Sciweavers

1821 search results - page 299 / 365
» Security-Aware Program Transformations
Sort
View
DB
2008
107views more  DB 2008»
13 years 9 months ago
Introducing function extraction into software testing
Software testing can benefit from technologies that enable evolution toward increased engineering discipline. In current practice, software developers lack practical means to dete...
Mark G. Pleszkoch, Richard C. Linger, Alan R. Hevn...
ENTCS
2008
106views more  ENTCS 2008»
13 years 9 months ago
Verifying Test-Hypotheses: An Experiment in Test and Proof
HOL-TestGen is a specification and test case generation environment extending the interactive theorem prover Isabelle/HOL. The HOL-TestGen method is two-staged: first, the origina...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
ENTCS
2006
136views more  ENTCS 2006»
13 years 9 months ago
Classically-controlled Quantum Computation
It is reasonable to assume that quantum computations take place under the control of the classical world. For modelling this standard situation, we introduce a Classically-control...
Simon Perdrix, Philippe Jorrand
ENTCS
2006
118views more  ENTCS 2006»
13 years 9 months ago
The Language Evolver Lever - Tool Demonstration -
Since many domains are constantly evolving, the associated domain specific languages (DSL) inevitably have to evolve too, to retain their value. But the evolution of a DSL can be ...
Elmar Jürgens, Markus Pizka
JCST
2008
114views more  JCST 2008»
13 years 9 months ago
Synthesizing Service Composition Models on the Basis of Temporal Business Rules
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...