skip to main content
Skip header Section
Behavioral Specifications of Businesses and SystemsOctober 1999
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISBN:978-0-7923-8629-2
Published:01 October 1999
Skip Bibliometrics Section
Reflects downloads up to 30 Jan 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. Dadeau F, Giorgetti A, Bouquet F and Enderlin I (2018). Contract-based testing for PHP with Praspel, Journal of Systems and Software, 136:C, (209-222), Online publication date: 1-Feb-2018.
  2. ACM
    Keil M and Thiemann P (2013). Efficient dynamic access analysis using JavaScript proxies, ACM SIGPLAN Notices, 49:2, (49-60), Online publication date: 5-Feb-2014.
  3. ACM
    Geffken M and Thiemann P Side effect monitoring for Java using bytecode rewriting Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java platform: Virtual machines, Languages, and Tools, (87-98)
  4. ACM
    Keil M and Thiemann P Efficient dynamic access analysis using JavaScript proxies Proceedings of the 9th symposium on Dynamic languages, (49-60)
  5. ACM
    Heidegger P, Bieniusa A and Thiemann P (2012). Access permission contracts for scripting languages, ACM SIGPLAN Notices, 47:1, (111-122), Online publication date: 18-Jan-2012.
  6. ACM
    Heidegger P, Bieniusa A and Thiemann P Access permission contracts for scripting languages Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (111-122)
  7. ACM
    Bierhoff K Automated program verification made SYMPLAR Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software, (19-32)
  8. ACM
    de Caso G, Garbervetsky D and Gorín D Pest Proceedings of the 1st Workshop on Developing Tools as Plug-ins, (5-8)
  9. ACM
    Kerfoot E and McKeever S Checking concurrent contracts with aspects Proceedings of the 2010 ACM Symposium on Applied Computing, (2523-2530)
  10. ACM
    Mustafa T, Drouineaud M and Sohr K Towards formal specification and verification of a role-based authorization engine using JML Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, (50-57)
  11. ACM
    Balz M and Goedicke M Embedding process models in object-oriented program code Proceedings of the 1st Workshop on Behaviour Modelling in Model-Driven Architecture, (1-7)
  12. ACM
    Kerfoot E, McKeever S and Torshizi F Deadlock freedom through object ownership International Workshop on Aliasing, Confinement and Ownership in Object-Oriented Programming, (1-8)
  13. ACM
    Moskal M Programming with triggers Proceedings of the 7th International Workshop on Satisfiability Modulo Theories, (20-29)
  14. Lloyd J and Jürjens J Security Analysis of a Biometric Authentication System Using UMLsec and JML Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems, (77-91)
  15. Bidoit M and Hennicker R An Algebraic Semantics for Contract-Based Software Components Proceedings of the 12th international conference on Algebraic Methodology and Software Technology, (216-231)
  16. ACM
    Janota M, Grigore R and Moskal M Reachability analysis for annotated code Proceedings of the 2007 conference on Specification and verification of component-based systems: 6th Joint Meeting of the European Conference on Software Engineering and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, (23-30)
  17. ACM
    Dadeau F, Ledru Y and Du Bousquet L Directed random reduction of combinatorial test suites Proceedings of the 2nd international workshop on Random testing: co-located with the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), (18-25)
  18. ACM
    Bianculli D and Ghezzi C Monitoring conversational web services 2nd international workshop on Service oriented software engineering: in conjunction with the 6th ESEC/FSE joint meeting, (15-21)
  19. ACM
    Bierhoff K and Aldrich J Modular typestate checking of aliased objects Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (301-320)
  20. ACM
    Bierhoff K and Aldrich J (2007). Modular typestate checking of aliased objects, ACM SIGPLAN Notices, 42:10, (301-320), Online publication date: 21-Oct-2007.
  21. Leino K and Schulte W Using history invariants to verify observers Proceedings of the 16th European Symposium on Programming, (80-94)
  22. Müller P, Poetzsch-Heffter A and Leavens G (2006). Modular invariants for layered object structures, Science of Computer Programming, 62:3, (253-286), Online publication date: 15-Oct-2006.
  23. ACM
    Cheon Y and Kim M A specification-based fitness function for evolutionary testing of object-oriented programs Proceedings of the 8th annual conference on Genetic and evolutionary computation, (1953-1954)
  24. Simons A and Fernandez C Using Alloy to model-check visual design notations Proceedings of the Sixth Mexican International Conference on Computer Science, (121-128)
  25. Leavens G, Cheon Y, Clifton C, Ruby C and Cok D (2005). How the design of JML accommodates both runtime assertion checking and formal verification, Science of Computer Programming, 55:1-3, (185-208), Online publication date: 1-Mar-2005.
  26. Dupuy-Chessa S, du Bousquet L, Bouchet J and Ledru Y Test of the ICARE platform fusion mechanism Proceedings of the 12th international conference on Interactive Systems: design, specification, and verification, (102-113)
  27. Dufay G, Felty A and Matwin S Privacy-sensitive information flow with JML Proceedings of the 20th international conference on Automated Deduction, (116-130)
  28. Edwards S, Sitaraman M, Weide B and Hollingsworth J (2004). Contract-Checking Wrappers for C++ Classes, IEEE Transactions on Software Engineering, 30:11, (794-810), Online publication date: 1-Nov-2004.
  29. Van Der Aalst W (2003). Inheritance of Interorganizational Workflows, Information Technology and Management, 4:4, (345-389), Online publication date: 1-Oct-2003.
  30. ACM
    McCamant S and Ernst M Predicting problems caused by component upgrades Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (287-296)
  31. ACM
    McCamant S and Ernst M (2003). Predicting problems caused by component upgrades, ACM SIGSOFT Software Engineering Notes, 28:5, (287-296), Online publication date: 1-Sep-2003.
  32. ACM
    Kilov H and Baclawski K 11th OOPSLA workshop on behavioral semantics Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (76-77)
  33. Müller P (2002). Modular specification and verification of object-oriented programs, 10.5555/1767748, Online publication date: 1-Jan-2002.
  34. ACM
    Ruby C and Leavens G Safely creating correct subclasses without seeing superclass code Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (208-228)
  35. ACM
    Ruby C and Leavens G (2000). Safely creating correct subclasses without seeing superclass code, ACM SIGPLAN Notices, 35:10, (208-228), Online publication date: 1-Oct-2000.
  36. ACM
    Leavens G, Ruby C, Leino K, Poll E and Jacobs B JML (poster session) Addendum to the 2000 proceedings of the conference on Object-oriented programming, systems, languages, and applications (Addendum), (105-106)
  37. Pons C, Giandini R and Baum G Dependency Relations between Models in the Unified Process Proceedings of the 10th International Workshop on Software Specification and Design
  38. Kilov H Business Specifications and RD-ODP Proceedings of the Technology of Object-Oriented Languages and Systems (TOOLS 34'00)
Contributors
  • Stevens Institute of Technology
  • RWTH Aachen University
  • IBM Thomas J. Watson Research Center

Recommendations