Downloads & Free Reading Options - Results

Software Verification And Validation by Dolores R. Wallace

Read "Software Verification And Validation" by Dolores R. Wallace through these free online access and download options.

Search for Downloads

Search by Title or Author

Books Results

Source: The Internet Archive

The internet Archive Search Results

Available books for downloads and borrow from The internet Archive

1DTIC ADA543771: Using Statechart Assertion For The Formal Validation And Verification Of A Real-Time Software System: A Case Study

By

Verification and validation (V&V) is one of the software engineering disciplines that helps build quality into software. V&V comprehensively analyzes and tests software to determine that it performs its intended functions correctly, and ensures that it does not perform unintended functions. However, V&V traditionally relies on manual examination of software requirements, design artifacts and the systematic or random testing of target code. As software-intensive systems become increasingly complex, traditional V&V techniques are inadequate for locating subtle errors in the software. It is even more challenging to test embedded real-time systems characterized by temporal behavior. For the past several decades, academia has actively researched the use of formal methods that help improve the quality of the software. Nonetheless, the techniques developed using formal methods still are not widely accepted in industry and in government. Professor Doron Drusinsky from Naval Postgraduate School (NPS) has developed a novel lightweight formal specification, validation and verification technique. The technique is focused on modeling reactive real-time systems with UML-based formal specifications and log file based Runtime Verification (RV). This thesis presents a case study as a proof of concept in support of this V&V technique, applied on a complex, already developed and fielded mission-critical system. It has successfully demonstrated a pragmatic approach in achieving a high quality V&V testing.

“DTIC ADA543771: Using Statechart Assertion For The Formal Validation And Verification Of A Real-Time Software System: A Case Study” Metadata:

  • Title: ➤  DTIC ADA543771: Using Statechart Assertion For The Formal Validation And Verification Of A Real-Time Software System: A Case Study
  • Author: ➤  
  • Language: English

“DTIC ADA543771: Using Statechart Assertion For The Formal Validation And Verification Of A Real-Time Software System: A Case Study” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 35.26 Mbs, the file-s for this book were downloaded 73 times, the file-s went public at Tue Aug 14 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA543771: Using Statechart Assertion For The Formal Validation And Verification Of A Real-Time Software System: A Case Study at online marketplaces:


2TSV 3561 - Software Verification And Validation

By

Tri 2 2015/2016

“TSV 3561 - Software Verification And Validation” Metadata:

  • Title: ➤  TSV 3561 - Software Verification And Validation
  • Author: ➤  
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1.68 Mbs, the file-s for this book were downloaded 9 times, the file-s went public at Sun May 05 2024.

Available formats:
Additional Text PDF - Archive BitTorrent - DjVuTXT - Djvu XML - Image Container PDF - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - chOCR - hOCR -

Related Links:

Online Marketplaces

Find TSV 3561 - Software Verification And Validation at online marketplaces:


3NASA Technical Reports Server (NTRS) 19880003112: Digital-flight-control-system Software Written In Automated-engineering-design Language: A User's Guide Of Verification And Validation Tools

By

The user guide of verification and validation (V&V) tools for the Automated Engineering Design (AED) language is specifically written to update the information found in several documents pertaining to the automated verification of flight software tools. The intent is to provide, in one document, all the information necessary to adequately prepare a run to use the AED V&V tools. No attempt is made to discuss the FORTRAN V&V tools since they were not updated and are not currently active. Additionally, the current descriptions of the AED V&V tools are contained and provides information to augment the NASA TM 84276. The AED V&V tools are accessed from the digital flight control systems verification laboratory (DFCSVL) via a PDP-11/60 digital computer. The AED V&V tool interface handlers on the PDP-11/60 generate a Univac run stream which is transmitted to the Univac via a Remote Job Entry (RJE) link. Job execution takes place on the Univac 1100 and the job output is transmitted back to the DFCSVL and stored as a PDP-11/60 printfile.

“NASA Technical Reports Server (NTRS) 19880003112: Digital-flight-control-system Software Written In Automated-engineering-design Language: A User's Guide Of Verification And Validation Tools” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 19880003112: Digital-flight-control-system Software Written In Automated-engineering-design Language: A User's Guide Of Verification And Validation Tools
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 19880003112: Digital-flight-control-system Software Written In Automated-engineering-design Language: A User's Guide Of Verification And Validation Tools” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 67.97 Mbs, the file-s for this book were downloaded 96 times, the file-s went public at Tue Sep 20 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 19880003112: Digital-flight-control-system Software Written In Automated-engineering-design Language: A User's Guide Of Verification And Validation Tools at online marketplaces:


4Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software

By

To achieve its science objectives in deep space exploration, NASA has a need for science platform vehicles to autonomously make control decisions in a time frame that excludes intervention from Earth-based controllers. Round-trip light-time is one significant factor motivating autonomy capability, another factor is the need to reduce ground support operations cost. An unsolved problem potentially impeding the adoption of autonomy capability is the verification and validation of such software systems, which exhibit far more behaviors (and hence distinct execution paths in the software) than is typical in current deepspace platforms. Hence the need for a study to benchmark advanced Verification and Validation (V&V) tools on representative autonomy software. The objective of the study was to access the maturity of different technologies, to provide data indicative of potential synergies between them, and to identify gaps in the technologies with respect to the challenge of autonomy V&V. The study consisted of two parts: first, a set of relatively independent case studies of different tools on the same autonomy code, second a carefully controlled experiment with human participants on a subset of these technologies. This paper describes the second part of the study. Overall, nearly four hundred hours of data on human use of three different advanced V&V tools were accumulated, with a control group that used conventional testing methods. The experiment simulated four independent V&V teams debugging three successive versions of an executive controller for a Martian Rover. Defects were carefully seeded into the three versions based on a profile of defects from CVS logs that occurred in the actual development of the executive controller. The rest of the document is structured a s follows. In section 2 and 3, we respectively describe the tools used in the study and the rover software that was analyzed. In section 4 the methodology for the experiment is described; this includes the code preparation, seeding of defects, participant training and experimental setup. Next we give a qualitative overview of how the experiment went from the point of view of each technology; model checking (section 5), static analysis (section 6), runtime analysis (section 7) and testing (section 8). The find section gives some preliminary quantitative results on how the tools compared.

“Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software” Metadata:

  • Title: ➤  Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software
  • Authors: ➤  
  • Language: English

“Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 3.83 Mbs, the file-s for this book were downloaded 368 times, the file-s went public at Thu Jun 02 2011.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software at online marketplaces:


5DTIC ADA462428: Software Independent Verification And Validation (SIV&V) Simplified

By

SIV&V has been in existence for some 40 years, and many people still know little about its existence. Software IV&V certifies the quality of the software and independently validates and verifies that it meets or exceeds the customer's expectations. Independent V&V for component or element software development activities encompasses the following: (1) review and thorough evaluations of the software development, (2) review and comment on software documentation, (3) participation in all software requirements and design reviews, and (4) participation in software integration and testing for each software build. This thesis will explore and explain the benefits and rationale for Software Independent Verification and Validation. It will identify SIV&V processes that are used to support acquisition weapon systems. SIV&V Simplified will translate, into understandable terms, why SIV&V is considered Cheap Insurance and why it is needed. Additionally, this thesis serves as a tutorial, providing suggested policy and guidance, suggested software Computer-Aided Software Engineering (CASE) tools, criteria, and lessons learned for implementing a successful SIV&V program.

“DTIC ADA462428: Software Independent Verification And Validation (SIV&V) Simplified” Metadata:

  • Title: ➤  DTIC ADA462428: Software Independent Verification And Validation (SIV&V) Simplified
  • Author: ➤  
  • Language: English

“DTIC ADA462428: Software Independent Verification And Validation (SIV&V) Simplified” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 52.75 Mbs, the file-s for this book were downloaded 59 times, the file-s went public at Sat Jun 09 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA462428: Software Independent Verification And Validation (SIV&V) Simplified at online marketplaces:


6DTIC ADA385658: Validation And Verification Of Formal Specifications In Object-Oriented Software Engineering

By

The use of formal specifications allows for a software system to be defined with stringent mathematical semantics and syntax via such tools as propositional calculus and set theory. There are many perceived benefits garnered from formal specifications, such as a thorough and in-depth understanding of the domain and system being specified and a reduction in user requirement ambiguity. Probably the greatest benefit of formal specifications, and that which is least capitalized upon, is that mathematical proof procedures can be used to test and prove internal consistency and syntactic correctness in an effort to ensure comprehensive validation and verification (V

“DTIC ADA385658: Validation And Verification Of Formal Specifications In Object-Oriented Software Engineering” Metadata:

  • Title: ➤  DTIC ADA385658: Validation And Verification Of Formal Specifications In Object-Oriented Software Engineering
  • Author: ➤  
  • Language: English

“DTIC ADA385658: Validation And Verification Of Formal Specifications In Object-Oriented Software Engineering” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 168.34 Mbs, the file-s for this book were downloaded 107 times, the file-s went public at Mon Apr 30 2018.

Available formats:
Abbyy GZ - Additional Text PDF - Archive BitTorrent - DjVuTXT - Djvu XML - Image Container PDF - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA385658: Validation And Verification Of Formal Specifications In Object-Oriented Software Engineering at online marketplaces:


7NASA Technical Reports Server (NTRS) 19980019507: A Framework For Performing Verification And Validation In Reuse Based Software Engineering

By

Verification and Validation (V&V) is currently performed during application development for many systems, especially safety-critical and mission- critical systems. The V&V process is intended to discover errors, especially errors related to critical processing, as early as possible during the development process. The system application provides the context under which the software artifacts are validated. This paper describes a framework that extends V&V from an individual application system to a product line of systems that are developed within an architecture-based software engineering environment. This framework includes the activities of traditional application-level V&V, and extends these activities into domain engineering and into the transition between domain engineering and application engineering. The framework includes descriptions of the types of activities to be performed during each of the life-cycle phases, and provides motivation for the activities.

“NASA Technical Reports Server (NTRS) 19980019507: A Framework For Performing Verification And Validation In Reuse Based Software Engineering” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 19980019507: A Framework For Performing Verification And Validation In Reuse Based Software Engineering
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 19980019507: A Framework For Performing Verification And Validation In Reuse Based Software Engineering” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 20.09 Mbs, the file-s for this book were downloaded 70 times, the file-s went public at Fri Oct 14 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 19980019507: A Framework For Performing Verification And Validation In Reuse Based Software Engineering at online marketplaces:


8DTIC ADA355670: Planning For Software Validation, Verification, And Testing

By

Today, providing computer software involves greater cost and risk than providing computer equipment. One major reason is hardware is mass produced by proven technology, while software is still produced primarily by the craft of individual computer programmers. The document is for those who direct and those who implement computer projects; it explains the selection and use of validation, verification, and testing (V,V&T) tools and techniques for software development. A primary benefit of practicing V,V&T is increasing confidence in the quality of the software. The document explains how to develop a plan to meet specific software V,V&T goals.

“DTIC ADA355670: Planning For Software Validation, Verification, And Testing” Metadata:

  • Title: ➤  DTIC ADA355670: Planning For Software Validation, Verification, And Testing
  • Author: ➤  
  • Language: English

“DTIC ADA355670: Planning For Software Validation, Verification, And Testing” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 117.21 Mbs, the file-s for this book were downloaded 61 times, the file-s went public at Fri Apr 20 2018.

Available formats:
Abbyy GZ - Additional Text PDF - Archive BitTorrent - DjVuTXT - Djvu XML - Image Container PDF - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA355670: Planning For Software Validation, Verification, And Testing at online marketplaces:


9ERIC EJ1135271: The Design And Evaluation Of Class Exercises As Active Learning Tools In Software Verification And Validation

By

It is well known that interesting questions can stimulate thinking and invite participation. Class exercises are designed to make use of questions to engage students in active learning. In a project toward building a community skilled in software verification and validation (SV&V), we critically review and further develop course materials in the software engineering curriculum for an undergraduate course in SV&V. The project involves the joint effort with many other academic institutions and industry partners. There are four topic areas of Software Engineering in our focus: Requirements Engineering, Software Review, Configuration Management, and Testing. We see class exercises as active learning tools for the students in our flipped classroom approach. We present our design of the class exercise: in its generic components envisioning how it may be used in general, but also its use in selected examples to illustrate these components. The class exercise design includes the learning objectives to indicate how the course design meets the learning outcome objectives for ABET accreditation. We further applied a classification of the learning objectives to present the case of the class exercises as active learning tools. Our initial implementation is ready and we are in the process of implementation with partner institutions for feedback and review.

“ERIC EJ1135271: The Design And Evaluation Of Class Exercises As Active Learning Tools In Software Verification And Validation” Metadata:

  • Title: ➤  ERIC EJ1135271: The Design And Evaluation Of Class Exercises As Active Learning Tools In Software Verification And Validation
  • Author:
  • Language: English

“ERIC EJ1135271: The Design And Evaluation Of Class Exercises As Active Learning Tools In Software Verification And Validation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 7.05 Mbs, the file-s for this book were downloaded 76 times, the file-s went public at Thu Oct 18 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find ERIC EJ1135271: The Design And Evaluation Of Class Exercises As Active Learning Tools In Software Verification And Validation at online marketplaces:


10Software Quality Approaches Testing Verification And Validation

It is well known that interesting questions can stimulate thinking and invite participation. Class exercises are designed to make use of questions to engage students in active learning. In a project toward building a community skilled in software verification and validation (SV&V), we critically review and further develop course materials in the software engineering curriculum for an undergraduate course in SV&V. The project involves the joint effort with many other academic institutions and industry partners. There are four topic areas of Software Engineering in our focus: Requirements Engineering, Software Review, Configuration Management, and Testing. We see class exercises as active learning tools for the students in our flipped classroom approach. We present our design of the class exercise: in its generic components envisioning how it may be used in general, but also its use in selected examples to illustrate these components. The class exercise design includes the learning objectives to indicate how the course design meets the learning outcome objectives for ABET accreditation. We further applied a classification of the learning objectives to present the case of the class exercises as active learning tools. Our initial implementation is ready and we are in the process of implementation with partner institutions for feedback and review.

