principles of computer programming Proceedings of the 15th annual conference on Computer Science, (336-341)
  55. ACM
    Tech Correspondence C (1987). Technical correspondence, Communications of the ACM, 30:7, (632-634), Online publication date: 1-Jul-1987.
  56. ACM
    Deimel L (1985). The uses of program reading, ACM SIGCSE Bulletin, 17:2, (5-14), Online publication date: 1-Jun-1985.
  57. ACM
    Reynolds R (1985). PARTIAL, ACM SIGSOFT Software Engineering Notes, 10:3, (76-94), Online publication date: 1-Jul-1985.
  58. Mili A and Desharnais J A system for classifying program verification methods Proceedings of the 7th international conference on Software engineering, (499-509)
  59. Forman I An algebra for data flow anomaly detection Proceedings of the 7th international conference on Software engineering, (278-286)
  60. ACM
    Woodman M (1984). A Program Design Language for software engineering, ACM SIGPLAN Notices, 19:8, (109-118), Online publication date: 1-Aug-1984.
  61. ACM
    Ince D (1984). The provision of procedural and functional interfaces for the maintenance of program design language and program language notations, ACM SIGPLAN Notices, 19:2, (68-74), Online publication date: 1-Feb-1984.
  62. ACM
    McKee J Maintenance as a function of design Proceedings of the July 9-12, 1984, national computer conference and exposition, (187-193)
  63. ACM
    Shooman M (1983). The teaching of software engineering, ACM SIGCSE Bulletin, 15:1, (66-71), Online publication date: 1-Feb-1983.
  64. ACM
    Shooman M The teaching of software engineering Proceedings of the fourteenth SIGCSE technical symposium on Computer science education, (66-71)
  65. ACM
    Parnas D (1983). A generalized control structure and its formal definition, Communications of the ACM, 26:8, (572-581), Online publication date: 1-Aug-1983.
  66. ACM
    Vessey I and Weber R (1983). Some factors affecting program repair maintenance, Communications of the ACM, 26:2, (128-134), Online publication date: 1-Feb-1983.
  67. ACM
    Booch G (1982). Object-oriented design, ACM SIGAda Ada Letters, I:3, (64-76), Online publication date: 1-Mar-1982.
  68. Forman I Global data flow analysis by decomposition into primes Proceedings of the 6th international conference on Software engineering, (386-392)
  69. ACM
    Sammet J, Waugh D and Reiter R (1982). PDL/Ada, ACM SIGAda Ada Letters, II:3, (19-31), Online publication date: 1-Nov-1982.
  70. ACM
    Coulter N Information hiding, the Intel iAPX 432,and Ada Proceedings of the 20th annual Southeast regional conference, (160-167)
  71. ACM
    Sammet J, Waugh D and Reiter R PDL/Ada—a design language based on Ada Proceedings of the ACM '81 conference, (217-229)
  72. Cheatham T, Holloway G and Townley J Program refinement by transformation Proceedings of the 5th international conference on Software engineering, (430-437)
  73. ACM
    Schrage J Educator's view of structured concepts Proceedings of the ACM 1980 annual conference, (327-341)
  74. ACM
    Moore A and Kopp R Educational experiences in industrial software engineering Proceedings of the ACM 1980 annual conference, (118-122)
  75. ACM
    Harel D (1980). On folk theorems, Communications of the ACM, 23:7, (379-389), Online publication date: 1-Jul-1980.
  76. ACM
    Gannon J Characteristic errors in programming languages Proceedings of the 1978 annual conference - Volume 2, (570-575)
Contributors
  • Oak Ridge National Laboratory
  • Florida Institute of Technology

Recommendations