{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:08:56Z","timestamp":1725664136478},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540589518"},{"type":"electronic","value":"9783540491675"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-58951-1_117","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T16:56:55Z","timestamp":1330275415000},"page":"375-385","source":"Crossref","is-referenced-by-count":1,"title":["On teaching software verification and validation"],"prefix":"10.1007","author":[{"given":"Terry","family":"Shepard","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Glen W. Russell, \u201cExperience with Inspection in Ultralarge-Scale Developments\u201d, IEEE Software, January 1991, pp. 25\u201331","DOI":"10.1109\/52.62929"},{"issue":"no.3","key":"31_CR2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1147\/sj.153.0182","volume":"15","author":"M.E. Fagan","year":"1976","unstructured":"M.E. Fagan \u201cDesign and Code Inspections to Reduce Errors in Program Development\u201d, IBM Systems Journal, March 1976, vol.15, no.3, pp. 105\u2013211","journal-title":"IBM Systems Journal"},{"key":"31_CR3","unstructured":"BNR Network Products Group Quality Assurance, Code Inspections: A self study course on how to do them, Videotape VTDS205 (74 min) plus overheads, Bell Northern Research, Ottawa, Canada, Feb. 93"},{"key":"31_CR4","unstructured":"Richard Linger, Harlan Mills and B.I. Witt, \u201cStructured Programming\u201d, Addison Wesley, 1979"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Richard Selby, Victor Basili and F. Terry Baker, \u201cCleanroom software development: an empirical evaluation\u201d, IEEE TSE, Sept, 1987","DOI":"10.1109\/TSE.1987.233525"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Harlan Mills, Michael Dyer & Richard Linger, \u201cCleanroom Software Engineering\u201d, IEEE Software, Sept 87, pp. 19\u201325","DOI":"10.1109\/MS.1987.231413"},{"key":"31_CR7","unstructured":"Michael Dyer, \u201cThe Cleanroom approach to Quality Software Development\u201d, Wiley Series in Software Engineering Practice, John Wiley & Sons Ltd., 1992"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Linger, Richard C., \u201cCleanroom Process Model\u201d, IEEE Software, March 94, pp. 50\u201358","DOI":"10.1109\/52.268956"},{"key":"31_CR9","unstructured":"IBM Cleanroom Software Technology Centre, \u201cCleanroom Software Engineering for Zero-Defect Software\u201d, IBM, May 31, 1992 (Overheads from a workshop sponsored by the National Science Foundation, held at the Rochester Institute of Technology, May 31\u2013June 4, 1992)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"P. Allen Currit, Michael Dyer, Harlan Mills, \u201cCertifiying the Reliablility of Software\u201d, IEEE TSE Jan 1986, pp. 3\u201311; Correction TSE Mar 89 p362","DOI":"10.1109\/TSE.1986.6312914"},{"key":"31_CR11","unstructured":"Boris Beizer, Software Testing Techniques, van Nostrand Reinhold, 1983, 2nd Edition, 1990"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"R.W. Butler and G.B. Finelli, The Infeasibility of Quantifying the Reliability of Life-Critical Real-Time Software, IEEE TSE 19(1) pp. 3\u201312 (Jan 93)","DOI":"10.1109\/32.210303"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Hoffman, D., \u201cA CASE Study in Module Testing\u201d, 1989 Conference on Software Maintenance, October 1989, Miami, Florida","DOI":"10.1109\/ICSM.1989.65198"},{"key":"31_CR14","unstructured":"Dan Hoffman and Paul Strooper, Fundamentals of Software Design and Verification, textbook in preparation, University of Victoria, Victoria, Canada."},{"key":"31_CR15","unstructured":"John D. Musa, Anthony Iannino, Kazuhira Okumoto, \u201cSoftware Reliability: Measurement, Prediction, Application\u201d McGraw-Hill, 1990 (Professional Edition)"},{"key":"31_CR16","unstructured":"J.D. Musa et al, \u201cSoftware Reliability: Measurement, Prediction, Application\u201d, McGraw-Hill, 1987 (College Edition)"},{"key":"31_CR17","unstructured":"Woit, Denise, \u201cOperational Profile Specification, Test Case Generation, and Reliability Estimation for Modules\u201d, Ph.D. Thesis, Queen's University, January 1994."},{"key":"31_CR18","unstructured":"Course Outline, WCSE 475, \u201cSoftware Verification and Validation\u201d, US Air Force Institute of Technology, 1992"},{"key":"31_CR19","unstructured":"James H. Fetzer, \u201cProgram Verification: The Very Idea\u201d, CACM, Sept 1988; comments CACM Apr 89 p. 420"},{"key":"31_CR20","unstructured":"Stephane Cadorette, \u201cA Framework for Software Quality Definition, Allocation and Control\u201d, M.Eng. Thesis, Royal Military College of Canada, May 1994"},{"key":"31_CR21","volume-title":"Standard for Software Engineering of Safety Critical Software","author":"P. Joannou","year":"1990","unstructured":"Paul Joannou et al, \u201cStandard for Software Engineering of Safety Critical Software\u201d, Ontario Hydro, Toronto, Ontario, Canada, 1990"},{"key":"31_CR22","unstructured":"Sentot Kromodimoeljo, Bill Pase, Mark Saaltink, Dan Craigen and Irwin Meisels, \u201cA Tutorial on Eves\u201d, Odyssey Research Associates, Sept. 30, 1992"},{"key":"31_CR23","unstructured":"Anna Malton and Terry Shepard, \u201cA Beginner's Manual for Eves\u201d, Royal Military College of Canada EE Technical Report 93\/1, revised Feb. 94"},{"key":"31_CR24","unstructured":"David Andrews, A Guide to Eves Proving, Royal Military College of Canada EE Technical Report 94\/4, Revised May 12, 94"}],"container-title":["Lecture Notes in Computer Science","Software Engineering Education"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58951-1_117.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:24:58Z","timestamp":1605648298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58951-1_117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540589518","9783540491675"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-58951-1_117","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}