Information Technology Reference
In-Depth Information
[25] Li Z., Tian J., “Analyzing web logs to identify common errors and improve web relia-
bility”, in:
Proc. IADIS International Conference on E-Society, Lisbon, Portugal
, June
2003, pp. 235-242.
[26] Li Z., Tian J., “Testing the suitability of Markov chains as web usage models”, in:
Proc.
27th Int. Computer Software and Applications Conf., Dallas, TX
, Nov. 2003, pp. 356-
361.
[27] Lyu M.R.,
Handbook of Software Reliability Engineering
, McGraw-Hill, New York,
1995.
[28] Ma L., Tian J., “Analyzing errors and referral pairs to characterize common problems and
improve web reliability”, in:
Proc. 3rd International Conference on Web Engineering,
Oviedo, Spain
, July 2003, pp. 314-323.
[29] Miller E.,
The Website Quality Challenge
, Software Research, Inc., San Francisco, CA,
2000.
[30] Mills H.D., “On the statistical validation of computer programs”, Technical Report 72-
6015, IBM Federal Syst. Div., 1972.
[31] Mills H.D., Basili V.R., Gannon J.D., Hamlet R.G.,
Principles of Computer Program-
ming: A Mathematical Approach
, Alan and Bacon, Inc., Boston, MA, 1987.
[32] Montgomery A.L., Faloutsos C., “Identifying web browsing trends and patterns”,
IEEE
Computer
34
(7) (July 2001) 94-95.
[33] Musa J.D.,
Software Reliability Engineering
, McGraw-Hill, New York, 1998.
[34] Musa J.D., Iannino A., Okumoto K.,
Software Reliability: Measurement, Prediction, Ap-
plication
, McGraw-Hill, New York, 1987.
[35] Myers G.J.,
The Art of Software Testing
, John Wiley & Sons, Inc., New York, 1979.
[36] Nelson E., “Estimating software reliability from test data”,
Microelectronics and Relia-
bility
17
(1) (1978) 67-73.
[37] Peper M., Hermsdorf D., “BSCW for disabled teleworkers: Usability evaluation and in-
terface adaptation of an Internet-based cooperation environment”,
Computer Networks
and ISDN Systems
29
(8-13) (Sept. 1997) 1479-1487.
[38] Pfleeger S.L., Hatton L., Howell C.C.,
Solid Software
, Prentice Hall, Upper Saddle River,
NJ, 2002.
[39] Pitkow J.E., “Summary of WWW characterizations”,
Wo r l d Wi d e We b
2
(1-2) (1999)
3-13.
[40] Porter A.A., Siy H., Votta L.G., “A review of software inspections”, in: Zelkowitz M.V.
(Ed.),
Advances in Computers
, vol. 42, Academic Press, San Diego, CA, 1996, pp. 39-76.
[41] Schneidewind N.F., “Software reliability model with optimal selection of failure data”,
IEEE Trans. Software Engrg.
19
(11) (Nov. 1993) 1095-1104.
[42] Shneiderman
B.,
Designing
the
User
Interface:
Strategies
for
Effective
Human-
Computer Interaction
, Addison-Wesley, Reading, MA, 1987.
[43] Stallings W.,
High Speed Networks and Internets: Performance and Quality of Service
,
second ed., Prentice Hall, Upper Saddle River, NJ, 2001.
[44] Thayer R., Lipow M., Nelson E.,
Software Reliability
, North-Holland, New York, 1978.
[45] Tian J., “Integrating time domain and input domain analyses of software reliability using
tree-based models”,
IEEE Trans. Software Engrg.
21
(12) (Dec. 1995) 945-958.