xref: /original-bsd/contrib/bib/doc/USD.doc/testrefs (revision 4fbadd59)
1%A Timothy A. Budd
2%T Referemce File Formats
3%I UATR 82-1
4%D 1982
5
6%A James C. Alexander
7%T Tib: A TeX bibliographic preprocessor
8%I (draft)
9%D 1987
10
11%A Brian W. Kernighan
12%A Lorinda L. Cherry
13%T A System for Typesetting Mathematics
14%J CACM
15%V 18
16%N 3
17%D MAR 1978
18%P 151-156
19%K eqn
20
21%A Donald Knuth
22%T The TeXbook
23%I ADDISON
24%D 1984
25%K tex
26
27%A Leslie Lamport
28%T LaTeX: A Document Preparation System
29%I ADDISON
30%D 1986
31%K tex
32
33%A Software\ Research\ Associates
34%T Software Engineering Automated Tools Index
35%I S\&RA
36%C San Francisco, CA
37%D 1982
38
39%A M. E. Lesk
40%T Tbl - A Program to Format Tables
41%I Bell Laboratories
42%J Unix Programmer's Manual, Vol 2A
43
44%A M. E. Lesk
45%T Some Applications of Inverted Indexes on the UNIX System
46%R Bell Laboratories Computing Science Technical Report 69
47%D JUN 1978
48%K refer
49
50%A Alfred V. Aho
51%A Jeffrey D. Ullman
52%T Principles of Compiler Design
53%I Addison-Wesley
54%D 1977
55%K dragon
56
57%A R. E. Griswold
58%A J. F. Poage
59%A I. P. Polonsky
60%T The SNOBOL4 Programming Language
61%I PRHALL
62%D second edition 1971
63
64%A R. Colt Hoare
65%T A Tour through the Island of Elba
66%I (no listed publisher)
67%C London
68%D 1814
69
70%A Dennie Van\ Tassel
71%T Program Style, Design, Efficiency,
72%I PRHALL
73%D 1978
74%W tab
75%K testing debugging
76
77%A M. A. Harrison
78%A W. L. Ruzzo
79%A J. D. Ullman
80%T Protection in Operating Systems
81%J CACM
82%V 19
83%N 8
84%P 461-471
85%D AUG 1976
86%K hru
87
88%A M. Bishop
89%A L. Snyder
90%T The Transfer of Information and Authority
91in a Protection System
92%J Proceedings of the 7th SOSP
93%P 45-54
94%D 1979
95
96%A John B. Goodenough
97%T A Survey of Program Testing Issues
98%B Research Directions in Software Technology
99%E Peter Wegner
100%I MIT Press
101%P 316-340
102%D 1979
103
104%A R. J. Lipton
105%A L. Snyder
106%T On Synchronization and Security
107%E R. A. DeMillo
108%E D. P. Dobkin
109%E A. K. Jones
110%E R. J. Lipton
111%B Foundations of Secure Computation
112%P 367-388
113%I ACPRESS
114%D 1978
115
116%A C.A.R. Hoare
117%T Procedures and parameters: An axiomatic approach
118%B Symposium on semantics of algorithmic languages
119%E E. Engeler
120%P 102-116
121%S Lecture Notes in Mathematics
122%V 188
123%I Springer-Verlag
124%C Berlin-Heidelberg-New York
125%D 1971
126
127%A A. Girard
128%A J-C Rault
129%T A Programming Technique for Software Reliability
130%B Symposium on Software Reliability
131%I IEEE
132%C Montvale, New Jersey
133%D 1977
134%O (Cited in Glib [32])
135
136%E R. A. DeMillo
137%E D. P. Dobkin
138%E A. K. Jones
139%E R. J. Lipton
140%T Foundations of Secure Computation
141%I ACPRESS
142%D 1978
143%K book
144
145%A T. A. Budd
146%T An APL Complier
147%R UATR 81-17
148%D 1981
149
150%A Douglas Baldwin
151%A Frederick Sayward
152%T Heuristics for Determining Equivalence of Program Mutations
153%R Technical Report Number 161
154%I Yale University
155%D 1979
156
157%A Martin Brooks
158%T Automatic Generation of Test Data for
159Recursive Programs Having Simple Errors
160%I PhD Thesis, Stanford University
161%D 1980
162
163%A A. Snyder
164%T A Portable Compiler for the Language C
165%R Master's Thesis
166%I M.I.T.
167%D 1974
168
169%F BHS--
170%A Timothy A. Budd
171%A Robert Hess
172%A Frederick G. Sayward
173%T User's Guide for the EXPER Mutation Analysis system
174%O (Yale university, memo)
175
176%E I. M. Editor
177%T Book with no author
178%D 1066
179
180%I SDIT
181%T Bullitun of the South Dakota Institute of Technology
182%D 1946
183