메뉴 건너뛰기




Volumn 3535, Issue , 2005, Pages 195-210

Specification and verification of encapsulation in java programs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE DESCRIPTION LANGUAGES; COMPUTER SIMULATION; DISTRIBUTED COMPUTER SYSTEMS; COMPUTER SOFTWARE; DESIGN; FORMAL METHODS; SPECIFICATION LANGUAGES; SPECIFICATIONS; STATIC ANALYSIS;

EID: 26444613366     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11494881_13     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 2
    • 84947917267 scopus 로고    scopus 로고
    • Controlling sharing of state in data types
    • M. Aksit and S. Matsuoka, editors, ECOOP '97-Object-Oriented Programming. Springer
    • P. S. Almeida. Controlling sharing of state in data types. In M. Aksit and S. Matsuoka, editors, ECOOP '97-Object-Oriented Programming, volume 1241 of Lecture Notes in Computer Science, pages 32-59. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1241 , pp. 32-59
    • Almeida, P.S.1
  • 3
    • 35248897702 scopus 로고    scopus 로고
    • The definition of transitive closure with OCL - Limitations and applications
    • Proceedings, Fifth Andrei Ershov International Conference, Perspectives of System Informatics, Novosibirsk, Russia. Springer, July
    • T. Baar. The definition of transitive closure with OCL - limitations and applications. In Proceedings, Fifth Andrei Ershov International Conference, Perspectives of System Informatics, Novosibirsk, Russia, volume 2890 of Lecture Notes in Computer Science, pages 358-365. Springer, July 2003.
    • (2003) Lecture Notes in Computer Science , vol.2890 , pp. 358-365
    • Baar, T.1
  • 4
    • 84944238972 scopus 로고    scopus 로고
    • A dynamic logic for the formal verification of Java Card programs
    • I. Attali and T. Jensen, editors, Java on Smart Cards: Programming and Security. Revised Papers, Java Card 2000, International Workshop, Cannes, France. Springer
    • B. Beckert. A dynamic logic for the formal verification of Java Card programs. In I. Attali and T. Jensen, editors, Java on Smart Cards: Programming and Security. Revised Papers, Java Card 2000, International Workshop, Cannes, France, volume 2041 of Lecture Notes in Computer Science, pages 6-24. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2041 , pp. 6-24
    • Beckert, B.1
  • 5
    • 0035335990 scopus 로고    scopus 로고
    • Alias burying: Unique variables without destructive reads
    • May
    • J. Boyland. Alias burying: Unique variables without destructive reads. Software -Practice and Experience, 31(6): 533-553, May 2001.
    • (2001) Software -Practice and Experience , vol.31 , Issue.6 , pp. 533-553
    • Boyland, J.1
  • 10
    • 0004090779 scopus 로고    scopus 로고
    • John Wiley &: Sons
    • M. Grand. Patterns in Java, volume 1 and 2. John Wiley &: Sons, 1998 and 1999.
    • (1998) Patterns in Java , vol.1-2
    • Grand, M.1
  • 11
    • 2542628621 scopus 로고
    • Avoiding the undefined by underspecification
    • J. van Leeuwen, editor Computer Science Today. Springer
    • D. Gries and F. B. Schneider. Avoiding the undefined by underspecification. In J. van Leeuwen, editor, Computer Science Today, volume 1000 of Lecture Notes in Computer Science, pages 366-373. Springer, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1000 , pp. 366-373
    • Gries, D.1    Schneider, F.B.2
  • 13
    • 0004030849 scopus 로고    scopus 로고
    • Preliminary design of JML: A behavioral interface specification language for Java
    • Iowa State University, Department of Computer Science, Dec.
    • G. T. Leavens, A. L. Baker, and C. Ruby. Preliminary design of JML: A behavioral interface specification language for Java. Technical Report 98-06z, Iowa State University, Department of Computer Science, Dec. 2004. See www.jmlspecs.org.
    • (2004) Technical Report , vol.98 , Issue.6 Z
    • Leavens, G.T.1    Baker, A.L.2    Ruby, C.3
  • 14
    • 84945713135 scopus 로고
    • Applying "design by contract"
    • Oct.
    • B. Meyer. Applying "design by contract". IEEE Computer, 25(10):40-51, Oct. 1992.
    • (1992) IEEE Computer , vol.25 , Issue.10 , pp. 40-51
    • Meyer, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.