Методы верификации программного обеспечения
Download 1.06 Mb. Pdf ko'rish
|
КНИГА
Verification. Software Tools for Technology Transfer, 7(2):156-173, 2005.
[73] M. Broy, B. Jonsson, J.-P. Katoen, M. Leucker, A. Pretschner (eds.). Model Based Testing of Reactive Systems. LNCS 3472, Springer, 2005. [74] M. E. Fagan. Design and Code Inspections to Reduce Errors in Program Development. IBM Systems Journal, 15(3):182-211, 1976. [75] M. E. Fagan. Advances in Software Inspections. IEEE Transactions on Software Engineering 12(7):744-175, July 1986. [76] O. Laitenberger, J. M. Debaud. An encompassing life cycle centric survey of software inspection. The Journal of Software and Systems, 50(1):5-31, 2000. [77] L. G. Votta. Does every inspection need a meeting? ACM SIGSOFT Software Engineering Notes, 18(5):107-114, 1993. [78] M. Dyer. Verification-based Inspection. Proc. of 26-th Annual Hawaii International Conference on Systems Sciences, pp. 418-427, 1992. [79] A. A. Porter, L. G. Votta. An experiment to assess different defect detection methods for software requirements inspections. Proc. of 16-th International Conference on Software Engineering, pp. 103-112, 1994. [80] D. V. Bisant, J. B. Lyle. A two-person inspection method to improve programming productivity. IEEE Transactions on Software Engineering, 15(10):1294-1304, 1989. [81] D. L. Parnas, D. Weiss. Active Design Reviews: Principles and Practices. Proc. of 8-th International Conference on Software Engineering, pp. 132-136, 1985. [82] R. N. Britcher. Using Inspections to Investigate Program Correctness. IEEE Computer, pp. 38-44, November 1988. [83] J. C. Knight, E. A. Myers. Phased Inspections and their Implementation. ACM SIGSOFT Software Engineering Notes, 16(3):29-35, 1991. 103 [84] G. M. Schneider, J. Martin, W. T. Tsai. An experimental study of fault detection in user requirements documents. ACM Transactions on Software Engineering and Methodology, 1(2):188-204, 1992. [85] J. Nielsen. Usability Engineering. Academic Press, Boston, 1993. [86] Л. Константайн, Л. Локвуд. Разработка программного обеспечения. СПб.: Питер, 2004. [87] http://www.kb.cert.org/vuls/ . [88] http://nvd.nist.gov/ . [89] B. Schneier. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000. Русский перевод: Б. Шнайер. Секреты и ложь: безопасность данных в цифровом мире. СПб.: Питер, 2003. [90] R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. N.Y.: John Wiley & Sons, 2001. [91] L. Dobrica, E. Niemela. A Survey on Software Architecture Analysis Methods. IEEE Transactions on Software Engineering, 28(7):638-653, 2002. [92] M. T. Ionita, D. K. Hammer, H. J. Obbink. Scenario-Based Software Architecture Evaluation Methods: An Overview. Technical Note based on the SARA workshop paper presented at ICSE 2002. [93] M. A. Babar, L. Zhu, R. Jeffery. A Framework for Classifying and Comparing Software Architecture Evaluation Methods. Proc. of Australian Software Engineering Conference ASWEC'04, pp. 309-318, 2004. [94] R. Kazman, L. Bass, G. Abowd, M. Webb. SAAM: A Method for Analyzing the Properties of Software Architectures. Proc. of 16-th International Conference on Software Engineering, pp. 81-90, 1994. [95] R. Kazman, G. Abowd, L. Bass, P. Clements. Scenario-Based Analysis of Software Architecture. IEEE Software, 13(6):47-55, November 1996. [96] R. Kazman, M. Klein, M. Barbacci, H. Lipson, T. Longstaff, S. J. Carriere. The Download 1.06 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling