Documente Academic
Documente Profesional
Documente Cultură
1. Ahern, D.M., Clouse, A., Armstrong, J.: CMMI Scampi Distilled. Addison-Wesley, Amster-
dam (2005)
2. Ahern, D.M., Clouse, A., Turner, R.: CMMI Distilled. Addison-Wesley, Amsterdam (2003)
3. Aho, A.V., Sethi, R., Ullman, J.D.: Compilers, Principles, Techniques, and Tools. Addison-
Wesley, Boston (1986)
4. et al., R.B.: A systems engineering capability maturity model version 1.1. Tech. Rep.
CMU/SEI-95-MM-003, Software Engineering Institute (SEI) (1995)
5. et al., R.B.: An integrated product development capability maturity model. Tech. Rep.
CMU/SEI-97-MM-001, Software Engineering Institute (SEI) (1997)
6. http://ant.apache.org
7. http://www.antlr.org
8. Balzert, H.: Lehrbuch der Software-Technik, Band 2. Spektrum Akademischer Verlag, Hei-
delberg (1998)
9. Balzert, H.: Lehrbuch der Software-Technik, Band 1. Spektrum Akademischer Verlag, Hei-
delberg (2000)
10. Balzert, H.: Lehrbuch der Objektmodellierung. Analyse und Entwurf. Spektrum Akademi-
scher Verlag (2004)
11. Balzert, H.: UML2 in 5 Tagen. W3l Verlag (2005)
12. Basili, V.R., Briand, L.C., Melo, W.L.: A validation of object-oriented design metrics as
quality indicators. IEEE Transactions on Software Engineering 22(10), 751–761 (1996)
13. Battelle, J.: The 70 percent solution. Business 2.0 6(11) (2005)
14. Beck, K.: Extreme Programming – Das Manifest. Addison-Wesley, München (2000)
15. Beck, K.: Test-Driven Development : By Example. Addison-Wesley, Boston (2002)
16. Beck, K.: JUnit kurz und gut. O’Reilly and Associates, Sebastopol (2005)
17. Beck, K., Andres, C.: Extreme Programming Explained. Addison-Wesley, Upper Saddle
River, NJ (2005)
18. Beck, K., Gamma, E.: Contributing to Eclipse. Principles, Patterns, and Plugins. Addison-
Wesley Longman, Amsterdam (2004)
19. Beizer, B.: Software Testing Techniques. Van Nostrand Reinhold, New York (1983)
20. Benington, H.D.: Production of large computer programs. In: Proceedings of the ONR Sym-
posium on Advanced Computer Programs for Digital Computers, pp. 350–361. Washington,
D.C., Office of Naval Research (1956). Nachgedruckt in [21]
21. Benington, H.D.: Production of large computer programs. In: ICSE ’87: Proceedings of the
9th international conference on Software Engineering, pp. 299–310. IEEE Computer Society
Press, Los Alamitos, CA (1987)
22. Berge, C.: Graphs and Hypergraphs. North-Holland Publishing, Amsterdam (1979)
23. Berge, C.: Graphs. North-Holland Publishing, Amsterdam (1989)
547
548 Literaturverzeichnis
24. Bird, R.: Introduction to Functional Programming Using Haskell. Prentice Hall Europe,
London (1998)
25. http://www.bitkeeper.com
26. Blahut, R.E.: Algebraic Codes for Data Transmission. Cambridge University Press, Cam-
bridge (2002)
27. Blair, M., Obenski, S., Bridickas, P.: Patriot missile defense: Software problem led to system
failure at dhahran, saudi arabia. Report GAO/IMTEC-92-26, Information Management and
Technology Division, United States General Accounting Office, Washington, D.C. (1992)
28. Boehm, B.: A spiral model of software development and enhancement. SIGSOFT Softw.
Eng. Notes 11(4), 14–24 (1986)
29. Boehm, B.: A spiral model of software development and enhancement. IEEE Computer
21(5), 61–72 (1988)
30. Boehm, B.W.: Software Engineering Economics. Prentice-Hall, Englewood Cliffs, NJ (1981)
31. Boehm, B.W.: Improving software productivity. IEEE Computer 20(9), 43 – 57 (1987)
32. Bookman, C.: Linux Clustering : Building and Maintaining Linux Clusters. New Riders,
Boston (2003)
33. Bornat, R.: Understanding and Writing Compilers : A Do-it-Yourself Guide. Macmillan,
London (1979)
34. Bourne, K.C.: Testing Client/Server Systems. McGraw-Hill, New York (1997)
35. Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Transactions
on Computers C-35(8), 677–691 (1986)
36. Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic model
checking: 1020 states and beyond. In: Proceedings of the Fifth Annual IEEE Symposium
on Logic in Computer Science, pp. 1–33. IEEE Computer Society Press, Washington, D.C.
