Sciweavers

3456 search results - page 535 / 692
» Byte Code Engineering
Sort
View
FOSSACS
1998
Springer
15 years 7 months ago
Functor Categories and Two-Level Languages
Abstract. We propose a denotational semantics for the two-level language of [GJ91, Gom92], and prove its correctness w.r.t. a standard denotational semantics. Other researchers (se...
Eugenio Moggi
ICSE
1998
IEEE-ACM
15 years 7 months ago
Overcoming the NAH Syndrome for Inspection Deployment
: Despite considerable evidence to show that inspections can help reduce costs and improve quality, inspections are not widely deployed in the software industry. One of the likely ...
Pankaj Jalote, M. Haragopal
EUROMICRO
1997
IEEE
15 years 7 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
METRICS
1997
IEEE
15 years 7 months ago
An Empirical Analysis of Equivalence Partitioning, Boundary Value Analysis and Random Testing
An experiment comparing the effectiveness of equivalence partitioning (EP), boundary value analysis (BVA), and random testing was performed, based on an operational avionics syste...
Stuart Reid
WCRE
1997
IEEE
15 years 7 months ago
Program Plan Recognition for Year 2000 Tools
There are many commercial tools that address various aspects of the Year 2000 problem. None of these tools, however, addresses the closely-related leap-year problem. In this paper...
Arie van Deursen, Steven Woods, Alex Quilici