Sciweavers

1356 search results - page 74 / 272
» The ideal of verified software
Sort
View
EUROMICRO
2006
IEEE
15 years 6 months ago
Composing Components in Design Phase using Exogenous Connectors
Composition can take place during different stages of component life cycle. We identify two main stages : design phase - components are composed into composite components for reus...
Kung-Kiu Lau, Ling Ling, Zheng Wang
KBSE
2003
IEEE
15 years 5 months ago
Fault Localization With Nearest Neighbor Queries
We present a method for performing fault localization using similar program spectra. Our method assumes the existence of a faulty run and a larger number of correct runs. It then ...
Manos Renieris, Steven P. Reiss
UIST
2000
ACM
15 years 4 months ago
Fluid sketches: continuous recognition and morphing of simple hand-drawn shapes
We describe a new sketching interface in which shape recognition and morphing are tightly coupled. Raw input strokes are continuously morphed into ideal geometric shapes, even bef...
James Arvo, Kevin Novins
ISF
2002
107views more  ISF 2002»
14 years 11 months ago
A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior
Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the...
Nicolae B. Szirbik
ASWEC
2008
IEEE
15 years 6 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...