default search action
William E. Howden
Person information
- affiliation: University of California, San Diego, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [c26]William E. Howden:
Error-Based Software Testing and Analysis. COMPSAC Workshops 2011: 161-167 - [c25]William E. Howden:
Error Models and Software Certification. WOSOCER 2011: 37-42
2000 – 2009
- 2009
- [c24]M. Chaudhary, B. Chen, P. Desai, R. Hemmatti, F. Lionetti, T. Hachisuka, William E. Howden:
Applicability of BET to Elusive Bugs in Diverse Application Areas. ICSOFT (1) 2009: 277-282 - 2008
- [c23]R. Barzin, S. Fukushima, William E. Howden, S. Sharifi:
Superfit Combinational Elusive Bug Detection. COMPSAC 2008: 144-151 - [c22]William E. Howden:
Elusive Bugs, Bounded Exhaustive Testing and Incomplete Oracles. ICSOFT (SE/MUSE/GSDCA) 2008: 115-121 - 2007
- [c21]William E. Howden, Cliff Rhyne:
Test Frameworks for Elusive Bug Testing. ICSOFT (SE) 2007: 250-257 - 2005
- [c20]William E. Howden:
Software Test Selection Patterns and Elusive Bugs. COMPSAC (1) 2005: 25-32
1990 – 1999
- 1998
- [c19]William E. Howden:
Good Enough versus High Assurance Software Testing and Evaluation Methods. HASE 1998: 166-177 - 1997
- [c18]William E. Howden:
Systems testing and statistical test data coverage. COMPSAC 1997: 500-504 - [c17]William E. Howden:
Confidence-based reliability and statistical coverage estimation. ISSRE 1997: 283-291 - 1996
- [c16]William E. Howden, Suehee Pak:
The Derivation of Functional Specifications from Source Code. APSEC 1996: 166- - [c15]William E. Howden:
Keynote Address: Auditing Informal Software Testing and Analysis Processes. APSEC 1996: 332- - [c14]William E. Howden, G. M. Shi:
Linear and Structural Event Sequence Analysis. ISSTA 1996: 98-106 - 1995
- [j29]William E. Howden, Yudong Huang:
Software Trustability Analysis. ACM Trans. Softw. Eng. Methodol. 4(1): 36-64 (1995) - [c13]William E. Howden, G. M. Shi:
Temporal Event Analysis and Program Understanding. COMPSAC 1995: 4-11 - 1994
- [j28]William E. Howden, Bruce Wieand:
QDA-A Method for Systematic Informal Program Analysis. IEEE Trans. Software Eng. 20(6): 445-462 (1994) - [c12]William E. Howden, Yudong Huang:
Software trustability. ISSRE 1994: 143-151 - [c11]William E. Howden, Yudong Huang:
Confidence Oriented Software Dependability Measurement (Abstract). ISSTA 1994: 196 - 1992
- [c10]William E. Howden, Suehee Pak:
Problem domain, structural and logical abstractions in reverse engineering. ICSM 1992: 214-224 - 1991
- [j27]William E. Howden, David Nesbitt, Cheron Vail, Bruce Wieand:
Verification of complex systems using incremental operational specifications. Inf. Sci. 57-58: 427-450 (1991) - [j26]Linda L. Werner, William E. Howden:
An investigation of the applicability of data usage analysis. J. Syst. Softw. 15(3): 205-215 (1991) - [j25]William E. Howden:
Program Testing versus Proofs of Correctness. Softw. Test. Verification Reliab. 1(1): 5-15 (1991) - [e2]William E. Howden:
Proceedings of the Symposium on Testing, Analysis, and Verification, TAV 1991, Victoria, British Columbia, Canada, October 8-10, 1991. ACM 1991, ISBN 0-89791-449-X [contents] - 1990
- [j24]William E. Howden:
Comments Analysis and Programming Errors. IEEE Trans. Software Eng. 16(1): 72-81 (1990)
1980 – 1989
- 1989
- [c9]William E. Howden:
Error-Based Validation Completeness. ICSE 1989: 357 - [c8]William E. Howden:
A Comparison of Software and Hardware Testing. IFIP Congress 1989: 344 - [c7]William E. Howden:
Validating Programs without Specifications. Symposium on Testing, Analysis, and Verification 1989: 2-9 - 1986
- [j23]Shmuel Rotenstreich, William E. Howden:
Two-Dimensional Program Design. IEEE Trans. Software Eng. 12(3): 377-384 (1986) - [j22]William E. Howden:
A Functional Approach to Program Testing and Analysis. IEEE Trans. Software Eng. 12(10): 997-1005 (1986) - 1985
- [j21]William E. Howden:
The Theory and Practice of Foundation Testing. IEEE Softw. 2(5): 6-17 (1985) - 1984
- [e1]Terry A. Straeter, William E. Howden, Jean-Claude Rault:
Proceedings, 7th International Conference on Software Engineering, Orlando, Florida, USA, March 26-29, 1984. IEEE Computer Society 1984, ISBN 0-8186-0528-6 [contents] - 1982
- [j20]William E. Howden:
Contemporary Software Development Environments. Commun. ACM 25(5): 318-329 (1982) - [j19]William E. Howden:
Life-Cycle Software Validation. Computer 15(2): 71-78 (1982) - [j18]William E. Howden:
Validation of Scientific Programs. ACM Comput. Surv. 14(2): 193-227 (1982) - [j17]William E. Riddle, Victor R. Basili, Les Belady, Carl Davis, Susan L. Gerhart, William E. Howden, John D. Musa, Leon G. Stucki:
Proposals for tool and methodology evaluation experiments: ACM SIGSOFT sponsored software engineering symposium on tool and methodology evaluation. ACM SIGSOFT Softw. Eng. Notes 7(1): 6-10 (1982) - [j16]William E. Howden:
Weak Mutation Testing and Completeness of Test Sets. IEEE Trans. Software Eng. 8(4): 371-379 (1982) - 1981
- [j15]William E. Howden, Paul Cohen, Al Irvine, James King, Patricia B. Powell, William E. Riddle, Leon G. Stucki, Leonard L. Tripp:
Contemporary software development environments. ACM SIGSOFT Softw. Eng. Notes 6(4): 6-15 (1981) - [c6]Mark K. Smith, Leonard L. Tripp, Leon J. Osterweil, Richard N. Taylor, William E. Howden:
An approach to transfer verification and validation technology. AFIPS National Computer Conference 1981: 367-373 - [c5]William E. Howden:
Completeness Criteria for Testing Elementary Program Functions. ICSE 1981: 235-243 - 1980
- [j14]William E. Howden:
Functional testing and design abstractions. J. Syst. Softw. 1: 307-313 (1980) - [j13]William E. Howden:
Applicability of Software Validation Techniques to Scientific Programs. ACM Trans. Program. Lang. Syst. 2(3): 307-320 (1980) - [j12]William E. Howden:
Functional Program Testing. IEEE Trans. Software Eng. 6(2): 162-169 (1980)
1970 – 1979
- 1978
- [j11]William E. Howden:
Algebraic Program Testing. Acta Informatica 10: 53-66 (1978) - [j10]William E. Howden:
Lindenmayer Grammars and Symbolic Testing. Inf. Process. Lett. 7(1): 36-39 (1978) - [j9]William E. Howden:
An Evaluation of the Effectiveness of Symbolic Testing. Softw. Pract. Exp. 8(4): 381-397 (1978) - [j8]William E. Howden:
DISSECT-A Symbolic Evaluation and Program Testing System. IEEE Trans. Software Eng. 4(1): 70-73 (1978) - [j7]William E. Howden:
Theoretical and Empirical Studies of Program Testing. IEEE Trans. Software Eng. 4(4): 293-298 (1978) - [c4]William E. Howden:
Functional program testing. COMPSAC 1978: 321-325 - [c3]William E. Howden:
Theoretical and Empirical Studies of Program Testing. ICSE 1978: 305-311 - 1977
- [j6]William E. Howden:
Symbolic Testing and the DISSECT Symbolic Evaluation System. IEEE Trans. Software Eng. 3(4): 266-278 (1977) - 1976
- [j5]William E. Howden:
Reliability of the Path Analysis Testing Strategy. IEEE Trans. Software Eng. 2(3): 208-215 (1976) - [c2]William E. Howden:
Experiments with a symbolic evaluation system. AFIPS National Computer Conference 1976: 899-908 - 1975
- [j4]William E. Howden:
Solution plans and interactive problem solving. Comput. Graph. 1(1): 21-26 (1975) - [j3]William E. Howden:
Methodology for the Generation of Program Test Data. IEEE Trans. Computers 24(5): 554-560 (1975) - 1974
- [c1]William E. Howden:
Solution plans and interactive problem solving. SIGGRAPH 1974: 10
1960 – 1969
- 1968
- [j2]William E. Howden:
The sofa problem. Comput. J. 11(3): 299-301 (1968) - 1967
- [j1]William E. Howden:
A program for the construction of PERT flow charts. Comput. J. 10(3): 278-281 (1967)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint