No abstract available.
Cited By
- Siegmund J, Peitek N, Parnin C, Apel S, Hofmeister J, Kästner C, Begel A, Bethmann A and Brechmann A Measuring neural efficiency of program comprehension Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (140-150)
- Gómez O, Vegas S and Juristo N Impact of CS programs on the quality of test cases generation Proceedings of the 38th International Conference on Software Engineering Companion, (374-383)
- Pleszkoch M and Linger R Controlling Combinatorial Complexity in Software and Malware Behavior Computation Proceedings of the 10th Annual Cyber and Information Security Research Conference, (1-4)
- Mohammed A, Abdelnabi Z, Maatuk A and Abdalla A An Experimental Study on Detecting Semantic Defects in Object-Oriented Programs using Software Reading Techniques Proceedings of the The International Conference on Engineering & MIS 2015, (1-6)
- Lin L, Poore J, Eschbach R, Hierons R and Robinson-Mallett C Augmenting sequence enumeration with string-rewriting for requirements analysis and behavioral specification Proceedings of the 16th international conference on Fundamental Approaches to Software Engineering, (179-193)
- Linger R, Pleszkoch M, Prowell S, Sayre K and Ankrum T Computing legacy software behavior to understand functionality and security properties Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, (1-4)
- Linger R, Pleszkoch M, Prowell S and Sayre K Behavior computation for smart grid software analysis Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, (1-1)
- Lin L, Prowell S and Poore J (2010). An axiom system for sequence-based specification, Theoretical Computer Science, 411:2, (360-376), Online publication date: 1-Jan-2010.
- Shynkarenko V, Ilman V and Skalozub V (2009). Structural models of algorithms in problems of applied programming. I. Formal algorithmic structures, Cybernetics and Systems Analysis, 45:3, (329-339), Online publication date: 1-May-2009.
- Nepomniaschy V Symbolic verification method for definite iterations over tuples of altered data structures and its application to pointer programs Pillars of computer science, (537-554)
- Rombach D, Ciolkowski M, Jeffery R, Laitenberger O, McGarry F and Shull F (2008). Impact of research on practice in the field of inspections, reviews and walkthroughs, ACM SIGSOFT Software Engineering Notes, 33:6, (26-35), Online publication date: 31-Oct-2008.
- Pleszkoch M, Linger R and Hevner A (2008). Introducing function extraction into software testing, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 39:3, (41-50), Online publication date: 31-Jul-2008.
- Gibbons J Fission for program comprehension Proceedings of the 8th international conference on Mathematics of Program Construction, (162-179)
- Clarke L and Rosenblum D (2006). A historical perspective on runtime assertion checking in software development, ACM SIGSOFT Software Engineering Notes, 31:3, (25-37), Online publication date: 1-May-2006.
- Kondoh H and Futatsugi K (2006). To use or not to use the goto statement, Science of Computer Programming, 60:1, (82-116), Online publication date: 1-Mar-2006.
- Dunsmore A, Roper M and Wood M (2003). The Development and Evaluation of Three Diverse Techniques for Object-Oriented Code Inspection, IEEE Transactions on Software Engineering, 29:8, (677-686), Online publication date: 1-Aug-2003.
- Dunsmore A, Roper M and Wood M (2003). Practical Code Inspection Techniques for Object-Oriented Systems, IEEE Software, 20:4, (21-29), Online publication date: 1-Jul-2003.
- Wagner E (2002). Algebraic specifications, Nordic Journal of Computing, 9:4, (373-404), Online publication date: 1-Dec-2002.
- Ciolkowski M, Laitenberger O, Rombach D, Shull F and Perry D Software inspections, reviews & walkthroughs Proceedings of the 24th International Conference on Software Engineering, (641-642)
- Shalyto A and Tukkel' N (2002). Translating Iterative Algorithms into Automaton Ones, Programming and Computing Software, 28:5, (250-260), Online publication date: 1-Sep-2002.
- Dunsmore A, Roper M and Wood M Systematic object-oriented inspection — an empirical study Proceedings of the 23rd International Conference on Software Engineering, (135-144)
- Laitenberger O, El Emam K and Harbich T (2001). An Internally Replicated Quasi-Experimental Comparison of Checklist and Perspective-Based Reading of Code Documents, IEEE Transactions on Software Engineering, 27:5, (387-421), Online publication date: 1-May-2001.
- Komondoor R and Horwitz S Semantics-preserving procedure extraction Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (155-169)
- Wood M, Roper M, Brooks A and Miller J (1997). Comparing and combining software defect detection techniques, ACM SIGSOFT Software Engineering Notes, 22:6, (262-277), Online publication date: 1-Nov-1997.
- Wood M, Roper M, Brooks A and Miller J Comparing and combining software defect detection techniques Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering, (262-277)
- Oshana R and Coyle F Implementing cleanroom software engineering into a mature CMM-based software organization Proceedings of the 19th international conference on Software engineering, (572-573)
- Roper M, Wood M and Miller J (1997). An empirical evaluation of defect detection techniques, Information and Software Technology, 39:11, (763-775), Online publication date: 1-Jun-1997.
- Tan H and Ling T Slicing Functional Components from Data-Intensive Business Programs Proceedings of the 20th Conference on Computer Software and Applications
- Khrabrov A (1995). An Ada-like separate compilation style in C, ACM SIGAda Ada Letters, XV:2, (23-30), Online publication date: 1-Mar-1995.
- Hoffman D and Strooper P (1995). State abstraction and modular software development, ACM SIGSOFT Software Engineering Notes, 20:4, (53-61), Online publication date: 1-Oct-1995.
- Hoffman D and Strooper P State abstraction and modular software development Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering, (53-61)
- Stavely A (1995). Verifying Definite Iteration Over Data Structures, IEEE Transactions on Software Engineering, 21:6, (506-514), Online publication date: 1-Jun-1995.
- Linger R (1994). Cleanroom Process Model, IEEE Software, 11:2, (50-58), Online publication date: 1-Mar-1994.
- Basili V and Green S (1994). Software Process Evolution at the SEL, IEEE Software, 11:4, (58-66), Online publication date: 1-Jul-1994.
- Lee A and Pennington N (1994). The effects of paradigm on cognitive activities in design, International Journal of Human-Computer Studies, 40:4, (577-601), Online publication date: 1-Apr-1994.
- Poore J, Mills H and Mutchler D (1993). Planning and Certifying Software System Reliability, IEEE Software, 10:1, (88-99), Online publication date: 1-Jan-1993.
- Linger R Cleanroom software engineering for zero-defect software Proceedings of the 15th international conference on Software Engineering, (2-13)
- Knight J and Myers E (1993). An improved inspection technique, Communications of the ACM, 36:11, (51-61), Online publication date: 1-Nov-1993.
- Terwilliger R (1993). Toward tools to support the Gries/Dijkstra design process, ACM SIGSOFT Software Engineering Notes, 18:2, (50-59), Online publication date: 1-Apr-1993.
- Chaar J, Halliday M, Bhandari I and Chillarege R (1993). In-Process Evaluation for Software Inspection and Test, IEEE Transactions on Software Engineering, 19:11, (1055-1070), Online publication date: 1-Nov-1993.
- Hevner A, Becker S and Pedowitz L (1992). Integrated CASE for Cleanroom Development, IEEE Software, 9:2, (69-76), Online publication date: 1-Mar-1992.
- Feldbusch F and Kumar R Verification of synthesized circuits at register transfer level with flow graphs Proceedings of the conference on European design automation, (22-26)
- Hartman J Understanding natural programs using proper decomposition Proceedings of the 13th international conference on Software engineering, (62-73)
- Knight J and Myers E (1991). Phased inspections and their implementation, ACM SIGSOFT Software Engineering Notes, 16:3, (29-35), Online publication date: 1-Jul-1991.
- Shimeall T and Leveson N (1991). An Empirical Comparison of Software Fault Tolerance and Fault Elimination, IEEE Transactions on Software Engineering, 17:2, (173-182), Online publication date: 1-Feb-1991.
- Cobb R and Mills H (1990). Engineering Software Under Statistical Quality Control, IEEE Software, 7:6, (44-54), Online publication date: 1-Nov-1990.
- Ashenhurst R (1990). ACM forum, Communications of the ACM, 33:8, (14-ff.), Online publication date: 1-Aug-1990.
- Parnas D, van Schouwen A and Kwan S (1990). Evaluation of safety-critical software, Communications of the ACM, 33:6, (636-648), Online publication date: 1-Jun-1990.
- Wand Y and Weber R (1990). An Ontological Model of an Information System, IEEE Transactions on Software Engineering, 16:11, (1282-1292), Online publication date: 1-Nov-1990.
- Morell L (1990). A Theory of Fault-Based Testing, IEEE Transactions on Software Engineering, 16:8, (844-857), Online publication date: 1-Aug-1990.
- Flaherty T (1988). A simple technique to motivate structured programming, ACM SIGCSE Bulletin, 20:1, (153-155), Online publication date: 1-Feb-1988.
- Flaherty T A simple technique to motivate structured programming Proceedings of the nineteenth SIGCSE technical symposium on Computer science education, (153-155)
- Mills H (1988). Stepwise Refinement and Verification in Box-Structured Systems, Computer, 21:6, (23-36), Online publication date: 1-Jun-1988.
- Mills H, Basili V, Gannon J and Hamlet R Teaching principles of computer programming Proceedings of the 15th annual conference on Computer Science, (336-341)
- Tech Correspondence C (1987). Technical correspondence, Communications of the ACM, 30:7, (632-634), Online publication date: 1-Jul-1987.
- Deimel L (1985). The uses of program reading, ACM SIGCSE Bulletin, 17:2, (5-14), Online publication date: 1-Jun-1985.
- Reynolds R (1985). PARTIAL, ACM SIGSOFT Software Engineering Notes, 10:3, (76-94), Online publication date: 1-Jul-1985.
- Mili A and Desharnais J A system for classifying program verification methods Proceedings of the 7th international conference on Software engineering, (499-509)
- Forman I An algebra for data flow anomaly detection Proceedings of the 7th international conference on Software engineering, (278-286)
- Woodman M (1984). A Program Design Language for software engineering, ACM SIGPLAN Notices, 19:8, (109-118), Online publication date: 1-Aug-1984.
- Ince D (1984). The provision of procedural and functional interfaces for the maintenance of program design language and program language notations, ACM SIGPLAN Notices, 19:2, (68-74), Online publication date: 1-Feb-1984.
- McKee J Maintenance as a function of design Proceedings of the July 9-12, 1984, national computer conference and exposition, (187-193)
- Shooman M (1983). The teaching of software engineering, ACM SIGCSE Bulletin, 15:1, (66-71), Online publication date: 1-Feb-1983.
- Shooman M The teaching of software engineering Proceedings of the fourteenth SIGCSE technical symposium on Computer science education, (66-71)
- Parnas D (1983). A generalized control structure and its formal definition, Communications of the ACM, 26:8, (572-581), Online publication date: 1-Aug-1983.
- Vessey I and Weber R (1983). Some factors affecting program repair maintenance, Communications of the ACM, 26:2, (128-134), Online publication date: 1-Feb-1983.
- Booch G (1982). Object-oriented design, ACM SIGAda Ada Letters, I:3, (64-76), Online publication date: 1-Mar-1982.
- Forman I Global data flow analysis by decomposition into primes Proceedings of the 6th international conference on Software engineering, (386-392)
- Sammet J, Waugh D and Reiter R (1982). PDL/Ada, ACM SIGAda Ada Letters, II:3, (19-31), Online publication date: 1-Nov-1982.
- Coulter N Information hiding, the Intel iAPX 432,and Ada Proceedings of the 20th annual Southeast regional conference, (160-167)
- Sammet J, Waugh D and Reiter R PDL/Ada—a design language based on Ada Proceedings of the ACM '81 conference, (217-229)
- Cheatham T, Holloway G and Townley J Program refinement by transformation Proceedings of the 5th international conference on Software engineering, (430-437)
- Schrage J Educator's view of structured concepts Proceedings of the ACM 1980 annual conference, (327-341)
- Moore A and Kopp R Educational experiences in industrial software engineering Proceedings of the ACM 1980 annual conference, (118-122)
- Harel D (1980). On folk theorems, Communications of the ACM, 23:7, (379-389), Online publication date: 1-Jul-1980.
- Gannon J Characteristic errors in programming languages Proceedings of the 1978 annual conference - Volume 2, (570-575)
Recommendations
Advanced structured COBOL programming
Special issue seventh technical symposium on computer science educationThere is a large market demand for COBOL programmers. Can a single introductory course in COBOL programming provide the students with sufficient professional expertise to qualify them for these job openings? If not, is it feasible to offer a second ...
Advanced structured COBOL programming
SIGCSE '77: Proceedings of the seventh SIGCSE technical symposium on Computer science educationThere is a large market demand for COBOL programmers. Can a single introductory course in COBOL programming provide the students with sufficient professional expertise to qualify them for these job openings? If not, is it feasible to offer a second ...
Comparing novice programing environments for use in secondary education: App Inventor for Android vs. Alice
Coding is part of logical thinking and is one of the basic skills which are known as '21st-century skills'. Coding acquisition is necessary as it is used in a wide range of occupations. However, computer programing is difficult to learn and programing ...