{"id":"https://openalex.org/W2064125159","doi":"https://doi.org/10.1002/smr.4360010103","title":"Uncertainty in computer application and its control through the engineering of software","display_name":"Uncertainty in computer application and its control through the engineering of software","publication_year":1989,"publication_date":"1989-09-01","ids":{"openalex":"https://openalex.org/W2064125159","doi":"https://doi.org/10.1002/smr.4360010103","mag":"2064125159"},"language":"en","primary_location":{"id":"doi:10.1002/smr.4360010103","is_oa":false,"landing_page_url":"https://doi.org/10.1002/smr.4360010103","pdf_url":null,"source":{"id":"https://openalex.org/S4210205480","display_name":"Journal of Software Maintenance Research and Practice","issn_l":"1040-550X","issn":["1040-550X","1096-908X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software Maintenance: Research and Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110846236","display_name":"M. M. Lehman","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"M. M. Lehman","raw_affiliation_strings":["Lehman Software Technology Associates Ltd and Department of Computing, Imperial College of Science and Technology, London SW7 2BZ, U.K","Imperial College of Science & Technology, London UK"],"affiliations":[{"raw_affiliation_string":"Lehman Software Technology Associates Ltd and Department of Computing, Imperial College of Science and Technology, London SW7 2BZ, U.K","institution_ids":[]},{"raw_affiliation_string":"Imperial College of Science & Technology, London UK","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5110846236"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":7.991,"has_fulltext":false,"cited_by_count":79,"citation_normalized_percentile":{"value":0.97284704,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"1","issue":"1","first_page":"3","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.714472770690918},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.595149040222168},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5842558741569519},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5321456789970398},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.5161653161048889},{"id":"https://openalex.org/keywords/social-software-engineering","display_name":"Social software engineering","score":0.46126702427864075},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44373247027397156},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.43256425857543945},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.41037458181381226},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.33766281604766846},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.19372689723968506}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.714472770690918},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.595149040222168},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5842558741569519},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5321456789970398},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.5161653161048889},{"id":"https://openalex.org/C182500959","wikidata":"https://www.wikidata.org/wiki/Q7551380","display_name":"Social software engineering","level":5,"score":0.46126702427864075},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44373247027397156},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.43256425857543945},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.41037458181381226},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.33766281604766846},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.19372689723968506},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/smr.4360010103","is_oa":false,"landing_page_url":"https://doi.org/10.1002/smr.4360010103","pdf_url":null,"source":{"id":"https://openalex.org/S4210205480","display_name":"Journal of Software Maintenance Research and Practice","issn_l":"1040-550X","issn":["1040-550X","1096-908X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software Maintenance: Research and Practice","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W34959174","https://openalex.org/W47873199","https://openalex.org/W53166435","https://openalex.org/W64286206","https://openalex.org/W98733118","https://openalex.org/W118803003","https://openalex.org/W173355954","https://openalex.org/W179777710","https://openalex.org/W192529078","https://openalex.org/W273183640","https://openalex.org/W1503942936","https://openalex.org/W1523410483","https://openalex.org/W1570315478","https://openalex.org/W1588879371","https://openalex.org/W1705210632","https://openalex.org/W1985236007","https://openalex.org/W1986813234","https://openalex.org/W2005973420","https://openalex.org/W2012026567","https://openalex.org/W2045749853","https://openalex.org/W2078250023","https://openalex.org/W2091579301","https://openalex.org/W2095958260","https://openalex.org/W2111706174","https://openalex.org/W2114804254","https://openalex.org/W2124209077","https://openalex.org/W2143232930","https://openalex.org/W2987907651","https://openalex.org/W3026200727","https://openalex.org/W3146075203","https://openalex.org/W4230308159","https://openalex.org/W4242257571","https://openalex.org/W4256369010"],"related_works":["https://openalex.org/W246089850","https://openalex.org/W2520111506","https://openalex.org/W4312927049","https://openalex.org/W2757929269","https://openalex.org/W39186842","https://openalex.org/W2183585111","https://openalex.org/W2032832792","https://openalex.org/W2167467693","https://openalex.org/W2371269538","https://openalex.org/W4382053383"],"abstract_inverted_index":{"Abstract":[0],"Computers":[1],"are":[2,93,116,332],"being":[3],"applied":[4],"more":[5,7,37,109],"and":[6,34,41,68,95,127,145,151,172,176,192,248,256,288,290,295,317,328,347,353,359,362,367,380,383,406],"broadly":[8],"to":[9,84,100,134,188,197,211,222,265,344,404],"address":[10],"applications":[11,225,364],"in":[12,98,161,202,220,226,398],"all":[13,223],"areas":[14],"of":[15,25,45,64,89,106,114,142,146,170,173,213,216,260,279,305,308,323,355,365,371,374,381],"human":[16],"activity,":[17],"penetrating":[18],"ever":[19,36],"deeper":[20],"into":[21,409],"the":[22,43,51,56,65,69,87,101,104,112,140,147,227,234,251,285,306,309,321,339,351,360,392],"very":[23],"fabric":[24],"society.":[26],"As":[27],"a":[28,61,78,122,162,194,203,214,240,266,269,274,302,324],"consequence,":[29],"mankind":[30],"is":[31,77,125,156,187,196,239,336,388],"becoming,":[32],"collectively":[33],"individually,":[35],"dependent":[38],"on":[39,42,311],"software":[40,53,58,171,174,325,377],"integrity":[44,186],"that":[46,59,71,82,124,149,180,218,236,319,341,396],"software.":[47],"In":[48],"this":[49,155,261,400,414],"context":[50],"term":[52],"includes":[54],"both":[55],"systems":[57,148],"constitutes":[60],"fundamental":[62,178],"part":[63],"operational":[66,206,283],"configuration":[67],"programs":[70,90],"implement":[72],"each":[73,280],"individual":[74],"application.":[75],"Integrity":[76],"many":[79,243],"faceted":[80],"concept":[81],"has":[83],"do":[85,135],"with":[86,273,301],"availability":[88],"whenever":[91,137],"they":[92],"needed":[94],"their":[96],"correctness":[97],"relation":[99],"circumstances":[102],"at":[103],"moment":[105],"execution":[107],"or,":[108],"precisely,":[110],"when":[111,129],"results":[113],"computation":[115],"applied.":[117],"A":[118],"program":[119,185,195,238],"must":[120,132,181],"produce":[121],"solution":[123],"correct":[126],"relevant":[128,312],"used.":[130],"It":[131],"continue":[133],"so":[136],"required":[138,157],"over":[139],"lifetime":[141],"an":[143],"application":[144,294],"realize":[150],"support":[152,385],"it.":[153],"All":[154],"despite":[158],"continuing":[159],"change":[160],"dynamic":[163],"world.":[164,229],"This":[165,298],"paper":[166,299,393],"discusses":[167],"some":[168],"properties":[169],"technology":[175,271,331,403],"identifies":[177],"issues":[179,395],"be":[182,189,198,416],"addressed":[183],"if":[184,193],"achieved":[190],"initially,":[191],"maintained":[199],"as":[200,338],"satisfactory":[201],"continuously":[204],"changing":[205],"environment.":[207],"The":[208,230,258,369],"discussion":[209],"leads":[210],"formulation":[212],"\u2018Principle":[215],"Uncertainty\u2019":[217],"applies,":[219],"general,":[221],"computer":[224,375],"real":[228,252],"principle":[231],"follows":[232],"from":[233,250],"fact":[235,263],"any":[237],"model,":[241],"albeit":[242],"times":[244],"removed":[245],"by":[246],"abstraction":[247],"reification":[249],"world":[253],"it":[254,408],"reflects":[255],"addresses.":[257],"consequences":[259,349],"basic":[262],"lead":[264],"need":[267],"for":[268,277,291],"disciplined":[270,363],"associated":[272],"controlled":[275],"process":[276],"definition":[278],"application,":[281],"its":[282,292,329,348],"domain,":[284],"envisaged":[286],"system":[287],"software,":[289],"development,":[293],"evolution":[296],"(maintenance).":[297],"concludes":[300],"brief":[303],"mention":[304],"implications":[307],"analysis":[310],"technological":[313],"issues.":[314],"Fundamental":[315],"concepts":[316],"observations":[318],"underlie":[320],"development":[322,357],"engineering":[326,335,378],"discipline":[327,340],"supporting":[330],"introduced.":[333],"Software":[334],"seen":[337],"permits":[342],"one":[343],"limit":[345],"uncertainty":[346],"through":[350],"introduction":[352],"control":[354],"appropriate":[356],"processes":[358],"systematic":[361],"methods":[366],"tools.":[368],"emergence":[370],"such":[372],"tools,":[373],"assisted":[376],"(CASE)":[379],"programming":[382],"project":[384],"environments":[386],"(IPSEs)":[387],"briefly":[389,412],"discussed.":[390],"Finally":[391],"addresses":[394],"arise":[397],"transferring":[399],"still":[401],"developing":[402],"industry":[405],"introducing":[407],"practice,":[410],"outlining":[411],"how":[413],"may":[415],"approached.":[417]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
