Sciweavers

124 search results - page 20 / 25
» Software Safety: Where's the Evidence
Sort
View
ICSE
2000
IEEE-ACM
13 years 11 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
VRML
2004
ACM
14 years 28 days ago
Interactive Web-based visualisation of block model data
Mining operations have traditionally used specialised software packages to process and visualise valuable mining data. The downside to this approach is that the information can on...
Tony Gill, Con Caris, Guy LeBlanc Smith
POPL
1998
ACM
13 years 11 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
ISSTA
2006
ACM
14 years 1 months ago
Producing scheduling that causes concurrent programs to fail
A noise maker is a tool that seeds a concurrent program with conditional synchronization primitives (such as yield()) for the purpose of increasing the likelihood that a bug manif...
Yosi Ben-Asher, Yaniv Eytani, Eitan Farchi, Shmuel...
JCDL
2005
ACM
111views Education» more  JCDL 2005»
14 years 1 months ago
Developing practical automatic metadata assignment and evaluation tools for internet resources
This paper describes the development of practical automatic metadata assignment tools to support automatic record creation for virtual libraries, metadata repositories and digital...
Gordon W. Paynter