Sciweavers

1821 search results - page 299 / 365
» Security-Aware Program Transformations
Sort
View
141
Voted
DB
2008
107views more  DB 2008»
15 years 27 days ago
Introducing function extraction into software testing
Software testing can benefit from technologies that enable evolution toward increased engineering discipline. In current practice, software developers lack practical means to dete...
Mark G. Pleszkoch, Richard C. Linger, Alan R. Hevn...
123
Voted
ENTCS
2008
106views more  ENTCS 2008»
15 years 26 days ago
Verifying Test-Hypotheses: An Experiment in Test and Proof
HOL-TestGen is a specification and test case generation environment extending the interactive theorem prover Isabelle/HOL. The HOL-TestGen method is two-staged: first, the origina...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
122
Voted
ENTCS
2006
136views more  ENTCS 2006»
15 years 25 days ago
Classically-controlled Quantum Computation
It is reasonable to assume that quantum computations take place under the control of the classical world. For modelling this standard situation, we introduce a Classically-control...
Simon Perdrix, Philippe Jorrand
82
Voted
ENTCS
2006
118views more  ENTCS 2006»
15 years 25 days ago
The Language Evolver Lever - Tool Demonstration -
Since many domains are constantly evolving, the associated domain specific languages (DSL) inevitably have to evolve too, to retain their value. But the evolution of a DSL can be ...
Elmar Jürgens, Markus Pizka
97
Voted
JCST
2008
114views more  JCST 2008»
15 years 24 days ago
Synthesizing Service Composition Models on the Basis of Temporal Business Rules
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...