default search action
Susan L. Gerhart
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2004
- [j22]Susan L. Gerhart:
Do Web search engines suppress controversy? First Monday 9(1) (2004) - 1995
- [j21]Dan Craigen, Susan L. Gerhart, Ted Ralston:
Formal Methods Reality Check: Industrial Usage. IEEE Trans. Software Eng. 21(2): 90-98 (1995) - 1994
- [j20]Susan L. Gerhart, Dan Craigen, Ted Ralston:
Experience with Formal Methods in Critical Systems. IEEE Softw. 11(1): 21-28 (1994) - [j19]Susan L. Gerhart, Dan Craigen, Ted Ralston:
Case Study: Darlington Nuclear Generating Station. IEEE Softw. 11(1): 30-39 (1994) - 1990
- [j18]Susan L. Gerhart:
Applications of Formal Methods: Develoment Virtuoso Software - Guest Editor's Introduction. IEEE Softw. 7(5): 6-10 (1990) - 1986
- [j17]Carl E. Landwehr, Susan L. Gerhart, John D. McLean, Donald I. Good, Nancy Leveson:
NRL invitational workshop on testing and proving: two approaches to assurance. ACM SIGSOFT Softw. Eng. Notes 11(5): 63-85 (1986) - 1985
- [j16]Susan L. Gerhart:
Prolog technology as a basis for verification systems. ACM SIGSOFT Softw. Eng. Notes 10(4): 37-40 (1985) - 1983
- [j15]Carl A. Sunshine, David H. Thompson, Roddy W. Erickson, Susan L. Gerhart, Daniel Schwabe:
Correction to "Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models". IEEE Trans. Software Eng. 9(1): 113 (1983) - 1982
- [j14]William E. Riddle, Victor R. Basili, Les Belady, Carl Davis, Susan L. Gerhart, William E. Howden, John D. Musa, Leon G. Stucki:
Proposals for tool and methodology evaluation experiments: ACM SIGSOFT sponsored software engineering symposium on tool and methodology evaluation. ACM SIGSOFT Softw. Eng. Notes 7(1): 6-10 (1982) - [j13]Susan L. Gerhart:
Two recent books on programming: review of "The science of programming" by David Gries. Springer-Verlag 1981. and review of "The craft of programming" by John Reynolds. Prentice-Hall 1981. ACM SIGSOFT Softw. Eng. Notes 7(2): 63-64 (1982) - [j12]Carl A. Sunshine, David H. Thompson, Roddy W. Erickson, Susan L. Gerhart, Daniel Schwabe:
Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models. IEEE Trans. Software Eng. 8(5): 460-489 (1982) - 1981
- [j11]Susan L. Gerhart:
AFFIRM summary. ACM SIGSOFT Softw. Eng. Notes 6(3): 16-24 (1981) - [j10]Susan L. Gerhart:
High-level theories. ACM SIGSOFT Softw. Eng. Notes 6(3): 24-25 (1981) - [j9]Susan L. Gerhart:
Research avenues verification is not pursuing, but may be should be. ACM SIGSOFT Softw. Eng. Notes 6(3): 24 (1981) - [j8]Marvin V. Zelkowitz, W. Richards Adrion, Alfred V. Aho, Daniel G. Bobrow, Thomas Cheatham, John C. Cherniavsky, Susan L. Gerhart, Gordon Lyon, John Nestor, Terry A. Straeter:
High level language programming environments. ACM SIGSOFT Softw. Eng. Notes 6(4): 36-51 (1981) - 1978
- [j7]Anthony I. Wasserman, Laszlo A. Belady, Susan L. Gerhart, Edward F. Miller Jr., William M. Waite, William A. Wulf:
The Oregon Report Software Engineering: The Turning Point. Computer 11(9): 30-41 (1978) - [j6]Susan L. Gerhart:
A proposal for publication and exchange of program proofs. ACM SIGSOFT Softw. Eng. Notes 3(1): 7-17 (1978) - 1976
- [j5]Susan L. Gerhart:
Proof Theory of Partial Correctness Verification Systems. SIAM J. Comput. 5(3): 355-377 (1976) - [j4]Susan L. Gerhart, Lawrence Yelowitz:
Observations of Fallibility in Applications of Modern Programming Methodologies. IEEE Trans. Software Eng. 2(3): 195-207 (1976) - [j3]Susan L. Gerhart, Lawrence Yelowitz:
Control Structure Abstractions of the Backtracking Programming Technique. IEEE Trans. Software Eng. 2(4): 285-292 (1976) - 1975
- [j2]John B. Goodenough, Susan L. Gerhart:
Toward a Theory of Test Data Selection. IEEE Trans. Software Eng. 1(2): 156-173 (1975) - 1974
- [j1]Susan L. Gerhart, Richard J. Orgass:
A proposal for a handbook for APL program verification. ACM SIGAPL APL Quote Quad 5(4): 79-86 (1974)
Conference and Workshop Papers
- 1995
- [c21]Ted Ralston, Susan L. Gerhart, Dan Craigen:
The Role of Education and Trainig in the Industrial Application of Formal Methods. AMAST 1995: 41-49 - 1993
- [c20]Dan Craigen, Susan L. Gerhart, Ted Ralston:
Formal Methods Reality Check: Industrial Usage. FME 1993: 250-267 - [c19]Susan L. Gerhart, Dan Craigen, Ted Ralston:
Observations on Industrial Practice Using Formal Methods. ICSE 1993: 24-33 - [c18]Susan L. Gerhart:
The MCC Formal Methods Transition Study: Technology Transfer for Complex Information Technology and Processes. Diffusion, Transfer and Implementation of Information Technology 1993: 249-255 - 1992
- [c17]Dan Craigen, Susan L. Gerhart, Ted Ralston:
An International Survey of Industrial Applications of Formal Methods. Z User Workshop 1992: 1-5 - 1991
- [c16]Susan L. Gerhart:
Formal Methods: An International Perspective. ICSE 1991: 36-37 - 1989
- [c15]Susan L. Gerhart:
The MCC Software Technology Program. IFIP Congress 1989: 883-889 - [c14]Susan L. Gerhart:
Preliminary Summary: FM89 Assessment of Formal Methods for Trustworthy Computer Systems. Symposium on Testing, Analysis, and Verification 1989: 152-155 - 1988
- [c13]Sharon L. Smith, Susan L. Gerhart:
STATEMATE and cruise control: a case study. COMPSAC 1988: 49-56 - 1984
- [c12]Susan L. Gerhart:
Application of Axiomatic Methods to a Specification Analyser. ICSE 1984: 441-453 - 1983
- [c11]Susan L. Gerhart, Eric C. R. Hehner, Harlan D. Mills, A. Joe Turner:
Teaching formal methods for program development and verification (Panel Session). SIGCSE 1983: 50 - 1982
- [c10]Lawrence Yelowitz, Susan L. Gerhart, G. Hilborn:
Modeling a Network Protocol in AFFIRM and Ada. PSTV 1982: 435-450 - 1980
- [c9]Susan L. Gerhart, David R. Musser, David H. Thompson, D. A. Baker, R. L. Bates, Roddy W. Erickson, Ralph L. London, D. G. Taylor, David S. Wile:
An Overview of AFFIRM: A Specification and Verification System. IFIP Congress 1980: 343-347 - 1979
- [c8]Stanley Lee, Willem P. de Roever, Susan L. Gerhart:
The Evolution of List-Copying Algorithms. POPL 1979: 53-67 - 1978
- [c7]Susan L. Gerhart:
A Derivation Oriented Proof of the Schorr-Waite Marking Algorithm. Program Construction 1978: 472-492 - 1976
- [c6]Susan L. Gerhart, Lawrence Yelowitz:
Control Structure Abstractions of the Backtracking Programming Technique (Abstract). ICSE 1976: 391 - 1975
- [c5]Susan L. Gerhart:
Assertions and APL programming. APL 1975: 138-147 - [c4]Susan L. Gerhart:
Correctness-Preserving Program Transformations. POPL 1975: 54-66 - [c3]Susan L. Gerhart:
Knowledge about programs: A model and case study. Reliable Software 1975: 88-95 - [c2]John B. Goodenough, Susan L. Gerhart:
Toward a theory of test data selection. Reliable Software 1975: 493-510 - [c1]Susan L. Gerhart:
Methods for teaching program verification. SIGCSE 1975: 172-178
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 21:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint