Proceedings of an ACM conference on Language design for reliable software
Computer implementation of the finite element method
Computer implementation of the finite element method
The Thirteen Books of Euclid's Elements, Books 1 and 2
The Thirteen Books of Euclid's Elements, Books 1 and 2
Program verification: the very idea
Communications of the ACM
The Formal Specification and Design of a Distributed Electronic Funds-Transfer System
IEEE Transactions on Computers
ICSE '88 Proceedings of the 10th international conference on Software engineering
Verification of Ada 1/0 statements
ACM SIGCSE Bulletin
Automatic verification of database transaction safety
ACM Transactions on Database Systems (TODS)
Development Life Cycle of Computer Networks: The Executable Model Approach
IEEE Transactions on Software Engineering
Cecil: A Sequencing Constraint Language for Automatic Static Analysis Generation
IEEE Transactions on Software Engineering
A formal protection model of security in centralized, parallel, and distributed systems
ACM Transactions on Computer Systems (TOCS)
Defining Software by Continuous, Smooth Functions
IEEE Transactions on Software Engineering
Reliability, sampling, and algorithmic randomness
TAV4 Proceedings of the symposium on Testing, analysis, and verification
Formal methods versus software engineering: Is there a conflict
TAV4 Proceedings of the symposium on Testing, analysis, and verification
Computer-aided vs. manual program restructuring
ACM SIGSOFT Software Engineering Notes
Projecting functional models of imperative programs
ACM SIGPLAN Notices
Algebra and models (and reality)
ACM SIGSOFT Software Engineering Notes
Designing programs that check their work
Journal of the ACM (JACM)
Algebra and models (and reality)
ACM SIGSOFT Software Engineering Notes
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
An experience in the formal verification of industrial software
Communications of the ACM - Electronic supplement to the December issue
A practical approach to security assessment
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Software engineering programmes are not computer science programmes
Annals of Software Engineering - Special issue on software engineering education
Communications of the ACM
Communications of the ACM
Communications of the ACM
Communications of the ACM
Communications of the ACM
The role of process models in software and systems development and evolution
ISPW '90 Proceedings of the 5th international software process workshop on Experience with software process models
Floating Point Verification in HOL Light: The Exponential Function
Formal Methods in System Design
Validation, Verification, and Testing of Computer Software
ACM Computing Surveys (CSUR)
An OIS model for internal accounting control evaluation
ACM Transactions on Information Systems (TOIS)
Some factors affecting program repair maintenance: an empirical study
Communications of the ACM
Parallel programs: proofs, principles, and practice
Communications of the ACM
Concepts and criteria to assess acceptability of simulation studies: a frame of reference
Communications of the ACM - Special issue on simulation modeling and statistical computing
Communications of the ACM
ACM President's Letter: What is experimental computer science?
Communications of the ACM
Communications of the ACM
Computer
An alternative view of polymorphism
ACM SIGPLAN Notices
Cost profile of a highly assured, secure operating system
ACM Transactions on Information and System Security (TISSEC)
POPL '80 Proceedings of the 7th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Desert Island Column: The Long Story of a Short Theorem
Automated Software Engineering
Post's Machine: A Didactic Microworld as an Introduction to Formal Programming
Education and Information Technologies
FAST: a framework for automating statistics-based testing
Software Quality Control
The History of Computing in the History of Technology
IEEE Annals of the History of Computing
The Automation of Proof: A Historical and Sociological Exploration
IEEE Annals of the History of Computing
Splitting the Difference: The Historical Necessity of Synthesis in Software Engineering
IEEE Annals of the History of Computing
Fixed-Priority Sensitivity Analysis for Linear Compute Time Models
IEEE Transactions on Software Engineering
Software as Learning: Quality Factors and Life-Cycle Revised
FASE '00 Proceedings of the Third Internationsl Conference on Fundamental Approaches to Software Engineering: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
Model Checking and Abstraction
Proceedings of the 5th International Symposium on Abstraction, Reformulation and Approximation
Formal Methods in Practice: The Missing Links. A Perspective from the Security Area
MOVEP '00 Proceedings of the 4th Summer School on Modeling and Verification of Parallel Processes
Formal methods in practice: the missing links. a perspective from the security area
Modeling and verification of parallel processes
The reflective practitioner perspective in software engineering education
Journal of Systems and Software
Logic versus mathematics in computer science education
SIGCSE '83 Proceedings of the fourteenth SIGCSE technical symposium on Computer science education
Contrasting translation, verification and synthesis in software and firmware engineering
MICRO 14 Proceedings of the 14th annual workshop on Microprogramming
ICSE '79 Proceedings of the 4th international conference on Software engineering
Performance evaluation: Experimental computer science at its best
SIGMETRICS '81 Proceedings of the 1981 ACM SIGMETRICS conference on Measurement and modeling of computer systems
An OIS model for internal control evaluation
Proceedings of the SIGOA conference on Office information systems
Proceedings of the 1981 ACM workshop/symposium on Measurement and evaluation of software quality
ACM '81 Proceedings of the ACM '81 conference
Misplaced Trust: Kerberos 4 Session Keys
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Using fault injection to increase software test coverage
ISSRE '96 Proceedings of the The Seventh International Symposium on Software Reliability Engineering
The Early Search for Tractable Ways of Reasoning about Programs
IEEE Annals of the History of Computing
Real-time programming in PORTAL
ACM SIGPLAN Notices
On formal and informal proofs for program correctness
ACM SIGPLAN Notices
A control form for complex iterations
ACM SIGPLAN Notices
Engineering requirements for production quality verification systems
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
An Ina Jo® proof manager for the formal development method
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
Critique of the lake arrowhead three
Distributed Computing - Special issue: Specification of concurrent systems
Distributed Computing - Special issue: Verification of lazy caching
Three Paradigms of Computer Science
Minds and Machines
Towards a Worldwide Verification Technology
Verified Software: Theories, Tools, Experiments
Using formal specifications to support testing
ACM Computing Surveys (CSUR)
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
What makes a reliable program: few bugs, or a small failure rate?
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
ACM Computing Surveys (CSUR)
Symbolic evaluation of lisp functions with side effects for verification
IJCAI'81 Proceedings of the 7th international joint conference on Artificial intelligence - Volume 1
Social processes, program verification and all that
Mathematical Structures in Computer Science
Towards an emergence-driven software process for agent-based simulation
MABS'02 Proceedings of the 3rd international conference on Multi-agent-based simulation II
Finding unity in computational logic
Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference
Implementing commercial data integrity with secure capabilities
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Pest: from the lab to the classroom
Proceedings of the 1st Workshop on Developing Tools as Plug-ins
Minds and Machines
Some Philosophical Issues in Computer Science
Minds and Machines
Computing as a Science: A Survey of Competing Viewpoints
Minds and Machines
Automated theorem provers: a practical tool for the working mathematician?
Annals of Mathematics and Artificial Intelligence
Dependable and Historic Computing
Proof, message and certificate
CICM'12 Proceedings of the 11th international conference on Intelligent Computer Mathematics
Cloud engineering is Search Based Software Engineering too
Journal of Systems and Software
An easy approach to epistemology and ontology in computing theses
Proceedings of the 13th Koli Calling International Conference on Computing Education Research
Mathematical practice, crowdsourcing, and social machines
CICM'13 Proceedings of the 2013 international conference on Intelligent Computer Mathematics
Special session: "hands-on" tutorial: teaching software correctness with RESOLVE
Proceedings of the 45th ACM technical symposium on Computer science education
Hi-index | 48.39 |
It is argued that formal verifications of programs, no matter how obtained, will not play the same key role in the development of computer science and software engineering as proofs do in mathematics. Furthermore the absence of continuity, the inevitability of change, and the complexity of specification of significantly many real programs make the formal verification process difficult to justify and manage. It is felt that ease of formal verification should not dominate program language design.