Highly Dependable Software by Marvin Zelkowitz Ph.D. MS BS.

By Marvin Zelkowitz Ph.D. MS BS.

In view that 1960, Advances in pcs has chronicled the continuously transferring theories and strategies of knowledge expertise which enormously shapes our lives this present day. hugely liable software program is the 58th quantity during this sequence. The seven chapters describe numerous methods in the direction of dependability: software program improvement measurability, transformation orientated programming, Bounded version Checking, GUI checking out, background and classes from software program inspections, effect and difficulties concerning mistakes in software program, the evolution of a few of the protection rules. This publication will be a useful addition to any collage path in machine expertise, and a very good reference device for commercial practitioners. * contains in-depth surveys and tutorials on advances in laptop Technology.* positive factors the paintings of famous authors and researchers within the field.* presents a wide evaluation of vital developments.* includes broad bibliographies.

Show description

Read or Download Highly Dependable Software PDF

Similar data processing books

Agent-Based Modeling: The Santa Fe Institute Artificial Stock Market Model Revisited (Lecture Notes in Economics and Mathematical Systems)

This ebook reconciles the lifestyles of technical buying and selling with the effective industry speculation. through studying a widely known agent-based version, the Santa Fe Institute man made inventory marketplace (SFI-ASM), it unearths that once selective forces are susceptible, monetary evolution can't be sure that simply the fittest buying and selling ideas will live on.

Space-filling curves : an introduction with applications in scientific computing

1. motivating examples: sequential orders on quadtrees and multidimensional facts constructions -- 2. the best way to build space-filling curves -- three. Grammar-based description of space-filling curves -- four. mathematics illustration of space-filling curves -- five. Approximating polygons -- 6. Sierpinski curves -- 7.

Cybercrime, Digital Forensics and Jurisdiction

The aim of legislation is to avoid the society from damage through stating what behavior is legal, and prescribing the punishment to be imposed for such behavior. The pervasiveness of the net and its nameless nature make our on-line world a lawless frontier the place anarchy prevails. traditionally, fiscal worth has been assigned to seen and tangible resources.

Extra info for Highly Dependable Software

Sample text

1. The SSP Project . . . . . . . . . . . . . . 2. The SSP-classloader . . . . . . . . . . . . . 3. A Transformation-Based Classloader . . . . . . . . 4. Removal of Indirection . . . . . . . . . . . . 5. Relevant Constant Pool Construction . . . . . . . . 6. Offset Indexing . . . . . . . . . . . . . . 8. Future Work: Verification . . . . . . . . . . . . . 1. Design Verification: Eval and BCE .

3. Approaches to Developing High-Assurance Systems . . . . . 1. Imperative Programming . . . . . . . . . . . 2. Object-Oriented Programming . . . . . . . . . . 3. Functional Programming . . . . . . . . . . . 4. Aspect-Oriented Programming . . . . . . . . . . 5. Declarative Programming . . . . . . . . . . . 6. Formal “Methods” . . . . . . . . . . . . . 7. Formal Specifications . . . . . . . . . .

3. Histogram showing distribution of software size (size)—real data. F IG . 4. Histogram showing distribution of ln(size)—real data. Why Do It? A picture is worth a thousand words. I highly recommend visualizing any relationship that might exist between the dependent and independent variables before running “blind” statistical tests. It is important to see if the relationship is linear as our SOFTWARE DEVELOPMENT PRODUCTIVITY 21 F IG . 5. Example of a two-dimensional graph—productivity vs. software size (both variables have undergone a log transformation).

Download PDF sample

Rated 4.06 of 5 – based on 30 votes