publication venue for
- Excessive use of technology. 64:42-44. 2021
- Toward model-driven sustainability evaluation. 63:80-91. 2020
- A case against mission-critical applications of machine learning. 62:9-9. 2019
- Potential 'dark sides' of leisure technology use in youth. 62:24-27. 2019
- An interview with Dave Parnas. 61:25-27. 2018
- Toward an equation that anticipates AI risks. 61:8-9. 2018
- The real risks of artificial intelligence. 60:27-31. 2017
- Abolish software warranty disclaimers. 58:8-9. 2015
- On the significance of Turing's test. 57:8-9. 2014
- Why computer talents become computer hackers. 56:64-74. 2013
- When predicting, start with humility. 55:8-9. 2012
- Large-scale complex IT systems. 55:71-71. 2012
- Large-scale complex IT systems. 55:71-77. 2012
- An n -gram analysis of Communications 2000--2010. 55:81-87. 2012
- Does deterrence work in reducing information security policy abuse by employees?. 54:54-60. 2011
- The risks of stopping too soon. 54:31-33. 2011
- Risks of undisciplined development. 53:25-27. 2010
- Is mobile email addiction overlooked?. 53:41-43. 2010
- Stop the numbers game. 50:19-21. 2007
- Which is riskier. 50:112-112. 2007
- Forum. 50:7-9. 2007
- Perceived health risks of 3G cell phones. 50:89-92. 2007
- How they manage IT. 49:109-112. 2006
- Authors respond [9]. 49:13. 2006
- Proof depends on evidence[5]. 49:12. 2006
- Wikipedia risks. 48:152-152. 2005
- Health care and services delivery systems as complex adaptive systems. 48:36-44. 2005
- The state of user-centered design practice. 48:105-109. 2005
- Intelligent Mobile Crisis Response Systems. 48:95-98. 2005
- Health care and services delivery systems as complex adaptive systems. Examining chaos theory in action. 48:37-44. 2005
- Strategic IT applications in health care. 45:56-61. 2002
- A Java 3d-enabled cyber workspace. 45:45-49. 2002
- Introduction. 45:25-26. 2002
- Licensing software engineers in Canada. 45:96-98. 2002
- Inside risks: computers. 44:168-168. 2001
- Increasing ease of use. 42:67-71. 1999
- Inside risks: ten myths about Y2K inspections. 42:128-128. 1999
- Software engineering. 40:128-128. 1997
- Evaluation of safety-critical software. 33:636-648. 1990
- Six-digit coding method. 33:491-494. 1990
- DEBATABLE. 33:266-267. 1990
- A Chinese-English microcomputer system. 31:977-982. 1988
- On synchronization in hard-real-time systems. 31:274-287. 1988
- Program style analysis: a natural by-product of program compilation. 29:126-133. 1986
- Software aspects of strategic defense systems. 28:1326-1335. 1985
- Technical correspondence. 28:534-538. 1985
- A generalized control structure and its formal definition. 26:572-581. 1983
- A technique for software module specification with examples. 26:75-78. 1983
- Use of the concept of transparency in the design of hierarchically structured systems. 18:401-408. 1975
- Significant event simulation. 18:323-329. 1975
- On a solution to the cigarette smoker's problem (without conditional statements). 18:181-183. 1975
- On the criteria to be used in decomposing systems into modules. 15:1053-1058. 1972
- Comment on deadlock preventive method. 15:840-841. 1972
- A technique for software module specification with examples. 15:330-336. 1972
- Concurrent control with “readers” and “writers”. 14:667-668. 1971
- On simulating networks of parallel processes in which simultaneous events may occur. 12:519-531. 1969
- Letters to the editor: on improving the quality of our technical meetings. 11:537-538. 1968
- State table analysis of programs in an ALGOL-like language. 9:481-481. 1966
- On facilitating parallel and multiprocessing in ALGOL. 9:257-257. 1966
- On the preliminary report of C 3 S. 9:242-243. 1966
- A language for describing the functions of synchronous systems. 9:72-76. 1966