Have a personal or library account? Click to login
Can’t Software Malfunction? Cover

Can’t Software Malfunction?

By: Jeroen de HaasORCID and  Wybo HoukesORCID  
Open Access
|Jan 2025

References

  1. 1Abelson, H, Sussman, GJ, Henz, M and Wrigstad, T. 2022. Structure and Interpretation of Computer Programs: JavaScript Edition. Cambridge: The MIT Press.
  2. 2Abelson, H, Sussman, GJ and Sussman, J. 1996. Structure and Interpretation of Computer Programs. 2nd ed. Cambridge: The MIT Press.
  3. 3Acker, A. 2021. ‘Emulation practices for software preservation in libraries, archives, and museums’. Journal of the Association for Information Science and Technology, 72(9): 114860. DOI: 10.1002/asi.24482
  4. 4Apple Inc. 2020. WWDC 2020 Special event keynote. Available at: https://www.youtube.com/watch?v=GEZhD3J89ZE [Last accessed: 11 March 2024].
  5. 5Avižienis, A, Laprie, J-C, Randell, B and Landwehr, C. 2004. ‘Basic concepts and taxonomy of dependable and secure computing’. IEEE Transactions on Dependable and Secure Computing, 1(1): 1133. DOI: 10.1109/TDSC.2004.2
  6. 6Babbage, C. 1824. ‘On the application of machinery to the computation of astronomical and mathematical tables’. The Memoirs of the Astronomical Society of London. Available at: https://gdz.sub.uni-goettingen.de/id/PPN618299726 [Last accessed 28 March 2024].
  7. 7Curtis-Trudel, A. 2023. ‘Primiero on physical computation’. Global Philosophy, 33(1): 2, s10516-023-09661–67. DOI: 10.1007/s10516-023-09661-7
  8. 8Dijkstra, EW. 2022. ‘On the Reliability of Programs’. In: Apt, KR and Hoare, T (eds.) Edsger Wybe Dijkstra: His Life, Work, and Legacy, 359370. New York, NY, USA: Association for Computing Machinery. DOI: 10.1145/3544585.3544608
  9. 9Evnine, SJ. 2019. ‘Mass production’. In: Cumpa, J and Brewer, B (eds.) The Nature of Ordinary Objects, 198222. Cambridge, UK: Cambridge University Press. DOI: 10.1017/9781316612897.010
  10. 10Floridi, L, Fresco, N and Primiero, G. 2015. ‘On malfunctioning software’. Synthese, 192: 11991220. DOI: 10.1007/s11229-014-0610-3
  11. 11Franssen, M. 2006. ‘The normativity of artefacts’. Studies in History and Philosophy of Science Part A, 37: 4257. DOI: 10.1016/j.shpsa.2005.12.006
  12. 12Fresco, N and Primiero, G. 2013. ‘Miscomputation’. Philosophy and Technology, 26: 253277. DOI: 10.1007/s13347-013-0112-0
  13. 13Granström, JG. 2011. Treatise on Intuitionistic Type Theory. Logic, Epistemology, and the Unity of Science 22. Dordrecht: Springer. DOI: 10.1007/978-94-007-1736-7
  14. 14Habib, A and Pradel, M. 2018. ‘How many of all bugs do we find? A study of static bug detectors’. Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 317328. San Francisco, CA, USA: IEEE. DOI: 10.1145/3238147.3238213
  15. 15Houkes, W, Kroes, P, Meijers, AWM and Vermaas, PE. 2011. ‘Dual-nature and collectivist frameworks for technical artefacts: A constructive comparison’. Studies in History and Philosophy of Science, 42: 198205. DOI: 10.1016/j.shpsa.2010.11.002
  16. 16Houkes, W and Vermaas, PE. 2010. Technical Functions. Dordrecht: Springer. DOI: 10.1007/978-90-481-3900-2
  17. 17Hughes, J. 2009. ‘An artifact is to use: An introduction to instrumental functions’. Synthese, 168: 179199. DOI: 10.1007/s11229-008-9335-5
  18. 18Irmak, N. 2012. ‘Software is an abstract artifact’. Grazer Philosophische Studien, 86: 5572. DOI: 10.1163/9789401209182_005
  19. 19Juvshik, T. 2021. ‘Function essentialism about artifacts’. Philosophical Studies, 178: 29432964. DOI: 10.1007/s11098-020-01594-w
  20. 20Kocher, P, Horn, J, Fogh, A, Genkin, D, Gruss, D, Haas, W, Hamburg, M, et al. 2019. ‘Spectre attacks: Exploiting speculative execution’. In 2019 IEEE Symposium on Security and Privacy (SP), 119. San Francisco, CA, USA: IEEE. DOI: 10.1109/SP.2019.00002
  21. 21Koslicki, K. 2018. Form, Matter, Substance. Oxford: Oxford University Press. DOI: 10.1093/oso/9780198823803.001.0001
  22. 22Kowarschik, M and Weiß, C. 2003. ‘An overview of cache optimization techniques and cache-aware numerical algorithms’. In: Meyer, J, Sanders, P and Sibeyn, J (eds.) Algorithms for Memory Hierarchies, 2625: 21332. Lecture Notes in Computer Science. Berlin: Springer. DOI: 10.1007/3-540-36574-5_10
  23. 23Kozierok, CM. 2005. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. San Francisco: No Starch Press.
  24. 24Kroes, P. 2012. Technical Artefacts: Creations of Mind and Matter. Dordrecht: Springer. DOI: 10.1007/978-94-007-3940-6
  25. 25Levinson, J. 1980. ‘What a musical work is’. The Journal of Philosophy, 77: 528. DOI: 10.2307/2025596
  26. 26Menabrea, LF. 1843. ‘Sketch of the analytical engine invented by Charles Babbage, Esq’. Translated from the French by Lovelace, AK. In: Taylor, R (ed.) Scientific memoirs. Vol. 3. London, England: Richard and John E. Taylor, pp. 666731. Available at: https://repository.ou.edu/uuid/6235e086-c11a-56f6-b50d-1b1f5aaa3f5e [Last accessed: 28 March 2024].
  27. 27Monniaux, D. 2008. ‘The pitfalls of verifying floating-point computations’. ACM Transactions on Programming Languages and Systems, 30(1): 12:141. DOI: 10.1145/1353445.1353446
  28. 28Moor, JH. 1978. ‘Three myths of computer science’. The British Journal for the Philosophy of Science, 29: 213222. DOI: 10.1093/bjps/29.3.213
  29. 29National Security Agency. 2022. Software Memory Safety. Cybersecurity Information Sheet U/OO/219936-22. Available at: https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF [Last accessed: 8 March 2023].
  30. 30O’Regan, G. 2023. Mathematical Foundations of Software Engineering: A Practical Guide to Essentials. Cham, Switzerland: Springer. DOI: 10.1007/978-3-031-26212-8
  31. 31Paek, C. 2023. ‘Making things collectively: The problems of mass production and collective production’. Metaphysics, 6(1): 112. DOI: 10.5334/met.91
  32. 32Pearson, S, Campos, J, Just, R, Fraser, G, Abreu, R, Ernst, MD, et al. 2017. ‘Evaluating and improving fault localization’. In: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), pp. 609620. DOI: 10.1109/ICSE.2017.62
  33. 33Plotkin, GD. 2004. ‘A structural approach to operational semantics’. The Journal of Logic and Algebraic Programming, 60–61: 17139. DOI: 10.1016/j.jlap.2004.05.001
  34. 34Preston, B. 2009. ‘Philosophical theories of artifact function’. In: Meijers, AWM (ed.), Handbook of Philosophy of Technology and Engineering Sciences. Amsterdam: North-Holland, pp. 213233. DOI: 10.1016/B978-0-444-51667-1.50013-6
  35. 35Rapaport, WJ. 2005. ‘Implementation is semantic interpretation: Further thoughts’. Journal of Experimental & Theoretical Artificial Intelligence, 17: 385417. DOI: 10.1080/09528130500283998
  36. 36Silberschatz, A, Galvin, PB and Gagne, G. 2011. Operating System Concepts. 8th ed. Wiley.
  37. 37Stroustrup, B. 2024. Programming: principles and practices using C++. 3rd ed. Addison-Wesley.
  38. 38Thomasson, AL. 2003. ‘Realism and human kinds’. Philosophy and Phenomenological Research, 67: 580609. DOI: 10.1111/j.1933-1592.2003.tb00309.x
  39. 39Thorsteinsson, E. 2007. About the boot.ini issue, EVE Online. Available at: https://www.eveonline.com/news/view/about-the-boot.ini-issue [Last accessed: 20 November 2023].
  40. 40Wong, JE, Gao, R, Li, Y, Abreu, R and Wotawa, F. 2016. ‘A survey of software fault localization’. IEEE Transactions on Software Engineering, 42: 707740. DOI: 10.1109/TSE.2016.2521368
DOI: https://doi.org/10.5334/met.165 | Journal eISSN: 2515-8279
Language: English
Submitted on: Mar 29, 2024
Accepted on: Nov 22, 2024
Published on: Jan 3, 2025
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2025 Jeroen de Haas, Wybo Houkes, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.