{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T03:24:39Z","timestamp":1773977079346,"version":"3.50.1"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319472850","type":"print"},{"value":"9783319472867","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47286-7_18","type":"book-chapter","created":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T17:51:10Z","timestamp":1475689870000},"page":"256-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Epistemic Opacity, Confirmation Holism and Technical Debt: Computer Simulation in the Light of Empirical Software Engineering"],"prefix":"10.1007","author":[{"given":"Julian","family":"Newman","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,6]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.5194\/gmd-8-1221-2015","volume":"8","author":"K Alexander","year":"2015","unstructured":"Alexander, K., Easterbrook, S.M.: The software architecture of climate models. Geosci. Model Dev. 8, 1221\u20131232 (2015)","journal-title":"Geosci. Model Dev."},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s13347-014-0159-6","volume":"27","author":"N Angius","year":"2014","unstructured":"Angius, N.: The problem of justification of empirical hypotheses in software testing. Philos. Technol. 27, 423\u2013439 (2014)","journal-title":"Philos. Technol."},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Becker, C., Chitchyan, R., Duboc, L., Easterbrook, S., Penzenstadler, B., Seyff N., Venters, C.C.: Sustainability design and software: the Karlskrona manifesto. In: Proceedings of the 37th International Conference on Software Engineering, vol. 2, pp. 467\u2013476. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.179"},{"issue":"1","key":"18_CR4","first-page":"49","volume":"15","author":"M Boon","year":"2011","unstructured":"Boon, M.: In defense of engineering sciences: on the epistemological relations between science and technology. Techn\u00e9 15(1), 49\u201370 (2011)","journal-title":"Techn\u00e9"},{"key":"18_CR5","unstructured":"Boschetti, F., Fulton, E.A., Bradbury, R.H., Symons, J.: What is a model, why people don\u2019t trust them, and why they should. In: Negotiating Our Future: Living Scenarios for Australia to 2050, pp. 107\u2013119 (2012)"},{"key":"18_CR6","volume-title":"The Wisdom of the Body","author":"WB Cannon","year":"1932","unstructured":"Cannon, W.B.: The Wisdom of the Body. Norton, New York (1932)"},{"key":"18_CR7","volume-title":"HCI Models, Theories, and Frameworks","year":"2003","unstructured":"Carroll, J.M. (ed.): HCI Models, Theories, and Frameworks. Morgan Kaufman, San Francisco (2003)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Cunningham, W.: The WyCash portfolio management system. In: Addendum to the Proceedings on Object-Oriented Programming Systems, Languages, and Applications, *A19, Vancouver, British Columbia, Canada. ACM (1992)","DOI":"10.1145\/157709.157715"},{"key":"18_CR9","volume-title":"Logic and Information","author":"K Devlin","year":"1991","unstructured":"Devlin, K.: Logic and Information. Cambridge University Press, Cambridge (1991)"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s13347-013-0141-8","volume":"27","author":"J Dewhurst","year":"2014","unstructured":"Dewhurst, J.: Mechanistic miscomputation: a reply to fresco and primiero. Philos. Technol. 27, 495\u2013498 (2014)","journal-title":"Philos. Technol."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H Do","year":"2005","unstructured":"Do, H., Elbaum, S., Rothermel, G.: Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact. Empirical Softw. Eng. 10, 405\u2013435 (2005)","journal-title":"Empirical Softw. Eng."},{"issue":"6","key":"18_CR12","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCSE.2009.193","volume":"11","author":"SM Easterbrook","year":"2009","unstructured":"Easterbrook, S.M., Johns, T.C.: Engineering the software for understanding climate change. Comput. Sci. Eng. 11(6), 64\u201374 (2009)","journal-title":"Comput. Sci. Eng."},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1145\/1101815.1101817","volume":"14","author":"J Estublier","year":"2005","unstructured":"Estublier, J., Leblang, D., Hoek, A.V.D., Conradi, R., Clemm, G., Tichy, W., Wiborg-Weber, D.: Impact of software engineering research on the practice of software configuration management. ACM Trans. Softw. Eng. Methodol. (TOSEM) 14(4), 383\u2013430 (2005)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"issue":"1\u20132","key":"18_CR14","first-page":"104","volume":"11","author":"J Fleck","year":"1996","unstructured":"Fleck, J.: Informal information flow and the nature of expertise in financial services. Int. J. Technol. Manag. 11(1\u20132), 104\u2013128 (1996)","journal-title":"Int. J. Technol. Manag."},{"issue":"4","key":"18_CR15","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1080\/09537329708524293","volume":"9","author":"J Fleck","year":"1997","unstructured":"Fleck, J.: Contingent knowledge and technology development. Technol. Anal. Strateg. Manag. 9(4), 383\u2013398 (1997)","journal-title":"Technol. Anal. Strateg. Manag."},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1007\/s11229-014-0610-3","volume":"192","author":"L Floridi","year":"2015","unstructured":"Floridi, L., Fresco, N., Primiero, G.: On malfunctioning software. Synth\u00e8se 192, 1199\u20131220 (2015)","journal-title":"Synth\u00e8se"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s13347-013-0112-0","volume":"26","author":"N Fresco","year":"2013","unstructured":"Fresco, N., Primiero, G.: Miscomputation. Philos. Technol. 26, 253\u2013272 (2013)","journal-title":"Philos. Technol."},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s13194-015-0110-4","volume":"5","author":"M Frisch","year":"2015","unstructured":"Frisch, M.: Predictivism and old evidence: a critical look at climate model tuning. Eur. J. Philos. Sci. 5, 171\u2013190 (2015)","journal-title":"Eur. J. Philos. Sci."},{"key":"18_CR19","volume-title":"Perceiving, Acting, and Knowing","author":"JJ Gibson","year":"1977","unstructured":"Gibson, J.J.: The theory of affordances. In: Shaw, R., Bransford, J. (eds.) Perceiving, Acting, and Knowing. Erlbaum, Hillsdale (1977)"},{"key":"18_CR20","volume-title":"The Ecological Approach to Visual Perception","author":"JJ Gibson","year":"1979","unstructured":"Gibson, J.J.: The Ecological Approach to Visual Perception. Houghton Mifflin, Boston (1979). Republished 2014 Psychology Press and Routledge Classic Editions"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1081\/E-ESE-120044178","volume-title":"Encyclopedia of Software Engineering","author":"David Alan Grier","year":"2010","unstructured":"Grier, D.A.: Software engineering: history. In: Encyclopedia of Software Engineering, pp. 1119\u20131126. Taylor & Francis, London (2011). doi: 10.1081\/E-ESE-120044178"},{"key":"18_CR22","unstructured":"Grier, D.A.: Walter shewhart and the philosophical foundations of software engineering. In: Third International Conference on the History and Philosophy of Computing (HaPoC 2015), Pisa, Italy, 8\u201311 October 2015 (2015)"},{"key":"18_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814563","volume-title":"Representing and Intervening","author":"I Hacking","year":"1983","unstructured":"Hacking, I.: Representing and Intervening. Cambridge University Press, Cambridge (1983)"},{"issue":"1","key":"18_CR24","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/BF00125808","volume":"1","author":"W Harrison","year":"1996","unstructured":"Harrison, W., Basili, V.: Editorial. Empirical Software Eng. 1(1), 5\u201310 (1996)","journal-title":"Empirical Software Eng."},{"key":"18_CR25","doi-asserted-by":"publisher","DOI":"10.1093\/0195158709.001.0001","volume-title":"Extending Ourselves: Computational Science, Empiricism and Scientific Method","author":"P Humphreys","year":"2004","unstructured":"Humphreys, P.: Extending Ourselves: Computational Science, Empiricism and Scientific Method. Cambridge University Press, Cambridge (2004)"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11229-008-9435-2","volume":"169","author":"P Humphreys","year":"2009","unstructured":"Humphreys, P.: The philosophical novelty of computer simulation methods. Synth\u00e8se 169, 615\u2013626 (2009)","journal-title":"Synth\u00e8se"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Jedlitschka, A., Pfahl, D.: Reporting guidelines for controlled experiments in software engineering. In: International Symposium on Empirical Software Engineering, pp. 95\u2013104. IEEE (2005)","DOI":"10.1109\/ISESE.2005.1541818"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Jeffery, D.R., Votta, L.G. (eds.): Special Section on Empirical Software Engineering, IEEE Trans. Software Eng. 25(4), 435\u2013583 (1999)","DOI":"10.1109\/TSE.1999.799935"},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1016\/j.infsof.2014.05.006","volume":"56","author":"U Kanewala","year":"2014","unstructured":"Kanewala, U., Bieman, J.M.: Testing scientific software: a systematic literature review. Inf. Softw. Technol. 56, 1219\u20131232 (2014)","journal-title":"Inf. Softw. Technol."},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Kazman, R., Cai, Y., Mo, R., Feng, Q., Xiao, L., Haziyev, S., Fedak, V., Shapochka, A.: A case study in locating the architectural roots of technical debt. In: Proceedings of the 37th International Conference on Software Engineering, vol. 2, pp. 179\u2013188. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.146"},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/52.476281","volume":"13","author":"B Kitchenham","year":"1996","unstructured":"Kitchenham, B., Pfleeger, S.L.: Software quality: the elusive target. IEEE Softw. 13, 12\u201321 (1996)","journal-title":"IEEE Softw."},{"issue":"8","key":"18_CR32","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TSE.2002.1027796","volume":"28","author":"B Kitchenham","year":"2002","unstructured":"Kitchenham, B., Pfleeger, S.L., Pickard, L.M., Jones, P.W., Hoaglin, D.C., El Emam, K., Rosenberg, J.: Preliminary guidelines for empirical research in software engineering. IEEE Trans. Softw. Eng. 28(8), 721\u2013734 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"18_CR33","unstructured":"Kroes, P., Meijers, A. (eds.): The Empirical Turn in the Philosophy of Technology. Elsevier, Amsterdam (2000); Emerald, Bingley (2009, republished)"},{"issue":"6","key":"18_CR34","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MS.2012.167","volume":"29","author":"P Kruchten","year":"2012","unstructured":"Kruchten, P., Nord, R.L., Ozkaya, I.: Technical debt: from metaphor to theory and practice. IEEE Softw. 29(6), 18\u201321 (2012)","journal-title":"IEEE Softw."},{"key":"18_CR35","unstructured":"Lamport, L.: The future of computing: logic or biology. Talk, Christian Albrechts Univ. Kiel, 11 June 2003. http:\/\/research.microsoft.com\/en-us\/um\/people\/lamport\/pubs\/future-of-computing.pdf"},{"key":"18_CR36","first-page":"145","volume-title":"Science in Action: How to Follow Scientists and Engineers through Society, Chap. 4","author":"B Latour","year":"1987","unstructured":"Latour, B.: Insiders out. In: Latour, B. (ed.) Science in Action: How to Follow Scientists and Engineers through Society, Chap. 4, pp. 145\u2013176. Open University Press, Milton Keynes (1987)"},{"key":"18_CR37","first-page":"35","volume-title":"Science in Context: Readings in the Sociology of Science","author":"B Latour","year":"1982","unstructured":"Latour, B., Woolgar, S.: The cycle of credibility. In: Barnes, B., Edge, D. (eds.) Science in Context: Readings in the Sociology of Science, pp. 35\u201343. Open University Press, Milton Keynes (1982)"},{"key":"18_CR38","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.shpsb.2010.07.001","volume":"41","author":"J Lenhard","year":"2010","unstructured":"Lenhard, J., Winsberg, E.: Holism, entrenchment, and the future of climate model pluralism. Stud. Hist. Philos. Mod. Phys. 41, 253\u2013262 (2010)","journal-title":"Stud. Hist. Philos. Mod. Phys."},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Leszak, M., Perry, D.E., Stoll, D.: A case study in root cause defect analysis. In: Proceedings of the 22nd International Conference on Software Engineering, ICSE 2000, Limerick, Ireland, pp. 428\u2013437. IEEE (2000)","DOI":"10.1145\/337180.337232"},{"key":"18_CR40","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10664-005-1290-x","volume":"10","author":"T Lethbridge","year":"2005","unstructured":"Lethbridge, T., Sim, S., Singer, J.: Studying software engineers: data collection techniques for software field studies. Empirical Softw. Eng. 10, 31\u2013341 (2005)","journal-title":"Empirical Softw. Eng."},{"key":"18_CR41","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s10664-011-9155-y","volume":"16","author":"Z Li","year":"2011","unstructured":"Li, Z., Madhavji, N.H., Murtaza, S.S., Gittens, M., Miranskyy, A.V., Godwin, D., Cialini, E.: Characteristics of multiple-component defects and architectural hotspots: a large system case study. Empirical Softw. Eng. 16, 667\u2013702 (2011)","journal-title":"Empirical Softw. Eng."},{"issue":"5","key":"18_CR42","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TSE.2010.28","volume":"36","author":"S MacDonell","year":"2010","unstructured":"MacDonell, S., Shepperd, M., Kitchenham, B., Mendes, E.: How reliable are systematic reviews in empirical software engineering? IEEE Trans. Softw. Eng. 36(5), 676\u2013687 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"18_CR43","volume-title":"Foundations of Software Testing","author":"AP Mathur","year":"2008","unstructured":"Mathur, A.P.: Foundations of Software Testing. Pearson, Upper Saddle River (2008)"},{"key":"18_CR44","doi-asserted-by":"publisher","first-page":"M00A01","DOI":"10.1029\/2012MS000154","volume":"4","author":"T Mauritsen","year":"2012","unstructured":"Mauritsen, T., Stevens, B., Roeckner, E., Crueger, T., Esch, M., Giorgetta, M., Haak, H., Jungclaus, J., Klocke, D., Matei, D., Mikolajewicz, U., Notz, D., Pincus, R., Schmidt, H., Tomassini, L.: Tuning the climate of a global model. J. Adv. Model. Earth Syst. 4, M00A01 (2012). doi: 10.1029\/2012MS000154","journal-title":"J. Adv. Model. Earth Syst."},{"key":"18_CR45","unstructured":"Meijers, A.: The relational ontology of technical artifacts. In: Kroes, P., Meijers, A. (eds.) The Empirical Turn in the Philosophy of Technology, pp. 81\u201396. Elsevier, Amsterdam (2000); Emerald, Bingley (2009, republished)"},{"issue":"3810","key":"18_CR46","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1126\/science.159.3810.56","volume":"159","author":"R Merton","year":"1968","unstructured":"Merton, R.: The Matthew effect in science. Science 159(3810), 56\u201363 (1968)","journal-title":"Science"},{"key":"18_CR47","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1126\/science.1218263","volume":"336","author":"A Morin","year":"2012","unstructured":"Morin, A., Urban, J., Adams, P.D., Foster, I., Sali, A., Baker, D., Sliz, P.: Shining light into black boxes. Science 336, 159\u2013160 (2012)","journal-title":"Science"},{"key":"18_CR48","volume-title":"The Design of Everyday Things","author":"D Norman","year":"1988","unstructured":"Norman, D.: The Design of Everyday Things. Basic Books, New York (1988). Original hardback title: The Psychology of Everyday Things, 2nd edn. (2002)"},{"key":"18_CR49","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10838-008-9068-7","volume":"39","author":"M Northover","year":"2008","unstructured":"Northover, M., Kourie, D.G., Boake, A., Gruner, S., Northover, A.: Towards a philosophy of software development. J. General Philos. Sci. 39, 85\u2013113 (2008)","journal-title":"J. General Philos. Sci."},{"issue":"4","key":"18_CR50","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.5194\/gmd-5-1009-2012","volume":"5","author":"J Pipitone","year":"2012","unstructured":"Pipitone, J., Easterbrook, S.: Assessing climate model software quality: a defect density analysis of three models. Geosci. Model Dev. 5(4), 1009\u20131022 (2012)","journal-title":"Geosci. Model Dev."},{"key":"18_CR51","volume-title":"Conjectures and Refutations: The Growth of Scientific Knowledge","author":"K Popper","year":"1965","unstructured":"Popper, K.: Conjectures and Refutations: The Growth of Scientific Knowledge, 2nd (revised) edn. Routledge, London (1965)","edition":"2 (revised)"},{"issue":"2","key":"18_CR52","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2008","unstructured":"Runeson, P., Host, M.: Guidelines for conducting and reporting case study research in software engineering. Empirical Softw. Eng. 14(2), 131\u2013164 (2008)","journal-title":"Empirical Softw. Eng."},{"issue":"4","key":"18_CR53","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/32.799958","volume":"25","author":"K Schmid","year":"1999","unstructured":"Schmid, K.: Technical debt \u2013 from metaphor to engineering guidance. IEEE Trans. Softw. Eng. 25(4), 573\u2013583 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"18_CR54","volume-title":"The Sciences of the Artificial","author":"HA Simon","year":"1996","unstructured":"Simon, H.A.: The Sciences of the Artificial, 3rd edn. MIT Press, Cambridge (1996)","edition":"3"},{"issue":"4","key":"18_CR55","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/s10699-012-9307-6","volume":"18","author":"J Symons","year":"2013","unstructured":"Symons, J., Boschetti, F.: How computational models predict the behavior of complex systems. Found. Sci. 18(4), 809\u2013821 (2013)","journal-title":"Found. Sci."