Workshop on Learning from Authoritative Security Experiment Results最新文献

筛选
英文 中文
Introduction to the Coq Proof-Assistant for Practical Software Verification 实用软件验证Coq Proof-Assistant简介
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 2011-09-04 DOI: 10.1007/978-3-642-35746-6_3
Christine Paulin-Mohring
{"title":"Introduction to the Coq Proof-Assistant for Practical Software Verification","authors":"Christine Paulin-Mohring","doi":"10.1007/978-3-642-35746-6_3","DOIUrl":"https://doi.org/10.1007/978-3-642-35746-6_3","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Fixpoints and Search in PVS 固定点和搜索在pv
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-13010-6_5
N. Shankar
{"title":"Fixpoints and Search in PVS","authors":"N. Shankar","doi":"10.1007/978-3-642-13010-6_5","DOIUrl":"https://doi.org/10.1007/978-3-642-13010-6_5","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116370737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using the Spec# Language, Methodology, and Tools to Write Bug-Free Programs 使用spec#语言、方法和工具编写无bug的程序
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-13010-6_4
K. Rustan, M. Leino, Peter Müller
{"title":"Using the Spec# Language, Methodology, and Tools to Write Bug-Free Programs","authors":"K. Rustan, M. Leino, Peter Müller","doi":"10.1007/978-3-642-13010-6_4","DOIUrl":"https://doi.org/10.1007/978-3-642-13010-6_4","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131741716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
SCOOP - A Contract-Based Concurrent Object-Oriented Programming Model 一个基于契约的并发面向对象编程模型
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-13010-6_3
Benjamin Morandi, Sebastian S. Bauer, B. Meyer
{"title":"SCOOP - A Contract-Based Concurrent Object-Oriented Programming Model","authors":"Benjamin Morandi, Sebastian S. Bauer, B. Meyer","doi":"10.1007/978-3-642-13010-6_3","DOIUrl":"https://doi.org/10.1007/978-3-642-13010-6_3","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Formal Reference for SCOOP 正式的参考资料
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-25231-0_3
Benjamin Morandi, Sebastian Nanz, B. Meyer
{"title":"A Formal Reference for SCOOP","authors":"Benjamin Morandi, Sebastian Nanz, B. Meyer","doi":"10.1007/978-3-642-25231-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-25231-0_3","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multi Core Design for Chip Level Multiprocessing 芯片级多处理的多核设计
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-13010-6_6
T. Fossum
{"title":"Multi Core Design for Chip Level Multiprocessing","authors":"T. Fossum","doi":"10.1007/978-3-642-13010-6_6","DOIUrl":"https://doi.org/10.1007/978-3-642-13010-6_6","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125734211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Search Based Software Engineering: Techniques, Taxonomy, Tutorial 基于搜索的软件工程:技术、分类、教程
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-25231-0_1
M. Harman, Phil McMinn, J. Souza, S. Yoo
{"title":"Search Based Software Engineering: Techniques, Taxonomy, Tutorial","authors":"M. Harman, Phil McMinn, J. Souza, S. Yoo","doi":"10.1007/978-3-642-25231-0_1","DOIUrl":"https://doi.org/10.1007/978-3-642-25231-0_1","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128842157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 284
Is Branch Coverage a Good Measure of Testing Effectiveness? 分支覆盖率是测试有效性的良好度量吗?
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-25231-0_5
Yi Wei, B. Meyer, M. Oriol
{"title":"Is Branch Coverage a Good Measure of Testing Effectiveness?","authors":"Yi Wei, B. Meyer, M. Oriol","doi":"10.1007/978-3-642-25231-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-25231-0_5","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126216949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Compensable Transactions 补偿事务
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-13010-6_2
C. A. Hoare
{"title":"Compensable Transactions","authors":"C. A. Hoare","doi":"10.1007/978-3-642-13010-6_2","DOIUrl":"https://doi.org/10.1007/978-3-642-13010-6_2","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127866769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Integration of Software Testing and Formal Analysis 论软件测试与形式分析的集成
Workshop on Learning from Authoritative Security Experiment Results Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-25231-0_4
Pietro Braione, G. Denaro, M. Pezzè
{"title":"On the Integration of Software Testing and Formal Analysis","authors":"Pietro Braione, G. Denaro, M. Pezzè","doi":"10.1007/978-3-642-25231-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-25231-0_4","url":null,"abstract":"","PeriodicalId":180540,"journal":{"name":"Workshop on Learning from Authoritative Security Experiment Results","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信