Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Haugk, F. Lax, R. Royer, John Williams (1985)
The 5ESS switching system: Maintenance capabilitiesAT&T Technical Journal, 64
(2003)
ACM SIGPLAN Notices
S. Ceri, J. Widom (1990)
Deriving Production Rules for Constraint Maintainance
M. Rinard, D. Marinov (1999)
Credible Compilation with Pointers
W. Deming (1982)
Out of the Crisis
B. Latané, J. Darley (1968)
Group inhibition of bystander intervention in emergencies.Journal of personality and social psychology, 10 3
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J. Loingtier, J. Irwin (1996)
Aspect-oriented programming
J. Womack, Daniel Jones, D. Roos (1991)
The machine that changed the world : the story of lean production
Michael Ernst, Adam Czeisler, W. Griswold, D. Notkin (2000)
Quickly detecting relevant program invariantsProceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium
S. Urban, L. Delcambre (1990)
Constraint Analysis: A Design Process for Specifying Operations on ObjectsIEEE Trans. Knowl. Data Eng., 2
Brian Demsky, M. Rinard (2002)
Role-based exploration of object-oriented programsProceedings of the 24th International Conference on Software Engineering. ICSE 2002
George Candea, A. Fox (2001)
Recursive restartability: turning the reboot sledgehammer into a scalpelProceedings Eighth Workshop on Hot Topics in Operating Systems
(1994)
Chocolate. Embedded Systems Programming
J. Gray, A. Reuter (1992)
Transaction Processing: Concepts and Techniques
Timothy Kay, J. Kajiya (1986)
Ray tracing complex scenesProceedings of the 13th annual conference on Computer graphics and interactive techniques
J. Darley, B. Latané (1968)
Bystander intervention in emergencies: diffusion of responsibility.Journal of personality and social psychology, 8 4
S. Ceri, P. Fraternali, S. Paraboschi, L. Tanca (1994)
Automatic generation of production rules for integrity maintenanceACM Trans. Database Syst., 19
Brian Demsky, M. Rinard (2003)
Automatic detection and repair of errors in data structures
Albert Alexandrov, Maximilian Ibel, K. Schauser, C. Scheiman (1998)
UFO: a personal global file system based on user-level extensions to the operating systemACM Trans. Comput. Syst., 16
J. Larus, E. Schnarr (1995)
EEL: machine-independent executable editing
M. Rinard (1999)
Credible Compilation
S. Brilliant, J. Knight, N. Leveson (1990)
Analysis of Faults in an N-Version Software ExperimentIEEE Trans. Software Eng., 16
S. Mourad, D. Andrews (1987)
On the Reliability of the IBM MVS/XA Operating SystemIEEE Transactions on Software Engineering, SE-13
We discuss a new approach to the construction of software systems. Instead of attempting to build a system that is as free of errors as possible, the designer instead identifies key properties that the execution must satisfy to be acceptable to its users. Together, these properties define the acceptability envelope of the system: the region that it must stay within to remain acceptable. The developer then augments the system with a layered set of components, each of which enforces one of the acceptability properties. The potential advantages of this approach include more flexible, resilient systems that recover from errors and behave acceptably across a wide range of operating environments, an appropriately prioritized investment of engineering resources, and the ability to productively incorporate unreliable components into the final software system.
ACM SIGPLAN Notices – Association for Computing Machinery
Published: Dec 1, 2003
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.