Sciweavers

21 search results - page 3 / 5
» Formal Approaches to Information-Hiding (Tutorial)
Sort
View
ICCD
2005
IEEE
124views Hardware» more  ICCD 2005»
13 years 12 months ago
Model Checking C Programs Using F-SOFT
— With the success of formal verification techniques like equivalence checking and model checking for hardware designs, there has been growing interest in applying such techniqu...
Franjo Ivancic, Ilya Shlyakhter, Aarti Gupta, Mala...
KBSE
2007
IEEE
14 years 16 days ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
TAP
2008
Springer
144views Hardware» more  TAP 2008»
13 years 6 months ago
Integrating Verification and Testing of Object-Oriented Software
Formal methods can only gain widespread use in industrial software development if they are integrated into software development techniques, tools, and languages used in practice. A...
Christian Engel, Christoph Gladisch, Vladimir Kleb...
AIEDU
2005
89views more  AIEDU 2005»
13 years 6 months ago
An Evaluation of a Hybrid Language Understanding Approach for Robust Selection of Tutoring Goals
In this paper, we explore the problem of selecting appropriate interventions for students based on an analysis of their interactions with a tutoring system. In the context of the W...
Carolyn Penstein Rosé, Kurt VanLehn
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 4 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone