{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:00Z","timestamp":1750309080297,"version":"3.41.0"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[1980,4,1]],"date-time":"1980-04-01T00:00:00Z","timestamp":323395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[1980,4]]},"DOI":"10.1145\/1010792.1010797","type":"journal-article","created":{"date-parts":[[2004,7,21]],"date-time":"2004-07-21T23:30:10Z","timestamp":1090452610000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A benefit analysis of some software reliability methodologies"],"prefix":"10.1145","volume":"5","author":[{"given":"Robert L.","family":"Glass","sequence":"first","affiliation":[{"name":"Boeing Aerospace Co., Seattle, Washington"}]}],"member":"320","published-online":{"date-parts":[[1980,4]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"(ENDR75) \"An Analysis of Errors and Their Causes in System Programs \" IEEE Transactions on Software Engineering June 1975; Endres. Reviews errors detected in a large assembler-coded operating system. Studies causes of errors and detection and prevention methodologies. States \"almost half of all errors (45 percent) are found in the area of understanding the problem..\"  (ENDR75) \"An Analysis of Errors and Their Causes in System Programs \" IEEE Transactions on Software Engineering June 1975; Endres. Reviews errors detected in a large assembler-coded operating system. Studies causes of errors and detection and prevention methodologies. States \"almost half of all errors (45 percent) are found in the area of understanding the problem..\""},{"key":"e_1_2_1_2_1","unstructured":"(GLAS79) Software Reliability Guidebook Prentice-Hall 1979; Glass. Surveys the available technological and managerial software reliability techniques. Makes value judgments about each technique; illustrates each by example.   (GLAS79) Software Reliability Guidebook Prentice-Hall 1979; Glass. Surveys the available technological and managerial software reliability techniques. Makes value judgments about each technique; illustrates each by example."},{"volume-title":"Proceedings of the AIAA Conference on Computers in Aerospace","author":"Analysis Software Sneak","key":"e_1_2_1_3_1","unstructured":"(GODO77) \" Software Sneak Analysis ,\" Proceedings of the AIAA Conference on Computers in Aerospace , 1977; Godoy and Engels. Describes a methodology based on hardware sneak-circuit-analysis techniques which involves converting a computer program into a hardware circuit representation, and analyzing the circuit for certain kinds of structural faults. (GODO77) \"Software Sneak Analysis,\" Proceedings of the AIAA Conference on Computers in Aerospace, 1977; Godoy and Engels. Describes a methodology based on hardware sneak-circuit-analysis techniques which involves converting a computer program into a hardware circuit representation, and analyzing the circuit for certain kinds of structural faults."},{"key":"e_1_2_1_4_1","unstructured":"(HOWD78) \"An Evaluation of the Effectiveness of Symbolic Testing \" Software Practice and Experience July 1978; Howden. Evaluates several different debugging methodologies on their ability to detect errors. Finds symbolic testing particularly promising.  (HOWD78) \"An Evaluation of the Effectiveness of Symbolic Testing \" Software Practice and Experience July 1978; Howden. Evaluates several different debugging methodologies on their ability to detect errors. Finds symbolic testing particularly promising."},{"key":"e_1_2_1_5_1","unstructured":"(HOWD78A) \"Functional Program Testing \" University of Victoria Report DM-146-IR 1978; Howden. Analyzes errors in a scientific library to determine what techniques could have detected them. Advocates \"functional testing\" (the testing of each function performed by the program) combined with \"branch testing\" (the testing of all program logic segments).  (HOWD78A) \"Functional Program Testing \" University of Victoria Report DM-146-IR 1978; Howden. Analyzes errors in a scientific library to determine what techniques could have detected them. Advocates \"functional testing\" (the testing of each function performed by the program) combined with \"branch testing\" (the testing of all program logic segments)."},{"key":"e_1_2_1_6_1","unstructured":"(HOWD79) \"An Analysis of Software Validation Techniques for Scientific Programs \" University of Victoria Report DM-171-IR 1979; Howden. A more comprehensive report on the studies of HOWD78A.  (HOWD79) \"An Analysis of Software Validation Techniques for Scientific Programs \" University of Victoria Report DM-171-IR 1979; Howden. A more comprehensive report on the studies of HOWD78A."},{"key":"e_1_2_1_7_1","unstructured":"(JACK71) \"Software Validation of the Titan IIIC Digital Flight Control System Using a Hybrid Computer \" Proceedings of the 1971 Fall Joint Computer Conference; Jackson and Bravdica. Describes a specific environment simulator--the Titan IIIC mission the configuration of the test system and its use in the software development process.  (JACK71) \"Software Validation of the Titan IIIC Digital Flight Control System Using a Hybrid Computer \" Proceedings of the 1971 Fall Joint Computer Conference; Jackson and Bravdica. Describes a specific environment simulator--the Titan IIIC mission the configuration of the test system and its use in the software development process."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/359588.359602"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"(NG78) \"A 1900 Fortran Postmortem Dump System \" Software Practice and Experience July 1978; Ng and Young. Describes a source language debug tool which includes Fortran language dumps and data and logic tracing.  (NG78) \"A 1900 Fortran Postmortem Dump System \" Software Practice and Experience July 1978; Ng and Young. Describes a source language debug tool which includes Fortran language dumps and data and logic tracing.","DOI":"10.1002\/spe.4380080406"},{"volume-title":"Transactions of the Software '77 Conference","author":"Principles Software Testing","key":"e_1_2_1_10_1","unstructured":"(PAIG77) \" Software Testing Principles and Practice Using a Testing Coverage Analyzer ,\" Transactions of the Software '77 Conference , October 1977; Paige. The test coverage analyzer is defined and illustrated, with sample analyzer outputs shown. Testing strategies using an analyzer are discussed. (PAIG77) \"Software Testing Principles and Practice Using a Testing Coverage Analyzer,\" Transactions of the Software '77 Conference, October 1977; Paige. The test coverage analyzer is defined and illustrated, with sample analyzer outputs shown. Testing strategies using an analyzer are discussed."},{"key":"e_1_2_1_11_1","unstructured":"(SCHN79) \"An Experiemnt in Software Error Data Collection and Analysis \" Transactions on Software Engineering May 1979; Schneidewind and Hoffman. Analyzes errors and complexity measures. Concludes that program structure measurable by complexity techniques has a significant impact on the existence detection and correction of errors.  (SCHN79) \"An Experiemnt in Software Error Data Collection and Analysis \" Transactions on Software Engineering May 1979; Schneidewind and Hoffman. Analyzes errors and complexity measures. Concludes that program structure measurable by complexity techniques has a significant impact on the existence detection and correction of errors."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/800027.808425"},{"key":"e_1_2_1_13_1","unstructured":"(WEIS78) \"Evaluating Software Development by Error Analysis \" Naval Research Lab NRL-8268 December 1978; Weiss. Uses error analysis and programmer interviews to study error occurrences. Postulates an error-detection methodology and discusses an instance of its use.  (WEIS78) \"Evaluating Software Development by Error Analysis \" Naval Research Lab NRL-8268 December 1978; Weiss. Uses error analysis and programmer interviews to study error occurrences. Postulates an error-detection methodology and discusses an instance of its use."}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1010792.1010797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1010792.1010797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:25Z","timestamp":1750286605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1010792.1010797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1980,4]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1980,4]]}},"alternative-id":["10.1145\/1010792.1010797"],"URL":"https:\/\/doi.org\/10.1145\/1010792.1010797","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[1980,4]]},"assertion":[{"value":"1980-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}