Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
1.
Read the article at http://csob.berry.edu/faculty/jgrout/pokasoft.html, and present a summary of it to the class. (This article, by Harry Robinson, was originally presented at the Sixth International Conference on Software Testing Analysis and Review [STAR 1997].)
2.
Browse through the articles on poka yoke application in software development at http://csob.berry.edu/faculty/jgrout/pokayoke.shtml. Suggest their possible applications in a software development context you are familiar with.