Sciweavers

1173 search results - page 122 / 235
» Program Derivation Using Analogy
Sort
View
LPAR
2007
Springer
15 years 11 months ago
Why Would You Trust B ?
Abstract. The use of formal methods provides confidence in the correctness of developments. Yet one may argue about the actual level of confidence obtained when the method itself...
Éric Jaeger, Catherine Dubois
ISESE
2005
IEEE
15 years 10 months ago
Dialog-based protocol: an empirical research method for cognitive activities in software engineering
This paper proposes dialog-based protocol for the study of the cognitive activities during software development and evolution. The dialog-based protocol, derived from the idea of ...
Shaochun Xu, Václav Rajlich
NECO
2008
83views more  NECO 2008»
15 years 5 months ago
Sequential Fixed-Point ICA Based on Mutual Information Minimization
A new gradient technique is introduced for linear ICA based on the Edgeworth expansion of mutual information, for which the algorithm operates sequentially using fixed-point itera...
Marc M. Van Hulle
CP
2006
Springer
15 years 8 months ago
Generating Propagators for Finite Set Constraints
Ideally, programming propagators as implementations of constraints should be an entirely declarative specification process for a large class of constraints: a high-level declarativ...
Guido Tack, Christian Schulte, Gert Smolka
UTP
2010
15 years 2 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob