default search action
Richard C. Linger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Wided Ghardallou, Hessamaldin Mohammadi, Richard C. Linger, Mark G. Pleszkoch, Ji Meng Loh, Ali Mili:
Invariant relations for affine loops. Acta Informatica 61(3): 261-314 (2024) - 2022
- [c47]Hessamaldin Mohammadi, Wided Ghardallou, Richard C. Linger, Ali Mili:
Computing Program Functions. FormaliSE@ICSE 2022: 102-112
2010 – 2019
- 2019
- [p1]Alan R. Hevner, Richard C. Linger:
Augmenting Internet of Things (IoT) Architectures with Semantic Capabilities. The Art of Structuring 2019: 397-408 - 2018
- [j18]Richard C. Linger, Alan R. Hevner:
Flow semantics for intellectual control in IoT systems. J. Decis. Syst. 27(2): 63-77 (2018) - 2017
- [c46]Richard C. Linger, Luanne Chamberlain, Matt Bishop, Melissa Dark:
Agile Research for Cybersecurity: Creating Authoritative, Actionable Knowledge When Speed Matters. HICSS 2017: 1-10 - 2016
- [c45]Luanne Burns Goldrich, Richard George, Rick Linger:
Introduction to Cybersecurity and Software Assurance Minitrack. HICSS 2016: 5507 - [c44]A. J. Risko, Luanne Burns Goldrich, Nykia Jackson, Robert Gatlin, Brian R. Gattoni, Richard C. Linger:
Using the eR&D Approach to Pilot Deployment and Assessment in DHS. HICSS 2016: 5554-5559 - 2015
- [c43]Mark G. Pleszkoch, Rick Linger:
Controlling Combinatorial Complexity in Software and Malware Behavior Computation. CISR 2015: 15:1-15:4 - [c42]Luanne Burns Goldrich, Richard George, Rick Linger:
Introduction to the Cybersecurity and Software Assurance Minitrack. HICSS 2015: 5164 - [c41]Melissa Dark, Matt Bishop, Richard C. Linger, Luanne Goldrich:
Realism in Teaching Cybersecurity Research: The Agile Research Process. World Conference on Information Security Education 2015: 3-14 - 2014
- [c40]Luanne Burns Goldrich, Richard C. Linger, Richard George:
Introduction to Enlightened Cybersecurity and Software Assurance Minitrack. HICSS 2014: 4857 - 2013
- [c39]Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum:
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. CSIIRW 2013: 43 - [c38]Luanne Burns, Rick Linger, Jim Alves-Foss:
Introduction to Software Cybersecurity, Assurance, and Testing Minitrack. HICSS 2013: 5012 - 2012
- [c37]Mark G. Pleszkoch, Richard C. Linger, Stacy J. Prowell, Kirk Sayre, Luanne Burns:
Automated Behavior Computation for Software Analysis and Validation. HICSS 2012: 5537-5545 - [c36]Stacy J. Prowell, Mark G. Pleszkoch, Kirk Sayre, Richard C. Linger:
Automated vulnerability detection for compiled smart grid software. ISGT 2012: 1-5 - 2011
- [c35]Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre:
Behavior computation for smart grid software analysis. CSIIRW 2011: 51 - [c34]Rosann W. Collins, Alan R. Hevner, Richard C. Linger:
Evaluating a Disruptive Innovation: Function Extraction Technology in Software Development. HICSS 2011: 1-8 - [c33]Richard C. Linger, Kirk Sayre, Tim Daly, Mark G. Pleszkoch:
Function Extraction Technology: Computing the Behavior of Malware. HICSS 2011: 1-9 - 2010
- [j17]Nancy R. Mead, Julia H. Allen, Mark A. Ardis, Thomas B. Hilburn, Andrew J. Kornecki, Richard C. Linger, James McDonald:
Development of a Master of Software Assurance Reference Curriculum. Int. J. Secur. Softw. Eng. 1(4): 18-34 (2010) - [j16]Norman F. Schneidewind, Mark Montrose, Alec Feinberg, Arbi Ghazarian, Jim McLinn, Christian K. Hansen, Phillip A. Laplante, Nihal Sinnadurai, Enrico Zio, Richard C. Linger, W. Eric Wong, Shiuh-Pyng Shieh, Joseph Childs:
IEEE Reliability Society Technical Operations Annual Technical Report for 2010. IEEE Trans. Reliab. 59(3): 449-482 (2010) - [c32]Richard C. Linger, Mark G. Pleszkoch, Kirk Sayre, Tim Daly:
Computing the behavior of malware. CSIIRW 2010: 36
2000 – 2009
- 2009
- [c31]Richard C. Linger, Stacy J. Prowell, Kirk Sayre:
Computing the behavior of malicious code with function extraction technology. CSIIRW 2009: 36 - [c30]Gwendolyn H. Walton, Thomas A. Longstaff, Richard C. Linger:
Computational Evaluation of Software Security Attributes. HICSS 2009: 1-10 - 2008
- [j15]Mark G. Pleszkoch, Richard C. Linger, Alan R. Hevner:
Introducing function extraction into software testing. Data Base 39(3): 41-50 (2008) - [j14]Rosann Webb Collins, Alan R. Hevner, Gwendolyn H. Walton, Richard C. Linger:
The impacts of function extraction technology on program comprehension: A controlled experiment. Inf. Softw. Technol. 50(11): 1165-1179 (2008) - 2007
- [c29]Alan R. Hevner, Richard C. Linger, Gwendolyn H. Walton:
Next-Generation Software Engineering Introduction to Minitrack. HICSS 2007: 276 - [c28]Richard C. Linger, Mark G. Pleszkoch, Luanne Burns, Alan R. Hevner, Gwendolyn H. Walton:
Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior. HICSS 2007: 277 - 2006
- [j13]Casey K. Fung, Patrick C. K. Hung, Richard C. Linger, Guijun Wang, Gwendolyn H. Walton:
A Service-Oriented Composition Framework with QoS Management. Int. J. Web Serv. Res. 3(3): 108-132 (2006) - 2005
- [c27]Casey K. Fung, Patrick C. K. Hung, Richard C. Linger, Gwendolyn H. Walton:
Extending Business Process Execution Language for Web Services with Service Level Agreements Expressed in Computational Quality Attributes. HICSS 2005 - [c26]Alan R. Hevner, Richard C. Linger, Gwendolyn H. Walton:
Testing and Certification of Trustworthy Systems Introduction to Minitrack. HICSS 2005 - [c25]Casey K. Fung, Patrick C. K. Hung, Guijun Wang, Richard C. Linger, Gwendolyn H. Walton:
A Study of Service Composition with QoS Management. ICWS 2005: 717-724 - 2004
- [c24]Richard C. Linger, Alan R. Hevner, Gwendolyn H. Walton, Mark G. Pleszkoch:
Automated Detection of Injected Faults in a Differential Equation Solver Network Systems Development. HASE 2004: 265-266 - [c23]Richard C. Linger, Mark G. Pleszkoch:
Function Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance Systems. HASE 2004: 267-268 - [c22]Alan R. Hevner, Richard C. Linger, Gwendolyn H. Walton:
Testing and Certification of Trustworthy Systems: Minitrack Introduction. HICSS 2004 - [c21]Mark G. Pleszkoch, Richard C. Linger:
Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior. HICSS 2004 - 2003
- [c20]Alan R. Hevner, Richard C. Linger, Gwendolyn H. Walton:
Testing and Certification of Trustworthy Systems Introduction to Minitrack. HICSS 2003: 336 - 2002
- [c19]Ann E. Kelley Sobel, Richard C. Linger:
Minitrack Introduction. HICSS 2002: 275 - [c18]Alan R. Hevner, Richard C. Linger, Ann E. Kelley Sobel, Gwendolyn H. Walton:
The Flow-Service-Quality Framework: Unified Engineering for Large-Scale, Adaptive Systems. HICSS 2002: 278 - 2001
- [j12]Nancy R. Mead, Richard C. Linger, John McHugh, Howard F. Lipson:
Managing Software Development for Survivable Systems. Ann. Softw. Eng. 11(1): 45-78 (2001) - [c17]Ann E. Kelley Sobel, Richard C. Linger:
Advances in Software Specification and Verification - Minitrack Introduction. HICSS 2001 - 2000
- [c16]Somesh Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff:
Survivability Analysis of Network Specifications. DSN 2000: 613-622 - [c15]Ann E. Kelley Sobel, Richard C. Linger:
Advances in Software Specification and Verification - Introduction. HICSS 2000
1990 – 1999
- 1999
- [j11]Robert J. Ellison, David A. Fisher, Richard C. Linger, Howard F. Lipson, Thomas A. Longstaff, Nancy R. Mead:
Survivability: Protecting Your Critical Systems. IEEE Internet Comput. 3(6): 55-63 (1999) - [j10]Robert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead:
