default search action
Keith W. Miller 0001
Person information
- affiliation: University of Illinois Springfield, USA
- affiliation: University of Missouri-St. Louis, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j99]Frances S. Grodzinsky, Marty J. Wolf, Keith W. Miller:
Ethical Issues From Emerging AI Applications: Harms Are Happening. Computer 57(2): 44-52 (2024) - [j98]Donald Gotterbarn, Keith W. Miller:
Cui Bono? Software Professionals Should Always Ask "Who Benefits?". Computer 57(2): 64-69 (2024) - [j97]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
Generative AI and Its Implications for Definitions of Trust. Inf. 15(9): 542 (2024) - 2023
- [j96]Keith W. Miller:
Facial Recognition Technology: Navigating the Ethical Challenges. Computer 56(1): 76-81 (2023) - [j95]Keith W. Miller:
Computer-Enhanced Communication Among Deaf, Hard of Hearing, and Hearing People. Computer 56(7): 101-105 (2023) - 2022
- [j94]Keith W. Miller, Deborah G. Johnson, Perry D. Drake:
The ConnectionRoom: A New Analogy for Understanding the Ethical Dimensions of Social Media. Computer 55(1): 74-81 (2022) - [j93]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
Ethical Reflections on Handling Digital Remains: Computing Professionals Picking Up Bones. Digit. Soc. 1(1) (2022) - [j92]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Session replay scripts: A privacy analysis. Inf. Soc. 38(4): 257-268 (2022) - 2021
- [j91]Jason Borenstein, Frances S. Grodzinsky, Ayanna M. Howard, Keith W. Miller, Marty J. Wolf:
AI Ethics: A Long History and a Recent Burst of Attention. Computer 54(1): 96-102 (2021) - [j90]Jeffrey M. Voas, Keith W. Miller:
Confronting Your Digital Accuser. Computer 54(4): 11-13 (2021) - [c30]Fatemeh Mardi, Keith W. Miller, Phyllis Balcerzak:
Novice - Expert Pair Coaching: Teaching Python in a Pandemic. SIGCSE 2021: 226-231 - 2020
- [j89]Joseph Herkert, Jason Borenstein, Keith W. Miller:
The Boeing 737 MAX: Lessons for Engineering Ethics. Sci. Eng. Ethics 26(6): 2957-2974 (2020)
2010 – 2019
- 2019
- [j88]Simon Rogerson, Keith W. Miller, Jenifer Sunrise Winter, David K. Larson:
Information systems ethics - challenges and opportunities. J. Inf. Commun. Ethics Soc. 17(1): 87-97 (2019) - [j87]Jason Borenstein, Joseph R. Herkert, Keith W. Miller:
Self-Driving Cars and Engineering Ethics: The Need for a System Level Analysis. Sci. Eng. Ethics 25(2): 383-398 (2019) - 2018
- [j86]Don Gotterbarn, Amy S. Bruckman, Catherine Flick, Keith W. Miller, Marty J. Wolf:
ACM code of ethics: a guide for positive action. Commun. ACM 61(1): 121-128 (2018) - [j85]David K. Larson, Keith W. Miller:
Action ethics: testing and data analysis. Inroads 9(1): 34-37 (2018) - [j84]Don Gotterbarn, Marty J. Wolf, Catherine Flick, Keith W. Miller:
THINKING PROFESSIONALLY: The continual evolution of interest in computing ethics. Inroads 9(2): 10-12 (2018) - 2017
- [j83]Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct. Commun. ACM 60(5): 105-111 (2017) - [j82]David K. Larson, Keith W. Miller:
Action ethics for a software development class. Inroads 8(1): 38-42 (2017) - [j81]Donald Gotterbarn, Keith W. Miller:
Yes, but ... our response to: "professional ethics in the information age". J. Inf. Commun. Ethics Soc. 15(4): 357-361 (2017) - [j80]Keith W. Miller, Marty J. Wolf, Frances S. Grodzinsky:
This "Ethical Trap" Is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision-Making. Sci. Eng. Ethics 23(2): 389-401 (2017) - [j79]Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Dynamic technology challenges static codes of ethics: a case study. SIGCAS Comput. Soc. 47(3): 7-24 (2017) - [j78]Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky:
Why we should have seen that coming: comments on Microsoft's tay "experiment, " and wider implications. SIGCAS Comput. Soc. 47(3): 54-64 (2017) - [j77]Jason Borenstein, Joseph Herkert, Keith W. Miller:
Self-Driving Cars: Ethical Responsibilities of Design Engineers. IEEE Technol. Soc. Mag. 36(2): 67-75 (2017) - [c29]Bo Brinkman, Keith W. Miller:
The Code of Ethics Quiz Show. SIGCSE 2017: 679-680 - 2016
- [j76]Bo Brinkman, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Making a positive impact: updating the ACM code of ethics. Commun. ACM 59(12): 7-13 (2016) - [j75]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
There's something in your eye: ethical implications of augmented visual field devices. J. Inf. Commun. Ethics Soc. 14(3): 214-230 (2016) - [j74]Bo Brinkman, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
All hands on deck for ACM Ethics: updating the Code, revising enforcement, promoting integrity. SIGCAS Comput. Soc. 46(3): 5-8 (2016) - 2015
- [j73]Keith W. Miller, Marty J. Wolf, Frances S. Grodzinsky:
Behind the mask: machine morality. J. Exp. Theor. Artif. Intell. 27(1): 99-107 (2015) - [j72]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
Augmented reality all around us: power and perception at a crossroads. SIGCAS Comput. Soc. 45(3): 126-131 (2015) - [j71]Keith W. Miller, Joe Herkert:
Special Issue on Ethics 2014\/ISTAS 2014 [Guest Editorial]. IEEE Technol. Soc. Mag. 34(2): 31 (2015) - 2014
- [j70]Michael Lemke, Keith W. Miller:
On robots as genetically modified invasive species. J. Inf. Commun. Ethics Soc. 12(2): 122-132 (2014) - 2013
- [j69]Katina Michael, Keith W. Miller:
Big Data: New Opportunities and New Challenges [Guest editors' introduction]. Computer 46(6): 22-24 (2013) - [j68]David K. Larson, Keith W. Miller:
Medical Records and Software Trust. IT Prof. 15(2): 8-11 (2013) - [j67]Keith W. Miller:
A Secret Sociotechnical System. IT Prof. 15(4): 57-59 (2013) - [j66]Keith W. Miller:
Technology, Unemployment, and Power. IT Prof. 15(6): 10-11 (2013) - [j65]Jason Borenstein, Keith W. Miller:
Robots and the Internet: Causes for Concern. IEEE Technol. Soc. Mag. 32(1): 60-65 (2013) - [c28]Scott D. Dexter, Elizabeth Buchanan, Kellen Dins, Kenneth R. Fleischmann, Keith W. Miller:
Characterizing the need for graduate ethics education. SIGCSE 2013: 153-158 - 2012
- [j64]Keith W. Miller:
Is Ethical Behavior Good for Business? IT Prof. 14(1): 10-11 (2012) - [j63]Jeffrey M. Voas, Keith W. Miller:
Software Testing: What Goes Around Comes Around. IT Prof. 14(3): 4-5 (2012) - [j62]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
The Internet of Things: A Reality Check. IT Prof. 14(3): 56-59 (2012) - [j61]Keith W. Miller:
An Award for Sticking your Neck Out. IT Prof. 14(4): 4-5 (2012) - [j60]Keith W. Miller, Jeffrey M. Voas, George F. Hurlburt:
BYOD: Security and Privacy Considerations. IT Prof. 14(5): 53-55 (2012) - [j59]Keith W. Miller, Jeffrey M. Voas:
Who Owns What? The Social Media Quagmire. IT Prof. 14(6): 4-5 (2012) - [j58]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Moral responsibility for computing artifacts: "the rules" and issues of trust. SIGCAS Comput. Soc. 42(2): 15-25 (2012) - [j57]Keith W. Miller:
IEEE Technology and Society Magazine is Going Green [SSIT BOG Message]. IEEE Technol. Soc. Mag. 31(2): 3 (2012) - 2011
- [j56]Phillip A. Laplante, George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas:
Certainty through Uncertainty? Computer 44(2): 79-81 (2011) - [j55]Jeffrey M. Voas, George F. Hurlburt, Keith W. Miller, Phillip A. Laplante, Bret Michael:
Thoughts on Higher Education and Scientific Research. IT Prof. 13(2): 6-9 (2011) - [j54]Keith W. Miller:
Moral Responsibility for Computing Artifacts: "The Rules". IT Prof. 13(3): 57-59 (2011) - [j53]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
Mobile-App Addiction: Threat to Security? IT Prof. 13(6): 9-11 (2011) - [j52]Keith W. Miller:
Courageous Computing. IT Prof. 13(6): 12-13 (2011) - [j51]Keith W. Miller:
Technology and Society and Citations: People are Paying Attention [Editorial]. IEEE Technol. Soc. Mag. 30(4): 5-6 (2011) - [c27]Michael Davis, Keith W. Miller, Andreas F. X. Wolkenstein:
The rules [moral responsibility for computing artifacts]. ISTAS 2011: 1 - [c26]Frances S. Grodzinsky, Marty J. Wolf, Keith W. Miller:
Quantum computing and cloud computing: humans trusting humans via machines. ISTAS 2011: 1-5 - 2010
- [j50]Phillip A. Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith W. Miller, W. Eric Wong, Dianxiang Xu:
Software Test Automation. Adv. Softw. Eng. 2010: 163746:1-163746:2 (2010) - [j49]Keith W. Miller, Jeffrey M. Voas, Phillip A. Laplante:
In Trust We Trust. Computer 43(10): 85-87 (2010) - [j48]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller, Phillip A. Laplante, Bret Michael:
A Nonlinear Perspective on Higher Education. Computer 43(12): 90-92 (2010) - [j47]Keith W. Miller:
It's Not Nice to Fool Humans. IT Prof. 12(1): 51-52 (2010) - [j46]Keith W. Miller:
Lies - Damn Lies - and the Internet. IT Prof. 12(4): 10-11 (2010) - [j45]Keith W. Miller, Jeffrey M. Voas:
Ethics and the Cloud. IT Prof. 12(5): 4-5 (2010) - [j44]Keith W. Miller:
Ethical Analysis in the Cloud. IT Prof. 12(6): 7-9 (2010) - [j43]Keith W. Miller, Jeffrey M. Voas, Tom Costello:
Free and Open Source Software. IT Prof. 12(6): 14-16 (2010) - [j42]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
Mobile Applications: The Fifth Cycle. IT Prof. 12(6): 56-60 (2010) - [j41]Donald Gotterbarn, Keith W. Miller:
Unmasking Your Software's Ethical Risks. IEEE Softw. 27(1): 12-13 (2010) - [r2]Keith W. Miller:
Unit Testing. Encyclopedia of Software Engineering 2010: 1272-1274
2000 – 2009
- 2009
- [j40]Donald Gotterbarn, Keith W. Miller:
The Public is the Priority: Making Decisions Using the Software Engineering Code of Ethics. Computer 42(6): 66-73 (2009) - [j39]George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas:
An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008. IT Prof. 11(1): 14-19 (2009) - [j38]Keith W. Miller, Jeffrey M. Voas:
The Metaphysics of Software Trust. IT Prof. 11(2): 52-55 (2009) - [j37]George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day:
Privacy and/or Security: Take Your Pick. IT Prof. 11(4): 52-55 (2009) - [j36]David K. Larson, Keith W. Miller:
When Sensitive IT Information Crosses Borders. IT Prof. 11(4): 56-59 (2009) - [j35]Keith W. Miller:
Joining the Conversation about IT Ethics. IT Prof. 11(5): 48-50 (2009) - [j34]Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky:
Free, source-code-available, or proprietary: an ethically charged, context-sensitive choice. SIGCAS Comput. Soc. 39(1): 15-26 (2009) - 2008
- [j33]Keith W. Miller, Jeffrey M. Voas:
Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are? IT Prof. 10(4): 4-6 (2008) - [j32]Keith W. Miller, Jeffrey M. Voas:
IT as a Profession: Is Competent Creation the Primary Goal? IT Prof. 10(6): 15-17 (2008) - [j31]Keith W. Miller, Jeffrey M. Voas:
Information Integrity and IT Professionals' Integrity, Intertwined. IT Prof. 10(6): 35-40 (2008) - [j30]Keith W. Miller:
Critiquing a Critique - A Comment on "A Critique of Positive Responsibility in Computing". Sci. Eng. Ethics 14(2): 245-249 (2008) - [c25]Don Gotterbarn, Keith W. Miller:
Using the Software Engineering Code of Ethics in Professional Computing Issues. CSEE&T 2008: 273 - [p2]Michael C. Loui, Keith W. Miller:
Ethics and Professional Responsibility in Computing. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [c24]Jeffrey M. Voas, Keith W. Miller:
One in a Baker's Dozen: Debugging Debugging. HASE 2007: 75-81 - 2006
- [j29]Keith W. Miller, Jeffrey M. Voas:
Software test cases: is one ever enough? IT Prof. 8(1): 44-48 (2006) - [j28]Jeffrey M. Voas, Keith W. Miller:
Software Certification Services: Encouraging Trust and Reasonable Expectations. IT Prof. 8(5): 39-44 (2006) - [j27]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Influences on and incentives for increasing software reliability. J. Inf. Commun. Ethics Soc. 4(2): 103-113 (2006) - [c23]Keith W. Miller:
Editorial message: computer ethics & human values track. SAC 2006: 260 - [c22]Deborah G. Johnson, Keith W. Miller:
A dialogue on responsibility, moral agency, and IT systems. SAC 2006: 272-276 - [c21]Florence Appel, Keith W. Miller, Michael Quinn:
Introducing ethical issues into the curriculum. SIGITE Conference 2006: 157 - 2005
- [j26]David K. Larson, Keith W. Miller:
Silver Bullets for Little Monsters: Making Software More Trustworthy. IT Prof. 7(2): 9-13 (2005) - [j25]Keith W. Miller, David K. Larson:
Angels and artifacts: Moral agents in the age of computers and networks. J. Inf. Commun. Ethics Soc. 3(3): 151-157 (2005) - [j24]Keith W. Miller, David K. Larson:
Agile software development: human values and culture. IEEE Technol. Soc. Mag. 24(4): 36-42 (2005) - 2003
- [j23]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Ethical issues in open source software. J. Inf. Commun. Ethics Soc. 1(4): 193-205 (2003) - [j22]Chuck Huff, Deborah G. Johnson, Keith W. Miller:
Virtual harms and real responsibility. IEEE Technol. Soc. Mag. 22(2): 12-19 (2003) - 2002
- [j21]Deborah G. Johnson, Keith W. Miller:
Is diversity in computing a moral matter? ACM SIGCSE Bull. 34(2): 9-10 (2002) - [c20]Chuck Huff, Deborah G. Johnson, Keith W. Miller:
Virtual harms and virtual responsibility: a rape in cyberspace. ISTAS 2002: 323-330 - [c19]Barbara Moskal, Keith W. Miller, Laurie A. Smith King:
Grading essays in computer ethics: rubrics considered helpful. SIGCSE 2002: 101-105 - [c18]Marty J. Wolf, Kevin W. Bowyer, Donald Gotterbarn, Keith W. Miller:
Open source software: intellectual challenges to the status quo. SIGCSE 2002: 317-318 - 2001
- [j20]Deborah G. Johnson, Keith W. Miller:
The ties that bind: connections, comet cursors, and consent. SIGCAS Comput. Soc. 31(1): 12-16 (2001) - [j19]Keith W. Miller:
Quality Time - A Modest Proposal for Software Testing. IEEE Softw. 18(2): 100-101 (2001) - [c17]Donald Gotterbarn, Keith W. Miller:
Software Engineering Ethics Training in Industry and Academe: Professionalism and the Software Engineering Code of Ethics. CSEE&T 2001: 243-
1990 – 1999
- 1999
- [j18]Donald Gotterbarn, Keith W. Miller, Simon Rogerson:
Software Engineering Code of Ethics is Approved. Commun. ACM 42(10): 102-107 (1999) - [j17]Don Gotterbarn, Keith W. Miller, Simon Rogerson:
On code reuse: a response. ACM SIGSOFT Softw. Eng. Notes 24(3): 4-6 (1999) - 1998
- [j16]Deborah G. Johnson, Keith W. Miller:
Anonymity, pseudonymity, or inescapable identity on the net (abstract). SIGCAS Comput. Soc. 28(2): 37-38 (1998) - [c16]Deborah G. Johnson, Keith W. Miller:
Anonymity, pseudonymity, or inescapable identity on the net (abstract). ACM Policy 1998: 37-38 - [e1]C. Dianne Martin, Ben Shneiderman, Tom Jewett, Keith W. Miller, Marc Rotenberg:
ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings. ACM 1998, ISBN 1-58113-038-4 [contents] - 1997
- [j15]Donald Gotterbarn, Keith W. Miller, Simon Rogerson:
Software Engineering Code of Ethics. Commun. ACM 40(11): 110-118 (1997) - [j14]Jeffrey M. Voas, Frank Charron, Gary McGraw, Keith W. Miller, Michael Friedman:
Predicting How Badly "Good" Software Can Behave. IEEE Softw. 14(4): 73-83 (1997) - [r1]Deborah G. Johnson, Keith W. Miller:
Ethical Issues for Computer Scientists and Engineers. The Computer Science and Engineering Handbook 1997: 16-26 - 1996
- [j13]C. Dianne Martin, Chuck Huff, Donald Gotterbarn, Keith W. Miller:
Implementing A Tenth Strand in the CS Curriculum. Commun. ACM 39(12): 75-84 (1996) - [j12]C. Dianne Martin, Chuck Huff, Donald Gotterbarn, Keith W. Miller:
A framework for implementing and teaching the social and ethical impact of computing. Educ. Inf. Technol. 1(2): 101-122 (1996) - [c15]Dianne Martin, Chuck Huff, Donald Gotterbarn, Keith W. Miller:
Curriculum guidelines for teaching the consequences of computing. CQL 1996: 73-85 - [c14]Jeffrey M. Voas, Keith W. Miller:
The Avalanche Paradigm: An Experimental Software Programming Technique for Improving Fault-tolerance. ECBS 1996: 142-147 - [c13]Jeffrey M. Voas, Frank Charron, Keith W. Miller:
Investigating rare-event failure tolerance: reductions in future uncertainty. HASE 1996: 78-85 - [c12]Jeffrey M. Voas, Frank Charron, Keith W. Miller:
Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them? SAFECOMP 1996: 126-135 - 1995
- [j11]Jeffrey M. Voas, Keith W. Miller:
Software Testability: The New Verification. IEEE Softw. 12(3): 17-28 (1995) - [c11]Jeffrey M. Voas, Keith W. Miller:
Predicting software's minimum-time-to-hazard and mean-time-to-hazard for rare input events. ISSRE 1995: 229-238 - [c10]Jeffrey M. Voas, Keith W. Miller:
An Automated Code-Based Fault-Tree Mitigation Technique. SAFECOMP 1995: 59-72 - 1994
- [j10]W. Robert Collins, Keith W. Miller, Bethany J. Spielman, Phillip Wherry:
How Good Is Good Enough? Commun. ACM 37(1): 81-91 (1994) - [c9]Jeffrey M. Voas, Keith W. Miller:
Putting assertions in their place. ISSRE 1994: 152-157 - 1993
- [j9]Jeffrey M. Voas, Jeffery E. Payne, Keith W. Miller:
Designing programs that are less likely to hide faults. J. Syst. Softw. 20(1): 93-100 (1993) - [j8]Jeffrey M. Voas, Keith W. Miller:
Semantic metrics for software testability. J. Syst. Softw. 20(3): 207-216 (1993) - [c8]Jeffrey M. Voas, Keith W. Miller, Jeffery E. Payne:
A software analysis technique for quantifying reliability in high-risk medical devices. CBMS 1993: 64-69 - [c7]Jeffrey M. Voas, Christoph C. Michael, Keith W. Miller:
Confidently Assessing a Zero Probability of Software Failure. SAFECOMP 1993: 197-206 - [c6]John C. Burton, Keith W. Miller, Stephen K. Park:
Rectangularly and hexagonally sampled imaging-system-fidelity analysis. Visual Information Processing 1993: 81-92 - 1992
- [j7]W. Robert Collins, Keith W. Miller:
Paramedic ethics for computer professionals. J. Syst. Softw. 17(1): 23-38 (1992) - [j6]Jeffrey M. Voas, Keith W. Miller:
The Revealing Power of a Test Case. Softw. Test. Verification Reliab. 2(1): 25-42 (1992) - [j5]Keith W. Miller, Larry J. Morell, Robert E. Noonan, Stephen K. Park, David M. Nicol, Branson W. Murrill, Jeffrey M. Voas:
Estimating the Probability of Failure When Testing Reveals No Failures. IEEE Trans. Software Eng. 18(1): 33-43 (1992) - [c5]Thomas Wood, Keith W. Miller, Robert E. Noonan:
Local exhaustive testing: a software reliability tool. ACM Southeast Regional Conference 1992: 77-84 - [c4]Jeffrey M. Voas, Keith W. Miller:
Improving the software development process using testability research. ISSRE 1992: 114-121 - [p1]Stephen K. Park, Keith W. Miller, Stephen Harvey, Rex K. Kincaid:
Alternate Server disciplines for Mobile-Servers on a Congested Network. Computer Science and Operations Research 1992: 105-116 - 1991
- [j4]Jeffrey M. Voas, Larry J. Morell, Keith W. Miller:
Predicting Where Faults Can Hide from Testing. IEEE Softw. 8(2): 41-48 (1991) - 1990
- [c3]Donald Gotterbarn, Deborah G. Johnson, Keith W. Miller, Eugene H. Spafford:
Methods of integrating the study of ethics into the computer science curriculum (panel session). SIGCSE 1990: 268
1980 – 1989
- 1988
- [j3]Stephen K. Park, Keith W. Miller:
Random Number Generators: Good Ones Are Hard to Find. Commun. ACM 31(10): 1192-1201 (1988) - [j2]Keith W. Miller, Larry J. Morell, Fred Stevens:
Adding Data Abstraction to Fortran Software. IEEE Softw. 5(6): 50-58 (1988) - [c2]Keith W. Miller, Larry J. Morell, W. Robert Collins:
Maintaining FORTRAN software by enforcing abstract data types. ICSM 1988: 286-291 - [c1]Keith W. Miller, David M. Nicol:
Implementation parallelized queueing network simulations using FORTRAN and data abstraction. WSC 1988: 333-338 - 1985
- [j1]Ray Ford, Keith W. Miller:
Abstract Data Type Development and Implementation: An Example. IEEE Trans. Software Eng. 11(10): 1033-1037 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint