default search action
John B. Goodenough 0002
Person information
- affiliation: Carnegie Mellon University, Software Engineering, Institute, Pittsburgh, PA, USA
- affiliation: SofTech, Inc., Waltham, MA, USA
- affiliation: Decision Sciences Lab, Bedford, MA, USA
Other persons with the same name
- John B. Goodenough 0001 (aka: John Bannister Goodenough) — The University of Texas at Austin, Cockrell School of Engineering, TX, USA (and 3 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [c25]Charles B. Weinstock, John B. Goodenough, Ari Z. Klein:
Measuring assurance case confidence using Baconian probabilities. ASSURE@ICSE 2013: 7-11 - [c24]John B. Goodenough, Charles B. Weinstock, Ari Z. Klein:
Eliminative induction: a basis for arguing system confidence. ICSE 2013: 1161-1164 - [c23]John B. Goodenough:
Building confidence in system behavior. HILT 2013: 49-50 - 2010
- [c22]John B. Goodenough, Linda M. Northrop:
Software assurance for systems of systems. FoSER 2010: 133-136 - [c21]Linda M. Northrop, Mark Klein, John B. Goodenough, Dennis B. Smith:
Needed foundations for assuring the desirable behavior of software-reliant systems. FoSER 2010: 259-262
1990 – 1999
- 1992
- [c20]John B. Goodenough:
Ada 9X and Real-Time Systems. TRI-Ada 1992: 43-47 - 1990
- [j8]Lui Sha, John B. Goodenough:
Real-Time Scheduling Theory and Ada. Computer 23(4): 53-62 (1990) - [c19]Mark W. Borger, John B. Goodenough:
Ada usage/performance specification. IRTAW 1990: 65-69
1980 – 1989
- 1989
- [c18]John B. Goodenough:
Real-time tasking semantics working group. IRTAW 1989: 32-48 - [e1]John B. Goodenough:
Proceedings of the Third International Workshop on Real-Time Ada Issues, IRTAW 1989, Farmington, Pennsylvannia, USA, 1989. ACM 1989, ISBN 978-0-89791-360-7 [contents] - 1988
- [c17]John B. Goodenough, Lui Sha:
The priority ceiling protocol: A method for minimizing the blocking of high priority Ada tasks. IRTAW 1988: 20-31 - [c16]C. Douglass Locke, John B. Goodenough:
A practical application of the ceiling protocol in a real-time system. IRTAW 1988: 35-38 - 1987
- [c15]John B. Goodenough:
Ada Compiler Technology. COMPCON 1987: 366 - 1986
- [c14]John B. Goodenough:
Ada Compiler Validation: An Example of Software Testing Theory and Practice. System Development and Ada 1986: 195-232 - 1983
- [c13]John B. Goodenough, Thomas H. Probert:
Designing and Testing Interfaces for Portable Software: Ada TEXT_IO as an Example. Ada Software Tools Interfaces 1983: 104-114 - 1981
- [j7]John B. Goodenough:
The Ada Compiler Validation Capability. Computer 14(6): 57-64 (1981) - 1980
- [c12]John B. Goodenough:
The Ada compiler validation capability. SIGPLAN 1980: 1-8
1970 – 1979
- 1978
- [c11]John B. Goodenough:
Transcript of question and answer session. HOPL 1978: 365-366 - [c10]John B. Goodenough:
Full text of all questions submitted. HOPL 1978: 366 - [c9]John B. Goodenough:
Biography of Douglas T. Ross. HOPL 1978: 367 - [c8]John B. Goodenough:
Transcript of question and answer session. HOPL 1978: 397-399 - [c7]John B. Goodenough:
Full text of all questions submitted. HOPL 1978: 399-400 - [c6]John B. Goodenough:
Biography of Jules I. Schwartz. HOPL 1978: 401 - 1976
- [c5]John B. Goodenough:
The need for optimization standards. Design and Implementation of Programming Languages 1976: 335-344 - 1975
- [j6]John B. Goodenough:
Exception Handling: Issues and a Proposed Notation. Commun. ACM 18(12): 683-696 (1975) - [j5]Douglas T. Ross, John B. Goodenough, C. A. Irvine:
Software Engineering: Process, Principles, and Goals. Computer 8(5): 17-27 (1975) - [j4]John B. Goodenough:
Exception handling design issues. ACM SIGPLAN Notices 10(7): 41-45 (1975) - [j3]John B. Goodenough, Susan L. Gerhart:
Toward a Theory of Test Data Selection. IEEE Trans. Software Eng. 1(2): 156-173 (1975) - [c4]John B. Goodenough:
Structured Exception Handling. POPL 1975: 204-224 - [c3]John B. Goodenough, Susan L. Gerhart:
Toward a theory of test data selection. Reliable Software 1975: 493-510 - 1973
- [c2]John B. Goodenough:
Tools for modular programming: Finding out what's needed. ACM Annual Conference 1973
1960 – 1969
- 1968
- [c1]John B. Goodenough:
The comparison of programming languages: A linguistic approach. ACM National Conference 1968: 765-785 - 1965
- [j2]John B. Goodenough:
A lightpen-controlled program for online data analysis. Commun. ACM 8(2): 130-134 (1965) - [j1]Herbert Rubenstein, John B. Goodenough:
Contextual correlates of synonymy. Commun. ACM 8(10): 627-633 (1965)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-05 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint