Click the titles to download the papers

Papers for Chapter 2.
Demonstrating Understanding


2.2  Gelperin, David and Bill Hetzel (1988) "The Growth of Software Testing"

2.3  Miller, Granville, and Laurie Williams (2006)  “Personas: Moving Beyond Role-Based Requirements Engineering”

2.4  Alexander, Ian (2003)  “Misuse cases: use cases with hostile intent”

2.5  Lakey, Peter and Ann Marie Neufeder (1997) “Chapter 9: Operational Profiles” System and Software Reliability Assurance Notebook

2.6  Attwood, Katrina, Tim Kelly, and John McDermid (2004) "The Use of Satisfaction Arguments for Traceability in Requirements Reuse for System Families: Position Paper"

2.7  Pilot, Simha (2002)  “What Is A Fault Tree Analysis?"

2.8  Hayhurst, Kelly and others (2001)  “A Practical Tutorial on Modified Condition/Decision Coverage”

2.10  McNally, Richard et al. (2012)  "Fuzzing: The State of the Art"

2.11  Ma, Lei et al. (2015)  “GRT: Program-Analysis-Guided Random Testing”

2.12  Wiegers, Karl E. (2002) “Seven Truths about Peer Reviews”

2.13  Gelperin, David (2005) “How Does High-Impact Work?”

2.14  British Office of Science (2012)  “Blackett Review of High Impact Low Probability Risks”

2.15  Emergency Preparedness Solutions (2012) “Using Cascading Impacts to Define Worst-Case Scenario”

2.16  …  “Potential Problem Analysis”

2.17  Wang, Richard, Henry, B. and Madnick, Stuart (1992)  “Data Quality Requirements Analysis and Modeling”

2.18  Ray, Baishakhi and Hellendoorn, Vincent (2015)  "On the Naturalness of Buggy Code"

2.19  Baker, Richard and Habli, Ibrahim (2013)  “An Empirical Evaluation of Mutation Testing for Improving the Test Quality of Safety-Critical Software”

2.20  Hall, Anthony (1990)  “Seven Myths of Formal Methods”

2.22  Simmons, Erik (2001) “Quantifying Quality Requirements Using Planguage”

2.23  Bird, Jim (2013)  “Defensive Programming"