Survivable Network System Analysis: A Case Study. IEEE Softw. 16(4): 70-77 (1999) - [c14]Alan R. Hevner, Richard C. Linger:
Methods and Tools for Information Systems Development - Introduction. HICSS 1999 - [c13]Richard C. Linger:
Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software. HICSS 1999 - [c12]Robert S. Oshana, Richard C. Linger:
Capability Maturity Model Software Development using Cleanroom Software Engineering Principles - Results of an Industry Project. HICSS 1999 - 1998
- [c11]Alan R. Hevner, Richard C. Linger:
Methods and Tools for Information Systems Development: Introduction to Minitrack. HICSS (6) 1998: 72 - [c10]Richard C. Linger, Nancy R. Mead, Howard F. Lipson:
Requirements Definition for Survivable Network Systems. ICRE 1998: 14-23 - [c9]Richard C. Linger:
Issues in Requirements Definition for Survivable Systems. ICRE 1998: 198- - [i1]Robert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead:
Case Study in Survivable Network System Analysis. CoRR cs.SE/9811011 (1998) - 1997
- [c8]Richard C. Linger, Carmen J. Trammell:
Integrating Software Development Technology and Management: Cleanroom Software Engineering and the CMM for Software. HICSS (3) 1997: 188-197 - 1996
- [j9]Carmen J. Trammell, Mark G. Pleszkoch, Richard C. Linger, Alan R. Hevner:
The incremental development process in Cleanroom software engineering. Decis. Support Syst. 17(1): 55-71 (1996) - 1994
- [j8]Philip A. Hausler, Richard C. Linger, Carmen J. Trammell:
Adopting Cleanroom Software Engineering with a Phased Approach. IBM Syst. J. 33(1): 89-109 (1994) - [j7]Richard C. Linger:
Cleanroom Process Model. IEEE Softw. 11(2): 50-58 (1994) - [c7]Philip A. Hausler, Richard C. Linger:
From software craft to software engineering: the Cleanroom method. SEKE 1994: 172-179 - 1993
- [c6]Richard C. Linger:
Cleanroom Software Engineering for Zero-Defect Software. ICSE 1993: 2-13 - 1992
- [c5]R. A. Sprangler, Richard C. Linger:
The IBM Cleanroom Software Engineering Technology Transfer Program. CSEE 1992: 380-394 - [c4]Mark G. Pleszkoch, Richard C. Linger, Alan R. Hevner:
Eliminating non-traversable paths from structured programs. ICSM 1992: 156-164 - 1990
- [j6]Philip A. Hausler, Mark G. Pleszkoch, Richard C. Linger, Alan R. Hevner:
Using Function Abstraction to Understand Program Behavior. IEEE Softw. 7(1): 55-63 (1990)
1980 – 1989
- 1989
- [c3]Richard C. Linger:
Mathematics-Based Software Engineering for Completely Validated Software. ICSE 1989: 358 - 1988
- [c2]Richard C. Linger, Harlan D. Mills:
A case study in cleanroom software engineering: the IBM COBOL Structuring Facility. COMPSAC 1988: 10-17 - [c1]Richard C. Linger:
Software maintenance as an engineering discipline. ICSM 1988: 292-297 - 1987
- [j5]Harlan D. Mills, Richard C. Linger, Alan R. Hevner:
Box Structured Information Systems. IBM Syst. J. 26(4): 395-413 (1987) - [j4]Harlan D. Mills, Michael G. Dyer, Richard C. Linger:
Cleanroom Software Engineering. IEEE Softw. 4(5): 19-25 (1987) - 1986
- [j3]Harlan D. Mills, Richard C. Linger:
Data Structured Programming: Program Design without Arrays and Pointers. IEEE Trans. Software Eng. 12(2): 192-197 (1986) - 1981
- [j2]C. Sekar Chandersekaran, Richard C. Linger:
Software specification using the SPECIAL language. J. Syst. Softw. 2(1): 31-38 (1981) - 1980
- [j1]Richard C. Linger:
The Management of Software Engineering. Part III: Software Design Practices. IBM Syst. J. 19(4): 432-450 (1980)
1970 – 1979
- 1979
- [b1]Richard C. Linger, Harlan D. Mills, Bernard I. Witt:
Structured programming - theory and practice. The systems programming series, Addison-Wesley 1979, ISBN 978-0-201-14461-1, pp. I-XIV, 1-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint