Sciweavers

1356 search results - page 60 / 272
» The ideal of verified software
Sort
View
ICSE
2010
IEEE-ACM
15 years 4 months ago
Flexible architecture conformance assessment with ConQAT
The architecture of software systems is known to decay if no counter-measures are taken. In order to prevent this architectural erosion, the conformance of the actual system archi...
Florian Deissenboeck, Lars Heinemann, Benjamin Hum...
TAP
2009
Springer
127views Hardware» more  TAP 2009»
15 years 6 months ago
Could We Have Chosen a Better Loop Invariant or Method Contract?
The method contract and loop invariant rules (contract rules) are an important software verification technique for handling method invocations and loops. However, if a verificati...
Christoph Gladisch
DAGSTUHL
2008
15 years 1 months ago
Extending the Range of C-XSC: Some Tools and Applications for the use in Parallel and other Environments
We present some examples of extensions for C-XSC that have been developed lately. Among these are extensions that give access to further hardware and software environments as well ...
Markus Grimmer
CHI
2009
ACM
16 years 12 days ago
Out from behind the curtain: learning from a human auditory display
In this paper we describe an approach to gathering design requirements for a software auditory display by analyzing user interactions with an ideal partner: a talking human contro...
Peter Parente, Gary Bishop
ICSE
2008
IEEE-ACM
16 years 19 days ago
Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems
In grid workflow systems, temporal correctness is critical to assure the timely completion of grid workflow execution. To monitor and control the temporal correctness, fixed-time ...
Jinjun Chen, Yun Yang