default search action
Herbert Hecht
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
2000 – 2009
- 2008
- [c20]Herbert Hecht:
A Systems Engineering Approach to Exception Handling. ICONS 2008: 190-195 - 2000
- [c19]Myron Hecht, Yutao He, Herbert Hecht, Xuegao An:
Integration of system dependability and software reliability growth models for e-commerce systems. HASE 2000: 35-42 - [c18]Yutao He, Herbert Hecht, Raymond A. Paul:
Measuring and assessing software test processes using test data. HASE 2000: 259-264
1990 – 1999
- 1999
- [c17]Herbert Hecht:
What are the Most Critical Challenges to Integrating High Assurance Systems?. HASE 1999: 227-230 - 1998
- [j6]Eltefaat Shokri, Herbert Hecht, Patrick Crane, Jerry Dussault, K. H. Kim:
An Approach for Adaptive Fault Tolerance in Object-Oriented Open Distributed Systems. Int. J. Softw. Eng. Knowl. Eng. 8(3): 333-346 (1998) - [c16]Gary Johnson, John Calvert, Kelly J. Hayhurst, John Janeri, Herbert Hecht:
System Requirements and Analysis Issues for High Assurance Systems. HASE 1998: 60- - [c15]Eltefaat Shokri, Herbert Hecht:
Matching Software Fault Tolerance with Application Needs. HASE 1998: 248-253 - 1997
- [j5]Herbert Hecht, Myron Hecht:
Quality Assurance and Testing for Safety Systems. Ann. Softw. Eng. 4: 191-200 (1997) - [c14]Ann T. Tai, Herbert Hecht, Kishor S. Trivedi, Bing Zhang:
Toward Accessibility Enhancement of Dependability Modeling Techniques and Tools. FTCS 1997: 37-41 - [c13]Ann T. Tai, Kishor S. Trivedi, Herbert Hecht:
On the Development of Dependability-Evaluation Workbench for High-Assurance System Designers. HASE 1997: 2-13 - [c12]Herbert Hecht, Myron Hecht, Dolores R. Wallace:
Toward More Effective Testing for High-Assurance Systems. HASE 1997: 176-181 - [c11]Herbert Hecht, Myron Hecht:
Test-Linked Specification For Safety-Critical Software. HICSS (5) 1997: 267-272 - [c10]Dong Tang, Herbert Hecht:
An approach to measuring and assessing dependability for critical software systems. ISSRE 1997: 192-202 - [c9]Ann T. Tai, Savio N. Chau, Leon Alkalaj, Herbert Hecht:
On-board preventive maintenance: analysis of effectiveness and optimal duty period. WORDS 1997: 40-47 - [c8]Eltefaat Shokri, Herbert Hecht, Patrick Crane, Jerry Dussault, K. H. (Kane) Kim:
An approach for adaptive fault-tolerance in object-oriented open distributed systems. WORDS 1997: 298-305 - 1995
- [c7]Herbert Hecht, Myron Hecht:
Dependability assessment for decentralized systems. ISADS 1995: 281-286 - 1994
- [c6]Herbert Hecht, Myron Hecht:
V&V in defense and commercial projects. ISSRE 1994: 84-92 - 1991
- [c5]Myron Hecht, J. Agron, Herbert Hecht, K. H. Kim:
A Distributed Fault Tolerant Architecture for Nuclear Reactor and Other Critical Process Control Applications. FTCS 1991: 462-469 - 1990
- [c4]Wesley W. Chu, Andy Y. Hwang, Rei-Chi Lee, Qiming Chen, M. A. Merzbacher, Herbert Hecht:
Fault Tolerant Distributed Data Base System via Data Inference. SRDS 1990: 86-94
1980 – 1989
- 1986
- [j4]Herbert Hecht, Myron Hecht:
Software Reliability in the System Context. IEEE Trans. Software Eng. 12(1): 51-58 (1986) - 1984
- [j3]Herbert Hecht:
Computer Standards. Computer 17(10): 33-43 (1984) - 1980
- [c3]Herbert Hecht:
Software reliability. AFIPS National Computer Conference 1980: 695
1970 – 1979
- 1978
- [c2]Herbert Hecht:
Software standards - With hints of their relation to computer architecture. AFIPS National Computer Conference 1978: 927-930 - [c1]K. H. Kim, Herbert Hecht, J. Huang, Mahmoud Naghibzadeh:
Strategies for structured and fault-tolerant design of recovery programs. COMPSAC 1978: 651-656 - 1976
- [j2]Herbert Hecht:
Fault-Tolerant Software for Real-Time Applications. ACM Comput. Surv. 8(4): 391-407 (1976) - 1973
- [j1]Herbert Hecht:
Figure of Merit for Fault-Tolerant Space Computers. IEEE Trans. Computers 22(3): 246-251 (1973)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint