1Abelson, H, Sussman, GJ, Henz, M and Wrigstad, T. 2022. Structure and Interpretation of Computer Programs: JavaScript Edition. Cambridge: The MIT Press.
3Acker, A. 2021. ‘Emulation practices for software preservation in libraries, archives, and museums’. Journal of the Association for Information Science and Technology, 72(9): 1148–60. DOI: 10.1002/asi.24482
5Avižienis, A, Laprie, J-C, Randell, B and Landwehr, C. 2004. ‘Basic concepts and taxonomy of dependable and secure computing’. IEEE Transactions on Dependable and Secure Computing, 1(1): 11–33. DOI: 10.1109/TDSC.2004.2
6Babbage, C. 1824. ‘On the application of machinery to the computation of astronomical and mathematical tables’. The Memoirs of the Astronomical Society of London. Available at: https://gdz.sub.uni-goettingen.de/id/PPN618299726 [Last accessed 28 March 2024].
8Dijkstra, EW. 2022. ‘On the Reliability of Programs’. In: Apt, KR and Hoare, T (eds.) Edsger Wybe Dijkstra: His Life, Work, and Legacy, 359–370. New York, NY, USA: Association for Computing Machinery. DOI: 10.1145/3544585.3544608
9Evnine, SJ. 2019. ‘Mass production’. In: Cumpa, J and Brewer, B (eds.) The Nature of Ordinary Objects, 198–222. Cambridge, UK: Cambridge University Press. DOI: 10.1017/9781316612897.010
13Granström, JG. 2011. Treatise on Intuitionistic Type Theory. Logic, Epistemology, and the Unity of Science 22. Dordrecht: Springer. DOI: 10.1007/978-94-007-1736-7
14Habib, A and Pradel, M. 2018. ‘How many of all bugs do we find? A study of static bug detectors’. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 317–328. San Francisco, CA, USA: IEEE. DOI: 10.1145/3238147.3238213
15Houkes, W, Kroes, P, Meijers, AWM and Vermaas, PE. 2011. ‘Dual-nature and collectivist frameworks for technical artefacts: A constructive comparison’. Studies in History and Philosophy of Science, 42: 198–205. DOI: 10.1016/j.shpsa.2010.11.002
20Kocher, P, Horn, J, Fogh, A, Genkin, D, Gruss, D, Haas, W, Hamburg, M, et al. 2019. ‘Spectre attacks: Exploiting speculative execution’. In 2019 IEEE Symposium on Security and Privacy (SP), 1–19. San Francisco, CA, USA: IEEE. DOI: 10.1109/SP.2019.00002
22Kowarschik, M and Weiß, C. 2003. ‘An overview of cache optimization techniques and cache-aware numerical algorithms’. In: Meyer, J, Sanders, P and Sibeyn, J (eds.) Algorithms for Memory Hierarchies, 2625: 213–32. Lecture Notes in Computer Science. Berlin: Springer. DOI: 10.1007/3-540-36574-5_10
26Menabrea, LF. 1843. ‘Sketch of the analytical engine invented by Charles Babbage, Esq’. Translated from the French by Lovelace, AK. In: Taylor, R (ed.) Scientific memoirs. Vol. 3. London, England: Richard and John E. Taylor, pp. 666–731. Available at: https://repository.ou.edu/uuid/6235e086-c11a-56f6-b50d-1b1f5aaa3f5e [Last accessed: 28 March 2024].
27Monniaux, D. 2008. ‘The pitfalls of verifying floating-point computations’. ACM Transactions on Programming Languages and Systems, 30(1): 12:1–41. DOI: 10.1145/1353445.1353446
30O’Regan, G. 2023. Mathematical Foundations of Software Engineering: A Practical Guide to Essentials. Cham, Switzerland: Springer. DOI: 10.1007/978-3-031-26212-8
33Plotkin, GD. 2004. ‘A structural approach to operational semantics’. The Journal of Logic and Algebraic Programming, 60–61: 17–139. DOI: 10.1016/j.jlap.2004.05.001
34Preston, B. 2009. ‘Philosophical theories of artifact function’. In: Meijers, AWM (ed.), Handbook of Philosophy of Technology and Engineering Sciences. Amsterdam: North-Holland, pp. 213–233. DOI: 10.1016/B978-0-444-51667-1.50013-6
39Thorsteinsson, E. 2007. About the boot.ini issue, EVE Online. Available at: https://www.eveonline.com/news/view/about-the-boot.ini-issue [Last accessed: 20 November 2023].
40Wong, JE, Gao, R, Li, Y, Abreu, R and Wotawa, F. 2016. ‘A survey of software fault localization’. IEEE Transactions on Software Engineering, 42: 707–740. DOI: 10.1109/TSE.2016.2521368