(1990)
37. Burgess, A.: Phone outages blamed on switching software. IEEE Software 8(5), 100–101
(1991)
38. Campbell, S., Chancelier, J.P., Nikoukhah, R.: Modeling and Simulation in Scilab/Scicos.
Springer-Verlag, Berlin, Heidelberg, New York (2005)
39. Card, D.N., Glass, R.L.: Measuring Software Design Quality. Prentice Hall, Englewood
Cliffs, NJ (1980)
40. Cardelli, L.: Type systems. ACM Computing Surveys 28(1), 263–264 (1996)
41. Chen, R.: The Old New Thing. Practical Development Throughout the Evolution of Win-
dows. Addison-Wesley, Amsterdam (2006)
42. Chidamber, S.R., Kemerer, C.F.: Towards a metrics suite for object oriented design. In:
OOPSLA ’91: Conference proceedings on Object-oriented programming systems, langua-
ges, and applications, pp. 197–211. ACM Press, New York (1991)
43. Chidamber, S.R., Kemerer, C.F.: A metrics suite for object oriented design. IEEE Transacti-
ons on Software Engineering 20(6), 476–493 (1994)
44. Chrissis, M.B., Konrad, M., Shrum, S.: CMMI : guidelines for process integration and pro-
duct improvement, 2nd edition edn. Addison-Wesley, Amsterdam (2006)
45. Church, A.: Review of turing 1936. Journal of Symbolic Logic 2(1), 42–43 (1937)
46. Clarke, C.: Program invariants as fixpoints. Computing 21(4), 273–294 (1979)
47. Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic verification of finite-state concurrent
systems using temporal logic specifications. ACM Transactions on Programming Languages
and Systems 8, 244–263 (1986)
48. Clarke, L.A., Podgpurski, A., Richardson, D.J., Zeil, S.J.: A comparison of data flow path
selection criteria. In: Proceedings of the 8th International Conference on Software Enginee-
ring, pp. 244–251. IEEE Computer Society Press, London, England (1985)
49. Cocke, J., Sweeney, D.W.: High speed arithmetic in a parallel device (1957). Technical
Report, IBM
50. Colbourn, C.J., Dinitz, J.H.: CRC Handbook of Combinatorial Designs. CRC Press, Boca
Raton, FL (1996)
51. Committee, A.S.: Rationale for the ANSI C Programming Language. Silicon Press, Summit,
NJ (1990)
Literaturverzeichnis 549
52. Cook, W.R.: A proposal for making eiffel type-safe. The Computer Journal 32(4), 305 – 310
(1989)
53. Cooper, J., Fisher, M.: Software acquisition capability maturity model (sa-cmm), version
1.03. Tech. Rep. CMU/SEI-2002-TR-010, Software Engineering Institute (SEI) (2002)
54. Coorporation, M.: Design guidelines for class library developers. http://msdn.microsoft.com
55. Copeland, L.: A Practitioner’s Guide to Software Test Design. Artech House Publishers,
Norwood, MA (2004)
56. Coppick, J.C., Cheatham, T.J.: Software metrics for object-oriented systems. In: ACM annual
conference on Communications, pp. 317–322. ACM Press (1992)
57. Cormen, T., Leserson, C.E., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd editon.
MIT Press (2001)
58. Cormen, T.H., Leiserson, C.E., Rivest, R., Stein, C.: Algorithmen – Eine Einführung.
Oldenbourg-Verlag, München, Wien (2007)
59. Corporation, I.: Statistical analysis of floating point flaw in the pentium. White paper (1994)
60. Covey, S.R.: The seven Habits of Highly Effective People. Simon & Schuster, London, UK
(2004)
61. Cowart, R., Knittel, B.: Using Microsoft Windows XP Home. Que Publishing, Indianapolis,
Ind (2004)
62. Craig, R.D., Jaskiel, S.P.: Systematic Software Testing. Artech House Publishers (2002)
63. Crosby, P.B.: Quality is Free. McGraw-Hill, New York, NY (1979)
64. Crosby, P.B.: Quality is Still Free. McGraw-Hill, New York, NY (1996)
65. Curtis, B., Hefley, B., Miller, S.: People capability maturity model (p-cmm) version 2.0.
Tech. Rep. CMU/SEI-2001-MM-001, Software Engineering Institute (SEI) (2001)
66. Dabney, J.B., Harman, T.L.: Mastering Simulink. Pearson / Prentice Hall, Upper Saddle
River, NJ (2004)
67. DeMarco, T.: Controlling Software Projects: Management, Measurement, and Estimates.
Prentice Hall PTR (1986)
68. DeMarco, T., Lister, T.: Peopleware. Dorset House Publishing Co., New York (1987)
69. Demillo, R.A., Lipton, R.J., Sayward, F.G.: Hints on test data selection: Help for the practi-
cing programmer. Computer 11(4), 34–41 (1978)
70. Deutschland, B.: V-modell xt 1.0 (2005). Http://www.v-modell-xt.de
71. Deutschland, B.: V-modell xt 1.2 (2006). Http://www.v-modell-xt.de
72. Diestel, R.: Graphentheorie. Springer-Verlag, Berlin, Heidelberg, New York (2006)
73. Dietze, R., Heuser, T., Schilling, J.: OpenSolaris für Anwender, Administratoren und Re-
chenzentren: Von den ersten Schritten bis zum produktiven Betrieb auf Sparc, PC und Po-
werPC basierten Plattformen. Springer-Verlag, Berlin, Heidelberg, New York (2006)
74. Dijkstra, E.W.: The humble programmer. Communications of the ACM 15(10), 859 – 866
(1972)
75. Diller, A.: Z : An Introduction to Formal Methods. John Wiley and Sons, Chichester (1994)
76. Dvorak, J.: What’s going on at microsoft? PC Magazine (1999)
77. Eaton, J.W.: GNU Octave. Network Theory, Bristol (2005)
78. Echtle, K.: Fehlertoleranzverfahren. Springer-Verlag, Berlin, Heidelberg, New York (1990)
79. http://www.eclipse.org
80. Edelman, A.: The mathematics of the pentium devision bug. SIAM Review 39(39), 54–67
(1997)
81. http://www.eiffel.com
82. Elmer-Dewitt, P.: Ghost in the machine. Times Magazine pp. 58–59 (1990)
83. Elmore, E.: The transient response of damped linear networks with particular regard to wi-
deband amplifiers. Journal of Applied Physics 19(1), 55–63 (1948)
84. Elshoff, J.L.: An investigation into the effects of the counting method used on software
science measurements. ACM SIGPLAN Notices 13(2), 30–45 (1978)
85. Emerson, E., Clarke, E.: Using branching time temporal logic to synthesize synchronization
skeletons. Science of Computer Programming 2, 241–266 (1982)
86. Erickson, J.: Hacking. The Art of Exploitation. No Starch Press, San Francisco (2003)
550 Literaturverzeichnis
87. Evans, D.: Static detection of dynamic memory errors. In: SIGPLAN Conference on Pro-
gramming Language Design and Implementation (PLDI 96), pp. 21 – 24. Philadelphia, PA
(1996)
88. Evans, D., Guttag, J., Horning, J., Tan, Y.M.: Lclint: A tool for using specifications to check
code. In: Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software
Engineering, pp. 87–96. New Orleans (1994)
89. Evans, D., Larochelle, D.: Improving security using extensible lightweight static analysis.
IEEE Software 19(1), 41–51 (2002)
90. F. P. Brooks, J.: The Mythical Man-Month. Addison-Wesley, Reading, MA (1995)
91. Fagan, M.E.: Design and code inspections to reduce errors in program development. IBM
Systems Journal 15(3), 258–287 (1976)
92. Fagan, M.E.: Advances in software inspections. IEEE Transactions on Software Engineering
12(7), 744–751 (1986)
93. Fenton, N.E., Ohlsson, N.: Quantitative analysis of faults and failures in a complex software
system. IEEE Transactions on Software Engineering 26(7), 653–661 (2000)
94. Fenton, N.E., Pfleeger, S.L.: Software Metrics: A Rigorous & Practical Approach. Interna-
tional Thomson Computer Press (1997)
95. Fitzgerald, J., Larsen, P.G., Mukherjee, P., Plat, N., Verhoef, M.: Validated Designs for
Object-oriented Systems. Springer-Verlag, Berlin, Heidelberg, New York (2005)
96. Floyd, R.: Assigning meaning to programs. In: Proceedings of Symposia on Applied Mathe-
matics, pp. 19–32. American Mathematical Society, Providence (1967)
97. Foster, J.C.: Buffer Overflows. Mitp-Verlag, Bonn (2005)
98. Fowler, M.: Refactoring – Improving the Design of Existing Code. Addison-Wesley, Rea-
ding, MA (1999)
99. Gannon, C.: Error detection using path testing and static analysis. Computer 12(8), 26–31
(1979)
100. Gates, B.: Der unsichtbare Computer. Brand Eins 10, 132–133 (2002)
101. Gilb, T., Graham, D.: Software Inspection. Addison-Wesley (1993)
102. Girgis, M.R., Woodward, M.R.: An experimental comparison of the error exposing ability of
program testing criteria. In: Proceedings of the Workshop on Software Testing, pp. 64–73.
Banff (1986)
103. http://www.gnu.org/software/make
104. Gödel, K.: Über formal unentscheidbare Sätze der Principia Mathematica und verwandter
Systeme. Monatshefte für Mathematik und Physik 38, 173–198 (1931)
105. http://www.google.com/jobs
106. Gordon, M.J.C., Melham, T.F.: Introduction to HOL: A theorem proving environment for
higher-order logic. Cambridge University Press, Cambridge (1993)
107. Gumbel, M.: Java Standard Libraries: Java 2 Collection Framework und Generic Collection
Library for Java. Addison-Wesley, München [u.a.] (2000)
108. Gusfield, D.: Algorithms on Strings, Trees, and Sequences. Cambridge University Press,
Cambridge (1997)
109. Güting, R.H., Erwig, M.: Übersetzerbau. Techniken, Werkzeuge, Anwendungen. Springer-
Verlag, Berlin, Heidelberg, New York (1999)
110. Halstead, M.H.: Natural laws controlling algorithm structure? ACM SIGPLAN Notices 7(2),
19–26 (1972)
111. Halstead, M.H.: Elements of Software Science. Elsevier (1977)
112. Hamer, P.G., Frewin, G.D.: M. h. halstead’s software science – a critical examination. In:
Proceedings of the ACM SIGSOFT-SIGPLAN/IEEE Computer Society International Confe-
rence on Software Engineering (ICSE), pp. 197–206. IEEE Computer Society Press, Tokyo,
Japan (1967)
113. Hamlet, R.G.: Testing programs with the aid of a compiler. IEEE Transactions on Software
Engineering SE-3(4), 279–289 (1977)
114. Hamming, R.W.: Error-detecting and error-correcting codes. Bell System Technical Journal
2(29), 147–160 (1950)
Literaturverzeichnis 551
115. Hamming, R.W.: Coding and Information Theory. Prentice Hall, Englewood Cliffs, NJ
(1980)
116. Hanselman, D.C., Littlefield, B.L.: Mastering Matlab 7. Pearson / Prentice Hall, Upper Sadd-
le River, NJ (2004)
117. Hedayat, A.S., Sloane, N.J.A., Stufken, J.: Orthogonal Arrays: Theory and Applications.
Springer-Verlag, Berlin, Heidelberg, New York (1999)
118. Henry, S.M., Kafura, D.: Software structure metrics based on information flow. IEEE Tran-
sactions on Software Engineering 7(5), 510–518 (1981)
119. Henry, S.M., Selig, C.: Predicting source-code complexity at the design stage. IEEE Software
7(2), 36–44 (1990)
120. Herold, H.: Lex und Yacc : Die Profitools zur lexikalischen und syntaktischen Textanalyse.
Addison-Wesley, München (2003)
121. Hertel, C.R.: Implementing CIFS. The Common Internet File System. Prentice-Hall, Engle-
wood Cliffs, NJ (2003)
122. Hitz, M., Montazeri, B.: Chidamber and kemerer’s metrics suite: A measurement theory
perspective. IEEE Transactions on Software Engineering 22(4), 267–271 (1996)
123. Hoare, C.A.R.: An axiomatic basis for computer programming. Communications of the
ACM 12(10), 576 – 585 (1969)
124. Hoglund, G., McGraw, G.: Exploiting Software: How to Break Code. Addison-Wesley Long-
man, Amsterdam (2004)
125. Holzner, S.: Ant. O’Reilly and Associates, Sebastopol (2005)
126. Howden, W.E.: Methodology for the generation of program test data. IEEE Transactions on
Computers C-24, 554–560 (1904)
127. Howden, W.E.: An evaluation of the effectiveness of symbolic testing. Practice and Experi-
ence 8, 381–397 (1978)
128. Howden, W.E.: Theoretical and empirical studies of program testing. IEEE Transactions on
Software Engineering SE-4(4), 293–298 (1978)
129. Howden, W.E.: Theoretical and empirical studies of program testing. In: Proceedings of the
3rd International Conference on Software Engineering, pp. 235–243. Atlanta (1978)
130. Howden, W.E.: Weak mutation testing and completeness of test sets. IEEE Transactions on
Software Engineering SE-8(4), 371–379 (1982)
131. Huisman, M.: Reasoning about java programs in higher order logic with pvs and isabelle.
Ph.D. thesis, IPA Dissertation Series 2001-03 (2001)
132. Humphrey, W.S.: Characterizing the software process: A maturity framework. Tech. Rep.
CMU/SEI-87-TR-11, Software Engineering Institute (SEI) (1987)
133. Humphrey, W.S.: Managing the Software Process. Addison-Wesley, Reading, MA (1989)
134. Hunt, A., Thomas, D.: Pragmatic Unit Testing: In Java with JUnit. The Pragmatic Bookshelf,
Raleigh, NC (2004)
135. Hunt, A., Thomas, D.: Pragmatic Unit Testing in C# with NUnit. The Pragmatic Bookshelf,
Raleigh, NC (2006)
136. Hutton, G.: Introduction to Functional Programming Using Haskell. Cambridge University
Press, Cambridge (1998)
137. Institute of Electrical and Electronics Engineers, 345 East 47th Street, New York, NY 10017,
USA: IEEE Standard Glossary of Software Engineering Terminology, std 610.12-1990 edn.
(1990)
138. Jacky, J.: The Way of Z: Practical Programming with Formal Methods. Cambridge University
Press, Cambridge (1996)
139. https://javacc.dev.java.net
140. http://www.jflex.de
141. Johnson, S.C.: Lint, a program checker. In [173] (1979)
142. Johnson, S.C.: A tour through the portable c compiler. In [173] (1979)
143. Johnson, S.C.: Yacc meets c++. Computing Systems 1(2), 159–167 (1988)
144. Johnson, S.C.: Yacc yet another compiler compiler. Report GAO/IMTEC-92-26, Information
Management and Technology Division, United States General Accounting Office, Washing-
ton, D.C. (1992)
552 Literaturverzeichnis
145. Johnson, S.C.: Objecting to objects. In: Technical Conference Proceedings. San Francisco,
CA (1994)
146. Jones, C.B.: Systematic Software Development using VDM. Prentice Hall, New York (1990)
147. Juran, J.M., Godfrey, A.B.: Juran’s Quality Handbook, 5th edition edn. McGraw-Hill, New
York (2000)
148. Kecher, C.: UML 2.0. Das umfassende Handbuch. Galileo Press (2006)
149. Kernighan, B.W., Pike, R.P.: The UNIX Programming Environment. Prentice Hall, Engle-
wood Cliffs, NJ (1984)
150. Kernighan, B.W., Ritchie, D.M.: The C Programming Language, 1st edition edn. Prentice
Hall, Englewood Cliffs, NJ (1978)
151. Klein, T.: Buffer Overflows und Format-String-Schwachstellen. Funktionsweisen, Exploits
