-
1
-
-
23844547594
-
The KeY tool
-
W. Ahrendt, T. Baar, B. Beckert, R. Bubel, M. Giese, R. Hähnle, W. Menzel, W. Mostowski, A. Roth, S. Schlager, and P. H. Schmitt. The KeY tool. Software and System Modeling, 4:32-54, 2005.
-
(2005)
Software and System Modeling
, vol.4
, pp. 32-54
-
-
Ahrendt, W.1
Baar, T.2
Beckert, B.3
Bubel, R.4
Giese, M.5
Hähnle, R.6
Menzel, W.7
Mostowski, W.8
Roth, A.9
Schlager, S.10
Schmitt, P.H.11
-
2
-
-
84947917267
-
Controlling sharing of state in data types
-
M. Aksit and S. Matsuoka, editors, ECOOP '97-Object-Oriented Programming. Springer
-
P. S. Almeida. Controlling sharing of state in data types. In M. Aksit and S. Matsuoka, editors, ECOOP '97-Object-Oriented Programming, volume 1241 of Lecture Notes in Computer Science, pages 32-59. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1241
, pp. 32-59
-
-
Almeida, P.S.1
-
3
-
-
35248897702
-
The definition of transitive closure with OCL - Limitations and applications
-
Proceedings, Fifth Andrei Ershov International Conference, Perspectives of System Informatics, Novosibirsk, Russia. Springer, July
-
T. Baar. The definition of transitive closure with OCL - limitations and applications. In Proceedings, Fifth Andrei Ershov International Conference, Perspectives of System Informatics, Novosibirsk, Russia, volume 2890 of Lecture Notes in Computer Science, pages 358-365. Springer, July 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2890
, pp. 358-365
-
-
Baar, T.1
-
4
-
-
84944238972
-
A dynamic logic for the formal verification of Java Card programs
-
I. Attali and T. Jensen, editors, Java on Smart Cards: Programming and Security. Revised Papers, Java Card 2000, International Workshop, Cannes, France. Springer
-
B. Beckert. A dynamic logic for the formal verification of Java Card programs. In I. Attali and T. Jensen, editors, Java on Smart Cards: Programming and Security. Revised Papers, Java Card 2000, International Workshop, Cannes, France, volume 2041 of Lecture Notes in Computer Science, pages 6-24. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2041
, pp. 6-24
-
-
Beckert, B.1
-
5
-
-
0035335990
-
Alias burying: Unique variables without destructive reads
-
May
-
J. Boyland. Alias burying: Unique variables without destructive reads. Software -Practice and Experience, 31(6): 533-553, May 2001.
-
(2001)
Software -Practice and Experience
, vol.31
, Issue.6
, pp. 533-553
-
-
Boyland, J.1
-
6
-
-
0004101993
-
-
John-Wiley and Sons
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal. Pattern-Oriented Software Architecture - A System of Patterns. John-Wiley and Sons, 1996.
-
(1996)
Pattern-oriented Software Architecture - A System of Patterns
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
7
-
-
0348137542
-
Ownership types for flexible alias protection
-
Vancouver, Canada, October
-
D. Clarke, J. Potter, and J. Noble. Ownership types for flexible alias protection. In ACM Conference on Object-Oriented Programming Systems, Languages and Applications (OOPSLA '98), Vancouver, Canada, October 1998.
-
(1998)
ACM Conference on Object-oriented Programming Systems, Languages and Applications (OOPSLA '98)
-
-
Clarke, D.1
Potter, J.2
Noble, J.3
-
8
-
-
0003880013
-
-
Addison-Wesley, Reading/MA
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading/MA, 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
9
-
-
0003518498
-
-
Addison Wesley, 2nd edition
-
J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification. Addison Wesley, 2nd edition, 2000.
-
(2000)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
Bracha, G.4
-
10
-
-
0004090779
-
-
John Wiley &: Sons
-
M. Grand. Patterns in Java, volume 1 and 2. John Wiley &: Sons, 1998 and 1999.
-
(1998)
Patterns in Java
, vol.1-2
-
-
Grand, M.1
-
11
-
-
2542628621
-
Avoiding the undefined by underspecification
-
J. van Leeuwen, editor Computer Science Today. Springer
-
D. Gries and F. B. Schneider. Avoiding the undefined by underspecification. In J. van Leeuwen, editor, Computer Science Today, volume 1000 of Lecture Notes in Computer Science, pages 366-373. Springer, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1000
, pp. 366-373
-
-
Gries, D.1
Schneider, F.B.2
-
13
-
-
0004030849
-
Preliminary design of JML: A behavioral interface specification language for Java
-
Iowa State University, Department of Computer Science, Dec.
-
G. T. Leavens, A. L. Baker, and C. Ruby. Preliminary design of JML: A behavioral interface specification language for Java. Technical Report 98-06z, Iowa State University, Department of Computer Science, Dec. 2004. See www.jmlspecs.org.
-
(2004)
Technical Report
, vol.98
, Issue.6 Z
-
-
Leavens, G.T.1
Baker, A.L.2
Ruby, C.3
-
14
-
-
84945713135
-
Applying "design by contract"
-
Oct.
-
B. Meyer. Applying "design by contract". IEEE Computer, 25(10):40-51, Oct. 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.10
, pp. 40-51
-
-
Meyer, B.1
-
17
-
-
51749114569
-
Towards a model of encapsulation
-
Darmstadt, Germany, July
-
J. Noble, R. Biddle, E. Tempero, A. Potanin, and D. Clarke. Towards a model of encapsulation. In International Workshop on Aliasing, Confinement, and Ownership (IWACO), Darmstadt, Germany, July 2003.
-
(2003)
International Workshop on Aliasing, Confinement, and Ownership (IWACO)
-
-
Noble, J.1
Biddle, R.2
Tempero, E.3
Potanin, A.4
Clarke, D.5
|