},{"issue":"3","key":"18_CR56","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s13347-014-0163-x","volume":"27","author":"J Symons","year":"2014","unstructured":"Symons, J., Horner, J.: Software intensive science. Philos. Technol. 27(3), 461\u2013477 (2014)","journal-title":"Philos. Technol."},{"key":"18_CR57","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/2.675631","volume":"5","author":"WF Tichy","year":"1998","unstructured":"Tichy, W.F.: Should computer scientists experiment more? IEEE Comput. 5, 32\u201340 (1998)","journal-title":"IEEE Comput."},{"key":"18_CR58","first-page":"97","volume-title":"Globalised Culture and Education in the New Millenium","author":"S Turkle","year":"2004","unstructured":"Turkle, S.: The fellowship of the microchip: global technologies as evocative objects. In: Suarez-Orozco, M.M., Qui-Hilliard, B.D. (eds.) Globalised Culture and Education in the New Millenium, pp. 97\u2013113. University of California Press, Berkeley (2004)"},{"key":"18_CR59","unstructured":"Turner, R.: The philosophy of computer science. In: Stanford Encyclopedia of Philosophy. http:\/\/plato.stanford.edu\/entries\/computer-science\/"},{"key":"18_CR60","unstructured":"Turner, R.: Computational artefacts. In: IACAP Conference 2013 (2013)"},{"key":"18_CR61","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s13347-012-0098-z","volume":"27","author":"R Turner","year":"2014","unstructured":"Turner, R.: Programming languages as technical artifacts. Philos. Technol. 27, 377\u2013397 (2014)","journal-title":"Philos. Technol."},{"issue":"2","key":"18_CR62","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1080\/02691728.2013.794872","volume":"29","author":"S Wagenknecht","year":"2015","unstructured":"Wagenknecht, S.: Facing the incompleteness of epistemic trust: Managing dependence in scientific practice. Soc. Epistemol. 29(2), 160\u2013184 (2015)","journal-title":"Soc. Epistemol."},{"key":"18_CR63","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226902050.001.0001","volume-title":"Science in the Age of Computer Simulation","author":"E Winsberg","year":"2010","unstructured":"Winsberg, E.: Science in the Age of Computer Simulation. University of Chicago Press, Chicago (2010)"},{"key":"18_CR64","doi-asserted-by":"crossref","unstructured":"Wright, H.K., Kim, M., Perry, D.E.: Validity concerns in software engineering research. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, pp. 411\u2013414. ACM (2010)","DOI":"10.1145\/1882362.1882446"},{"issue":"2","key":"18_CR65","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/bltj.2101","volume":"3","author":"WD Yu","year":"1998","unstructured":"Yu, W.D.: A software fault prevention approach in coding and root cause analysis. Bell Labs Tech. J. 3(2), 3\u201321 (1998)","journal-title":"Bell Labs Tech. J."},{"issue":"5","key":"18_CR66","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/2.675630","volume":"31","author":"M Zelkowitz","year":"1998","unstructured":"Zelkowitz, M., Wallace, D.: Experimental models for validating computer technology. IEEE Comput. 31(5), 23\u201331 (1998)","journal-title":"IEEE Comput."}],"container-title":["IFIP Advances in Information and Communication Technology","History and Philosophy of Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47286-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T20:12:14Z","timestamp":1657397534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47286-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319472850","9783319472867"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47286-7_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"6 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HaPoC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the History and Philosophy of Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hapoc2015","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}