Sciweavers

11909 search results - page 2247 / 2382
» The Scheme Programming Language
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 10 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
CASCON
2006
118views Education» more  CASCON 2006»
13 years 10 months ago
Ensuring behavioural equivalence in test-driven porting
In this paper we present a test-driven approach to porting code from one object-oriented language to another. We derive an order for the porting of the code, along with a testing ...
Mark Hennessy, James F. Power
DAGSTUHL
2004
13 years 10 months ago
Testing with Functions as Specifications
Although computer systems penetrate all facets of society, the software running those systems may contain many errors. Producing high quality software appears to be difficult and v...
Pieter W. M. Koopman
DLT
2006
13 years 10 months ago
Well-Founded Semantics for Boolean Grammars
Abstract. Boolean grammars [A. Okhotin, Information and Computation 194 (2004) 19-48] are a promising extension of context-free grammars that supports conjunction and negation. In ...
Vassilis Kountouriotis, Christos Nomikos, Panos Ro...
ACE
2003
89views Education» more  ACE 2003»
13 years 10 months ago
The Neglected Battle Fields of Syntax Errors
Syntax error correction is an essential part of the debugging process. Yet there has been little research investigating how programmers approach syntax error correction and how to...
Sarah K. Kummerfeld, Judy Kay
« Prev « First page 2247 / 2382 Last » Next »