Sciweavers

1077 search results - page 133 / 216
» Introducing Software Engineering by means of Extreme Program...
Sort
View
TSE
2010
110views more  TSE 2010»
15 years 2 months ago
Proofs from Tests
We present an algorithm Dash to check if a program P satisfies a safety property ϕ. The unique feature of the algorithm is that it uses only test generation operations, and nes ...
Nels E. Beckman, Aditya V. Nori, Sriram K. Rajaman...
ASE
2007
143views more  ASE 2007»
15 years 4 months ago
Composition inference for UML class diagrams
Knowing which associations are compositions is important in a tool for the reverse engineering of UML class diagrams. Firstly, recovery of composition relationships bridges the ga...
Ana Milanova
CODES
2009
IEEE
15 years 11 months ago
An on-chip interconnect and protocol stack for multiple communication paradigms and programming models
A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). The d...
Andreas Hansson, Kees Goossens
FOSSACS
2008
Springer
15 years 6 months ago
Erasure and Polymorphism in Pure Type Systems
We introduce Erasure Pure Type Systems, an extension to Pure Type Systems with an erasure semantics centered around a type constructor indicating parametric polymorphism. The eras...
Nathan Mishra-Linger, Tim Sheard
ECOOP
1998
Springer
15 years 8 months ago
Mobile Objects and Mobile Agents: The Future of Distributed Computing?
This paper will lead you into the world of mobile agents, an emerging technology that makes it very much easier to design, implement, and maintain distributed systems. You will fin...
Danny B. Lange