2003
DOI: 10.1109/ms.2003.1196322
|View full text |Cite
|
Sign up to set email alerts
|

Best practices in code inspection for safety-critical software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2005
2005
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(15 citation statements)
references
References 13 publications
0
14
0
1
Order By: Relevance
“…Code walkthough [16] is a technique in which source code is traced by a group following a specific test case, while the state of program variables is monitored, to analyze the programmer's logic and look for issues. In bug-pattern-based reviews or checklistbased reviews [7], checklists focus the attention of the reader on places where bugs are known to exist. Static analysis tools can help these approaches [2], although a common mistake is to use the tools to replace reviews.…”
Section: Appendix: Homeworkless Review Methodologiesmentioning
confidence: 99%
“…Code walkthough [16] is a technique in which source code is traced by a group following a specific test case, while the state of program variables is monitored, to analyze the programmer's logic and look for issues. In bug-pattern-based reviews or checklistbased reviews [7], checklists focus the attention of the reader on places where bugs are known to exist. Static analysis tools can help these approaches [2], although a common mistake is to use the tools to replace reviews.…”
Section: Appendix: Homeworkless Review Methodologiesmentioning
confidence: 99%
“…In addition, prefixes and suffixes indicating topics can be utilized for legibility instead of grouping and sorting by the topics [6]. Table 4 presents an example of this pattern and its improves version in which the deployment cost is drastically decreased by approximately 19.85% as fewer slots are occupied.…”
Section: Loose Packingmentioning
confidence: 99%
“…Note that a variable can match more than one pattern. Legibility is fundamental to code maintenance [6]; therefore, we recommend saving a copy (i.e., developer version) because steps 5 and 6 can hinder the legibility.…”
Section: Figure 1 Flow Chart Of the Proposed Solution Based On The Fmentioning
confidence: 99%
“…testing), requiring simulation. ), code inspection [20] and related verification activities, many works exist in the literature (see for example the approach developed at Verimag for the static analysis [21]): while they can automate many checks, when it comes to performing non-trivial inspections their common limitation consists in the fact that the verifier is not aided by any more or less formal model which would facilitate the work by providing proper views on the code (in practice, only function call-graphs [22] and code navigators are used).…”
Section: Related Workmentioning
confidence: 99%
“…variables are correctly ini-tialized, the number of iterations and stop conditions of cycles is correct, etc.) [20]. While some controls can be automated, many others are left to the sensibility of testers who perform code inspection (or 'walk-throughs'), and therefore are quite error prone.…”
Section: Related Workmentioning
confidence: 99%