“Software Quality Approaches Testing Verification And Validation” Metadata:

  • Title: ➤  Software Quality Approaches Testing Verification And Validation
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 635.78 Mbs, the file-s for this book were downloaded 7 times, the file-s went public at Thu Nov 04 2021.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Software Quality Approaches Testing Verification And Validation at online marketplaces:


11NASA Technical Reports Server (NTRS) 19950020066: Software Risk Management Through Independent Verification And Validation

By

Software project managers need tools to estimate and track project goals in a continuous fashion before, during, and after development of a system. In addition, they need an ability to compare the current project status with past project profiles to validate management intuition, identify problems, and then direct appropriate resources to the sources of problems. This paper describes a measurement-based approach to calculating the risk inherent in meeting project goals that leverages past project metrics and existing estimation and tracking models. We introduce the IV&V Goal/Questions/Metrics model, explain its use in the software development life cycle, and describe our attempts to validate the model through the reverse engineering of existing projects.

“NASA Technical Reports Server (NTRS) 19950020066: Software Risk Management Through Independent Verification And Validation” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 19950020066: Software Risk Management Through Independent Verification And Validation
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 19950020066: Software Risk Management Through Independent Verification And Validation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 10.13 Mbs, the file-s for this book were downloaded 58 times, the file-s went public at Sat Oct 08 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 19950020066: Software Risk Management Through Independent Verification And Validation at online marketplaces:


12Reference Information For The Software Verification And Validation Process

By

Software project managers need tools to estimate and track project goals in a continuous fashion before, during, and after development of a system. In addition, they need an ability to compare the current project status with past project profiles to validate management intuition, identify problems, and then direct appropriate resources to the sources of problems. This paper describes a measurement-based approach to calculating the risk inherent in meeting project goals that leverages past project metrics and existing estimation and tracking models. We introduce the IV&V Goal/Questions/Metrics model, explain its use in the software development life cycle, and describe our attempts to validate the model through the reverse engineering of existing projects.

“Reference Information For The Software Verification And Validation Process” Metadata:

  • Title: ➤  Reference Information For The Software Verification And Validation Process
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 229.63 Mbs, the file-s for this book were downloaded 176 times, the file-s went public at Tue Apr 21 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVu - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Reference Information For The Software Verification And Validation Process at online marketplaces:


13Verification And Validation Of Modern Software-intensive Systems

By

Software project managers need tools to estimate and track project goals in a continuous fashion before, during, and after development of a system. In addition, they need an ability to compare the current project status with past project profiles to validate management intuition, identify problems, and then direct appropriate resources to the sources of problems. This paper describes a measurement-based approach to calculating the risk inherent in meeting project goals that leverages past project metrics and existing estimation and tracking models. We introduce the IV&V Goal/Questions/Metrics model, explain its use in the software development life cycle, and describe our attempts to validate the model through the reverse engineering of existing projects.

“Verification And Validation Of Modern Software-intensive Systems” Metadata:

  • Title: ➤  Verification And Validation Of Modern Software-intensive Systems
  • Author:
  • Language: English

“Verification And Validation Of Modern Software-intensive Systems” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1309.42 Mbs, the file-s for this book were downloaded 20 times, the file-s went public at Mon May 23 2022.

Available formats:
ACS Encrypted PDF - AVIF Thumbnails ZIP - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Final Processing Log - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Verification And Validation Of Modern Software-intensive Systems at online marketplaces:


14A Survey Of Software Validation, Verification, And Testing Standards And Practices At Selected Sites

By

Software project managers need tools to estimate and track project goals in a continuous fashion before, during, and after development of a system. In addition, they need an ability to compare the current project status with past project profiles to validate management intuition, identify problems, and then direct appropriate resources to the sources of problems. This paper describes a measurement-based approach to calculating the risk inherent in meeting project goals that leverages past project metrics and existing estimation and tracking models. We introduce the IV&V Goal/Questions/Metrics model, explain its use in the software development life cycle, and describe our attempts to validate the model through the reverse engineering of existing projects.

“A Survey Of Software Validation, Verification, And Testing Standards And Practices At Selected Sites” Metadata:

  • Title: ➤  A Survey Of Software Validation, Verification, And Testing Standards And Practices At Selected Sites
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 260.22 Mbs, the file-s for this book were downloaded 339 times, the file-s went public at Fri Nov 20 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVu - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find A Survey Of Software Validation, Verification, And Testing Standards And Practices At Selected Sites at online marketplaces:


15Federal Information Processing Standards Publication: Guideline For Software Verification And Validation Plans

By

Software project managers need tools to estimate and track project goals in a continuous fashion before, during, and after development of a system. In addition, they need an ability to compare the current project status with past project profiles to validate management intuition, identify problems, and then direct appropriate resources to the sources of problems. This paper describes a measurement-based approach to calculating the risk inherent in meeting project goals that leverages past project metrics and existing estimation and tracking models. We introduce the IV&V Goal/Questions/Metrics model, explain its use in the software development life cycle, and describe our attempts to validate the model through the reverse engineering of existing projects.

“Federal Information Processing Standards Publication: Guideline For Software Verification And Validation Plans” Metadata:

  • Title: ➤  Federal Information Processing Standards Publication: Guideline For Software Verification And Validation Plans
  • Author:
  • Language: English

“Federal Information Processing Standards Publication: Guideline For Software Verification And Validation Plans” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 13.19 Mbs, the file-s for this book were downloaded 106 times, the file-s went public at Mon Nov 20 2017.

Available formats:
Abbyy GZ - Archive BitTorrent - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Federal Information Processing Standards Publication: Guideline For Software Verification And Validation Plans at online marketplaces:


16Independent Verification And Validation Strategy Of Real Time EXecutive ( REX) Software Of Onboard Computers Of Satellite Launch Vehicle

By

The most important quality assurance activity in flight software development is techniques used for software verification and validation. When compared with conventional software, testing of real-time systems presents unique and challenging problems since various real-time constraints of the software also need to be verified. The real-time executive software component (REX) of onboard flight software should be tested for the real-time aspects to accurately evaluate the system performance in different implementation scenarios. This paper summarizes the Independent Verification and Validation strategy followed for REX Software.

“Independent Verification And Validation Strategy Of Real Time EXecutive ( REX) Software Of Onboard Computers Of Satellite Launch Vehicle” Metadata:

  • Title: ➤  Independent Verification And Validation Strategy Of Real Time EXecutive ( REX) Software Of Onboard Computers Of Satellite Launch Vehicle
  • Author: ➤  
  • Language: English

“Independent Verification And Validation Strategy Of Real Time EXecutive ( REX) Software Of Onboard Computers Of Satellite Launch Vehicle” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 6.06 Mbs, the file-s for this book were downloaded 134 times, the file-s went public at Thu Jul 11 2019.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Independent Verification And Validation Strategy Of Real Time EXecutive ( REX) Software Of Onboard Computers Of Satellite Launch Vehicle at online marketplaces:


17Federal Information Processing Standards Publication: IEEE Standard For Software Verification And Validation Plans

By

The most important quality assurance activity in flight software development is techniques used for software verification and validation. When compared with conventional software, testing of real-time systems presents unique and challenging problems since various real-time constraints of the software also need to be verified. The real-time executive software component (REX) of onboard flight software should be tested for the real-time aspects to accurately evaluate the system performance in different implementation scenarios. This paper summarizes the Independent Verification and Validation strategy followed for REX Software.

“Federal Information Processing Standards Publication: IEEE Standard For Software Verification And Validation Plans” Metadata:

  • Title: ➤  Federal Information Processing Standards Publication: IEEE Standard For Software Verification And Validation Plans
  • Author:
  • Language: English

“Federal Information Processing Standards Publication: IEEE Standard For Software Verification And Validation Plans” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 57.45 Mbs, the file-s for this book were downloaded 153 times, the file-s went public at Mon Nov 20 2017.

Available formats:
Abbyy GZ - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Federal Information Processing Standards Publication: IEEE Standard For Software Verification And Validation Plans at online marketplaces:


18Software Verification And Validation : Realistic Project Approaches

By

Includes bibliographical references (pages 315-316) and index

“Software Verification And Validation : Realistic Project Approaches” Metadata:

  • Title: ➤  Software Verification And Validation : Realistic Project Approaches
  • Author:
  • Language: English

“Software Verification And Validation : Realistic Project Approaches” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1061.20 Mbs, the file-s for this book were downloaded 42 times, the file-s went public at Fri Mar 02 2018.

Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - Item Tile - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Software Verification And Validation : Realistic Project Approaches at online marketplaces:


19DTIC ADA090966: Airborne Systems Software Acquisition Engineering Guidebook For Verification, Validation, And Certification.

By

This report is one of a series of guidebooks which provide guidance to the acquisition management and engineering of Airborne Systems software procured under Air Force 800-series regulations. It provides working-level Air Force Program Office engineering and management personnel with information that will help them plan, specify, and monitor independent computer program Verification, Validation and Certification (VV&C) activities. (Author)

“DTIC ADA090966: Airborne Systems Software Acquisition Engineering Guidebook For Verification, Validation, And Certification.” Metadata:

  • Title: ➤  DTIC ADA090966: Airborne Systems Software Acquisition Engineering Guidebook For Verification, Validation, And Certification.
  • Author: ➤  
  • Language: English

“DTIC ADA090966: Airborne Systems Software Acquisition Engineering Guidebook For Verification, Validation, And Certification.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 82.54 Mbs, the file-s for this book were downloaded 47 times, the file-s went public at Thu Dec 07 2017.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA090966: Airborne Systems Software Acquisition Engineering Guidebook For Verification, Validation, And Certification. at online marketplaces:


20DTIC ADA142717: Handbook For Evaluation And Life Cycle Planning For Software. Volume 4. Test And Independent Verification And Validation.

By

This document is Volume 4 of the Handbook for Evaluation and Life Cycle Planning for Software (HELPS). This volume provides the user with comprehensive checklists and guides to validate an independent assessment process for computer programs. It also discusses the requirements and preparation necessary for the various phases of testing. Test plans and procedures are also discussed. (Author)

“DTIC ADA142717: Handbook For Evaluation And Life Cycle Planning For Software. Volume 4. Test And Independent Verification And Validation.” Metadata:

  • Title: ➤  DTIC ADA142717: Handbook For Evaluation And Life Cycle Planning For Software. Volume 4. Test And Independent Verification And Validation.
  • Author: ➤  
  • Language: English

“DTIC ADA142717: Handbook For Evaluation And Life Cycle Planning For Software. Volume 4. Test And Independent Verification And Validation.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 28.51 Mbs, the file-s for this book were downloaded 54 times, the file-s went public at Sat Jan 20 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA142717: Handbook For Evaluation And Life Cycle Planning For Software. Volume 4. Test And Independent Verification And Validation. at online marketplaces:


21DTIC ADA236117: Introduction To Software Verification And Validation

By

Software verification and validation techniques are introduced and their applicability discussed. Approaches to integrating these techniques into comprehensive verification and validation plans are also addressed. This curriculum module provides an overview needed to understand in-depth curriculum modules in the verification and validation area. This module provides a framework for understanding the application of software verification and validation (V&V) processes throughout the software evolution process. Typical products of this process are identified, along with their possible V&V objectives. The V&V process consists of numerous techniques and tools, often used in combination with one another. Due to the large number of V&V approaches in use, this module cannot address every technique. Instead, it will analyze five categories of V&V approaches. These are: (1) technical reviews; (2) software testing; (3) proof of correctness (program verification); (4) simulation and prototyping; and (5) requirements tracing.

“DTIC ADA236117: Introduction To Software Verification And Validation” Metadata:

  • Title: ➤  DTIC ADA236117: Introduction To Software Verification And Validation
  • Author: ➤  
  • Language: English

“DTIC ADA236117: Introduction To Software Verification And Validation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 26.93 Mbs, the file-s for this book were downloaded 57 times, the file-s went public at Fri Mar 02 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA236117: Introduction To Software Verification And Validation at online marketplaces:


22Verification, Validation And Testing In Software Engineering

Software verification and validation techniques are introduced and their applicability discussed. Approaches to integrating these techniques into comprehensive verification and validation plans are also addressed. This curriculum module provides an overview needed to understand in-depth curriculum modules in the verification and validation area. This module provides a framework for understanding the application of software verification and validation (V&V) processes throughout the software evolution process. Typical products of this process are identified, along with their possible V&V objectives. The V&V process consists of numerous techniques and tools, often used in combination with one another. Due to the large number of V&V approaches in use, this module cannot address every technique. Instead, it will analyze five categories of V&V approaches. These are: (1) technical reviews; (2) software testing; (3) proof of correctness (program verification); (4) simulation and prototyping; and (5) requirements tracing.

“Verification, Validation And Testing In Software Engineering” Metadata:

  • Title: ➤  Verification, Validation And Testing In Software Engineering
  • Language: English

“Verification, Validation And Testing In Software Engineering” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1053.39 Mbs, the file-s for this book were downloaded 36 times, the file-s went public at Fri Apr 22 2022.

Available formats:
ACS Encrypted PDF - AVIF Thumbnails ZIP - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Verification, Validation And Testing In Software Engineering at online marketplaces:


23DTIC ADA254601: Verification And Validation Of AI Software

By

This document provides practical advice on how to improve V and V on Al projects. The question we attempt to answer is: How can I apply my knowledge of V and V practice to Al development, which seems very different from the examples from textbooks, and which cannot be easily mapped into the lifecycle models of the DOD standards? Part I lays a firm foundation by defining terms such as verification, validation, and artificial intelligence. Also, a new representation of system lifecycles is presented which we believe you will find useful in analyzing your organization's Al development efforts. In Part II the focus shifts to providing advice, with section addressed to project leaders, system specifiers's, designers, programmers, and documenters. Each role contributes in a different way to the overall V and V process, so we present a set of guidelines specific to each role. Part III is a collection of three appendices: (1) A user's manual for a software tool, ASP, developed under this contract which supports the V and V process by allowing programmers to better integrate formal testing with code development; (2) A glossary of V and V terms; and (3) A guide to commercially available CASE tools.

“DTIC ADA254601: Verification And Validation Of AI Software” Metadata:

  • Title: ➤  DTIC ADA254601: Verification And Validation Of AI Software
  • Author: ➤  
  • Language: English

“DTIC ADA254601: Verification And Validation Of AI Software” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 90.32 Mbs, the file-s for this book were downloaded 264 times, the file-s went public at Wed Mar 07 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA254601: Verification And Validation Of AI Software at online marketplaces:


24DTIC ADA194309: Air Force Systems Command Software Independent Verification And Validation Implementation Analysis And Guidance

By

Software Independent Verification and Validation (IV & V) implementation across AD4FSC is varied. These variances cause non-uniform application of IV & V even when applied with common software development practices. The analysis shows that IV & V is being implemented within the intent of the governing regulation and standards. However, there is a need for common guidance for IV & V use. The study presents two levels of guidance; one for contracting and one for management oversight within AFSC. The expected results are improved IV & V use when integrated with common development practices. This should improve systems that depend on software as a key element.

“DTIC ADA194309: Air Force Systems Command Software Independent Verification And Validation Implementation Analysis And Guidance” Metadata:

  • Title: ➤  DTIC ADA194309: Air Force Systems Command Software Independent Verification And Validation Implementation Analysis And Guidance
  • Author: ➤  
  • Language: English

“DTIC ADA194309: Air Force Systems Command Software Independent Verification And Validation Implementation Analysis And Guidance” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 37.30 Mbs, the file-s for this book were downloaded 63 times, the file-s went public at Sun Feb 18 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA194309: Air Force Systems Command Software Independent Verification And Validation Implementation Analysis And Guidance at online marketplaces:


25Planning For Software Validation, Verification, And Testing

By

Software Independent Verification and Validation (IV & V) implementation across AD4FSC is varied. These variances cause non-uniform application of IV & V even when applied with common software development practices. The analysis shows that IV & V is being implemented within the intent of the governing regulation and standards. However, there is a need for common guidance for IV & V use. The study presents two levels of guidance; one for contracting and one for management oversight within AFSC. The expected results are improved IV & V use when integrated with common development practices. This should improve systems that depend on software as a key element.

“Planning For Software Validation, Verification, And Testing” Metadata:

  • Title: ➤  Planning For Software Validation, Verification, And Testing
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 231.85 Mbs, the file-s for this book were downloaded 203 times, the file-s went public at Tue Apr 21 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVu - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Planning For Software Validation, Verification, And Testing at online marketplaces:


26Software Verification And Validation

By

Software Independent Verification and Validation (IV & V) implementation across AD4FSC is varied. These variances cause non-uniform application of IV & V even when applied with common software development practices. The analysis shows that IV & V is being implemented within the intent of the governing regulation and standards. However, there is a need for common guidance for IV & V use. The study presents two levels of guidance; one for contracting and one for management oversight within AFSC. The expected results are improved IV & V use when integrated with common development practices. This should improve systems that depend on software as a key element.

“Software Verification And Validation” Metadata:

  • Title: ➤  Software Verification And Validation
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 111.63 Mbs, the file-s for this book were downloaded 333 times, the file-s went public at Tue Apr 21 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVu - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Software Verification And Validation at online marketplaces:


27DTIC ADA229932: Methodology Development For The Verification And Validation Of Flight Critical Systems Software. Phase 1

By

The results of this conceptual design study have that there is a growing need to develop a methodology by which flight critical systems (FCS) software can be verified and validated for performance and safety impacts. The nature of the evolving technology and its application to FCS Software verification an validation requirements has current V&V methods lagging behind design methods and tools. It is recognized throughout government and industry that FCS software V&V requires knowledgeable and skilled individuals utilizing proper tools and techniques to successfully complete the V&V effort in a timely manner. This report provides an overview of the development process of flight critical systems and the roles of verification an validation which go hand-in- hand with the development process. It provides a conceptual design for a computer aided environment to perform FCS software verification and validation. Current trends in applications of advanced control and integration technologies are bringing about the development of on-board systems that are designed to enhance combat effectiveness and survivability in ever increasing hostile combat environments. Flight critical systems (including integrated flight vehicle sensors) are being controlled and integrated in software.

“DTIC ADA229932: Methodology Development For The Verification And Validation Of Flight Critical Systems Software. Phase 1” Metadata:

  • Title: ➤  DTIC ADA229932: Methodology Development For The Verification And Validation Of Flight Critical Systems Software. Phase 1
  • Author: ➤  
  • Language: English

“DTIC ADA229932: Methodology Development For The Verification And Validation Of Flight Critical Systems Software. Phase 1” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 67.27 Mbs, the file-s for this book were downloaded 80 times, the file-s went public at Wed Feb 28 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA229932: Methodology Development For The Verification And Validation Of Flight Critical Systems Software. Phase 1 at online marketplaces:


28DTIC ADA538076: Applying UML-based Formal Specification, Validation, And Verification To Space Flight Software And Defense Software

By

This report presents the process and results of a formal computer-aided Specification, Validation and Verification (SV&V) of two mission and safety critical projects: the Brazilian Satellite Launcher flight software, and the Department of Defense's Multifunctional Information Distribution System (MIDS) controller. The Specification, Validation, and Verification (SV&V) process begins with a system requirement analysis and Natural Language (NL) specification. UML statechart-formal specification assertions are then created using the StateRover SV&V specification environment; these assertions formally capture the NL requirements. The assertions are validated against the NL and cognitive requirements using JUnit-based testing within the StateRover SV&V environment. Finally, Runtime Verification (RV) is performed on the target system under test (SUT). The RV phase is based on log files created by automatically instrumenting source code files, building and executing them on the VxWorks-based target thereby creating log files, importing resulting log files into the StateRover SV&V environment and executing them as JUnit tests against the assertions.

“DTIC ADA538076: Applying UML-based Formal Specification, Validation, And Verification To Space Flight Software And Defense Software” Metadata:

  • Title: ➤  DTIC ADA538076: Applying UML-based Formal Specification, Validation, And Verification To Space Flight Software And Defense Software
  • Author: ➤  
  • Language: English

“DTIC ADA538076: Applying UML-based Formal Specification, Validation, And Verification To Space Flight Software And Defense Software” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 31.59 Mbs, the file-s for this book were downloaded 41 times, the file-s went public at Sun Aug 05 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA538076: Applying UML-based Formal Specification, Validation, And Verification To Space Flight Software And Defense Software at online marketplaces:


29DTIC ADA419001: Verification And Validation Of Embedded Knowledge-Based Software Systems

By

Our overall goal in this research effort has been to reduce the time and cost of constructing embedded knowledge based systems that must handle uncertainty in information in a rigorous manner. Our fundamental approach actively assists subject-matter experts in organizing their knowledge inclusive of uncertainty to build such embedded systems in a consistent and correct as well as effective fashion. We pursued this by carefully examining the nature of uncertainty and information semantics and developing intelligent tools for verification and validation that provides assistance to the subject-matter expert in constructing their knowledge based systems. We have developed a prototype environment for constructing Bayesian Knowledge Bases called PESKI.

“DTIC ADA419001: Verification And Validation Of Embedded Knowledge-Based Software Systems” Metadata:

  • Title: ➤  DTIC ADA419001: Verification And Validation Of Embedded Knowledge-Based Software Systems
  • Author: ➤  
  • Language: English

“DTIC ADA419001: Verification And Validation Of Embedded Knowledge-Based Software Systems” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 8.42 Mbs, the file-s for this book were downloaded 42 times, the file-s went public at Tue May 15 2018.

Available formats:
Abbyy GZ - Additional Text PDF - Archive BitTorrent - DjVuTXT - Djvu XML - Image Container PDF - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA419001: Verification And Validation Of Embedded Knowledge-Based Software Systems at online marketplaces:


30Federal Information Processing Standards Publication: Guideline For Lifecycle Validation, Verification, And Testing Of Computer Software

By

Our overall goal in this research effort has been to reduce the time and cost of constructing embedded knowledge based systems that must handle uncertainty in information in a rigorous manner. Our fundamental approach actively assists subject-matter experts in organizing their knowledge inclusive of uncertainty to build such embedded systems in a consistent and correct as well as effective fashion. We pursued this by carefully examining the nature of uncertainty and information semantics and developing intelligent tools for verification and validation that provides assistance to the subject-matter expert in constructing their knowledge based systems. We have developed a prototype environment for constructing Bayesian Knowledge Bases called PESKI.

“Federal Information Processing Standards Publication: Guideline For Lifecycle Validation, Verification, And Testing Of Computer Software” Metadata:

  • Title: ➤  Federal Information Processing Standards Publication: Guideline For Lifecycle Validation, Verification, And Testing Of Computer Software
  • Author:
  • Language: English

“Federal Information Processing Standards Publication: Guideline For Lifecycle Validation, Verification, And Testing Of Computer Software” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 71.55 Mbs, the file-s for this book were downloaded 110 times, the file-s went public at Mon Nov 20 2017.

Available formats:
Abbyy GZ - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Federal Information Processing Standards Publication: Guideline For Lifecycle Validation, Verification, And Testing Of Computer Software at online marketplaces:


31Validation, Verification, And Testing Of Computer Software

By

Our overall goal in this research effort has been to reduce the time and cost of constructing embedded knowledge based systems that must handle uncertainty in information in a rigorous manner. Our fundamental approach actively assists subject-matter experts in organizing their knowledge inclusive of uncertainty to build such embedded systems in a consistent and correct as well as effective fashion. We pursued this by carefully examining the nature of uncertainty and information semantics and developing intelligent tools for verification and validation that provides assistance to the subject-matter expert in constructing their knowledge based systems. We have developed a prototype environment for constructing Bayesian Knowledge Bases called PESKI.

“Validation, Verification, And Testing Of Computer Software” Metadata:

  • Title: ➤  Validation, Verification, And Testing Of Computer Software
  • Authors: ➤  
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 157.56 Mbs, the file-s for this book were downloaded 260 times, the file-s went public at Tue May 26 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVu - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Validation, Verification, And Testing Of Computer Software at online marketplaces:


32DTIC ADA040956: Advanced Signal Processing Software Verification And Validation.

By

The Computer Family Architecture Project has as its stated mission the selection of a commercially available computer architecture that would provide the basis for a family of military computers in the 1980's. In order to make a valid selection, the parent project gave birth to sibling efforts involving the design, development, verification, and validation of (1) an Architecture Research Facility (ARF) and (2) a set of candidate architecture benchmark test programs. A computer architecture can be described on the ARF using the instruction Set Processor Language (ISPL) for which the ARF has a compiler. Using the simulation capabilities of the ARF, the benchmark test programs were to indicate the performance characteristics of the candidate computer architectures in a quantifiable manner. The CFA selection committe could then select the best architecture based on quantitatively justifiable figures of merit derived from evaluating benchmark performance on the ARF simulator corresponding to each of the particular architecture descriptions. The ARF approach provided a controlled environment in which to effectively execute a comparative study of computer architectures at the instruction set level.

“DTIC ADA040956: Advanced Signal Processing Software Verification And Validation.” Metadata:

  • Title: ➤  DTIC ADA040956: Advanced Signal Processing Software Verification And Validation.
  • Author: ➤  
  • Language: English

“DTIC ADA040956: Advanced Signal Processing Software Verification And Validation.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 34.07 Mbs, the file-s for this book were downloaded 73 times, the file-s went public at Sat Nov 26 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA040956: Advanced Signal Processing Software Verification And Validation. at online marketplaces:


331012-1998 IEEE Standard For Software Verification And Validation

The Computer Family Architecture Project has as its stated mission the selection of a commercially available computer architecture that would provide the basis for a family of military computers in the 1980's. In order to make a valid selection, the parent project gave birth to sibling efforts involving the design, development, verification, and validation of (1) an Architecture Research Facility (ARF) and (2) a set of candidate architecture benchmark test programs. A computer architecture can be described on the ARF using the instruction Set Processor Language (ISPL) for which the ARF has a compiler. Using the simulation capabilities of the ARF, the benchmark test programs were to indicate the performance characteristics of the candidate computer architectures in a quantifiable manner. The CFA selection committe could then select the best architecture based on quantitatively justifiable figures of merit derived from evaluating benchmark performance on the ARF simulator corresponding to each of the particular architecture descriptions. The ARF approach provided a controlled environment in which to effectively execute a comparative study of computer architectures at the instruction set level.

“1012-1998 IEEE Standard For Software Verification And Validation” Metadata:

  • Title: ➤  1012-1998 IEEE Standard For Software Verification And Validation
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 222.26 Mbs, the file-s for this book were downloaded 27 times, the file-s went public at Sat Aug 13 2022.

Available formats:
ACS Encrypted PDF - AVIF Thumbnails ZIP - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Final Processing Log - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find 1012-1998 IEEE Standard For Software Verification And Validation at online marketplaces:


34Software Validation, Verification, Testing, And Documentation

The Computer Family Architecture Project has as its stated mission the selection of a commercially available computer architecture that would provide the basis for a family of military computers in the 1980's. In order to make a valid selection, the parent project gave birth to sibling efforts involving the design, development, verification, and validation of (1) an Architecture Research Facility (ARF) and (2) a set of candidate architecture benchmark test programs. A computer architecture can be described on the ARF using the instruction Set Processor Language (ISPL) for which the ARF has a compiler. Using the simulation capabilities of the ARF, the benchmark test programs were to indicate the performance characteristics of the candidate computer architectures in a quantifiable manner. The CFA selection committe could then select the best architecture based on quantitatively justifiable figures of merit derived from evaluating benchmark performance on the ARF simulator corresponding to each of the particular architecture descriptions. The ARF approach provided a controlled environment in which to effectively execute a comparative study of computer architectures at the instruction set level.

“Software Validation, Verification, Testing, And Documentation” Metadata:

  • Title: ➤  Software Validation, Verification, Testing, And Documentation
  • Language: English

“Software Validation, Verification, Testing, And Documentation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 679.57 Mbs, the file-s for this book were downloaded 53 times, the file-s went public at Tue Dec 17 2019.

Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Software Validation, Verification, Testing, And Documentation at online marketplaces:


35NASA Technical Reports Server (NTRS) 19950024822: A Process Improvement Model For Software Verification And Validation

By

We describe ongoing work at the NASA Independent Verification and Validation (IV&V) Facility to establish a process improvement model for software verification and validation (V&V) organizations. This model, similar to those used by some software development organizations, uses measurement-based techniques to identify problem areas and introduce incremental improvements. We seek to replicate this model for organizations involved in V&V on large-scale software development projects such as EOS and space station. At the IV&V Facility, a university research group and V&V contractors are working together to collect metrics across projects in order to determine the effectiveness of V&V and improve its application. Since V&V processes are intimately tied to development processes, this paper also examines the repercussions for development organizations in large-scale efforts.

“NASA Technical Reports Server (NTRS) 19950024822: A Process Improvement Model For Software Verification And Validation” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 19950024822: A Process Improvement Model For Software Verification And Validation
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 19950024822: A Process Improvement Model For Software Verification And Validation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 17.49 Mbs, the file-s for this book were downloaded 60 times, the file-s went public at Fri Oct 07 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 19950024822: A Process Improvement Model For Software Verification And Validation at online marketplaces:


36Software Validation, Verification, And Testing Technique And Tool Reference Guide

By

We describe ongoing work at the NASA Independent Verification and Validation (IV&V) Facility to establish a process improvement model for software verification and validation (V&V) organizations. This model, similar to those used by some software development organizations, uses measurement-based techniques to identify problem areas and introduce incremental improvements. We seek to replicate this model for organizations involved in V&V on large-scale software development projects such as EOS and space station. At the IV&V Facility, a university research group and V&V contractors are working together to collect metrics across projects in order to determine the effectiveness of V&V and improve its application. Since V&V processes are intimately tied to development processes, this paper also examines the repercussions for development organizations in large-scale efforts.

“Software Validation, Verification, And Testing Technique And Tool Reference Guide” Metadata:

  • Title: ➤  Software Validation, Verification, And Testing Technique And Tool Reference Guide
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 367.52 Mbs, the file-s for this book were downloaded 197 times, the file-s went public at Tue Apr 21 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - Contents - DjVu - DjVuTXT - Djvu XML - Item Tile - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Software Validation, Verification, And Testing Technique And Tool Reference Guide at online marketplaces:


37NASA Technical Reports Server (NTRS) 19950020394: A Process Improvement Model For Software Verification And Validation

By

We describe ongoing work at the NASA Independent Verification and Validation (IV&V) Facility to establish a process improvement model for software verification and validation (V&V) organizations. This model, similar to those used by some software development organizations, uses measurement-based techniques to identify problem areas and introduce incremental improvements. We seek to replicate this model for organizations involved in V&V on large-scale software development projects such as EOS and Space Station. At the IV&V Facility, a university research group and V&V contractors are working together to collect metrics across projects in order to determine the effectiveness of V&V and improve its application. Since V&V processes are intimately tied to development processes, this paper also examines the repercussions for development organizations in large-scale efforts.

“NASA Technical Reports Server (NTRS) 19950020394: A Process Improvement Model For Software Verification And Validation” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 19950020394: A Process Improvement Model For Software Verification And Validation
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 19950020394: A Process Improvement Model For Software Verification And Validation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 13.79 Mbs, the file-s for this book were downloaded 50 times, the file-s went public at Fri Oct 07 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 19950020394: A Process Improvement Model For Software Verification And Validation at online marketplaces:


38NASA Technical Reports Server (NTRS) 20040010332: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software

By

To achieve its science objectives in deep space exploration, NASA has a need for science platform vehicles to autonomously make control decisions in a time frame that excludes intervention from Earth-based controllers. Round-trip light-time is one significant factor motivating autonomy capability, another factor is the need to reduce ground support operations cost. An unsolved problem potentially impeding the adoption of autonomy capability is the verification and validation of such software systems, which exhibit far more behaviors (and hence distinct execution paths in the software) than is typical in current deepspace platforms. Hence the need for a study to benchmark advanced Verification and Validation (V&V) tools on representative autonomy software. The objective of the study was to access the maturity of different technologies, to provide data indicative of potential synergies between them, and to identify gaps in the technologies with respect to the challenge of autonomy V&V. The study consisted of two parts: first, a set of relatively independent case studies of different tools on the same autonomy code, second a carefully controlled experiment with human participants on a subset of these technologies. This paper describes the second part of the study. Overall, nearly four hundred hours of data on human use of three different advanced V&V tools were accumulated, with a control group that used conventional testing methods. The experiment simulated four independent V&V teams debugging three successive versions of an executive controller for a Martian Rover. Defects were carefully seeded into the three versions based on a profile of defects from CVS logs that occurred in the actual development of the executive controller. The rest of the document is structured a s follows. In section 2 and 3, we respectively describe the tools used in the study and the rover software that was analyzed. In section 4 the methodology for the experiment is described; this includes the code preparation, seeding of defects, participant training and experimental setup. Next we give a qualitative overview of how the experiment went from the point of view of each technology; model checking (section 5), static analysis (section 6), runtime analysis (section 7) and testing (section 8). The find section gives some preliminary quantitative results on how the tools compared.

“NASA Technical Reports Server (NTRS) 20040010332: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 20040010332: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 20040010332: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 14.52 Mbs, the file-s for this book were downloaded 59 times, the file-s went public at Thu Oct 20 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 20040010332: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software at online marketplaces:


39NASA Technical Reports Server (NTRS) 20040010327: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software

By

We report on a study to determine the maturity of different verification and validation technologies (V&V) on a representative example of NASA flight software. The study consisted of a controlled experiment where three technologies (static analysis, runtime analysis and model checking) were compared to traditional testing with respect to their ability to find seeded errors in a prototype Mars Rover. What makes this study unique is that it is the first (to the best of our knowledge) to do a controlled experiment to compare formal methods based tools to testing on a realistic industrial-size example where the emphasis was on collecting as much data on the performance of the tools and the participants as possible. The paper includes a description of the Rover code that was analyzed, the tools used as well as a detailed description of the experimental setup and the results. Due to the complexity of setting up the experiment, our results can not be generalized, but we believe it can still serve as a valuable point of reference for future studies of this kind. It did confirm the belief we had that advanced tools can outperform testing when trying to locate concurrency errors. Furthermore the results of the experiment inspired a novel framework for testing the next generation of the Rover.

“NASA Technical Reports Server (NTRS) 20040010327: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 20040010327: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 20040010327: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 39.00 Mbs, the file-s for this book were downloaded 58 times, the file-s went public at Fri Oct 21 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 20040010327: Experimental Evaluation Of Verification And Validation Tools On Martian Rover Software at online marketplaces:


40DTIC ADA033625: Presentations At The RADC/ARPA Invitational DOD/Industry Conference On Software Verification And Validation August 3, 4, 5 1976.

By

Original and previously published papers are presented that define the state-of-the-art in software verification and validation. The papers, in general, cover the spectrum from large scale software system verification through working validation tools to Symbolic Execution and the theoretical proof of correctness advances. (Author)

“DTIC ADA033625: Presentations At The RADC/ARPA Invitational DOD/Industry Conference On Software Verification And Validation August 3, 4, 5 1976.” Metadata:

  • Title: ➤  DTIC ADA033625: Presentations At The RADC/ARPA Invitational DOD/Industry Conference On Software Verification And Validation August 3, 4, 5 1976.
  • Author: ➤  
  • Language: English

“DTIC ADA033625: Presentations At The RADC/ARPA Invitational DOD/Industry Conference On Software Verification And Validation August 3, 4, 5 1976.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 277.28 Mbs, the file-s for this book were downloaded 274 times, the file-s went public at Wed Nov 25 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA033625: Presentations At The RADC/ARPA Invitational DOD/Industry Conference On Software Verification And Validation August 3, 4, 5 1976. at online marketplaces:


41NASA Technical Reports Server (NTRS) 20010000882: Verification And Validation Of Autonomy Software At NASA

By

Autonomous software holds the promise of new operation possibilities, easier design and development and lower operating costs. However, as those system close control loops and arbitrate resources on board with specialized reasoning, the range of possible situations becomes very large and uncontrollable from the outside, making conventional scenario-based testing very inefficient. Analytic verification and validation (V&V) techniques, and model checking in particular, can provide significant help for designing autonomous systems in a more efficient and reliable manner, by providing a better coverage and allowing early error detection. This article discusses the general issue of V&V of autonomy software, with an emphasis towards model-based autonomy, model-checking techniques and concrete experiments at NASA.

“NASA Technical Reports Server (NTRS) 20010000882: Verification And Validation Of Autonomy Software At NASA” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 20010000882: Verification And Validation Of Autonomy Software At NASA
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 20010000882: Verification And Validation Of Autonomy Software At NASA” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 25.40 Mbs, the file-s for this book were downloaded 65 times, the file-s went public at Tue Oct 18 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 20010000882: Verification And Validation Of Autonomy Software At NASA at online marketplaces:


42Using Statechart Assertion For The Formal Validation And Verification Of A Real-time Software System A Case Study

By

V testing.

“Using Statechart Assertion For The Formal Validation And Verification Of A Real-time Software System A Case Study” Metadata:

  • Title: ➤  Using Statechart Assertion For The Formal Validation And Verification Of A Real-time Software System A Case Study
  • Author:
  • Language: English

“Using Statechart Assertion For The Formal Validation And Verification Of A Real-time Software System A Case Study” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 312.16 Mbs, the file-s for this book were downloaded 184 times, the file-s went public at Fri May 03 2019.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Using Statechart Assertion For The Formal Validation And Verification Of A Real-time Software System A Case Study at online marketplaces:


43ERIC ED233688: Software Validation, Verification, And Testing Technique And Tool Reference Guide. Final Report.

By

Intended as an aid in the selection of software techniques and tools, this document contains three sections: (1) a suggested methodology for the selection of validation, verification, and testing (VVT) techniques and tools; (2) summary matrices by development phase usage, a table of techniques and tools with associated keywords, and an alphabetized table of keywords with associated techniques and tools; and (3) descriptions of 30 individual VVT techniques and tools. Each descriptive entry includes an accepted or invented title; a short description of the basic features of the technique or tool; a description of the input required for use; a description of the results of the technique or the output of the tool; a brief list of the actions that a user is expected to perform or an outline of method; an example to illustrate the inputs, outputs, and the method; a brief assessment of the effectiveness and usability of the technique or tool, including underlying assumptions and difficulties that can be expected in practice; an indication of the situation in which the technique or tool is likely to be useful; an estimate of the learning time and training needed to use the technique or tool successfully; a cost estimate; and a list of additional references. A 35-item glossary defines terminology used in the document. (ESR)

“ERIC ED233688: Software Validation, Verification, And Testing Technique And Tool Reference Guide. Final Report.” Metadata:

  • Title: ➤  ERIC ED233688: Software Validation, Verification, And Testing Technique And Tool Reference Guide. Final Report.
  • Author:
  • Language: English

“ERIC ED233688: Software Validation, Verification, And Testing Technique And Tool Reference Guide. Final Report.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 249.85 Mbs, the file-s for this book were downloaded 181 times, the file-s went public at Sat Jan 10 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find ERIC ED233688: Software Validation, Verification, And Testing Technique And Tool Reference Guide. Final Report. at online marketplaces:


44DTIC ADA495407: Evolvable Approaches To Software Verification And Validation

By

This project considered software protection in embedded systems built using encrypted execution platforms where instructions and data are stored in encrypted form in memory. The objective of this project was to develop architectural solutions to address physical attacks on such encrypted platforms when a sophisticated attacker has captured the device. The attacks are based on exploiting structure in the application code and data, which can be uncovered by direct manipulation of hardware. An integrated hardware-software approach was taken to design a secure system to protect against such attacks. The architecture utilizes a secure on-chip hardware component, in the form of a Field-Programmable Gate Array, as the main protection mechanism. The reconfigurable logic in hardware, when combined with the ability of the compiler to instrument the code, was used in powerful ways to strengthen the security of computing platforms. Several techniques, in architecture, compiler and security, were proposed and designed. Simulations and prototyping experiments showed that this approach is feasible, easy to implement and on average adds low performance overheads. The research involved faculty and graduate students, and partly supported two doctoral theses.

“DTIC ADA495407: Evolvable Approaches To Software Verification And Validation” Metadata:

  • Title: ➤  DTIC ADA495407: Evolvable Approaches To Software Verification And Validation
  • Author: ➤  
  • Language: English

“DTIC ADA495407: Evolvable Approaches To Software Verification And Validation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 22.35 Mbs, the file-s for this book were downloaded 66 times, the file-s went public at Wed Jul 11 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA495407: Evolvable Approaches To Software Verification And Validation at online marketplaces:


45NASA Technical Reports Server (NTRS) 20160000365: Simulation-To-Flight (STF-1): A Mission To Enable CubeSat Software-Based Validation And Verification

By

The Simulation-to-Flight 1 (STF-1) CubeSat mission aims to demonstrate how legacy simulation technologies may be adapted for flexible and effective use on missions using the CubeSat platform. These technologies, named NASA Operational Simulator (NOS), have demonstrated significant value on several missions such as James Webb Space Telescope, Global Precipitation Measurement, Juno, and Deep Space Climate Observatory in the areas of software development, mission operations/training, verification and validation (V&V), test procedure development and software systems check-out. STF-1 will demonstrate a highly portable simulation and test platform that allows seamless transition of mission development artifacts to flight products. This environment will decrease development time of future CubeSat missions by lessening the dependency on hardware resources. In addition, through a partnership between NASA GSFC, the West Virginia Space Grant Consortium and West Virginia University, the STF-1 CubeSat will hosts payloads for three secondary objectives that aim to advance engineering and physical-science research in the areas of navigation systems of small satellites, provide useful data for understanding magnetosphere-ionosphere coupling and space weather, and verify the performance and durability of III-V Nitride-based materials.

“NASA Technical Reports Server (NTRS) 20160000365: Simulation-To-Flight (STF-1): A Mission To Enable CubeSat Software-Based Validation And Verification” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 20160000365: Simulation-To-Flight (STF-1): A Mission To Enable CubeSat Software-Based Validation And Verification
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 20160000365: Simulation-To-Flight (STF-1): A Mission To Enable CubeSat Software-Based Validation And Verification” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 8.69 Mbs, the file-s for this book were downloaded 52 times, the file-s went public at Mon Jan 11 2021.

Available formats:
Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 20160000365: Simulation-To-Flight (STF-1): A Mission To Enable CubeSat Software-Based Validation And Verification at online marketplaces:


46NASA Technical Reports Server (NTRS) 19920023952: Independent Verification And Validation For Space Shuttle Flight Software

By

The Committee for Review of Oversight Mechanisms for Space Shuttle Software was asked by the National Aeronautics and Space Administration's (NASA) Office of Space Flight to determine the need to continue independent verification and validation (IV&V) for Space Shuttle flight software. The Committee found that the current IV&V process is necessary to maintain NASA's stringent safety and quality requirements for man-rated vehicles. Therefore, the Committee does not support NASA's plan to eliminate funding for the IV&V effort in fiscal year 1993. The Committee believes that the Space Shuttle software development process is not adequate without IV&V and that elimination of IV&V as currently practiced will adversely affect the overall quality and safety of the software, both now and in the future. Furthermore, the Committee was told that no organization within NASA has the expertise or the manpower to replace the current IV&V function in a timely fashion, nor will building this expertise elsewhere necessarily reduce cost. Thus, the Committee does not recommend moving IV&V functions to other organizations within NASA unless the current IV&V is maintained for as long as it takes to build comparable expertise in the replacing organization.

“NASA Technical Reports Server (NTRS) 19920023952: Independent Verification And Validation For Space Shuttle Flight Software” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 19920023952: Independent Verification And Validation For Space Shuttle Flight Software
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 19920023952: Independent Verification And Validation For Space Shuttle Flight Software” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 27.78 Mbs, the file-s for this book were downloaded 109 times, the file-s went public at Sat Oct 01 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 19920023952: Independent Verification And Validation For Space Shuttle Flight Software at online marketplaces:


47NASA Technical Reports Server (NTRS) 20150010982: Survey Of Verification And Validation Techniques For Small Satellite Software Development

By

The purpose of this paper is to provide an overview of the current trends and practices in small-satellite software verification and validation. This document is not intended to promote a specific software assurance method. Rather, it seeks to present an unbiased survey of software assurance methods used to verify and validate small satellite software and to make mention of the benefits and value of each approach. These methods include simulation and testing, verification and validation with model-based design, formal methods, and fault-tolerant software design with run-time monitoring. Although the literature reveals that simulation and testing has by far the longest legacy, model-based design methods are proving to be useful for software verification and validation. Some work in formal methods, though not widely used for any satellites, may offer new ways to improve small satellite software verification and validation. These methods need to be further advanced to deal with the state explosion problem and to make them more usable by small-satellite software engineers to be regularly applied to software verification. Last, it is explained how run-time monitoring, combined with fault-tolerant software design methods, provides an important means to detect and correct software errors that escape the verification process or those errors that are produced after launch through the effects of ionizing radiation.

“NASA Technical Reports Server (NTRS) 20150010982: Survey Of Verification And Validation Techniques For Small Satellite Software Development” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 20150010982: Survey Of Verification And Validation Techniques For Small Satellite Software Development
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 20150010982: Survey Of Verification And Validation Techniques For Small Satellite Software Development” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 15.45 Mbs, the file-s for this book were downloaded 62 times, the file-s went public at Fri Nov 18 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 20150010982: Survey Of Verification And Validation Techniques For Small Satellite Software Development at online marketplaces:


48NASA Technical Reports Server (NTRS) 20000120421: Verification And Validation Of Autonomy Software At NASA

By

Autonomous software holds the promise of new operation possibilities, easier design and development, and lower operating costs. However, as those system close control loops and arbitrate resources on-board with specialized reasoning, the range of possible situations becomes very large and uncontrollable from the outside, making conventional scenario-based testing very inefficient. Analytic verification and validation (V&V) techniques, and model checking in particular, can provide significant help for designing autonomous systems in a more efficient and reliable manner, by providing a better coverage and allowing early error detection. This article discusses the general issue of V&V of autonomy software, with an emphasis towards model-based autonomy, model-checking techniques, and concrete experiments at NASA.

“NASA Technical Reports Server (NTRS) 20000120421: Verification And Validation Of Autonomy Software At NASA” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 20000120421: Verification And Validation Of Autonomy Software At NASA
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 20000120421: Verification And Validation Of Autonomy Software At NASA” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 27.29 Mbs, the file-s for this book were downloaded 82 times, the file-s went public at Tue Oct 18 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 20000120421: Verification And Validation Of Autonomy Software At NASA at online marketplaces:


49NASA Technical Reports Server (NTRS) 20140017632: How Nasa's Independent Verification And Validation (IVandV) Program Builds Reliability Into A Space Mission Software System (SMSS)

By

The purpose of this presentation is to outline how the NASA Independent Verification and Validation (IVV) Program helps to build reliability into the Space Mission Software Systems (SMSSs) that its customers develop.

“NASA Technical Reports Server (NTRS) 20140017632: How Nasa's Independent Verification And Validation (IVandV) Program Builds Reliability Into A Space Mission Software System (SMSS)” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 20140017632: How Nasa's Independent Verification And Validation (IVandV) Program Builds Reliability Into A Space Mission Software System (SMSS)
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 20140017632: How Nasa's Independent Verification And Validation (IVandV) Program Builds Reliability Into A Space Mission Software System (SMSS)” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 10.39 Mbs, the file-s for this book were downloaded 51 times, the file-s went public at Wed Nov 16 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 20140017632: How Nasa's Independent Verification And Validation (IVandV) Program Builds Reliability Into A Space Mission Software System (SMSS) at online marketplaces:


50NASA Technical Reports Server (NTRS) 19770019884: NASA Software Specification And Evaluation System: Software Verification/validation Techniques

By

NASA software requirement specifications were used in the development of a system for validating and verifying computer programs. The software specification and evaluation system (SSES) provides for the effective and efficient specification, implementation, and testing of computer software programs. The system as implemented will produce structured FORTRAN or ANSI FORTRAN programs, but the principles upon which SSES is designed allow it to be easily adapted to other high order languages.

“NASA Technical Reports Server (NTRS) 19770019884: NASA Software Specification And Evaluation System: Software Verification/validation Techniques” Metadata:

  • Title: ➤  NASA Technical Reports Server (NTRS) 19770019884: NASA Software Specification And Evaluation System: Software Verification/validation Techniques
  • Author: ➤  
  • Language: English

“NASA Technical Reports Server (NTRS) 19770019884: NASA Software Specification And Evaluation System: Software Verification/validation Techniques” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 33.25 Mbs, the file-s for this book were downloaded 92 times, the file-s went public at Tue Jul 26 2016.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find NASA Technical Reports Server (NTRS) 19770019884: NASA Software Specification And Evaluation System: Software Verification/validation Techniques at online marketplaces:


Source: LibriVox

LibriVox Search Results

Available audio books for downloads from LibriVox

1Hand that Rocks the Cradle is the Hand that Rules the World

By

For Mother’s Day 2006, we’ve recorded five versions of this tribute to Mothers and their role in shaping the future. The title is very famous out of its context, but now you can hear how it was originally intended.

“Hand that Rocks the Cradle is the Hand that Rules the World” Metadata:

  • Title: ➤  Hand that Rocks the Cradle is the Hand that Rules the World
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 5
  • Total Time: 00:10:08

Edition Identifiers:

  • libriVox ID: 420

Links and information:

Online Access

Download the Audio Book:

  • File Name: hand_that_rocks_librivox
  • File Format: zip
  • Total Time: 00:10:08
  • Download Link: Download link

Online Marketplaces

Find Hand that Rocks the Cradle is the Hand that Rules the World at online marketplaces:


2Clue of the Twisted Candle

By

Book's cover

Well-known mystery writer John Lexman is charged with murder and sent to Broadmoor Prison. His friend T.X., head of a special branch of Scotland Yard, tries to prove his innocence. (Summary by Gesine)

“Clue of the Twisted Candle” Metadata:

  • Title: Clue of the Twisted Candle
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 23
  • Total Time: 5:53:54

Edition Identifiers:

  • libriVox ID: 874

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 23 sections

Online Access

Download the Audio Book:

  • File Name: twisted_candle_librivox
  • File Format: zip
  • Total Time: 5:53:54
  • Download Link: Download link

Online Marketplaces

Find Clue of the Twisted Candle at online marketplaces:


3Angel of Terror

By

Book's cover

When this was written, literary traditions still decreed beauty to be the outward sign of inner saintliness, whereas evil characters tended to be “ugly as sin.” Jean Briggerland defies these expectations by being every bit as angelically beautiful as she is sociopathic. So lovely that all around her are blinded to her guilt no matter how blatant her crimes, only Jack Glover, best friend and lawyer of her most recent victim, is aware of her true nature. Can he stop her crime spree and bring her to justice before she murders her way to wealth and happiness? He really, really shouldn’t count on it. Despite the book’s outrageously implausible plot, it nevertheless manages to keep one in suspense from first page to last. Advisory: Antiquated attitudes and occasional profanity will add unintentional humor to the charms of the story for some listeners but might offend others. (Summary by Lee Elliot)

“Angel of Terror” Metadata:

  • Title: Angel of Terror
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 41
  • Total Time: 6:42:44

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 41 sections

Online Access

Download the Audio Book:

  • File Name: angel_terror_librivox_le
  • File Format: zip
  • Total Time: 6:42:44
  • Download Link: Download link

Online Marketplaces

Find Angel of Terror at online marketplaces:


4Is Mars Habitable?

By

Book's cover

In 1907 Wallace wrote the short book Is Mars Habitable? to criticize the claims made by Percival Lowell that there were Martian canals built by intelligent beings. Wallace did months of research, consulted various experts, and produced his own scientific analysis of the martian climate and atmospheric conditions. Among other things Wallace pointed out that spectroscopic analysis had shown no signs of water vapour in the Martian atmosphere, that Lowell's analysis of Mars's climate was seriously flawed and badly overestimated the surface temperature, and that low atmospheric pressure would make liquid water, let alone a planet girding irrigation system, impossible. (from Wikipedia)

“Is Mars Habitable?” Metadata:

  • Title: Is Mars Habitable?
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 9
  • Total Time: 3:01:05

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 9 sections

Online Access

Download the Audio Book:

  • File Name: is_mars_habitable_cal_librivox
  • File Format: zip
  • Total Time: 3:01:05
  • Download Link: Download link

Online Marketplaces

Find Is Mars Habitable? at online marketplaces:


5Daffodil Mystery

By

Book's cover

Richard Horatio Edgar Wallace (April 1, 1875–February 10, 1932) was a prolific British crime writer, journalist and playwright, who wrote 175 novels, 24 plays, and countless articles in newspapers and journals. Over 160 films have been made of his novels, more than any other author. In the 1920s, one of Wallace's publishers claimed that a quarter of all books read in England were written by him. <br><br> He is most famous today as the co-creator of "King Kong", writing the early screenplay and story for the movie, as well as a short story "King Kong" (1933) credited to him and Draycott Dell. He was known for the J. G. Reeder detective stories, The Four Just Men, the Ringer, and for creating the Green Archer character during his lifetime. (Summary from Wikipedia)

“Daffodil Mystery” Metadata:

  • Title: Daffodil Mystery
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 38
  • Total Time: 6:56:28

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 38 sections

Online Access

Download the Audio Book:

  • File Name: daffodil_mystery_0802_librivox
  • File Format: zip
  • Total Time: 6:56:28
  • Download Link: Download link

Online Marketplaces

Find Daffodil Mystery at online marketplaces:


6Angel of Terror (version 2)

By

Book's cover

Beautiful Jean Briggerland is the epitome of evilness in this twisting and turning thriller. She plots many different ways to steal her new victim's riches including lies and murder. Only Jack Glover the lawyer of Jean's most recent victim, is aware of her true nature. Can he stop her crime spree and bring her to justice before she murders her way to wealth and happiness? Don't count on it! Page after page offers action, new twists, and unexpected surprises that will keep the reader listening for more! (Summary by Allyson Hester)

“Angel of Terror (version 2)” Metadata:

  • Title: Angel of Terror (version 2)
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 20
  • Total Time: 6:58:35

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 20 sections

Online Access

Download the Audio Book:

  • File Name: angel_of_terror_ah_librivox2
  • File Format: zip
  • Total Time: 6:58:35
  • Download Link: Download link

Online Marketplaces

Find Angel of Terror (version 2) at online marketplaces:


7Ben-Hur: A Tale of the Christ Book 1

By

Book's cover

Lew Wallace's Ben-Hur: A Tale of the Christ "Book 1" gives a sideline view of events taking pace around the days of Christ. Book 1 gives the account of Christ's birth. (Summary by MHAIJH85)

“Ben-Hur: A Tale of the Christ Book 1” Metadata:

  • Title: ➤  Ben-Hur: A Tale of the Christ Book 1
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 14
  • Total Time: 3:09:14

Edition Identifiers:

Links and information:

Online Access

Download the Audio Book:

  • File Name: ben_hur_090831_librivox
  • File Format: zip
  • Total Time: 3:09:14
  • Download Link: Download link

Online Marketplaces

Find Ben-Hur: A Tale of the Christ Book 1 at online marketplaces:


8Ben-Hur: A Tale of the Christ

By

Book's cover

Ben-Hur is a story of two very different heroes. Judah Ben-Hur, a prince of Jerusalem, is involved in an accident to the Roman procurator which is taken to be intentional. He is seized and sent to the fleet as a galley-slave, while his family is imprisoned and the family goods confiscated. When Ben-Hur saves the fleet captain from drowning after his ship is sunk in a fight with pirates, that officer adopts him as son and heir. With Roman training, Ben-Hur distinguishes himself in the arena and the palistrae and appears to be on the way to high military command.<P>With the help of a faithful family retainer and a generous Arab sheik, Ben-Hur is enabled to take part in a widely touted chariot race, where one of the other charioteers is the boyhood friend who connived to punish him for the accident and split his estate. That rival is crippled, financially and bodily, in a no-holds-barred race (memorable from the 1959 movie with Charlton Heston).<P>Ben-Hur turns his attention to the prophesied King of the Jews, when through the sheik he meets Balthasar, one of the Three Wise Men, and hears of the child born years ago. Will Ben-Hur be the general who brings victories to the King, and finally liberates Israel from the oppressive Roman yoke? In his quest for the answer, Ben-Hur seeks out the Nazarene, now rumored to be The Messiah.<P>THAT hero needs no introduction.<P>Curious about the lack of kingly trappings and ambitions about this man, Ben-Hur begins to suspect that his kingdom is not of this world. And with him, we receive a gut-wrenching eye-witness view of Jesus’ arrest, humiliation, and crucifixion.

“Ben-Hur: A Tale of the Christ” Metadata:

  • Title: Ben-Hur: A Tale of the Christ
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 81
  • Total Time: 23:22:09

Edition Identifiers:

Links and information:

Online Access

Download the Audio Book:

  • File Name: benhur_0906_librivox
  • File Format: zip
  • Total Time: 23:22:09
  • Download Link: Download link

Online Marketplaces

Find Ben-Hur: A Tale of the Christ at online marketplaces:


9Outlaws of Ravenhurst

By

This exciting historical adventure depicts the last stand of the Gordons - God's "outlaws" - fighting for their Catholic Faith in the early days of the Protestant Revolution in seventeenth-century Scotland.<br> Written for the children but enjoyed by young and old alike, this intriguing novel is filled with courageous heroes, cowardly villains, secrets and even secret passages! (Summary by Maria Therese)<br><br>Reader's Note: A new (and hopefully improved) recording of this book was uploaded in June, 2013.

“Outlaws of Ravenhurst” Metadata:

  • Title: Outlaws of Ravenhurst
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 23
  • Total Time: 5:32:37

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Number of Sections: 23 sections

Online Access

Download the Audio Book:

  • File Name: outlaws_ravenhurst_mt_librivox
  • File Format: zip
  • Total Time: 5:32:37
  • Download Link: Download link

Online Marketplaces

Find Outlaws of Ravenhurst at online marketplaces:


10Green Rust

By

Book's cover

A millionaire is taken suddenly ill, and sensing his mortality, he asks his attorney to do him one last favor—to find and secretly watch over his missing niece, the daughter of his profligate deceased sister. This niece at the appropriate time would become heir to his millions. However, the millionaire is mysteriously murdered, stabbed to death in his sick bed. Oliva Cresswell, the unsuspecting niece, has been a cashier in a large West End store for five years when she meets a Mr. Beale, a self-described wheat merchant, is attacked in her flat and rescued by this Mr. Beale, is offered a job as his confidential secretary, refuses him, is unexplainably sacked and finds herself in need of his offer. The mysteries multiply and deepen as the story proceeds. (Introduction by Don W. Jenkins)

“Green Rust” Metadata:

  • Title: Green Rust
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 32
  • Total Time: 8:02:04

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 32 sections

Online Access

Download the Audio Book:

  • File Name: green_rust_dwj_librivox
  • File Format: zip
  • Total Time: 8:02:04
  • Download Link: Download link

Online Marketplaces

Find Green Rust at online marketplaces:


11Chronicles of Canada Volume 13 - The United Empire Loyalists: A Chronicle of the Great Migration

By

Book's cover

Volume 13 of The Chronicles of Canada Series. This volume sheds light on the often misunderstood Americans who chose to remain loyal to the Crown of England during and after the American Revolution. While the vast majority of American writings which detail the Revolution paint the Loyalists (sometimes called Tories) in the most negative fashion, this volume explains the reasons behind their election to flee to Canada (and other countries) rather than remain on American soil. While no exact numbers exist of Loyalists who fled to Canada in 1783-1784, the estimates of John Adams and others of the time period range in the vicinity of one third of the population, which places that number at about a million. These were not people who fled in fear, rather they were generally people who felt the benefit of support from the British Crown outweighed the support they would receive from the unproven social, financial, and political structures which had yet to be formed. Some were opportunists in search of free land. But all were a brave people who chose to leave the comfort of their homeland to help settle uncharted territories of what we now know as Quebec, Ontario, New Brunswick, Prince Edward Island and Nova Scotia; a people who held their heads high as they settled a largely untamed land. (Introduction by Roger Melin)

“Chronicles of Canada Volume 13 - The United Empire Loyalists: A Chronicle of the Great Migration” Metadata:

  • Title: ➤  Chronicles of Canada Volume 13 - The United Empire Loyalists: A Chronicle of the Great Migration
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 13
  • Total Time: 3:19:21

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 13 sections

Online Access

Download the Audio Book:

  • File Name: unitedempire_rm_librivox
  • File Format: zip
  • Total Time: 3:19:21
  • Download Link: Download link

Online Marketplaces

Find Chronicles of Canada Volume 13 - The United Empire Loyalists: A Chronicle of the Great Migration at online marketplaces:


12Green Rust (Version 2)

By

Book's cover

Edgar Wallace, perhaps best known for creating King Kong, wrote dozens of novels. The Green Rust, his twelfth crime novel, is one of three books he published in 1919. It begins at the English home of the severely ill American millionaire, John Millinborn. With him are his best friend, Kitson, and a local doctor, the Dutch (or is he?) van Heerden. He is murdered in the first chapter, having just left his fortune to his niece, Oliva, whom he has never met. Before he dies, he asks Kitson to find and watch over Oliva. (Introduction by Kirsten Wever)

“Green Rust (Version 2)” Metadata:

  • Title: Green Rust (Version 2)
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 32
  • Total Time: 9:49:35

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 32 sections

Online Access

Download the Audio Book:

  • File Name: green_rust_1109_librivox
  • File Format: zip
  • Total Time: 9:49:35
  • Download Link: Download link

Online Marketplaces

Find Green Rust (Version 2) at online marketplaces:


13Lure of the Labrador Wild

By

Book's cover

The Lure Of The Labrador Wild is a account of a expedition by Leonidas Hubbard, an adventurer and journalist to canoe the system Naskaupi River - Lake Michikamau in Labrador and George River in Quebec. His companions on this journey were his friend, New York lawyer Dillon Wallace and an Indian guide from Missannabie, George Elson. From the start, the expedition was beset with mistakes and problems. Instead of ascending the Naskaupi River, by mistake they followed the shallow Susan Brook. After hard long portaging and almost reaching Lake Michikamau, with food supplies running out, on September 15 at Windbound lake, they decided to turn back. On October 18, Wallace and Elson went in a search of cached store of flour, leaving Hubbard behind in a tent. Hubbard died of exhaustion and starvation on either same or next day. Wallace got lost in the snowstorm, while Elson, after a week of bushwhacking, building raft to cross swollen rivers (with no ax), reached the nearest occupied cabin. A search party found Wallace alive on October 30, 1903.( Summary from Wikipedia )

“Lure of the Labrador Wild” Metadata:

  • Title: Lure of the Labrador Wild
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 25
  • Total Time: 8:13:30

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 25 sections

Online Access

Download the Audio Book:

  • File Name: lurelabradorwild_1110_librivox
  • File Format: zip
  • Total Time: 8:13:30
  • Download Link: Download link

Online Marketplaces

Find Lure of the Labrador Wild at online marketplaces:


14Secret House

By

Book's cover

A stranger and foreigner arrives at the offices of a small publication in London only to be faced by the “editor” whose face is completely swathed in a veil. Nothing is as it seems, and it quickly becomes evident that both are bent on more than lively gossip about the elite. Blackmail and opportunism is the order of the day. When two men are found shot to death outside the door of Mr. Farrington the millionaire who just happens to live a few doors from T. B. Smith, the head of the secret police, the connections to blackmail are not long in coming. Were these men shot by the blackmailer? Who is actually what he seems to be? (Summary by Don W. Jenkins)

“Secret House” Metadata:

  • Title: Secret House
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 21
  • Total Time: 5:48:50

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 21 sections

Online Access

Download the Audio Book:

  • File Name: secret_house_dwj_librivox
  • File Format: zip
  • Total Time: 5:48:50
  • Download Link: Download link

Online Marketplaces

Find Secret House at online marketplaces:


15Malay Archipelago, Volume 2

By

Book's cover

A fascinating and classic Victorian ethnology of SE Asia, first published in 1869. The author was co-discoverer of evolution, together with Darwin. (Summary by Nicholas Longhurst)

“Malay Archipelago, Volume 2” Metadata:

  • Title: Malay Archipelago, Volume 2
  • Author:
  • Language: English
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 21
  • Total Time: 09:39:15

Edition Identifiers:

Links and information:

Online Access

Download the Audio Book:

  • File Name: malay_archipelago_2_1611_librivox
  • File Format: zip
  • Total Time: 09:39:15
  • Download Link: Download link

Online Marketplaces

Find Malay Archipelago, Volume 2 at online marketplaces:


16Ben Hur (Nederlands)

By

Book's cover

tba

“Ben Hur (Nederlands)” Metadata:

  • Title: Ben Hur (Nederlands)
  • Author:
  • Language: Dutch - Nederlands, Vlaams
  • Publish Date:

Edition Specifications:

  • Format: Audio
  • Number of Sections: 78

Edition Identifiers:

Links and information:

  • LibriVox Link:
  • Text Source: - Download text file/s.
  • Number of Sections: 78 sections

Online Access

Download the Audio Book:

    Online Marketplaces

    Find Ben Hur (Nederlands) at online marketplaces:


    17Ben Hur (Dramatic Reading)

    By

    Book's cover

    In this dramatic reading of the classic epic Ben Hur, rediscover the wonder of three wise men who travel through the wilderness together. Thirty years later, Judah ben Hur accidentally looses a tile upon the head of the Roman governor and is sentenced to the galleys for life. When he escapes, he is caught up in his thirst for revenge against his accuser, Messala, and his search for the Messiah of his people, the King who is to come. As Judah learns more about this King, however, he begins to realize that the kingdom he is searching for may not be found in what he can see and the revenge he is seeking may not be found in the way that he expects. Summary by Esther ben Simonides Judah Ben Hur: <a href="https://librivox.org/reader/10031">Rupert Holliday</a><br>Messala: <a href="https://librivox.org/reader/10174">Matthew Travers</a><br>Balthasar: <a href="https://librivox.org/reader/6754">ToddHW</a><br>Melchior: <a href="https://librivox.org/reader/8086">Mark Chulsky</a><br>Gaspar: <a href="https://librivox.org/reader/10253">Donald Gilmore</a><br>Quintus Arrius: <a href="https://librivox.org/reader/10238">Rquade</a><br>Simonides: <a href="https://librivox.org/reader/8425">Larry Wilson</a><br>Malluch: <a href="https://librivox.org/reader/8086">Mark Chulsky</a><br>Sheik Ilderim: <a href="https://librivox.org/reader/11144">Ricky of Kokiri</a>, <a href="https://librivox.org/reader/6065">David Olson</a><br>Judah's Mother: <a href="https://librivox.org/reader/6548">Kristin Gjerløw</a><br>Tirzah: <a href="https://librivox.org/reader/7356">Rachel</a><br>Esther, daughter of Simonides: <a href="https://librivox.org/reader/8886">Esther ben Simonides</a><br>Amrah: <a href="https://librivox.org/reader/9442">Vanessa Cooley</a><br>Iras, daughter of Balthasar: <a href="https://librivox.org/reader/9446">Adele de Pignerolles</a><br>Narrator: <a href="https://librivox.org/reader/9446">Adele de Pignerolles</a>, <a href="https://librivox.org/reader/8886">Esther ben Simonides</a>, <a href="https://librivox.org/reader/7356">Rachel</a>, <a href="https://librivox.org/reader/10665">Christine Lehman</a>, <a href="https://librivox.org/reader/8883">Lydia</a>, <a href="https://librivox.org/reader/9961">Mike Justice</a>, <a href="https://librivox.org/reader/9642">Chris Pyle</a><br><br> Other roles read by:<br> <a href="https://librivox.org/reader/8886">Esther ben Simonides</a>, <a href="https://librivox.org/reader/10031">Rupert Holliday</a>, <a href="https://librivox.org/reader/7356">Rachel</a>, <a href="https://librivox.org/reader/10238">Rquade</a>, <a href="https://librivox.org/reader/10174">Matthew Travers</a>, <a href="https://librivox.org/reader/10268">Jason J. Fedelem</a>, <a href="https://librivox.org/reader/10542">David Purdy</a>, <a href="https://librivox.org/reader/10150">Elizabeth Travers</a>, <a href="https://librivox.org/reader/10146">Andrew Travers</a>, <a href="https://librivox.org/reader/6548">Kristin Gjerløw</a>, <a href="https://librivox.org/reader/8883">Lydia</a>, <a href="https://librivox.org/reader/10615">Twinkle</a>, <a href="https://librivox.org/reader/6281">Beth Thomas</a>, <a href="https://librivox.org/reader/10614">Leanne Yau</a>, <a href="https://librivox.org/reader/9647">Joseph Tabler</a>, <a href="https://librivox.org/reader/9599">Maggie Travers</a>, <a href="https://librivox.org/reader/10890">Tom Penn</a>, <a href="https://librivox.org/reader/7510">Kathrine Engan</a>, <a href="https://librivox.org/reader/10253">Donald Gilmore</a>, <a href="https://librivox.org/reader/10422">Eddy Sherman</a>, <a href="https://librivox.org/reader/3645">Mary Ann</a>, <a href="https://librivox.org/reader/10357">Mike Harris</a>, <a href="https://librivox.org/reader/6065">David Olson</a>, <a href="https://librivox.org/reader/10230">toadoftoadhall</a>, <a href="https://librivox.org/reader/7315">Charlotte Duckett</a><br><br> Proof listening: <a href="https://librivox.org/reader/8886">Esther ben Simonides</a>, <a href="https://librivox.org/reader/7356">Rachel</a></p>

    “Ben Hur (Dramatic Reading)” Metadata:

    • Title: Ben Hur (Dramatic Reading)
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 82
    • Total Time: 20:24:03

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: benhur_dr_1709_librivox
    • File Format: zip
    • Total Time: 20:24:03
    • Download Link: Download link

    Online Marketplaces

    Find Ben Hur (Dramatic Reading) at online marketplaces:


    18Crimson Circle

    By

    Book's cover

    The Crimson Circle gang spreads fear by extortion and murder. Its members range from rich, powerful bankers to petty criminals, and none of them know each other. A beautiful young woman named Thalia Drummond appears to be involved in the gang too. But who is the leader of the gang, known only as The Crimson Circle? Chief Inspector Parr is on the case, as well as private detective Derrick Yale. - Summary by Anna Simon

    “Crimson Circle” Metadata:

    • Title: Crimson Circle
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 18
    • Total Time: 07:03:02

    Edition Identifiers:

    Links and information:

    • LibriVox Link:
    • Text Source: - Download text file/s.
    • Wikipedia Link:
    • Number of Sections: 18 sections

    Online Access

    Download the Audio Book:

    • File Name: crimson_circle_1707_librivox
    • File Format: zip
    • Total Time: 07:03:02
    • Download Link: Download link

    Online Marketplaces

    Find Crimson Circle at online marketplaces:


    19Book of All Power

    By

    Book's cover

    The Book of All Power by Edgar Wallace is set in London at the beginning, and then the action moves to Russia. The story covers the period from 1910 to 1919 during which the Russian Revolution takes place and this results in drastic changes to Russian society. This book could be described as a romantic adventure story and the main characters are a weird assortment - Malcolm Hay, a young Englishman, a beautiful Grand Duchess of the Russian Aristocracy, a Russian general, a Jewish bookbinder, and an American sharp shooter. Much happens, and the Russian characters, heavily influenced by their religion and politics, provide a fascinating insight into the mind of the Russian people, aristocrats and peasants, and all those in between. - Summary by Peter Thomlinson

    “Book of All Power” Metadata:

    • Title: Book of All Power
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 20
    • Total Time: 05:26:23

    Edition Identifiers:

    Links and information:

    • LibriVox Link:
    • Text Source: - Download text file/s.
    • Number of Sections: 20 sections

    Online Access

    Download the Audio Book:

    • File Name: the_book_of_all_power_1906_librivox
    • File Format: zip
    • Total Time: 05:26:23
    • Download Link: Download link

    Online Marketplaces

    Find Book of All Power at online marketplaces:


    20Clue of the Twisted Candle (Version 2)

    By

    Book's cover

    Detective mystery story set in London, with some romance, and intriguing plot. - Summary by Peter Thomlinson

    “Clue of the Twisted Candle (Version 2)” Metadata:

    • Title: ➤  Clue of the Twisted Candle (Version 2)
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 23
    • Total Time: 05:58:02

    Edition Identifiers:

    Links and information:

    • LibriVox Link:
    • Text Source: - Download text file/s.
    • Number of Sections: 23 sections

    Online Access

    Download the Audio Book:

    • File Name: clueofthetwistedcandle_1911_librivox
    • File Format: zip
    • Total Time: 05:58:02
    • Download Link: Download link

    Online Marketplaces

    Find Clue of the Twisted Candle (Version 2) at online marketplaces:


    21Mark Twain and the Happy Island

    By

    This Mark Twain Memoir by Elizabeth Wallace paints an idyllic portrait of his time in Bermuda, not long before his death in 1910. Wallace and Twain met in Bermuda in 1908, became fast friends, and shared time together on the island and regular correspondence until 6 weeks before Twain's death. According to one academician, "Wallace’s deep affection for Twain is evident in her writings, so she also may have wished to burnish his legacy. As a result, Happy Island is a popular treatment in a breezy, occasionally sentimental style. It portrays Twain as a fun and caring friend but only hints at weightier matters." - Summary by John Greenman

    “Mark Twain and the Happy Island” Metadata:

    • Title: ➤  Mark Twain and the Happy Island
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 13
    • Total Time: 02:23:59

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: mark_twain_happy_island_2009_librivox
    • File Format: zip
    • Total Time: 02:23:59
    • Download Link: Download link

    Online Marketplaces

    Find Mark Twain and the Happy Island at online marketplaces:


    22Chronicles of Canada Volume 24 - The Family Compact: A Chronicle of the Rebellion in Upper Canada

    By

    The Rebellions of 1837–1838 were two armed uprisings that took place in Lower Canada (now Quebec and Labrador) and Upper Canada (now Ontario). The rebellions were motivated by frustrations over lack of political reform. A key goal was responsible government, which was eventually achieved in the incidents' aftermath. The Upper Canada Rebellion took place in December 1837. The "Family Compact" in the title wasn't familial at all, but rather a group of political elites - not all gifted or savvy; simply the "in" people - who had firm control of the government of Upper Canada at the time. - Summary by TriciaG

    “Chronicles of Canada Volume 24 - The Family Compact: A Chronicle of the Rebellion in Upper Canada” Metadata:

    • Title: ➤  Chronicles of Canada Volume 24 - The Family Compact: A Chronicle of the Rebellion in Upper Canada
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 11
    • Total Time: 03:38:18

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: thefamilycompact_2208_librivox
    • File Format: zip
    • Total Time: 03:38:18
    • Download Link: Download link

    Online Marketplaces

    Find Chronicles of Canada Volume 24 - The Family Compact: A Chronicle of the Rebellion in Upper Canada at online marketplaces:


    23Letters of Wolfgang Amadeus Mozart, Vol. I

    By

    Book's cover

    This volume, the first volume of a two-volume set, contains 140 letters written by Wolfgang Amadeus Mozart from 1769-1781. It has been translated by Lady Wallace from the collection of Ludwig Nohl. He has provided a preface and short introductions to several sections of this volume as well as footnotes. - Summary by mkirkpat

    “Letters of Wolfgang Amadeus Mozart, Vol. I” Metadata:

    • Title: ➤  Letters of Wolfgang Amadeus Mozart, Vol. I
    • Authors:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 11
    • Total Time: 08:33:01

    Edition Identifiers:

    Links and information:

    • LibriVox Link:
    • Text Source: - Download text file/s.
    • Number of Sections: 11 sections

    Online Access

    Download the Audio Book:

    • File Name: letters_of_wolfgang_amadeus_mozart_vol_1_2301_librivox
    • File Format: zip
    • Total Time: 08:33:01
    • Download Link: Download link

    Online Marketplaces

    Find Letters of Wolfgang Amadeus Mozart, Vol. I at online marketplaces:


    24Fellowship of the Frog

    By

    In this story, a small village in rural England is the unlikely site of multiple mysterious goings-on. Dick Gordon, a young public prosecutor, and a determined police officer named Elk are on the trail of a secret society called the Frogs. Their leader is a diabolical master criminal simply known as “The Frog”. There are further interesting subplots involving the family of a pretty young lady whom Dick Gordon finds very attractive. There are plenty of other characters and a few delightful twists! - Summary by Howard Skyman

    “Fellowship of the Frog” Metadata:

    • Title: Fellowship of the Frog
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 43
    • Total Time: 09:44:00

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: fellowship_of_the_frog_2303_librivox
    • File Format: zip
    • Total Time: 09:44:00
    • Download Link: Download link

    Online Marketplaces

    Find Fellowship of the Frog at online marketplaces:


    25Four Just Men

    By

    In the atmosphere of political turmoil before the First World War it seemed there were villains, spies and anarchists around every corner. Some believed that the normal avenues of Law and Order were not well enough equipped to deal with such miscreants, but there are four just men who keep a vigil. Foreign Secretary Sir Philip Ramon receives a letter signed 'Four Just Men': “The Bill that you are about to pass into law is an unjust one …". This group of men is notorious and feared as they have already brought retribution to those believed guilty of crimes but are outside the reach of the law (their arm is longer and they always deliver capital justice). The Alien Extradition Bill, Ramon's cherished idea, will create barriers for those that the FJM see as forces for good, so Ramon must redact it or be himself 'removed'. A cat and mouse game ensues between the FJM and Scotland Yard, broadcast to the public by an excited press. The story is played out in two parts: Part 1 The Secretary of State for Foreign Affairs; Part 2 The Council of Justice. (Summary by Andy Sames)

    “Four Just Men” Metadata:

    • Title: Four Just Men
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 29
    • Total Time: 09:51:47

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: the_four_just_men_2309_librivox
    • File Format: zip
    • Total Time: 09:51:47
    • Download Link: Download link

    Online Marketplaces

    Find Four Just Men at online marketplaces:


    26The Clue of the New Pin

    By

    Book's cover

    A rich man is murdered in a seemingly impossible way. Journalist Tab Holland and Inspector Carver have only the clue of the new pin lying in the vicinity to go by. - Summary by Yoganandh T

    “The Clue of the New Pin” Metadata:

    • Title: The Clue of the New Pin
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 39
    • Total Time: 06:22:29

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: clue_of_the_new_pin_2309_librivox
    • File Format: zip
    • Total Time: 06:22:29
    • Download Link: Download link

    Online Marketplaces

    Find The Clue of the New Pin at online marketplaces:


    27Three Just Men

    By

    It is early twentieth century England and all is not well. Innocent citizens are found murdered by an apparent snake bite accredited to a diabolical villain named Dr. Oberzohn. The infamous Dr. Oberzohn has designs on a fortune coming into the hands of a fair damsel. Hoping to come to the rescue is a team of vigilantes called the Three Just Men. What ensues is an intriguing battle between good and evil. (Summary by Howard Skyman)

    “Three Just Men” Metadata:

    • Title: Three Just Men
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 34
    • Total Time: 09:03:08

    Edition Identifiers:

    Links and information:

    • LibriVox Link:
    • Text Source: - Download text file/s.
    • Number of Sections: 34 sections

    Online Access

    Download the Audio Book:

    • File Name: three_just_men_2311_librivox
    • File Format: zip
    • Total Time: 09:03:08
    • Download Link: Download link

    Online Marketplaces

    Find Three Just Men at online marketplaces:


    28Stories of Grit

    By

    Book's cover

    "There are just two classes of boys who should be permitted to read these fascinating pages. The ambitious boys are in one class; those who are determined to make their lives count. That type of boy will be helped toward finding the best outlet for his services. He will learn of fields of investment for his life work which have brought rich returns to other boys. His vision will be broadened, his objective made higher. The other class of boy who should read this book is that in whom the fires of ambition have not yet been kindled; he who is living on the dead level of life, just "groping to and fro". This type of boy will be inspired to tackle the climbing life when he learns of the handicaps which other boys have overcome and of the great goals they have won." - Summary from the introduction

    “Stories of Grit” Metadata:

    • Title: Stories of Grit
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 15
    • Total Time: 03:02:01

    Edition Identifiers:

    Links and information:

    • LibriVox Link:
    • Text Source: - Download text file/s.
    • Number of Sections: 15 sections

    Online Access

    Download the Audio Book:

    • File Name: storiesofgrit_2312_librivox
    • File Format: zip
    • Total Time: 03:02:01
    • Download Link: Download link

    Online Marketplaces

    Find Stories of Grit at online marketplaces:


    29Square Emerald

    By

    What appears to be a straightforward case of blackmail develops into an exciting, complex web for our heroine, a feisty girl detective attached to New Scotland Yard. Some unusual characters and plotlines and loads of cliffhangers make this an interesting and exciting read. (Summary by Anne Fletcher)

    “Square Emerald” Metadata:

    • Title: Square Emerald
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 23
    • Total Time: 06:49:41

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: squareemerald_2401_librivox
    • File Format: zip
    • Total Time: 06:49:41
    • Download Link: Download link

    Online Marketplaces

    Find Square Emerald at online marketplaces:


    30Door with Seven Locks

    By

    Dick Martin is on his last day on the job at Scotland Yard, having planned to retire early due to an inheritance windfall, when he becomes entangled in a strange and convoluted mystery involving a missing heir, a stolen library book, vivisection, a series of murders and a mysterious tomb with a complicated and unique set of locks, the keys of which have been scattered to the winds. But as the pieces start to come together, what seems at first a series of odd and random coincidences begin to add up to a sinister plot to seize a fortune! (Summary by Ben Tucker)

    “Door with Seven Locks” Metadata:

    • Title: Door with Seven Locks
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 33
    • Total Time: 05:35:46

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: door_with_seven_locks_2311_librivox
    • File Format: zip
    • Total Time: 05:35:46
    • Download Link: Download link

    Online Marketplaces

    Find Door with Seven Locks at online marketplaces:


    31Man Who Knew

    By

    Book's cover

    Saul Arthur Mann is a meticulous and eccentric individual. His life revolves around the gathering of every fact and statistic he can possibly acquire. As a consultant to the police, he is often called upon as a trusted and reliable resource. When a case of murder and fraud arises with regard to a local millionaire, he gladly offers his assistance but even he cannot always be sure of what he will discover. “The Man Who Knew” is a story full of mystery, love and revelation. (Summary by Howard Skyman)

    “Man Who Knew” Metadata:

    • Title: Man Who Knew
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 17
    • Total Time: 05:06:15

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: man_who_knew_2312_librivox
    • File Format: zip
    • Total Time: 05:06:15
    • Download Link: Download link

    Online Marketplaces

    Find Man Who Knew at online marketplaces:


    32Malay Archipelago, Volume 1

    By

    Book's cover

    The Malay Archipelago is a classical Victorian work combining natural history, biogeography and ethnology while describing Wallace's travels in that region during the 1850s and early 1860s. Wallace contributed to the description of natural selection as a process in the evolution of species, along with Charles Darwin. (Summary by Gail Timmerman-Vaughan)

    “Malay Archipelago, Volume 1” Metadata:

    • Title: Malay Archipelago, Volume 1
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 21
    • Total Time: 11:16:13

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: malayarchipelago1_2410_librivox
    • File Format: zip
    • Total Time: 11:16:13
    • Download Link: Download link

    Online Marketplaces

    Find Malay Archipelago, Volume 1 at online marketplaces:


    33Angel Esquire

    By

    Book's cover

    The unconventional Scotland Yard detective Angel Esquire is no fool to be hoodwinked by the murder of the old crook Reale as he anticipates the coup that follows. Jimmy is unconventional too but at the other side of the law and what follows is the nail-biting adventure. - Summary by Yoganandh T

    “Angel Esquire” Metadata:

    • Title: Angel Esquire
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 15
    • Total Time: 04:40:02

    Edition Identifiers:

    Links and information:

    • LibriVox Link:
    • Text Source: - Download text file/s.
    • Number of Sections: 15 sections

    Online Access

    Download the Audio Book:

    • File Name: angelesquire_2403_librivox
    • File Format: zip
    • Total Time: 04:40:02
    • Download Link: Download link

    Online Marketplaces

    Find Angel Esquire at online marketplaces:


    34Double

    By

    When Dick Staines graduated the University of Cambridge without family connections or inherited wealth, he decides to put his honours science degree in the service of Scotland Yard, where he is marked for rapid promotion. Ten years later, and Detective Inspector Richard Staines is confronted by a murder from his past, involving a doppelgänger and a mysterious thumbprint. From the golden age of detective fiction, Edgar Wallace was a prolific author with over 170 novels to his credit, including King Kong. More than 160 films have been made of his works, and a publisher once claimed that a quarter of all books read in England were written by him. - Summary by ASharma

    “Double” Metadata:

    • Title: Double
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 28
    • Total Time: 07:33:15

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: thedouble_2405_librivox
    • File Format: zip
    • Total Time: 07:33:15
    • Download Link: Download link

    Online Marketplaces

    Find Double at online marketplaces:


    35Squealer [aka The Squeaker]

    By

    In 1920s London, a mysterious informant - known only as the Squealer - is systematically betraying London's criminal class to the authorities, leaving a trail of murder and mayhem in his wake. Then an attempt is made on the life of Chief Inspector Barrabal of Scotland Yard, as the unexpected twists and turns hurtle towards a startling conclusion. From the golden age of detective fiction, Edgar Wallace was a prolific author with over 170 novels to his credit, including King Kong. More than 160 films have been made of his works, and a publisher once claimed that a quarter of all books read in England at the time were written by him. Summary by ASharma

    “Squealer [aka The Squeaker]” Metadata:

    • Title: Squealer [aka The Squeaker]
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 33
    • Total Time: 05:46:13

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: squealerakathesqueaker_2406_librivox
    • File Format: zip
    • Total Time: 05:46:13
    • Download Link: Download link

    Online Marketplaces

    Find Squealer [aka The Squeaker] at online marketplaces:


    36Just Men of Cordova

    By

    In “The Just Men of Cordova (1917)”, European financiers are dying conveniently from London to Cordova, victims of a mysterious poison that the police have failed to identify. In his earlier book, Edgar Wallace’s Four Just Men (1905) traveled the globe meting out vigilante justice. Renowned for their cunning, tenacity, lock breaking skills, and mastery of disguise, they operate outside the law, where their lethal brand of justice strikes fear into the hearts of their prey. But just who are they and who is assisting them? From the golden age of detective fiction, Edgar Wallace was a prolific author with over 170 novels to his credit, including King Kong. More than 160 films have been made of his works, and a publisher once claimed that a quarter of all books read in England at the time were written by him. - Summary by ASharma

    “Just Men of Cordova” Metadata:

    • Title: Just Men of Cordova
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 17
    • Total Time: 05:15:37

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

    • File Name: justmenofcordova_2409_librivox
    • File Format: zip
    • Total Time: 05:15:37
    • Download Link: Download link

    Online Marketplaces

    Find Just Men of Cordova at online marketplaces:


    37narrative of travels on the Amazon and Rio Negro, with an account of the native tribes, and observations on the climate, geology, and natural history of the Amazon valley

    By

    Book's cover

    To be completed later. - Summary by Gail Timmerman-Vaughan

    “narrative of travels on the Amazon and Rio Negro, with an account of the native tribes, and observations on the climate, geology, and natural history of the Amazon valley” Metadata:

    • Title: ➤  narrative of travels on the Amazon and Rio Negro, with an account of the native tribes, and observations on the climate, geology, and natural history of the Amazon valley
    • Author:
    • Language: English
    • Publish Date:

    Edition Specifications:

    • Format: Audio
    • Number of Sections: 19

    Edition Identifiers:

    Links and information:

    Online Access

    Download the Audio Book:

      Online Marketplaces

      Find narrative of travels on the Amazon and Rio Negro, with an account of the native tribes, and observations on the climate, geology, and natural history of the Amazon valley at online marketplaces:


      38Jack O' Judgment

      By

      Book's cover

      Here we have another fine novel by the eminent British author Edgar Wallace. The usual mystery of this sort usually revolves around the classic “who done it” theme. However this one is different. Rather than asking the question “who done it?” this is rather a “who is it?”. The reason for this is a vigilante in the story by the name of Jack O’ Judgement. This interesting character is a cross between an assassin and a giggling clown that keeps the reader guessing as to his or her identity. Jack wants to exact justice where traditional law enforcement fails and wreaks havoc upon the villains in the story, the main one being Colonel Dan Boundary as well as his gang. The inevitable good guys are also present in the form of a young policeman named Stafford King and his potential beau Maisie White. A classic tale of the crime/detective genre. Summary by reader

      “Jack O' Judgment” Metadata:

      • Title: Jack O' Judgment
      • Author:
      • Language: English
      • Publish Date:

      Edition Specifications:

      • Format: Audio
      • Number of Sections: 39
      • Total Time: 06:52:27

      Edition Identifiers:

      Links and information:

      Online Access

      Download the Audio Book:

      • File Name: jackojudgment_2504_librivox
      • File Format: zip
      • Total Time: 06:52:27
      • Download Link: Download link

      Online Marketplaces

      Find Jack O' Judgment at online marketplaces:


      39Duke in the Suburbs

      By

      Book's cover

      "The Duke in the Suburbs" by Edgar Wallace is a novel written in the early 20th century. The story follows the characters of the Duke de Montvillier, an American nobleman with a mysterious past, and his friend Hank as they navigate life in a modest suburb of London, Kymott Crescent.

      “Duke in the Suburbs” Metadata:

      • Title: Duke in the Suburbs
      • Author:
      • Language: English
      • Publish Date:

      Edition Specifications:

      • Format: Audio
      • Number of Sections: 41
      • Total Time: 05:18:47

      Edition Identifiers:

      Links and information:

      Online Access

      Download the Audio Book:

      • File Name: dukesuburbs_2505_librivox
      • File Format: zip
      • Total Time: 05:18:47
      • Download Link: Download link

      Online Marketplaces

      Find Duke in the Suburbs at online marketplaces:


      40Strange Countess

      By

      Book's cover

      Lois Reddle is a young girl who works as a clerk in a lawyer’s office. One day her boss, Mr. Shaddles, asks her to pay a visit to Telsbury women’s prison on a legal errand. Whilst there she encounters an intriguing inmate only to discover that she is a notorious convicted murderer. Regardless of this fact she is somehow drawn to this woman and finds she remains on her mind after the visit. Her boss then recommends Lois to be hired by an esteemed client, and she takes on a job at the home of the Countess of Moron. Soon she encounters a man named Michael Dorn who seems to be more than interested in her life and begins to ingratiate himself to her. This puzzles her and what follows is a life changing turn of events that she never could have imagined, revealing facets of her life of which she was unaware. As the story unfolds her past gradually becomes known and her true destiny is revealed. - Summary by Howard Skyman

      “Strange Countess” Metadata:

      • Title: Strange Countess
      • Author:
      • Language: English
      • Publish Date:

      Edition Specifications:

      • Format: Audio
      • Number of Sections: 36
      • Total Time: 06:00:39

      Edition Identifiers:

      Links and information:

      Online Access

      Download the Audio Book:

      • File Name: strangecountess_2506_librivox
      • File Format: zip
      • Total Time: 06:00:39
      • Download Link: Download link

      Online Marketplaces

      Find Strange Countess at online marketplaces:


      41Number Six

      By

      The master criminal Caesar Valentine is rich, suave and seemingly untouchable. He has confounded Scotland Yard time and time again, stealing and killing beyond the long arm of the law. Hallet of the London C.I.B. thinks he has a solution though. He will recruit a special agent, designated Number Six, that no one will know the identity of and who will operate completely off the books. Number Six's sole goal is to infiltrate Caesar Valentine's inner circle and take him down. Who is this mysterious Number Six and will they succeed where all others have failed? - Summary by Ben Tucker

      “Number Six” Metadata:

      • Title: Number Six
      • Author:
      • Language: English
      • Publish Date:

      Edition Specifications:

      • Format: Audio
      • Number of Sections: 15
      • Total Time: 02:51:29

      Edition Identifiers:

      Links and information:

      Online Access

      Download the Audio Book:

      • File Name: numbersix_2505_librivox
      • File Format: zip
      • Total Time: 02:51:29
      • Download Link: Download link

      Online Marketplaces

      Find Number Six at online marketplaces:


      42Other Man

      By

      Book's cover

      "The Other Man" by Edgar Wallace is a novel written in the early 20th century. The story begins in a foggy London, introducing us to an array of characters entwined in a web of intrigue, including a young street messenger who plays a crucial role in the unfolding drama. The central conflicts revolve around financial schemes, personal relationships, and a tense atmosphere surrounding the mysterious Count Poltavo. The characters are vividly portrayed, with underlying tensions emerging, particularly in the romantic rivalry between the two protagonists, further complicated by Mr. Grayson's mysterious circumstances and a looming sense of danger. The opening lays the groundwork for a compelling tale filled with suspense and hidden motivations.

      “Other Man” Metadata:

      • Title: Other Man
      • Author:
      • Language: English
      • Publish Date:

      Edition Specifications:

      • Format: Audio
      • Number of Sections: 34

      Edition Identifiers:

      Links and information:

      • LibriVox Link:
      • Text Source: - Download text file/s.
      • Number of Sections: 34 sections

      Online Access

      Download the Audio Book:

        Online Marketplaces

        Find Other Man at online marketplaces:


        Buy “Software Verification And Validation” online:

        Shop for “Software Verification And Validation” on popular online marketplaces.