Sciweavers

661 search results - page 16 / 133
» What Can We Expect from Program Verification
Sort
View
WWW
2002
ACM
16 years 3 months ago
Model checking cobweb protocols for verification of HTML frames behavior
HTML documents composed of frames can be difficult to write correctly. We demonstrate a technique that can be used by authors manually creating HTML documents (or by document edit...
P. David Stotts, Jaime Navon
SE
2008
15 years 4 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
SIGITE
2004
ACM
15 years 8 months ago
The use of MUPPETS in an introductory java programming course
“The Multi-User Programming Pedagogy for Enhancing Traditional Study” (MUPPETS) system has been under development at RIT for the last three years. This multi-user environment ...
Kevin J. Bierre, Andrew M. Phelps
AGP
1994
IEEE
15 years 7 months ago
What the Event Calculus actually does, and how to do it efficiently
Kowalski and Sergot's Event Calculus (EC) is a formalism for reasoning about time and change in a logic programming framework. From a description of events which occur in the...
Iliano Cervesato, Luca Chittaro, Angelo Montanari
117
Voted
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
15 years 10 months ago
FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Luanne Burns, Timothy Daly