und Gegenmaßnahmen. Dpunkt.Verlag, Heidelberg (2003)
152. Kneuper, R.: CMMI. Verbesserung von Softwareprozessen mit Capability Maturity Model
Integration. Dpunkt.Verlag, Heidelberg (2006)
153. Koch, E.: Das 80/20-Prinzip. Mehr Erfolg mit weniger Aufwand. Campus Verlag (2004)
154. Koenig, A.: C Traps and Pitfalls. Addison-Wesley, Reading, MA (1989)
155. Koziol, J., Litchfield, D., Aitel, D.: The Shellcoder’s Handbook: Discovering and Exploiting
Security Holes. John Wiley and Sons, New York (2004)
156. Kropf, T.: Introduction to Formal Hardware Verification. Springer-Verlag, Berlin, Heidel-
berg, New York (1999)
157. Larochelle, D., Evans, D.: Statically detecting likely buffer overflow vulnerabilities. In: Pro-
ceedings of the 10th USENIX Security Symposium, pp. 177–190. USENIX, Washington
D.C. (2001)
158. Levine, J.R., Mason, T., Brown, D.: Lex and Yacc. UNIX Programming Tools. O’Reilly and
Associates, Sebastopol (1992)
159. Li, K., Wu, M.: Effective Software Test Automation. Sybex, Alameda, CA (2004)
160. Li, K., Wu, M.: Effective GUI Test Automation. Sybex, Alameda, CA (2005)
161. Li, W., Henry, S.: Object-oriented metrics that predict maintainability. Journal of Systems
and Software 23(2), 111–122 (1993)
162. Liberty, J.: Programmieren mit C#. O’Reilly and Associates, Köln (2005)
163. Liggesmeyer, P.: Software-Qualität. Spektrum Akademischer Verlag (2002)
164. van der Linden, P.: Expert C Programming – Deep C Secrets. SunSoft Press, Prentice Hall,
Englewood Cliffs, NJ (1994)
165. Link, J.: Softwaretests mit JUnit. Dpunkt.Verlag, Heidelberg (2005)
166. Linzmayer, O.W.: Apple Confidential 2.0: The Definitive History of the World’s Most Co-
lorful Company. No Starch Press, San Francisco, CA (2004)
167. Lorenz, M., Kidd, J.: Object-Oriented Software Metrics – A Practical Guide. Prentice Hall,
Englewood Cliffs (1994)
168. Marcus, E., Stern, H.: Blueprints for High Availability. John Wiley and Sons, New York
(2003)
169. Marshall, E.: Fatal error: How patriot overlooked a scud. Times Magazine 13 (1992)
170. Maslow, A.H.: A theory of human motivation. Psychological Review 50, 370–396 (1943)
171. McCabe, T.J.: A complexity measure. IEEE Transactions on Software Engineering SE-2(4),
308–320 (1976)
172. McCabe, T.J.: Structured Testing. IEEE Computer Society Press (1983)
173. McIlroy, M.D., Kernighan, B.W.: Unix Programmer’s Manual, 7th Edition, vol. 2B. AT & T
Bell Laboratories, Murray Hill, NJ (1979)
174. Mecklenburg, R.: GNU make. O’Reilly and Associates, Sebastopol (2005)
175. Memon, A.M., Pollack, M.E., Soffa, M.L.: Using a goal-driven approach to generate test
cases for guis. In: ICSE ’99: Proceedings of the 21st international conference on Software
engineering, pp. 257–266. IEEE Computer Society Press, Los Alamitos, CA (1999)
176. http://www.mercury.com
177. Meszaros, G.: Xunit Test Patterns: Refactoring Test Code. Addison-Wesley, Upper Saddle
River, NJ (2007)
Literaturverzeichnis 553
205. Pepper, P.: Funktionales Programmieren in OPAL, ML, HASKELL und GOFER. Springer-
Verlag, Berlin, Heidelberg, New York (2003)
206. Peterson, W.W., Brown, D.T.: Cyclic codes for error detection. Proceedings of the IRE 49,
228 – 235 (1961)
207. Peterson, W.W., Weldon, E.J.: Error Correcting Codes. MIT Press, Cambridge, MA (1972)
208. Petzold, C.: Programming Windows 3.1. Microsoft Press, Redmond, WA (1992)
209. Petzold, C.: Programming Windows 95. Microsoft Press, Redmond, WA (1996)
210. Pfister, G.F.: In search of clusters : The Coming Battle in Lowly Parallel Computing. Prentice
Hall, Upper Saddle River, NJ (1995)
211. Pfleeger, S.L., Fitzgerald, J.C., Rippy, D.A.: Using multiple metrics for analysis of improve-
ment. Software Quality Journal 1, 27–36 (1992)
212. Phadke, M.S.: Quality Engineering Using Robust Design. Prentice-Hall PTR (1989)
213. Pierce, B.C.: Types and Programming Languages. MIT Press, Cambridge (2002)
214. Piwowarski, P.: A nesting level complexity measure. ACM SIGPLAN Notices 17(9), 44–50
(1982)
215. http://www.platform.com
216. http://www.polyspace.com
217. Pradham, D., Reddy, S.: A fault-tolerant communication architecture for distributed systems.
Digest of Papers FTCS 11, 214–220 (1981)
218. Pradhan, D.K.: Fault-Tolerant Computer System Design. Prentice-Hall PTR (1996)
219. Rausch, A., Broy, M., Bergner, K.: Das V-Modell XT. Grundlagen, Methodik und Anwen-
dungen. Springer-Verlag, Berlin, Heidelberg, New York (2007)
220. Riedemann, E.H.: Testmethoden für sequentielle und nebenläufige Systeme. Teubner, Stutt-
gart (1997)
221. Ritchie, D.M.: The development of the c language. Tech. rep., Bell Labs/Lucent Technolo-
gies, Murray Hill, NJ 07974 USA (2003)
222. Roberts, D., Johnson, R.: A refactoring tool for smalltalk. Theory and Practice of Object
Systems 3, 253–263 (1997)
223. Robertson, J.E.: A new class of digital division methods. IRE Transactions Electronic Com-
puters 7(7), 218–222 (1958)
224. Royce, W.W.: Managing the development of large software systems: Concepts and techni-
ques. TRW Software Series SS-70-01, 1 – 9 (1970). Nachgedruckt in [225]
225. Royce, W.W.: Managing the development of large software systems: Concepts and techni-
ques. In: ICSE ’87: Proceedings of the 9th International Conference on Software Enginee-
ring, pp. 328–338. IEEE Computer Society Press, Los Alamitos, CA (1987)
226. Salt, N.F.: Defining software science counting strategies. ACM SIGPLAN Notices 17(3),
58–67 (1982)
227. Schildt, H.: The Annotated ANSI C Standard: American National Standard for Programming
Languages-C : ANSI/ISO 9899-1990. McGraw-Hill, Berkeley, CA (1993)
228. Sedgewick, R.: Algorithmen. Pearson Studium, München (2002)
229. Sedgewick, R.: Algorithmen in Java. Grudlagen, Datenstrukturen, Sortieren, Suchen. Teil 1
– 4. Pearson Studium, München (2003)
230. http://www.sei.cmu.edu/about
231. Sharble, R.C., Cohen, S.S.: The object-oriented brewery: a comparison of two object-
oriented development methods. SIGSOFT Software Engineering Notes 18(2), 60–73 (1993)
232. Silverberg, I.: Source File Management with SCCS. Prentice Hall (1991)
233. Singh, A.: Mac OS X Internals. Addison-Wesley, Upper Saddle River, NJ (2006)
234. Soltau, M.: Unix/Linux Hochverfügbarkeit. Mitp-Verlag, Bonn (2002)
235. Spivey, J.M.: The Z Notation : A Reference Manual. Prentice Hall, New York (1992)
236. http://www.splint.org
237. Spolsky, J.: How Microsoft lost the API war. Apress (2004)
238. Stegmüller, W.: Unvollständigkeit und Unentscheidbarkeit : Die metamathematischen Re-
sultate von Goedel, Church, Kleene, Rosser und ihre erkenntnistheoretische Bedeutung.
Springer-Verlag, Berlin, Heidelberg, New York (1973)
Literaturverzeichnis 555
239. Stephen, G.A.: String Searching Algorithms. World Scientific Publishing Company (1994)
240. Stern, H., Eisler, M., Labiaga, R.: Managing NFS and NIS. O’Reilly and Associates, Seba-
stopol (2001)
241. Stevens, W.R.: TCP/IP Illustrated I. The Protocols. Addison-Wesley, Upper Saddle River,
NJ (1994)
242. Swift, J.: Gulliver’s Travels. Penguin Classics (1994)
243. Szulewski, P.A., Sodano, N.M.: Design metrics and ada. In: WADAS ’84: Proceedings of
the 1st Annual Washington Ada Symposium on Ada Acquisition Management, pp. 105–114.
ACM Press, New York (1984)
244. Tai, K.C.: Program testing complexity and test criteria. IEEE Transactions on Software
Engineering SE-6(6), 531–538 (1980)
245. Team, C.P.: Capability maturity model integration, version 1.1, continous representation.
Tech. Rep. CMU/SEI-2002-TR-012, Software Engineering Institute (SEI) (2002)
246. Team, C.P.: Capability maturity model integration, version 1.1, staged representation. Tech.
Rep. CMU/SEI-2002-TR-011, Software Engineering Institute (SEI) (2002)
247. Team, C.P.: Cmmi for development, version 1.2. Tech. Rep. CMU/SEI-2006-TR-008, Soft-
ware Engineering Institute (SEI) (2006)
248. Team, S.U.: Appraisal requirements for cmmi, version 1.2 (arc, v1.2). Tech. Rep. CMU/SEI-
2006-TR-011, Software Engineering Institute (SEI) (2006)
249. Team, S.U.: Standard cmmi appraisal method for process improvement (scampi[sm]) a, ver-
sion 1.2: Method definition document. Tech. Rep. CMU/SEI-2006-HB-002, Software Engi-
neering Institute (SEI) (2006)
250. http://www.teamware.com
251. Terry, P.D.: Compiling with C# and Java. Addison-Wesley, Boston, MA (2005)
252. Thaer, C.: Euklid – Die Elemente, Buch 1-13. Verlag Harri Deutsch (1993)
253. Thaler, G.E.: Software-Metriken. Verlag Heinz Heise (1994)
254. Thaler, M., Utesch, M.: Effizienz und Effektivität von Software-Inspektionen. Software
Technik Trends 14(2), 22–23 (1994)
255. Tichy, W.F.: RCS – a system for version control. RCS – A System for Version Control
15(15), 637 – 658 (1985)
256. Tocher, K.D.: Techniques of multiplication and division for automatic binary computers. IRE
Quaterly Journal of Mech. Applied Math. 11(11), 364 – 384 (1958)
257. Torvalds, L.: Linux kernel coding style
258. http://www.transitive.com
259. http://www.transmeta.com
260. Tucker, A.B.: The Computer Science and Engineering Handbook. CRC Press, Boca Raton
(1997)
261. Turing, A.M.: On computable numbers with an application to the entscheidungsproblem.
Proceedings of the London Mathematical Society 2(42), 230–265 (1936)
262. http://www.uml.org
263. Venners, B.: The demand for software quality. a conversation with bertrand meyer, part i
(2003). URL http://www.artima.com
264. Vigenshow, U.: Objektorientiertes Testen und Testautomatisierung in der Praxis.
Dpunkt.Verlag, Heidelberg (2005)
265. Vlissides, J.: Pattern Hatching. Addison-Wesley, Reading, MA (1998)
266. Wagenknecht, C.: Programmierparadigmen. Eine Einführung auf der Grundlage von Sche-
me. Teubner Verlag, Wiesbaden (2004)
267. Walz, A.: Maple 7 - Rechnen und Programmieren. Springer-Verlag, Berlin, Heidelberg, New
York (2007)
268. Watters, P.A.: Solaris 10 / The Complete Reference.: The Complete Reference. McGraw-
Hill, New York (2005)
269. Weinberg, G.M.: The Psychology of Computer Programming. Dorset House Publishing
(1998)
270. Welker, K.D., Oman, P.W.: Software maintainability metrics models in practics. Crosstalk,
Journal of Defense Software Engineering 8(11), 19–23 (1995)
556 Literaturverzeichnis
271. Winkelhofer, G.A., Kessler, H.: Projektmanagement: Leitfaden zur Steuerung und Führung
von Projekten. Springer-Verlag, Berlin, Heidelberg, New York (2004)
272. http://en.wikiquote.org/wiki/Bill_Gates
273. Wolfram, S.: The Mathematica Book. Wolfram Media Inc., Champaign, IL (2004)
274. Wordsworth, J.B.: Software Development with Z. Addison-Wesley, Wokingham, England
(1992)
275. Yourdon, E., Constantine, L.L.: Structured Design. Prentice-Hall, Englewood Cliffs, NJ
(1979)
276. Zeller, A., Krinke, J.: Essential Open Source Toolset. John Wiley and Sons, New York (2005)
277. Zukowski, J.: Java Collections. Springer-Verlag, Berlin, Heidelberg, New York (2001)
Sachverzeichnis
557
558 Sachverzeichnis
Fail-safe 102 G
Fallthrough-Mechanismus 295
False negative 292, 310, 312, 338 Gödel, Kurt 342
False positive 338 Gamma, Erich 470
Fan-In 265 Garbage collector 388
Fan-Out 265 Gates, Bill 2, 489
Fat binary 133, 134 GCC siehe GNU Compiler Collection
Feature 385 Gemeinsame Teilfolge 444
Fehler Generics 82, 83
-bericht 477 Generische Schnittstelle 90
-bewertung 61 Geschäftsprozess 187
-blindheit 323 ggT siehe Gröster gemeinsamer Teiler
Glass, Robert L. 266
-datenbank 477
GNU
-induktion 238
-Notationsstil 72
-management 477, 527
-Projekt 278
-merkmal 478 Compiler Collection 232
-transformation 238 Golden log 470
arithmetischer 238 Gröster gemeinsamer Teiler 252
Konstanten- 238 Grafische Benutzungsoberfläche 472
lexikalischer 27 Grammatik 27, 276
Logik- 238 Graph
numerischer 43 stark zusammenhängender 216
Offset- 238 Graphical user interface 472
semantischer 36 Gray-Box-Test 174
syntaktischer 27 Greedy-Methode 28
Variablen- 238, 319 Grenze
Verknüpfungs- 238 asymmetrische 402
Zuweisungs- 238 symmetrische 402
Fehlertoleranz 21, 98 Grenzinduktion 183
Feldman, Stuart 453 Grenzwertbetrachtung 180
Feldtest 169 GT siehe Gemeinsame Teilfolge
Fence post error 402 GUI siehe Graphical user interface
Fenton, Norman E. 269
FileMerge (Applikation) 434 H
Final findings 530
Finalzustand 186 Höherwertige Logik 146, 342
Fisher, Ronald A. 10 Halstead, Maurice H. 251
Fixpunktiteration 357, 362 Halstead-Metrik 251
Halteproblem 314, 348
Flawfinder 307
Hardware-Software-Co-Design 374
FlexRay-Bus 3
Head-Konfiguration 425, 426
Floyd, Robert W. 361
Heap 302
Follow-Up-Sitzung 331 Henry, Sally M. 266
Formale Synthese 105 Hidden feature 331
Format-String 285 Hoare
Fowler, Martin 397 -Kalkül 342
Frame pointer siehe Base pointer -Tripel 343
Free Software Foundation 278 Hoare, Charles A. R. 342
Funktionalität (Kriterium) 7 Hochverfügbarkeit 466
Funktions Hot plugging 466
-Epilog 305 Hot swapping 466
-Prolog 304 Human ressources 530
Funktionstest 170 Humphrey, Watts S. 519
Sachverzeichnis 561
ILP32-Datenmodell 113 K
ILP64-Datenmodell 114
Include-Beziehung 189 k-dr-Sequenz 228
Individualisierung 491 K&R-Notationsstil 71
Induktionstheorem 342 Kafura, Dennis G. 266
Initialentwicklung 415 Kalkül 338
Injektionsvektor 305, 306 Kernel space 140
Input/Output Control 90 Kernighan, Brian W. 70, 292
Inside-Out-Integration 165 Key process area 521
Inspektion 23, 313, 322, 327 Kiviat-Diagramm 270
Inspektionsbericht 331 Klasse 77
Installationstest 172 Klasseninvariante 95
Integrated product development 530 Koenig, Andrew 28
Integration Kohäsion 265
anwendungsgetriebene 166 Kommunikation
Big-Bang- 163 dezentrale 3
Bottom-Up- 164 Kompatibilitätstest 171
funktionsorientierte 166 Kompatibilitätsumgebung 412
Inside-Out- 165 Komplexität 13
Outside-In- 164 algorithmische 128, 172
risikogetriebene 166 Daten- 264
strukturorientierte 163 Methoden- 264
System- 499 gewichtete 264
termingetriebene 166 zyklomatische 18, 259
testgetriebene 166 Komplexitätsklasse 172
Top-Down- 164 Komplexitätstest 172
Integrationsabteilung 428 Komponentenmetrik 263
Integrationstest 159, 163 Komponententest 159
Intervallschachtelung 161 Konfiguration 192, 425
Intervallsuche 161 Head- 425, 426
Invariante 95, 343 Latest- 425, 426
Klassen- 95 Konfigurationsmanagement 25
Schleifen- 95 Konformitätsanalyse 23, 271
ISO Konformitätsregel 271
9126 6 Konklusion 343
12207 535 Konstantenfehler 238
13568 146 Konstruktive Qualitätssicherung 21, 65
15288 535 Kontrollflussanomalie 313
15504 515, 535 Kontrollflussgraph 202
C90 284 expandierter 204
kantenmarkierter 203
J knotenmarkierter 204
kollabierter 205
Jaskiel, Stefan P. 157 teilkollabierter 204
Java 78, 81, 132, 388, 406, 471 Kontrollflussmodellierung 202
Coding Style 70 Kopenhagener Deutung 543
Jeffries, Ron 507 Kopplungs
JIT siehe Just-in-Time -analyse 265
Job specification 466 -effekt 241
562 Sachverzeichnis
Multiple-Metrics-Graph 270 P
Multiversion File System 421
Mutant 238 p-use 221
Mutationstest 23, 200, 238 P64-Datenmodell 112
prädizierender 239 Paarweises Testen 192
schwacher 242 Pad 125
starker 239 Parallelität
vergleichender 239 als Fehlerquelle 41
Mutationstransformation 238 Parallelstruktur 126, 390
MVFS siehe Multiversion File System Parameterextraktion 279
Myers, Glenford J. 245 Pareto
-Diagramm 267
-Prinzip 268
N
Pareto, Vilfredo F. 268
Park, David 361
Nachbedingung 93, 338, 343 Parser 274
NCSS-Metrik 249 Partition 175
Network byte order 121, 122 Pascal-Case-Notationsstil 66
Network file system 465 Pathfinder 41
Netzdiagramm 270 Paulish, Daniel J. 269
NFS siehe Network file system Peano, Giuseppe 342
Nicely, Thomas R. 58 Peano-Axiome 342
Notationskonvention 65, 66 Peer review 525, 526
Notationsstil 66 Petzold, Charles 67
Allman- 72 Pfad 222
BSD- 72 definitionsfreier 222
Camel-Case- 66 Pfadüberdeckung 201, 210
GNU- 72 strukturierte 212
K&R- 71 Phase 504
Lowercase- 67 Phony target 459
Pascal-Case- 66 Pike, Robert C. 292
Uppercase- 66 Pilotprojekt 527
Whitesmith- 72 PL/I 105
Ntafos, Simeon C. 227 Planungsspiel 509
Plattformunabhängigkeit 107
O Portabilität 21, 45, 107
auf Sprachebene 131
auf Systemebene 134
Oberflächentest 472 Portable C Compiler 283
Objectory Process 502 Portierbarkeit (Kriterium) 9
Objektorientierte Metrik 262 Portierung
Offline review 327, 328 Architektur- 107
Offsetfehler 238 Betriebssystem- 107
Ohlsson, Niclas 269 Sprach- 108
On-the-fly-Compilierung 132 System- 108
Operand 251 Prädikat 341
Operator 251 atomares 215
Optimierung zusammengesetztes 215
inkrementelle 147 Prädikatenlogik 341
Orthogonales Feld 193 Prädizierender Mutationstest 241
Ostrand, Thomas J. 269 Prämisse 343
Out-By-One-Fehler 402 Predicative use 221
Outside-In-Integration 164 Prioritäteninversion 41, 43
Outsourcing 524 Prioritätenvererbung 43
564 Sachverzeichnis