Sciweavers

1036 search results - page 106 / 208
» Verification Programs for Abduction
Sort
View
POPL
2003
ACM
16 years 4 months ago
Ownership types for object encapsulation
Ownership types provide a statically enforceable way of specifying object encapsulation and enable local reasoning about program correctness in object-oriented languages. However,...
Chandrasekhar Boyapati, Barbara Liskov, Liuba Shri...
GPCE
2007
Springer
15 years 10 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
IHIS
2005
ACM
15 years 10 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao
AADEBUG
2005
Springer
15 years 10 months ago
Specifying and checking component usage
One of today’s challenges is producing reliable software in the face of an increasing number of interacting components. Our system CHET lets developers define specifications des...
Steven P. Reiss
SIGSOFT
2010
ACM
15 years 2 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan