Information Technology Reference
In-Depth Information
References
[1] Anderson., R.: Why information security is hard, an economic perspective. In: 17th An-
nual Computer Security Applications Conf., New Orleans, LA (December 2001)
[2] Carman, D.W., Dolinsky, A.A., Lyu, M.R., Yu, J.S.: Software Reliability Engineering
Study of a Large-Scale Telecommunications System. In: Proc. Sixth Int'l Symp. Software
Reliability Eng., pp. 350-359 (1995)
[3] Connell, C.: It's Not About Lines of Code,
http://www.developer.com/java/other/article.php/988641 (viewed
March 15, 2010)
[4] Daskalantonakis, M.K.: A Practical View of Software Measurement and Implementation
Experiences within Motorola. IEEE Trans. Software Eng. 18(11), 998-1010 (1992)
[5] Kaaniche, K., Kanoun, K.: Reliability of a Telecommunications System. In: Proc. Sev-
enth Int'l Symp. Software Reliability Eng., pp. 207-212 (1996)
[6] Khoshgoftaar, T.M., Allen, E.B., Kalaichelvan, K.S., Goel, N.: Early Quality Prediction:
A Case Study in Telecommunications. IEEE Trans. Software Eng. 13(1), 65-71 (1996)
[7] Levendel, Y.: Reliability Analysis of Large Software Systems: Defects Data Modeling.
IEEE Trans. Software Eng. 16(2), 141-152 (1990)
[8] Mills, H.D.: Top-down programming in large systems. In: Rustin, R. (ed.) Debugging
Techniques in Large Systems. Prentice-Hall, Englewoods Cliffs (1971)
[9] Munson, J.C., Khoshgoftaar, T.M.: The Detection of Fault-Prone Programs. IEEE Trans-
actions on Software Engineering 18(5), 423-433 (1992)
[10] Cobb, C.W., Douglas, P.H.: A theory of production. American Economic Review 18(1),
139-165 (1928); Supplement, Papers and Proceedings of the Fortieth Annual Meeting of
the American Economic Association (1928)
[11] Bayes, T.: An essay towards solving a problem in the doctrine of chances. Philosophical
Transactions of the Royal Society 53, 370-418 (1763)
[12] Bacon, D.F., Chen, Y., Parkes, D., Rao, M.: A market-based approach to software evolu-
tion. Paper Presented at the Proceeding of the 24th ACM SIGPLAN Conference Compan-
ion on Object Oriented Programming Systems languages and Applications (2009)
[13] Sestoft, P.: Systematic software testing IT University of Copenhagen, Denmark1 Version
2, 2008-02-25 (2008)
[14] Wright, C.S.: The not so Mythical IDS Man-Month: Or Brooks and the rule of informa-
tion security. In: ISSRE (2010)
 
Search WWH ::




Custom Search